text
stringlengths
2.85k
2.55M
label
class label
11 classes
COARSENING OF GRADED LOCAL COHOMOLOGY arXiv:1207.2547v2 [math.AC] 4 Jan 2014 FRED ROHRER Abstract. Some criteria for graded local cohomology to commute with coarsening functors are proven, and an example is given where graded local cohomology does not commute with coarsening. Let G be a commutative group, and let R be a G-graded commutative ring. The category GrModG (R) of G-graded R-modules is Abelian, fulfils Grothendieck’s axiom AB5, and has a projective generator, hence it has enough projectives and injectives. The G-graded Hom bifunctor G HomR (•, ) maps two G-graded R-modules M and N onto the Ggraded R-module M G HomR (M, N) = HomGrModG (R) (M, N(g)). g∈G This contra-covariant bifunctor is left exact in both arguments, and it turns into an exact functor when a projective or injective G-graded R-module is plugged into its first or second argument, respectively. Thus, by general nonsense we get the G-graded Ext bifunctors, i.e., a contra-covariant bifunctor G ExtiR (•, ) such that for every i ∈ i (G ExtR (M, •))i∈Z and (G ExtiR (•, M))i∈Z are the right derived cohomological functors of G HomR (M, •) and G HomR (•, M), respectively, for every G-graded R-module M. Furthermore, if F is a projective system in GrModG (R) over a right filtering ordered set J, then composition yields for every i ∈ a functor limJ G ExtiR (F, •), and it follows by −→ general nonsense that (limJ G ExtiR (F, •))i∈Z is the right derived coho−→ mological functor of limJ G HomR (F, •). In particular, given a graded −→ ideal a ⊆ R we can consider the projective system (R/an )n∈N over (where the morphisms are the canonical ones), and then the above construction yields the G-graded local cohomology functors G Hai , i.e., the right derived cohomological functor of the G-graded a-torsion functor G Γa . The above evokes the natural question: Do we get the same when we first apply graded local cohomology and then forget the graduation Z Z N 2010 Mathematics Subject Classification. Primary 13D45; Secondary 13A02. Key words and phrases. Coarsening, graded local cohomology. The author was supported by the Swiss National Science Foundation. 1 2 FRED ROHRER on the resulting module, and when we first forget the graduation on a given module and then apply ungraded local cohomology? The main reason for this to be nontrivial is that the functor that forgets the graduation does not necessarily preserve injectivity of objects – see [7, A.I.2.6] for a counterexample. In case G = and R is Noetherian, the above question is extensively discussed and positively answered in [2, Chapter 12]1. Here we study this question in case G and R are arbitrary, and we present some criteria for a positive answer. The importance of this stems mainly from toric geometry, where arbitrary groups of degrees (of finite type) are ubiquitous (see [3]). Since it seems also useful and enlightening, we consider a more general situation. Namely, we replace the functor that forgets the graduation by coarsening functors, of which we remind the reader now. Let ψ : G ։ H be an epimorphism of groups. We define an H-graded L L ring R[ψ] = h∈H ( g∈ψ−1 (h) Rg ), and analogously, we get a functor Z •[ψ] : GrModG (R) → GrModH (R[ψ] ), called the ψ-coarsening functor. This functor is faithful, conservative, exact, has a right adjoint, and thus commutes with inductive limits and with finite projective limits. Our question is now whether graded local cohomology commutes with coarsening, i.e., whether the diagram of categories GrModG (R) GH i a / GrModG (R) •[ψ] •[ψ]  GrModH (R[ψ] ) H Hi a[ψ] /  GrModH (R[ψ] ) quasicommutes. Our first approach uses the above definition of graded local cohomology and hence comes down to the analogous question for graded Ext functors. Known facts about the analogous question for graded Hom functors (see [4], [5]) together with δ-functor techniques will allow us to quickly get our first two criteria (5) and (6). A second approach uses the relation between local cohomology and Čech cohomology and will result in a third criterion (7). We start by defining some canonical morphisms of functors. 1In fact, in loc. cit. it is supposed that the ungraded ring underlying R is Noetherian, but in this special situation this is by [7, A.II.3.5] equivalent to R being Noetherian (as a graded ring, i.e., every increasing sequence of graded ideals is stationary). COARSENING OF GRADED LOCAL COHOMOLOGY 3 (1) For G-graded R-modules M and N and g ∈ G, we have a monomorphism of groups HomGrModG (R) (M, N(g)) ֌ HomGrModH (R[ψ] ) (M[ψ] , N[ψ] (ψ(g))) with u 7→ u[ψ] , inducing a monomorphism of H-graded R[ψ] -modules hψ (M, N) : G HomR (M, N)[ψ] ֌ H HomR[ψ] (M[ψ] , N[ψ] ). Varying M and N, we get a monomorphism of bifunctors hψ : G HomR (•, )[ψ] ֌ H HomR[ψ] (•[ψ] , [ψ] ). If F is a projective system in GrModG (R) over a right filtering ordered set J, then hψ induces a monomorphism of functors hF,ψ := lim hψ (F, •) : lim G HomR (F, •)[ψ] ֌ lim H HomR[ψ] (F[ψ] , •[ψ] ). −→ −→ −→ J J J One may note that the above monomorphisms are not necessarily isomorphisms. An easy example of this phenomenon is obtained by considering G infinite, H = 0 and R 6= 0 trivially G-graded (i.e., R[0] = L R0 ), for then h0 ( g∈G R(g), R) coincides with the canonical injection R0⊕G ֌ R0G . In fact, it follows from [7, A.I.2.11] and [5, 3.4] that if M is a G-graded R-module, then h0 (M, •) is an isomorphism if and only if G is finite or M is small2. (2) If M is a G-graded R-module, then exactness of •[ψ] yields exact δ-functors (G ExtiR (M, •)[ψ] )i∈Z , (H ExtiR[ψ] (M[ψ] , •[ψ] ))i∈Z , (G ExtiR (•, M)[ψ] )i∈Z , (H ExtiR[ψ] (•[ψ] , M[ψ] ))i∈Z , and implies effaceability of G ExtiR (M, •)[ψ] and G ExtiR (•, M)[ψ] for i > 0. But H ExtiR[ψ] (•[ψ] , M[ψ] ) is effaceable for i > 0, too, for •[ψ] preserves projectivity ([7, A.I.2.2]). Thus, (G ExtiR (M, •)[ψ] )i∈Z , (G ExtiR (•, M)[ψ] )i∈Z , (H ExtiR[ψ] (•[ψ] , M[ψ] ))i∈Z are the right derived cohomological functors of G HomR (M, •)[ψ] , G HomR (•, M)[ψ] , and H HomR[ψ] (•[ψ] , M[ψ] ), respectively. So, there are unique morphisms of δ-functors (hiψ (M, •))i∈Z : (G ExtiR (M, •)[ψ] )i∈Z → (H ExtiR[ψ] (M[ψ] , •[ψ] ))i∈Z and (hiψ (•, M))i∈Z : (G ExtiR (•, M)[ψ] )i∈Z → (H ExtiR[ψ] (•[ψ] , M[ψ] ))i∈Z 2A G-graded R-module M is called small if HomGrModG (R) (M, •) commutes with direct sums. 4 FRED ROHRER with h0ψ (M, •) = hψ (M, •) and h0ψ (•, M) = hψ (•, M), and they define for every i ∈ a morphism of bifunctors Z hiψ : G ExtiR (•, )[ψ] → H ExtiR[ψ] (•[ψ] , [ψ] ) with h0ψ = hψ ([6, 2.3]). Furthermore, if hψ (•, M) is an isomorphism then so is (hiψ (•, M))i∈Z , and thus if hψ is an isomorphism then so is hiψ for every i ∈ . If F is a projective system in GrModG (R) over a right filtering ordered set J, then exactness of •[ψ] yields exact δ-functors Z (lim G ExtiR (F, •)[ψ] )i∈Z , −→ J (lim H ExtiR[ψ] (F[ψ] , •[ψ] ))i∈Z , −→ J of which the first is universal, hence a unique morphism of δ-functors (hiF,ψ )i∈Z : (lim G ExtiR (F, •)[ψ] )i∈Z → (lim H ExtiR[ψ] (F[ψ] , •[ψ] ))i∈Z −→ −→ J with h0F,ψ J = hF,ψ . (3) Let a ⊆ R be a graded ideal. We consider the projective system R/A = (R/an )n∈N in GrModG (R) over . There is by (2) a canonical morphism of δ-functors N (hiR/A,ψ )i∈Z : (G Hai (•)[ψ] )i∈Z → (H Hai[ψ] (•[ψ] ))i∈Z , and hR/A,ψ : G Γa (•)[ψ] ֌ H Γa[ψ] (•[ψ] ) is the identity morphism. Related to graded local cohomology are graded higher ideal transformations: The δ-functor (G Dai (•))i∈Z := (limn∈N G ExtiR (an , •))i∈Z is the −→ right derived cohomological functor of limn∈N G HomR (an , •). It plays −→ an important role in the relation between local cohomology and sheaf ([2, 20.4.4]), and cohomology, on projective schemes in case G = on toric schemes in case of more general groups of degree. Setting A = (an )n∈N we get from (2) a morphism of δ-functors Z (hiA,ψ )i∈Z : (G Dai (•)[ψ] )i∈Z → (H Dai [ψ] (•[ψ] ))i∈Z . We show now that local cohomology commutes with coarsening if and only if higher ideal transformation does so. (4) Proposition The morphism of δ-functors (hiA,ψ )i∈Z : (G Dai (•)[ψ] )i∈Z → (H Dai [ψ] (•[ψ] ))i∈Z is an isomorphism if and only if the morphism of δ-functors (hiR/A,ψ )i∈Z : (G Hai (•)[ψ] )i∈Z → (H Hai[ψ] (•[ψ] ))i∈Z is so. COARSENING OF GRADED LOCAL COHOMOLOGY 5 Proof. Analogously to [2, 2.2.4] we get an exact sequence of functors 0 → G Γa → IdGrModG (R) → G Da0 → G Ha1 → 0 and a morphism of δ-functors (ζai )i∈Z : (G Dai )i∈Z → (G Hai+1 )i∈Z such that ζai is an isomorphism for i > 0. Now the Five Lemma yields the claim.  (5) Proposition If Ker(ψ) is finite then (hiR/A,ψ )i∈Z : (G Hai (•)[ψ] )i∈Z → (H Hai[ψ] (•[ψ] ))i∈Z is an isomorphism. Proof. By (2) it suffices to show that hψ : G HomR (•, )[ψ] ֌ H HomR[ψ] (•[ψ] , [ψ] ) is an epimorphism. Let M and N be G-graded R-modules, and let f ∈ H HomR[ψ] (M[ψ] , N[ψ] ). By [7, A.I.2.10], there is a finite subset P S ⊆ H with f ((M[ψ] )h ) ⊆ l∈S (N[ψ] )h+l for h ∈ H. Finiteness of −1 Ker(ψ) implies that T := ψ (S) ⊆ G is finite. If g ∈ G then P f (Mg ) ⊆ f ((M[ψ] )ψ(g) ) ⊆ l∈S (N[ψ] )ψ(g)+l = P P P P l∈T (N[ψ] )ψ(g)+ψ(l) = l∈T k∈ψ−1 (ψ(g+l)) Nk = k∈T Ng+k , thus f ∈ G HomR (M, N), again by [7, A.I.2.10].  The hypothesis of (5) is fulfilled if G is of finite type and ψ is the projection onto G modulo its torsion subgroup. In this sense, local cohomology does not care about torsion in the group of degrees. (6) Proposition If an has a projective resolution with components of finite type for every n ∈ , then N (hiR/A,ψ )i∈Z : (G Hai (•)[ψ] )i∈Z → (H Hai[ψ] (•[ψ] ))i∈Z is an isomorphism. Proof. It suffices to show that hiψ (M, •) is an isomorphism for every i ∈ and every G-graded R-module M that has a projective resolution P with components of finite type. As hiψ (M, •) = H i (hψ (P, •)) for i ∈ , it suffices to show that hψ (M, N) is an isomorphism for every G-graded R-module M of finite type and every G-graded R-module N. In this situation, M[ψ] is of finite type, and hence Z Z h0 (M, N) : G HomR (M, N)[0] ֌ 0 HomR[0] (M[0] , N[0] ) and h0 (M[ψ] , N[ψ] ) : H HomR[ψ] (M[ψ] , N[ψ] )[0] ֌ 0 HomR[0] (M[0] , N[0] ) 6 FRED ROHRER are isomorphisms ([7, A.I.2.11]). It follows that (hψ (M, N))[0] : (G HomR (M, N)[ψ] )[0] ֌ (H HomR[ψ] (M[ψ] , N[ψ] ))[0] is an isomorphism, too, and since coarsening functors are conservative, this implies that hψ (M, N) is an isomorphism as desired.3  The hypothesis of (6) is fulfilled if R is coherent and a is of finite type, and thus in particular if R is Noetherian. Our third criterion makes use of the so-called ITI property. The G-graded ring R is said to have ITI with respect to a if the graded a-torsion submodule G Γa (I) of an injective G-graded R-module I is injective. This property, strictly weaker than graded Noetherianness, lies at the heart of many basic properties of local cohomology and thus is a very natural hypothesis. For more details and examples about ITI, we refer the reader to [8]. (7) Proposition If a has a finite set E of homogeneous generators such that R and R[ψ] have ITI with respect to hai for every a ∈ E, then (hiR/A,ψ )i∈Z : (G Hai (•)[ψ] )i∈Z → (H Hai[ψ] (•[ψ] ))i∈Z is an isomorphism. Proof. We choose a counting a = (ai )ni=1 of E and write (G H i (a, •))i∈Z for the G-graded Čech cohomology with respect to a. This exact δ-functor is obtained by taking homology of the G-graded Čech cocomplex, and since that cocomplex is obtained by taking direct sums of modules of fractions with homogeneous denominators, it commutes with coarsening. As G Ha0 (•) = G H 0(a, •) there is a unique morphism of δ-functors (gai )i∈Z : (G Hai (•))i∈Z → (G H i (a, •))i∈Z with ga0 = IdG Ha0 . So, it suffices to show that (gai )i∈Z is an isomorphism if R has ITI with respect to hai i for every i ∈ [1, n]. For this it suffices to show that G H i (a, •) is effaceable for i > 0. But this can be shown analogously to the ungraded case ([2, 5.1.19])4.  In [10], Schenzel characterised ideals a such that local cohomology with respect to a is isomorphic to Čech cohomology with respect to 3Using [5, 3.1; 3.4] one sees that this proof also applies if every power of a has a projective resolution with small components. But since a projective G-graded R-module is small if and only if it is of finite type ([1, II.1.2]), this yields no improvement. 4In loc. cit. one makes use only of the ITI property, but not of Noetherianness. COARSENING OF GRADED LOCAL COHOMOLOGY 7 a generating system of a. The above proof together with a graded analogue of Schenzel’s result yields a further coarsening criterion. We end this note with an example showing that graded local cohomology does not necessarily commute with coarsening. (8) Example Let K be a field, let R denote the algebra of the additive monoid ( ≥0 , +) of positive rational numbers over K, furnished with its canonical -graduation, and let {eα | α ∈ ≥0 } denote its canonical basis (as a K-vector space). We consider coarsening with respect to the zero morphism 0 : → 0. The graded ideal m := heα | α > 0iR of R is idempotent, of countable type, but not of finite type, and thus it is not small by [9, 2◦ ]. Hence, by [5, 3.4] there exists a -graded R-module N such that the canonical monomorphism Q Q Q Q Q Q HomR (m, N)[0] ֌ 0 HomR (m[0] , N[0] ) [0] is not an epimorphism. By idempotency of m it equals the canonical morphism Q Dm0 (N)[0] → 0 Dm0 [0] N[0] , and so the exact sequence 0 → Q Γm → IdGrModQ (R) → Q Dm0 → Q Hm1 → 0 together with the Snake Lemma shows that the canonical morphism Q H 1 (N)[0] → 0 H 1 (N[0] ) is a monomorphism, but not an epimorm m[0] phism. Acknowledgement. I am grateful to Markus Brodmann for his encouraging support during the writing of this article. I also thank the referee for his careful reading and the suggested improvements. References [1] H. Bass. Algebraic K-theory. W. A. Benjamin, New York, 1968. [2] M. P. Brodmann, R. Y. Sharp. Local cohomology: an algebraic introduction with geometric applications. Cambridge Stud. Adv. Math. 60, Cambridge University Press, Cambridge, 1998. [3] D. A. Cox. The homogeneous coordinate ring of a toric variety. J. Algebraic Geom. 4 (1995), 17–50. [4] J. L. Gómez Pardo, C. Nǎstǎsescu. Topological aspects of graded rings. Comm. Algebra 21 (1993), 4481–4493. [5] J. L. Gómez Pardo, G. Militaru, C. Nǎstǎsescu. When is HOMR (M, −) equal to HomR (M, −) in the category R-gr? Comm. Algebra 22 (1994), 3171–3181. [6] A. Grothendieck. Sur quelques points d’algèbre homologique. Tohoku Math. J. (2) 9 (1957), 119–221. [7] C. Nǎstǎsescu, F. van Oystaeyen. Graded ring theory. North-Holland Math. Library 28, North-Holland Publishing Co., Amsterdam, 1982. [8] P. H. Quy, F. Rohrer. Bad behaviour of injective modules. Preprint (2011). 8 FRED ROHRER [9] R. Rentschler. Sur les modules M tels que Hom(M, −) commute avec les sommes directes. C. R. Acad. Sc. Paris 268 (1969), 930–933. [10] P. Schenzel. Proregular sequences, local cohomology, and completion. Math. Scand. 92 (2003), 161–180. Universität Tübingen, Fachbereich Mathematik, Auf der Morgenstelle 10, 72076 Tübingen, Germany E-mail address: [email protected]
0math.AC
Rewriting Logic Semantics of a Plan Execution Language ∗ Gilles Dowek César Muñoz École polytechnique and INRIA LIX, École polytechnique 91128 Palaiseau Cedex, France [email protected] NASA Langley Research Center MS. 130, Hampton, VA 23681, USA [email protected] Camilo Rocha Department of Computer Science University of Illinois at Urbana-Champaign 201 Goodwin Ave, Urbana, IL 61801, USA [email protected] The Plan Execution Interchange Language (PLEXIL) is a synchronous language developed by NASA to support autonomous spacecraft operations. In this paper, we propose a rewriting logic semantics of PLEXIL in Maude, a high-performance logical engine. The rewriting logic semantics is by itself a formal interpreter of the language and can be used as a semantic benchmark for the implementation of PLEXIL executives. The implementation in Maude has the additional benefit of making available to PLEXIL designers and developers all the formal analysis and verification tools provided by Maude. The formalization of the PLEXIL semantics in rewriting logic poses an interesting challenge due to the synchronous nature of the language and the prioritized rules defining its semantics. To overcome this difficulty, we propose a general procedure for simulating synchronous set relations in rewriting logic that is sound and, for deterministic relations, complete. We also report on two issues at the design level of the original PLEXIL semantics that were identified with the help of the executable specification in Maude. 1 Introduction Synchronous languages were introduced in the 1980s to program reactive systems, i.e., systems whose behavior is determined by their continuous reaction to the environment where they are deployed. Synchronous languages are often used to program embedded applications and automatic control software. The family of synchronous languages is characterized by the synchronous hypothesis, which states that a reactive system is arbitrarily fast and able to react immediately in no time to stimuli from the external environment. One of the main consequences of the synchronous hypothesis is that components running in parallel are perfectly synchronized and cannot arbitrarily interleave. The implementation of a synchronous language usually requires the simulation of the synchronous semantics into an asynchronous computation model. This simulation must ensure the validity of the synchronous hypothesis in the target asynchronous model. The Plan Execution Interchange Language (PLEXIL) [9] is a synchronous language developed by NASA to support autonomous spacecraft operations. Space mission operations require flexible, efficient and reliable plan execution. The computer system on board the spacecraft that executes plans is called the executive and it is a safety-critical component of the space mission. The Universal Executive (UE) [20] ∗ Authors in alphabetical order. B. Klin, P. Sobociński (Eds.): 6th Workshop on Structural Operational Semantics (SOS’09) EPTCS 18, 2010, pp. 77–91, doi:10.4204/EPTCS.18.6 c G. Dowek & C. Muñoz & C. Rocha This work is licensed under the Creative Commons Attribution License. 78 Rewriting Logic Semantics of a Plan Execution Language is an open source PLEXIL executive developed by NASA1 . PLEXIL and the UE have been used on midsize applications such as robotic rovers and a prototype of a Mars drill, and to demonstrate automation for the International Space Station. Given the critical nature of spacecraft operations, PLEXIL’s operational semantics has been formally defined [8] and several properties of the language, such as determinism and compositionality, have been mechanically verified [7] in the Prototype Verification System (PVS) [13]. The formal small-step semantics is defined using a compositional layer of five reduction relations on sets of nodes. These nodes are the building blocks of a PLEXIL plan and represent the hierarchical decomposition of tasks. The atomic relation describes the execution of an individual node in terms of state transitions triggered by changes in the environment. The micro relation describes the synchronous reduction of the atomic relation with respect to the maximal redexes strategy, i.e., the synchronous application of the atomic relation to the maximal set of nodes of a plan. The remaining three relations are the quiescence relation, the macro relation and the execution relation which describe the reduction of the micro relation until normalization, the interaction of a plan with the external environment, and the n-iteration of the macro relation corresponding to n time-steps, respectively. From an operational point of view, PLEXIL is more complex than general purpose synchronous languages such as Esterel [2] or Lustre [4]. PLEXIL is designed specifically for flexible and reliable command execution in autonomy applications. In this paper, we propose a rewriting logic semantics of PLEXIL in Maude [5] that complements the small-step structural operational semantics written in PVS. In contrast to the PVS higher-order logic specification, the rewriting logic semantics of PLEXIL is executable and it is by itself an interpreter of the language. This interpreter is intended to be a semantic benchmark for validating the implementation of PLEXIL executives such as the Universal Executive and a testbed for designers of the language to study new features or possible variants of the language. Additionally, by using a graphical interface [15], PLEXIL developers will be able to exploit the formal analysis tools provided by Maude to verify properties of actual plans. Rewriting logic is a logic of concurrent change in which a wide range of models of computation and logics can be faithfully represented. The rewriting semantics of a synchronous language such as PLEXIL poses interesting practical challenges because Maude implements the maximal concurrency of rewrite rules by interleaving concurrency. That is, although rewriting logic allows for concurrent synchronous specifications at the mathematical level, Maude executes the rewrite rules by interleaving concurrency. To overcome this situation, we develop a serialization procedure that allows for the simulation of a synchronous relation via set rewriting systems. This procedure is presented in a library of abstract set relations that we have written in PVS. The procedure is sound and complete for the synchronous closure of any deterministic relation under the maximal redexes strategy. We are collaborating with the PLEXIL development team at NASA Ames by using the rewriting logic semantics of PLEXIL to validate the intended semantics of the language against a wide variety of plan examples. We report on two issues of PLEXIL’s original semantics that were discovered with the help of the rewriting logic semantics of PLEXIL presented in this paper: the first was found at the level of the atomic relation for which undesired interleaving semantics were introduced in some computations, and the second was found at the level of the micro relation for which spurious infinite loops were present in some computations. Solutions to both issues were provided by the authors, and have been adopted in the latest version of the PLEXIL semantics. Summarizing, the contributions presented in this paper are: • The rewriting logic specification of the PLEXIL semantics. 1 http://plexil.sourceforge.net. G. Dowek & C. Muñoz & C. Rocha 79 • A library of abstract set relations suitable for the definition and verification of synchronous relations. • A serialization procedure for the simulation of synchronous relations by rewriting, and an equational version of it in rewriting logic for deterministic synchronous relations. • The findings on two issues in the design of the original PLEXIL semantics, and the corresponding solutions that were adopted in an updated version of the language semantics. Outline of the paper. Background on rewriting logic, and the connection between this logic and Structural Operational Semantics are summarized in Section 2. In Section 3 we present the library of set relations, including the soundness and completeness proof of the serialization procedure. Section 4 describes the rewriting logic semantics of PLEXIL. In Section 5 we discuss preliminary results. Related work and concluding remarks are presented in Section 6. 2 Rewriting Logic and Structural Operational Semantics Rewriting logic [11] is a general semantic framework that unifies in a natural way a wide range of models of concurrency. Language specifications can be executed in Maude, a high-performance rewriting logic implementation, and benefit from a wide set of formal analysis tools available to it, such as Maude’s LTL Model Checker. A rewriting logic specification or theory is a tuple R = (Σ, E ∪ A, R) where: • (Σ, E ∪ A) is a membership equational logic theory with Σ a signature having a set of kinds, a family of sets of operators, and a family of disjoint sets of sorts; E a set of Σ-sentences, which are universally quantified Horn clauses with atoms that are equations (t = t 0 ) and memberships (t : s), with t,t 0 terms and s a sort; A a set of “structural” axioms (typically associativity and/or commutativity and/or identity) such that there exists a matching algorithm modulo A producing a finite number of A-matching substitutions; and • R a set of universally quantified conditional rewrite rules of the form (∀X) r : t −→ t 0 if ^ i ui = u0i ∧ ^ j vj : sj ∧ ^ wl −→ w0l l where X is a set of sorted variables, r is a label, t,t 0 , ui , u0i , v j , wl and w0l are terms with variables among those in X, and s j are sorts. Intuitively, R specifies a concurrent system, whose states are elements of the initial algebra TΣ/E∪A specified by the theory (Σ, E ∪ A) and whose concurrent transitions are specified by the rules R. Concurrent transitions are deduced according to the set of inference rules of rewriting logic, which are described in detail in [3] (together with a precise account of the more general forms of rewrite theories and their models). Using these inference rules, a rewrite theory R proves a statement of the form (∀X) t −→ t 0 , written as R ` (∀X) t −→ t 0 , meaning that, in R, the state term t can transition to the state term t 0 in a finite number of steps. A detailed discussion of rewriting logic as a unified model of concurrency and its inference system can be found in [11]. We have a one-step rewrite [t]E∪A −→R [t 0 ]E∪A in R iff we can find a term u ∈ [t]E∪A such that u can be rewritten to v using some rule r : a −→ b if C ∈ R in the standard way (see [6]), denoted u −→R v, and we furthermore have v ∈ [t 0 ]E∪A . For arbitrary E and R, whether [t]E∪A −→R [t 0 ]E∪A holds is in 80 Rewriting Logic Semantics of a Plan Execution Language general undecidable, even when the equations in E are confluent and terminating modulo A. Therefore, the most useful rewrite theories satisfy additional executability conditions under which we can reduce the relation [t]E∪A −→R [t 0 ]E∪A to simpler forms of rewriting just modulo A, where both equality modulo A and matching modulo A are decidable. The first condition is that E should be terminating and ground confluent modulo A [6]. This means that in the rewrite theory RE/A = (Σ, A, E), (i) all rewrite sequences terminate, that is, there are no infinite sequences of the form [t1 ]A −→RE/A [t2 ]A · · · [tn ]A −→RE/A [tn+1 ]A · · · , and (ii) for each [t]A ∈ TΣ/A there is a unique A-equivalence class [canE/A (t)]A ∈ TΣ/A called the E-canonical form of [t]A modulo A such that there exists a terminating sequence of zero, one, or more steps [t]A −→∗RE/A [canE/A (t)]A . The second condition is that the rules R should be coherent [21] relative to the equations E modulo A. This precisely means that, if we decompose the rewrite theory R = (Σ, E ∪ A, R) into the simpler theories RE/A = (Σ, A, E) and RR/A = (Σ, A, R), which have decidable rewrite relations −→RE/A and −→RR/A because of the assumptions of A, then for each A-equivalence class [t]A such that [t]A −→RR/A [t 0 ]A we can always find a corresponding rewrite [canE/A (t)]A −→RR/A [t 00 ]A such that [canE/A (t 0 )]A = [canE/A (t 00 )]A . Intuitively, coherence means that we can always adopt the strategy of first simplifying a term to canonical form with E modulo A, and then apply a rule with R modulo A to achieve the effect of rewriting with R modulo E ∪ A. The conceptual distinction between equations and rules has important consequences when giving the rewriting logic semantics of a language L as a rewrite theory RL = (ΣL , EL ∪ AL , RL ). Rewriting logic’s abstraction dial [12] captures precisely this conceptual distinction. One of the key features of Structural Operational Semantics is that it provides a step-by-step formal description of a language’s evaluation mechanisms [14]. Setting the level of abstraction in which the interleaving behavior of the evaluations in L is observable, corresponds to the special case in which the dial is turned down to its minimum position by having EL ∪ AL = 0. / The abstraction dial can also be turned up to its maximal position as the special case in which RL = 0, / thus obtaining an equational semantics of the language. In general, we can make a specification as abstract as we want by identifying a subset R0L ⊆ RL such that the rewrite theory (ΣL , (EL ∪ R0L ) ∪ AL , RL \ R0L ) satisfies the executability conditions aforementioned. We refer the reader to [12, 16, 19] for an in-depth presentation of the relationship between structural operational semantics and rewriting logic semantics, and the use of equations and rules to capture in rewriting logic the dynamic behavior of language semantics. The conceptual distinction between equations and rules also has important practical consequences for program analysis, because it affords massive state space reduction which can make formal analyses such as breadth-first search and model checking enormously more efficient. Because of state-space explosion, such analyses could easily become infeasible if we were to use a specification in which all computation steps are described with rules. 3 A Rewriting Library for Synchronous Relations When designing a programming language, it is useful to be able to define its semantic relation, to formally prove properties of this relation and to execute it on particular programs. However, defining such a semantic relation and formally reasoning about it is generally difficult, time consuming, and error-prone. This would be a major endeavor if it had to be done from scratch for each language. Moreover, since programming languages tend to evolve constantly, tools must allow reusing parts of former developments to support rapid yet correct prototyping. Fortunately, small-step operational semantic relations are, in general, built from simple relations with G. Dowek & C. Muñoz & C. Rocha 81 a limited number of operations, such as reflexive-transitive extension, reduction to normal form, parallel extension, etc. As a minimum, the framework should include a library containing the definitions of these operations and formal proofs of their properties. This will considerably reduce the amount of work needed to define the semantic relation of particular programming languages and to formally prove their properties. Defining the semantic relation of synchronous languages requires defining the synchronous extension of an atomic execution relation, an operation that has been much less studied formally than other relation operations such as the reflexive-transitive extension or the parallel extension. We present in this section a first attempt to design a framework for rapid yet correct prototyping of semantic relations, in particular of synchronous languages. This framework allows one to define semantic relations, to execute them on particular programs and to formally prove some of their properties using general theorems about the operations that permit to build relations from relations. We have been experimenting with this framework using various versions of the PLEXIL language (see Section 4). The definitions and properties presented in Section 3.1 have been developed in PVS. The Maude engine is used for executing the semantic relations on particular programs. The full development of the framework, including the formal semantics of PLEXIL, is available from http://research.nianet. org/fm-at-nia/PLEXIL. 3.1 Set Relations and Determinism Let → be a binary relation on a set T . We say that a ∈ T is a redex if there exists a0 ∈ T such that a → a0 , and that it is a normal form otherwise. We denote by →0 , →n , and →∗ , the identity relation, n-fold composition, and reflexive-transitive closure of →, respectively. In addition to the above relations, we also define the normalized reduction relation →↓ of →. Normalized reduction a→↓ a0 if and only if a→∗ a0 and a0 is a normal form. Henceforth, we assume that the relation → is defined on sets over an abstract type T , i.e., → ⊆ 2 P(T ) × P(T ). We define the asynchronous extension of →, denoted →, as the congruence closure of || → and the parallel extension of →, denoted →, as the parallel closure of →. 2 Asynchronous extension a → a0 if and only if there exist sets b and b0 such that b ⊆ a, b 6= ∅, b → b0 and a0 = (a \ b) ∪ b0 . || Parallel extension a → a0 if and only if there exist b1 , . . . , bn , nonempty, pairwise disjoint subsets of a, S S and sets b01 , . . . , b0n such that bi → b0i and a0 = (a \ i bi ) ∪ i b0i . The definition of a synchronous reduction requires the definition of a strategy that selects the redexes to be synchronously reduced. Strategy A strategy is a function mapping elements a ∈ P(T ) into b1 , . . . , bn , nonempty, pairwise disjoint subsets of a such that all bi are redexes for →. s Synchronous extension Let s be a strategy, a → a0 if and only if there exist b01 , . . . , b0n such that s(a) = S S {b1 , . . . , bn }, bi → b0i and a0 = (a \ i bi ) ∪ i b0i . A natural way of defining strategies is via priorities. A priority is a function p that maps elements a ∈ P(T ) into natural numbers. 82 Rewriting Logic Semantics of a Plan Execution Language Maximal redex Let a ∈ P(T ) and let p be a priority function. A nonempty subset b of a is said to be a maximal redex of a if it is a redex, and for all nonempty subsets c of a such that c is a redex, c 6= b and c ∩ b 6= ∅, we have p(b) > p(c). By construction, the set of maximal redexes of a set are pairwise disjoint. The maximal redexes strategy is the function that, given a priority function, maps elements a ∈ P(T ) into the set of its maximal redexes. In addition to the definition of the relation operators presented here, our library includes formal proofs of properties related to determinism and compositionality for abstract set relations. In this paper, we will focus on determinism as this property is fundamental to the specification of synchronous relations in rewriting logic. Determinism A binary relation → defined on a set T is said to be deterministic if for all a, a0 and a00 in T , a → a0 and a → a00 implies a0 = a00 . Determinism is a stronger property than confluence, i.e., a deterministic relation is also confluent, but a confluent relation is not necessarily deterministic. s Proposition 3.1 (Determinism of →n , →↓ and →). If the relation → is deterministic, then so are the s relations →n , →↓ , and →. 2 In contrast, even if the relation → is deterministic, the relations →∗ , → and →k are not always deterministic. 3.2 Executing Semantic Relations Executing the semantic relation of a programming language is desirable during the design phase of the language. In particular, it allows the designer of the features to experiment with different semantic variants of the language before implementing them. Rewrite systems are a computational way of defining binary relations. Since our formalism is based on set relations, we consider rewrite systems on an algebra of terms of type T modulo associativity, commutativity, identity, and idempotence: the basic axioms for the union of sets. We denote the equality on terms of this algebra by =ACUI . The relation → defined by a rewrite system R is defined as follows. Relation defined by a rewrite system a → b if and only if there exists a rewrite rule l −→ r in R and a substitution σ such that a =ACUI σ l and b =ACUI σ r. We remark that the previous definition uses the substitution closure of the rewrite system, rather than the more traditional definition based on the congruence closure. For example, if we consider the rewrite system A(x) −→ B(x), we have that A(0) → B(0) and A(1) → B(1). On the other hand, A(0), A(1) is not a redex for →. The synchronous extension of a relation → challenges the standard asynchronous interpretation of rewrite systems. Consider again the previous example. The asynchronous extension of → defined in Sec2 2 tion 3.1, which indeed encodes the congruence closure, relates A(0), A(1) → B(0), A(1) and A(0), A(1) → A(0), B(1). However, it does not relate A(0), A(1) to B(0), B(1), which corresponds to the parallel reduc2 2 tion of both A(0) and A(1). In this particular case, we have that A(0), A(1) → B(0), A(1) → B(0), B(1). s 2∗ We remark that if a → b, for a strategy s, then a→ b. However, in order to select the redexes to be reduced, we need additional machinery. In particular, we need to keep a log book of redexes that G. Dowek & C. Muñoz & C. Rocha 83 need to be reduced and redexes that have been already reduced. We propose the following procedure to implement in an asynchronous rewrite engine, such as Maude, the synchronous extension of a relation for a strategy. Serialization procedure Let → be a relation and s a strategy. Given a term a ∈ P(T ), we compute a term b as follows. 1. Reduce the pair h s(a) ; ∅i to a normal form h∅ ; a0 i using the following rewrite system: S hai , c ; di −→ hc ; a0i , di, where ai → a0i . 2. The term b is defined as (a \ s(a)) ∪ a0 . S Since a strategy is a set of redexes, and this set is finite, the procedure is well-defined, i.e., it always terminates and returns a term. However, the procedure is not necessarily deterministic. In our previous example, we want to apply the procedure to A(0), A(1), B(1) using the maximal redexes strategy max p (assuming that all terms have the same priority). Since max p ({A(0), A(1), B(1)}) = {A(0), A(1)}, we have to reduce the pair hA(0), A(1) ; ∅i to its normal form h∅ ; B(0), B(1)i. Then, we compute {A(0), A(1), B(1)} \ {A(0), A(1)} ∪ {B(0), B(1)}, which is equal to B(0), B(1). We check s that A(0), A(1), B(1) → B(0), B(1). Theorem 3.2 (Correctness of serialization procedure). The serialization procedure is sound, i.e., if the s procedure returns b from a, then a → b. Furthermore, if → is deterministic, the procedure is complete, s i.e., if a → b then the procedure returns b from a. Proof. Soundness Assume that the procedure returns b = a \ s(a) ∪ a0 from a. We have to prove that s a → b. Let s(a) = {a1 , . . . , an }, where ai ⊆ a, for 1 ≤ i ≤ n. From the definition of a strategy, the elements in s(a) are pairwise disjoint. Then, from the procedure, a0 = a01 , . . . , a0n , where ai → a0i , for 1 ≤ i ≤ n. Let c ⊆ a be such that none of the subsets of c is in s(a). Then, a has the form a = s s a1 , . . . , an , c. Hence, b = a01 , . . . , a0n , c. By definition of →, we have that a1 , . . . , an , c → a01 , . . . , a0n , c. S s Completeness In this case, it suffices to note that by Proposition 3.1, if → is deterministic, then → is S deterministic. Therefore, the normal form of h s(a) ; ∅i is unique and the procedure returns a S s unique b = a \ s(a) ∪ a0 . This b is the only term that is related to a in the relation →. 4 Rewriting Logic Semantics of PLEXIL The framework presented in Section 3 is abstract with respect to the elements in the set T and the basic set relation →. If we consider that T is a set of PLEXIL nodes and → is PLEXIL’s atomic relation, we can deduce by Proposition 3.1 that, since PLEXIL’s atomic relation is deterministic [7] , PLEXIL’s micro and quiescence relations are deterministic as well. Therefore, we can use the serialization procedure presented in Section 3.2 to implement a sound and complete formal interpreter of PLEXIL in Maude. In this section, we describe in detail the specification of such an interpreter. We only discuss the atomic and micro relations since they are the most interesting ones for validating the synchronous semantics of PLEXIL. More precisely, we present the rewrite theory RPXL = (ΣPXL , EPXL ∪ APXL , RPXL ), specifying the rewriting logic semantics for PLEXIL’s atomic and micro relations. We use the determinism property of PLEXIL’s atomic relation to encode it as the computation rules in EPXL because 84 Rewriting Logic Semantics of a Plan Execution Language it yields a confluent equational specification. Consequently, the serialization procedure for PLEXIL’s synchronous semantics into rewriting logic can be defined equationally, thus avoiding the interleaving semantics associated with rewrite rules in Maude. Of course, due to the determinism property of the language, one can as well turn up the “abstraction dial” to its maximum by making the rewrite rules RPXL into computational rules. This will result in a faster interpreter, for example. Nevertheless, we are interested in PLEXIL semantics at the observable level of the micro relation. Therefore, in the rewrite theory RPXL : (i) the equational theory (ΣPXL , EPXL ∪ APXL ) defines the semantics of the atomic relation and specifies the serialization procedure for the synchronous semantics of PLEXIL, and (ii) the rewrite rules RPXL define the semantics of the micro relation. In this section we assume the reader is familiar with the syntax of Maude [5], which is very close to standard mathematical notation. 4.1 PLEXIL Syntax A PLEXIL plan is a tree of nodes representing a hierarchical decomposition of tasks. The interior nodes in a plan provide the control structure and the leaf nodes represent primitive actions. The purpose of each node determines its type: List nodes group other nodes and provide scope for local variables, Assignment nodes assign values to variables (they also have a priority, which serves to solve race conditions between assignment nodes), Command nodes represent calls to commands, and Empty nodes do nothing. Each PLEXIL node has gate conditions and check conditions. The former specify when the node should start executing, when it should finish executing, when it should be repeated, and when it should be skipped. Check conditions specify flags to detect when node execution fails due to violations of pre-conditions, post-conditions, or invariants. Declared variables in nodes have lexical scope, that is, they are accessible to the node and all its descendants, but not siblings or ancestors. The execution status of a node is given by status such as Inactive, Waiting, Executing, etc. The execution state of a plan consists of (i) the external state corresponding to a set of environment variables accessed through lookups on environment variables, and (ii) the internal state which is a set of nodes and (declared) variables. Figure 1 illustrates with a simple example the standard syntax of PLEXIL. In this particular example, the plan tasks are represented by the root node SafeDrive, the interior node Loop, and the leaf nodes OneMeter, TakePic and Counter. OneMeter and TakePic are, for example, nodes of type Command. The node Counter has two different conditions: Start is a gate condition constraining the execution of the assignment to start only when the node TakePic is in state Finished, while Pre is a check condition for the number of pictures to be less than 10. The internal state of the plan at a particular moment is represented by the set of all nodes of the plan, plus the value of the variable pictures, while the external state of the plan contains the (external) variable WheelStuck. The external state of a plan is defined in the functional module EXTERNAL-STATE-SYNTAX. The sort ExternalState represents sets of elements of sort Pair, each of the form (name, value); we assume that the sorts Name and Value, specifying names and values, respectively, have been defined previously in the functional modules NAME and VALUE, respectively. fmod EXTERNAL-STATE-SYNTAX is protecting Name . protecting Value . sort Pair . op (_,_) : Name Value -> Pair . sort ExternalState . subsort Pair < ExternalState . op mtstate : -> ExternalState . op _,_ : ExternalState ExternalState -> ExternalState [assoc comm id: mtstate] . eq ES:ExternalState , ES:ExternalState = ES:ExternalState . endfm G. Dowek & C. Muñoz & C. Rocha 85 List SafeDrive { int pictures = 0; End: LookupOnChange(WheelStuck) == true OR pictures == 10; List Loop { Repeat-while: LookupOnChange(WheelStuck) == false; Command OneMeter { Command: Drive(1); } Command TakePic { Start: OneMeter.status == FINISHED AND pictures < 10; Command: TakePicture(); } Assignment Counter { Start: TakePic.status == FINISHED; Pre: pictures < 10; Assignment: pictures := pictures + 1; } } } Figure 1: SafeDrive: A PLEXIL Plan Example The internal state of a plan is represented with the help of Maude’s built-in CONF module supporting object based programming. The internal state has the structure of a set made up of objects and messages, called configurations in Maude, where the objects represent the nodes and (declared) variables of a plan. Therefore, we can view the infrastructure of the internal state as a configuration built up by a binary set union operator with empty syntax, i.e., juxtaposition, as : Configuration × Configuration −→ Configuration. The operator is declared to satisfy the structural laws of associativity and commutativity and to have identity mtconf. Objects and messages are singleton set configurations and belong to subsorts Object, Msg < Configuration, so that more complex configurations are generated out of them by set union. An object, representing a node or a (declared) variable, in a given configuration is represented as a term hO : C | a1 : v1 , . . . , an : vn i, where O is the object’s name or identifier (of sort Oid), C is its class (of sort Cid), the ai ’s are the names of the object’s attribute identifiers, and the vi ’s are the corresponding values. The set of all the attribute-value pairs of an object state (of sort Attribute) is formed by repeated application of the binary union operator , which also obeys structural laws of associativity, commutativity, and identity, i.e., the order of the attribute-value pairs of an object is immaterial. The internal state of a plan is defined in the functional module INTERNAL-STATE-SYNTAX by extending the sort Configuration; the sorts Exp and Qualified, which we assume to be defined, are used to specify expressions and qualified names, respectively. fmod INTERNAL-STATE-SYNTAX is extending CONFIGURATION . protecting EXP . protecting QUALIFIED . subsort Qualified < Oid . --- Qualified elements are object identifiers ops List Command Assignment Empty : -> Cid . --- Types of nodes sort Status . ops Inactive Waiting Executing Finishing Failing Finished IterationEnded Variable : -> ExecState . sort Outcome . ops None Success Failure : -> Outcome . op status: : Status -> Attribute . --- Status of execution op outcome: : Outcome -> Attribute . --- Outcome of execution ops start: skip: repeat: end: : Exp -> Attribute . --- Gate conditions 86 ops op op ops ... endfm Rewriting Logic Semantics of a Plan Execution Language pre: post: inv: : Exp -> Attribute . --- Check conditions command: : Exp -> Attribute . --- Command of a command node assignment: : Exp -> Attribute . --- Assignment of an assignment node initval actval: Exp -> Attribute . --- Initial and actual values of a variable node Using the infrastructure in INTERNAL-STATE-SYNTAX, the internal state of SafeDrive in Figure 1, is represented by the configuration in Figure 2. Observe that the sort Qualified provides qualified names by means of the operator . : Qualified × Qualified −→ Qualified, which we use to maintain the hierarchical structure of the plans. The dots at the end of each object represent the object’s attributes that are not explicitly defined by the plan but that are always present in each node such as the status or the outcome. There is a “compilation procedure” from PLEXIL plans to their corresponding representation in Maude, that we do not discuss in this paper, which includes all implicit elements of a node as attributes of the object representation of the node. < < < < SafeDrive : List | end: LookupOnChange(WheelStuck) == true OR pictures == 10, ... > Loop . SafeDrive : List | repeat: LookupOnChange(WheelStuck) == false , ... > OneMetter . Loop . SafeDrive : Command | command: Drive(1), ... > TakePic . Loop . SafeDrive : Command | start: OneMeter.Status == Finished and pictures < 10, command: TakePicture(), ... > < Counter . Loop . SafeDrive : Assignment | pre: pictures < 10, assignment: pictures := pictures + 1, ... > < pictures . SafeDrive : Memory | initval: 0, actval: 0 > Figure 2: SafeDrive in RPXL We are now ready to define the sort State representing the execution state of the plans in the functional module STATE-SYNTAX, by importing the syntax of external and internal states: fmod STATE-SYNTAX is pr EXTERNAL-STATE-SYNTAX . pr INTERNAL-STATE-SYNTAX . sort State . op _|-_ : ExternalState Configuration -> State . endfm We adopt the syntax Γ ` π to represent the execution state of the plans, where Γ and π are the external and internal states, respectively. 4.2 PLEXIL Semantics PLEXIL execution is driven by external events. The set of events includes events related to lookup in conditions, e.g., changes in the value of an external state that affects a gate condition, acknowledgments that a command has been initialized, reception of a value returned by a command, etc. We focus on the execution semantics of PLEXIL specified in terms of node states and transitions between node states that are triggered by condition changes (atomic relation) and its synchronous closure under the maximal redexes strategy (micro relation). PLEXIL’s atomic relation consists of 42 rules, indexed by the type and the execution status of nodes into a dozen groups. Each group associates a priority to its set of rules which defines a linear order on the set of rules. The atomic relation is defined by (Γ, π) ` P −→a P0 , where P ⊆ π. For instance, the four atomic rules corresponding to the transitions from Executing for nodes of type Assignment are depicted in G. Dowek & C. Muñoz & C. Rocha 87 Figure 3. Rule r3 updates the status and the outcome of node A to the values IterationEnded and Success, respectively, and the variable x to the value v, i.e., the value of the expression e in the state π, whenever the expressions associated with the gate condition End and the check condition Post of node A both evaluate to true in π. In rule r1 , AncInv(A) is a predicate, parametric in the name of nodes, stating that none of the ancestors of A has changed the value associated with its invariant condition to false. The value ⊥ represents the special value “Unknown”. We use (Γ, π) ` e ; v to denote that expression e evaluates to value v in state Γ ` π; by abuse of notation, we write (Γ, π) ` e 6; v to denote that expression e does not evaluate to value v in (Γ, π). (Γ, π) ` AncInv(A) ; false A.body = x := e A.type = Assignment A.status = Executing r1 (Γ, π) ` Node A −→a Node A with [status = Finished , outcome = Failure , x = ⊥] (Γ, π) ` A.Invariant ; false A.body = x := e A.type = Assignment A.status = Executing r2 (Γ, π) ` Node A −→a Node A with [status = IterationEnded , outcome = Failure , x = ⊥] (Γ, π) ` A.End ; true A.body = x := e (Γ, π) ` A.Post ; true (Γ, π) ` e ; v A.type = Assignment A.status = Executing r3 (Γ, π) ` Node A −→a Node A with [status = IterationEnded , outcome = Success , x = v] (Γ, π) ` A.End ; true (Γ, π) ` A.Post 6; true A.type = Assignment A.status = Executing r4 (Γ, π) ` Node A −→a Node A with [status = IterationEnded , outcome = Failure] {r4 < r3 < r2 < r1 } Figure 3: Atomic rules corresponding to the transitions from Executing for nodes of type Assignment The relation r < s between the labels of two different rules specifies that the rule r is only applied when the second rule s cannot be applied. That is, the binary relation on rules defines the order of their application when deriving atomic transitions. So, a rule r can be used to derive an atomic transition if all its premises are valid and no rule higher than r (in its group) is applicable. In the case of PLEXIL’s atomic relation, the binary relation < on rules is a linear ordering. This linearity is key to the determinism of PLEXIL (see [8]). The micro relation Γ ` π −→m π 0 , the synchronous closure of the atomic relation under the maximal redexes strategy, is defined as: (Γ, π) ` P1 −→a P10 ... (Γ, π) ` Pn −→a Pn0 Γ ` π −→m (π \ [ 1≤i≤n Pi ) ∪ [ Pi0 M ICRO 1≤i≤n where Mπ = {P1 , . . . , Pn } is the set of nodes and variables in π that are affected by the micro relation. If two different processes in π, say A and B, write to the same variable, only the update of the process with higher priority is considered (assignment nodes have an associated priority always), e.g., A if A.priority > B.priority, B if B.priority > A.priority, and none otherwise. 88 Rewriting Logic Semantics of a Plan Execution Language In order to specify the PLEXIL semantics in Maude, we first define the infrastructure for the serialization procedure in the functional module SERIALIZATION-INFRASTRUCTURE. fmod SERIALIZATION-INFRASTRUCTURE is inc STATE-SYNTAX . ... op [_:_|_] : Oid Cid AttributeSet -> Object . --- New syntactic sugar for objects op updateStatus : Qualified Status -> Msg . --- Update status message op updateOutcome : Qualified Outcome -> Msg . --- Update outcome message op updateVariable : Qualified Value -> Msg . --- Update variable message ... ops applyUpdates unprime : State -> State . --- Application of updates and ‘unpriming’ var Γ : ExternalState . var π : InternalState . var A : Oid . var C : Cid . var Att : AttributeSet . vars S S’ : Status . var St : State . eq applyUpdates( Γ ` [ A : C | status: S , Att ] updateStatus(A , S’) π ) = applyUpdates( Γ ` [ A : C | status: S’ , Att ] π ) . ... eq applyUpdates(St) = St [owise] . eq unprime( Γ ` [ A : C | Att ] π ) = unprime( Γ ` < A : C | Att > π ) . eq unprime(St) = St [owise] . endfm Following the idea of the serialization procedure, we distinguish between unprimed and primed redexes by using syntactic sugar for denoting objects in the Maude specification: unprimed redexes are identified with the already defined syntax for objects in the form of hO : C | ...i and primed redexes are identified with the new syntax for objects in the form of [O : C | ...]. We use messages, i.e., elements in the sort Msg, to denote the update actions associated with the reduction rules for the atomic relation; we accumulate these messages in the internal state of the execution state of the plans, i.e., we also use the internal state in the spirit of the log book of the serialization procedure. For example, the configuration updateStatus(A,IterationEnded) updateOutcome(A,Success) updateVariable(x,v) corresponds to the update actions in the conclusion of rule r3 in Figure 3. The functions applyUpdates and unprimes apply all the collected updates in the internal state, and “unprimes” the “primed” nodes, respectively. In the specification above, it is shown how the status of a node is updated and how primed nodes become unprimed. We give the equational serialization procedure in the general setting in which we consider a linear ordering on the rules. Equational serialization procedure (with priorities) Let {ri : (Γ, π) ` Node A −→a Node A with [updatesi ] i f Ci }1≤i≤n be the collection of atomic rules (in horizontal notation) defining the transition relation for nodes of type T in status S, with rn < · · · < ri < · · · < r1 , where updatesi is the set of update actions (the order in the update actions is irrelevant) in the conclusion of ri and Ci is the set of premises of ri . The equational serialization procedure is given by the following set of equations, in Maude notation, defining the function symbol, say, r: var var op eq = eq Γ : ExternalState . var A : Oid . var S : Status . π : Configuration . var T : Cid . var Attr : AttributeSet . r : State -> State . r( Γ ` < A : T | status: S , Attr > π ) if C1 == true then r( Γ ` [ A : T | status: S , Attr ] messages(updates1 ) π ) else if C2 == true ... else if Cn == true then r( Γ ` [ A : T | status: S , Attr ] messages(updatesn ) π ) else r( Γ ` [ A : T | status: S , Attr ] π ) fi fi ... fi . r( Γ ` π ) = Γ ` π [owise] . G. Dowek & C. Muñoz & C. Rocha 89 where messages(updadatesi ) represents the message configuration associated with the update actions in the conclusion of rule ri . The equational serialization procedure defines a fresh function symbol, say, r : State −→ State. The first equation for r tries to apply the atomic rules in the given order, by first evaluating the condition and then marking the affected node. If the condition evaluates to true, then update messages are generated. The second equation, removes the function symbol r when there aren’t any more possible atomic reductions with the rules {ri }. The atomic relation is defined in the functional module ATOMIC-RELATION by instantiating the equational serialization procedure for each one of the twelve groups of atomic rules with a different function symbol for each one. Finally, the micro relation is defined by the rule micro in the system module PLEXIL-RLS, which materializes the rewrite theory RPXL in Maude: mod PLEXIL-RLS is pr ATOMIC-RELATION . pr SERIALIZATION-INFRASTRUCTURE . rl [micro] : Γ ` π => Γ ` unprime(applyUpdates(a1 (...a12 ( Γ ` π )...))) . endm where a1 , . . . , a12 are the function symbols in ATOMIC-RELATION defining the serialization procedure for each one of the twelve groups of rules. 5 Preliminary Results We have used RPXL to validate the semantics of PLEXIL against a wide variety of plan examples. We report on the following two issues of the original PLEXIL semantics that were discovered with the help of RPXL : 1. Non-atomicity of the atomic relation. A prior version of the atomic rules r3 and r4 for Assignment nodes in state Executing, presented in Figure 3, introduced an undesired interleaving semantics for variable assignments, which invalidated the synchronous nature of the language. 2. Spurious non-termination of plans. Due to lack of detail in the original specification of some predicates, there were cases in which some transitions for List nodes in state IterationEnded would lead to spurious infinite loops. Although the formal operational semantics of PLEXIL in [8] has been used to prove several properties of PLEXIL, neither one of the issues was previously found. As as matter of fact, these issues do not compromise any of the proven properties of the language. Solutions to both issues were provided by the authors, and have been adopted in the latest version of the formal PLEXIL semantics. We are currently using RPXL as the formal interpreter of PLEXIL’s Formal Interactive Visual Environment [15] (PLEXIL5), a prototype graphical environment that enables step-by-step execution of plans for scripted sequence of external events, for further validation of the language’s intended semantics. We have also developed a variant of RPXL in which the serialization procedure was implemented with rewrite rules, instead of equations, and rewrite strategies. In general, RPXL outperforms that variant by two orders of magnitude on average, and by three orders of magnitude in some extreme cases. The rewrite theory RPXL has approximately 1000 lines of code, of which 308 lines correspond to the module ATOMIC-RELATION. The rest corresponds to the syntax and infrastructure specifications. 90 6 Rewriting Logic Semantics of a Plan Execution Language Related Work and Conclusion Rewriting logic has been used previously as a testbed for specifying and animating the semantics of synchronous languages. M. AlTurki and J. Meseguer [1] have studied the rewriting logic semantics of the language Orc, which includes a synchronous reduction relation. T. Serbanuta et al. [17] define the execution of P-systems with structured data with continuations. The focus of the former is to use rewriting logic to study the (mainly) non-deterministic behavior of Orc programs, while the focus of the latter is to study the relationship between P-systems and the existing continuation framework for enriching each with the strong features of the other. Our approach is based more on exploiting the determinism of a synchronous relation to tackle the problem associated with the interleaving semantics of concurrency in rewriting logic. P. Lucanu [10] studies the problem of the interleaving semantics of concurrency in rewriting logic for synchronous systems from the perspective of P-systems. The determinism property of the synchronous language Esterel [2] was formally proven by O. Tardieu in [18]. We have presented a rewriting logic semantics of PLEXIL, a synchronous plan execution language developed by NASA to support autonomous spacecraft operations. The rewriting logic specification, a formal interpreter and a semantic benchmark for validating the semantics of the language, relies on the determinism of PLEXIL’s atomic relation and a serialization procedure that enables the specification of a synchronous relation in an asynchronous computational model. Two issues in the original design of PLEXIL were found with the help of the rewriting logic specification of the language: (i) there was an atomic rule with the potential to violate the atomicity of the atomic relation, thus voiding the synchronous nature of the language, and (ii) a set of rules introducing spurious non-terminating executions of plans. We proposed solutions to these issues that were integrated into the current semantics of the language. Although we have focused on PLEXIL, the formal framework that we have developed is presented in a general setting of abstract set relations. In particular, we think that this framework can be applied to other deterministic synchronous languages. To the best of our knowledge there was no mechanized library of abstract set relations suitable for the definition and verification of synchronous relations; neither was there a soundness and completeness proof of a serialization procedure for the simulation of synchronous relations by rewrite systems. To summarize, we view this work as (i) a step forward in bringing the use of formal methods closer to practice, (ii) a contribution to the modular and mechanized study of semantic relations, and (iii) yet another, but interesting contribution to the rewriting logic semantics project. We intend to continue our collaborative work with PLEXIL development team with the goal of arriving at a formal environment for the validation of PLEXIL. Such an environment would provide a rich formal tool to PLEXIL enthusiasts for the experimentation, analysis and verification of PLEXIL programs, which could then be extended towards a rewriting-based PLEXIL implementation with associated analysis tools. Part of our future work is also to investigate the modularity of the equational serialization procedure with prioritized rules. Acknowledgments. This work was supported by the National Aeronautics and Space Administration at Langley Research Center under the Research Cooperative Agreement No. NCC-1-02043 awarded to the National Institute of Aerospace, while the second author was resident at this institute. The third author was partially supported by NSF Grant IIS 07-20482. The authors would like to thank the members of the NASA’s Automation for Operation (A4O) project and, especially, the PLEXIL development team led by Michael Dalal at NASA Ames, for their technical support. G. Dowek & C. Muñoz & C. Rocha 91 References [1] M. AlTurki & J. Meseguer (2008): Reduction Semantics and Formal Analysis of Orc Programs. Electr. Notes Theor. Comput. Sci. 200(3), pp. 25–41. [2] G. Berry (2000): The Foundations of Esterel. In: Proof, Language and Interaction: Essays in Honour of Robin Milner. MIT Press, Cambridge, MA, USA, pp. 425–454. [3] R. Bruni & J. Meseguer (2006): Semantic foundations for generalized rewrite theories. Theor. Comput. Sci. 360(1-3), pp. 386–414. Available at http://dx.doi.org/10.1016/j.tcs.2006.04.012. [4] P. Caspi, D. Pilaud, N. Halbwachs & J. A. Plaice (1987): LUSTRE: a declarative language for real-time programming. In: POPL ’87: Proceedings of the 14th ACM SIGACT-SIGPLAN symposium on Principles of programming languages. ACM, New York, NY, USA, pp. 178–188. [5] M. Clavel, F. Durán, S. Eker, J. Meseguer, P. Lincoln, N. Martı́-Oliet & C. Talcott (2007): All About Maude - A High-Performance Logical Framework. Springer LNCS Vol. 4350, 1st edition. [6] N. Dershowitz & J. P. Jouannaud (1990): Rewrite Systems. In: Handbook of Theoretical Computer Science, Volume B: Formal Models and Sematics (B). The MIT Press, pp. 243–320. [7] G. Dowek, C. Muñoz & C. Păsăreanu (2007): A Formal Analysis Framework for PLEXIL. In: Proceedings of 3rd Workshop on Planning and Plan Execution for Real-World Systems. pp. 45–51. [8] G. Dowek, C. Muñoz & C. Păsăreanu (2008): A Small-Step Semantics OF PLEXIL. Technical Report 200811, National Institute of Aerospace, Hampton, VA. [9] T. Estlin, A. Jónsson, C. Păsăreanu, R. Simmons, K. Tso & V. Verna (2006): Plan Execution Interchange Language (PLEXIL). Technical Memorandum TM-2006-213483, NASA. [10] D. Lucanu (2009): Strategy-Based Rewrite Semantics for Membrane Systems Preserves Maximal Concurrency of Evolution Rule Actions. Electr. Notes Theor. Comput. Sci. 237, pp. 107–125. [11] J. Meseguer (1992): Conditional Rewriting Logic as a Unified Model of Concurrency. Theoretical Computer Science 96(1), pp. 73–155. [12] J. Meseguer & G. Rosu (2007): The rewriting logic semantics project. Theor. Comput. Sci. 373(3), pp. 213–237. Available at http://dx.doi.org/10.1016/j.tcs.2006.12.018. [13] S. Owre, J. Rushby & N. Shankar (1992): PVS: A Prototype Verification System. In: Deepak Kapur, editor: 11th International Conference on Automated Deduction (CADE), Lecture Notes in Artificial Intelligence 607. Springer-Verlag, Saratoga, NY, pp. 748–752. [14] G. D. Plotkin (2004): A structural approach to operational semantics. J. Log. Alg. Prog. 60-61, pp. 17–139. [15] C. Rocha, C. Muñoz & H. Cadavid (2009): A Graphical Environment for the Semantic Validation of a Plan Execution Language. IEEE International Conference on Space Mission Challenges for Information Technology 0, pp. 201–207. [16] T. Serbanuta, G. Rosu & J. Meseguer (2009): A rewriting logic approach to operational semantics. Inf. Comput. 207(2), pp. 305–340. [17] T. Serbanuta, G. Stefanescu & G. Rosu (2008): Defining and Executing P Systems with Structured Data in K. In: David W. Corne, Pierluigi Frisco, Gheorghe Paun, Grzegorz Rozenberg & Arto Salomaa, editors: Workshop on Membrane Computing, Lecture Notes in Computer Science 5391. Springer, pp. 374–393. [18] O. Tardieu (2007): A deterministic logical semantics for pure Esterel. ACM Trans. Program. Lang. Syst. 29(2), p. 8. [19] A. Verdejo & N. Martı́-Oliet (2006): Executable structural operational semantics in Maude. J. Log. Algebr. Program. 67(1-2), pp. 226–293. [20] V. Verna, A. Jónsson, C. Păsăreanu & M. Latauro (2006): Universal Executive and PLEXIL: Engine and Language for Robust Spacecraft Control and Operations. In: Proceedings of the American Institute of Aeronautics and Astronautics Space Conference. [21] P. Viry (2002): Equational rules for rewriting logic. Theoretical Computer Science 285, pp. 487–517.
6cs.PL
JS KETCH: Sketching for Java Jinseong Jeon† Xiaokang Qiu‡ † Jeffrey S. Foster† Armando Solar-Lezama‡ ‡ University of Maryland, College Park MIT CSAIL {[email protected], [email protected], [email protected], [email protected]} arXiv:1507.03577v1 [cs.PL] 13 Jul 2015 Abstract JSketch Sketch-based synthesis, epitomized by the S KETCH tool, lets developers synthesize software starting from a partial program, also called a sketch or template. This paper presents JS KETCH, a tool that brings sketch-based synthesis to Java. JS KETCH’s input is a partial Java program that may include holes, which are unknown constants, expression generators, which range over sets of expressions, and class generators, which are partial classes. JS KETCH then translates the synthesis problem into a S KETCH problem; this translation is complex because S KETCH is not object-oriented. Finally, JS KETCH synthesizes an executable Java program by interpreting the output of S KETCH. .jsk Parser AST .out Encoder Sketch Solver Figure 1: JS KETCH Overview. General Terms Design, Languages. overloading and overriding, anonymous/inner classes—in terms of the features available in S KETCH. Section 3 briefly explains several technical challenges addressed in JS KETCH. Section 4 describes our experience with JS KETCH. JS KETCH is available at http://plum-umd.github.io/java-sketch/. Keywords Program Synthesis, Programming by Example, Java, S KETCH, Input-output Examples. Introduction Program synthesis [5, 6] is an attractive programming paradigm that aims to automate the development of complex pieces of code. Deriving programs completely from scratch given only a declarative specification is very challenging for all but the simplest algorithms, but recent work has shown that the problem can be made tractable by starting from a partial program—referred to in the literature as a sketch [11], scaffold [13] or template—that constrains the space of possible programs the synthesizer needs to consider. This approach to synthesis has proven useful in a variety of domains including program inversion [14], program deobfuscation [4], development of concurrent data-structures [12] and even automated tutoring [8]. This paper presents JS KETCH, a tool that makes sketch-based synthesis directly available to Java programmers. JS KETCH is built as a frontend on top of the S KETCH synthesis system, a mature synthesis tool based on a simple imperative language that can generate C code [11]. JS KETCH allows Java programmers to use many of the S KETCH’s synthesis features, such as the ability to write code with unknown constants (holes written ??) and unknown expressions described by a generator (written {| e∗ |}). In addition, JSKETCH provides a new synthesis feature—a class-level generator— that is specifically tailored for object oriented programs. Section 2 walks through JS KETCH’s input and output, along with a running example. As illustrated in Figure 1, JS KETCH compiles a Java program with unknowns to a partial program in the S KETCH language and then maps the result of S KETCH synthesis back to Java. The translation to S KETCH is challenging because S KETCH is not object oriented, so the translator must model the complex object-oriented features in Java—such as inheritance, method .java .sk Categories and Subject Descriptors I.2.2 [Automatic Programming]: Program Synthesis; F.3.1 [Specifying and Verifying and Reasoning about Programs]: Assertions, Specification techniques 1. Decoder 2. Overview We begin our presentation with two examples showing JS KETCH’s key features and usage. 2.1 Basics The input to JS KETCH is an ordinary Java program that may also contain unknowns to be synthesized. There are two kinds of unknowns: holes, written ??, represent unknown integers and booleans, and generators, written {| e∗ |}, range over a list of expressions. For example, consider the following Java sketch1 , similar to an example from the S KETCH manual [10]: 2 class SimpleMath { static int mult2(int x) { return (?? ∗ {| x , 0 |}); } 3 } 1 Here we have provided a template for the implementation of method mult2: The method returns the product of a hole and either parameter x or 0. Notice that even this very simple sketch has 233 possible instantiations (32 bits of the hole and one bit for the choice of x or 0). To specify the solution we would like to synthesize, we provide a harness containing assertions about the mult2 method: 5 class Test { harness static void test() { assert(SimpleMath.mult2(3) == 6); } 6 } 4 1 https://github.com/plum-umd/java-sketch/blob/ master/test/benchmarks/t109-mult2.java Now we can run JS KETCH on the sketch and harness. $ ./jsk.sh SimpleMath.java Test.java The result is a valid Java source file in which holes and generators have been replaced with the appropriate code. 7 8 9 10 11 $ cat result/java/SimpleMath.java class SimpleMath { ... static public int mult2 (int x) { return 2 * x; } } 12 13 14 15 16 interface Token{ public int getId (); } generator class Automaton { private int state = ??; static int num state = ??; harness static void min num state() { minimize(num state); } public void transition (Token t) { assert 0 ≤ state && state < num state; int id = t .getId (); minrepeat { if (state == ?? && id == ??) { state = ??; return; } } } public void transitions ( Iterator <Token> it) { while ( it .hasNext()) { transition ( it .next ()); } } public boolean accept() { return state ≤ ??; } 17 2.2 Finite Automata Now consider a harder problem: suppose we want to synthesize a finite automaton given sample accepting and rejecting inputs.2 There are many possible design choices for finite automata in an object-oriented language, and we will opt for one of the more efficient ones: the current automaton state will simply be an integer, and a series of conditionals will encode the transition function. Figure 2a shows our automaton sketch. The input to the automaton will be a sequence of Tokens, which have a getId method returning an integer (line 8). An Automaton is a class—ignore the generator keyword for the moment—with fields for the current state (line 9) and the number of states (line 10). Notice these fields are initialized to holes, and thus the automaton can start from any arbitrary state and have an arbitrary yet minimal number of states (restricted by S KETCH’s minimize function on line 11). The class includes a transition function that asserts that the current state is inbounds (line 13) and updates state according to the current state and the input Token’s value (retrieved on line 14). Here we face a challenge, however: we do not know the number of automaton states or tokens, so we have no bound on the number of transitions. To solve this problem, we use a feature that JSKETCH inherits from S KETCH : the term minrepeat { e } expands to the minimum length sequence of e’s that satisfy the harness. In this case, the body of minrepeat (line 16) is a conditional that encodes an arbitrary transition—if the guard matches the current state and input token, then the state is updated and the method returns. Thus, the transition method will be synthesized to include however many transitions are necessary. Finally, the Automaton class has methods transitions and accept; the first performs multiple transitions based on a sequence of input tokens, and the second one determines whether the automaton is in an accepting state. Notice that the inequality (line 21) means that states 0 up to some bound will be accepting; this is fully general because the exact state numbering does not matter, so the synthesizer can choose the accepting states to follow this pattern. Class Generators. In addition to basic S KETCH generators like we saw in the mult2 example, JS KETCH also supports class generators, which allow the same class to be instantiated differently in different superclass contexts. In Figure 2a, the generator annotation on line 8 indicates that Automaton is such a class. (Class generators are analogous to the the function generators introduced by S KETCH [10].) Figure 2b shows two classes that inherit from Automaton. The first class, DBConnection, has an inner class Monitor that inherits from Automaton. The Monitor class defines two tokens, OPEN and CLOSE, whose ids are 1 and 2, respectively. The outer class has a Monitor instance m that transitions when the database is opened (line 34) and when the database is closed (line 35). The goal is to synthesize m such that it acts as an inline reference monitor to check that the database is never opened or closed twice in a row, and is 2 Of course, there are many better ways to construct finite automata—this example is only for expository purposes. 18 19 20 21 22 } (a) Automaton sketch. 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 class DBConnection { class Monitor extends Automaton { final static Token OPEN = new Token() { public int getId() { return 1; } }; final static Token CLOSE = new Token() { public int getId() { return 2; } }; public Monitor() { } } Monitor m; public DBConnection() { m = new Monitor(); } public boolean isErroneous() { return ! m.accept(); } public void open() { m.transition (Monitor.OPEN); } public void close() { m. transition (Monitor.CLOSE); } } class CADsR extends Automaton { ... public boolean accept(String str) { state = init state backup ; transitions ( convertToIterator ( str )); return accept(); } } (b) Code using Automaton sketch. Figure 2: Finite automata with JS KETCH. only closed after it is opened. The harnesses in TestDBConnection in Figure 3 describe both good and bad behaviors. The second class in Figure 2b, CADsR, adds a new (overloaded) accept(String) method that converts the input String to a token iterator (details omitted for brevity), transitions according to that iterator, and then returns whether the string is accepted. The goal is to synthesize an automaton that recognizes c(a|d)+r. The corresponding harness TestCADsR.examples() in Figure 3 constructs a CADsR instance and makes various assertions about its behavior. Notice that this example relies critically on class generators, since Monitor and CADsR must encode different automata. Output. Figure 4 shows the output produced by running JSKETCH on the code in Figures 2 and 3. We see that the generator was instantiated as Automaton1, inherited by DBConnection.Monitor, and Automaton2, inherited by CADsR. Both automata are equivalent to what we would expect for these languages. Two things were critical for achieving this result: minimizing the number of states (line 11) and having sufficient harnesses (Figure 3). 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 We experimented further with CADsR to see how changing the sketch and harness affects the output. First, we tried running with a smaller harness, i.e., with fewer examples. In this case, the synthesized automaton covers all the examples but not the full language. For example, if we omit the four-letter inputs in Figure 3 the resulting automaton only accepts three-letter inputs. Whereas going to four-letter inputs constrains the problem enough for JS KETCH to find the full solution. Second, if we omit state minimization (line 11), then the synthesizer chooses large, widely separated indexes for states, and it also includes redundant states (that could be merged with a textbook state minimization algorithm). Third, if we manually bound the number of states to be too small (e.g., manually set num state to 2), the synthesizer runs for more than half an hour and then fails, since there is no possible solution. Of these cases, the last two are relatively easy to deal with since the failure is obvious, but the first one—knowing that a synthesis problem is underconstrained—is an open research challenge. However, one good feature of synthesis is that, if we do find cases that are not handled by the current implementation, we can simply add those cases and resynthesize rather than having to manually fix the code (which could be quite difficult and/or introduce its own bugs). Moreover, minimization—trying to ensure the output program is small—seems to be a good heuristic to avoid overfitting to the examples. class TestDBConnection { harness static void scenario good() { DBConnection conn = new DBConnection(); assert ! conn.isErrorneous(); conn.open(); assert ! conn.isErroneous(); conn.close(); assert ! conn.isErroneous(); } // bad: opening more than once harness static void scenario bad1() { DBConnection conn = new DBConnection(); conn.open(); conn.open(); assert conn.isErroneous(); } // bad: closing more than once harness static void scenario bad2() { DBConnection conn = new DBConnection(); conn.open(); conn.close(); conn.close(); assert conn.isErroneous(); } } class TestCADsR { // Lisp−style identifier : c(a|d)+r harness static void examples() { CADsR a = new CADsR(); assert ! a.accept(”c” ); assert ! a.accept(”cr” ); assert a.accept(”car” ); assert a.accept(”cdr” ); assert a.accept(”caar” ); assert a.accept(”cadr” ); assert a.accept(”cdar” ); assert a.accept(”cddr” ); } } 3. We implemented JS KETCH as a series of Python scripts that invokes S KETCH as a subroutine. JS KETCH comprises roughly 5.7K lines of code, excluding the parser and regression testing code. JSKETCH parses input files using the Python front-end of ANTLR v3.1.3 [7] and its standard Java grammar. We extended that grammar to support holes, expression-level generators, minrepeat, and the harness and generator modifiers. There are a number of technical challenges in the implementation of JS KETCH; due to space limitations we discuss only the major ones. Figure 3: Automata use cases. 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 class Automaton1 { int state = 0; static int num state = 3; public void transition (Token t) { ... assert 0 ≤ state && state < 3; if (state == 0 && id == 1) { state = 1; if (state == 1 && id == 1) { state = 2; if (state == 1 && id == 2) { state = 0; if (state == 0 && id == 2) { state = 2; return; return; return; return; Implementation } } } } // // // // open@ open 2x ( init )@ close 2x } public boolean accept() { return state ≤ 1; } ... } class DBConnection{ class Monitor extends Automaton1 { ... } ...} class Automaton2 { int state = 0; static int num state = 3; public void transition (Token t) { ... assert 0 ≤ state && state < 3; if (state == 0 && id == 99) { state = 1; return; } // c if (state == 1 && id == 97) { state = 2; return; } // ca if (state == 1 && id == 100) { state = 2; return; } // cd if (state == 2 && id == 114) { state = 0; return; } // c(a|d)+r@ } public boolean accept() { return state ≤ 0; } ... } class CADsR extends Automaton2 { ... } Figure 4: JS KETCH Output (partial). Class hierarchy. The first issue we face is that S KETCH’s language is not object-oriented. To solve this problem, JS KETCH follows a similar approach to [8] and encodes objects with a new type V Object, defined as a struct containing all possible fields plus an integer identifier for the class. More precisely, if C1 , . . . , Cm are all classes in the program, then we define: 93 struct V Object { int class id ; fields-from-C1 ... fields-from-Cm 94 } 92 where each Ci gets its own unique id. JS KETCH also assigns every method a unique id, and it creates various constant arrays that record type information. For a method id m, we set belongsTo[m] to be its class id; argNum[m] to be its number of arguments; and argType[m][i] to be the type of its ith argument. We model the inheritance hierarchy using a twodimensional array subcls such that subcls[i][j] is true if class i is a subclass of class j. Encoding names. When we translate the class hierarchy into JS KETCH, we also flatten out the namespace, and we need to avoid conflating overridden or overloaded method names, or inner classes. Thus, we name inner classes as Inner Outer , where Inner is the name of the nested class and Outer is the name of the enclosing class. We also handle anonymous classes by assigning them distinct numbers, e.g., Cls 1. To support method overriding and overloading, methods are named Mtd Cls Params, where Mtd is the name of the method, Cls is the name of the class in which it is declared, and Params is the list of parameter types. For example, in the finite automaton example, CADsR inherits method transition from Automaton2 (the second variant of the class generator), hence the method is named transition Automaton2 Token(V Object self, V Object t) in S KETCH. The first parameter represents the callee of the method. Dynamic dispatch. We simulate the dynamic dispatch mechanism of Java in S KETCH. For each method name M (suitably encoded, as above), we introduce a function dyn dispatch M(V Object self, ...) that dispatches based on the class id field of the callee: 100 void dyn dispatch M(V Object self, ...) { int cid = self . class id ; if (cid == R0 id) return M R0 P(self, ...); if (cid == R1 id) return M R1 P(self, ...); ... return; 101 } 95 96 97 98 99 Note that if M is static, the self argument is omitted. Java libraries. To perform synthesis, we need S KETCH equivalents of any Java standard libraries used in the input sketch. Currently, JS KETCH supports the following collections and APIs: ArrayDeque, Iterator, LinkedList, List, Map, Queue, Stack, TreeMap, CharSequence, String, StringBuilder, and StringBuffer. Library classes are implemented using a combination of translation of the original source using JS KETCH and manual coding, to handle native methods or cases when efficiency is an issue. Note that several of these classes include generics (e.g., List), which is naturally handled because the all objects are uniformly represented as V Object. Limitations and unsupported features. As Java is a very large language, JS KETCH currently only supports a core subset of Java. We leave several features of Java to the future versions of JSKETCH , including packages, access control, exceptions, and concurrency. Additionally, JS KETCH assumes the input sketch is type correct, meaning the standard parts of the program are type correct, holes are used either as integers or booleans, and expression generators are type correct. This assumption is necessary because, although S KETCH itself includes static type checking, distinctions between different object types are lost by collapsing them all into V Object. Using S KETCH. We translate JS KETCH file, which is composed of the user-given template and examples, as well as supportive libraries (if necessary) to .sk files as input to S KETCH. For example, the SimpleMath example in Section 2.1 is translated to 102 103 104 int e h1 = ??; int mult2 SimpleMath int(int x) { return e h1 ∗ {| x | 0 |}; } harness void test Test() { assert mult2 SimpleMath int(3) == 6; } We refer the reader elsewhere [9, 10] for details on how S KETCH itself works. After solving the synthesis problem, JS KETCH then unparses these same Java files, but with unknowns resolved according to the S KETCH synthesis results. We use partial parsing [1] to make this output process simpler. 4. Experience with JS KETCH We developed JS KETCH as part of the development of another tool, PASKET [2], which aims to construct framework models, e.g. mock classes that implement key functionality of a framework but in a way that is much simpler than the actual framework code and is more amenable to static analysis. PASKET takes as input a log of the interaction between the real framework and a test application, together with a description of the API of the framework and of the design patterns that the framework uses. PASKET uses these inputs to automatically generate an input to JS KETCH which is then responsible for actually synthesizing the models. Through PASKET, we have used JS KETCH to synthesize models of key functionality from the Swing and Android frameworks. The largest JS KETCH inputs generated by PASKET contain 117 classes and 4,372 lines of code, and solve in about two minutes despite having over 7318 × 16428 possible choices; this is possible thanks to a new synthesis algorithm called Adaptive Concretization [3] that is available in S KETCH and was also developed as part of this work. Acknowledgments This research was supported in part by NSF CCF-1139021, CCF1139056, CCF-1161775, and the partnership between UMIACS and the Laboratory for Telecommunication Sciences. References [1] A. Demaille, R. Levillain, and B. Sigoure. TWEAST: A Simple and Effective Technique to Implement Concrete-syntax AST Rewriting Using Partial Parsing. In SAC ’09, pages 1924–1929, 2009. [2] J. Jeon, X. Qiu, J. S. Foster, and A. Solar-Lezama. Synthesizing Framework Models for Symbolic Execution. Unpublished manuscript, 2015. [3] J. Jeon, X. Qiu, A. Solar-Lezama, and J. S. Foster. Adaptive Concretization for Parallel Program Synthesis. In Computer Aided Verification (CAV ’15), July 2015. [4] S. Jha, S. Gulwani, S. A. Seshia, and A. Tiwari. Oracle-guided component-based program synthesis. In ICSE ’10, pages 215–224, 2010. [5] Z. Manna and R. Waldinger. A Deductive Approach to Program Synthesis. ACM Transactions on Programming Languages and Systems, 2(1):90–121, Jan. 1980. [6] Z. Manna and R. J. Waldinger. Toward automatic program synthesis. Communications of the ACM, 14(3):151–165, Mar. 1971. [7] T. Parr and K. Fisher. LL(*): The Foundation of the ANTLR Parser Generator. In PLDI ’11, pages 425–436, 2011. [8] R. Singh, S. Gulwani, and A. Solar-Lezama. Automated Feedback Generation for Introductory Programming Assignments. In PLDI ’13, pages 15–26, 2013. [9] A. Solar-Lezama. Program sketching. International Journal on Software Tools for Technology Transfer, 15(5-6):475–495, 2013. [10] A. Solar-Lezama. The Sketch Programmers Manual, 2015. Version 1.6.7. [11] A. Solar-Lezama, L. Tancau, R. Bodik, S. Seshia, and V. Saraswat. Combinatorial sketching for finite programs. In ASPLOS-XII, pages 404–415, 2006. [12] A. Solar-Lezama, C. G. Jones, and R. Bodik. Sketching concurrent data structures. In PLDI ’08, pages 136–148, 2008. [13] S. Srivastava, S. Gulwani, and J. S. Foster. From program verification to program synthesis. In POPL ’10, pages 313–326, 2010. [14] S. Srivastava, S. Gulwani, S. Chaudhuri, and J. S. Foster. Path-Based Inductive Synthesis for Program Inversion. In PLDI ’11, pages 492– 503, June 2011. A. Tool Demonstration Walkthrough As mentioned in the introduction, JS KETCH is available at http: //plum-umd.github.io/java-sketch/. The tool is at a fairly early stage of development, but is robust enough to be used by the wider research community. Our demonstration will generally follow the overview in Section 2. Below are more details of what we plan to present. A.1 Basics JS KETCH performs program synthesis—generating an output program given an input specification. Let’s begin with a small example: $ cat >> SimpleMath.java class SimpleMath { static int mult2(int x) { return ?? * {| x , 0 |}; } } This is a sketch (also scaffold or template), which is a partial Java program. The ?? is a hole—unknown integer—and the other part of the product is a generator—ranging over the listed expressions. Notice that this sketch has 233 possible instantiations. In addition to the template, the other important input to JSKETCH is examples that specify the expected behavior of the template. These are analogous to unit tests. We provide a harness containing assertions about the mult2 method: states via distinct integers, along with a series of conditionals that encode state transitions. Here’s the initial sketch: 1 2 3 4 5 6 7 8 9 10 interface Token { public int getId (); } class Automaton { private int state = ??; static int num state = ??; harness static void min num state() { minimize(num state); } public void transition (Token t) { assert 0 ≤ state && state < num state; int id = t .getId (); minrepeat { if (state == ?? && id == ??) { state = ??; return; } } } public void transitions ( Iterator <Token> it) { while( it .hasNext()) { transition ( it .next ()); } } public boolean accept() { return state ≤ ??; } 11 12 13 14 15 16 } Here are some key things to notice about the source code: • transitions are taken based on the Token interface • the initial state is arbitrary (line 3) • the number of states is arbitrary (line 4) • states are dense (line 5) $ cat >> Test.java class Test { harness static void test() { assert SimpleMath.mult2(3) == 6; } } • we use an assertion to check the validity of the current state (line 7) • a transition is arbitrary as it depends on an arbitrary current state and an arbitrary id (line 10) • minrepeat replicates its body the minimum necessary number of Now we can run JS KETCH on the sketch and harness: $ ./jsk.sh SimpleMath.java Test.java 06:07:15 rewriting syntax sugar 06:07:15 specializing class-level generator 06:07:15 rewriting exp hole 06:07:15 semantics checking 06:07:15 building class hierarchy 06:07:15 encoding result/sk_Test/SimpleMath.sk 06:07:15 encoding result/sk_Test/Test.sk ... 06:07:15 sketch running... 06:07:15 sketch done: result/output/Test.txt 06:07:15 replacing holes 06:07:15 replacing generators 06:07:15 semantics checking 06:07:15 decoding result/java/SimpleMath.java ... 06:07:15 synthesis done The final result synthesized by JS KETCH is a valid Java source file where unknowns have been replaced with the appropriate code: $ cat result/java/SimpleMath.java class SimpleMath { ... static int mult2 (int x) { return 2 * x; } } A.2 times. • the number of transitions is arbitrary (line 9) • the number of accepting states is arbitrary (line 15); by packing the states densely, we could use an inequality here Now we can define an inline reference monitor as follows: 17 18 19 20 21 22 23 } Monitor m; public DBConnection() { m = new Monitor(); } public boolean isErroneous() { return ! m.accept(); } public void open() { m.transition (Monitor.OPEN); } public void close() { m. transition (Monitor.CLOSE); } 24 25 26 27 28 29 30 } The key idea is that each database connection operation is associated with an unique id, and the monitor maintains an automaton that keeps receiving operation ids. At any point, a client can check the status of the connection by asking the monitor whether it is in an accepting state. As expected, we need to provide a harness: Database Connection Monitor Now consider a harder problem: suppose we want to synthesize an automaton-based inline reference monitor to check basic properties of a database connection, namely that the connection is never opened or closed twice in a row and is only closed after being opened. Let’s use a simple, efficient implementation: representing class DBConnection { class Monitor extends Automaton { final static Token OPEN = new Token() { public int getId() { return 1; } }; final static Token CLOSE = new Token() { public int getId() { return 2; } }; public Monitor() { } 31 32 33 34 class TestDBConnection { harness static void scenario good() { DBConnection conn = new DBConnection(); assert ! conn.isErroneous(); conn.open(); assert ! conn.isErroneous(); conn.close(); assert ! conn.isErroneous(); 35 36 } // bad: opening more than once harness static void scenario bad1() { DBConnection conn = new DBConnection(); conn.open(); conn.open(); assert conn.isErroneous(); } 37 38 39 40 41 42 } These examples illustrate one normal usage—opening a connection and closing it—and one abnormal usage—opening a connection twice. Given these harnesses, JS KETCH finds a solution: 43 44 45 46 47 48 49 74 75 } public boolean accept() { return state ≤ 1; } ... } 51 80 class CADsR extends Automaton { ... public boolean accept(String str) { state = init state backup ; transitions ( convertToIterator ( str )); return accept(); 81 } 76 77 78 79 88 class TestCADsR { harness static void examples() { CADsR a = new CADsR(); assert ! a.accept(”c” ); assert ! a.accept(”cr” ); assert a.accept(”car” ); assert a.accept(”cdr” ); assert a.accept(”caar” ); assert a.accept(”cadr” ); assert a.accept(”cdar” ); assert a.accept(”cddr” ); 89 } 83 57 class TestDBConnection { ... // bad: closing more than once harness static void scenario bad2() { DBConnection conn = new DBConnection(); conn.open(); conn.close(); conn.close(); assert conn.isErroneous(); 58 } 52 53 54 55 56 84 85 86 87 60 } 61 62 63 64 65 66 67 68 69 class Automaton { int state = 0; static int num state = 3; public void transition (Token t) { ... assert 0 ≤ state && state < 3; if (state == 0 && id == 1) { state = if (state == 1 && id == 1) { state = if (state == 1 && id == 2) { state = if (state == 0 && id == 2) { state = 90 91 92 93 94 1; 2; 0; 2; return; return; return; return; } } } } // // // // open@ open 2x ( init )@ close 2x } public boolean accept() { return state ≤ 1; } ... } 95 96 97 98 99 100 The resulting automaton is exactly same as what one can write by hand. A.3 101 102 103 104 105 106 107 108 109 70 71 generator class Automaton { ... } class DBConnection { class Automaton2 { int state = 106; static int num state = 120; public void transition (Token t) { ... if (state == 106 && id == 99) { state = 64; return; } if (state == 64 && id == 97) { state = 100; return; } if (state == 100 && id == 114) { state = 50; return; } if (state == 64 && id == 100) { state = 119; return; } if (state == 119 && id == 114) { state = 32; return; } if (state == 64 && id == 114) { state = 72; return; } // // // // // // c ca car@ cd cdr@ cr } public boolean accept() { return state ≤ 50; } ... } Notice that the synthesizer picked fairly strange numbers for the states and left a lot of states unused. Moreover, the automaton is inefficient in that it uses two different paths and final states to accept “car” and “cdr”. If we run synthesis again using minimize, we get: A Regular Language: Lisp-Style Identifier Now let’s consider synthesizing another automaton, trying to create a finite automaton given sample accepting and rejecting inputs. One benefit of Java as an object oriented language is code reuse via subclassing, so we could just make another class that extends Automaton, assuming we want this to be part of the same program. But subclassing won’t quite work here because we need different automata for each use case. To solve this problem, we can make Automaton a class generator, so that it can be instantiated differently in different superclass contexts. } If we provide less examples, e.g., if we remove examples about rejected strings, the synthesizer simply returns an automaton that does not make any transitions, while the initial state is an accepting state. This awkward automaton actually conforms to any accepted strings, and one can easily figure out the necessity of rejected strings. To see the advantage of using minimize, let’s run synthesis without line 5. We get: After adding that abnormal case—closing twice, JS KETCH finds this solution: 59 } Note the overloaded accept(String) method. Now, we need to specify sample strings that are accepted or rejected by the synthesized automaton. Suppose we want to synthesize an automaton that recognizes Lisp-style identifier c(a|d)+r. The following harness constructs a CADsR instance and makes several assertions about its behavior: 82 This sort of looks okay, but it’s odd that there are no transitions for the close operation. When the monitor is in state 1 and the given operation is close, it is fine for the monitor to stay at the same accepting state. But, it is problematic if we close the connection more than once, which we should have specified: } class CADsR extends Automaton { ... } Now let’s use this to synthesize an example automaton: class Automaton { int state = 0; static int num state = 3; public void transition (Token t) { ... assert 0 ≤ state && state < 3; if (state == 0 && id == 1) { state = 1; return; } // open@ if (state == 1 && id == 1) { state = 2; return; } // open 2x 50 class Monitor extends Automaton { ... } ... 72 73 110 class Automaton2 { int state = 0; static int num state = 3; public void transition (Token t) { ... assert 0 ≤ state && state < 3; if (state == 0 && id == 99) { state = if (state == 1 && id == 97) { state = if (state == 1 && id == 100) { state = if (state == 2 && id == 114) { state = 1; 2; 2; 0; return; return; return; return; } } } } } public boolean accept() { return state ≤ 0; } ... } // // // // c ca cd c(a|d)+r@ This result is better in the sense that it uses dense states and that it encompasses only one path and final state to accept the valid strings. To double-check whether it is indeed the minimum number of states, we can test with the bounded number of states: 112 class Automaton { static int num state = 2; ... 113 } 111 In this case, the synthesizer runs for more than half an hour and then fails, as there is no possible solution using only two states. A.4 Internals of JS KETCH If time permits, we will show a bit of JS KETCH’s translation to S KETCH. For example, the translation of the mult2 example looks like: $ cat result/sk_Test/SimpleMath.sk ... int e_h1 = ??; int mult2_SimpleMath_int(int x) { return e_h1 * {| x | 0 |}; } $ cat result/sk_Test/Test.sk ... harness void test_Test() { assert mult2_SimpleMath_int(3) == 6; } JS KETCH extracts the synthesis results by looking at how each hole was solved by S KETCH: $ cat result/log/log.txt ... 06:07:15 [DEBUG] java_sk/decode/finder.py:41 hole: SimpleMath.e_h1 06:07:15 [INFO] java_sk/decode/__init__.py:69 replacing holes 06:07:15 [DEBUG] java_sk/decode/replacer.py:72 replaced: SimpleMath.e_h1 = 2 06:07:15 [DEBUG] java_sk/decode/replacer.py:89 replaced: e_h1 @ int SimpleMath.mult2(int) with 2 06:07:15 [DEBUG] java_sk/decode/finder.py:93 generator@mult2: {| x | 0 |} 06:07:15 [INFO] java_sk/decode/__init__.py:79 replacing generators 06:07:15 [DEBUG] java_sk/decode/replacer.py:151 {| x | 0 |} => x ... Then it traverses the original Java sketch and outputs it, plugging in the solved values for the holes.
6cs.PL
Inclusion graph of subgroups of a group arXiv:1604.08259v1 [math.GR] 27 Apr 2016 P. Devi∗, R. Rajkumar† Department of Mathematics, The Gandhigram Rural Institute – Deemed University, Gandhigram – 624 302, Tamil Nadu, India. Abstract For a finite group G, we define the inclusion graph of subgroups of G, denoted by I(G), is a graph having all the proper subgroups of G as its vertices and two distinct vertices H and K in I(G) are adjacent if and only if either H ⊂ K or K ⊂ H. In this paper, we classify the finite groups whose inclusion graph of subgroups is one of complete, bipartite, tree, star, path, cycle, disconnected, claw-free. Also we classify the finite abelian groups whose inclusion graph of subgroups is planar. For any given finite group, we estimate the clique number, chromatic number, girth of its inclusion graph of subgroups and for a finite abelian group, we estimate the diameter of its inclusion graph of subgroups. Among the other results we show that some groups can be determined by their inclusion graph of subgroups Keywords: Inclusion graph of subgroups, bipartite graph, clique number, girth, diameter, planar graph. 2010 Mathematics Subject Classification: 05C25, 05C05, 05C10, 20K27, 20E15. ∗ † e-mail: [email protected] e-mail: [email protected] 1 2 1 Introduction The properties of an algebraic structure can be investigated in several ways. One of the ways is by associating a suitable graph to that algebraic structure and analyzing the properties of the associated graph by using graph theoretic methods. The subgroup lattice and subgroup graph of a group are well known graphs associated with a group (cf. [4], [10], [11], [12]). The intersection graph of subgroups of a group is another interesting graph associated with a group (cf. [2], [6], [9]). For a group G, the intersection graph of subgroups of G, denoted by I (G), is a graph having all the proper subgroups of G as its vertices and two distinct vertices are adjacent if and only if the corresponding subgroups intersects non-trivially. In [1], S. Akbari et al assigned a graph to ideals of a ring as follows: For a ring R with unity, the inclusion ideal graph of R is a graph whose vertices are all non-trivial left ideals of R and two distinct left ideals I and J are adjacent if and only if I ⊂ J or J ⊂ I. Motivated by this, in this paper, we define the following: For a finite group G, the inclusion graph of subgroups of G, denoted by I(G), is a graph having all the proper subgroups of G as its vertices and two distinct vertices H and K in I(G) are adjacent if and only if H ⊂ K or K ⊂ H. For a group G, its subgroup lattice is denoted by L(G). The height of L(G) is the length of the longest chain in L(G) through partial order from greatest to least. We denote the order of an element a ∈ Zn by ordn (a) . The number of Sylow p-subgroups of a group G is denoted by np (G). Now we recall some basic definitions and notations of graph theory. We use the standard terminology of graphs (e.g., see [8]). Let G be a simple graph with vertex set V (G) and edge set E(G). G is said to be k-partite if V (G) can be partition into k disjoint subsets Vi , i = 1, 2, . . . , k such that every edge joins a vertex of Vi to a vertex of Vj , i 6= j. A k-partite graph is said to be a complete k-partite if every vertex in each partition is adjacent with all the vertices in the remaining partitions and is denoted by Km1 ,m2 ,...,mk , where mi = |Vi |, i = 1, . . . , k. The graph K1,m is called a star and the graph K1,3 is called a claw. A graph in which any two distinct vertices are adjacent is said to be complete. A graph whose edge set is empty is said to be totally disconnected. Two graphs G1 , G2 are isomorphic if there exists 3 a bijection from V (G1 ) to V (G2 ) preserving the adjacency. A path connecting two vertices u and v in G is a finite sequence (u =)v0 , v1 , . . . , vn (= v) of distinct vertices (except, possibly, u and v) such that ui is adjacent to ui+1 for all i = 0, 1, . . . , n − 1. A path is a cycle if u = v. The length of a path or a cycle is the number of edges in it. A path or a cycle of length n is denoted by Pn or Cn , respectively. A graph G is said to be connected if any two vertices are connected by a path; otherwise G is said to be disconnected. A connected graph with out a cycle is called a tree. For a connected graph G, its diameter, denoted by diam(G), is the maximum of length of a shortest path of any two vertices. If G is disconnected, then we define diam(G) = ∞. The girth of a graph G, denoted by girth(G), is the length of a shortest cycle in G, if it exist; otherwise, we define girth(G) = ∞. A clique is a set of vertices in G such that any two are adjacent. The clique number ω(G) of G is the cardinality of a largest clique in G. The chromatic number χ(G) of G is the smallest number of colors needed to color the vertices of G such that no two adjacent vertices gets the same color. A graph is said to be planar if it can be drawn on a plane such that no two edges intersect, except, possibly at their end vertices. We define a graph G to be X-free if it does not contain a subgraph isomorphic to a given graph X. G denotes the complement of a graph G. For two graphs G and H, G ∪ H denotes the disjoint union of G and H. In this paper, we classify all the finite groups whose inclusion graph of subgroups is one of complete, bipartite, tree, star, path, cycle, claw-free, disconnected (cf. Theorems 2.4, 2.6, 2.8, 2.12, Corollaries 2.2, 2.4). Also we give the classification of finite abelian groups whose inclusion graph of subgroups is planar (cf. Theorem 2.10). For any given finite group, we estimate the clique number, chromatic number, girth of its inclusion graph of subgroups (cf. Theorem 2.12, Corollary 2.1) and for a finite abelian group, we estimate the diameter of its inclusion graph of subgroups (cf. Theorem 2.11). Moreover, we show that some groups can be determined by their inclusion graph of subgroups (cf. Corollary 2.3). In this sequel, we show some interesting connections between the inclusion graph of subgroups of a group, its subgroup lattice and its intersection graph of subgroups (cf. Theorems 2.2, 2.5, 2.6, 2.7, 2.9 and Corollary 2.1). 4 2 Main results Theorem 2.1. Let G1 and G2 be groups. If G1 ∼ = G2 , then I(G1 ) ∼ = I(G2 ). Proof. If φ is a group isomorphism from G1 into G2 , then the map ψ : V (I(G1 )) → V (I(G2 )) by ψ(H) = φ(H), for all H ∈ V (I(G1 )) is a graph isomorphism. Remark 2.1. The converse of the above theorem is not true. For example, let G1 = Z3 × Z3 and G2 = S3 , then it is easy to see that I(G1 ) ∼ = I(G2 ), but G1  G2 . = K4 ∼ Theorem 2.2. Let G1 and G2 be groups. If L(G1 ) ∼ = L(G2 ), then I(G1 ) ∼ = I(G2 ). Proof. Let φ be a lattice isomorphism from L(G1 ) into L(G2 ). Define a map ψ : V (I(G1 )) → V (I(G2 )) by ψ(H) = φ(H), for all H ∈ V (I(G1 )). Since φ is bijective, so is ψ. Suppose H1 and H2 are adjacent in I(G1 ), then either H1 ⊂ H2 or H2 ⊂ H1 . Since φ is a lattice isomorphism, so it preserves the meet and order and so either φ(H1 ) ⊂ φ(H2 ) or φ(H2 ) ⊂ φ(H1 ). It follows that ψ(H1 ) and ψ(H2 ) are adjacent in I(G2 ). By following a similar argument as above, it is easy to see that if ψ(H1 ) and ψ(H2 ) are adjacent in I(G2 ), then H1 and H2 are adjacent in I(G1 ). Thus ψ is a graph isomorphism. Hence the proof. Theorem 2.3. Let G be any group and N be a subgroup of G. Then I(N ) is a subgraph of I(G). In addition, N is a normal subgroup, then I(G/N ) is isomorphic (as a graph) to a subgraph of I(G). Proof. The first result is obviously true. Any subgroup of G/N is of the form H/N , where H is a subgroup of G containing N . Here two proper subgroups H/N , K/N are adjacent in I(G/N ) if and only if either H/N ⊂ K/N or K/N ⊂ H/N . This implies that either H ⊂ K or K ⊂ H and so H and K are adjacent in I(G). This completes the proof. Theorem 2.4. Let G be a finite group. Then I(G) is complete if and only if G ∼ = Zpα , where p is a prime and α > 1. Moreover, I(Zpα ) ∼ = Kα−1 . Proof. If G ∼ = Zpα , where p is a prime and α > 1, then L(G) is a chain of length α and so I(G) ∼ = Kα−1 . If G  Zpα , then L(G) is not a chain and so there exists at least two subgroups H1 and H2 of G such that H1 * H2 and H2 * H1 . It follows that I(G) is not complete. 5 Theorem 2.5. Let G be a finite group. Then I(G) is (k − 1)-partite, where k is the height of L(G). Proof. Let M1 be the set of all maximal subgroups of G and for each i = 2, 3, . . . , k − 1, let Mi be the set of all maximal subgroups of the subgroups in Mi−1 . Then {Mi }k−1 i=1 is a partition of the vertex set of I(G). Also no two vertices in a same partition are adjacent in I(G). Moreover, k − 1 is the minimal number such that a k-partition of the vertex set of I(G) is having this property, since the height of L(G) is k. It follows that I(G) is (k − 1)-partite. The next result is an immediate consequence of Theorem 2.5, the definition of the clique number and chromatic number of a graph. Corollary 2.1. Let G be a finite group. Then ω(I(G)) = k − 1 = χ(I(G)), where k is the height of L(G). The next two results are immediate consequences of Theorem 2.5 and the definition of the subgroup lattice of a group. Theorem 2.6. Let G be a group. Then the following are equivalent. (i) I(G) is totally disconnected; (ii) every proper subgroups of G is of prime order; (iii) height of L(G) is 2. Theorem 2.7. Let G be a group and e be its identity element. Then the following are equivalent. (i) I(G) is bipartite; (ii) L(G) − {G, e} ∼ = I(G); (iii) height of L(G) is either 2 or 3. Corollary 2.2. Let G be a finite group and p, q, r be distinct primes. Then 6 (1) I(G) is totally disconnected if and only if G is one of Zp2 , Zp × Zp , Zpq , Zq o Zp ; (2) I(G) is bipartite if and only if |G| is one of p2 , pq, p3 , p2 q or pqr. α Consider the semi-direct product Zq ot Zpα = ha, b | aq = bp = 1, bab−1 = ai , ordq (i) = pt i, where p and q are distinct primes with pt | (q − 1), t ≥ 0. Then every semi-direct product Zq o Zpα is one of these types [4, Lemma 2.12]. Note that, here after we suppress the subscript when t = 1. Theorem 2.8. Let G be a finite group and p, q, r be distinct primes. Then (1) I(G) ∼ = Cn if and only if either n = 3 and G ∼ = Zp4 or n = 6 and G ∼ = Zpqr ; (2) I(G) is a tree if and only if G is one of Zp3 , Zp2 q , Zp2 × Zp , Q8 , M8 , Zq o Zp2 , Zq o2 Zp2 2 or Zp2 o Zq = ha, b | ap = bq = 1, bab−1 = ai , ordp2 (i) = qi (q |(p − 1)); (3) I(G) is a star if and only if G is either Zp3 or Q8 ; (4) I(G) ∼ = Pn if and only if either n = 1 and G ∼ = Zp3 or n = 3 and G ∼ = Zp2 q . Proof. First we claim that I(G) ∼ = Cn , where n is odd if and only if n = 3 and G ∼ = Zp4 . It is easy to see that G ∼ = Zp4 if and only if I(G) ∼ = C3 . Now suppose that I(G) ∼ = Cn , where n is odd, n ≥ 5. Let this cycle be H1 − H2 − · · · − Hn − H1 . Now we have two possibilities: H1 ⊂ H2 , Hn or H2 , Hn ⊂ H1 . (i) Suppose that H1 ⊂ H2 , Hn . Since H2 is adjacent to H3 , so either H2 ⊂ H3 or H3 ⊂ H2 . If H2 ⊂ H3 , then H1 , H2 , H3 forms C3 as a subgraph of I(G), which is a contradiction and so we must have H3 ⊂ H2 . Next, since H3 is adjacent to H4 , so either H3 ⊂ H4 or H4 ⊂ H3 . If H4 ⊂ H3 , then H2 , H3 , H4 forms C3 as a subgraph in I(G), which is a contradiction and so we must have H3 ⊂ H4 . If we proceed like this, we get Hi ⊂ Hi−1 , Hi+1 , when i is an odd integer (suffixes taken modulo n) and so Hn ⊂ H1 , which is not possible. (ii) Suppose that H2 , Hn ⊂ H1 . Since H2 is adjacent to H3 , so either H2 ⊂ H3 or H3 ⊂ H2 . If H3 ⊂ H2 , then H1 , H2 , H3 forms C3 as a subgraph of I(G), which is a contradiction and so we must have and so we have H2 ⊂ H3 . Next, since H3 is adjacent to H4 , so 7 either H3 ⊂ H4 or H4 ⊂ H3 . If H3 ⊂ H4 , then H2 , H3 , H4 forms C3 as a subgraph of I(G) and so we have H4 ⊂ H3 . If we proceed like this, we get Hi ⊂ Hi−1 , Hi+1 , when i is an even integer (suffixes taken modulo n) and so we have Hn−1 ⊂ Hn . This implies that Hn−1 , Hn , H1 forms C3 as a subgraph of I(G), which is a contradiction. Thus I(G)  Cn , where n is odd, n ≥ 5 and our claim is now proved. Next, we start to prove the main theorem. Since every tree, star graph, path, even cycle are bipartite, so to classify the finite groups whose inclusion graph of subgroups is one of tree, star graph, path, even cycle, it is enough to consider the groups of order p2 , pq, p3 , p2 q, pqr, by Corollary 2.2(2). Case 1: Let |G| = p2 or pq. By Theorem 2.6, I(G) is neither a tree nor a cycle. Case 2: Let |G| = p3 . Here we use the classification of groups of order p3 . (i) If G ∼ = Zp3 , then by Theorem 2.4, I(G) ∼ = K2 , which is a path but not a cycle. (ii) If G ∼ = Zp2 ×Zp , then h(1, 0)i, h(1, 1)i, . . ., h(1, p−1)i, h(p, 0), (0, 1)i, h(p, 0)i, h(p, 1)i, . . ., h(p, p − 1)i, h(0, 1)i are the only proper subgroups of G. I(G) is shown in Figure 1(a), which is a tree, but none of a star, path, cycle. (iii) If G ∼ = Zp × Zp × Zp := ha, b, c | ap = bp = cp = 1, ab = bc, ac = ca, bc = cbi, then I(G) contains C6 as a subgraph: ha, bi − hbi − hb, ci − hci − ha, ci − hai − ha, bi. So I(G) is neither a tree nor a cycle. (iv) If G ∼ = Q8 = ha, b | a4 = b4 = 1, a2 = b2 , ab = ba−1 i, then hai, hbi, habi, ha2 i are the only proper subgroups of G. It follows that I(Q8 ) ∼ = K1,3 , (2.1) which is a star; but neither a path nor a cycle. (v) If G ∼ = M8 = ha, b | a4 = b2 = 1, ab = ba−1 i, then hai, ha2 , bi, ha2 , abi, hbi, ha2 i, habi, ha2 bi, ha3 bi are the only proper subgroups of G. It follows that I(G) is as shown in Figure 1(b), which is a tree; but none of a star, path, cycle. 8 (vi) If G ∼ = Mp3 , p > 2, then subgroup lattice of Mp3 and Zp2 × Zp are isomorphic. It follows from Theorem 2.2 that I(G) is as in Figure 1(a), which is a tree, but none of a star, path, cycle. (vii) If G ∼ = (Zp × Zp ) o Zp := ha, b, c | ap = bp = cp = 1, ab = ba, ac = cacbc−1 = abi, then I(G) contains C6 as a subgraph: ha, bi − hbi − hb, ci − hci − ha, ci − hai − ha, bi. So I(G) is neither a tree nor cycle. Case 3: Let |G| = p2 q. Here we use the classification of groups of order p2 q given in [5, pp. 76-80]. Subcase 3a: Let G be abelian. (i) If G ∼ = Zp2 q , then it is easy to see that I(Zp2 q ) ∼ = P3 , (2.2) which is a path; but neither a star nor a cycle. (ii) If G ∼ = Zpq × Zp , then H := Zp × Zp , A := Zq × {e}, Hx := h(1, x)i (x = 0, 1, . . . , p − 1), Hp = h(0, 1)i, Ax := Hx A, are the only subgroups of G. It follows that I(G) is as shown in Figure 1(c), which is neither a tree nor a cycle. Subcase 3b: Let G be non-abelian. Subcase 3b(I): Let p < q. (i) If p - (q − 1), by Sylow’s Theorem, there are no non-abelian groups. (ii) If p | (q −1) but p2 - (q −1), then we have two groups. The first one is G1 ∼ = Zq oZp2 = 2 ha, b | aq = bp = 1, bab−1 = ai , ordq (i) = pi. Here ha, bi, hai bi (i = 1, 2, . . . , q), habp i, hbp i are the only proper subgroups of G1 . It follows that I(G1 ) is as shown in Figure 1(d), which is a tree; but none of a star, path, cycle. The second one is G2 = ha, b, c | aq = bp = cp = 1, bab−1 = ai , ac = ca, bc = cb, ordq (i) = pi. Then I(G) contains C6 as a proper subgraph: ha, bi − hbi − hb, ci − hci − ha, ci − hai − ha, bi and so I(G2 ) is neither a tree nor a cycle. 9 (iii) If p2 | (q − 1), then we have both groups G1 and G2 mentioned in (ii) of this subcase, 2 together with the group G3 = Zq o2 Zp2 = ha, b | aq = bp = 1, bab−1 = ai , ordq (i) = p2 i. In (ii) of this subcase, we already dealt with G1 , G2 . By Sylow’s Theorem, G3 has a unique subgroup, say H of order q, and has q Sylow-p subgroups of order p2 , say Hi , i = 1, 2, . . . , q ; for each i = 1, 2, . . . , q, Hi has a unique subgroup Hi0 of order p and G3 has a unique subgroup, say K of order pq. Here H is a subgroup of K; for each i = 1, 2, . . . , q, Hi0 is a subgroup of Hi , K; for each i = 1, 2, . . . , q, Hi is a subgroup of K; for each i = 1, 2, . . . , q, no two Hi contained in Hj and Hi ’ contained in Hj0 , for every i 6= j. It follows that I(G3 ) is shown in Figure 1(e), which is neither a tree nor a cycle. Subcase 3b(II): Let p > q. (i) If q - (p2 − 1), then there is no non-abelian group in this case. 2 (ii) If q | (p − 1), then we have two groups. The first group is G4 ∼ = Zp2 o Zq = ha, b | ap = bq = 1, bab−1 = ai , ordp2 (i) = qi. By Sylow’s Theorem, G4 has a unique subgroup H of order p2 ; H has a unique subgroup H 0 of order p and p2 Sylow q-subgroups of order q, say H1 , H2 ,. . ., Hp2 and p subgroups of order pq, say N1 , N2 , . . ., Np ; these are the only proper subgroups of G4 . It follows that I(G4 ) is as shown in Figure 1(f), which is a tree but none of a star, path, cycle. Second, we have a family of groups ha, b, c | ap = bp = cq = 1, cac−1 = ai , cbc−1 = t bi , ab = ba, ordp (i) = qi. As q > 2, there are (q + 3)/2 isomorphism types in this family (one for t = 0 and one for each pair {x, x−1 } in Fpx ). We will refer to all these groups as G5(t) of order p2 q. Then I(G(5t) ) contains C6 as a subgraph: ha, bi − hbi − hb, ci − hci − ha, ci − hai − ha, bi. So I(G5(t) ) is neither a tree nor a cycle. (iii) If q | (p + 1), then we have only one group of order p2 q, given by G6 ∼ = (Zp × Zp ) o Zq =  ha, b, c | ap = bp = cq = 1, ab = ba, cac−1 = ai bj , cbc−1 = ak bl i, where ki jl has order q in GL2 (p). Then G6 has unique subgroup of order p2 , let it be H; p + 1 subgroups of order p, let them be Hi , i = 1, 2, . . ., p; p2 subgroups of order q; these are the only 10 ha2 , bi ha2 i h(p, 0)i ha2 , abi b b b h(p, 0), (0, 1)i b H Hb 0 A0 Hb 1 Ab 1 b b b b b b b b b b b Hp−1 b b b b b h(1, 0)i h(1, p − 1)i h(p, 1)i h(p, p − 1)i b b ha2 bi hbi hai (a) b b ha3 bi habi b Ap−1 b b Hp Ap (b) A (c) Hb b habp i hbp i b b b H b b b hai hbi haq−1 bi (d) b b H1 N b H1′ b b H1 Hp b Hq′ H2′ b b H2 Hq Np N 1 H′ b b Hp2 b b b H(p−1)p N2 b b Hp+1 (e) b H2p (f) Figure 1: (a) I(Zp2 × Zp ), (b) I(M8 ), (c) I(Zpq × Zp ), (d) I(Zq o Zp2 ), (e) I(Zq o2 Zp2 ), (f) I(Zp2 o Zq ) proper subgroups of G6 . It follows that I(G6 ) ∼ = K1,p+1 ∪ K p2 , (2.3) which is neither a tree nor a cycle. Note that if (p, q) = (2, 3), then subcases 3b(I) and 3b(II) are not mutually exclusive. Up to isomorphism, there are three non-abelian groups of order 12: Z3 o Z4 , D12 and A4 . We have already dealt with Z3 o Z4 , D12 in (ii) of Subcase 3b(I). But for A4 , we cannot use the same argument as in (iii) of Subcase 3b(II). Now A4 has unique subgroup of order 4, say H ; three subgroups of order 2, say H1 , H2 , H3 and four subgroups of order 3, say N1 , N2 , N3 , N4 . Here for each i = 1, 2, 3, Hi is a subgroup of H; for each i = 1, 2, 3, 4, Ni is not contained in any other subgroups of A4 ; no two remaining subgroups are adjacent in I(A4 ). Therefore, I(A4 ) ∼ = K1,3 ∪ K 4 , which is neither a tree nor a cycle. Case 4: Let |G| = pqr. (2.4) 11 If G ∼ = Zpqr , then let H1 , H2 , H3 , H4 , H5 , H6 be the subgroups of G of orders p, q, r, pq, pr, qr, respectively. Here H1 is a subgroup of H4 , H5 ; H2 is a subgroup of H4 , H6 ; H3 is a subgroup of H5 , H6 . So it turns out that I(G) ∼ = C6 , which is not a tree. If G is non-abelian, then G has a Sylow basis containing Sylow p, q, r-subgroups, let them be H1 , H2 , H3 , respectively and so H1 H2 , H2 H3 , H1 H3 are proper subgroups of G. It follows that I(G) contains C6 as a proper subgraph: H1 − H1 H2 − H2 − H2 H3 − H3 − H1 H3 − H1 . So I(G) neither a tree nor a cycle. Proof follows by combining all the above cases together. In the next result, we characterize some groups by using their inclusion graph of subgroups. Corollary 2.3. Let G be a group. (1) If I(G) ∼ = I(Q8 ), then G ∼ = Q8 ; (2) If I(G) ∼ = I(M8 ), then G ∼ = M8 . (3) If I(G) ∼ = I(Z9 o Z2 ), then G ∼ = Z9 o Z2 Proof. By Theorem 2.8(2), I(Q8 ), I(M8 ), I(Z9 o Z2 ) are trees and by (2.1), Figures 1(b) and 1(f), these trees uniquely determines the corresponding group. Hence the proof. Theorem 2.9. Let G be a group. Then I(G) is connected if and only if I (G) is connected. Proof. Since I(G) is a spanning subgraph of I (G), so if I (G) is connected, then so is I (G). Now let H, K be two adjacent vertices in I (G). Then exactly one of the following holds: H ⊂ K, K ⊂ H, neither H ⊂ K nor K ⊂ H but |H ∩ K| > 1. If one of the first two possibilities holds, then H and K are adjacent in I(G). If the third condition holds, then H − H ∩ K − K is a path in I(G). So it follows that if I (G) is connected, then so is I(G). In [9], Rulin Shen et al classified all the finite groups whose intersection graphs of subgroups are disconnected. So as a consequence of Theorem 2.9, we have the following result. 12 Corollary 2.4. Let G be a finite group. Then I(G) is disconnected if and only if G is one of Zp × Zq , where both p, q are primes, or a Frobenius group whose complement is a prime order group and the kernel is a minimal normal subgroup. Theorem 2.10. Let G be a finite abelian group and p, q, r be distinct primes. Then I(G) is planar if and only if G is one of Zpα (α = 2, 3, 4, 5), Zpα q (α = 1, 2, 3, 4), Zp2 q2 , Zpqr , Zp2 qr , Zpqrs , Zp × Zp , Zp2 × Zp or Zpq × Zp . Proof. Let |G| = pα1 1 pα2 2 . . . pαk k , where pi ’s are distinct primes and αi ≥ 1. Case 1: Let G be abelian. Subcase 1a: k = 1. By Theorem 2.4, I(G) is planar if and only if α = 2, 3, 4, 5. Subcase 1a: k = 2. (i) If either α1 ≥ 5 or α2 ≥ 5, then L(G) has a chain of length at least four and so I(G) contains K5 as a subgraph. This implies that I(G) is non-planar. (ii) If α1 ≥ 3 and α2 ≥ 2, then G has a subgroups H1 , H2 , H3 , N1 , N2 , N3 of orders p1 , p2 , p1 p2 , p21 p2 , p21 p22 , p1 p22 , respectively and so K3,3 is a subgraph of I(G) with bipartition X := {H1 , H2 , H3 } and Y := {N1 , N2 , N3 }. This implies that I(G) is non-planar. (iii) If α1 = 4 and α2 = 1, then G has subgroups of order p1 , p21 , p31 , p41 , p2 , p1 p2 , p21 p2 , p31 p2 , let them be Hi , i = 1, 2, . . . , 8, respectively and these are the only proper subgroups of G. Here I(G) is planar and a corresponding plane embedding is shown in Figure 2(a). (iv) If α1 ≤ 3 and α2 = 1, then I(G) is a subgraph of I(Zp41 p2 ) and so I(G) is planar. (v) If α1 = 2 and α2 = 2, then G has subgroups of order p1 , p21 , p2 , p22 , p1 p2 , p21 p2 , p1 p22 , let them be Hi , i = 1, 2, . . . , 7 respectively and these are the only proper subgroups of G. Here I(G) is planar and a corresponding plane embedding is shown in Figure 2(b). Subcase 1b: k = 3. (i) If α1 ≥ 3, α2 = 1 = α3 , then let H1 , H2 , H3 , N1 , N2 , N3 be subgroups of G of orders p1 , p2 , p1 p2 , p1 p2 p3 , p21 p2 , p21 p2 p3 , respectively. Then K3,3 is a subgraph of I(G) with bipartition X := {H1 , H2 , H3 } and Y := {N1 , N2 , N3 } and so I(G) is non-planar. 13 H8 Hb 7 H1 b H7 b b b H2 H5 b H4 b b H5 b b H4 b H6 H5 H1 H3 H4 b H2 b b H6 H3 (a) H3 b H1 b b b b H10 H6 b b b b H9 H7 (b) b b H2 H8 (c) H9 b H14 b H2 b H8 b H5 H3 b b b b b H6 H13 H12 H1 H11 H10 b b H1 H2 H3 b b H9 b b H6 b b H4 b H8 H7 b b b b b H4 (d) H5 H7 b H12 b H10 b H11 (e) Figure 2: (a) I(Zp41 p2 ), (b) I(Zp21 p22 ), (c) I(Zp21 p2 p3 ), (d) I(Zp1 p2 p3 p4 ), (e) a subdivision of K3,3 in I(Zp × Zp × Zp ) (ii) If α1 , α2 ≥ 2, α3 ≥ 1, then we can use a similar argument as in (i) above to show I(G) is non-planar. (iii) α1 = 2, α2 = 1 = α3 , then G has subgroups of order p1 , p21 , p2 , p3 , p1 p2 , p1 p3 , p21 p2 , p2 p3 , p21 p3 , p1 p2 p3 , let them be Hi , i = 1, . . . , 10 respectively and these are the only proper subgroups of G. Here I(G) is planar and a corresponding plane embedding is shown in Figure 2(c). (iv) If α1 = α2 = α3 = 1, then I(G) is a subgraph of I(Zp2 qr ) and so I(G) is planar. Subcase 1c: k = 4. (i) If α1 ≥ 2, α2 , α3 , α4 ≥ 1, then let H1 , H2 , H3 , N1 , N2 , N3 be subgroups of G of orders p1 , p2 , p1 p2 , p1 p2 p3 , p1 p2 p4 , pα1 1 p2 p3 , respectively and so K3,3 is a subgraph of I(G) with bipartition X := {H1 , H2 , H3 } and Y := {N1 , N2 , N3 }. This implies that I(G) is non-planar. (ii) If α1 = α2 = α3 = α4 = 1, then G has subgroups of order p1 , p2 , p3 , p4 , p1 p2 , p1 p3 , 14 p1 p4 , p2 p3 , p2 p4 , p3 p4 , p1 p2 p3 , p1 p2 p4 , p1 p3 p4 , p2 p3 p4 , let them be Hi , i = 1, 2, . . . , 14 respectively and these are the only proper subgroups of G. Here I(G) is planar and a corresponding plane embedding is shown in Figure 2(d). Subcase 1d: k ≥ 5. Let H1 , H2 , H3 , N1 , N2 , N3 be subgroups of G of orders p1 , p2 , p1 p2 , p1 p2 p3 , p1 p2 p4 , p1 p2 p5 , respectively and so K3,3 is a subgraph of I(G) with bipartition X := {H1 , H2 , H3 } and Y := {N1 , N2 , N3 }. This implies that I(G) is non-planar. Case 2: Let G be non-cyclic. (i) If G ∼ = Zp × Zp , then by Corollary 2.2(1), I(G) is planar. (ii) If G ∼ = Zp2 × Zp , then by Figure 1(a), I(G) is planar. (iii) If G ∼ = Zpq × Zp , then by Figure 1(c), I(G) is planar. (iv) If G ∼ = Zp2 q × Zp , then Zp2 × Zp is a subgroup of G and by Figure 1(a), G has a unique subgroup of order p, say H; let H1 , H2 , H3 be subgroups of Zp2 × Zp of order p2 ; let N be a subgroup of G of order q. Then K3,3 is a subgraph of I(G) with bipartition X := {H1 N , H2 N , H3 N }, Y := {N , H HN } and so I(G) is non-planar. 2 2 (v) If G ∼ = Zp2 × Zp2 = ha, b | ap = bp , ab = bai, then K3,3 is a subgraph of I(G) with bipartition X := {ha, bp i hap , bi, hap , bp i}, Y := {hap i, hbp i, hap bp i} and so I(G) is non-planar. (vi) If G ∼ = Zp × Zp × Zp , then H1 := h(1, 0, 0)i, H2 := h(0, 1, 0)i, H3 := h(0, 0, 1)i, H4 := h(0, 1, 1)i, H5 := h(1, 0, 1)i, H6 := h(1, 1, 0)i, H7 := h(1, 0, 0), (0, 1, 1)i, H8 := h(0, 1, 0), (1, 0, 1)i, H9 := h(0, 0, 1), (1, 1, 0)i, H10 := h(1, 0, 0), (0, 0, 1)i, H11 := h(1, 0, 0), (0, 1, 0)i, H12 := h(0, 1, 0), (0, 0, 1)i are subgroups of G. Here I(G) has a subdivision of K3,3 as a subgraph, which is shown in Figure 2(e) and so I(G) is non-planar. (vii) If G ∼ = Zpα1 1 × Zpα2 2 × · · · ×Zpαk , where k ≥ 3, pi ’s are primes and at least two of them k are equal (since G is non-cyclic, all the primes cannot be distinct here), αi ≥ 1 are integers, i = 1, . . . , k. Then, G has one of Zp2i pj × Zpi , Zp2i × Zp2i or Zpi × Zpi × Zpi as a subgroup for some i and j, i 6= j. So by the above arguments, it follows that I(G) is non-planar. 15 Proof follows by putting together the above cases. Theorem 2.11. If G is a finite abelian group, then diam(I(G)) ∈ {1, 2, 3, 4, ∞}. Proof. If I(G) is disconnected, then diam(I(G)) = ∞. Now we assume that I(G) is con- nected. If G ∼ = Zpα , where p is a prime and α > 1, then by Theorem 2.4, it follows that diam(I(G)) = 1. Now we assume that G  Zpα . Since I(G) is connected, so the order of not every proper subgroup of G is a prime. Let H, K be two proper subgroups of G. If |H|, |K| are prime, then HK is a proper subgroup of G and so H − HK − K is a path from H to K. If |H| is a prime, |K| is not a prime, then H − HK 0 − K 0 − K is a path from H to K, where K 0 is a proper subgroup of K. If |H|, |K| are not primes and |H ∩ K| = 1, then H − H 0 − H 0 K 0 − K 0 − K is a path from H to K, where H 0 , K 0 are proper subgroups of H, K respectively. If |H|, |K| are not primes and |H ∩ K| > 1, then H − H ∩ K − K is a path from H to K. Thus we have shown that diam(I(G)) ≤ 4. It is easy to see that diam(I(Zp2 q2 )) = 2, diam(I(Zp2 × Zp )) = 3, diam(I(Zpq × Zpq )) = 4. So this shows that diam(I(G)) takes all the values in {1, 2, 3, 4, ∞} and the proof is complete. Our next aim is to prove the following result, which describes the girth of the intersection graph of subgroups of finite groups and classifies all the finite groups whose inclusion graph of subgroups is K1,3 -free. Theorem 2.12. Let G be a finite group and p, q be distinct primes. Then (1) girth(I(G)) ∈ {3, 6, ∞}; (2) I(G) is K1,3 -free if and only if G is one of Zpα (α = 2, 3, 4), Zpα q (α = 1, 2), Zpqr , Zp × Zp or Zq o Zp ; To prove the above theorem, we start with the following result. Proposition 2.1. Let G be a group of order pα , where p is a prime and α ≥ 2. Then (1) girth(I(G)) ∈ {3, 6, ∞}; (2) I(G) is K1,3 -free if and only if G is either Zpα (α = 2, 3, 4) or Zp × Zp . 16 Proof. Proof is divided in to two cases. Case 1: Let α ≥ 4. Then G has a chain of subgroups of length at least four and so I(G) contains C3 as a subgraph. Hence girth(I(G)) = 3. If G ∼ = Zpα , then by Theorem 2.4, I(G) is K1,3 -free only when α = 2, 3, 4. If G  Zpα , then G has at least two subgroups of order pα−1 , let them be H1 , H2 . Also since |H1 ∩ H2 | = pα1 −2 , H1 ∩ H2 has a subgroup of order p1 , let it be H3 . It follows that I(G) contains K1,3 as a subgraph with bipartition X := {H3 } and Y := {H1 , H2 , H1 ∩ H2 }. Case 2: If α ≤ 3, then G is isomorphic to one of Zpα , Zp × Zp , Zp2 × Zp , Zp × Zp × Zp , Q8 , M8 , Mp3 (p > 2) or (Zp × Zp ) o Zp . (i) If G ∼ = Zp × Zp × Zp := ha, b, c | ap = bp = cp = 1, ab = ba, ac = ca, bc = cbi, then I(G) contains K1,3 as a subgraph with bipartition X := {ha, bi} and Y := {hai, hbi, habi}. By Case 2 in the proof of Theorem 2.8, we proved that I(G) contains C6 as a subgraph. Also by Corollary 2.2(2), I(G) is bipartite and so girth(I(G)) = 4 or 6. Suppose that I(G2 ) contains C4 as a subgraph. Let it be H1 − H2 − H3 − H4 − H1 . Then either H1 , H3 ⊂ H2 , H4 or H2 , H4 ⊂ H1 , H3 . Without loss of generality, we may assume that H1 , H3 ⊂ H2 , H4 . Then we must have |H1 | = p = |H3 |, |H2 | = p2 = |H4 | and this implies that hH1 , H2 i = H2 = H4 , which is not possible. so girth(I(G)) = 6. (ii) If G ∼ = (Zp × Zp ) o Zp := ha, b, c | ap = bp = cp = 1, ab = ba, ac = ca, cbc−1 = abi, then I(G) contains K1,3 as a subgraph with bipartition X := {ha, bi} and Y := {hai, hbi, habi}. In Case 2 in the proof of Theorem 2.8, we already proved that I(G) contains C6 as a subgraph. Also by Corollary 2.2(2), I(G) is bipartite and so girth(I(G)) = 4 or 6. As in part (i) of this Case, one can easily show that girth(I(G)) = 6. (iii) By Theorem 2.4, Corollary 2.2(1), Figures 1(a), 1(b) and (2.1), we see that the girth of the inclusion graph of subgroups of all the remaining groups is infinity and except Zp2 × Zp , they contains K1,3 as a subgraph. Proof follows from the above two cases. Proposition 2.2. Let G be a group of order pα q β , where p, q are distinct primes and α, β ≥ 1. Then 17 (1) girth(I(G)) ∈ {3, 6, ∞}; (2) I(G) is K1,3 -free if and only if G is either Zpq or Zp2 q . Proof. Proof is divided in to several cases. Case 1: If α = 1 = β, then G ∼ = Zpq or Zp o Zq . By Corollary 2.2(1), I(G) is totally disconnected and so I(G) is K1,3 -free and girth(I(G)) = ∞. Case 2: If α = 2, β = 1, then we need to consider the following subcases. Subcase 2a: Let G be abelian. If G ∼ = Zp2 q , then by (2.2), I(G) is K1,3 -free and girth(I(G)) = ∞. If G ∼ = Zpq × Zp , then by Figure 1(c), I(G) has K1,3 as a subgraph and girth(I(G)) = 6. Subcase 2b: Let G be non-abelian. We proceed with the groups considered in Subcase 3b in the proof of Theorem 2.8. (i) Since Zp × Zp is a subgroup of G2 , so Zp × Zp together with its proper subgroups forms K1,3 as a subgraph of I(G2 ). Moreover, we already proved that I(G2 ) contains C6 as a subgraph. By Corollary 2.2(2), I(G2 ) is bipartite and so girth(I(G2 )) = 4 or 6. Suppose that I(G2 ) contains C4 as a subgraph. Let it be H1 − H2 − H3 − H4 − H1 . Then either H1 , H3 ⊂ H2 , H4 or H2 , H4 ⊂ H1 , H3 . Without loss of generality we may assume that H1 , H3 ⊂ H2 , H4 . • If |H1 | = p1 = |H3 |, |H2 | = p21 = |H4 |, then hH1 , H2 i = H2 = H4 , which is not possible. • If |H1 | = p1 = |H3 |, |H2 | = p21 , |H4 | = p1 p2 , then H3 * H4 if H1 ⊂ H4 ; H1 * H4 , if H3 ⊂ H4 , which are not possible. • If |H1 | = p1 = |H3 |, |H2 | = p1 p2 = |H4 |, then also we get a contradiction as above. • If |H1 | = p1 , |H3 | = p2 , |H2 | = p1 p2 = |H4 |, then hH1 , H2 i = H2 = H4 , which is not possible. Hence girth(I(G2 )) = 6. (ii) We already proved that I(G5(t) ) contains C6 as a subgraph. Also Zp × Zp is a subgroup of G5(t) , so Zp × Zp together with its proper subgroups forms K1,3 as a subgraph of 18 I(G5(t) ). By Corollary 2.2(2), I(G5(t) ) is bipartite and so girth(I(G)) = 4 or 6. As in part (i) of this Subcase, one can easily show that girth(I(G)) = 6. (iii) By Figures 1(d), 1(e), 1(f), (2.3), (2.4), we see that the girth of the inclusion graph of subgroups of all the remaining groups is infinity and they contains K1,3 as a subgraph. Case 3: Let α ≥ 3 and β = 1. Then G has a chain of subgroups of length at least four and so girth(I(G)) = 3. If G is cyclic, then let H1 , H2 , H3 , H4 be the subgroups of G of orders p, q, p2 , p2 q respectively. Then I(G) contains K1,3 as a subgraph with bipartition X := {H4 } and Y := {H1 , H2 , H3 }. If G is non-cyclic abelian, then Zpq × Zp is a proper subgroup of G, so by Subcase 2a, I(G) contains K1,3 as a subgraph. Now we assume that G is non-abelian. Let P denote a Sylow p-subgroups of G. We shall prove that I(G) contains K1,3 as a subgraph. First let α1 = 3. If p > q, then np (G) = 1, by Sylow’s theorem and our group G ∼ = P o Zq . Suppose I(P ) is contains K1,3 , then I(G) also contains K1,3 , so it is enough to consider the case when I(G) is K1,3 -free. By 3 Proposition 2.1, we must have P ∼ = Zp3 . Then G ∼ = Zp3 o Zq := ha, b | ap = bq = 1, bab−1 = ai , ordp3 (i) = qi and I(G) contains K1,3 as a subgraph with bipartition X := {hap , bi} and 2 Y := {hap i, hap i, hbi}. Now, let us consider the case p < q and (p, q) 6= (2, 3). Here nq (G) = p is not possible. If nq (G) = p2 , then q|(p + 1)(p − 1) which implies that q|(p + 1) or q|(p − 1). But this is impossible, since q > p > 2. If nq (G) = p3 , then there are p3 (q − 1) elements of order q. However, this only leaves p3 q − p3 (q − 1) = p3 elements, and the Sylow p-subgroup must be normal, a case we already considered. Therefore, the only remaining possibility is that G ∼ = Zq o P . Suppose I(P ) contains K1,3 , then so is I(G). So it is enough to consider the case when I(G) is K1,3 -free. By Proposition 2.1, we must have P ∼ = Zp3 . Then 3 G∼ = Zq o Zp3 = ha, b | aq = bp = 1, bab−1 = ai , ordq (i) = pi, p | (q − 1) and I(G) contains 2 K1,3 as a subgraph with bipartition X := {ha, bp i} and Y := {hbp i, hbp i, hai}. If (p, q) = (2, 3), then [5, p.160] states that the only group of order 24 that is not a semi-direct product is S4 . Also A4 is a subgroup of S4 . So by (2.4), I(A4 ) contains K1,3 as a subgraph. Thus the result is true when α = 3. Next, let α1 > 3. Then P has a chain of subgroups of length at least 4 and so I(G) has 19 K4 as a subgraph. This implies that I(G) has K1,3 as a subgraph. Case 4: Let α1 , β ≥ 2. Since G is solvable, so it has a normal subgroup with prime index, say p2 , let it be H. Let H1 , H2 , H3 be subgroups of H of order p, p2 , q respectively, such that H1 ⊂ H2 . Then H, H1 , H2 forms C3 as a subgraph of I(G) and so girth(I(G)) = 3. Also, I(G) contains K1,3 as a subgraph with bipartition X := {H} and Y := {H1 , H2 , H3 }. Proposition 2.3. Let G be a solvable group whose order has at least three distinct prime factors. Then (1) girth(I(G)) ∈ {3, 6}; (2) I(G) is K1,3 -free if and only if G ∼ = Zpqr , where p, q, r are distinct primes. Proof. Let |G| = pα1 1 pα2 2 · · · pαk k , where pi ’s are distinct primes, k ≥ 3, αi ≥ 1. Case 1: Let k = 3. If α1 = α2 = α3 = 1, then in Case 4 in the proof of Theorem 2.8, we already proved that I(G) contains C6 as a subgraph. Also by Corollary 2.2(2), I(G) is bipartite and so girth(I(G)) = 4 or 6. By using a similar argument as in (i) of Subcase 2b in the proof of Proposition 2.2, one can easily see that girth(I(G)) = 6. If G ∼ = Zpqr , then by Theorem 2.8(1), I(G) is K1,3 -free. If G is non-abelian, then G has a non-cyclic subgroup of composite order, let it be H. It follows that H together with its proper subgroups forms K1,3 as a subgraph of I(G). Now let α1 ≥ 2, α2 , α3 ≥ 1. Since G is solvable, so it has a subgroup of order pα1 1 p2 , let it be H. Let H1 , H2 , H3 be subgroups of H of order p1 , pα1 1 , p2 respectively with H1 ⊂ H2 . It follows that girth(I(G)) = 3 and I(G) contains K1,3 as a subgraph with bipartition X := {H} and Y := {H1 , H2 , H3 }. Case 2: k ≥ 4. Since G is solvable, so it has a subgroup of order pα1 1 pα2 2 pα3 3 , let it be H. Let H1 , H2 , H3 be subgroups of H of order p1 , pα1 1 p2 , p2 respectively with H1 ⊂ H2 . It follows that girth(I(G)) = 3 and I(G) contains K1,3 as a subgraph with bipartition X := {H} and Y := {H1 , H2 , H3 }. Proof follows from the above two cases. It is well known that any non-solvable group has a simple group as a sub-quotient and every simple group has a minimal simple group as a sub-quotient. So if we can show that the inclusion graph of subgroups of a minimal simple group contains a graph X as a subgraph, 20 then by Theorem 2.3, the inclusion graph of subgroups of a non-solvable group also contains X. Recall that SLm (n) is the group of m × m matrices having determinant 1, whose entries are lie in a field with n elements and that Lm (n) = SLm (n)/H, where H = {kI|k m = 1}. For any prime q > 3, the Suzuki group is denoted by Sz(2q ). For any integer n ≥ 3, the dihedral group of order 2n is given by D2n = ha, b | an = b2 = 1, ab = ba−1 i. Note that K1,3 is a subgraph of I(D4n ) with bipartition X := {ha2 , bi} and Y := {ha2 i, ha2 bi, hbi}. Lemma 2.1. I(D4n ) contains K1,3 as a subgraph, for n ≥ 3. Proposition 2.4. If G is a finite non-solvable group, then I(G) has K1,3 as a subgraph and girth(I(G)) = 3. Proof. If we show that I(G) contains K2 + K 3 as a subgraph, then it follows that I(G) contains K1,3 as a subgraph and girth(I(G)) = 3. As mentioned above, to prove this, it is enough to show that the inclusion graph of subgroups of minimal simple groups contains K2 +K 3 as a subgraph. We use the J. G. Thompson’s classification of minimal simple groups given in [13] and check this for this list of groups. We will denote the image of a matrix A in Lm (n) by A. Case 1: G ∼ = L2 (q p ). If p = 2, then the only non-solvable group is L2 (4) and L2 (4) ∼ = A5 . Also A4 is a subgroup of A5 , and so by (2.4), A4 together with its proper subgroups forms K2 + K 3 as a subgraph of I(G). If p > 2, then L2 (q p ) contains a subgroup isomorphic to (Zq )p , namely the subgroup of matrices of the form ( 10 a1 ) with a ∈ Fqp . By Proposition 2.1, I((Zq )p ), p > 2 contains K1,3 as a subgraph and so (Zq )p together with proper its subgroups forms K2 + K 3 as a subgraph of I(G). Case 2:: G ∼ = L3 (3). Note that L3 (3) ∼ = SL3 (3). Let us consider the subgroup consisting   1 a b of matrices of the form 0 1 c with a, b, c ∈ F3 . This subgroup is isomorphic to the group 0 0 1 (Zp ×Zp )oZp with p = 3. By Proposition 2.1, I((Zp ×Zp )oZp ) contains K1,3 as a subgraph. So (Zp × Zp ) o Zp together with its proper subgroups forms K2 + K 3 as a subgraph of I(G). Case 3: G ∼ = L2 (p). Note that here H = {±I}. We have to consider two subcases: Subcase 3a: p ≡ 1 (mod 4). Then L2 (p) has a subgroup isomorphic to Dp−1 [4, p. 222]. So, by Lemma 2.1, Dp−1 together with its proper subgroups forms K2 + K 3 as a subgraph of 21 I(G), when p > 5. If p = 5, then L2 (5) ∼ = A5 ∼ = L2 (4), which we already dealt. Subcase 3b: p ≡ 3 (mod 4). L2 (p) has a subgroup isomorphic to Dp+1 [4, p. 222]. By Lemma 2.1, Dp+1 together with its proper subgroups forms K2 + K 3 as a subgraph of I(G), when p > 7. If p = 7, then S4 is a maximal subgroup of L2 (7). Since A4 is a subgroup of S4 , we already dealt this case. Case 4: G ∼ = Sz(2q ). Then Sz(2q ) has a subgroup isomorphic to (Z2 )q , q ≥ 3. By Proposition 2.1, I((Z2 )q ), q > 2 contains K1,3 as a subgraph; (Z2 )q together with its proper subgroups forms K2 + K 3 as a subgraph of I(G). Proof follows by putting together all the above cases. Combining the Propositions 2.1 – 2.4, we obtain the proof of Theorem 2.12. References [1] S. Akbari, M. Habibi, A. Majidinya, and R. Manaviyat, The inclusion ideal graph of rings, Comm. Algebra 43 (2015) 2457–2465. [2] S. Akbari, F. Heydari and M. Maghasedi, The intersection graph of group, J. Algebra. Appl. 5 (2015) Article No. 1550065, 9 pp. [3] Atlas of Finite Group Representations, http://brauer.maths.qmul.ac.uk/Atlas/ (version 2) [4] J. P. Bohanon and Les Reid, Finite groups with planar subgroup lattices, J. Algebraic Combin. 23 (2006) 207–223. [5] W. Burnside, Theory of groups of finite order, Dover Publications, Cambridge, 1955. [6] B. Csákány and G. Pollák, The graph of subgroups of a finite group (Russian), Czechoslovak Math. J. 19 (1969) 241–247. [7] F. N. Cole and J. W. Glover. On groups whose orders are products of three prime factors, Amer. J. Math. 15 (1893) 191–220. [8] F. Harary, Graph Theory, Addison-Wesley, Philippines, 1969. 22 [9] Rulin Shen and Enshi, Intersection graphs of subgroups of finite groups, Czechoslovak Math. J. 60 (2010) 945–950. [10] R. Schmidt, Subgroup lattices of groups, Expositions in Math., vol. 14, de Gruyter, 1994. [11] R. Schmidt, Planar subgroup lattices, Algebra Universalis 55 (2006) 3-12. [12] C. L. Starr and G. E. Turner III, Planar groups, J. Algebraic Combin. 19 (2004), 283295. [13] J. G. Thompson, Nonsolvable finite groups all of whose local subgroups are solvable I, Bull. Amer. Math. Soc. 74 (1968) 383–437.
4math.GR
1 On Submodularity and Controllability in Complex Dynamical Networks arXiv:1404.7665v3 [math.OC] 30 Sep 2016 Tyler H. Summers, Fabrizio L. Cortesi, and John Lygeros Abstract—Controllability and observability have long been recognized as fundamental structural properties of dynamical systems, but have recently seen renewed interest in the context of large, complex networks of dynamical systems. A basic problem is sensor and actuator placement: choose a subset from a finite set of possible placements to optimize some real-valued controllability and observability metrics of the network. Surprisingly little is known about the structure of such combinatorial optimization problems. In this paper, we show that several important classes of metrics based on the controllability and observability Gramians have a strong structural property that allows for either efficient global optimization or an approximation guarantee by using a simple greedy heuristic for their maximization. In particular, the mapping from possible placements to several scalar functions of the associated Gramian is either a modular or submodular set function. The results are illustrated on randomly generated systems and on a problem of power electronic actuator placement in a model of the European power grid. I. I NTRODUCTION Controllability and observability have been recognized as fundamental structural properties of dynamical systems since the seminal work of Kalman in 1960 [19], but have recently seen renewed interest in the context of large, complex networks, such as power grids, the Internet, transportation networks, and social networks. A prominent example of this recent interest is [26], which, based on Kalman’s rank condition and the idea of structural controllability [25], presents a graph theoretic maximum matching method to efficiently identify a minimal set of so-called driver nodes through which timevarying control inputs can move the system around the entire state space (i.e., render the system controllable). The method of [26] is applied across a range of technological and social systems, leading to several interesting and surprising conclusions. Using a metric of controllability given by the fraction of driver nodes in the minimal set required for complete controllability, it is shown that sparse inhomogeneous networks are difficult to control while dense homogeneous networks are easier. It is also shown that the minimum number of driver nodes is determined mainly by the degree distribution of the network. However, there is an implicit assumption about the diagonal entries of the dynamics matrix that restrict the application of their result [10]. Many other studies of controllability in complex networks have followed, including [37], [31], [45], [47], [43]. The authors are with the Automatic Control Laboratory, ETH Zurich, Switzerland, email: {tsummers,jlygeros}@control.ee.ethz.ch This work is partially supported by the ETH Zurich Postdoctoral Fellowship Program. Preliminary versions of results in this paper appeared in [40], [9]. Here, we present the work in a unified framework, provide modified and simplified proofs of the main results, and revise and elaborate on the numerical examples. One issue with the approach taken by [26] and much of the follow-up work is that the exclusive focus on structural controllability and the associated quantitative notion of controllability (namely, the number/fraction of required driver nodes) can be rather crude and even misleading in some settings. This was noted, for example, by [29] in response to the surprising result in [26] that genetic regulatory networks seem to require many driver nodes, which apparently contradicts other findings in biological literature on cellular reprogramming. This suggests that rather than finding a set of driver nodes that would render a network completely controllable, a more appropriate strategy might be to choose from a finite set of possible actuator and sensor placements the subset that optimizes some real-valued controllability and observability metrics of the network. There is a variety of more sophisticated metrics for controllability and observability that have been proposed in the systems and control literature on sensor and actuator placement or selection problems in dynamical systems; see, e.g., the survey paper [44]. One important class of metrics involves the controllability and observability Gramians, which are symmetric positive semidefinite matrices whose structure relates energy notions of controllability and observability. The use of Gramians as quantitative metrics of controllability in networks is studied in [37], [46], [4], [42], [34]. Other important studies of controllability in networks include [39], [36], [33]. While a variety of metrics have been proposed in the literature [44], the corresponding combinatorial optimization problems for sensor and actuator placement are less wellunderstood. These can be solved by brute force for small problems by testing all possible placement combinations. However, for problems that arise in large networks, testing all combinations quickly becomes infeasible. Only very recently in the context of large networks have researchers started to investigate combinatorial properties of sensor and actuator placement problems for optimizing system dynamics and control metrics. Clark et al. have recently considered a related but different problem of leader selection in networks with consensus dynamics, in which a set of leader states are selected to act as control inputs to the system [7], [8], [6]. In [7], [8], it is shown that the minimum mean square error due to link noise is a supermodular function of the leader set. In [6] it is shown that a graph controllability index, which is related to the structural controllability framework of [25], is a submodular function of the leader set. As discussed below, these properties allow for suboptimality guarantees using simple greedy algorithms. In the present paper, we show that one important class of metrics of controllability and observability, previously thought to lead to difficult combinatorial optimization problems [44], 2 can be in fact easily optimized, even for very large networks. In particular, we show that the mapping from subsets of possible actuator/sensor placements to any linear function of the associated controllability or observability Gramian has a strong structural property: it is a modular set function. Furthermore, we show that the rank of the Gramian, the log determinant of the Gramian, and the negative trace of the inverse Gramian are submodular set functions. Although maximization of submodular functions is difficult, submodularity allows for an approximation guarantee if one uses a simple greedy heuristic for their maximization [30]. We also describe how these observations define new dynamic network centrality measures for networks whose dynamics are described by linear models, assigning a control energy-related “importance” value to each node in the network. We illustrate the results on randomly generated systems and on a problem of power electronic actuator placement in a model of the European power grid. The rest of the paper is organized as follows. Section II reviews the network model and Gramian-based controllability metrics. Section III introduces the notions of modular, submodular, and supermodular set functions and shows our main results that several set functions mapping possible actuator placements to various functions of the controllability Gramian are either modular or submodular. Section IV presents illustrative numerical examples. Finally, Section V gives concluding remarks and and outlook for future research. II. L INEAR M ODELS OF N ETWORK DYNAMICS This section defines a linear model for network dynamics and reviews and interprets metrics for controllability based on the controllability Gramian. The material in this section is mostly standard and can be found in many texts on linear system theory, e.g. [17], [3]; we discuss the material mostly to set our notation. Since controllability and observability are dual properties [18], we focus only on controllability and actuator placement; all of the results have analogous counterparts and interpretations for observability and sensor placement. In the literature on controllability in networks, it is common to start with linear network models. In this spirit, we focus on linear, time-invariant dynamical network models, in which the dynamics are given by ẋ(t) = Ax(t) + Bu(t), y(t) = Cx(t), x(0) = x0 , (1) where x(t) ∈ Rn are the states of the network, u(t) ∈ Rm are the control inputs that can be used to influence the network dynamics, y(t) ∈ Rp are the outputs, and A, B, and C are constant matrices of appropriate dimensions. We assume that C is full row rank. For example, x(t) might represent voltages, currents, or frequencies in devices in a power grid, chemical species concentrations in a genetic regulatory network, or individual opinions or propensities for product adoption in a social network. The matrix C ∈ Rp×n is typically interpreted as a set of linear state measurements, but here we will interpret it as a weight matrix whose rows define important directions in the state space. The dynamics matrix A induces a graph G(V, E) of the network in which the vertices correspond to states, i.e., V = {1, ..., n} and the edges correspond to non-zero entries of A, i.e., (i, j) ∈ E whenever aji 6= 0. The non-zero entries of the input matrix B describe how each actuator affects the nodes in the network. When optimizing actuator placement, one effectively designs a network structure by connecting sets of inputs to sets of network nodes to optimize a metric controllability for the resulting network. A. Controllability Definition 1 (Controllability). A dynamical system is called controllable over a time interval [0, t] if given any states x0 , x1 ∈ Rn , there exists an input u(·) : [0, t] → Rm that drives the system from x0 at time 0 to x1 at time t. Kalman’s well-known rank condition states that a linear dynamical system is controllable if and only if [B, AB, ..., An−1 B] is full rank. Since rank is a generic property of a matrix, it has the same value for almost all values of the non-zero entries of A and B (assuming that the nonzero entries are independent). This suggests that controllability can be cast as a structural property of the graph defined by A and B, as captured in the graph-theoretic concept of structural controllability described by Lin in [25], which underpins the recent results of [26]. However, it is informative and practically relevant to consider more quantitative metrics for controllability in complex networks. B. Energy-related controllability metrics Actuators in real systems are usually energy limited, so an important class of metrics of controllability deals with the amount of input energy required to reach a given state from the origin. The symmetric positive semidefinite matrix Z t T Wc (t) = eAτ BB T eA τ dτ ∈ Rn×n (2) 0 is called the controllability Gramian at time t and provides an energy-related quantification of controllability. Eigenvectors of Wc associated with small eigenvalues (large eigenvalues of Wc−1 ) define directions in the state space that are less controllable (require large input energy to reach), and eigenvectors of Wc associated with large eigenvalues (small eigenvalues of Wc−1 ) define directions in the state space that are more controllable (require small input energy to reach). For stable systems, the state transition matrix eAt comprises decaying exponentials, so a finite positive definite limit of the controllability Gramian always exists and is given by Z ∞ T Wc = eAτ BB T eA τ dτ ∈ Rn×n . (3) 0 This infinite-horizon controllability Gramian can be computed by solving a Lyapunov equation AWc + Wc AT + BB T = 0, (4) 3 which is a system of linear equations and is therefore easily solvable. Specialized algorithms have been developed to compute the solution [1], [15], [24] and scale to large networks. We will focus on the infinite-horizon Gramian due to ease of computation. However, all of our results also apply to the finite-horizon Gramian, with the only disadvantage being that one must evaluate (2) rather than solve (4), which may be more difficult for large networks. An advantage of the finite-horizon Gramian is that it can be used for unstable systems. An alternative definition and interpretation of the Gramian for unstable systems can be used to quantify controllability [48], but we do not discuss this interpretation further in the interest of simplicity. It is worth keeping in mind that though the results are stated for asymptotically stable systems, they apply more generally. The controllability Gramian gives a more sophisticated energy-related quantitative picture of controllability, but we still need to form a scalar metric for Wc , which is a positive semidefinite matrix. We want Wc “large” so that Wc−1 is “small”, requiring small amount of input energy to move around the state space. There are a number of possible metrics for the size of Wc , several of which we now discuss. 1) tr(Wc ): The trace of the Gramian is inversely related to the average energy and can be interpreted as the average controllability in all directions in the state space. It is also closely related to the system H2 norm:  Z kHk22 = tr C ∞ T eAt BB T eA t dtC T 0  (5) T = tr(CWc C ), 4) λmin (Wc ): The smallest eigenvalue of the Gramian is a worst-case metric inversely related to the amount of energy required to move the system in the direction in the state space that is most difficult to control. 5) rank(Wc ): The rank of the Gramian is the dimension of the controllable subspace. Remark 1. Our main results and much of the discussion generalize straightforwardly to linear time-varying systems. The only differences are that the Gramian depends on both initial and final time, rather than just their difference, and that it must be computed by integrating (2), rather than by solving a Lyapunov equation. In the following section, we briefly review the combinatorial notion of submodularity and consider which of the above controllability metrics have a submodularity property, which provides global optimality or approximation guarantees for associated actuator selection problems. III. O PTIMAL S ENSOR AND ACTUATOR P LACEMENT IN N ETWORKS A. Set Functions, Modularity, and Submodularity Sensor and actuator placement problems can be formulated as set function optimization problems. For a given finite set V = {1, ..., M }, a set function f : 2V → R assigns a real number to each subset of V . In our setting, the elements of V represent potential locations for the placement of actuators in a dynamical system, and the function f is a metric for how controllable the system is for a given set of placements. We consider set function optimization problems of the form maximize i.e., the system H2 norm is a weighted trace of the controllability Gramian. 2) tr(Wc−1 ): The trace of the inverse controllability Gramian is proportional to the energy needed on average to move the system around on the state space. Note that when the system is uncontrollable, the inverse Gramian does not exist and the average energy is infinite because there is at least one direction in which it is impossible to move the system using the inputs. In this case, one could consider the trace of the pseudoinverse, which is the average energy required to move the system around the controllable subspace. 3) log det Wc : The determinant of the Gramian is related to the volume enclosed by the ellipse it defines V (Emin ) = p π n/2 n det Wc , Γ(n/2 + 1) where Γ is the Gamma function. This means that the determinant is a volumetric measure of the set of states that can be reached with one unit or less of input energy. Since determinant is numerically problematic in high dimensions, and because the logarithm is monotone, we will consider optimizing log det Wc . Note that for uncontrollable systems, the ellipsoid volume is zero, so log det Wc = −∞. In this case, one could consider the associated volume in the controllable subspace. S⊆V, |S|=k f (S). (6) The problem is to select a k-element subset of V that maximizes f . This is a finite combinatorial optimization problem, so one can solve it by brute force simply by enumerating all possible subsets of size k, evaluating f for all of these subsets, and picking the best subset. However, we are interested in cases arising from complex networks in which the number of possible subsets is very large. The number of possible subsets grows factorially as |V | increases, so the brute force approach quickly becomes infeasible as |V | becomes large. We focus instead on structural properties of the set function f that make it more amenable to optimization. In particular, submodularity plays a similar role in combinatorial optimization to convexity in continuous optimization and shares other features of concave functions [27], [21]. It occurs often in applications [2], [20], [22] (though is underexplored in systems and control theory); is preserved under various operations, allowing design flexibility; is supported by an elegant and practically useful mathematical theory; and there are efficient methods for minimizing and approximation guarantees for maximizing submodular functions. Definition 2 (Submodularity). A set function f : 2V → R is called submodular if for all subsets A ⊆ B ⊆ V and all elements s ∈ / B, it holds that f (A ∪ {s}) − f (A) ≥ f (B ∪ {s}) − f (B), (7) 4 or equivalently, if for all subsets A, B ⊆ V , it holds that f (A) + f (B) ≥ f (A ∪ B) + f (A ∩ B). (8) Intuitively, submodularity is a diminishing returns property where adding an element to a smaller set gives a larger gain than adding one to a larger set. This is made precise by the following result from [27], which will be useful for verifying submodularity of set functions later. Definition 3. A set function f : 2V → R is called monotone increasing if for all subsets A, B ⊆ V it holds that A ⊆ B ⇒ f (A) ≤ f (B), (9) and is called monotone decreasing if for all subsets A, B ⊆ V it holds that A ⊆ B ⇒ f (A) ≥ f (B). (10) Theorem 1 ([27]). A set function f : 2V → R is submodular if and only if the derived set functions fa : 2V −{a} → R fa (X) = f (X ∪ {a}) − f (X) are monotone decreasing for all a ∈ V . A set function is called supermodular if the reversed inequalities in (7) and (8) hold, and is called modular if it is both submodular and supermodular, i.e., for all subsets A, B ⊆ V , we have f (A ∩ B) + f (A ∪ B) = f (A) + f (B). A modular function has the following simple, equivalent characterization [27]: Theorem 2 (Modularity [27]). A set function f : 2V → R is modular if and only if for any subset S ⊆ V it can be expressed as X f (S) = w(∅) + w(s) (11) s∈S for some weight function w : V → R. Modular set functions are analogous to linear functions and have the property that each element of a subset gives an independent contribution to the function value. Consequently, one can see that if f is modular, the optimization problem (6) is easily solved by simply evaluating the set function for each individual element, sorting the result, and then choosing the top k individual elements from the sorted list to obtain the best subset of size k. Maximization of monotone increasing submodular functions is NP-hard, but the so-called greedy heuristic can be used to obtain a solution that is provably close to the optimal solution [30]. The greedy algorithm for (6) starts with an empty set, S0 ← ∅, computes the gain ∆( a | Si ) = f (Si ∪ {a}) − f (Si ) for all elements a ∈ V \Si and adds the element with the highest gain: Si+1 ← Si ∪ {arg max ∆( a | Si ) | a ∈ V \Si }. a The algorithm terminates after k iterations. Performance of the greedy algorithm is guaranteed by a well known bound [30]: Theorem 3 ([30]). Let f ∗ be the optimal value of the set function optimization problem (6), and let f (Sgreedy ) be the value associated with the subset Sgreedy obtained from applying the greedy algorithm on (6). If f is submodular and monotone increasing, then  k f ∗ − f (Sgreedy ) 1 k−1 ≤ ≈ 0.37. ≤ (12) f ∗ − f (∅) k e This is the best any polynomial time algorithm can achieve [11], assuming P 6= N P . Note that this is a worst-case bound; the greedy algorithm often performs much better than the bound in practice. We now demonstrate the modularity or submodularity of several classes of controllability metrics involving functions of the controllability Gramian. Recall that the space of symmetric n × n matrices S n is partially ordered by the semidefinite partial order: W1  W2 if W1 − W2  0. The space of symmetric positive definite n matrices is denoted S++ and the space of symmetric positive n semidefinite matrices is denoted S+ . B. Trace of the Gramian Suppose A ∈ Rn×n is a stable system dynamics matrix and V = {b1 , ..., bM } is a set of possible columns that can be used to form or modify the system input matrix B. The problem is to choose a subset of V to maximize a metric of controllability. We now consider a linear function of the controllability Gramian, which can be expressed as a weighted trace of the controllability Gramian. For a given S ⊆ V , we form BS = [B0 bs ] given a (possibly empty) existing matrix B0 and using the associated columns defined by s ∈ S, and we denote the associated controllability Gramian R∞ T WS = 0 eAτ BS BST eA τ dτ , which is the unique positive semidefinite solution the Lyapunov equation AWS + WS AT + BS BST = 0. (13) To simplify notation, we write Ws for W{s} . We have the following result. Theorem 4. The set function mapping subsets S ⊆ V to a linear function of the associated controllability Gramian, f (S) = tr(CWS C T ) for any weighting matrix C ∈ Rp×n , is modular. Proof: We will prove the result directly using Theorem 2. For any S ⊆ V it is easy to see that the controllability Gramian associated with BS is simply a sum of the controllability Gramians associated with the individual columns of BS : Z ∞ T WS = eAτ BS BST eA τ dτ Z0 ∞ X T = eAτ bs bTs eA τ dτ 0 = = s∈S XZ ∞ s∈S 0 X Ws . s∈S T eAτ bs bTs eA (14) τ dτ 5 Now since trace is a linear matrix function, we have for any weight matrix C ∈ Rp×n f (S) = tr(CWS C T ) ! X = tr CWs C T (15) s∈S = X tr(CWs C T ). s∈S Thus, for any s ∈ V , we can define the weight function w(s) = tr(CWs C T ). Defining w(∅) = 0, Theorem 2 implies that f (S) = tr(CWS C T ) is a modular set function. Theorem 4 shows that each possible actuator placement gives an independent contribution to the trace of the controllability Gramian. Because of this, the actuator placement problem using this metric is easily solved: one needs only to compute the metric individually for each possible actuator placement, sort the results, and choose the best k. Based on the interpretations in the previous section, this means that placing actuators in a complex network to maximize the average controllability available to move the system around the state space, or to maximize the energy in the system response to a unit impulse, is easily done. Since the result holds for the weighted trace, this gives considerable design freedom for actuator placement; important directions in the state space can be weighted and actuator placement done based on the weighted metric. C. Trace of the inverse Gramian We now consider the trace of the inverse of the controllability Gramian. We assume in this subsection that for any S ⊆ V the associated Gramian WS is invertible. This is the case, for example, if the network already has a set of actuators that provide controllability and we would like to add additional actuators to improve controllability. We discuss how to deal with non-invertibility of the Gramian in Section III.E. Theorem 5. Let V = {b1 , ..., bM } be a set of possible input matrix columns and WS the controllability Gramian associated with S ⊆ V . The set function f : 2V → R defined as f (S) = − tr(WS−1 ) is submodular and monotone increasing. Proof: We will use Theorem 1 to prove the result. Fix an arbitrary a ∈ V and consider the derived set function fa : 2V −{a} → R defined by −1 −1 fa (S) = − tr((WS∪{a} ) ) + tr((WS ) ) = − tr((WS + Wa )−1 ) + tr((WS )−1 ). Take any S1 ⊆ S2 ⊆ V − {a}. By the additivity property of the Gramian noted in Theorem 4 in (14), it is clear that S1 ⊆ S2 ⇒ WS1  WS2 . Define W (γ) = WS1 + γ(WS2 − WS1 ) for γ ∈ [0, 1]. Clearly, W (0) = WS1 and W (1) = WS2 . Now define fˆa (W (γ)) = − tr((W (γ) + Wa )−1 ) + tr((W (γ))−1 ). Note that fˆa (W (0)) = fa (S1 ) and fˆa (W (1)) = fa (S2 ). We have  d ˆ d  fa (W (γ)) = − tr((W (γ) + Wa )−1 ) + tr(W (t)−1 ) dγ dγ   = tr (W (γ) + Wa )−1 (WS2 − WS1 )(W (γ) + Wa )−1   − tr W (γ)−1 (WS2 − WS1 )W (γ)−1    −2 −2 = tr (W (γ) + Wa ) − W (γ) (WS2 − WS1 ) ≤ 0. To obtain the second equality we used the matrix derivative d d X(γ)−1 = X(γ)−1 dγ (X(γ))X(γ)−1 [35]. To formula dγ obtain the third equality we used the cyclic property of trace. Since (W (γ) + Wa )−2 − W (γ)−2  0 and WS2 − WS1  0, the last inequality holds because the trace of the product of a positive and negative semidefinite matrix is non-positive. Since Z 1 d ˆ ˆ ˆ fa (W (1)) = fa (W (0)) + fa (W (γ))dγ, dγ 0 it follows that fˆa (W (1)) = fa (S2 ) ≤ fˆa (W (0)) = fa (S1 ). Thus, fa is monotone decreasing, and f is submodular by Theorem 1. Finally, it can be seen from additivity of the Gramian (14) that f is monotone increasing, which just means that adding an actuator to the system cannot decrease its controllability. D. Log determinant of the Gramian We now consider the log determinant of the controllability Gramian. We assume again that for any S ⊆ V the associated Gramian is invertible. We have the following result. Theorem 6. Let V = {b1 , ..., bM } be a set of possible input matrix columns and WS the controllability Gramian associated with S ⊆ V . The set function f : 2V → R, defined as f (S) = log det WS is submodular and monotone increasing. Proof: The proof uses the same idea as before, namely, showing that the derived set functions fa : 2V −{a} → R fa (S) = log det WS∪{a} − log det WS = log det(WS + Wa ) − log det WS are monotone decreasing for any a ∈ V . For arbitrary a ∈ V , S1 ⊆ S2 ⊆ V − {a}, define again W (γ) = WS1 + γ(WS2 − WS1 ) for γ ∈ [0, 1] and fˆa (W (γ)) = log det(W (γ) + Wa ) − log det W (γ). We have d ˆ fa (W (γ)) dγ d = [log det(W (γ) + Wa ) − log det W (γ)] dγ = tr[(W (γ) + Wa )−1 (WS2 − WS1 )] − tr[W (γ)−1 (WS2 − WS1 )] = tr[((W (γ) + Wa )−1 − W (γ)−1 )(WS2 − WS1 )] ≤ 0. 6 d We used the matrix derivative formula dγ log det X(γ) = −1 d tr[X(γ) dγ X(γ)] [35] to obtain the second equality. The remainder of the proof follows the previous proof. with S ⊆ V . The set function f : 2V → R, defined as f (S) = rank(WS ) is submodular and monotone increasing. V Corollary 1.√The related set function g : 2 → R defined by g(S) = log n det WS is submodular and monotone increasing. Proof: We have 1 g(S) = log det WS . n Thus, from Theorem 6 g is a non-negatively scaled version of a submodular and monotone increasing function and therefore also submodular and monotone increasing. Not all directions in the state space may be of equal importance, one might want to use a weight matrix as an additional design parameter for an actuator selection problem. In a simple case, the weight matrix could be a diagonal matrix, assigning a relative weight to every state. We have the following corollary; the proof follows exactly the same arguments as in the previous theorems. Corollary 2. Let V = {b1 , ..., bM } be a set of possible input matrix columns and WS the controllability Gramian associated with S ⊆ V . The set functions g1 , g2 : 2V → R defined as g1 (S) = log det(CWS C T ), g2 (S) = − tr[(CWS C T )−1 ], where C ∈ Rp×n with p ≤ n and rank(C) = p, are submodular and monotone increasing. Remark 2. Interestingly, other combinatorial network design problems unrelated to controllability have a strikingly similar mathematical structure. Specifically, in [38] it is shown that problems in which one chooses sets of nodes or edges to optimize certain rigidity properties of a network, which relate to formation control and network localization objectives, are also submodular set function optimization problems for which greedy algorithms yield solutions with suboptimality guarantees. In that setting, one can define a “rigidity Gramian” to quantify desirable rigidity properties, and the results and proofs techniques are nearly identical to what we present in Theorems 4-6. Furthermore, problems in which one adds sets of edges to a network to optimize the coherence of the resulting network, which relates to robustness of consensus process to additive noise, also have a similar structure [41]. E. Rank of the Gramian The controllability metrics − tr(WS−1 ) and log det WS fail to distinguish amongst subsets of actuators that do not yield a fully controllable system. In particular, these functions are undefined, or are interpreted to return −∞, when the Gramian is not full rank. One way to handle cases where the controllability Gramian in not invertible is to consider its rank. The following result shows that this is also a submodular set function. Theorem 7. Let V = {b1 , ..., bM } be a set of possible input matrix columns and WS the controllability Gramian associated Proof: For two linear transformations V1 , V2 ∈ Rn×n , we have rank(V1 + V2 ) = rank(V1 ) + rank(V2 ) − dim(range(V1 ) ∩ range(V2 )). We can form gain functions fa : 2V −{a} → R fa (S) = rank(WS∪{a} ) − rank(WS ) (16) = rank(Wa ) − dim(range(WS ) ∩ range(Wa )). It is now easy to see that fa is monotone decreasing: the first term in the second line is constant and the second term decreases because dim(range(WS )) only increases with S. That f is monotone increasing is clear from additivity of the Gramian (14). Note that Olshevsky has analyzed a greedy algorithm for maximizing the rank of the controllability matrix, though not in a submodularity framework [33]. Another way to handle uncontrollable systems is to work with related continuous metrics defined for uncontrollable systems, such as the trace of the pseudoinverse tr(WS† ), which corresponds to the average energy required to move the system around the controllable subspace, or the log product of nonWS zero eigenvalues log Πrank λi (WS ), which relates to the i=1 “volume” of the subspace reachable with one unit of input energy. F. Smallest eigenvalue of the Gramian We have seen so far that the trace of the Gramian is a modular (and thus both sub- and supermodular) set function of actuator subsets and that the trace of the inverse Gramian, the log determinant of the Gramian, and the rank of the Gramian are submodular set functions. The first two functions are also concave matrix functions. Given the connections between submodular functions and concave functions, one might be tempted to conjecture that any concave function of the Gramian corresponds to a submodular function of actuator subsets. However, we now show by counterexample that this is false. Consider the set function f (S) = λmin (WS ), which corresponds to the concave matrix function that returns the smallest eigenvalue of the Gramian. We show an example where this function violates the diminishing gains property (7) of a set function f (S) ∆( s | A ) ≥ ∆( s | B ), where ∆( s | A ) = defined by " −8 A= 0 7 A ⊆ B ⊆ V, s ∈ / B, f (A ∪ {s}) − f (A). Consider the system 0 −2 0 # −2 −8 , −3 BV = [bV ] = I3 . 7 We see that the diminishing returns property holds in some cases, e.g., ∆( b3 | {b1 } ) = 0.037 ≥ 0.033 = ∆( b3 | {b1 , b2 } ), but is violated in others ∆( b3 | {b2 } ) = 0.001 ≤ 0.033 = ∆( b3 | {b1 , b2 } ). G. Dynamic network centrality measures Network centrality measures are real-valued functions that assign a relative “importance” to each node within a graph. Examples include degree, betweenness, closeness, and eigenvector centrality [32]. The meaning of importance and the relevance of various metrics depends highly on the modeling context. For example, PageRank, a variant of eigenvector centrality, turns out to be a much better indicator of importance than vertex degree in the context of networks of web pages, one of the core factors leading to Google’s domination of web search. In the context of complex dynamical networks, the controllability metrics described above can be used to define a control energy-based centrality measures, describing the importance of a node in terms of its ability to move the system around the state space with a low-energy time-varying control input. In particular, given a system dynamics matrix A ∈ Rn×n , imagine that it is possible to place an actuator at each individual node in the network; thus, define V = {e1 , ..., en }, where ei is the standard unit basis vector in Rn , i.e., ei has a 1 in the ith entry and zeros elsewhere. We define several Control Energy Centrality measures for a complex dynamical network as follows. Definition 4 (Control Energy Centralities). Given a complex network with n nodes and an associated stable linear dynamics matrix A ∈ Rn×n , we define the following Control Energy Centrality measures for each node i • Average Controllability Centrality CAC (i) = tr(Wi ), • i∈V Average Control Energy Centrality CACE (i) = −tr(Wi† ), • (17) i∈V (18) Volumetric Control Energy Centrality CV CE (i) = log rank YWi λj (Wi ), i ∈ V, (19) j=1 where Wi is the infinite-horizon controllability Gramian that satisfies AWi + Wi AT + ei eTi = 0. These measures provide more relevant quantities of centrality than purely graph based measures in the context of dynamical systems and control, and can give quite a different view of what nodes are important. The greedy algorithm for choosing nodes in which to inject control signals can be interpreted as choosing the most central node at each iteration, given the current set of controlled nodes. An interesting topic for future work would be to explore the distribution of the Control Energy Centrality measure in random networks and networks from various application domains. Pasqualetti et al. have also defined a different network centrality measure based on the controllability Gramian [34]. In the context of networks with consensus dynamics, Chapman and Mesbahi have also defined a related network centrality measure that quantifies effectiveness of each agent in tracking the mean of a noisy signal [5]. It is possible to define many other network centrality measures related to network dynamics and control, e.g., based on the leader selection metrics of Clark et al. [7], [6]. H. Computational scaling for large networks In this subsection we discuss computational techniques that can be used to scale the greedy algorithm described in Section III-A to large structured networks. First, specialized algorithms can be used to exploit sparsity and compute low rank solutions to Lyapunov equations. In particular, when computing the Gramian associated with an individual actuator, the Cholesky factor-alternating direction implicit algorithm of Li and White [24] allows one to exploit both the rankone structure of the constant term in the Lyapunov equation (viz., bbT ) and any sparsity structure in the network dynamics matrix A. Moreover, it is often the case in large networks that the Gramian associated with an individual actuator is low rank or approximately low rank itself. One can obtain further computational benefits by computing low rank approximations of these Gramians also using methods from [24]. Second, several techniques can be used to improve the greedy algorithm. Each iteration in the standard version is trivially parallelizable. The Gramians associated with each possible actuator can be pre-computed using the specialized methods mentioned above independently and in parallel. Because the Gramian is additive in the actuators, effectively one can solve the Lyapunov equation for any set of actuators by solving it in parallel for each individual actuator and summing the results. Then at each iteration, the marginal gain of each actuator can also be computed in parallel by adding its Gramian to the Gramian of the current set of added actuators and evaluating the metric (trace, logdet, etc.). When the individual Gramians are low rank, the marginal gains can be computed more efficiently by using low rank update formulae, e.g., the Sherman-Morrison formula for trace of the inverse Gramian or the matrix determinant lemma for log determinant of the Gramian. Alternatively, there is also an accelerated version of the greedy algorithm, originally due to Minoux [28], in which one can exploit the submodularity of the set functions to significantly reduce the number of times that marginal gains for the actuators need to be computed. This can lead to orders of magnitude speedups in practice; see, e.g., [21]. IV. N UMERICAL E XAMPLES In this section, we illustrate the results on randomly generated systems and on a problem of power electronic actuator placement in a model of the European power grid. The problem data is a system dynamics matrix A ∈ Rn×n , a set of possible 8 4 input matrix columns V = {b1 , ..., bM }, and an integer number k of actuators to choose from this set to form an input matrix that maximizes a controllability metric. f (Sgreedy ) ≈ 99% f (Sopt ) frequency 3 2 histogram greedy result 1 0 69.4 69.6 69.8 70.0 70.2 70.4 70.6 log det metric Fig. 1. Histogram displaying the shifted log determinant metric for all possible selections of 7 actuators from a set of 25. The result achieved by greedy optimization is displayed by the red line, which is better than 99.93% of all other selections. 1 10 0 10 −1 10 λi(Wc) A. Greedy performance on random systems To evaluate performance of the greedy algorithm and to compare the various controllability metrics, we first consider randomly generated data. We use Matlab’s rss routine to generate a stable dynamics matrix with random stable eigenvalues. We use V = {e1 , ..., en }, where ei is the ith unit vector in Rn , i.e., we assume one can choose states in which a control input can be injected. Figure 1 shows the result of applying the greedy algorithm to maximize the log determinant metric with n = 25 and k = 7. This problem is small enough to evaluate every possible 7element actuator subset, and this result is also shown in a histogram, shifted so that minS f (S) = 0. The support of f (S) for |S| = k, is relatively narrow and close to the optimal value. Hence, the greedy bound is not informative in this case, as 63% of the optimum is lower than the values achieved by all of the size k subsets. Nevertheless, our algorithm finds a good set Sgreedy scoring x 10 tr(Wc) −tr(W−1 ) c −2 10 log det(Wc) λmin(Wc) −3 of the optimum value f (Sopt ), where Sopt is an optimal subset, and is better than 99.93% of all other n choose k possible choices. We repeated the greedy algorithm for 500 randomly generated stable dynamic matrices and found that in all cases the greedy algorithm returned a selection better than 99.5% of all possible choices. In other words, for this example the greedy algorithm provides a near-optimal selection and also one that performs much better than the worst case bound. We also compare for this example the four continuous metrics tr(WS ), tr(WS−1 ), log det WS , and λmin (WS ). Figure 2 shows the eigenvalues of the Gramians resulting from applying the greedy algorithm with each metric. The results are averages over 10,000 random samples of stable dynamics matrices. For the trace metric, Theorem 4 guarantees that the greedy algorithm finds the globally optimal subset. We can see that this metric tends to focus on making the largest few eigenvalues large at the expense of the smaller eigenvalues. In contrast, the trace of the inverse Gramian and the log determinant strike a compromise, with both resulting in similar eigenvalue distributions. The largest eigenvalues are not as large as the ones achieved by optimizing the trace metric, but they do better on average on the smaller eigenvalues. Although the globally optimal subset is not guaranteed to be found, the submodularity of these metrics guarantees that a near optimal subset is produced by the greedy algorithm, as proved in Theorems 5 and 6. On the other hand, the final metric focuses exclusively on the smallest eigenvalue, but for this example actually does slightly worse on average than the trace of the inverse Gramian on the smallest eigenvalue. This may result from the fact that the smallest eigenvalue metric is not submodular, and so thus is not always guaranteed to produce a near optimal selection. However, even using the 10 −4 10 0 5 10 15 20 25 i Fig. 2. Eigenvalues of the Gramian averaged over 10,000 random samples of stable dynamics matrices for several continuous metrics resulting from applying the greedy algorithm to select 7 actuators from a set of possible 25. greedy algorithm on this non-submodular metric does not do too much worse than trace of the inverse Gramian and the log determinant on other eigenvalues, and does better than trace of the Gramian on most of the smaller eigenvalues. B. Power electronic actuator placement in the European power grid Recently developed power electronic devices, such as high voltage direct current (HVDC) links or flexible alternating current transmission devices (FACTS), can be used to improve transient stability properties in power grids by modulating active and reactive power injections to damp frequency oscillations and prevent rotor angle instability [12]. In this section, we illustrate our results by using them to place such power electronic actuators in a model of the European power grid. We emphasize that this section is intended to show that there are practical and relevant problems that could be studied using the theory in the preceding sections; however, many important political and economic issues are neglected, and placements are evaluated purely from a controllability perspective. We consider a simplified model of the European grid derived from [16] with 74 buses, each of which is connected to a 9 1 Ideally, one would of course want to evaluate actuator placement on the nonlinear model, but even evaluating controllability metrics can be extremely difficult computationally, even for small-scale nonlinear systems. This section is intended to illustrate the theory from the previous section, so we focus on a linearized model, though actuator placement problems for nonlinear networks are an important topic for future work. Fig. 3. Network of the 74-bus European grid model. The red dots show the buses, and the black lines between buses show normal AC transmission lines. The best 10 HVDC line placements according to the controllability Gramian trace metric are shown by the bold blue lines. 45 controllability Gramian trace metric generator and a constant impedance load. We consider the placement of HVDC links, which are modeled as ideal current sources that can instantaneously inject AC currents into each of their terminal buses; for modeling details see [12], [13], [14]. The system dynamics we consider here are based on the swing equations, a widely-used nonlinear model for the time evolution of rotor angles and frequencies of each generator in the network [23]. Each HVDC link has three degrees of freedom that allow influence of the frequency dynamics at the corresponding buses. The nonlinear model is linearized1 about a desired operating condition for each possible HVDC link placement, and the placements are evaluated based on the linearized model using the infinite-horizon controllability Gramian. In principle one can easily work with the finitehorizon Gramian; again we chose to use the infinite-horizon due to the simplicity of its computation, and the results are qualitatively similar when the finite-horizon Gramian is used. Each generator has two associated states: rotor angle and frequency, which gives a 148-dimensional state space model, i.e., A ∈ R148×148 , which always turns out to be stable. Since an HVDC link could be placed in principle between any two distinct nodes in the network, there are 2701 possible locations. Consider the problem of finding the best subset of size 10. This gives approximately 5.6 × 1027 possible combinations, far too many for a brute force search. Figure 3 shows the network and the 10 best placements according to the controllability Gramian trace metric with all state space directions weighted equally, i.e., C = I148 . The best three are relatively long lines connecting the northeastsouthwest and northwest-southeast quadrants of the network, respectively. A modal analysis of the dynamics matrix reveals that these choices correlate well with directions associated with lightly damped modes in the rotor angle dynamics. The next group of placements is concentrated in the southeast, indicating that there is room to improve control authority by increasing connectivity in this sparsely connected region. This also indicates a potential weakness in the trace metric, which may cluster actuators to get high controllability in a few of the more controllable directions at the expense of controllability in other directions. Figure 4 shows the sorted values of the metric, with the top few placements giving a substantial benefit over other placements. Figure 5 shows the placement obtained by using the greedy algorithm with the log determinant metric, using the rank metric until the system becomes controllable. Compared to the trace metric, we see that the lines are in general longer, connecting buses that are further apart, and more evenly distributed in the network, and no node is part of more than one HVDC line. These placements can also be seen to align with directions corresponding to lightly damped modes in the rotor angle dynamics, though with a different distribution across the modes than with the trace. Although both metrics tend 40 35 30 25 20 15 0 500 1000 1500 2000 2500 HVDC placement location index Fig. 4. Sorted values of the controllability Gramian trace metric. The vertical axis shows the amount each particular actuator placement adds to the trace of the Gramian. The optimal value is the sum of the first 10 amounts; the top few placement give substantial benefit over other placements. to produce placements with a similar qualitative function, the two sets of obtained placements are quite different. V. C ONCLUSIONS AND O UTLOOK We have considered optimal actuator placement problems in complex dynamical networks. These problems are in general difficult combinatorial optimization problems; however, we have shown that an important class of metrics related to the controllability Gramians yield modular and submodular set functions. This allows globally optimal or near optimal placements to be obtained with a simple greedy algorithm. By duality, all of the results hold for corresponding sensor placement 10 model discussed in Section IV. R EFERENCES [1] [2] [3] [4] [5] [6] Fig. 5. Network of the 74-bus European grid model.. The best 10 HVDC line placements achieved by the greedy algorithm maximizing the log determinant of the controllability Gramian are shown by the bold blue lines. [7] [8] problems using metrics of the observability Gramian. To our knowledge, this is the first such investigation of submodularity in the context of controllability and observability in dynamical systems. We also defined several dynamic Control Energy Centrality measures, which assigns an importance value to each node in a dynamical network based on its ability to move the system around the state space with a low-energy time-varying control input. The results were illustrated via placement of power electronic actuators in a model of the European power grid. There are many open problems involving the structure of combinatorial optimization problems in the optimal placement of sensors and actuators in complex networks. For example, there are many other quantitative metrics of controllability and observability, such as those associated with optimal control and filtering design problems, that may be more appropriate in certain settings. Nothing is known about modularity or submodularity for any other metrics. Further future work involves exploring other case studies in power networks, biological networks, social networks, and discretized models of infinitedimensional systems. For more complicated system models, such as constrained, nonlinear, hybrid, etc., corresponding controllability questions are much more complicated, and the available tools do not scale well computationally, but one could explore how efficient methods could be used to obtain approximate metrics in these types of systems. Finally, an important and interesting topic for future work is to investigate how various graphical properties of the network structure affect the actuator placement results, which may lead to insights about energy-related controllability for complex dynamical networks. ACKNOWLEDGEMENTS The authors would like to thank Dr. Alex Fuchs for providing details and helpful discussion about the power system [9] [10] [11] [12] [13] [14] [15] [16] [17] [18] [19] [20] [21] R.H. Bartels and G.W. Stewart. Solution of the matrix equation ax+ xb= c. Communications of the ACM, 15(9):820–826, 1972. Y.Y. Boykov and M.-P. Jolly. Interactive graph cuts for optimal boundary & region segmentation of objects in nd images. In Proceedings of the Eighth IEEE International Conference on Computer Vision, volume 1, pages 105–112. IEEE, 2001. F.M. Callier and C.A. Desoer. Linear system theory. 1991. A. Chapman and M. Mesbahi. System theoretic aspects of influenced consensus: Single input case. IEEE Transactions on Automatic Control, 57(6):1505–1511, 2012. A. Chapman and M. Mesbahi. Semi-autonomous consensus: network measures and adaptive trees. IEEE Transactions on Automatic Control, 58(1):19–31, 2013. A. Clark, L. Bushnell, and R. Poovendran. On leader selection for performance and controllability in multi-agent systems. In IEEE Conference on Decision and Control, pages 86–93. IEEE, 2012. A. Clark, L. Bushnell, and R. Poovendran. A supermodular optimization framework for leader selection under link noise in linear multi-agent systems. IEEE Transactions on Automatic Control, 59(2):283–296, 2014. A. Clark and R. Poovendran. A submodular optimization framework for leader selection in linear multi-agent systems. In IEEE Conference on Decision and Control, pages 3614–3621. IEEE, 2011. F.L. Cortesi, T.H. Summers, and J. Lygeros. Submodularity of energy related controllability metrics. In IEEE Conference on Decision and Control, Los Angeles, CA, USA, 2014. N.J. Cowan, E.J. Chastain, D.A. Vilhena, J.S. Freudenberg, and C.T. Bergstrom. Nodal dynamics, not degree distributions, determine the structural controllability of complex networks. PLOS ONE, 7(6):e38398, 2012. U. Feige. A threshold of ln n for approximating set cover. Journal of the ACM, 45(4):634–652, 1998. A. Fuchs and M. Morari. Grid stabilization through VSC-HVDC using wide area measurements. In IEEE PowerTech Conference, Trondheim, Norway. IEEE, 2011. A. Fuchs and M. Morari. Actuator performance evaluation using LMIs for optimal HVDC placement. In European Control Conference, Zurich, Switzerland. IEEE, 2013. A. Fuchs and M. Morari. Placement of HVDC links for power grid stabilization during transients. In IEEE PowerTech Conference, Grenoble, France. IEEE, 2013. S.J. Hammarling. Numerical solution of the stable, non-negative definite Lyapunov equation. IMA Journal of Numerical Analysis, 2(3):303–323, 1982. T. Hasse. Anforderung an eine durch Erneuerbare Energien geprägeigen Energieversorgung - Untersuchung des Regelverhaltens von Kraftwerken und Verbundnetzen. PhD thesis, University of Rostock, 2006. T. Kailath. Linear systems, volume 1. Prentice-Hall Englewood Cliffs, NJ, 1980. R.E. Kalman. On the general theory of control systems. IRE Transactions on Automatic Control, 4(3):110–110, 1959. R.E. Kalman. Contributions to the theory of optimal control. Boletin de la Sociedad Matematica Mexicana, 5(1):102–119, 1960. D. Kempe, J. Kleinberg, and É. Tardos. Maximizing the spread of influence through a social network. In Proceedings of the Ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pages 137–146. ACM, 2003. A. Krause and D. Golovin. Submodular function maximization. Tractability: Practical Approaches to Hard Problems, 3, 2012. 11 [22] A. Krause, A. Singh, and C. Guestrin. Near-optimal sensor placements in gaussian processes: Theory, efficient algorithms and empirical studies. The Journal of Machine Learning Research, 9:235–284, 2008. [23] P. Kundur. Power system stability and control. McGraw-Hill, Inc., 1993. [24] J.-R. Li and J. White. Low rank solution of lyapunov equations. SIAM Journal on Matrix Analysis and Applications, 24(1):260–280, 2002. [25] C.-T. Lin. Structural controllability. IEEE Transactions on Automatic Control, 19(3):201–208, 1974. [26] Y.-Y. Liu, J.-J. Slotine, and A.-L. Barabási. Controllability of complex networks. Nature, 473(7346):167–173, 2011. [27] L. Lovász. Submodular functions and convexity. Mathematical programming: the state of the art, pages 235–257, 1983. [28] M. Minoux. Accelerated greedy algorithms for maximizing submodular set functions. In Optimization Techniques, pages 234–243. Springer, 1978. [29] F.J. Müller and A. Schuppert. Few inputs can reprogram biological networks. Nature, 478(7369):E4–E4, 2011. [30] G.L. Nemhauser, L.A. Wolsey, and M.L. Fisher. An analysis of approximations for maximizing submodular set functions—I. Mathematical Programming, 14(1):265–294, 1978. [31] T. Nepusz and T. Vicsek. Controlling edge dynamics in complex networks. Nature Physics, 8(7):568–573, 2012. [32] M. Newman. Networks: an introduction. Oxford University Press, 2010. [33] A. Olshevsky. Minimal controllability problems. IEEE Transactions on Control of Network Systems, 1(3):249–258, 2014. [34] F. Pasqualetti, S. Zampieri, and F. Bullo. Controllability metrics, limitations and algorithms for complex networks. IEEE Transactions on Control of Network Systems, 1(1):40–52, 2014. [35] K.B. Petersen and M.S. Pedersen. The matrix cookbook. Technical University of Denmark, 2008. [36] A. Rahmani, M. Ji, M. Mesbahi, and M. Egerstedt. Controllability of multi-agent systems from a graph-theoretic perspective. SIAM Journal on Control and Optimization, 48(1):162–186, 2009. [37] I. Rajapakse, M. Groudine, and M. Mesbahi. Dynamics and control of state-dependent networks for probing genomic organization. Proceedings of the National Academy of Sciences, 108(42):17257–17262, 2011. [38] I. Shames and T.H. Summers. Rigid network design via submodular set function optimization. submitted to IEEE Transactions on Network Science and Engineering, 2014. [39] F. Sorrentino, M. di Bernardo, F. Garofalo, and G. Chen. Controllability of complex networks via pinning. Physical Review-Series E, 75(4):046103, 2007. [40] T.H. Summers and J. Lygeros. Optimal sensor and actuator placement in complex dynamical networks. In IFAC World Congress, Cape Town, South Africa, pages 3784–3789, 2014. [41] T.H. Summers, I. Shames, J. Lygeros, and F. Dörfler. Topology design for optimal network coherence. In European Control Conference, 2015. [42] J. Sun and A.E. Motter. Controllability transition and nonlocality in network control. Physical Review Letters, 110(20):208701, 2013. [43] Y. Tang, H. Gao, W. Zou, and J. Kurths. Identifying controlling nodes in neuronal networks in different scales. PLOS ONE, 7(7):e41375, 2012. [44] M. Van De Wal and B. De Jager. A review of methods for input/output selection. Automatica, 37(4):487–510, 2001. [45] W.-X. Wang, X. Ni, Y.-C. Lai, and C. Grebogi. Optimizing controllability of complex networks by minimum structural perturbations. Physical Review E, 85(2):026115, 2012. [46] G. Yan, J. Ren, Y.-C. Lai, C.-H. Lai, and B. Li. Controlling complex networks: How much energy is needed? Physical Review Letters, 108(21):218703, 2012. [47] T. Yang, G. Huijun, J. Kurths, and F. Jian-an. Evolutionary pinning control and its application in UAV coordination. Industrial Informatics, IEEE Transactions on, 8(4):828–838, 2012. [48] K. Zhou, G. Salomon, and E. Wu. Balanced realization and model reduction for unstable systems. International Journal of Robust and Nonlinear Control, 9(3):183–198, 1999.
3cs.SY
arXiv:1606.05807v1 [math.GR] 18 Jun 2016 IRREDUCIBLE CHARACTERS OF EVEN DEGREE AND NORMAL SYLOW 2-SUBGROUPS NGUYEN NGOC HUNG AND PHAM HUU TIEP Abstract. The classical Itô-Michler theorem on character degrees of finite groups asserts that if the degree of every complex irreducible character of a finite group G is coprime to a given prime p, then G has a normal Sylow p-subgroup. We propose a new direction to generalize this theorem by introducing an invariant concerning character degrees. We show that if the average degree of linear and even-degree irreducible characters of G is less than 4/3 then G has a normal Sylow 2subgroup, as well as corresponding analogues for real-valued characters and strongly real characters. These results improve on several earlier results concerning the ItôMichler theorem. 1. Introduction The celebrated Itô-Michler theorem [15, 20] is one of the deep and fundamental results on the relation between character degrees and local structure of finite groups. It asserts that if a prime p does not divide the degree of every complex irreducible character of a finite group G, then G has a normal abelian Sylow p-subgroup. Over the past decades, there have been several variations and refinements of this result by considering Brauer characters [17, 18, 21], nonvanishing elements [5, 25], fields of character values [4, 25, 13], and Frobenius-Schur indicator [19, 28]. One primary direction is to weaken the condition that all irreducible characters of G have degree coprime to p, and assume instead only that a subset of characters with a specified field of values has this property, see [4, 19] for real-valued characters and [25] for p-rational characters. In this paper, we introduce an invariant concerning character degrees and propose to generalize the Itô-Michler theorem in a completely new direction. Date: June 21, 2016. 2010 Mathematics Subject Classification. Primary 20C15, 20D10, 20D05. Key words and phrases. finite groups, character degrees, normal subgroups, Sylow subgroups, real characters, strongly real characters. N. N. Hung was partially supported by the NSA Young Investigator Grant #H98230-14-1-0293 and a Faculty Scholarship Award from Buchtel College of Arts and Sciences, The University of Akron. P. H. Tiep was partially supported by the NSF grant DMS-1201374 and the Simons Foundation Fellowship 305247. 1 2 NGUYEN NGOC HUNG AND PHAM HUU TIEP Given a finite group G, let Irr(G) denote the set of all complex irreducible characters of G, then write Irrp (G) := {χ ∈ Irr(G) | χ(1) = 1 or p | χ(1)} and acdp (G) := P χ∈Irrp (G) χ(1) |Irrp (G)| so that acdp (G) is the average degree of linear characters and irreducible characters of G with degree divisible by p. Then the Itô-Michler theorem can be reformulated in the following way: If acdp (G) = 1 then G a has normal abelian Sylow p-subgroup. Our first result significantly improves this for the prime p = 2. Theorem 1.1. Let G be a finite group. If acd2 (G) < 4/3 then G has a normal Sylow 2-subgroup. Theorem 1.1 basically says that even when a group has some irreducible characters of even degree, it still has a normal Sylow 2-subgroup as long as the number of linear characters of the group is large enough. This of course implies the Itô-Michler theorem for p = 2 where it is required that the group has no irreducible characters of even degree at all. One of the key steps in the proof of Theorem 1.1 is to establish the solvability of the groups in consideration. In fact, we can do more. Theorem 1.2. Let G be a finite group. If acd2 (G) < 5/2 then G is solvable. We remark that both bounds in Theorems 1.1 and 1.2 are optimal, as shown by the groups S3 and A5 . Furthermore, acd2 (G) of non-abelian 2-groups G can get as close to 1 as we wish – just consider the extraspecial 2-groups, and therefore one can not get the commutativity of the Sylow 2-subgroup in Theorem 1.1 as in the Itô-Michler theorem. In fact, we can also improve on some main results of [4] and [19], by restricting our attention to only real-valued characters or even strongly real characters. A character χ ∈ Irr(G) is called real-valued if χ(g) ∈ R for all g ∈ G, and strongly real if it has Frobenius-Schur indicator 1, equivalently, if it is afforded by a real representation. Let P χ∈Irrp,R (G) χ(1) Irrp,R (G) := {χ ∈ Irrp (G) | χ is real-valued}, acdp,R (G) := , |Irrp,R (G)| and Irrp,+ (G) := {χ ∈ Irrp (G) | χ is strongly real}, acdp,+ (G) := P χ∈Irrp,+ (G) χ(1) |Irrp,+ (G)| CHARACTERS OF EVEN DEGREE AND NORMAL SYLOW 2-SUBGROUPS 3 Theorem 1.3. Let G be a finite group. We have: (i) If acd2,+ (G) ≤ 2 then G is solvable. (ii) If acd2,+ (G) < 4/3 then G has a normal Sylow 2-subgroup. Theorem 1.3(ii) immediately implies [4, Theorem A] and [19, Theorem B]. Furthermore, since any real-valued character of degree 1 is automatically strongly real, it has the following consequence. Corollary 1.4. Let G be a finite group. We have: (i) If acd2,R (G) ≤ 2 then G is solvable. (ii) If acd2,R (G) < 4/3 then G has a normal Sylow 2-subgroup. Again, the example of S3 shows that the bounds in Theorem 1.3(ii) and Corollary 1.4(ii) are optimal. To prove Theorems 1.2 and 1.3(i), we have to use the classification of finite simple groups to show that every nonabelian finite simple group S possesses an irreducible character of even and large enough degree which is extendible to its stabilizer in Aut(S), cf. Theorem 2.1. Together with Proposition 2.3, this result allows us to bound the number of (strongly real) irreducible characters of small degrees of a finite group with a nonabelian minimal normal subgroup, and then to control the invariant acd2 (G) of such a group, see Section 2 and Proposition 3.1. We hope that the techniques developed here will be useful in the future study of other problems involving the average degree of a certain set of characters and other invariants concerning character degrees like the largest character degree [3, 7, 8, 10] or the character degree ratio [2, 16]. One obvious question that one may ask is: is there an analogue of Theorem 1.1 for odd primes? Although our ideas in the proof for the prime 2 do not carry out smoothly to odd primes, we believe that the following is true. Conjecture 1.5. Let p be a prime and G a finite group. If acdp (G) < 2p/(p + 1) then G has a normal Sylow p-subgroup. The bound in Conjecture 1.5 perhaps is not optimal for all primes. If Cp (the cyclic group of order p) can act nontrivially on an abelian group of order p + 1, then the bound clearly can not be lower (for instance p = 3, 7, or any Mersenne prime). But when p = 5 for example, C5 can only act trivially on an abelian group of order 6, and we think that the best possible bound is not 10/6. Theorems 1.2, 1.1, and 1.3 are respectively proved in Sections 3, 4, and 5. 2. Extendibility of some characters of even degree Throughout the paper, for a finite group G and a positive integer k, we write nk (G) to denote the number of irreducible complex characters of G of degree k, and nk,+ (G) to denote the number of strongly real, irreducible complex characters of G 4 NGUYEN NGOC HUNG AND PHAM HUU TIEP of degree k. Furthermore, if N is a normal subgroup of G, then nk (G|N) denotes the number of irreducible characters of G of degree k whose kernels do not contain N, and similarly for nk,+ (G|N). If θ is a character of a normal subgroup of G, we write IG (θ) to denote the stabilizer or the inertia subgroup of θ in G. Other notation is standard (and follows [11]) or will be defined when needed. We need the following result, whose proof relies on the classification of finite simple groups. Theorem 2.1. Every nonabelian finite simple group S has an irreducible character θ of even degree such that θ(1) ≥ 4 and θ is extendible to a strongly real character of IAut(S) (θ). Furthermore, if S ≇ A5 then θ can be chosen so that θ(1) ≥ 8. Proof. (i) The cases where S ∼ = PSL2 (q) with q ≤ 19, = An with 5 ≤ n ≤ 8, or S ∼ ∼ or S = PSU3 (3), PSp4 (3), Sp6 (2), 2 F4 (2)′ , or S is one of the 26 sporadic finite simple groups, can be checked directly using [1]. (We note that in all these cases but S = A6 , we can always find θ so that it has a rational-valued extension to IAut(S) (θ).) In what follows, we may therefore assume that S is not isomorphic to any of the listed groups. In particular, it follows from the main results of [26, 27] that the degree of any nontrivial complex irreducible character of S is at least 8. (ii) Certainly, one can find many different choices for the desired character θ. In what follows, having in mind some other applications, we will try to construct θ in such a way that its extension to IAut(S) (θ) is rational-valued if possible. Assume now that S ∼ = An with n ≥ 9. Consider the irreducible characters α, β ∈ Irr(Sn ) labeled by the partitions (n − 2, 2) and (n − 2, 12), of degree n(n − 3)/2 and (n − 1)(n − 2)/2 respectively. Since the given partitions are not self-conjugate, α and β both restrict irreducibly to S. Furthermore, β(1) = α(1) + 1 ≥ 28, and so exactly one of α, β has even degree. As Aut(S) ∼ = Sn , we are done in this case by choosing θ ∈ {αS , βS } of even degree. Next we consider the case S is a finite simple group of Lie type in characteristic 2. As shown in [6], the Steinberg character of S, of degree |S|2, extends to a character of a rational representation of Aut(S), whence we are done again. (iii) From now on we may assume that S is a finite simple group of Lie type, defined over a finite field Fq of odd characteristic p. Consider the cases where S = PSUn (q) with n ≥ 4, PSp2n (q) with n ≥ 2, Ω2n+1 (q) − with n ≥ 3, PΩ+ 2n (q) with n ≥ 5, or PΩ2n (q) with n ≥ 4. As shown in pp. 1–4 of the proof of [4, Theorem 2.1], Aut(S) has a rank 3 permutation character ρ = 1 + α + β, where the characters α and β both restrict nontrivially and irreducibly to S. Furthermore, exactly one of α and β is of even degree (and both are afforded by rational representations). Hence we are done by choosing θ ∈ {αS , βS } of even degree. The same argument, but applied to a rank 5 permutation character of Aut(S), see p. 5 of the proof of [4, Theorem 2.1], handles the cases S = E6 (q) or 2 E6 (q). CHARACTERS OF EVEN DEGREE AND NORMAL SYLOW 2-SUBGROUPS 5 Suppose that S = PSLn (q) with n ≥ 4. As shown in the proof of [24, Proposition 5.5], Aut(S) has a permutation representation, whose character contains a rational-valued irreducible character γ of (even) degree  n (q − 1)(q n−1 − 1)/(q − 1)2 , q ≡ 1(mod 4), (q n − 1)(q n−1 − 1)/(q 2 − 1), q ≡ 3(mod 4), with multiplicity one that restricts irreducibly to S. It follows that γ is also afforded by a rational representation, and we can choose θ = γS . (iv) In the remaining cases, our choice of θ yields a not necessarily rational, but still admits a strongly real extension to J := IAut(S) (θ). First, if S = PSL3 (q), then the (unique) character θ ∈ Irr(S) of degree q 2 + q extends to Aut(S) by [28, Lemma 6.2]. Next, if S = G2 (q), 2 G2 (q), 3 D4 (q), F4 (q), or E8 (q), then the proof of [19, Proposition 4.4] yields a strongly real character θ ∈ Irr(S) of even degree, with J = S. If S = PΩ+ 8 (3) then by p. 1 of the proof of [19, Proposition 4.9] we can choose θ of degree 300. Suppose now that S = PSL2 (q), PSU3 (q), or (a simple group of type) D4 (q) with q ≥ 5, or E7 (q). Then we can view S as the derived subgroup of a finite Lie-type group G of adjoint type: G = PGL2 (q), PGU3 (q), D4 (q)ad , or E7 (q)ad , respectively. As shown in the proof of [19, Proposition 4.5] (for types A1 and E7 ), Case IIb of the proof of [19, Proposition 4.7] (for PSU3 ), and the proof of [19, Proposition 4.9] (for type D4 ), G contains a strongly real character of even degree that restricts to an irreducible character θ ∈ Irr(S) with J = G. So we are done in these cases as well.  When a finite group G has a nonabelian minimal normal subgroup N, by using Theorem 2.1, we can produce an irreducible character of N of even degree that is extendible to (a strongly real character of) its stabilizer in G. Theorem 2.2. Let G be a finite group with a nonabelian minimal normal subgroup N ≇ A5 . Then there exists ϕ ∈ Irr(N) of even degree such that ϕ(1) ≥ 8 and ϕ is extendible to a strongly real character of IG (ϕ). Proof. Since N is a nonabelian minimal normal subgroup of G, we have N ∼ =S× S × · · · × S, a direct product of k copies of a nonabelian simple group S. Replacing G by G/CG (N) if necessary, we may assume that CG (N) = 1. Then we have N ✂ G ≤ Aut(N) = Aut(S) ≀ Sk . Let θ be an irreducible character of S found in Theorem 2.1 and let OS be the orbit of θ in the action of Aut(S) on Irr(S). Consider the character ϕ := θ × · · · × θ ∈ Irr(N). Then the orbit of ϕ under the action of Aut(N) is ON := {θ1 × θ2 × · · · × θk ∈ Irr(N) | θi ∈ OS }. 6 NGUYEN NGOC HUNG AND PHAM HUU TIEP Clearly ϕ is invariant under IAut(S) (θ) ≀ Sk . On the other hand, |Aut(N) : IAut(S) (θ) ≀ Sk | = |Aut(S) : IAut(S) (θ)|k = |OS |k = |ON |. Therefore we deduce that IAut(N ) (ϕ) = IAut(S) (θ) ≀ Sk . Assume that θ extends to a strongly real character α of J := IAut(S) (θ), say afforded by an RJ-module V . Then IAut(N ) (ϕ) acts naturally on the R-space V ⊗k , on which N acts with character ϕ. It follows that ϕ is extendible to the strongly real character of IG (ϕ) = G ∩ IAut(N ) (ϕ) afforded by V ⊗k . Since θ(1) ≥ 4 in general and θ(1) ≥ 8 when S ≇ A5 , we observe that ϕ(1) = θ(1)k ≥ 8 as long as (S, k) 6= (A5 , 1), and we are done.  Theorem 2.2 can be used to bound the number of irreducible characters of degrees 1 and 2 of finite groups with a nonabelian minimal normal subgroup, as shown in the next proposition. This should be compared with Proposition 3.2 of [9]. Proposition 2.3. Let G be a finite group with a nonabelian minimal normal subgroup N. Assume that there is some ϕ ∈ Irr(N) such that ϕ is extendible to IG (ϕ). Let d := ϕ(1)|G : IG (ϕ)|. Then the following hold. (i) n1 (G) ≤ nd (G)|G : IG (ϕ)|. (ii) If ϕ extends to a strongly real character of IG (ϕ), then n1,+ (G) ≤ nd,+ (G)|G : IG (ϕ)|. (iii) n2 (G) ≤ n2d (G)|G : IG (ϕ)| + 21 nd (G)|G : IG (ϕ)|. Moreover, if ϕ is invariant in G then n2 (G) ≤ n2d (G). Proof. For simplicity we write I := IG (ϕ). (i) First, since n1 (G) = |G : G′ | and n1 (I) = |I : I ′ |, we have n1 (G) ≤ |G : I|n1 (I). Therefore, we wish to show that n1 (I) ≤ nd (G) where d := ϕ(1)|G : I|. As N = N ′ ⊆ I ′ , the normal subgroup N is contained in the kernel of every linear character of I so that n1 (I) = n1 (I/N). Recall that ϕ ∈ Irr(N) is extendible to I and so we let χ ∈ Irr(I) be an extension of ϕ. Using Gallagher’s theorem and Clifford’s theorem (see [11, Corollary 6.17 and Theorem 6.11]), we see that each linear character λ of I/N produces the irreducible character λχ of T of degree ϕ(1), and this character in turns produces the irreducible character (λχ)G of G of degree (λχ)G (1) = ϕ(1)|G : I| = d. As the maps λ 7→ λχ 7→ (λχ)G are both injective, it follows that n1 (I/N) ≤ nd (G) and we therefore have n1 (I) ≤ nd (G), as desired. (ii) For any group X, let X ∗ denote the subgroup generated by all x2 , x ∈ X. Then note that n1,+ (G) = |G : G∗ |, n1,+ (I) = |I : I ∗ |, and I ∗ ≤ G∗ , whence CHARACTERS OF EVEN DEGREE AND NORMAL SYLOW 2-SUBGROUPS 7 n1,+ (G) ≤ |G : I|n1,+ (I). Furthermore, for any χ ∈ Irr(G) and any strongly real linear character λ of G, λ2 = 1G and so χ and χλ have the same Frobenius-Schur indicator. In particular, χλ is strongly real if and only if χ is. Furthermore, if ρ is a strongly real character of a subgroup T ≤ G, then so is the induced character ρG . Now we can argue as in (i) to complete the proof. (iii) We first claim that 1 n2 (G) ≤ n2 (I)|G : I| + n1 (I)|G : I|. 2 Let χ ∈ Irr(G) with χ(1) = 2. Take φ to be an irreducible constituent of χ ↓I . Frobenius reciprocity then implies that χ in turn is an irreducible constituent of φG . If φ(1) = 2 then as φG (1) = 2|G : I|, there are at most |G : I| irreducible constituents of degree 2 of φG . We deduce that there are at most n2 (I)|G : I| irreducible characters of degree 2 of G that arise as constituents of φG with φ(1) = 2. On the other hand, if φ(1) = 1 then, as φG (1) = |G : I|, there are at most |G : I|/2 irreducible constituents of degree 2 of φG . As above, we deduce that there are at most n1 (I)|G : I|/2 irreducible characters of degree 2 of G that arise as constituents of φG with φ(1) = 1. So the claim is proved. Since we have already proved in (i) that n1 (I) = n1 (I/N) ≤ nd (G), to prove Proposition 2.3(iii) it suffices to show that n2 (I) ≤ n2d (G). We claim that n2 (I) = n2 (I/N) or in other words, N is contained in the kernel of every irreducible character of degree 2 of I. Let φ ∈ Irr(I) with φ(1) = 2. Since N has no irreducible character of degree 2 and has only one linear character, which is the trivial one, it follows that φN = 2 · 1N . We then have N ⊆ Ker(φ), as claimed. Recall that χ ∈ Irr(I) is an extension of ψ. Using Gallagher’s theorem and Clifford’s theorem again, we obtain that each irreducible character µ ∈ Irr(I/N) of degree 2 produces the character (µχ)G ∈ Irr(G) of degree (µχ)G (1) = 2ψ(1)|G : I| = 2d. It follows that n2 (I/N) ≤ n2d (G), and thus n2 (I) ≤ n2d (G), as desired. If ϕ is invariant in G then G = I, yielding immediately that n2 (G) ≤ n2d (G).  3. Solvability - Theorem 1.2 In this section, we use the results in Section 2 to prove Theorem 1.2. The next proposition handles an important case of this theorem. Proposition 3.1. Let G be a finite group with a nonabelian minimal normal subgroup. Then acd2 (G) ≥ 5/2. 8 NGUYEN NGOC HUNG AND PHAM HUU TIEP Proof. Let N be a nonabelian minimal normal subgroup of G. First we assume that N ≇ A5 . Then Theorem 2.2 guarantees that there is ϕ ∈ Irr(N) of even degree such that ϕ(1) ≥ 8 and ϕ is extendible to the inertia subgroup IG (ϕ). Using Proposition 2.3, we then have n1 (G) ≤ nd (G)|G : IG (ϕ)| and 1 n2 (G) ≤ n2d (G)|G : IG (ϕ)| + nd (G)|G : IG (ϕ)|, 2 where d := ϕ(1)|G : IG (ϕ)|. It follows that 7 3n1 (G) + n2 (G) ≤ nd (G)|G : IG (ϕ)| + n2d (G)|G : IG (ϕ)|. 2 Since ϕ(1) ≥ 8, we have d ≥ 8|G : IG (ϕ)| ≥ 8 and hence we can check that (7/2)|G : IG (ϕ)| ≤ (7/16)d < 2d − 5 and |G : IG (ϕ)| ≤ d/8 < 4d − 5. It follows that X 3n1 (G) + n2 (G) < (2k − 5)nk (G), 2|k≥4 and thus X (2k − 5)nk (G) > 0. 2|k or k=1 Therefore 2 X 2|k or k=1 knk (G) > 5 X nk (G), 2|k or k=1 and we have acd2 (G) > 5/2, as desired. So it remains to consider N ∼ = A5 . Then N has an irreducible character ϕ of degree 4 that is extendible to Aut(N) (see [1, p. 2]), and hence extendible to G as well. It follows from Proposition 2.3 that n1 (G) ≤ n4 (G) and n2 (G) ≤ n8 (G). Thus X 3n1 (G) + n2 (G) ≤ 3n4 (G) + n8 (G) ≤ (2k − 5)nk (G). 2|k≥4 Again this yields acd2 (G) ≥ 5/2 and the proof is completed.  We are now ready to prove Theorem 1.2, which we restate below. Theorem 3.2. Let G be a finite group. If acd2 (G) < 5/2 then G is solvable. Proof. Assume, to the contrary, that the theorem is false, and let G be a minimal counterexample. In particular acd2 (G) < 5/2 and G is nonsolvable. Let H E G be minimal such that H is nonsolvable. Then clearly H is perfect and contained in the last term of the derived series of G. Choose a minimal normal subgroup N of G such that N ⊆ H, and when [H, O∞ (H)] 6= 1 we choose N ⊆ [H, O∞ (H)], where O∞ (H) denotes the largest normal solvable subgroup of H. CHARACTERS OF EVEN DEGREE AND NORMAL SYLOW 2-SUBGROUPS 9 In view of Proposition 3.1, we can assume that N is abelian. It follows that the quotient G/N is nonsolvable since G is nonsolvable. By the minimality of G, we must have acd2 (G/N) ≥ 5/2. So acd2 (G) < 5/2 ≤ acd2 (G/N). Since nk (G/N) ≤ nk (G) for every positive integer k and n1 (G/N) = n1 (G) as N ⊆ G′ , it follows that n2 (G/N) < n2 (G) and thus there exists χ ∈ Irr(G) such that χ(1) = 2 and N * Ker(χ). It then has been shown in the proof of [14, Theorem 2.2] that G = LC is a central product with the amalgamated subgroup N = Z(L) of order 2, where L = SL2 (5) and C/ Ker(χ) := Z(G/ Ker(χ)). Since G = LC is a central product with the central amalgamated subgroup N, there is a bijection (α, β) 7→ τ from Irr(L|N) × Irr(C|N) to Irr(G|N) such that τ (1) = α(1)β(1). If (α, β) 7→ χ under the above bijection, we must have β(1) = 1 since L ∼ = SL(2, 5) and there are only three possibilities for α(1), namely 2, 4, and 6. So β ∈ Irr(C|N) is an extension of the unique non-principal linear character of N. Using Gallagher’s theorem, we then have a degree-preserving bijection from Irr(C/N) to Irr(C|N). In particular, n1 (C|N) = n1 (C/N). Since G/L ∼ = C/N and L ⊆ G′ , we have n1 (C|N) = n1 (C/N) = n1 (G). Employing the arguments in the proof of [22, Theorem B], we can evaluate and estimate n2 (G), n4 (G), and n6 (G) in terms of n1 (G) as follows: (i) n2 (G) = 2n1 (G) + n2 (C/N), (ii) n4 (G) ≥ 2n1 (G), and (iii) n6 (G) ≥ n1 (G) + 2n2 (C/N). Now putting all things together, we have X (2k − 5)nk (G) ≥ 3n4 (G) + 7n6 (G) 2|k≥4 ≥ 6n1 (G) + 7(n1 (G) + 2n2 (C/N) = 13n1 (G) + 14n2 (C/N) > 3n1 (G) + n2 (G). It then follows that acd2 (G) > 5/2 and this is a contradiction.  4. Normal Sylow 2-subgroups - Theorem 1.1 The next lemma is crucial in the proof of Theorem 1.1. Lemma 4.1. Let G = N ⋊ M where N is an abelian group. Assume that no nonprincipal irreducible character of N is invariant under M. If acd2 (G) < 4/3 then 10 NGUYEN NGOC HUNG AND PHAM HUU TIEP there is no orbit of even size in the action of M on the set of irreducible characters of N. Proof. Let {1N = α0 , α1 , . . . , αf } be a set of representatives of the action of M on Irr(N). For each 1 ≤ i ≤ f , let Ii be the inertia subgroup of αi in G. Since no nonprincipal irreducible character of N is invariant under M, we observe that every Ii is a proper subgroup of G. Assume, to the contrary, that there is some orbit of even size in the action of M on Irr(N). Then there exists some index 1 ≤ i ≤ f such that |G : Ii | is even. For 0 ≤ i ≤ f , set X X ni,1 := n1 (Ii /N), ni,even := nk (Ii /N), si,even := λ(1). 2|k λ∈Irr(Ii /N ), 2|λ(1) Since G splits over N, it is clear that every Ii also splits over N. It follows that αi extends to a linear character, say βi , of Ii as αi is linear. Gallagher’s theorem then implies that the mapping λ 7→ λβi is a bijection from Irr(Ii /N) to the set of irreducible characters of Ii lying above αi . Using Clifford’s theorem, we then obtain a bijection λ 7→ (λβi )G from Irr(Ii /N) to the set of irreducible characters of G lying above αi . We note that (λβi )G (1) = |G : Ii |λ(1) and hence (λβi )G (1) is even if and only if either |G : Ii | is even or λ(1) is even. We have f X X X |G : Ii |si,even χ(1) = n1 (G/N) + |G : Ii |ni,1 + χ∈Irr(G),χ(1)=1 or even i=0 |G:Ii | even X ≥ n1 (G/N) + |G : Ii |ni,1 + 2 f X |G : Ii |ni,even . i=0 |G:Ii | even On the other hand,  X χ∈Irr(G),χ(1)=1 or even χ(1) = acd2 (G) n1 (G/N) + X |G:Ii | even ni,1 + f X i=0 Therefore, we deduce that X (|G : Ii | − acd2 (G))ni,1 + |G:Ii | even f X ni,even  . (2|G : Ii | − acd2 (G))ni,even i=0 ≤ (acd2 (G) − 1)n1 (G/N). Since acd2 (G) < 4/3 and |G : Ii | ≥ 1 for every 0 ≤ i ≤ f , it follows that X (|G : Ii | − acd2 (G))ni,1 ≤ (acd2 (G) − 1)n1 (G/N) |G:Ii | even  CHARACTERS OF EVEN DEGREE AND NORMAL SYLOW 2-SUBGROUPS 11 and hence (|G : Ij | − acd2 (G))nj,1 ≤ (acd2 (G) − 1)n1 (G/N) for some 1 ≤ j ≤ f such that |G : Ij | is even. Observe that n1 (G/N) = |(G/N) : (G/N)′ | and nj,1 = n1 (Ij /N) = |(Ij /N) : (Ij /N)′ |. Therefore n1 (G/N) ≤ |G : Ij |nj,1. It follows from the above inequality that (|G : Ij | − acd2 (G))nj,1 ≤ (acd2 (G) − 1)|G : Ij |nj,1, and thus acd2 (G) . 2 − acd2 (G) This is impossible since |G : Ij | ≥ 2 and acd2 (G) < 4/3, and the proof is complete. |G : Ij | ≤  We now prove the main Theorem 1.1, which is restated below. Theorem 4.2. Let G be a finite group. If acd2 (G) < 4/3 then G has a normal Sylow 2-subgroup. Proof. We will argue by induction on the order of G. We have acd2 (G) < 4/3 and therefore by Theorem 1.2, G is solvable. If G is abelian then there is nothing to prove, so we assume that G is nonabelian. We then choose a minimal normal subgroup N of G such that N ⊆ G′ . As G is solvable, we have that N is abelian. Since N ⊆ G′ , if an irreducible character of G has kernel not containing N, its degree must be at least 2. We therefore deduce that acd2 (G/N) ≤ acd2 (G) < 4/3 and it follows from the induction hypothesis that G/N has a normal Sylow 2-subgroup, say Q/N. If N is a 2-group then Q is a normal Sylow 2-subgroup of G, and we are done. So we assume from now on that N is an elementary abelian group of odd order. The SchurZassenhaus theorem then implies that Q = N ⋊ P where P is a Sylow 2-subgroup of Q (and G as well). By Frattini’s argument, we have G = QNG (P ) = NNG (P ). If N ⊆ NG (P ) then it follows that G = NG (P ) and we are done. So we can assume that N * NG (P ). This implies that N ∩ NG (P ) < N. As N is abelian, N ∩ NG (P ) is a normal subgroup of G, and we deduce that N ∩ NG (P ) = 1 by the minimality of N. We conclude that G = N ⋊ NG (P ). If N ⊆ Z(G), then we would have Q = N × P , so that P ✂ G, and we are done again. So we assume that N is noncentral in G. Thus, by the minimality of N, we have [N, G] = N. It follows that no nonprincipal irreducible character of N is invariant under NG (P ). We are now in the situation of Lemma 4.1, and therefore we conclude that there is no orbit of even size in the action of NG (P ) on the set of irreducible characters of N. In particular, there is no orbit of even size in the action of P on the set of irreducible characters of N. This means that P acts trivially on N since P is a 2-group. Now we have Q = N × P ✂ G and, as N has odd order, we deduce that P ✂ G and this completes the proof of the theorem.  12 NGUYEN NGOC HUNG AND PHAM HUU TIEP 5. Strongly real characters - Theorem 1.3 In this section we prove Theorem 1.3. We first prove Theorem 1.3(i). Theorem 5.1. Let G be a finite group. If acd2,+ (G) ≤ 2 then G is solvable. Proof. Since there is nothing to prove if G is abelian, we assume that G′ is nontrivial. Let N ⊆ G′ be a minimal normal subgroup of G. If a strongly real character χ ∈ Irr(G) has kernel not containing N, its degree must be at least 2, which is above the average acd2,+ (G). We therefore deduce that acd2,+ (G/N) ≤ acd2,+ (G) ≤ 2. Working by induction, we now can assume that N is nonabelian. By Theorem 2.2, there exists ϕ ∈ Irr(N) of even degree such that ϕ(1) ≥ 4 and ϕ extends to a strongly real character of IG (ϕ). (Note that we assumed N ≇ A5 in Theorem 2.2, but when N ∼ = A5 one can choose ϕ to be the irreducible character of degree 4, and this character is extendible to a strongly real character of S5 .) We then apply Proposition 2.3 to have n1,+ (G) ≤ nd,+ (G)|G : IG (ϕ)|, where d := ϕ(1)|G : IG (ϕ)|. Since ϕ(1) ≥ 4, it follows that |G : IG (ϕ)| < 4|G : IG (ϕ)| − 2 ≤ d − 2, and so n1,+ (G) < (d − 2)nd,+ (G) ≤ X (k − 2)nk,+ (G). 2|k Therefore we have acd2,+ (G) = n1,+ (G) + and this completes the proof. P n1,+ (G) + P2|k knk,+ (G) 2|k nk,+ (G) > 2,  To prove Theorem 1.3(ii), we begin with two known observations on strongly real characters. Lemma 5.2. Let N be a normal subgroup of a finite group G such that G/N has odd order. Then every strongly real character ϕ ∈ Irr(N) lies under a unique strongly real irreducible character of G. Proof. This is [19, Lemma 2.1(ii)].  Lemma 5.3. Let N ✁ G be such that G/N is a 2-group. Assume that ϕ ∈ Irr(N) has 2-defect 0, and that ϕ is G-conjugate to ϕ. Then there exists a strongly real character χ ∈ Irr(G) such that [χN , ϕ]N = 1. Proof. This is [28, Lemma 2.5].  CHARACTERS OF EVEN DEGREE AND NORMAL SYLOW 2-SUBGROUPS 13 We also need the following observation. Lemma 5.4. Let P be a 2-group acting on an abelian group N of odd order such that N is the unique minimal normal subgroup of N ⋊ P . Then |N| − 1 ≥ |P : Φ(P )|, where Φ(P ) is the Frattini subgroup of P . Proof. Suppose that N is a product of n copies of the cyclic groups Cq , where q is a prime. Since N is the only minimal normal subgroup of N ⋊ P , we have CP (N) = 1, and the action of P on N induces a faithful irreducible representation X of P over the field Fq . We extend this representation to the representation XFq over the algebraically closure Fq . Since |P | is even and q is odd, by Maschke’s theorem, XFq is completely reducible, and moreover, is faithful since X is faithful. Using the FongSwan theorem [23, Theorem 10.1] on lifts of irreducible Brauer characters in solvable groups, we conclude that P has a complex faithful character, say χ, of degree n. Now we apply [12, Theorem A] to deduce that the number of generators in a minimal generating set for P , say d(P ), is at most (3/2)(n − s) + s, where s is the number of linear constituents of χ. In particular, d(P ) ≤ [3n/2], and it follows that |P : Φ(P )| ≤ 2[3n/2] . As it is easy to check that 2[3n/2] ≤ 3n − 1 for every positive integer n, we then have |P : Φ(P )| ≤ 3n − 1 ≤ q n − 1 = |N| − 1, and the lemma follows.  Lemmas 5.3 and 5.4 allow us to control acd2,+ (G) in the following special situation. Proposition 5.5. Let G = N ⋊P be a split extension of an elementary abelian group of odd order N by a nontrivial 2-group P . Assume that N is the unique minimal normal subgroup of G. Then acd2,+ (G) ≥ 4/3. Proof. It is well known that groups of odd order have no non-principal real irreducible character. Therefore 1N is the only real irreducible character of N. It follows that every (strongly) real linear character of G has N inside its kernel. In particular, n1,+ (G) = n1,+ (G/N) = n1,+ (P ) = |P : Φ(P )|. Together with Lemma 5.4, this implies that n1,+ (G) ≤ |N| − 1. Hence, we can find s disjoint P -orbits Ω1 , . . . , Ωs on Irr(N) r {1N } of size k1 , . . . , ks , such that k1 + . . . + ks ≥ n1,+ (G). From the hypotheses, we know that P acts irreducibly and faithfully on N, and therefore on Irr(N) as well since the two actions are permutationally isomorphic. Therefore, each nontrivial character in Irr(N) is inverted by a central involution of P . 14 NGUYEN NGOC HUNG AND PHAM HUU TIEP In other words, for any nontrivial ϕ ∈ Irr(N), ϕ and ϕ are P -conjugate. Lemma 5.3 then guarantees that there is a strongly real character χ{ϕ,ϕ} ∈ Irr(G) lying above both ϕ and ϕ with [χN , ϕ]N = 1. Since IG (ϕ) splits over N, ϕ is extendible to IG (ϕ), and hence χ{ϕ,ϕ} (1) = |G : IG (ϕ)|, which is an even number since ϕ is not G-invariant. Applying the above argument to λi ∈ Ωi , we get Psa strongly real character χi ∈ Irr(G) of even degree ≥ ki ≥ 2; in particular, s ≤ ( i=1 ki )/2 and so s s X X ki ≥ n1,+ (G). ki − 4s ≥ 3 i=1 i=1 It follows that the average degree of these s characters χ1 , . . . , χs and the (strongly) real linear characters of G is at least P n1,+ (G) + si=1 ki 4 ≥ . n1,+ (G) + s 3 Since any other strongly real irreducible character of G has degree at least 2, we conclude that acd2,+ (G) ≥ 4/3.  The proof of Theorem 1.3 is completed by Theorem 5.6. Let G be a finite group. If acd2,+ (G) < 4/3 then G has a normal Sylow 2-subgroup. Proof. We assume that the statement is false, and let G be a minimal counterexample. In particular, G is non-abelian. Let N be a minimal normal subgroup of G such that N ⊆ G′ . As before, it follows that the degree of every strongly real, irreducible character of G whose kernel does not contain N is at least 2, and hence acd2,+ (G/N) ≤ acd2,+ (G) < 4/3. By the minimality of G, we then deduce that G/N has a normal Sylow 2-subgroup, and thus NP ✂ G, where P is a Sylow 2-subgroup of G. Since acd2,+ (G) < 4/3 < 2, Theorem 5.1 guarantees that G is solvable, and so N is elementary abelian. If N has even order, then NP = P and we would be done. So we may assume that N is an elementary abelian group of odd order, and moreover, G has no non-trivial normal 2-subgroup. We observe that each strongly real linear character of G restricts to a strongly real linear character of NP , and moreover, by Lemma 5.2, each strongly real linear character of NP lies under a unique strongly real linear character of G. It follows that n1,+ (NP ) = n1,+ (G). This and Lemma 5.2 imply that acd2,+ (NP ) ≤ acd2,+ (G) < 4/3. Thus, if NP < G, then by the minimality of G, we have P ✁ NP so that NP = N × P , and hence P ✁ G, a contradiction. So we may assume that G = N ⋊ P . Since G has no non-trivial normal 2-subgroup, we see that N is the unique minimal normal subgroup of G. Now we have all the hypotheses of Proposition 5.5, and therefore we conclude that acd2,+ (G) ≥ 4/3. This contradiction completes the proof.  CHARACTERS OF EVEN DEGREE AND NORMAL SYLOW 2-SUBGROUPS 15 Acknowledgement We are grateful to the referee for helpful comments and suggestions that have significantly improved the exposition of the paper. References [1] J. H. Conway, R. T. Curtis, S. P. Norton, R. A. Parker, and R. A. Wilson, Atlas of Finite Groups, Clarendon Press, Oxford, 1985. [2] J. P. Cossey and H. N. Nguyen, Controlling composition factors of a finite group by its character degree ratio, J. Algebra 403 (2014), 185–200. [3] J. P. Cossey, Z. Halasi, A. Maróti, and H. N. Nguyen, On a conjecture of Gluck, Math. Z. 279 (2015), 1067–1080. [4] S. Dolfi, G. Navarro, and Pham Huu Tiep, Primes dividing the degrees of the real characters, Math. Z. 259 (2008), 755–774. [5] S. Dolfi, E. Pacifici, L. Sanus, and P. Spiga, On the orders of zeros of irreducible characters, J. Algebra 321 (2009), 345–352. [6] W. Feit, Extending Steinberg characters, Linear algebraic groups and their representations, Contemp. Math. 153 (1993), 1–9. [7] D. Gluck, The largest irreducible character degree of a finite group, Canad. J. Math. 37 (1985), 442–451. [8] Z. Halasi, C. Hannusch, and H. N. Nguyen, The largest character degrees of the symmetric and alternating groups, Proc. Amer. Math. Soc. 144 (2016), 1947–1960. [9] N. N. Hung, Characters of p′ -degree and Thompson’s character degree theorem, Rev. Mat. Iberoam., to appear. http://arxiv.org/abs/1506.06450 [10] N. N. Hung, M. L. Lewis, and A. A. Schaeffer Fry, Finite groups with an irreducible character of large degree, Manuscripta Math. 149 (2016), 523–546. [11] I. M. Isaacs, ‘Character Theory of Finite Groups’, AMS Chelsea Publishing, Providence, Rhode Island, 2006. [12] I. M. Isaacs, The number of generators of a linear p-group, Canad. J. Math. 24 (1972), 851–858. [13] I. M. Isaacs and G. Navarro, Groups whose real irreducible characters have degree coprime to p, J. Algebra 356 (2012), 195–206. [14] I. M. Isaacs, M. Loukaki, and A. Moretó, The average degree of an irreducible character of a finite group, Israel J. Math. 197 (2013), 55–67. [15] N. Itô, Some studies on group characters, Nagoya Math. J. 2 (1951), 17–28. [16] M.L. Lewis and H. N. Nguyen, The character degree ratio and composition factors of a finite group, Monatsh. Math. 180 (2016), 289–294. [17] O. Manz, On the modular version of Ito’s theorem on character degrees for groups of odd order, Nagoya Math. J. 105 (1987), 121–128. [18] O. Manz and T. R. Wolf, Brauer characters of q ′ -degree in p-solvable groups, J. Algebra 115 (1988), 75–91. [19] S. Marinelli and Pham Huu Tiep, Zeros of real irreducible characters of finite groups, Algebra Number Theory 7 (2013), 567–593. [20] G. O. Michler, Brauer’s conjectures and the classification of finite simple groups, Lecture Notes in Math. 1178, Springer, Berlin, 1986, 129–142. [21] G. O. Michler, A finite simple group of Lie type has p-blocks with different defects, p 6= 2, J. Algebra 104 (1986), 220–230 16 NGUYEN NGOC HUNG AND PHAM HUU TIEP [22] A. Moretó and H. N. Nguyen, On the average character degree of finite groups, Bull. Lond. Math. Soc. 46 (2014), 454–462. [23] G. Navarro, ‘Characters and Blocks of Finite Groups’, London Mathematical Society Lecture Note Series 250, Cambridge University Press, Cambridge, 1998. [24] G. Navarro and Pham Huu Tiep, Degrees of rational characters of finite groups, Adv. Math. 224 (2010), 1121–1142. [25] G. Navarro and Pham Huu Tiep, Degrees and p-rational characters, Bull. Lond. Math. Soc. 44 (2012), 1246–1250. [26] R. Rasala, On the minimal degrees of characters of Sn , J. Algebra 45 (1977), 132–181. [27] G. Seitz and A. E. Zalesskii, On the minimal degrees of projective representations of the finite Chevalley groups, II, J. Algebra 158 (1993), 233–243. [28] Pham Huu Tiep, Real ordinary characters and real Brauer characters, Trans. Amer. Math. Soc. 367 (2015), 1273–1312. Department of Mathematics, The University of Akron, Akron, Ohio 44325, USA E-mail address: [email protected] Department of Mathematics, University of Arizona, Tucson, Arizona 85721, USA E-mail address: [email protected]
4math.GR
arXiv:1607.05341v1 [math.AC] 18 Jul 2016 A NOTE ON ITOH (e)-VALUATION RINGS OF AN IDEAL Youngsu Kim, Louis J. Ratliff, Jr. and David E. Rush February 26, 2018 Abstract Let I be a regular proper ideal in a Noetherian ring R, let e ≥ 2 be an integer, let 1 1 1 Te = R[u, tI, u e ]′ ∩ R[u e , t e ] (where t is an indeterminate and u = 1t ), and let re = 1 u e Te . Then the Itoh (e)-valuation rings of I are the rings (Te /z)(p/z) , where p varies over the (height one) associated prime ideals of re and z is the (unique) minimal prime ideal in Te that is contained in p. We show, among other things: (1) re is a radical ideal if and only if e is a common multiple of the Rees integers of I. (2) For each integer k ≥ 2, there is a one-to-one correspondence between the Itoh (k)valuation rings (V ∗ , N ∗ ) of I and the Rees valuation rings (W, Q) of uR[u, tI]; namely, 1 if F (u) is the quotient field of W , then V ∗ is the integral closure of W in F (u k ). (3) For each integer k ≥ 2, if (V ∗ , N ∗ ) and (W, Q) are corresponding valuation rings, as in (2), then V ∗ is a finite integral extension domain of W , and W and V ∗ satisfy the Fundamental Equality with no splitting. Also, if uW = Qe , and if the greatest common divisor of e and k is d, and c is the integer such that cd = k, then QV ∗ = N ∗ c and [(V ∗ /N ∗ ) : (W/Q)] = d. Further, if uW = Qe and k = qe is a multiple of e, then there 1 exists a unit θe ∈ V ∗ such that V ∗ = W [θe , u k ] is a finite free integral extension domain 1 of W , QV ∗ = N ∗ q , N ∗ = u k V ∗ , and [V ∗ : W ] = k. (4) If the Rees integers of I are all equal to e, then V ∗ = W [θe ] is a simple free integral 1 extension domain of W , QV ∗ = N ∗ = u e V ∗ , and [V ∗ : W ] = e = [(V ∗ /N ∗ ) : (W/Q)]. 1 INTRODUCTION All rings in this paper are commutative and have an identity element 1 6= 0, and our terminology is mainly as in Nagata [7]. Thus a basis of an ideal is a generating set of the ideal, the term altitude refers to what is often called dimension or Krull dimension, and for a pair of local rings (R, M ) and (S, N ), S dominates R in case R ⊆ S and N ∩ R = M , and we then write R ≤ S or (S, N) ≥ (R, M). In 1988, Shiroh Itoh proved the following interesting and useful theorem in [5, p. 392, lines 3-11] (the terminology is defined in Section 2): 1 Theorem 1.1. Let I be a regular proper ideal in a Noetherian ring R, let R = R[u, tI] be the Rees ring of R with respect to I, let (W1 , Q1 ), . . . , (Wn , Qn ) be the Rees valuation rings of uR, for j = 1, . . . , n, let uWj = Qj ej (so e1 , . . . , en are the Rees integers of I), 1 and let e ≥ 2 be an arbitrary common multiple of e1 , . . . , en . Also, let S = R[u e ], let T = 1 1 1 S′ ∩ R[u e , t e ], and let r = u e T. Then: 1 (1.1.1) r is a radical ideal, so the Rees integers of r and of (u e S)a are all equal to one. (1.1.2) There is a one-to-one correspondence between the Rees valuation rings (V ∗ , N ∗ ) of r and the Rees valuation rings (W, Q) of uR; namely, if F (u) is the quotient field of W , 1 then V ∗ is the integral closure of W in F (u e ). (1.1.3) Let (V ∗ , N ∗ ) and (W, Q) be corresponding Rees valuation rings of r and uR, ree spectively, as in (1.1.2 ), so W = Wj for some j ∈ {1, . . . , n}. Then QV ∗ = N ∗ ej , so the ramification index of V ∗ relative to W is equal to e ej . Actually, the only part of this theorem that S. Itoh specifically stated in [5] was that r is a radical ideal when e is the least common multiple of e1 , . . . , en . His proof of this essentially shows that (1.1.1) - (1.1.3) hold, but his goals in [5] were to prove several nice applications of the radicality of the ideal r, not to find additional properties of the Rees valuation rings of this ideal. However, it turns out that the Rees valuation rings of ideals like r have some additional nice properties, and the goal of this present paper is to derive some of these properties. To facilitate discussing these valuation rings we make the following definition. Definition 1.2. For an arbitrary integer e ≥ 2, the Itoh (e)-valuation rings of I are 1 1 1 1 the Rees valuation rings of re = u e Te , where Te = R[u, tI, u e ]′ ∩ R[u e , t e ]. 2 DEFINITIONS AND KNOWN RESULTS In this section we recall the needed definitions and mention the needed known results concerning them. Definition 2.1. Let I be an ideal in a ring R. Then: (2.1.1) R′ denotes the integral closure of R in its total quotient ring. 2 (2.1.2) Ia denotes the integral closure of I in R, so Ia is the ideal {x ∈ R | x is a root of an equation of the form X n + i1 X n−1 + · · · + in = 0}, where ij ∈ I j for j = 1, . . . , n. The ideal I is integrally closed in case I = Ia . (2.1.3) The Rees ring of R with resect to I is the graded subring R(R, I) = R[u, tI] of R[u, t], where t is an indeterminate and u = 1t . (2.1.4) Assume that R is Noetherian and that I is a regular proper ideal in R (that is, I contains a regular element of R and I 6= R), and let b1 , . . . , bg be regular elements in R that generate I. For i = 1, . . . , g, let Ci = R[I/bi ], let pi,1 , . . . , pi,ni be the (height one) associated prime ideals of bi Ci ′ (see (2.1.1)), let zi,j be the (unique; see Remark 2.2.1 below) minimal prime ideal in Ci ′ that is contained in pi,j (possibly zi,h = zi,j for some h 6= j or zi,j = (0)), and let Vi,j = (Ci ′ /zi,j )(pi,j /zi,j ) , so Vi,j is a DVR. Then the set RV(I) of all Vi,j (i = 1, . . . , g and j = 1, . . . , ni ) is the set of Rees valuation rings of I. (The Rees valuation rings of I are well defined by I; they do not depend on the basis b1 , . . . , bg of I.) (2.1.5) If (V, N ) is a Rees valuation ring of I (see (2.1.4)), then the Rees integer of I with respect to V is the positive integer e such that IV = N e . If RV(I) = {(V1,1 , N1,1 ), . . . , (Vg,ng , Ng,ng )}, and if IVi,j = Ni,j ei,j for i = 1, . . . , g and j = 1, . . . , ni , then e1,1 , . . . , eg,ng are called the Rees integers of I. (2.1.6) If (W, Q) ≤ (V ∗ , N ∗ ) are DVRs such that V ∗ is a localization of an integral extension domain of W , then the ramification index of V ∗ relative to W is the positive integer k such that QV ∗ = N ∗k . Remark 2.2. Let I be a regular proper ideal in a Noetherian ring R. Then: (2.2.1) Concerning (2.1.4), it is shown in [9, Definition p. 213 and Propositions 2.7 and 2.13] that if b is a regular nonunit in the integral closure A′ of a Noetherian ring A, then bA′ has a finite primary decomposition, each associated prime ideal p of bA′ has height one, p contains exactly one associated prime ideal z of (0), and (A′ /z)(p/z) is a DVR. (2.2.2) It is shown in [11, Proposition 10.2.3] that if V1 , . . . , Vn are the Rees valuation rings of I, then (I k )a = ∩{I k Vj ∩ R | j = 1, . . . , n} for all k ∈ N>0 . (N>0 denotes the set of positive integers.) (2.2.3) It readily follows from Definition 2.1.4 that the set RV(I) of Rees valuation rings of I is the disjoint union of the sets RV((I + z)/z), where z runs over the minimal prime 3 ideals w in R such that I + w 6= R. Also, if V is a Rees valuation ring of I and of (I + z)/z, then the Rees integer of I with respect to V is the Rees integer of (I + z)/z with respect to V. (2.2.4) It follows from Definition 2.1.4 (and is proved in [11, Example 10.3.2]) that if I = bR is a regular proper principal ideal in R, then the Rees valuation rings of I are the rings (R′ /z)(p/z) , where p varies over the (height one) associated prime ideals of bR′ and z is the (unique) minimal prime ideal in R′ that is contained in p. (It is readily checked that if A = R′ ∩ R[ 1b ], then there is a one-to-one correspondence between the associated prime ideals p of bR′ and the associated prime ideals q of bA; namely, q = p ∩ A, and then (R′ /z)(p/z) = (A/z ′ )(q/z ′ ) , where z ′ = z ∩ A.) (2.2.5) It follows from Definitions 2.1.4 and 2.1.5 that if A is a ring such that R ⊆ A ⊆ R′ , then I and IA have the same Rees valuation rings and the same Rees integers. And it also follows that, for all positive integers k, IA and I k A have the same Rees valuation rings. (2.2.6) It is well known (and is readily proved, much as in the proof of [1, (2.5)]), that if R is a Noetherian integral domain and A is an integral extension domain of R, then the Rees valuation rings of IA are the extensions of the Rees valuation rings of I to the quotient field of A. The following theorem is a special case of [13, Theorems 19 and 20, pp. 55 and 60-61]; the terminology “Fundamental Inequality” is due to O. Endler in [2, pp. 127-128]. Theorem 2.3. (Fundamental Inequality): Let (V, N ) be a DVR with quotient field F , let E be a finite algebraic extension field of F , let [E : F ] = e, let (V1 , N1 ), . . . , (Vn , Nn ) be all of the valuation rings of E that are extensions of V to E (so the integral closure V ′ of V in E has exactly n maximal ideals M1 , . . . , Mn and Vj = V ′ Mj , j = 1, . . . , n), and for j = 1, . . . , n, let N Vj = Nj ej and [(Vj /Nj ) : (V /N )] = fj . Then (FI) n X ej fj ≤ e, j=1 and the equality holds if the integral closure V ′ of V in E is a finite V -module. Terminology 2.4. If (V, N ) and (V1 , N1 ), . . . , (Vn , Nn ) are as in Theorem 2.3, if n = 1, and if the equality in (FI) holds, then it will be said that (V, N ) and (V1 , N1 ) satisfy the Fundamental Equality with no splitting. 4 Notation 2.5. If R is an integral domain, then R(0) denotes the quotient field of R. Therefore, if S is a finite algebraic extension domain of R, then [S(0) : R(0) ] denotes the dimension of the quotient field S(0) of S over the quotient field R(0) of R. If S is a finite free integral extension domain of R, and if it is clear that the rank of S is equal to [S(0) : R(0) ], then we often write [S : R] in place of [S(0) : R(0) ]. The next three propositions are known, but we do not know specific references for them, so we sketch their proofs. Proposition 2.6. Let (W, Q) be a DVR, let Q = πW , let f ≥ 2 be an integer, let D = 1 1 W [π f ], and let P ′ = π f D. Then D is a DVR that is a simple free integral extension domain of W , P ′ is the maximal ideal in D, QD = P ′ f , [D(0) : W(0) ] = f , and D/P ′ ∼ = W/Q. Therefore W and D satisfy the Fundamental Equality with no splitting (see Terminology 2.4). 1 Proof. P ′ = (Q, π f )D is a maximal ideal in D, since D/P ′ ∼ = W/Q is a field, and P ′ = 1 π f D is a principal ideal, since Q is generated by π. Also, D is integral over W and Q is the unique maximal ideal in W , so every maximal ideal in D contains QD, so it follows that P ′ is the only maximal ideal in D, hence D is a DVR. It therefore follows that QD = P ′ f . Therefore, since [D(0) : W(0) ] ≤ f , it follows from the Fundamental Inequality FI that [D(0) : W(0) ] = f , hence D is a simple free integral extension domain of W . Thus, by (2.4), the last statement is clear. Proposition 2.7. Let M be a maximal ideal in a Noetherian ring R, and let m(X) be a monic polynomial in R[X]. If the image m(X) of m(X) in (R/M )[X] is irreducible, then m(X) is irreducible in R[X], M R[x] is a maximal ideal in R[x] = R[X]/(m(X)R[X]), and R[x] is a simple free integral extension ring of R of rank equal to deg(m(X)). Proof. By considering the maps R[X] → (R/M )[X] → (R/M )[χ], where χ is a root of the irreducible (by hypothesis) polynomial m(X) in (R/M )[X], it follows that: m(X) is irreducible in R[X]; (M, m(X))R[X] is a maximal ideal; M R[x] = ((M, m(X))R[X])/(m(X)R[X]) is a maximal ideal in R[x]; and, R[x] is a simple free integral extension ring of R of rank equal to deg(m(X)). 5 Proposition 2.8. Let I be a regular proper ideal in a Noetherian ring R, let b1 , . . . , bg be regular elements in I that are a basis of I, and let R = R[u, tI] be the Rees ring of R with respect to I. Then there exists a one-to-one correspondence between the Rees valuation rings (V, N ) of I and the Rees valuation rings (W, Q) of uR[u, tI]. Namely, if V = (R[I/bi ]′ /z)(p/z) (where i ∈ {1, . . . , g}, p is an associated prime ideal of bi R[I/bi ]′ , and z is the minimal prime ideal in R[I/bi ]′ that is contained in p), then W = V [tbi ]N V [tbi ] , where tbi = t(bi + z), and Q = N W . (Note that tbi = tbi + z ′ (where z ′ = zR[u, t] ∩ R[u, tI]) corresponds to t · bi in the isomorphism between R[u, tI]/z ′ and (R/z)[u, t((I + z)/z)]; see [10].) Proof. Since t is transcendental over R and u = 1 t, there is a one-to-one correspondence between the minimal prime ideals z in R and the minimal prime ideals z ′ in R; namely, z ′ = zR[u, t] ∩ R, and then z = z ′ ∩ R. Thus it follows from Remark 2.2.3 that it suffices to prove this proposition for the case when R is a Noetherian integral domain. Therefore assume that R is a Noetherian domain, fix b ∈ {b1 , . . . , bg }, let C = R[I/b], and let C′ = R[ tb1 ]′ , so R′ [ tb1 ] = C′ = C ′ [tb, tb1 ]. Also, uC′ = bC′ , so, since tb is transcendental over C ′ , there exists a one-to-one correspondence between the (height one) associated prime ideals p of bC ′ and the (height one) associated prime ideals p′ of uC′ ; namely, p′ = pC′ (and p = p′ ∩ C ′ ). Therefore there exists a one-to-one correspondence between the DVRs V = C ′ p and the DVRs W = C′ p′ , and for corresponding V and W , if V = R[I/b]′ p and N = pV , then W = V [tb]N V [tb] and Q = N W = pW . It follows that, for each Rees valuation ring (V, N ) of I of the form V = R[I/b]′ p , the ring W = V [tb]pV [tb] is a Rees valuation ring of uR, and W ∩ R(0) = V . Finally, let W be a Rees valuation ring of uR, say W = R′ p′ , where p′ is a (height one) associated prime ideal of uR′ (see Remark 2.2.4). To complete the proof of the one-to-one correspondence, it suffices to show that there exists b ∈ {b1 , . . . , bg } and a Rees valuation ring (V, N ) of I such that V = R[I/b]′ p and W = V [tb]N V [tb] . For this, tb ∈ / p′ for some b ∈ {b1 , . . . , bg }, by [8, Lemma 3.2] (the assumption in [8] that R is analytically unramified is not used in the proof of Lemma 3.2). Therefore W = R[ tb1 ]′ p′′ , where p′′ = p′ W ∩ R[ tb1 ]′ (so p′′ is a (height one) associated prime ideal of uR[ tb1 ]′ = bR[ tb1 ]′ , and R[ tb1 ]′ = C ′ [tb, tb1 ], where C = R[I/b]. Let p = p′′ ∩ C ′ . Then p is a (height one) 6 associated prime ideal of bC ′ and p′′ = pC ′ [tb, tb1 ], so it follows from the second preceding paragraph that W = V [tb]N V [tb] , where V = C ′ p and N = pV . 3 PROPERTIES OF ITOH (e)-VALUATION RINGS In this section we show that Itoh (e)-valuation rings have several nice properties. For this, we need the following proposition, which is essentially a corollary of Proposition 2.7. Proposition 3.1. Let I be a regular proper ideal in a Noetherian ring R, let b1 , . . . , bg be regular elements in I that generate I, and let R = R[u, tI] be the Rees ring of R with respect to I. Let (V, N ) and (W, Q) be corresponding (as in Proposition 2.8) Rees valuation rings of I and uR, respectively, say V = (R[I/b]′ /z)(p/z) , where b ∈ {b1 , . . . , bg }, p is a (height one) associated prime ideal of bR[I/b]′ , and z is the minimal prime ideal in R[I/b]′ that is contained in p, so W = V [tb]N V [tb] , where b = b + z. Let e ≥ 2 be an integer, let v ∈ V − N , let me (X) = X e − v , tb and let θe be a root of me (X) in a fixed algebraic closure of the quotient field of W . Then U = W [θe ] is a DVR that is a simple free integral extension domain of W , QU is its maximal ideal, and [U : W ] = e = [U/(QU ) : W/Q]. Therefore W and U satisfy the Fundamental Equality with no splitting (see Terminology 2.4). Proof. Since W = V [tb]N V [tb] (with tb transcendental over V ) and Q = N W is an extended ideal from V , tb + Q ∈ W/Q is transcendental over V /N , so it follows that the image me (X) ∈ (W/Q)[X] of me (X) is irreducible, hence [(W/Q)[y] : (W/Q)] = e, where y = X + me (X)(W/Q)[X]. Therefore it follows from Proposition 2.7 that: me (X) is irreducible in the UFD W [X]; M = QU is a (principal) maximal ideal, where U = W [θe ]; and, [U : W ] = e. Further, U is integral over W and Q is the unique maximal ideal in W , so every maximal ideal in U contains the maximal ideal QU , hence U is a DVR that is a simple free integral extension domain of W and M is its maximal ideal. Therefore, by (2.4), the last statement is clear. Our first theorem, Theorem 3.2, is an expanded version of Itoh’s Theorem (see Theorem 1.1; note that (1.1.3) is proved in (3.2.5)). Theorem 3.2. Let I be a regular proper ideal in a Noetherian ring R, let b1 , . . . , bg be regular elements in I that are a basis of I, let (V1 , N1 ), . . . , (Vn , Nn ) be the Rees valuation 7 rings of I, let e1 , . . . , en be the Rees integers of I, let e be an arbitrary common multiple of e1 , . . . , en , and let fj = e ej (j = 1, . . . , n). Also, let R = R[u, tI] be the Rees ring of R with 1 e 1 1 1 respect to I, let S = R[u ], let T = S′ ∩ R[u e , t e ], and let r = u e T. Then: (3.2.1) r is a radical ideal. (3.2.2) There is a one-to-one correspondence between the Itoh (e)-valuation rings (V ∗ , N ∗ ) of I and the Rees valuation rings (W, Q) of uR; namely, given W , if F (u) is the quotient 1 field of W , then V ∗ is the integral closure of W in F (u e ). (3.2.3) Let (W, Q) and (V ∗ , N ∗ ) be corresponding (as in (3.2.2 )) valuation rings, and let (V, N = πV ) be the Rees valuation ring of I that corresponds (as in Proposition 2.8) to W , so V ≤ W ≤ V ∗ and N W = Q. Assume that V = Vj , so IV = N ej (= Nj ej ). Then there exists a unit θ ∈ V ∗ such that (U, P ) = (W [θ], N ∗ ∩ W [θ]) is an Itoh (ej )valuation ring of I that is a simple free integral extension domain of W and P = QU is the maximal ideal in U , so the ramification index of U relative to W is equal to one (see Definition 2.1.6 ). 1 Also, QU = πU = yU , where y = u ej , and [U : W ] = ej = [(U/P ) : (W/Q)]. Therefore W and U satisfy the Fundamental Equality with no splitting. (3.2.4) Let (V, N ) ≤ (U, P ) ≤ (V ∗ , N ∗ ) (with V = Vj ) be as in (3.2.3 ). Then there exists a nonunit x ∈ V ∗ such that V ∗ = U [x] is a simple free integral extension domain of U , N ∗ 1 1 1 = xV ∗ (where x = y fj with y = u ej (as in (3.2.3 )), so x = u e ), and P V ∗ = N ∗fj , so the ramification index of V ∗ relative to U is equal to fj . Also, [V ∗ : U ] = fj , and V ∗ /N ∗ ∼ = U/P , so U and V ∗ satisfy the Fundamental Equality with no splitting. 1 (3.2.5) V ∗ = W [θ, x], N ∗ = xV ∗ = u e V ∗ , where θ is as in (3.2.3 ) and x is as in (3.2.4 ), and V ∗ is a finite free integral extension domain of W . Also, the ramification index of V ∗ relative to W is equal to fj , [(V ∗ /N ∗ ) : (W/Q)] = ej , and [V ∗ : W ] = e, so W and V ∗ satisfy the Fundamental Equality with no splitting. (3.2.6) Assume that e1 = · · · = en = e, and let (W, Q) and U = W [θ] be as in (3.2.3 ). 1 Then V ∗ = U is a simple free integral extension domain of W , P = QU = u e U is the maximal ideal in U , and [U : W ] = ej = [(U/P ) : (W/Q)]. Therefore W and V ∗ (= U ) 1 satisfy the Fundamental Equality with no splitting, and u e T is a radical ideal, where T = 1 1 1 R[u, tI, u e ]′ ∩ R[u e , t e ]. 8 Proof. We first prove (3.2.3) - (3.2.5). For this, fix an Itoh (e)-valuation ring (V ∗ , N ∗ ) of I. Then, by Definitions 1.2 and 2.1.4, there exists a (height one) associated prime ideal p∗ of 1 1 1 u e T and a minimal prime ideal z ∗ ⊂ p∗ such that V ∗ = (T/z ∗ )(p∗ /z ∗ ) . Since T ⊂ R[u e , t e ] 1 1 1 1 and T and R[u e , t e ] have the same total quotient ring, it follows that z = z ∗ R[u e , t e ] ∩ R 1 1 is a minimal prime ideal in R and z ∗ = zR[u e , t e ] ∩ T. Also, z ′ = zR[u, t] ∩ R is a minimal prime ideal in R and z ∗ ∩ R = z ′ . 1 Let F be the quotient field of R/z, so F (u) (resp., F (u e )) is the quotient field of R/z ′ 1 (resp., V ∗ and T/z ∗ ). Also, by Definition 1.2, V ∗ is a Rees valuation ring of u e T, so V ∗ is 1 also a Rees valuation ring of (u e T + z ∗ )/z ∗ , by Remark 2.2.3, so V ∗ is also a Rees valuation ring of (uT + z ∗ )/z ∗ , by Remark 2.2.5. Therefore W = V ∗ ∩ F (u) is a Rees valuation ring of the ideal (uR + z)/z, by Remark 1 2.2.6 (and so also of uR, by Remark 2.2.3), hence V ∗ is an extension of W to F (u e ). Let V be the Rees valuation ring of I that corresponds (as in Proposition 2.8) to W , and assume that V = Vj = (C ′ /z)(p/z) , where C ′ is the integral closure of C = R[I/b] in its total quotient ring, b ∈ {b1 , . . . , bg }, p is a (height one) associated prime ideal of bC ′ , and z is the (unique) minimal prime ideal in C ′ that is contained in p. Let N and Q be the maximal ideals in V and W , respectively. Then Q = N W by Proposition 2.8, so (3.2.7) tb + Q ∈ W/Q is transcendental over V /N, where b = b + z. Let N = πV , so, by hypothesis, bV = IV = N ej = π ej V . Therefore uW = bW = IW = Qej = π ej W , so (3.2.8) there exist units v ∈ V and w ∈ W such that b = vπ ej and u = wπ ej . Since b = u(tb) (see the last part of Proposition 2.8), it follows from (3.2.8) that (3.2.9) w= v . tb 1 Let θ = w ej (in a fixed algebraic closure (F (u))∗ of F (u)), and let U = W [θ]. Then it follows from Proposition 3.1 that: U is a DVR that is a simple free integral extension domain of W ; QU is its maximal ideal; [U : W ] = ej = [(U/(QU )) : (W/Q)]; and, W and U satisfy the Fundamental Equality with no splitting. 9 Continuing with the proof of (3.2.3), we next show that U ≤ V ∗ , and we first show that 1 1 1 1 θ ∈ V ∗ . For this, wπ ej = u, by (3.2.8), θ = w ej , and u e ∈ V ∗ , so θπ = (wπ ej ) ej = u ej 1 1 = (u e )fj ∈ V ∗ , hence θπ = u ej ∈ V ∗ . Further, π ∈ Q ⊂ V ∗ , so θ is in the quotient field 1 1 F (u e ) of V ∗ . Moreover, θ = w ej is integral over W and is a unit, W ≤ V ∗ , and V ∗ is 1 integrally closed in F (u e ), so θ ∈ V ∗ and is a unit in V ∗ . Therefore U = W [θ] ≤ V ∗ , and 1 u ej U = θπU = πU = QU = N ∗ ∩ U is the maximal ideal in U . Thus, to complete the proof of (3.2.3), it remains to show that U is an Itoh (ej )-valuation ring of I. 1 1 1 For this, U = W [θ] ⊇ W [u ej ]′ ⊇ R[u ej ]′ ⊇ Tej + R′ , where Tej = R[u, tI, u ej ]′ ∩ 1 1 R[u ej , t ej ], and P ∩ R′ = (P ∩ W ) ∩ R′ = Q ∩ R′ is a height one associated prime ideal of 1 1 uR′ , so P ∩ Tej = q, say, is a height one associated prime ideal of u ej Tej (since u ej ∈ P ). Therefore U ≥ (Tej )q , (Tej )q is an Itoh (ej )-valuation ring of I, and U and (Tej )q are DVRs with the same quotient field, so U = (Tej )q is an Itoh (ej )-valuation ring of I. Thus (3.2.3) holds. 1 1 1 For (3.2.4), let y = u ej , let x = y fj (so x = u e , since ej · fj = e), and let D = U [x]. By (3.2.3), P = yU is the maximal ideal in U , so it follows from Proposition 2.6 that: D is a DVR that is a simple free integral extension domain of U ; (QU )D = P ′ fj , where P ′ = 1 π fj D is the maximal ideal in D (so D/P ′ ∼ = U/P ); [D : U ] = fj ; and, U and D satisfy the Fundamental Equality with no splitting. 1 1 Further, since u e = x ∈ D, D and V ∗ have the same quotient field F (u e ). Thus, V ∗ 1 and D are DVRs in F (u e ), and D ≤ V ∗ , so it follows that D = V ∗ and P ′ = N ∗ . Therefore (3.2.4) holds. 1 It follows from (3.2.3) and (3.2.4) that V ∗ = W [θ, x] (= W [θ, u e ]) is a finite free integral 1 extension domain of W , that N ∗ = xV ∗ = u e V ∗ , and that [V ∗ : W ] = ej · fj = e. Also, since the ramification index of U over W is equal to one, by (3.2.3), and the ramification index of V ∗ = D over U is equal to fj , by (3.2.4), it follows that the ramification index of V ∗ over W is equal to fj . Further, [(U/P ) : (W/Q)] = ej , by (3.2.3), and V ∗ /N ∗ ∼ = U/P , by (3.2.4), so [(V ∗ /N ∗ ) : (W/Q)] = ej . Thus it follows that W and V ∗ satisfy the Fundamental Equality with no splitting, hence (3.2.5) holds. Moreover, since V ∗ is a finite free integral extension domain of W , and since V ∗ is integrally closed, it follows that V ∗ is the integral closure of W (= Wj ) in the quotient field 10 1 F (u e ) of V ∗ . Therefore it has been shown that if V ∗ is an Itoh (e)-valuation ring of I, 1 then: V ∗ = (T/z ∗ )(p∗ /z ∗ ) (for some (height one) associated prime ideal p∗ of u e T, where z ∗ is the minimal prime ideal in T that is contained in p∗ ); z = z ∗ ∩ R and z ′ = z ∗ ∩ R are minimal prime ideals in R and R, respectively; and, if F (resp., F (u)) is the quotient field 1 of R/z (resp., R/z ′ ), then V ∗ is the integral closure of W (= V ∗ ∩ F (u)) in F (u e ), and W is a Rees valuation ring of uR (and of (uR + z ′ )/z ′ ). 1 It follows that each Itoh (e)-valuation ring V ∗ (with quotient field F (u e )) corresponds to the Rees valuation ring W (= V ∗ ∩ F (u)) of uR. On the other hand, if W is a Rees valuation ring of uR, then: W = (R′ /z ′ )(p′ /z ′ ) for some (height one) associated prime ideal p′ of uR, where z ′ is the minimal prime ideal in R that is contained in p′ ; z = z ′ ∩ R and 1 1 z ∗ = zR[u e , t e ] ∩ T are minimal prime ideals in R and T, respectively; and, if F (resp., 1 F (u e )) is the quotient field of R/z (resp., T/z ∗ ) and W ′′ is the integral closure of W in 1 F (u e ), then for each maximal ideal M in W ′′ , W ′′ M is a Rees valuation ring of (uT+z ∗ )/z ∗ 1 and of (u e T + z ∗ )/z ∗ , by Remarks 2.2.6 and 2.2.5, so each V ′′ M is a Rees valuation ring 1 of uT and of u e T, by Remark 2.2.3, hence each such W ′′ M is an Itoh (e)-valuation ring of I, by Definition 1.2. It therefore follows from the first part of this paragraph that W ′′ has exactly one maximal ideal, so the one-to-one correspondence of (3.2.2) holds. 1 For (3.2.1), u e V ∗ = N ∗ , by (3.2.4). Therefore, since V ∗ is an arbitrary Itoh (e)-valuation 1 ring of I, it follows from Definitions 1.2 and 2.1.5 that the Rees integers of u e T are all 1 1 1 equal to one. Also, since T = R[u e ]′ ∩ R[u e , t e ], by [9, Remarks (ii) p. 215] it follows 1 1 1 1 that u e T = (u e T)a . Therefore it follows from Remark 2.2.2 that r = u e T = (u e T)a = 1 ∩{u e Vj ∗ ∩ T | j = 1, . . . , n} = ∩{Nj ∗ ∩ T | j = 1, . . . , n} is a radical ideal. Thus (3.2.1) holds, so (3.2.1) - (3.2.5) hold. Finally, for (3.2.6), let W be a Rees valuation ring of uR, let V ∗ be the corresponding (as in (3.2.2)) Itoh (e)-valuation ring of I, and let U be as in (3.2.3), so W ≤ U ≤ V ∗ . Then there exists j ∈ {1, . . . , n} such that [U : W ] = ej (by (3.2.3)) = e (by the hypothesis in (3.2.6)) = [V ∗ : W ] (by (3.2.5)), so V ∗ = U is a simple free integral extension domain of 1 1 W . Also, P = N ∗ = u e V ∗ (by (3.2.5)) = u e U . Since this holds for all Itoh (e)-valuation 1 rings (U, P ) of I, u e T is a radical ideal, hence (3.2.6) holds. Concerning Theorem 3.2.6, it is shown in Corollary 4.12 below that there always exists 11 a finite integral extension ring A of R such that the Rees integers of IA are all equal to e, where e is an arbitrary common multiple of the Rees integers e1 , . . . , en of I, so Theorem 3.2.6 directly applies to IA in place of I. Remark 3.3. Let (V, N ) be a Rees valuation ring of I and assume that IV = N k . Let (W, Q) be the Rees valuation ring of uR[u, tI] that corresponds (as in Proposition 2.8) to V , and let h be an arbitrary positive integer. Then it follows from Theorem 3.2.3 and 3.2.4 1 1 1 1 that: U = W [u k ]′ and D = W [u hk ]′ = U [(u k ) h ]′ are DVRs that are finite free integral 1 1 extension domains of W ; the maximal ideal of U (resp., D) is P = u k U (resp., M = u hk D); the ramification index of D relative to U (resp., U relative to W ) is equal to h (resp., 1); [D : U ] = h and [U : W ] = k; and, D/M ∼ = U/P and [(U/P ) : (W/Q)] = k. It therefore follows that W and U (resp., W and D, U and D) satisfy the Fundamental Equality with no splitting. Also, it follows from Theorem 3.2.3 (resp., 3.2.4) that U (resp., D) is an Itoh (k)-valuation (resp., (hk)-valuation) ring of I. Remark 3.4. The following result is called the Theorem of Independence of Valuations, and it is proved in [7, (11.11)]: Let (V1 , N1 ), . . . , (Vn , Nn ) be valuation rings with the same quotient field F , and assume there are no containment relations among the Vj . Let V = V1 ∩ · · · ∩ Vn and let Pj = Nj ∩ V (j = 1, . . . , n). Then P1 , . . . , Pn are the maximal ideals in V and Vj = VPj for j = 1, . . . , n. Corollary 3.5. Let I = (b1 , . . . , bg )R be a nonzero proper ideal in a Noetherian integral domain R, let F be the quotient field of R, let R = R[u, tI], let (W1 , Q1 ), . . . , (Wn , Qn ) be the Rees valuation rings of uR, let e be a positive common multiple of the Rees integers 1 e1 , . . . , en of uR, let W = W1 ∩ · · · ∩ Wn , and let D = W[x], where x = u e in a fixed algebraic closure F (u)∗ of F (u). Then: (1) W is a semi-local Dedekind domain with exactly n maximal ideals Pj = Qj ∩ W, j = 1, . . . , n. (2) D is a simple free integral extension domain of W of rank e, and D has exactly n maximal ideals Mj = (Pj , x)D. (3) There exist distinct elements θ1 , . . . , θn in the quotient field F (x) of D such that: (3.1) D′ is the intersection of the Itoh (e)-valuation rings (V1 ∗ , N1 ∗ ), . . . , (Vn ∗ , Nn ∗ ) of I, where Vj ∗ = Wj [θj , x] = D′ Mj , where Mj = Nj ∗ ∩ D′ . 12 (3.2) D′ = D[θ1 , . . . , θn ] is a semi-local Dedekind domain that is a finite integral extension domain of D, and D′ has exactly n maximal ideals Mj = Nj ∗ ∩ D′ (Pj , x, θ1 , . . . , θj−1 , θj+1 , . . . , θn )D′ . (3.3) The Jacobson radical of D′ is xD′ . (4) Assume that e1 = · · · = en = e and that there exists b ∈ I such that bWj = IWj for j = 1, . . . , n. Then, with D′ , as in (3.1 ), and Qj = πj Wj for j = 1, . . . , n, x π1 ···πn is a x x unit in D′ , D′ = D[ π1 ···π ] = W[ π1 ···π ], and xD′ is the Jacobson radical of D′ . n n Proof. (1) and part of (3.1) follow immediately from the Independence of Valuations Theorem (see Remark 3.4). The first part of (2) is clear. Also, each Mj is a maximal ideal in D, since D/Mj ∼ = Wj /Qj . Further, u (resp., x) is in the Jacobson radical of W (resp., D), xD ∩ W = uW (since D is a free W-algebra), and D/(xD) ∼ = W/(uW), so it follows that W, W/(uW), D, and D/(xD) each have exactly n maximal ideals, so (2) holds. For (3), for j = 1, . . . , n, let (Vj , Nj ) be the Rees valuation ring of I that corresponds (as in Proposition 2.8) to (Wj , Qj ) (so there exists bσ(j) (where σ : {1, . . . , n} → {1, . . . , g}) I ′ I ′ ] )pj , for some (height one) prime ideal pj in R[ bσ(j) ] ), in {b1 , . . . , bg } such that Vj = (R[ bσ(j) so Wj = Vj [tbσ(j) ]Nj Vj [tbσ(j) ] , Wj ∩ F = Vj , and Qj ∩ F = Nj . Let V = V1 ∩ · · · ∩ Vn , and for j = 1 . . . , n, let qj = Nj ∩ V. Then V = W ∩ F and W = V[u]S , where S = V[u] − (q1 V[u] ∪ · · · ∪ qnV[u]), and qj = (Qj ∩ F ) ∩ V = (Qj ∩ W) ∩ V = Pj ∩ V, for j = 1, . . . , n. Therefore it follows from the Independence of Valuations Theorem (see Remark 3.4) that V is a semi-local Dedekind domain with exactly n maximal ideals qj (j = 1, . . . , n). Thus V is a Principal Ideal Domain, by [12, Theorem 16, p. 278 ], so for j = 1, . . . , n, there exists πj ∈ qj such that qj = πj V, so: πj Vj = (Nj ∩ V)Vqj = Nj ; πj W = qj W = (Pj ∩ V)W = Pj ; and, πj Wj = qj WQj ∩W = Pj Wj = Qj . Then, since the Rees integers of uR are e1 , . . . , en (by hypothesis), uW = P1 e1 ∩ · · · ∩ Pn en = P1 e1 · · · Pn en = π1 e1 · · · πn en W, so there exists a unit w ∈ W such that u = wπ1 e1 · · · πn en , hence (*1) there exists a unit wj ∈ Wj such that u = wj πj ej (in Wj = WPj ), for j = 1, . . . , n, where (*2) wj = Y e \ u i = w π ∈ ( Pi ) − Pj , for j = 1, . . . , n. e i πj j i6=j i6=j 13 Also, since ej is the Rees integer of I with respect to Vj and IVj = bσ(j) Vj , there exists a unit vj ∈ Vj such that (*3) bσ(j) = vj πj ej in Vj , for j = 1, . . . , n. Therefore, since bσ(j) = u(tbσ(j) ) (in R ⊆ Wj ), it follows from (*3) and (*1) that vj πj ej = bσ(j) = u(tbσ(j) ) = wj πj ej (tbσ(j) ), hence (*4) wj = vj and wj + Pj is transcendental over V/(Pj ∩ V) for j = 1, . . . , n. tbσ(j) Therefore (*5) mej (X) = X ej − (wj + Pj ) is irreducible in (W/Pj )[X] f or j = 1, . . . , n. 1 For j = 1, . . . , n, let θj = wj ej in the (fixed) algebraic closure F (u)∗ of F (u). Then it is shown in Theorem 3.2.3 - 3.2.5 that, for the Itoh (e)-valuation ring Vj ∗ of I, (*6) Vj ∗ = Wj [θj , x] and θj is a unit in Vj ∗ , for j = 1, . . . , n. Also, V1 ∗ ∩ · · · ∩ Vn ∗ is the integral closure W∗ of W in F (x), by Theorem 3.2.2, and x = 1 u e ∈ W∗ (since u ∈ W), so it follows that W∗ = W[x]′ = D′ . 1 Further, for j = 1, . . . , n, θj = wj ej ∈ W∗ , by (*2) and (*6), and by (*2) θ1 , . . . , θj−1 , θj+1 , . . . , θn ∈ Nj ∗ ∩ W∗ = Nj ∗ ∩ D′ = Mj , for j = 1, . . . , n. Hence by (*2) and (*6) we see that (*7) for i = 1, . . . , n, θi ∈ ∩{Nj ∗ ∩ D′ | j = 1, . . . , i − 1, i + 1, . . . , n} − (Ni ∗ ∩ D′ ). Let E = D[θ1 , . . . , θn ]. Then, for j = 1, . . . , n, x ∈ D ⊆ E ⊆ W∗ (by (*2) and (*6)) ⊆ Vj ∗ = Wj [θj , x]. Therefore Wj = WNj ∗ ∩W ⊆ DNj ∗ ∩D ⊆ ENj ∗ ∩E ⊆ W∗ Nj ∗ ∩W∗ = Vj ∗ = (Wj [x])[θj ] ⊆ ENj ∗ ∩E , so Vj ∗ = ENj ∗ ∩E , for j = 1, . . . , n. Also, D and W∗ have exactly n maximal ideals, so it follows from integral dependence that E has exactly n maximal ideals. Further, for each integral domain A, A = ∩{AM | M is a maximal ideal in A}, by [7, (33.9)]. Therefore it follows that E = D[θ1 , . . . , θn ] = V1 ∗ ∩ · · · ∩ Vn ∗ = D′ . Thus (3.1) and (3.2) hold. 14 (3.3) follows immediately from Theorem 3.2.4. Finally, for (4), let (Vj , Nj ) be the Rees valuation ring of I that corresponds (as in Proposition 2.8) to (Wj , Qj ). Then it follows from the hypothesis on b that, for j = 1, . . . , n, Wj = Vj [tb]Nj Vj [tb] and Qj = Nj Wj . Let V = V1 ∩ · · · ∩ Vn , so by Remark 3.4 V is a semi-local Dedekind domain with exactly n maximal ideals Nj ∩ V (= Pj ∩ V). Thus V is a Principal Ideal Domain, by [12, Theorem 16, p. 278], so for j = 1, . . . , n there exists πj ∈ Nj ∩ V such that πj V = Nj ∩ V. Let α = π1 · · · πn , let N = N1 ∩ · · · ∩ Nn , and let Q = Q1 ∩ · · · ∩ Qn . Then, since the Rees integers of I are all equal to e, it follows that (3.5.4.1) IV = bV = Ne = αe V and IW = uW = Qe = αe W. It follows from (3.5.4.1) that (3.5.4.2) there exist units v ∈ V and w ∈ W such that b = vαe ∈ V and u = wαe ∈ W. Since b = u(tb) in R ⊆ W, and since Qj = Nj Vj [tb]Nj Vj [tb] for j = 1, . . . , n, it follows from (3.5.4.2) that (3.5.4.3) w = v and w + Pj is transcendental over V/(Pj ∩ V) for j = 1, . . . , n. tb Therefore (3.5.4.4) me (X) = X e − (w + Pj ) is irreducible in (W/Pj )[X] for j = 1, . . . , n. 1 Let θ = w e in the (fixed) algebraic closure F (u)∗ of F (u). Then it follows from Proposition 2.7, together with (3.5.4.4), that: me (X) is irreducible in the UFD W[X]; for j = 1, . . . , n, Mj = Pj E is a (principal) maximal ideal, where E = W[θ]; and, [E : W] = e. Also, E is integral over W, so it follows that M1 , . . . , Mn are the only nonzero prime ideals in E, hence E is a semi-local Dedekind domain that is a simple free integral extension domain of W and QE = (Q1 ∩ · · · ∩ Qn )E = (M1 ∩ · · · ∩ Mn )E = π1 · · · πn E = αE is its Jacobson radical J. Therefore D′ = E = W[θ] = D[θ], and since w = 1 e it follows that θ = w = x α u αe is a unit in W, is a unit in D′ and that J = αE = xE. The next remark lists several well known facts concerning finite field extensions and ramification. 15 Remark 3.6. Let (U1 , P1 ) ≤ (U2 , P2 ) ≤ (U3 , P3 ) be DVRs such that U3 is a finite integral extension of U1 . Then: (1) [(U3 )(0) : (U1 )(0) ] = [(U3 )(0) : (U2 )(0) ] · [(U2 )(0) : (U1 )(0) ]. (2) [(U3 /P3 ) : (U1 /P1 )] = [(U3 /P3 ) : (U2 /P2 )] · [(U2 /P2 ) : (U1 /P1 )]. Also, if we let r3,1 (resp., r3,2 , r2,1 ) denote the ramification index of U3 relative to U1 (resp., U3 relative to U2 , U2 relative to U1 ), then: (3) r3,1 = r3,2 · r2,1 . Further, if U1 and U3 satisfy the Fundamental Equality with no splitting, then (4) r3,1 · [(U3 /P3 ) : (U1 /P1 )] = [(U3 )(0) : (U1 )(0) ]. It then follows from (1) - (4) and the Fundamental Inequality, (2.3), that: (5) r3,2 · [(U3 /P3 ) : (U2 /P2 )] = [(U3 )(0) : (U2 )(0) ]. (6) r2,1 · [(U2 /P2 ) : (U1 /P1 )] = [(U2 )(0) : (U1 )(0) ]. (7) Hence, if U1 and U3 satisfy the Fundamental Equality with no splitting, then both (U1 and U2 ) and (U2 and U3 ) satisfy the Fundamental Equality with no splitting. The next proposition shows that Theorem 3.2.2 holds for all integers greater than one. Proposition 3.7. With the notation of Theorem 3.2, let k ≥ 2 be an arbitrary integer, let 1 1 1 Sk = R[u k ], and let Tk = Sk ′ ∩ R[u k , t k ]. Then: (1) There exists a one-to-one correspondence between the Itoh (k )-valuation rings (U, P ) of I and the Rees valuation rings (W, Q) of uR; namely, given W , if F (u) is the quotient 1 field of W , then U is the integral closure of W in F (u k ). (2) Let W and U be corresponding (as in (1 )). Then U is a finite integral extension domain of W , and W and U satisfy the Fundamental Equality with no splitting, Proof. Let m be the least common multiple of e1 , . . . , en , and let e = k · m. Then it is clear 1 1 1 that R ⊆ Tk ⊆ Te = R[u e ]′ ∩ R[u e , t e ] and that Te is integral over R. Also, by Theorem 3.2.2 there exists a one-to-one correspondence between the Rees valuation rings (W, Q) of uR and the Itoh (e)-valuation rings (V ∗ , N ∗ ) of I, and V ∗ is the integral closure of W in the quotient field of V ∗ . It follows from this, and integral dependence, that (1) holds. For (2), it follows from the proof of (1) that if W and V ∗ are as in (1), then there exists an Itoh (k)-valuation ring U of I such that W ≤ U ≤ V ∗ . Also, V ∗ is a finite free integral 16 extension domain of W , by Theorem 3.2.5, hence U is a finite integral extension domain of W . Further, W and V ∗ satisfy the Fundamental Equality with no splitting, by Theorem 3.2.5, so it follows from Remark 3.6.7 that (2) holds. Terminology 3.8. If (W, Q) is a Rees valuation ring of uR[u, tI] and (U, P ) is the corresponding (as in Proposition 3.7.1) Itoh (k)-valuation ring of I (so U ≥ W and U is the 1 integral closure of W in the quotient field F (u k ) of U ), then we say that (U, P) is the Itoh (k)-valuation ring of I that corresponds to (W, Q). Also, if (V, N ) is the Rees valuation ring of I that corresponds (as in Proposition 2.8) to (W, Q), then we say that (U, P) is the Itoh (k)-valuation ring of I that corresponds to (V, N). Proposition 3.9. Let I be a regular proper ideal in a Noetherian ring R, let (V, N ) be a Rees valuation ring of I, let (W, Q) be the Rees valuation ring of uR[u, tI] that corresponds (as in Proposition 2.8) to (V, N ), and let (Uk , Pk ) be the Itoh (k )-valuation ring of I that corresponds to (V, N ) (see (3.8)), where k ≥ 2 is an arbitrary integer. Assume that IV = N e . Then the following hold: (1) If e is a multiple of k, then Pk = N Uk and [(Uk )(0) : W(0) ] = k = [(Uk /Pk ) : (W/Q)]. (2) If e and k are relatively prime, then N Uk = Pk k , [(Uk )(0) : W(0) ] = k, and Uk /Pk ∼ = W/Q. (3) If the greatest common divisor of e and k is d, and if c ∈ N>0 is such that cd = k, then N Uk = Pk c , [(Uk )(0) : W(0) ] = k, and [(Uk /Pk ) : (W/Q)] = d. Proof. For (1), let (Ue , Pe ) be the Itoh (e)-valuation ring of I that corresponds to (V, N ). Then it follows from Remark 3.3 that Pe = N Ue and [(Ue )(0) : W(0) ] = e = [(Ue /Pe ) : (W/Q)]. Also, it is clear that W ≤ Uk ≤ Ue and that [(Uk )(0) : W(0) ] = k. Item (1) readily follows from this, together with Remark 3.6.1 - 3.6.3. For (2), let (Uke , Pke ) be the Itoh (ke)-valuation ring of I that corresponds to (V, N ). Then it follows from Remark 3.3 that Pke k = N Uke , [(Uke )(0) : W(0) ] = ke, and [(Uke /Pke ) : (W/Q)] = e. Also, it is clear that W ≤ Uk ≤ Uke and that [(Uk )(0) : W(0) ] = k. Since e and k are relatively prime, (2) readily follows from this, together with Remark 3.6.2, 3.6.3, and 3.6.7. 17 For (3), let (Uc , Pc ) (resp., (Ud , Pd )) be the Itoh (c)-valuation (resp., (d)-valuation) ring of I that corresponds to (V, N ). Since cd = k, it follows that W ≤ Uc ≤ Uk and W ≤ Ud ≤ Uk . Since e is a multiple of d, it follows from (1) that (a) QUd = Pd and [(Ud )(0) : W(0) ] = d = [(Ud /Pd ) : (W/Q)]. Since c and e are relatively prime, it follows from (2) that QUc = Pc c and Uc /Pc ∼ = W/Q. (b) It follows from (a), (b), and Remark 3.6.2, 3.6.3, and 3.6.7 that (3) holds. Proposition 3.10 gives several equivalences to Property 3.2.1 of Theorem 3.2 and also shows that the hypothesis of Theorem 3.2 is necessary for 3.2.1. Proposition 3.10. Let I be a regular proper ideal in a Noetherian ring R, let R = R[u, tI] 1 be the Rees ring of R with respect to I, let k ≥ 2 be an arbitrary integer, let Sk = R[u k ], 1 1 and let Tk = Sk ′ ∩ R[u k , t k ]. Then the following statements are equivalent: 1 (1) u k Tk is a radical ideal. 1 (2) The Rees integers of u k Tk are all equal to one. 1 (3) The Rees integers of (u k Sk )a are all equal to one. (4) k is a common multiple of the Rees integers of I. 1 Proof. A primary decomposition of the regular proper principal radical ideal u k Tk , together with Remark 2.2.4, shows that (1) ⇒ (2), and the next to last paragraph of the proof of Theorem 3.2 shows that (2) ⇒ (1). Also, (2) ⇔ (3), by Remark 2.2.5, since Sk ⊆ Tk ⊆ Sk ′ . Assume that (2) holds and let (V1 ∗ , N1 ∗ ), . . . , (Vn ∗ , Nn ∗ ) be the Itoh (k)-valuation rings 1 of I, so u k Vj ∗ = Nj ∗ for j = 1, . . . , n. For j = 1, . . . , n, let uWj = Qj ej , where RV(uR[u, tI]) = {(Wj , Qj ) | j = 1, . . . , n}. Suppose that k is not a multiple of ej for some j, let d be the greatest common divisor of k and ej , and let c ≥ 1 and h > 1 be integers such that cd = k and hd = ej . Then it follows from Proposition 3.9(3) (with (Wj , Qj ) (resp., (Vj ∗ , Nj ∗ )) in place of (W, Q) (resp., (Uk , Pk )) that Qj Vj ∗ = (Nj ∗ )c . Since uWj = Qj ej , it follows 1 that u k Vj ∗ = (Nj ∗ ) cej k = (Nj ∗ )h . However, h > 1, and this contradicts (2). Therefore the supposition that k is not a multiple of ej leads to a contradiction, hence (2) ⇒ (4). 18 Finally, (4) ⇒ (1) by Theorem 3.2.1. Corollary 3.11. Let I be a regular proper ideal in a Noetherian ring R, let R = R[u, tI] 1 be the Rees ring of R with respect to I, and for each integer k ≥ 2 let Sk = R[u k ] and let 1 1 Tk = Sk ′ ∩ R[u k , t k ]. Then the following statements are equivalent: (1) The Rees integers of I are all equal to one. 1 (2) For all integers k ≥ 2, the ideal u k Tk is a radical ideal. Proof. This follows immediately from Proposition 3.10(1) ⇔ (4). 4 A RELATED THEOREM In this section, we first prove an expanded version of Corollary 3.5 and Theorem 3.2.6, and we then prove a closely related and more general theorem. The next theorem is an expanded version of Corollary 3.5 and Theorem 3.2.6. One of the main reasons for including this theorem is to show that it displays, except for separability, a realization (see Definition 4.3 below) of a powerful classical method. This is explained somewhat more fully in Remark 4.4 below. Theorem 4.1. Let I be a nonzero proper ideal in a Noetherian integral domain R, let F be the quotient field of R, let R = R[u, tI], let (W1 , Q1 ), . . . , (Wn , Qn ) be the Rees valuation rings of uR, let e be a positive common multiple of the Rees integers e1 , . . . , en of uR, let W = W1 ∩ · · · ∩ Wn , let Q = Q1 ∩ · · · ∩ Qn , and for j = 1, . . . , n, let Pj = Qj ∩ W, so W is a semi-local Dedekind domain, Q is its Jacobson radical, and the ideals P1 , . . . , Pn are the maximal ideals in W. Then there exists an integral domain E with an ideal J such that: (4.1.1) E = W[x]′ is a semi-local Dedekind domain that is a finite integral extension domain 1 of W, where x = u e in a fixed algebraic closure F (u)∗ of F (u). (4.1.2) [E(0) : W(0) ] = e. (4.1.3) J = xE is the Jacobson radical of E, E has exactly n maximal ideals M1 , . . . , Mn , and Mj ∩ W = Pj for j = 1, . . . , n. (4.1.4) [(E/Mj ) : (W/Pj )] = ej for j = 1, . . . , n. (4.1.5) uE = J e . (4.1.6) The Rees integers of IE = uE are all equal to e. 19 (4.1.7) If e1 = · · · = en = e and if there exists b ∈ I such that bV = IV for each Rees valuation ring (V, N ) of I, then there exists a unit θ ∈ E such that E = W[θ], so E is a simple free integral extension domain of W of rank e. 1 1 1 (4.1.8) E = TS ′ , where T = R[u, tI, u e ]′ ∩ R[u e , t e ] and S ′ = T − ∪{q | q is a (height 1 one) associated prime ideal of u e T}. Proof. It is shown in Corollary 3.5(1) that: W is a semi-local Dedekind domain; Q is its Jacobson radical, and, the ideals P1 , . . . , Pn are the maximal ideals in W. (4.1.1) follows from Corollary 3.5(1) and Corollary 3.5(3.2). (Note: E is frequently denoted by D′ in Corollary 3.5 and its proof.) (4.1.2) follows from Corollary 3.5(2). (4.1.3) is proved in Corollary 3.5(3.3) and Corollary 3.5(3.2). For (4.1.4), it is shown in Corollary 3.5(3) and 3.5(3.2) that there exist θ1 , . . . , θn ∈ E such that E = W[x, θ1 , . . . , θn ] and Mj = (Pj , x, θ1 , . . . , θj−1 , θj+1 , . . . , θn )E. Therefore E/Mj ∼ = W[θj ]/Pj ∼ = (Wj /Qj )[θj + Pj ], and Vj ∗ /Nj ∗ = Wj [x, θj ]/Nj ∗ ∼ = (Wj /Qj )[θj + Pj ], so E/Mj ∼ = Vj ∗ /Nj ∗ for j = 1, . . . , n. Also, W/Pj ∼ = Wj /Qj for j = 1, . . . , n. Therefore (4.1.4) follows from Theorem 3.2.5. Since IE = uE, (4.1.5) follows from Corollary 3.5(3.3), and then (4.1.6) follows from (4.1.5) and Definition 2.1.5. (4.1.7) is proved in Corollary 3.5(4). Finally, for (4.1.8), E = W[x]′ is the intersection of the Itoh (e)-valuation rings of I, by Corollary 3.5(3.1). Also, TS ′ is the intersection of the Itoh (e)-valuation rings of I, by Definition 1.2, so E = TS ′ , so (4.1.8) holds. We next consider a powerful classical theorem of Krull, and to state the theorem, we use the following terminology of Gilmer in [3]. Definition 4.2. Let (V1 , N1 ), . . . , (Vn , Nn ) be distinct DVRs of a field F and for j = 1, . . . , n, let Kj = Vj /Nj denote the residue field of Vj . Let m be a positive integer. By an m-consistent system for {V1 , . . . , Vn }, we mean a collection of sets S = {S1 , . . . , Sn } satisfying the following conditions: (1) For each j, Sj = {(Kj,i , fj,i , ej,i ) | i = 1, . . . , sj }, where Kj,i is a simple algebraic field extension of Kj with fj,i = [Kj,i : Kj ], and sj , ej,i ∈ N>0 . 20 (2) For each j, the sum Ps j i=1 ej,i fj,i = m. Definition 4.3. The m-consistent system S as in Definition 4.2 is said to be realizable if there exists a separable algebraic extension field L of F such that: (1) [L : F ] = m. (2) For j = 1, . . . , n, Vj has exactly sj extensions Vj,1 , . . . , Vj,sj to L. (3) For j = 1, . . . , n, the residue field of Vj,i is Kj -isomorphic to Kj,i , and the ramification index of Vj,i relative to Vj is equal to ej,i (so Nj Vj,i = Nj,i ej,i ). If S and L are as above, we say the field L realizes S or that L is a realization of S. Remark 4.4. (4.4.1) With Definition 4.3 in mind, and with the notation of Theorem 4.1, the semi-local Dedekind domain E = W[x]′ (or its quotient field F (x)) in Theorem 4.1 is, except for separability, a realization of the e-consistent system S = {S1 , . . . , Sn } for the Rees valuation rings (W1 , Q1 ), . . . , (Wn , Qn ) of uR[u, tI]. Here, e is an arbitrary positive common multiple of the Rees integers e1 , . . . , en of uR[u, tI] (and of I), and for j = 1, . . . , n, Sj = {(Wj /Qj )[θj ], ej , eej )}, where θj is a root of X ej − wj (with wj playing the role of w in (3.5.4.3) in the proof of Corollary 3.5), and θj = θj + Qj Wj [θj ]. (4.4.2) More generally, let I be a nonzero proper ideal in a Noetherian integral domain R, let R = R[u, tI] be the Rees ring of R with respect to I, let (W1 , Q1 ), . . . , (Wn , Qn ) be the Rees valuation rings of uR, let W = W1 ∩· · ·∩Wn , and let k ≥ 2 be an arbitrary integer. For j = 1, . . . , n, let ej be the Rees integer of uR with respect to Wj , and let dj be the greatest common divisor of k and ej . Also, let F be the quotient field of R, let F (u)∗ be an algebraic 1 closure of F (u), and let E be the integral closure of W[xk ], where xk = u k ∈ F (u)∗ . Then E is a realization of the k-consistent system S′ = {S1 ′ , . . . , Sn ′ } for the valuation rings (W1 , Q1 ), . . . , (Wn , Qn ). Here, for j = 1, . . . , n, Sj ′ = {(Wj /Qj )[θj,k ], dj , dkj )}, where θj,k is a root of X ej,k − wj,k (with wj,k playing the roll of w in (3.5.4.3) in the proof of Corollary 3.5), and θj,k = θj,k + Qj Wj [θj,k ]. Proof. Item (4.4.1) follows immediately from Theorem 4.1 (it follows from Proposition 3.9(1) that Qj Wj [θj ] is a prime ideal), and Item (4.4.2) follows from Proposition 3.9(3). Theorem 4.5. (Krull [6]): Let (V1 , N1 ), . . . , (Vn , Nn ) be distinct DVRs of a field F with Kj = Vj /Nj for j = 1, . . . , n, let m be a positive integer, and let S = {S1 , . . . , Sn } be an 21 m-consistent system for {V1 , . . . , Vn } with Sj = {(Kj,i , fj,i , ej,i ) | i = 1, . . . , sj } for j = 1, . . . , n. Then S is realizable if one of the following conditions is satisfied: (1) sj = 1 for at least one j. (2) F has at least one DVR V distinct from V1 , . . . , Vn . (3) For each monic polynomial X t + a1 X t−1 + · · · + at with ai ∈ ∩nj=1 Vj = D, and for each h ∈ N>0 there exists an irreducible separable polynomial X t + b1 X t−1 + · · · + bt ∈ D[X] with bl − al ∈ Nj h for each l = 1, . . . , t and j = 1, . . . , n. Observation. (a) Condition (1) of Theorem 4.5 is a property of the m-consistent system S = {S1 , . . . , Sn }. (b) Condition (2) of Theorem 4.5 is a property of the family of DVRs of the field F . (c) Condition (3) of Theorem 4.5 is a property of the family (V1 , N1 ), . . . , (Vn , Nn ). Remark 4.6. Let R be a Noetherian integral domain with quotient field F , and assume that altitude(R) ≥ 2. Then there exist infinitely many height one prime ideals in R, so R′ has infinitely many height one prime ideals, by the Lying-Over Theorem ([7, (10.8)]). Therefore, since R′ is a Krull domain, by ([7, (33.10)]), there exist infinitely many distinct DVRs with quotient field F , hence Theorem 4.5(2) is always satisfied for such fields F . We can now state and prove the first new result in this section. It is closely related to Theorem 4.1, and it is also considerably more general. Theorem 4.7. Let R be a Noetherian integral domain with quotient field F , and assume that altitude(R) ≥ 2. Let I be a nonzero proper ideal in R, let (V1 , N1 ), . . . , (Vn , Nn ) (n ≥ 2) be the Rees valuation rings of I, let D = V1 ∩ · · · ∩ Vn (so D is a Dedekind domain with exactly n maximal ideals Mj = Nj ∩ D (j = 1, . . . , n)), and let M1 e1 · · · Mn en (= M1 e1 ∩ · · · ∩ Mn en ) be an irredundant primary decomposition of ID (so e1 , . . . , en are the Rees integers of I). Let m be the least common multiple of e1 , . . . , en , let dj = m ej (j = 1, . . . , n), and let e = km be a positive multiple of m. Then there exists an integral domain E with an ideal J such that: (4.7.1) E = D[θ] is a semi-local Dedekind domain that is a simple free separable integral extension domain of D. (4.7.2) [E : D] = e. 22 (4.7.3) J is the Jacobson radical of E, and E has exactly k(e1 + · · · + en ) maximal ideals. (4.7.4) [(E/Qj,i ) : (D/Mj )] = 1 for j = 1, . . . , n and for the kej associated prime ideals Qj,i of Mj E. (4.7.5) IE = J m . (4.7.6) The Rees integers of IE are all equal to m. Proof. Let S = {S1 , . . . , Sn } with Sj = {(Kj,i , 1, dj ) | i = 1, . . . , kej } (j = 1, . . . , n). Observe that dj ·kej = km = e for j = 1, . . . , n, so S is an e-consistent system for {DM1 , . . . , DMn }, so S is a realizable e-consistent system for {DM1 , . . . , DMn }, by Theorem 4.5(2) and Remark 4.6. Therefore the integral closure E of D in a realization L of S for {DM1 , . . . , DMn } is a simple free separable integral extension domain of D such that [E : D] = e and E is a Dedekind domain (by [12, Theorem 19, p. 281]). Also, since Sj = {(Kj,i , 1, dj ) | i = 1, . . . , kej } (j = 1, . . . , n): each Vj has exactly kej extensions (Vj,i , Nj,i ) to L; E = V1,1 ∩ · · · ∩ Vn,ken and Qj,i = Nj,i ∩ E; E/Qj,i ∼ = Vj,i /Nj,i ∼ = Vj /Nj ∼ = D/Mj (j = 1, . . . , n and i = 1, . . . , kej ); and, Nj Vj,i = Nj,i dj (j = 1, . . . , n and i = 1, . . . , kej ). Therefore (4.7.1) - (4.7.4) hold, and IE = n Y (Mj j=1 where J = Qn j=1 Qkej i=1 Nj,i ej kej kej n Y n Y Y Y dj ej Nj,i )m = J m , ( (Nj,i )) = ( E) = j=1 i=1 j=1 i=1 is the Jacobson radical J of E. Thus IE = J e , so (4.7.5) holds, and since E is a semi-local domain with Jacobson radical J, (4.7.6) follows immediately from (4.7.5), Definition 2.1.5, and Remark 2.2.4. Remark 4.8. In the proof of Proposition 4.7, there are many cases when the simpler econsistent system T = {T1 , . . . , Tn } with Tj = {(Kj,1 , kej , dj )} (j = 1, . . . , n) can be used in place of Sj = {(Kj,i , 1, dj ) | i = 1, . . . , kej } (j = 1, . . . , n), and then the resulting realization E of T for {DM1 , . . . , DMn } has the same number of maximal ideals as D. However, T cannot always be used, since, for example, if D/Mj is algebraically closed and kej ≥ 2, then there are no extension fields Kj,1 of Kj = D/Mj such that [Kj,1 : Kj ] = kej . Remark 4.9. In the proof of Proposition 4.7, if Sj = {(Kj,i , 1, dj ) | i = 1, . . . , kej } is replaced with Uj = {(Kj,i , 1, kdj ) | i = 1, . . . , ej } (j = 1, . . . , n), then the same conclusions hold, but replace: 23 (a) “each Vj has exactly kej extensions (Vj,i , Nj,i ) to L” with “each Vj has exactly ej extensions (Vj,i , Nj,i ) to L”; (b) “the Rees integers of IE are all equal to m,” with “the Rees integers of IE are all equal to e”; (c) “IE = J m ” with “IE = J e ”; (d) “Nj Vj,i = Nj,i dj (j = 1, . . . , n and i = 1, . . . , kej )” with “Nj Vj,i = Nj,i kdj (j = 1, . . . , n and i = 1, . . . , ej )”; Q Q Qke Q Qke (e) “IE = nj=1 (Mj ej E) = nj=1 ( i=1j (Nj,i dj ))ej = ( nj=1 i=1j Nj,i )m ” with “IE = Qe j Q Qn Qe j Qn kdj ej ej Nj,i )e ”. )) = ( nj=1 i=1 j=1 ( i=1 (Nj,i j=1 (Mj E) = Our first corollary of Theorem 4.7 is a more complete and detailed version of [4, Theorem 2.8(1)]. Corollary 4.10. Let I be a nonzero proper ideal in a Noetherian domain R, let (V1 , N1 ), . . . , (Vn , Nn ) (n ≥ 2) be the Rees valuation rings of I, let ej be the Rees integer of I with respect to Vj (j = 1, . . . , n), and let e = km be a positive multiple of the least common multiple m of e1 , . . . , en . Then there exists an integral domain Be such that: (1) Be is a semi-local Dedekind domain that is a simple free separable integral extension domain of R. (2) [Be : R] = e. (3) The Rees integers of IBe are all equal to m. Proof. Let D be the intersection of the n Rees valuation rings (Vj , Nj ) of I, and let Mj = Nj ∩ D (j = 1, . . . , n), so D is a semi-local Dedekind domain with exactly n maximal ideals Mj and ID = M1 e1 ∩ · · · ∩ Mn en = M1 e1 · · · Mn en . Therefore by Proposition 4.7 there exists a simple free separable extension field Le of the quotient field F of R such that: [Le : F ] = e; the integral closure Ee of D in Le is a finite (by free separability) integral extension domain of D and is a semi-local Dedekind domain with exactly kej maximal ideals Qj,i lying over each Mj (j = 1, . . . , n); and, (ID)Ee = Je m , where Je is the Jacobson radical of Ee . By separability Le = F [θ], so there exists r ∈ R such that r · θ is integral over R, so let Be = R[r · θ]. Then Be is a simple free separable integral extension domain of R, [Be : R] = e, and Ee is the intersection of the Rees valuation rings of IBe by Remark 2.2.6. Since 24 (IBe )Ee = (ID)Ee = Je m and since Je is the Jacobson radical of Ee , it follows that the Rees integers of IBe are all equal to m. Remark 4.11. (4.11.1) With the notation of Corollary 4.10, there exists an integral domain Ce such that: (1) Ce is a semi-local Dedekind domain that is a simple free separable integral extension domain of R. (2) [Ce : R] = e. (3) The Rees integers of ICe are all equal to e. (4.11.2) Let I be a regular proper ideal in a Noetherian ring R, let (V1 , N1 ), . . . , (Vn , Nn ) (n ≥ 2) be the Rees valuation rings of I, let ej be the Rees integer of I with respect to Vj (j = 1, . . . , n), and let e = km be a positive multiple of the least common multiple m of e1 , . . . , en . Assume that Rad(0R ) is prime, say Rad(0R ) = z. Then there exists a ring Be such that: (1) Be is a simple free integral extension ring of R. (2) [Be : R] = e. (3) The Rees integers of IBe are all equal to m. (4) zBe = Rad(0Be ), so zBe is the only minimal prime ideal in Be . (4.11.3) With the notation of (4.11.2), there exists a ring Ce such that: (1) Ce is a simple free integral extension ring of R. (2) [Ce : R] = e. (3) The Rees integers of ICe are all equal to e. (4) zCe = Rad(0Ce ), so zCe is the only minimal prime ideal in Ce . Proof. The proof of (4.11.1) is the same as the proof of Corollary 4.10, but use Remark 4.9 in place of Proposition 4.7. For (4.11.2), since Rad(0R ) = z is the only minimal prime ideal in R, the Rees valuation rings of I are the Rees valuation rings of I = (I + z)/z (see Remark 2.2.3). Also, by Corollary 4.10 there exists an integral domain Be such that: (1’) Be is a semi-local Dedekind domain that is a simple free separable integral extension domain of R = R/z. (2’) [Be : R] = e. 25 (3’) The Rees integers of IBe are all equal to m. Let fe (X) be the pre-image in R[X] of the irreducible monic polynomial fe (X) (of degree e) in R[X] such that Be = R[X]/(fe (X)R[X]). Then Be = R[X]/((fe (X), z)R[X]) = R[x]/(zR[x]), where x = X + (fe (X)R[X]). Let Be = R[x]. Then, since Be = R[x]/(zR[x]) is an integral domain, it follows that zBe is a prime ideal. Also, by hypothesis, there exists r ∈ N>0 such that z r = (0) in R, so it follows that zBe is the only minimal prime ideal in Be , so (4) holds. Therefore the Rees valuation rings and Rees integers of IBe are the Rees valuation rings and Rees integers of IBe , by Remark 2.2.3, so (1) - (3) follow immediately from (1’) - (3’). The proof of (4.11.3) is the same as the proof of (4.11.2), but use Remark 4.11.1 in place of Corollary 4.10. The next corollary of Theorem 4.7 extends Corollary 4.10 to Noetherian rings. Corollary 4.12. Let I be a regular proper ideal in a Noetherian ring R, let e1 , . . . , en be the Rees integers of I, let m be the least common multiple of e1 , . . . , en , and let e = km be a positive multiple of m. Then there exist rings R∗ and Be such that: (1) R ⊆ R∗ ⊆ Be and Be is a finite integral extension ring of R. (2) IR∗ and IBe are regular proper ideals. (3) There is a one-to-one correspondence between the minimal prime ideals w∗ in Be such that IBe + w∗ 6= Be , the minimal prime ideals z ∗ in R∗ such that IR∗ + z ∗ 6= R∗ , and the minimal prime ideals z in R such that I + z 6= R; namely, w∗ = z ∗ Be and z = z ∗ ∩ R. (4) The Rees integers of IBe are all equal to e. Proof. Let (0) = ∩{qh | h = 1, . . . , k} be an irredundant primary decomposition of the zero ideal in R and let Rad(qh ) = zh (h = 1, . . . , k). Assume that the zh are re-ordered so that z1 , . . . , zd1 are the minimal prime ideals z in R such that I + z 6= R and zd1+1 , . . . , zd2 are the remaining minimal prime ideals in R (so d1 ≤ d2 ≤ k). Rewrite ∩{qh | h = 1, . . . , k} as ∩{Zh | h = 1, . . . , d2 }, where Zh is the intersection of all qi such that zi ⊇ zh , for h = 1, . . . , d2 . For i = 1, . . . , d2 , let Ri = R/Zi , let zi = zi /Zi (so the unique minimal prime ideal in Ri is zi , therefore, zi = Rad(0Ri )), and let Ii = (I + Zi )/Zi (so Ii is a regular proper ideal in Ri for i = 1, . . . , d1 and Ii = Ri for i = d1 + 1, . . . , d2 ). 26 By Remark 2.2.3 the set of Rees valuation rings of I is the disjoint union of the sets of Rees valuation rings of the ideals Ii (i = 1, . . . , d1 ), so the Rees integers of the Ii are among the Rees integers of I. Hence e is a multiple of the least common multiple of the Rees integers of the ideals Ii (i = 1, . . . , d1 ). Therefore, by Remark 4.11.3, for i = 1, . . . , d1 , there exists a simple free integral extension ring Bi,e of Ri such that [Bi,e : Ri ] = e, the Rees integers of Ii Bi,e are all equal to e, and zi Bi,e is the only minimal prime ideal in Bi,e . L L L L Let R∗ = R1 · · · Rd2 , let I ∗ = I1 · · · Id2 so I ∗ = IR∗ , and for i = 1, . . . , d2 , let L L L L L L zi ∗ = R1 ··· Ri−1 zi Ri+1 · · · Rd2 . Then R∗ is a finite integral extension ring of R, I ∗ is a regular proper ideal in R∗ , and for i = 1, . . . , d1 , the zi ∗ are the minimal prime ideals z ∗ in R∗ such that I ∗ + z ∗ 6= R∗ . Also, zi ∗ ∩ R = zi and R∗ /zi ∗ = Ri /zi = R/zi (i = 1, . . . , d2 ), so the Rees valuation rings of I ∗ are the Rees valuation rings of I, so the ideals I and I ∗ have the same Rees integers. L L Let Be = B1,e · · · Bd2 ,e , where, for notational convenience, we let Bh,e = Rh for h = L L L L L L d1 +1, . . . , d2 . Also, for i = 1, . . . , d2 , let wi ∗ = B1,e · · · Bi−1,e zi Bi,e Bi+1,e · · · Bd2 ,e , so wi ∗ ∩ R∗ = zi ∗ and wi ∗ = zi ∗ Be . Then Be is a finite R∗ -module (and is also a finite L L L L L integral extension ring of R), IBe = I ∗ Be = IB1,e ··· IBd1 ,e Bd1 +1,e ··· Bd2 ,e is a regular proper ideal in Be , the wi ∗ are d2 minimal prime ideals in Be , and Be /wi ∗ = Bi,e /(zi Bi,e ) for i = 1, . . . , d2 . Since the ideals zi ∗ are the minimal prime ideals z ∗ in R∗ such that I ∗ + z ∗ 6= R∗ (for i = 1, . . . , d1 ), and since wi ∗ is a minimal prime ideal in Be such that wi ∗ = zi ∗ Be , it follows that the wi ∗ (i = 1, . . . , d1 ) are the minimal prime ideals w∗ in Be such that IBe + w∗ = I ∗ Be + w∗ 6= Be . So the set of Rees valuation rings of I ∗ Be is the disjoint union of the sets of Rees valuation rings of the ideals (I ∗ Be + wi ∗ )/wi ∗ = (I ∗ Be + zi ∗ Be )/wi ∗ = L L L L L L (B1,e · · · Bi−1,e (Ii + zi )Bi,e Bi+1,e · · · Bd2 ,e )/wi ∗ = (Ii Bi,e + zi Bi,e )/(zi Bi,e ). Therefore, since zi Bi,e is the unique minimal prime ideal in Bi,e , it follows that, for i = 1, . . . , d1 , Ii Bi,e and (Ii Bi,e + zi Bi,e )/(zi Bi,e ) have the same Rees valuation rings and the same Rees integers. Finally, for i =1, . . . , d1 , the Rees integers of Ii Bi,e are all equal to e (by the last sentence in the second preceding paragraph), so it follows that the Rees integers of IBe are all equal 27 to e. To state an additional corollary, we need the following definition. Definition 4.13. Let I and J be ideals in a ring R. Then: (4.13.1) I and J are projectively equivalent in case there exist i, j ∈ N>0 such that (I i )a = (J j )a (see (2.1.2)). (4.13.2) I is projectively full in case, for each ideal J in R that is projectively equivalent to I (see (4.13.1)), Ja = (I k )a for some k ∈ N>0 . Remark 4.14. With Definition 4.13 in mind, it should be noted that Theorem 4.7.6 shows that the Jacobson radical J of E is projectively equivalent to IE, and since E is a semi-local Dedekind domain, it follows that J is a projectively full radical ideal whose Rees integers are all equal to one. The next corollary of Theorem 4.7 was proved in [4, Theorem 2.8(2)] in the case when R is a Noetherian domain of altitude one. Corollary 4.15. If R is a Noetherian ring of altitude one, then for each regular proper ideal I in R there exists a finite integral extension ring A of R with an ideal J such that J and IA are projectively equivalent, J is a projectively full radical ideal, and the Rees integers of I are all equal to one. Proof. It is shown in [4, Theorem 2.8(2)] that this result holds for nonzero proper ideals in Noetherian domains of altitude one. So a proof similar to the proof of Corollary 4.12 shows that it continues to hold for regular proper ideals in Noetherian rings of altitude one. References [1] C. Ciupercǎ, W. J. Heinzer, L. J. Ratliff, Jr., and D. E. Rush, Projectively full ideals in Noetherian rings (II), J. Algebra 305 (2006), 974-992. [2] O. Endler, Valuation Theory, Springer-Verlag, New York, 1972. 28 [3] R. Gilmer, Prüfer domains and rings of integer-valued polynomials, J. Algebra, 129 (1990), 502-517. [4] W. J. Heinzer, L. J. Ratliff, Jr., and D. E. Rush, Projective equivalence of ideals in Noetherian integral domains, J. Algebra 320 (2008), 2349-2362. [5] S. Itoh, Integral closures of ideals generated by regular sequences, J. Algebra 117 (1988), 390-401. [6] W. Krull, Über einen Existensatz der Bewertungstheorie, Abh. Math. Sem. Univ. Hamburg, 23 (1959), 29-55. [7] M. Nagata, Local Rings, Interscience, John Wiley, New York, 1962. [8] L. J. Ratliff, Jr., A Characterization of analytically unramified semi-local rings and applications, Pacific J. Math. 27 (1968), 127 - 143. [9] L. J. Ratliff, Jr., On prime divisors of the integral closure of a principal ideal, J. Reine Angew. Math. 255 (1972), 210 - 220. [10] D. Rees, A note on form rings and ideals, Mathematika 4 (1957), 51-60. [11] I. Swanson and C. Huneke, Integral Closure of Ideals, Rings and Modules, Cambridge Univ. Press, Cambridge, 2006. [12] O. Zariski and P. Samuel, Commutative Algebra, Vol. 1, D. Van Nostrand, New York, 1958. [13] O. Zariski and P. Samuel, Commutative Algebra, Vol. 2, D. Van Nostrand, New York, 1960. Department of Mathematics, University of California, Riverside, California 92521-0135 E-mail address: [email protected] Department of Mathematics, University of California, Riverside, California 92521-0135 E-mail address: [email protected] 29 Department of Mathematics, University of California, Riverside, California 92521-0135 E-mail address: [email protected] 30
0math.AC
Advanced Signal Processing Techniqes to Study Normal and Epileptic EEG Debadatta Dash1 Dept. of Electrical and Electronics Engineering Veer Surendra Sai University of Technology (VSSUT) Burla, India [email protected] Abstract—In this paper human normal and epileptic Electroencephalogram signals are analyzed with popular and efficient signal processing techniques like Fourier and Wavelet transform. The delta, theta, alpha, beta and gamma sub bands of EEG are obtained and studied for detection of seizure and epilepsy. The extracted feature is then applied to ANN for classification of the EEG signals. epileptogenic focus being the hippocampal formation. Each set contains 100 single channel EEG segments of 23.6s duration sampled at 173.61 Hz. [6] Hence each data segments contain 4097 samples collected at the intervals of 1/173.61th of 1s. Exemplary (Z038, S001) EEGs are plotted below. Keywords—EEG, Epilepsy, FourierTransform, DWT, db-4 I. INTRODUCTION In 1875, the English physician, Richard Canton, discovered electrical currents in the brain and in 1929 the German psychiatrist, Hans Berger, recorded these currents, and named them the Electro-encephalon-gram (EEG) (Berger, 1929).The Electroencephalogram is a record of time series of evoked potentials caused by systematic neural activities in a brain. [1] EPILEPTIC seizures are the result of the transient and unexpected electrical disturbance of the brain. Approximately one in every 100 persons will experience a seizure at some time in their life. [2] .EEG monitoring has an important milestone provide valuable information of those candidates who suffer from epilepsy.[3] Now a days however Magnetic Resonance(MR) Brain Tomography(BT) are used for diagnosis of structural disorders of brain to observe some special illness like epilepsy. The measurement of human EEG signals is done by recording the voltage difference on the scalp by placing electrodes on or inside the brain as specified by internationally recognized 10-20 electrode placement system. [4] There are five major brain waves distinguished by their different frequency ranges. They are: delta (δ) (3Hz and below), theta (θ) (3.5Hz-7.5Hz), alpha (α) (7.5-13Hz), beta (β) (14Hz and greater) and Gamma (γ) (31 – 100 Hz) waveforms. [5] Types of epileptic seizures and epileptic syndromes are classified by the Commission of Classification and Terminology of the International League against Epilepsy. II. Fig. 1(a). Normal EEG signal, 1(b). Epileptic EEG signal From Fig. 1. it is seen that the epilectic signal with its higher amplitude and distinct transients is complete different from normal EEG. III. FOURIER ANALYSIS To compare the frequency distribution of both EEG signals we plotted log-log plot of the Periodogram or power vs. frequency plot. Power is explained as the square of the absolute value of Fourier Transform. In each plot so called 1/(f)α fluctuation can be seen as the function of frequency. DATA We used two sets of EEG data; A/Z (Healthy Volunteer, Eyes open) and E/S (Epileptic Subjects during seizure) which is publicly available given by Andrzejak et al [6]. The type of epilepsy was diagnosed as temporal lobe epilepsy with the Fig 2. Comparison of log-scale Periodograms of both EEG signals The peaks that indicate alpha and beta rythms are clearly visible for normal EEG periodogram but not seen in epileptic signal,as the epileptic EEG shows abrupt increase in frequency at different ranges. IV. WAVELET ANALYSIS The basic idea underlying wavelet analysis consists of expressing a signal as a linear combination of a particular set of functions (wavelet transform, WT), obtained by shifting and dilating one single function called a mother wavelet. Since the sampling frequency of the EEG is 173.61 Hz, according to the Nyquist sampling theorem, the maximum useful frequency is half of the sampling frequency or 86.81 Hz. Again to correlate the wavelet decomposition with the frequency changes of the physiological sub bands the EEG band is convolved with a low pass FIR filter and band is limited in 060Hz. The basic methodology is as shown below. EEG  LPF  WT  Feature  Epilepsy Detection Extraction The band limited EEG is decomposed through db-4 wavelet up to 4th level and the components retained are a4 (04Hz), d4 (4-8Hz), d3 (8-15Hz), d2 (15-30Hz), d1 (30-60Hz). Reconstructions of these five components using the inverse wavelet transform approximately correspond to the five physiological EEG sub bands delta, theta, alpha, beta, and gamma (Fig. 3). The comparison of the features of both normal and epileptic EEG signal of two exemplary data (S001 vs. Z038) is given in the table below. Table: 1 EEG Signal Normal Epileptic Max Mean Median Mode Std -190 -1765 185 1027 6.816 47.1 7 187 -1 399 478.5 42.6 V. CONCLUSION Detecting epileptic seizures from long EEG recordings is a very time consuming and costly task if done visually by a trained professional. The paper proposes a technique for detection and feature extraction of Epilepsy using Fourier, Wavelet Transform with MATLAB. The local low frequency components in each normal and epileptic EEG have been clearly detected by Wavelet Transform but not by Fourier Transform. We conclude that Wavelet Transform is wellsuited method for local-time frequency analysis of EEG signals. Once the delta wave is identified and measured, the features like Mean, Max, Min and median was calculated and then ANN is used for the classification with 97% accuracy. VI. [1] [2] [3] [4] [5] Fig.3. Level 4 decomposition of the band-limited EEG into five EEG sub bands using fourth-order Daubechies wavelet (s=a4 +d4 +d3 +d2 +d1). [6] Detail parts (d1-d4) shows high frequency components while a4 shows low frequency components. Original signal S is reconstructed by adding all the components as s=a4 +d4 +d3 +d2 +d1 .The local low frequency waves concerned with epileptic seizures in the EEG are clearly detected by DWT. The same analysis is done for 100 sets of data of both healthy and epileptic database and the feature is extracted from the delta waves of all the decomposed EEG signals which helped in classification of EEG signals into Epileptic or normal category. The feature extracted are in the category of mean, median, mode, min, max and standard deviation (Std) which showed 97% accuracy for classification of the EEG signals. Min [7] [8] REFERENCES Suhanya.S 1, Manimegalai.P2 -- (March-2012), DETECTION OF EPILEPSY DISORDER IN EEG SIGNAL, International Journal of Emerging trends in Engineering and Development Issue 2, Vol.2 L.D. Iasemidis, D.S. Shiau, W.Chaovalitwongse, J.C. Sackellares, P.M. Pardalos, and J.C. Principe, "Adaptive epileptic seizure prediction system," IEEE Transactions on Biomedical Engineering, vol. 50(5), pp. 616–627, 2003. Alexandros T. Tzallas, 2007-- The Use of Time-Frequency Distributions for Epileptic SeizureDetection in EEG Recordings, IEEE Maan M. Shaker, 2005 EEG Waves Classifier using Wavelet Transform and Fourier Transform, International Journal of Biological and Life Sciences 1:2 Alexandros T. Tzallas, Markos G. Tsipouras, Dimitrios G. Tsalikakis, Evaggelos C. Karvounis, Loukas Astrakas, Spiros Konitsiotis and Margaret Tzaphlidou-- Automated Epileptic Seizure DetectionMethods: A Review Study. R.G. Andrzejak, G.Widman, K. Lehnertz, C. Rieke, P. David, C.E. Elger, "The epileptic process as nonlinear deterministic dynamics in a stochastic environment: an evaluation on mesial temporal lobe epilepsy," Epilepsy Res. Vol. 44, pp. 129-140, 2001. Shaik.Jakeer Husain 1 and K.Srinivasa.Rao 2 (2012)-- Epileptic Seizures Classification from EEG Signals using Neural NetworksInternational Conference on Information and Network Technology, IPCSIT vol. 37 Singapore. Chiri Yamaguchi :Fourier and Wavelet analysis of normal and epileptic Electroencephalogram,Memoirs of Fukui University of Technology,Vol 33,part1,2003
5cs.CE
Facets, Tiers and Gems: Ontology Patterns for Hypernormalisation Phillip Lord 1∗and Robert Stevens2 1 arXiv:1711.07273v1 [cs.AI] 20 Nov 2017 School of Computing Science, Newcastle University, Newcastle-upon-Tyne 2 School of Computer Science, University of Manchester, Manchester ABSTRACT There are many methodologies and techniques for easing the task of ontology building. Here we describe the intersection of two of these: ontology normalisation and fully programmatic ontology development. The first of these describes a standardized organisation for an ontology, with singly inherited self-standing entities, and a number of small taxonomies of refining entities. The former are described and defined in terms of the latter and used to manage the polyhierarchy of the self-standing entities. Fully programmatic development is a technique where an ontology is developed using a domain-specific language within a programming language, meaning that as well defining ontological entities, it is possible to add arbitrary patterns or new syntax within the same environment. We describe how new patterns can be used to enable a new style of ontology development that we call hypernormalisation. 1 INTRODUCTION Building ontologies is a difficult and time-consuming business for a number of reasons: from an abstract point-of-view knowledge about the domain can be difficult to gather, to understand and to represent ontologically; more, immediately, ontologies, especially those with a complex representation, can be taxing to describe and define consistently, to update, expand or change when that representation needs to change. There have been numerous attempts to simplify and clarify this process including: the development of methodologies such as OntoClean that defines a set of meta-properties that can inform ontological modelling (Guarino and Welty, 2002); upper ontologies such as DOLCE or BFO (Grenon et al., 2004) that provide a pre-made upper classification. Another approach that can leverage both of these techniques is ontology normalisation (Rector, 2002). Originally intended as a mechanism for “untangling” existing hierarchies or classifications being reused as the basis for an ontology, it also has significant use as a pattern for building ontologies de novo. Broadly, a normalised ontology is defined using a skeleton that is a strict tree (i.e. not a acyclic graph) of concepts differentiated using an inheritance (i.e. not a partonomy) relationship. These are further split into: a set of self-standing entities in which children are disjoint from each other, but do not cover the parent, and partitioning or ∗ To whom correspondence [email protected] should be addressed: refining concepts that form closed, covering and disjoint hierarchies. Building an ontology in this way, allows the ontology developer to exploit the reasoner to build a polyhierarchy by using classes that define the self-standing entity in terms of the refining partitions. Polyhierarchies are difficult to build manually, as human ontology developers, no matter how good their domain knowledge, find it hard to ensure all possible parents of an entity are taken into account. The normalisation approach uses defined classes and reasoning to remove this chore. Creating the tree of self-standing entities still, however, remains as a task for the developer. The normalisation approach can significantly increase the robustness and reduce the work of manual maintenance (Wroe et al., 2003). In this latter form, ontological normalisation has been widely, if implicitly, used. While the term “ontology normalisation” has been borrowed, somewhat metaphorically, from database engineering, the process of building ontologies using a set of standard design patterns has a rather more direct relationship to the software engineering equivalent. By reusing a standard set of patterns, it is possible to build an ontology both rapidly, and consistently. This has manifested itself in a number of different ways, with a number of different tools, such as TermGenie (Dietze et al., 2014), or Populus (Jupp et al., 2011) which can generate ontologies according to a pattern. We have previously described a fully programmatic methodology for ontology development (Lord, 2013), using the Tawny-OWL environment. This is built around the programming language Clojure and enables the ontology to take advantage of all the features of a programming language and its environment, including unit testing (Warrender and Lord, 2015), build, evaluation and, of course, pattern-driven development by simple use of functions (Warrender and Lord, 2013). With respect to patterns, this environment has several advantages. First, and unlike tools such as Populous and OPPL (Egana Aranguren et al., 2009), patterns are developed in the same environment and syntax as simple ontology concepts; it is, therefore, as easy to define a pattern as it is to define a class. Second, being based on Clojure, a language which is homoiconic and has very little syntax of its own, it is possible to build arbitrary syntactic constructions to represent patterns in a way that is both convenient and attractive to the developer. In this paper, we describe an extension of the normalisation technique that we call hypernormalisation. This technique is typified by the (near or complete) absence of asserted hierarchy among the self-standing entities. We describe how this allows construction of an exemplar ontology of amino-acids (Stevens and Lord, 2012). We then move on to describe recent developments 1 Lord and Stevens Top Level Self-Standing Entities Body Substance Protein Steroid Person Organic Ion Doctor Role Refining Type Role Care Role Nurse Role Value Types Patient Role Adult Age Type Sex Child Male Female Fig. 1. A normalised ontology slightly modified from Rector (2002). The graph does not necessarily reflect subsumption, see text for details. in the Tawny-OWL environment, including the definition of two new design patterns, the tier and the facet, and one syntactic abstraction, the gem, can be used to enable hypernormalised ontology development. Finally, we discuss the application of this approach to other ontologies. 2 HYPERNORMALISATION AND AMINO ACIDS Normalisation is a methodology that aims to disentangle an ontological structure, in the process managing its maintainability, utility and expressivity of the ontology generated. To achieve this, the ontology is split into two main hierarchies: self-standing entities and refining types, see Figure 2 for an example. The self-standing hierarchy contains entities with a central hierarchy or skeleton. In this part of the ontology, we would expect that hierarchy contains levels that are not-exhaustive – that is the children do not cover the parents, and parents are not closed to new children. This is contrasted by the refining hierarchy that consists of classes that are exhaustive; in many cases, children will be nonoverlapping and, therefore, disjoint. This is not to say that the refining types hierarchy are necessarily complete: in Figure 2, for example, the representation of Sex is too simple for many medical uses, but might be sufficient for a customer relations system. In general, the self-standing entities will be defined in terms of the refining types, while polyhierarchical relationships between the self-standing entities will be determined through use of a reasoner. This form of ontology development is quite different from an upper ontology and agnostic to the choice of upper ontology or none. While Rector (2002) suggests only that self-standing entities and refining types should be “made clear by some mechanism”; in OWL, it could be an upper ontological term, or an annotation. We next introduce the amino-acid, used here as an exemplar, which defines the biological amino-acids in terms of the physiochemical properties most relevant to their biological role. It is a structurally interesting ontology because it is normalised, with a clear and clean separation between the self-standing entities and the five refining concepts. It is rather more than this, though; 2 the self-standing entities are split into only three sets: the aminoacids themselves (e.g. Alanine); a (very large) set of defined classes describing the refined types of amino-acid (e.g. Small Neutral Amino Acid); and, finally, the single class Amino Acid. Or, stated alternatively, it contains no skeleton hierarchy at all, and all relationships between the self-standing classes are arrived at through reasoning. This is particularly relevant for the amino acid ontology as it contains over 500 defined classes, with subsumption relationships to the amino acids and between themselves. Maintaining this form of ontology by hand would be impractical. We call this style of ontology development hypernormalised. We believe that it is a natural extension of normalisation. Rector notes, for example, that the choice of aspect to form the skeleton is “to some degree arbitrary”, but that they should be rigid (after OntoClean (Guarino and Welty, 2002)) and pragmatically stable (i.e. unlikely to change during the evolution of the ontology). Both of these are, however, true for all the refining concepts in the aminoacids. In short, not only is the choice of skeleton arbitrary it is actually unnecessary and brings no further utility to the ontology than that which can be achieved by use of reasoning. We note that the distinction between normalisation and hypernormalisation is not absolute, but one of degree; we are simply describing the tendency toward an ontology with an flat asserted hierarchy. Having introduced the notions of a hypernormalised ontology, we next consider a set of new patterns in Tawny-OWL that enable this style of ontology development. 3 PATTERNISING AND TAWNY-OWL The Tawny-OWL environment (Lord, 2013) and its ability to support patterns (Warrender and Lord, 2013) has been described elsewhere in detail; here, we provide a quick overview, so that the rest of the paper is clear. Tawny-OWL is implemented as a DSL (domain-specific language) in Clojure, which is a Lisp-like language implemented in Java, and running on the Java virtual machine. Facets, Tiers and Gems Top Level Self-Standing Entities Defined Class Small AA S. Neutral AA Amino Acid S. N. Aliphatic AA Alanine Arginine 500 more Refining Type 18 more Size Charge Tiny Small Large Hydro. Polarity SideChain Fig. 2. A hypernormalised ontology representing the amino-acids using the same terminology as Figure 2. Some labels have been abbreviated. Tawny-OWL itself wraps the OWL API (Horridge and Bechhofer, 2011); this is the same library that underpins Protg, and from it, Tawny-OWL gains much of its functionality. Simple sections of the ontology can be generated using a syntax based on a “lispified” version of Manchester OWL Notation; for example, the following code: (defclass A :super B) This declares a new class A that has the pre-existing class B as a superclass 1 which in Manchester OWL notation would be expressed as: Class: o:A SubClassOf: o:B This code is entirely valid Clojure and can be evaluated in any Clojure environment, such as CIDER/Emacs or Cursive/IntelliJ. It is also possible to define new patterns: for example the following pattern definition: (defn some-only [property & clazzes] (list (some property clazzes) (only property (or clazzes)))) defines the some-only pattern which generates a set of existential restrictions and one universal with the union of the existential fillers as its filler, which implements the ontological closure pattern. This is a function definition in Clojure terms: defn introduces the function, property & clazzes is the argument list, some, only and or are functions provided by Tawny-OWL and list returns, prosaically, a list2 . Critically, it is possible to define this pattern in the same environment, or side-by-side in the same file as a simple class definition; with Tawny-OWL it is as easy to define a class, as to define and use a new pattern. Ontologies such as the Karyotype ontology make extensive use of this facility moving freely between ontology and pattern definitions, as well as literal data structures, utility functions and unit tests (Warrender and Lord, 2013). Tawny-OWL is now a mature and used software product; the first alpha release of Tawny-OWL was in Nov 2012, first full release, Nov 2013, followed by four point releases to 2016. This paper describes mostly the upcoming v2.0 release, although some of the features described were available in earlier versions. 4 THE VALUE PARTITION A common pattern for building a normalised ontology is called the value partition. This pattern (Rector, 2005) addresses the problem of the ontological modelling of a continuous range. For example, in modelling the amino-acids, we can consider the concept of Size; this could be described directly using the molecular weight of the amino-acid. However, for the purpose of the amino-acids, it is both easy and general practice to split size into three categories: tiny, small and large. In Tawny-OWL, this can be achieved straightforwardly using the defpartition function3 . (defpartition Size [Tiny Small Large] :domain AminoAcid :super PhysioChemicalProperty) Axiomatically, this expands into: a class Size; three subclasses, Tiny, Small and Large; and, a property hasSize. The 3 1 See Lord (2014) an explanation of why :super is used rather than :subclass. 2 The function shown here is a slightly simplified version of one provided in Tawny-OWL. For those with knowledge of Lisp, this is actually a macro; the main implementation is in the value-partition function. Tawny-OWL provides support for implementing syntactic macros whose function is simply to allow the use of bare symbols. For those without knowledge of Lisp, the distinction is not important! 3 Lord and Stevens property is functional, has range of Size and domain of AminoAcid. Expanded, this would be expressed as follows4 : Class: o:Large SubClassOf: o:Size Class: o:Size EquivalentTo: o:Large or o:Small or o:Tiny SubClassOf: o:PhysioChemicalProperty Class: o:Small SubClassOf: o:Size Class: o:Tiny SubClassOf: o:Size DisjointClasses: o:Large,o:Small,o:Tiny The subclasses are disjoint and cover the parent. Following the terminology from Rector (2002), the value partition is useful for defining partitioning or refining concepts. 5 THE TIER The value partition is a pattern aimed at a specific purpose – segmenting a continuous range. In practice, though, we have found that the axiomatization of this pattern is more generally useful. For example, considering the amino-acid ontology, it is natural to model the chemistry of the side-chain as such: (defpartition SideChainStructure [Aromatic Aliphatic] :domain AminoAcid :super PhysicoChemicalProperty) While this is intuitive, ontologically, SideChainStructure is actually of a very different form from Size, as it does not reflect a spectrum. Either the side-chain contains a benzene ring, making it aromatic, or it does not. This form of partition was also noted in Rector (2002) which includes the classes Male and Female which is not a spectrum, at least in this simplified representation. We introduce here, therefore, the more general notion of the tier: a small set of concepts in a one-deep hierarchy. The tier function supports a range of options: (deftier Charge [Positive Neutral Negative] :domain AminoAcid :super PhysioChemicalProperty :suffix true) The use of :suffix true causes a simple change to the naming of the entities: Positive will become PositiveCharge which would be expanded as follows: Class: o:PositiveCharge SubClassOf: o:Charge Other names are modified equivalently. By default, this will manifest both when referring to the class in the Tawny-OWL environment, in the IRI of the concept when serialized as OWL, and in the value of an annotation on the concepts5 . In addition to naming, it is also possible to optionalise: whether or not the subclasses are disjoint, covering, whether the property is functional or whether it is created at all. The tier is a more general pattern than the value-partition; in fact, in the current version of Tawny-OWL, the latter is defined in terms of the former. 6 Both the value partition and tier introduce a new object property named after the tier, and with a range limited to the classes defined within the tier. The converse is also true; where we use one of the tier classes, such as PositiveCharge it is most likely that we wish to use it with the hasCharge property defined as part. Taken together, we describe the combination of classes and a property as a facet. Facets are a well known technique, first proposed in a library classification (the Colon Classification (Ranganathan, 1933), named after the use of “:” as a separator). They are now common-place as seen with facetted browsers used by many websites for navigation of complex product catalogues. Tawny-OWL provides explicit support for facets, allowing the association of a property and a set of classes, as demonstrated by the following code: (as-facet hasCharge Positive Neutral Negative) The practical implication of this is that we can now use the facet function to return an existential restriction providing just a class. We can express this programmatically; for example, we might use the assert function provided by Clojure’s unit test framework. (assert (= (some hasCharge Positive) (facet Positive))) By itself, this ability is only slightly more succinct. However, when used with multiple facetted classes, the advantages become considerably clearer, as can be shown by the following assertion. (assert (= (list (some hasCharge 5 4 4 Tawny-OWL also adds annotations which have been elided THE FACET The duplication between the annotation and the IRI fragment is there because IRI schemes such as numeric style OBO IDs; annotations have been elided for brevity Facets, Tiers and Gems Neutral) (some hasHydrophobicity Hydrophobic) (some hasPolarity NonPolar) (some hasSideChainStructure Aliphatic) (some hasSize Tiny)) (facet Neutral Hydrophobic NonPolar Aliphatic Tiny))) In addition to succinctness, this pattern also reduces the risk of errors; a class such as Tiny will always be used with its correct property. Without the use of facets, the ontology developer must achieve this by hand. It would also be possible to detect the error using reasoning, although this will only succeed if appropriate range and disjoint restrictions are in the ontology. The defpartition and deftier functions, of course, both add these range and disjoint restrictions and declare their classes as facets of their properties. 7 THE GEM Finally, we define the gem that provides a syntactic abstraction for a class composed entirely or mainly from facets. Following the terminology from Rector (2002), this abstraction would be useful mostly for self-standing concepts. For example, we could define the amino acid alanine using the following defgem statement. (defgem Alanine :comment "An amino acid with a single methyl group as a side-chain." :facet Neutral Hydrophobic NonPolar Aliphatic Tiny) The other amino-acids can be likewise defined as a series of gems. In fact, the amino acids are so regular, all having the same five facets, that we use a further syntactic abstract specific to the amino-acid ontology – a form of pattern that we describe as localized (Warrender, 2015). The gem represents generalised syntax useful for developing any ontology. 8 ON ANNOTATION We have previously discussed the relationship between a design methodology such as normalisation and the use of an upper ontology. The Tawny-OWL patterns described here are all orthogonal and agnostic to the choice of an upper ontology or to none. They do not place their entities in any particular part of the class hierarchy nor define classes outside of those required for the domain ontology, although they could be easily extended to do so should the ontology developer require. However, we agree with Rector (2002) that the use of patterns should “made clear” and be explicit within the ontology. For this reason, all of the patterns described here also make use of annotations, using annotation properties defined using its own internal annotation ontology. For example, all entities generated as a result of a pattern such as deftier are explicitly annotated as such. This means that the use of these patterns is (informally) explicit in the OWL serialization. Tawny-OWL actually uses these annotations internally, for example, to enable the facet functionality by providing a relationship between the classes and the appropriate object property. This is a strictly an implementation detail and could have been achieved without annotations; however, we believe that it shows the value of having this knowledge explicit in OWL. 9 DISCUSSION In this paper, we describe how we have used Tawny-OWL to provide higher-level patterns which can be applied to ontology development. The patterns provide both functionality and syntactic abstraction over the underlying OWL implementation. In the process, they enable the easy and accurate construction of ontologies. More specifically, we demonstrate two new patterns: the tier and the facet. The tier is an extension of the existing value partition pattern and can be used for the generation of many small hierarchies that can be used as refining properties. The facet borrows from the library sciences notion of a facetted classification, and is used to associate a set of classes with a specific set of values. This form of classification is very common in the web; the majority of web stores, for example, offer facetted browsing, often with the facets changing for different subsections of the catalogue. Taken together, these two patterns enable a new form of ontology development, hypernormalisation, which is an extreme form of normalisation. In this form of normalisation, we do away with the creation of a tree of self-standing entities and instead rely on the reasoner to build all the hierarchy. As well as making the ontologist’s task easier, it makes the characteristic that would have been used to create the tree of self-standing entities explicit in the form of a refining characteristic. Here, we have described the application of this methodology to the exemplar amino-acid ontology. Of course, it is dangerous to extrapolate to generality from an exemplar, but we have also started to apply hypernormalisation to ontologies of other, more real, domains including clouds (in the meterological sense), cell lines and a reworking of the Gene Ontology. The tier has been made generic; it does not require, for example, that all refining types are closed (i.e. all possibilities are known in advance) nor disjoint. Clearly, not all forms of ontology will naturally be represented in a hypernormalised form. For example, the Karyotype ontology (Warrender and Lord, 2013) is far from this form; here, we define the self-standing concepts and then use reasoning over a set of defined classes which effectively operate as facets (Warrender and Lord, 2015). However, the popularity of the facetted browsers shows that is possible to use this form of classification in many areas. We believe that the introduction of the concept of hypernormalisation and the implementation of it in Tawny-OWL could have significant implications for the future development of ontologies. REFERENCES Dietze, H., Berardini, T. Z., Foulger, R. E., Hill, D. P., Lomax, J., OsumiSutherland, D., Roncaglia, P., and Mungall, C. J. (2014). Termgenie - a web application for pattern-based ontology class generation. Journal of Biomedical Semantics, 5(1), 48. Egana Aranguren, M., Stevens, R., and Antezana, E. (2009). Transforming the axiomisation of ontologies: The ontology preprocessor language. Nature Precedings. 5 Lord and Stevens Grenon, P., Smith, B., and Goldberg, L. (2004). Biodynamic ontology: applying BFO in the biomedical domain. Stud Health Technol Inform, 102, 20–38. Guarino, N. and Welty, C. (2002). Evaluating ontological decisions with ontoclean. Commun. ACM, 45(2), 61–65. Horridge, M. and Bechhofer, S. (2011). The OWL API: A Java API for OWL Ontologies. Semantic Web Journal, 2. Jupp, S., Horridge, M., Iannone, L., Klein, J., Owen, S., Schanstra, J., Wolstencroft, K., and Stevens, R. (2011). Populous: a tool for building owl ontologies from templates. BMC Bioinformatics, 13(Suppl 1), S5. Lord, P. (2013). The Semantic Web takes Wing: Programming Ontologies with Tawny-OWL. OWLED 2013. Lord, P. (2014). Manchester syntax is a bit backward. http: //www.russet.org.uk/blog/2985. Ranganathan, S. (1933). Colon Classification. Rector, A. (2005). Representing specified values in owl: “value partitions” and “value sets”. W3C Working Group Note. Rector, A. L. (2002). Normalisation of ontology implementations: Towards modularity, re-use, and maintainability. Proceedings Workshop on Ontologies for Multiagent Systems (OMAS) in 6 conjunction with European Knowledge Acquisition Workshops. Siguenza, Spain. Stevens, R. and Lord, P. (2012). Semantic publishing of knowledge about amino acids. http://ceur-ws.org/Vol-903/ paper-06.pdf. Warrender, J. (2015). The Consistent Representation of Scientific Knowledge: Investigations into the Ontology of Karyotypes and Mitochondria. Ph.D. thesis, School of Computing Science, Newcastle University. Warrender, J. and Lord, P. (2013). A pattern-driven approach to biomedical ontology engineering. SWAT4LS 2013. Warrender, J. D. and Lord, P. (2013). The Karyotype Ontology: a computational representation for human cytogenetic patterns. Bio-Ontologies 2013. Warrender, J. D. and Lord, P. (2015). How, What and Why to test an ontology. Wroe, C., Stevens, R., Goble, C., and Ashburner, M. (2003). A methodology to migrate the gene ontology to a description logic environment using daml+oil. Pacific Symposium on Biocomputing.
2cs.AI
1 Who Killed Albert Einstein? From Open Data to Murder Mystery Games arXiv:1802.05219v1 [cs.AI] 14 Feb 2018 Gabriella A. B. Barros1 , Michael Cerny Green1 , Antonios Liapis2 and Julian Togelius1 1: Tandon School of Engineering, New York University, New York, USA 2: Institute of Digital Games, University of Malta, Msida, Malta [email protected], [email protected], [email protected], [email protected] Abstract—This paper presents a framework for generating adventure games from open data. Focusing on the murder mystery type of adventure games, the generator is able to transform open data from Wikipedia articles, OpenStreetMap and images from Wikimedia Commons into WikiMysteries. Every WikiMystery game revolves around the murder of a person with a Wikipedia article, and populates the game with suspects who must be arrested by the player if guilty of the murder or absolved if innocent. Starting from only one person as the victim, an extensive generative pipeline finds suspects, their alibis, and paths connecting them from open data, transforms open data into cities, buildings, non-player characters, locks and keys and dialog options. The paper describes in detail each generative step, provides a specific playthrough of one WikiMystery where Albert Einstein is murdered, and evaluates the outcomes of games generated for the 100 most influential people of the 20th century. Index Terms—Data Games, Open Data, Murder Mystery, Adventure Games, Data Adventures, Game Generation I. I NTRODUCTION Games that cast the player in the role of a detective, where the gameplay and main challenge revolve around solving a crime or mystery, have been popular for many decades. Some games, such as Where in the World is Carmen Sandiego? (Brøderbund Software 1985), task the player with finding a fugitive criminal. Other games, such as Indiana Jones and the Fate of Atlantis (LucasArts 1992) or the series of Tomb Raider (Eidos 1996) and Uncharted (Naughty Dog 2007), see the player embark on an adventure to solve ancient mysteries in the face of opposition from shadowy goons. It is common for these games to feature frequent in-game travel to exotic locales around the world to interact with colorful people and to gather clues, solve puzzles and overcome resistance. These games often make heavy use of real-world locations, stories, items and characters to build their narrative. Authoring such games is complex, time-consuming and requires considerable skill. However, the fact that these games depend on so much real-world information, and that such information is freely available in structured or semi-structured form from resources such as Wikipedia and OpenStreetMap, suggests that it would be possible to somehow automatically incorporate realworld information in these games. Furthermore, murder mysteries and similar adventure games are often highly structured, suggesting the possibility of generating the game itself. But could we do this in practical manner, and if so, how? While research projects in AI-based game generation such as Gameo-Matic [1] and A Rogue Dream [2] create simple arcade-like and rogue-like games respectively, a murder mystery requires a much larger volume and variety of content such as locations, people, dialog and clues for solving the mystery. Moreover, consistency of the content is necessary, both internally within the game narrative and externally as fidelity with the real world. The contribution of a generator of murder mysteries from open data is three-fold: (a) it explores how disparate data can be connected together to create and represent plot-lines, (b) it identifies a design “formula” and structure for murder mysteries and their constituent elements (such as dialog) which can be used to generate mystery games from any Wikipedia entry, (c) it tests the limits of autonomous game generation and issues that arise from absurd or incomplete source data (or from their algorithmic combination). This paper presents WikiMystery, a framework for generating complete, playable point-and-click adventure games with minimal human input: in this case, the name of a person who has a Wikipedia page. The WikiMystery generative system featured in this paper builds upon earlier work [3], extending it significantly with a description of the full generative pipeline, a more sophisticated dialog system and a broader evaluation of nearly 100 games for solving the murder of the most influential people of the 20th century. The WikiMystery game generator is built on the previous project Data Adventures [4] and reuses much of that technology to discover paths between victim and suspects of the murder. The current framework however offers a much more engaging, coherent and complete experience with a clear goal to arrest the culprit of a murder. This is facilitated by extensive story branching towards several suspects, enhanced ludic elements as game objects that unlock certain locations, and enriched dialog elements that allow NonPlayer Characters (NPCs) to share facts both about the mystery and about themselves (based on open data). The paper starts with a brief survey in Section II on game, plot and dialog generation. The paper provides an overview of the generative pipeline of WikiMystery in Section III and the specifics of culprit and evidence selection in Section IV-A, path generation in Section IV-B, location, NPC and item generation in Section V and finally NPC dialog generation in Section VI. To assess the generated games, a sample playthrough is described in Section VII, while Section VIII analyzes the games created for murders of the 100 most influential people of the 20th century. The paper leads to a 2 discussion in Section IX and concludes with Section X. II. BACKGROUND The WikiMystery system is a framework for transforming open data into adventure games. This section discusses the domains of data games, game plot, and dialog generation. A. Data Games In a world of ever-more ubiquitous technology, the amount of data we consume daily is rapidly increasing. One data category that is growing exponentially is open data, i.e. information that can be freely used, re-used, and redistributed by anyone. Creating games out of data can be seen as a form of visualization, where instead of using charts or figures to make the information easier to grasp, one creates playable media. Data games use real world information (such as open data) to automatically generate game content [5]. Players interact with this content during gameplay, and more often than not must learn how to understand the data in order to play the game well. Typically, to use data as game content one must select what parts of the data are useful for content generation, and structurally transform it into applicable game content. Some example data games are discussed below. Open Trumps [6] is a data game where the cards’ content is based entirely on published governmental data. Its generator creates a balanced Top Trumps deck using evolutionary algorithms. While it is not required to learn the data, it helps when playing Open Trumps. In MuseumVILLE1 , content is selected from Europeana2 , and the user, playing as a museum curator, must theme their museum based of their interests. BarChartBall [7] is a physics game that uses UK census data to transform the playable level. It is necessary to infer how the data would affect the playfield, which is modified based upon how high or low the selected attribute was. A Rogue Dream [2] uses the auto-complete results of Google queries (using templates) to choose names for player abilities, enemies and healing items; these names are then given a visual found via Google image search. Finally, geographical data from OpenStreetMap have been used to generate maps and players’ initial positions for FreeCiv 3 [8]. B. Story, Quest and Dialog Generation in Games Research on story generation tends to focus on the textual form. In BRUTUS [9], the generator creates dark stories about characters with backgrounds and narratives. In MINSTREL [10], the generator uses author-level problem solving to write short stories based on King Arthur and his knights. Bardiche [11] acts as a collaborative tool to create good stories based on user input, improvising based on user input. Creating games from stories, or stories from games, is part of the broader subject of recontextualizing data from one medium into another. Examples include the transformation of 1 MuseumVILLE: (https://github.com/bogusjourney/museumville/) is a portal for accessing digitised cultural heritage material, such as paintings and books, from more than 2,000 institutions across Europe. 3 FreCiv is an open souce version of Civilization. (http://www.freeciv.org/) levels in Sonancia [12] and text in Audio Metaphor [13] into soundscapes, or news articles into games in ANGELINA [14]. In adventure games, stories and quests are crucial for progression and this needs to be taken into account when generating them. The game Charbitat [15] procedurally generates the environment as the player explores it, but it lacks a sense of progression. In order to anchor the player, a quest generator was introduced to Charbitat that uses key-lock mechanisms to advance in the game world [16]. Similarly, a two-tiered procedural generator was built for Mystery of Solaris [17], constructing maps and missions via two separate grammars. First, a mission graph is constructed containing all quest information. The mission graph is then taken as input to the map generator, which builds a map around the mission. Symon [18], a point-and-click adventure game, uses procedural content generation to create meaningful puzzles. The generation in Symon was expanded into the Puzzle Dice System [19] for generating puzzles in adventure games. Since murder mystery games largely rely on interaction with non-player characters, the quality of NPC dialog is an important factor to gameplay experience. Dialog generation is hardly a new topic of research, going back all the way to ELIZA [20]. Another example is the Text2dialog system [21] which transforms monological text into dialog, and has agents act out the dialog. It uses textual coherence relationships to map text to question-answer pairs, and is able to create fairly believable dialog. However, we are less interested in creating realistic sequences of chat (and responding accommodatingly to any player request), but rather in driving NPC interactions towards a specific direction, i.e. providing clues to the player. Interactive storytelling has studied dialog generation and delivery extensively, e.g. combining implicit forms of character expression, overall narrative goals, and emotional relationships between characters to generate realistic dialog [22]. III. OVERVIEW OF THE G AME AND THE G ENERATOR WikiMystery is a data-based procedurally generated pointand-click adventure game. It uses data from Wikipedia, OpenStreetMap4 and Wikimedia Commons to automatically create different game content, from plot progressing to images. It was strongly inspired by classic adventure games such as Where in the World is Carmen Sandiego? (Brøderbund Software 1985). Fernández-Vara and Osterweil [23] describe some of the main characteristics of an adventure game: gameplay driven by the story, puzzle-solving core mechanics, interaction with the game world through object manipulation, and an in-world player-controlled character motivated to explore and interact with her surroundings. In the game, the player assumes the role of a detective trying to solve a murder case. The victim is the central point of the story, and suspects are based on people related —somehow— to her. We use Wikipedia to identify possible suspects, out of which five are selected. The game plot is tree-structured: the victim is the root, each suspect is a leaf, and the path between 2 Europeana 4 OpenStreetMap is a open source project that attempts at mapping the world (https://www.openstreetmap.org/). 3 Selecting Victim DBpedia WikiMedia Commons Open Street Maps Allen Shenstone Rosa Beddington Evolving Set of Suspects Generating Paths to Suspects Generating Items Generating Cities & Buildings Generating NPCs Adding Blocks & Solutions Adding Dialogue received Royal Society award David MacKay received Royal Society award died in Princeton, New Jersey Albert Einstein field of physics born in the German Empire Jakob Meisenheimer William Rankine Playable Adventure Game Fig. 1: Flowchart of WikiMystery and its open data sources. them is a representation of the hyperlinks between the victim’s and each suspect’s Wikipedia articles. Initially, the only location available is the victim’s house, where the player can talk to people related to the victim. The player also becomes aware of who the five suspects for the murder are. As they interact with people inside the house, new locations, objects and NPCs become available. As the player explores and interacts with the world, they collect information about suspects’ characteristics (e.g. year of death, occupation etc.). Every suspect except the culprit has a value for one characteristic (e.g. “died in 1980” for suspect 1 or “birth place in Cleveland” for suspect 2) which acts as an evidence of innocence (identified in the dialog with a note “... couldn’t have done it.”). The player receives no such information about the culprit; the culprit also does not share the same value in a characteristic which is evidence of innocence for other suspects (i.e. the culprit did not die in 1980 and was not born in Cleveland). The game ends when the player issues an arrest warrant, identifying the culprit and specifying the values acting as evidence of innocence of the other suspects. If the player correctly finds the culprit and provides the correct evidence for the other suspects, the game is won. If the player does not specify the right culprit, or if the evidence for the innocence of any other suspect is incorrect, then the game is lost. The game generation involves several steps, as shown in Figure 1, the first of which is selecting the victim. From the victim, the system uses DBpedia5 to find a set of five suspects via artificial evolution presented in Section IV-A and to generate paths between each suspect and the victim via a constructive algorithm presented in Section IV-B. Once all paths are generated, the system creates locations, items and NPCs through constructive processes covered in Section V. Finally, it generates puzzles for accessing locations and dialog options for learning about clues or general information from NPCs; we discuss the latter in Section VI. IV. C RAWLING DB PEDIA The plot of WikiMystery is created from a series of hyperlinks in Wikipedia, generated using several consecutive queries to DBpedia. Once a victim has been introduced, the system tries to find suspects and pinpoint a culprit among them. Then, it searches for paths between the victim and the suspects. 5 DBpedia is a project which extracts information from Wikipedia in a structured manner (http://dbpedia.org/). Fig. 2: Selecting suspects from DBpedia to use in the game and finding related between victim and suspects. Initially, the system has a single node: the victim (black node). Suspects related to the victim are selected with a genetic algorithm (white nodes), and paths between the victim and suspects are created from DBpedia (see Fig. 3). All suspects share direct connections with the victim, shown on the arrows. A. Finding Suspects and Culprit Selection of a set of suspects involves identifying who is related to the victim, and out of those, which subset is the most interesting. Given a Wikipedia article about a person, the system queries DBpedia to find anyone who has something in common with the victim. It can be as common as living in the same place, or as specific as being in the same band. This list is our pool of suspects. For each one, we query DBpedia to find everything known about them. At this point, we have a list of suspects, each containing a list of characteristics. Each characteristic can have multiple values. For example, a suspect could be “Albert Einstein”, who would have the characteristic “Field” with values “Physics” and “Philosophy”. Figure 2 shows a simplified selection of suspects. From a victim (black node), the system finds suspects (white nodes), who are related somehow to the victim (arrows). The system must also find a set of characteristics that can single out the culprit among suspects. A characteristic and a value of that characteristic, together, form an evidence of innocence, which is used to identify the culprit and issue an arrest warrant. The list of possible subjects, characteristics and values can be very large, at times. Characteristics may have multiple values available, of which we will only use one per characteristic, and suspects can have multiple characteristics. For example, as of the publication date of this paper, there are 15,300,451 distinct people related to Albert Einstein in some way, constituting his possible suspect pool. Each one has, on average, at least five characteristics, which may or may not have multiple values. Selecting five suspects, four characteristics and their values is therefore challenging. To select which subset of this list is interesting, we turn to an µ + λ evolutionary algorithm. Our goal is to have a finite set of suspects n (typically, 5) and a finite set of characteristics n − 1, such that we can pair each characteristic to a person. The leftover person is the culprit, and the characteristics are evidence of innocence for the n − 1 suspects. This allows the player to eliminate innocent suspects by finding the clue paired to them. The remaining suspect who does not have the same value with any evidence of innocence must be the killer. 4 Our fitness function evaluates solvability and diversity. Solvability favors complete solutions, where the player can identify the culprit by excluding the n − 1 characteristics she knows the killer does not have. Depth-First Search is applied: for every chromosome, it marks one of the suspects in the chromosome as the killer. The search states are characteristics in the chromosome, and they are paired with one suspect once they are visited. Valid states have three properties: (a) the killer has at least one value for the characteristic; (b) one or more suspects have value(s) for the characteristic; (c) at least one suspect has one value different from the killer. The algorithm tries to pair each suspect to one characteristic if the suspect has at least one value that is different from that of the killer (for that specific characteristic). If it cannot match a pair, it backtracks and tries a different suspect. No characteristic can be paired with more than one suspect, and vice-versa. The optimal solution is a leaf where all characteristics are paired successfully to suspects; the fitness is the depth of the leaf. Diversity evaluates how different the characteristics and values are. The game only outputs one value per characteristic/suspect pair, so it is necessary to optimize which value to use. For example, in a game with 5 suspects and 4 characteristics, a solution with 20 values, one per pair, is better than one where one suspect has no value for any characteristic but the one matched to him. Additionally, a solution where all suspects have the same job and live in the same city is less diverse than a solution where they all have different jobs and live in different cities. Even though they still use the same characteristics (“job” and “residence”), the second one has more diversity of values. The actual fitness value is given by:    Vi P X X Qi × − fD = pij × log2 (pij ) (1) i=0 the root of the tree is the crime scene, and each branch leads to a possible suspect. This tree represents most plot points the player is able to unravel in the game in order to move the plot forward, such as locations, NPCs and clues. The only clues not present in this tree are those of evidence of innocence. For each suspect, the system queries DBpedia multiple times, searching all possible paths between the victim and said suspect. It rates each path based on how diverse it is, i.e. the type of articles and links in the path. For example, a path that only has articles about locations is less diverse than one with an even number of articles about people and locations. This process can be computationally expensive, since it is necessary to create one query per node in the path, and per direction of the edge. In practice, using paths longer than 5 nodes has proven to be too time consuming [25]. To bypass this, we divided the search into two steps. The first finds a path of length no longer than 5 nodes, as described above, which we call the major path. Then, for each consecutive pair of nodes in the major path, the system searches for a minor path between those nodes. The minor path replaces the edge between the two nodes in the major path. Figure 3 shows an example path between the victim (Albert Einstein) and a suspect (William J. M. Rankine), identifying major and minor paths. The system measures path quality based on its length and uniqueness. Longer paths are preferred because they will extend the game: each node will be transformed into a city, NPC or item in the story. Uniqueness is calculated as the entropy of each node/edge in the path, compared to all nodes and edges found in all paths in that particular search. Thus a path where the type of edge is not found in other possible paths is better than typical edges (e.g. for scientists it is typical to have edges of type “influenced by” or “influenced”). j=0 where P is the number of characteristics; Vi is the number of values for characteristic i; Qi is the number of people with characteristic i. We multiply with Qi to reward more suspects sharing characteristic i. pij is calculated as the number of people that have value j in characteristic i divided by Qi . The system uses cascading elitism [24] over a population of 100 individuals for 500 generations, with a mutation chance of 20%. Cascading elitism uses both fitness functions: it sorts the population using the solvability fitness, removes the worse 50% individuals, and then sorts the remaining using the diversity fitness. The highest 25% of the population is duplicated and mutated until the new population is filled. It is far more important that games are solvable for playability’s sake (rather than diverse); solvability is applied first during cascading elitism so that it introduces a stronger genetic bias. B. Finding Paths to Suspects Once the system has a victim, suspects and clues as evidence of innocence, it weaves them into a plot by searching DBpedia for a path of hyperlinks between the victim and each suspect. A path consists of nodes (Wikipedia articles) and edges (links between them). The set of all paths can be seen as a tree if we merge the initial node in the paths (i.e. the victim). Therefore V. E NRICHING THE DATA The system transforms the set of paths (tree) obtained from Wikipedia into gameplay objects that the player can interact with. Each node in the tree becomes a location, an item or a NPC. To do so, it creates all necessary game objects, then generates dialogs and links between them, verifies if all objects appear in the correct order, and add puzzles. Nodes in the tree can be roughly categorized into places (e.g. “London” or “Canada”), people (e.g. “Albert Einstein”) and everything else (e.g. “Mathematicians of the 20th Century”). The system begins by transforming the nodes into the simplest objects possible: locations, NPCs and items. For each node based on an article about a place, it generates a city (if the place contains a geographic coordinate) or a building. In the game’s logic, the world contains cities, and buildings are places inside cities. Buildings can also contain items and characters. If the system generates a building, it tries to place it into its respective city. If it cannot find any city related to that building, it will randomly pick a place from Wikipedia and generate a city for it, placing the building in it. After buildings and cities are created, the system takes all nodes based on real people and generates one NPC for each. The NPC gets the original person’s name and a small description. Any node that is not a person or a location is 5 influenced Albert Einstein d nce lue inf doctoral advisor Nathan Rose lac thp bir e Brooklyn y ntr cou United States is io nat ity nal field of John C. Slater l ora oct of is d visor ad William Shockley ced uen nfl i s i by is field of Clinton Davisson Physics d fiel i is f o eld f William Rankine Fig. 3: The major and minor paths between Albert Einstein and William J. M. Rankine. Major paths have dotted arrows, minor paths have black arrows. Locations are represented as hexagons, NPCs as circles and items (books or photographs) as squares. transformed into an item: either a book, a list, a letter or a photograph. Depending on the type of item, different text templates are generated to explain it. It is not possible to transform the tree’s root into an NPC, because he/she is supposed to be murdered. WikiMystery attempts to solve this by adding people related to the victim instead. For each suspect, it searches for a person directly connected to the victim, and transforms him/her into an NPC. If it cannot find enough people, it generates “random” NPCs, whose sole purpose is to give a clue about the following node. Once all objects needed for the plot have been generated, it is necessary to create a logical sequence of steps from the victim to each suspect. The system traverses each branch in the tree, and adds clues and conditions from one node to the next. If the current node is a location, an NPC or item is generated and placed in it. If it is a person, dialog is created directing the player to the next node. We discuss dialog generation in more detail in Section VI. Otherwise, the clue is added to the item’s text description. Additionally, at random times the game may generate a “fake” NPC, the sole purpose of which is to provide a red herring. It is given a random name, no description, and dialog that is less than helpful. A condition manager guarantees that non-root game objects are only available after they have been triggered by another object. Finally, the system adds “puzzles”. One of the most wellknown puzzles in adventure games is the “lock-and-key”, i.e. a location that is inaccessible unless the player uses some specific item to unlock it. WikiMystery generates this kind of puzzles, creating items that are able to unlock buildings, such as flashlights for dark places and crowbars for chained gates. Puzzle objects are placed via a variation of the Breadth-First Search algorithm. First, nodes in the tree are separated by their depth, so depth of 0 will have only the location of the root NPCs, depth of 1 would contain all locations available after talking to the root NPCs, and so on. We simulate a playthrough to perform said separation. It also maintains an array with all possible keys (e.g. “keys”,“crowbars”, etc) and an initially empty stack of locks. At every depth, it randomly chooses whether to put a key in a building of that depth. If it does so, it adds the respective lock to the stack of locks. Additionally, it may randomly pop a lock from the stack and add it to another building. For example, at depth 0 it may chose to put the “flashlight” key in the root building. It will automatically add the lock “darkness” to the stack. Because the victim’s house is the only building at depth 0, and it has already been chosen, the algorithm goes to depth 1. It randomly chooses to put no key and no lock, so it skips straight to depth 2, where it finds a Church and a House. It randomly decides to not put any keys, but decides to pop the lock from the stack (i.e. the “darkness” lock) and adds it to the Church. Adding the key before the lock guarantees that the puzzle will be solvable. VI. D IALOG G ENERATION The game’s dialog has two goals: to advance the game by giving hints and evidence needed to win, and to provide a sense of depth and immersion, which can be hard to capture in a data game. Each NPC has their own dialog tree, i.e. the lines of dialog that both the player and the NPC use when interacting, along with the dialog options for the player. The root of this tree is a simple “Hello”, and the choices that follow are called dialog branches. There are two types of branches: the main branch containing information necessary to complete the game, and the side branch (of which there are several subtypes), which contains information that is not necessary to complete the game but increases immersion. A. Main Branch The main dialog branch contains hints that will allow the player to advance in the game. For every NPC, the generator parses data and stores information from this person’s DBpedia page: anything from places, persons, items, and concepts associated with the person, as well as personal information like birthplace and birthday, is stored. The dialog generator then takes sentence templates and replaces placeholder text. For example, Rosa Beddington’s person object might have “Jamaica” stored within it as an associated place. When a player talks to another NPC who is associated with Rosa Beddington, they might have a dialog node telling the player where they think Rosa Beddington is. I saw PERSON in PLACE. You should probably look there. will now become: I saw Rosa Beddington in Jamaica. You should probably look there. After packaging a sentence of dialog into a dialog node, the generator adds this node as a child of the dialog root. Dialog choices are hidden by default unless its parent has been visited. Thus, the player must select the root “Hello” option before any branches are revealed to them. B. Side Branches Beyond the main dialog branch, the generator also selects randomly from a set of “side branches”, which have no effect on the overall story. These branches provide extra information about the NPC that the player is speaking to. There are future plans to use these for an educational purpose, where players 6 Fig. 4: An example of a dialog side branch. The player is speaking to Hermann Einstein in the Albert Einstein game. can learn more about characters’ backgrounds by talking to them. Currently, there are 3 possible side branches: birth-dates and birth-places, current residence, and lifetime achievement. When data is originally parsed from DBpedia, birth, current residency and overview information are stored. When creating a side branch, this data replaces the placeholder words in templates (as in the main branch); see Fig. 4 for an example side branch. After the main branch is created, the generator randomly selects up to two topics for which to generate side branches, or none. If generated, the system shows an option on the dialog screen that leads the user to these branches. (a) Initial World Map (b) Initial city map of Switzerland (c) House of Albert Einstein (d) Clue given during dialog (e) Travel between cities (f) Icon of the Photograph item (g) Zoomed-in Photograph item (h) Dialog with a Suspect (i) Finding an Evidence of Innocence (j) Issuing a warrant VII. E XAMPLE P LAYTHROUGH As an indicative playthrough, we describe the first few minutes of WikiMystery gameplay; this game uses as input the text “Albert Einstein”, identified by the TIME magazine [26] as the “Person of the [20th] Century”. Once the game launches, the user can load any of the 100 most influential people of the 20th century, which were pre-generated for the purposes of the analysis of Section VIII. The game starts at the world map (see Fig. 5a), where only one point can be visited: Switzerland, chosen as the birthplace of Albert Einstein. Clicking on that point of interest, the user moves to a map of a location in Switzerland collected from OpenStreetMap6 , where a single location titled “House of Albert Einstein” (see Fig. 5b) can be visited. The player also has access to a backpack in this screen (bottom right of Fig. 5b), which is currently empty but can store items that can be used to access locked locations. When the player clicks on the house of Albert Einstein, they move to the building screen which shows a background of a single-story house, coupled with informative text about Switzerland in the bottom area (see Fig. 5c) and six different game icons that can be interacted with to the right. The first five icons are NPCs, while the last icon displays a crowbar which can be stored in the inventory by clicking on the hand button on the crowbar icon. As noted above, in the House of Albert Einstein there are five NPCs which the player has the option of observing (eye button under each icon in Fig. 5c) or talking to (dialog button under each icon in Fig. 5c). These NPCs are Leo Szilard, David Joseph Bohm, Jean Gebser, Riazuddin, and James; the last NPC was randomly generated and given a random name, while the remaining NPCs are physicists except Gebser who is a philosopher. Clicking on the eye button gives information about each of these NPCs (for the random NPC James the text 6 Apparently what is shown in Fig. 5b is an open area near the Melchtal Valley, as the DBpedia entry places the coordinates of the country of Switzerland at its center. Fig. 5: In-game screenshots of the mystery around the murder of Albert Einstein. says “There is no information available for this character”). Note that the images chosen for all NPCs are not images of people in the case of Szilard and Bohm (instead the images are related to the atomic bomb), and not images of the correct people in the case of Gebser and Riazuddin. Clicking on the dialog button of any NPC icon moves the user to the dialog overlay (see Fig. 5d), where the NPC’s name is followed by their response text, followed in turn by a set of dialog options. The general dialog sequence for any NPC in the house of Albert Einstein revolves around first asking for help, then asking their name, and then about any information they might have and where the player should look for it. The responses of each NPC depend on which path they are on, and towards which suspect they will guide the player. Indicatively, if the player initiates dialog with Leo Szilard then the NPC will respond to the player’s question “Please state your name.” with “Maybe... You can call me Leo Szilard. I was one influence.”; in this case, Leo Szilard was an influence to Albert Einstein, 7 which (subtly) explains why this character is in this game. When the player asks “Is there something you think I should know?”, Leo Szilard responds “He talked to Hermann Einstein a lot.”; the player can then ask “Where is Hermann Einstein?” to which Leo Szilard responds “Hermann Einstein went to the United States not long ago.” (see Fig. 5d). This immediately adds “the United States” as a location in the world map, puts the house of Hermann Einstein on its city map, and an NPC named Hermann Einstein within it. After the player has talked to all five NPCs in the House of Albert Einstein, there are five more locations in the world map that they can visit by clicking on them, at which point a small plane will be shown traveling from the player’s current location to the selected one (see Fig. 5e). These locations on the world map are ‘the United States’7 (containing the house of Hermann Einstein), ‘Princeton, New Jersey’ (containing a Tunnel building), ‘Israel’ (containing the house of Nathan Rosen), ‘Wrttemberg’ (containing a Stadium building) and ‘Swiss Federal Institute of Technology in Zurich’ (containing a building of the same name, and placed in Zurich on the map). Similarly to the house of Albert Einstein, there is one or more NPCs or clues in each building listed above. For instance, in the Tunnel building of Princeton, New Jersey there is a random NPC named Vlad and a photograph icon (left-most in Fig. 5f). Clicking on the photograph shows an image of Jewish people (see Fig. 5g), and its description says: It is a photograph about Jews. In a corner, it says: The Jews, also known as the Jewish people, are an ethnoreligious group originating from the Israelites, or Hebrews, of the Ancient Near East. Jewish ethnicity, nationhood and religion are strongly interrelated, as Judaism is the traditional faith of the Jewish nation, while its observance varies from strict observance to complete nonobservance. There are names written behind: Canada Israel This information is based on the abstract of the Wikipedia article8 regarding the ‘category: Jews’ (as stored in DBpedia) which is used to link different NPCs in the mystery together. These NPCs are Nathan Rosen in Israel and a random NPC (also named Vlad) in the University building in a world map location named ‘Canada’; Vlad reveals that Allen Goodrich Shenstone is located in his house in Princeton, New Jersey. After an extensive investigation taking the player to many different cities around the globe, and slowly revealing more and more buildings, NPCs and clues in previously visited cities, the player finds the five suspects. In this mystery the suspects are Sir David MacKay (whose dialog and pleas for innocence are shown in Fig. 5h), Allen Shenstone, William John Macquorn Rankine, Jakob Meisenheimer, Rosa Beddington. Each of these five names are also provided — after questioning — by one of the five NPCs in the player’s starting location: the house of Albert Einstein. Of those suspect NPCs, Rosa Beddington (linked to Einstein as a fellow scientist and having been awarded by the Royal Society) is the culprit. Other 7 The marker based on DBpedia information is again placed at the center of the U.S.A. 8 https://en.wikipedia.org/wiki/Jews, accessed 13 March 2017. suspects such as Sir David MacKay can be absolved by finding an evidence of innocence, in this case provided by chemist Jacob Meisenheimer (see Fig. 5i). Once the player is confident they have collected enough evidence, they can click on the cellphone (bottom left corner of Fig. 5d) to choose the guilty person as in Fig. 5j. The player chooses the guilty person and once they do so, the remaining suspects are placed in another window (bottom half of Fig. 5j); the player must then specify one characteristic and the correct value for each person which make them incapable of having committed the murder. The characteristics and values that absolve all suspects except Rosa Beddington are included in Table II. If the player selects the culprit and chooses values for the remaining suspects, they can click on the “arrest” button (bottom right of Fig. 5j) at which point the game ends with a message of success or failure. VIII. E VALUATION While the playthrough of Section VII provides a glimpse of what it means to play a generated murder mystery, this section evaluates the content generated from a broader set of murdered Wikipedia persons. The goal is two-fold: estimate the number of interactions afforded in each game (e.g. dialogs with NPCs, visits to cities, item pickups), and assess the sensitivity of the system to different inputs (i.e. Wikipedia persons). For the former, several metrics regarding instances of specific elements (cities, NPCs, dialog lines) per generated game are listed. For the latter, we describe which Wikipedia persons were murdered in games with the highest and lowest values in these metrics. While this paper does not perform an user playtest of such generated games to assess e.g. how intuitive the connections between NPCs are, the provided evaluation is vital in understanding how complex the generated games are and which of the generated gameplay elements contribute most to this complexity. This evaluation is thus a first step prior to a playtest, to assess for instance the minimum number of player clicks (via the tree size metric combined with the dialoge nodes metric) for a game to be completed. Such metrics can then be compared with actual metrics derived during playtests, but can also inform changes to the generative algorithms before such playtests can take place. To assess a broad range of games, based on persons with a strong presence in Wikipedia, we used the list of the TIME magazine’s 100 most influential people of the 20th century [26] as input. Each person in the list became the victim in a procedurally generated game, some after preprocessing, excluding two: “American G.I.” and “Unknown Rebel”. The system was not able to generate games with them, as the first represents a whole category (we could not choose a single person that represented this category), and the latter represents an unknown person who does not contain the tag “Person” in his DBpedia page. Additionally, the system cannot process groups of people, so inputs such as “The Kennedy Family” had to be transformed into a single individual. Entries about groups were transformed into one of the most known people of the group. For example, “The Beatles” became “John Lennon” and “The Kennedy Political Family” became “John F. Kennedy”. The system generated a total of 98 games, one per input. Table I shows the quantitative results. 8 TABLE I: Average metrics of all generated adventure games for the 98 most influential people. Location metrics Cities Buildings Average buildings per city Item & Puzzle metrics All Items Books Photographs (torn or not) Torn Photographs Key items Locked buildings NPC metrics All NPCs NPCs based on real people Average ratio of real NPCs over all NPCs Average NPCs per building Dialog metrics All dialog nodes Average dialog nodes per NPC All side-branches Achievement side-branches Residence side-branches Birth side-branches Complexity Average length of paths Tree size 18.07 46.37 2.88 23.91 9.45 7.24 2.55 2.71 2.67 46.53 24.03 52% 1.02 208.33 4.45 35.47 9.05 8.56 17.86 12.07 60.34 A. Game Content Based on Table I, the average tree size of the generated games is 60.3 nodes. The game with the smallest tree size had “Robert H. Goddard” as input and 20 nodes. “Marlon Brando”, “Martin Luther King, Jr.”, “Richard Rodgers” and “Willis Carrier” tied for the most nodes in the tree, with 65. On average, the length of paths between victim and each suspect was 12 nodes. Six games had the lowest path length with 5 nodes, while 39 had the highest path length with 13 nodes. Each game had on average around 18 cities and 46 buildings, with approximately 2.9 buildings per city. The most common cities amongst all games was “The United States”, appearing in 73 out of the 98 games, followed by “New York City” (43) and “District of Columbia” (37). North American locations dominated the top 10 most common cities, with 8 locations. The remaining two were “London” and “Germany”. Note that while the game only represents locations as cities and buildings, the in-game city category may include countries (e.g. The United States), states and actual cities. On average, 24 items were generated per game, mostly books (9.45). Games with most and fewest books were created from, respectively, “Le Corbusier” (20 books) and “Theodore Roosevelt” (1). Key items and locked buildings tend to appear together, with an average of 2.71 key items and 2.67 buildings. Every game had at least one key and one locked building, while at most there were three keys and three locked buildings in a single game. The number of keys was always equal or higher to that of locked buildings, ensuring solvability. An average of 46 NPCs were created per game, and on average 24 were based on real people (ratio of 52%). While this ratio is not optimal, we believe it can be improved in future versions by being more lenient in the NPC generation: now, we only look at people with one-degree distance from the article that originated the node. If there is no person, we could expand the search to 2 or 3 degrees distances, which we believe can improve this ratio. We believe that increasing the percentage of NPCs based on real people over “random” NPCs would provide more interesting, full-fledged characters and interactions. The ratio of NPCs based on real people ranged from 28% to 76% of all NPCs. The game with most real NPCs was generated from “Lech Wałesa” with 41 real NPCs, and the one with the least from “Walter Reuther” with 9. Based on Table I, there are 208.33 dialog nodes on average in a WikiMystery game, distributed across all NPCs in the game. Results show an average of 4.45 dialog nodes per person. Every person has a main branch in their dialog tree, so the number of main branches is equal to the number of NPCs. In addition to those, there are on average 35.5 sidebranches in a game. Of those, an average of 9 side-branches refer to the NPC’s personal achievements, 8.6 side-branches concern the NPC’s current residence, and 17.9 side-branches are associated with the person’s birth. There are nearly twice as many side-branches on birth than the other two types, since the generator creates two branches (birth date and birth place) when selecting a side-branch on birth. B. Suspects, Direct Connections and Evidence Each generated game must have a set of suspects, evidence of innocence and direct connections between suspect and victim (i.e. the reason for selecting those suspects). Table II shows the set of suspects, evidence of innocence and direct connection between victim and suspect of the three most influential people on TIME’s list: Albert Einstein, Franklin D. Roosevelt and Mahatma Gandhi. Values in italics are used as evidence for innocent suspects, allowing the player to differentiate between them and the culprit. Notice that when the culprit has no value (e.g. in the game generated from Franklin Roosevelt, Daniel Poulter has no value for the “Party” characteristic), any value would fit to differentiate between any suspect, but the game will only check this characteristic for the specific paired suspect (in the game generated from Franklin Roosevelt, Gwendolyn Garcia is paired up with the “Party” characteristic). Additionally, if two innocent suspects share the same value for a characteristic, it is used as evidence for one of them, as long as it is different from the culprit. That merely means that it is evidence that only one suspect is innocent, but does not absolve the other suspect. An example is shown in Mahatma Gandhi’s game (see Table II) where Tex Avery and Jhunnilal Verma both died in 1980, but this is only evidence of innocence for Avery (note that Eddie Lyons, the culprit, died in 1926). In some cases, the actual value appeared as a consequence of Wikipedia’s own organization. In Mahatma Gandhi’s game, the primary reason for selecting Tex Avery and Eddie Lyons as suspects is them belonging (like Gandhi) to the category “Articles containing video clips”, indicating that they both appear in the Wikipedia list of articles containing video clips. The secondary reason was that this set of these five suspect allowed for a solvable and somewhat diverse game, according to the GA. Direct connections are relations between the victim and each suspect. Since they depend on hyperlinks from the victim’s 9 TABLE II: Solution from games generated with the top 3 most influential people: Albert Einstein, Franklin D. Roosevelt and Mahatma Gandhi. Each innocent suspect is paired to one characteristic (in blue italics) that will differentiate him/her from the killer (whose name is shown with an asterisk, and is last in each list). Empty values appear in the game as “Unknown”. The direct connection column shows the primary criteria for choosing the suspect in relationship to the victim (e.g. “politicians” means that both the victim and that suspect were politicians. thus the suspect was directly connected to the victim). Albert Einstein Suspects Jakob Meisenheimer Death Place Field Subject 1934 deaths Nazi Germany Sir David MacKay Information theory Living people Thermodynamicists Fellows of the Royal Society 20th-century women scientists Glasgow Physics Allen G. Shenstone United States Physics Rosa Beddington* Great Tew Developmental biology Suspects Term end Kevin Cahill 1994-12-31 Gwendolyn Garcia William J. M. Rankine AlmaMater Ludwig Maximilian University of Munich California Institute of Technology University of Edinburgh Brasenose College, Oxford Direct Connection Born in the German Empire Received the Royal Society award Physicists Died in Princeton, New Jersey Received the Royal Society award AlmaMater Direct Connection State University of New York Part of Democratic Party Princeton University Franklin D. Roosevelt Party Democratic Party (US) from the 103rd District Office Member of the New York Assembly at New Paltz 2013-06-30 One Cebu Governor of Cebu Johnny Ellis 1993-01-11 Democratic Party (US) Jane Griffiths 2005-04-11 Labour Party (UK) Daniel Poulter* 2015-05-12 Majority Leader of the Alaska Senate Member of parliament Member of parliament Suspects Death year University of the Philippines Diliman Claremont McKenna College Part of Democratic Party, politicians Durham University Politicians University of Bristol Politicians Direct Connection Appear in the Wikipedia category of articles containing video clips Politicians Mahatma Gandhi Birth place Subject Occupation Articles containing video clips Animator, cartoonist, voice actor, director Tex Avery 1980 Taylor, Texas Stanley Rosen 2014 Cleveland Jhunnilal Verma 1980 Eddie Lyons* 1926 Writer 20th century philosophers Damoh, India Jewish American writers 20th-century philosophers People from Damoh Lawyer Beardstown, Illinois, USA Articles containing video clips Actor, director, screenwriter, producer Indian lawyers Appear in the Wikipedia category of articles containing video clips Landau Volker Zotz Wikipedia page, they can only be as varied as the article itself. Therefore, games usually have an emergent underlying theme. In the game generated for Albert Einstein, both he, Allen Shenston and William J. M. Rankine were in the field of Physics, and he and Shenston both also died in Princeton, New Jersey; Einstein, David Mackay and Rosa Beddington received the Royal Society award, and both Einstein and Jakob Meisenheimer were born in the German Empire. In Franklin D. Roosevelt’s game, Roosevelt and all suspects except Kevin Cahill are politicians9 . Roosevelt, Cahill and Johnny Ellis were all part of the U.S.A. Democratic Party. Finally, in Mahatma Gandhi’s game, both he and Jhunnilal Verma were Indian lawyers; Gandhi, Volker Zotz and Stanley Rosen were 20th century philosophers; and he, Eddie Lyons and Tex Avery all appear in the Wikipedia category of articles containing video clips. The last connection is arguably poorer than others, demonstrating how some of the source data can be difficult to tailor to our needs; this is discussed extensively in Section IX. 9 Cahill actually is a politician, he is not tagged as one in DBpedia. 20th century philosophers IX. D ISCUSSION The sample playthrough of Section VII and the numerical evaluations of Section VIII provide a high-level overview of the types of games generated by the current WikiMystery prototype. Contrary to our early attempts at adventure generation, which created one path between two people [4], the murder mystery is far less linear and includes more dialog and gameplay options. The fact that paths can be traversed nonsequentially (inevitably so, as it is difficult to keep track of which NPC or object forms a path towards which suspect) increases the exploration and branching factor in terms of decision-making on the part of the player. This in turn leads to more interesting gameplay as it gives a greater sense of player agency. The gameplay has been improved with more branching, better visual presentation of results, more interesting dialog options, and a concrete winning condition. While it was a priority for the authors to improve on the gameplay quality of the broader Data Adventures project, the biggest appeal remains its link to real-world data accessed 10 (a) Darling house of early colonial (b) The image of Confucius chosen Australia highlighted... and placed in for Hermann Einstein, and the ‘ask Israel. about Jews’ dialog are... unfortunate. Fig. 6: Absurd and potentially offensive combinations of data can occur with WikiMystery. via open data repositories. Based on the metrics of Table I, that aspect of WikiMystery has been strengthened as well, with each game containing a multitude of cities placed in their real-world locations and with a city map showing their street view (based on OpenStreetMap). The ratio of random NPCs to “real” NPCs, which are based on Wikipedia articles, is also kept in balance, while the introduction of photograph in-game objects increases the modes through which open data can be experienced (i.e. through images rather than text information found in book in-game objects). Most importantly, the improved NPC dialog allows not only for a more engaging and intuitive way to solve the mystery but also allows for yet another way to present open data, as a player can choose what questions to ask of the NPC (e.g. regarding their life achievements) rather than being presented the data as a large chunk of text when observing the NPC, for example. Although there have been substantial improvements in the presentation of content from earlier iterations of Data Adventures [4], [25], the very nature of generating games from open data hinges on the uncontrollable nature of such data. This allows for nigh-infinite expressivity, as any person with a Wikipedia presence can potentially star in a generated game (where he is murdered), but this lack of control can lead to unexpected, unintended or even unwanted outcomes. On the one hand, the ongoing efforts of the Data Adventures line of research focus on controlling this vast repository of data and transforming it into intuitive and playable objects; for instance, attempting to find unique connections between people rather than trivial ones such as “they are both human”. It is, however, impossible to ever fully control or constrain the experience, as doing so would obfuscate its origins from a living, vast knowledge base rooted deeply in the real world. It is that very absurdity that makes the outcomes appealing in their own way; as the user of another data-based game titled A Rogue Dream states, it feels “like playing a videogame against The Internet” [2], and at least in the case of WikiMystery that is intentional. This absurdity, however, causes some hilarious, and sometimes appalling, outcomes. It has been noted in the playthrough of Section VII that most NPCs’ images were not correct, which is either due to the lack of appropriate images for those people in WikiMedia Commons, or flaws in the image parsers currently at hand. In such cases, a random search for an image of a man (for male NPCs) and a woman (for female NPCs) is used instead. For buildings, moreover, the image search is based on the name of the building without context of its geographical location. This can lead to results such as that of Fig. 6a, where not only is the building’s background an old photograph with an actual highlighted building with a red circle, but on closer inspection the chosen building (result of a search for “house of Nathan Rose”) is the Darling House, which holds historical significance for early colonial Australia, but in the game is used as a domicile for Nathan Rosen in Israel. Our choice of using only freely available sources, such as Wikimedia Commons, complicates the retrieval of specific images. A source such as Google Images could improve results, but contradicts the scope of freely available solutions. Therefore, future work should improve the search for appropriate images, possibly by increasing the breadth of searches in more repositories or by performing some computer vision verification that e.g. the image is one of a person. Additionally, more problematic are instances where an unforeseen combination of content and their transformation can lead to insensitive or offensive results. As an example, Fig. 6b shows the dialog with Hermann Einstein as part of the playthrough of Section VII where the player is seeking the culprit of Albert Einstein’s murder. The image, unsurprisingly, is not that of Hermann Einstein; instead, the random search for an image of a man serendipitously ended up being a drawing of Confucius. On the other hand, the dialog has chosen to highlight that the connection between this person and the next along the path is the ‘category: Jews’; this category was also cued by the photograph of Fig. 5g as discussed extensively in Section VII. In this case, the player interacts with Hermann Einstein with the dialog line “hAsk about Jewsi”. It is certainly true that the actual story of Albert Einstein was deeply affected by him being Jewish and the events of World War II, so the category and the path found is accurate (perhaps desirable), however the random choice of this dialog line10 and the random assignment of an image of Confucius for avatar are a very unfortunate, insensitive and likely offensive combination. It is difficult to envision how such instances could be avoided, as it was largely an issue with simple transformations of data and their combination going awry. While it is not the case here, one should also not underestimate that the nature of open online data “is often tainted by popular belief, misconception, stereotype and prejudice, as opposed to purely factual information” [2], and thus such unfortunate instances may actually occur due to prejudice in the source data before they are even transformed. There are still important directions for future work, in order to improve both the usability of the game and its narrative consistency. For example, some interface additions, such as a travel diary, could help the player to keep track of clues and connections between NPCs, objects, locations and characteristics. Moreover, the current dialog format uses fixed templates and sequences; perhaps a grammar-based approach such as Tracery [27] could result in more diverse, life-like dialogs. Furthermore, an important missing component in the narrative of the murder is the culprit’s motive (and possible motives for other suspects). It is unlikely that a motive such as jealousy 10 Consider how inoffensive a similar line saying “hAsk about Physicsi” would be. 11 would be based on real facts and data, although it could be generated based on relationships of people (e.g. siblings or spouses) as in [28]. Exploring the relations between the NPCs, their personalities and goals seems promising. Using data to do so is not trivial, as even a sentiment analysis over a Wikipedia article about a person would only express the writer’s feelings, not the actual subject’s. On the other hand, we have yet to fully understand how players interact and view the data presented in WikiMystery. It is one of our priorities to release a playable version of the game online, setting up a logging system so that we can perform user studies. We also intend to investigate the possibility of using WikiMystery to gain insight on the correctness of data in DBpedia and Wikipedia. X. C ONCLUSION This paper presented the latest installment of the WikiMystery game, and detailed its complex generation pipeline, from the name of a person with a Wikipedia article to a full interactive murder mystery game. Open data is used in a multitude of ways in order to find NPC suspects for an in-game murder of a specified person, to find paths linking these NPCs, to place them in locations around the globe and to provide a way for the player to absolve innocents and deduce the culprit. Moreover, open data is used to create the ‘levels’ (i.e. cities and buildings) in which NPCs are found, to create in-game objects with photographs and books that act as clues, and to enhance dialog options of NPCs beyond the merely functional needs of completing the game. While there are many directions of future work in order to increase gameplay intuitiveness, to provide a better link between visuals and other content, and to reduce the absurdity of combinations, the current WikiMystery generator is the first to create fully playable adventure games with minimal human authorship and curation. XI. ACKNOWLEDGMENTS NPCs discussed in the generated adventures are instantiated from real people, but the similarities end there. The NPCs’ actions in the game (as victims or culprits) in no way reflect the real-world people they are based on. The generator’s output in no way accuses or misrepresents these real-world individuals. WikiMystery creates fictional counterparts of public figures who have a presence in Wikipedia: any similarity between the (fictional) NPCs in the game and real-world people is therefore due to the data available in these open, online, freely accessible and editable repositories. We thank Ahmed Khalifa and Scott Lee for helpful insight. Gabriella Barros acknowledges financial support from CAPES and Science Without Borders program, BEX 1372713-3. R EFERENCES [1] M. Treanor, B. Blackford, M. Mateas, and I. Bogost, “Game-o-matic: Generating videogames that represent ideas,” in Proceedings of the FDG workshop on Procedural Content Generation, 2012. [2] M. Cook and S. Colton, “A rogue dream: Automatically generating meaningful content for games,” in Proceedings of the AIIDE workshop on Experimental AI & Games, 2014. [3] G. A. B. Barros, A. Liapis, and J. Togelius, “Murder mystery generation from open data,” in Proceedings of the Seventh International Conference on Computational Creativity, 2016. [4] ——, “Data adventures,” in Proceedings of the FDG workshop on Procedural Content Generation in Games, 2015. [5] M. G. Friberger, J. Togelius, A. B. Cardona, M. Ermacora, A. Mousten, M. M. Jensen, V. Tanase, and U. Brøndsted, “Data games,” in 4th Workshop on Procedural Content Generation, 2013. [6] A. B. Cardona, A. W. Hansen, J. Togelius, and M. Gustafsson Friberger, “Open trumps, a data game,” in Proceedings of the Foundations of Digital Games, 2014. [7] J. Togelius and M. Gustafsson Friberger, “Bar chart ball, a data game,” in Proceedings of the Foundations of Digital Games, 2013. [8] G. A. Barros and J. Togelius, “Balanced civilization map generation based on open data,” in IEEE Congress on Evolutionary Computation (CEC). IEEE, 2015, pp. 1482–1489. [9] S. Bringsjord and D. A. Ferrucci, “Artificial intelligence and literary creativity: Inside the mind of brutus, a storytelling machine,” Computational Linguistics, vol. 26, no. 4, pp. 642–647, 2000. [10] S. R. Turner, “Minstrel: A computer model of creativity and storytelling,” Ph.D. dissertation, Los Angeles, CA, USA, 1993. [11] G. Vink, “Bardiche: An interactive online narrative generator,” B.S. thesis, 2015. [12] P. Lopes, A. Liapis, and G. N. Yannakakis, “Sonancia: Sonification of procedurally generated game levels,” in Proceedings of the 1st Computational Creativity and Games Workshop, 2015. [13] M. Thorogood, P. Pasquier, and A. Eigenfeldt, “Audio metaphor: Audio information retrieval for soundscape composition,” Proceedings of the Sound and Music Computing Cong.(SMC), 2012. [14] M. Cook, S. Colton, and J. Gow, “Automating game design in three dimensions,” in Proceedings of the AISB Symposium on AI and Games, 2014, pp. 20–24. [15] J. Alderman, C. Ashmore, K. Compton, M. Shapiro, and M. Nitsche, “The many worlds of charbitat,” in Game Set and Match II, 2006. [16] C. Ashmore and M. Nitsche, “The quest in a generated world,” in Proceedings of the DiGRA Conference, 2007, pp. 503–509. [17] B. Lavender and T. Thompson, “Adventures in hyrule: Generating missions & maps for action adventure games,” 2015. [18] C. Fernández-Vara and A. Thomson, “Procedural generation of narrative puzzles in adventure games: The puzzle-dice system,” in Proceedings of the The third workshop on Procedural Content Generation in Games. ACM, 2012, p. 12. [19] C. Fernández-Vara, “Creating dreamlike game worlds through procedural content generation,” in Seventh Intelligent Narrative Technologies Workshop, 2014. [20] J. Weizenbaum, “ELIZA - A computer program for the study of natural language communication between man and machine,” vol. 10, no. 8, 1966. [21] H. Hernault, P. Piwek, H. Prendinger, and M. Ishizuka, “Generating dialogues for virtual agents using nested textual coherence relations,” in International Workshop on Intelligent Virtual Agents. Springer, 2008. [22] M. Cavazza and F. Charles, “Dialogue generation in character-based interactive storytelling.” in Proceedings of the AI in Interactive Digital Entertainment conference, 2005, pp. 21–26. [23] C. Fernandez-Vara and S. Osterweil, “The key to adventure game design: Insight and sense-making,” in Proceedings of Meaningful Play, 2010. [24] J. Togelius, R. De Nardi, and S. M. Lucas, “Towards automatic personalised content creation for racing games,” in IEEE Symposium on Computational Intelligence and Games. IEEE, 2007, pp. 252–259. [25] G. A. B. Barros, A. Liapis, and J. Togelius, “Playing with data: Procedural generation of adventures from open data,” in Proceedings of the International Joint Conference of DiGRA and FDG, 2016. [26] F. Golden, “Albert Einstein,” vol. 154, no. 27, 1999. [27] K. Compton, B. Kybartas, and M. Mateas, “Tracery: an author-focused generative text tool,” in International Conference on Interactive Digital Storytelling. Springer, 2015, pp. 154–161. [28] A. Stockdale, “Cluegen: An exploration of procedural storytelling in the format of murder mystery games,” in Proceedings of the AIIDE workshop on Experimental AI in Games, vol. 2, 2003.
2cs.AI
arXiv:1705.07347v3 [stat.ML] 22 Nov 2017 Ensemble Sampling Xiuyuan Lu Stanford University [email protected] Benjamin Van Roy Stanford University [email protected] Abstract Thompson sampling has emerged as an effective heuristic for a broad range of online decision problems. In its basic form, the algorithm requires computing and sampling from a posterior distribution over models, which is tractable only for simple special cases. This paper develops ensemble sampling, which aims to approximate Thompson sampling while maintaining tractability even in the face of complex models such as neural networks. Ensemble sampling dramatically expands on the range of applications for which Thompson sampling is viable. We establish a theoretical basis that supports the approach and present computational results that offer further insight. 1 Introduction Thompson sampling [8] has emerged as an effective heuristic for trading off between exploration and exploitation in a broad range of online decision problems. To select an action, the algorithm samples a model of the system from the prevailing posterior distribution and then determines which action maximizes expected immediate reward according to the sampled model. In its basic form, the algorithm requires computing and sampling from a posterior distribution over models, which is tractable only for simple special cases. With complex models such as neural networks, exact computation of posterior distributions becomes intractable. One can resort to to the Laplace approximation, as discussed, for example, in [2, 5], but this approach is suitable only when posterior distributions are unimodal, and computations become an obstacle with complex models like neural networks because compute time requirements grow quadratically with the number of parameters. An alternative is to leverage Markov chain Monte Carlo methods, but those are computationally onerous, especially when the model is complex. A practical approximation to Thompson sampling that can address complex models and problems requiring frequent decisions should facilitate fast incremental updating. That is, the time required per time period to learn from new data and generate a new sample model should be small and should not grow with time. Such a fast incremental method that builds on the Laplace approximation concept is presented in [5]. In this paper, we study a fast incremental method that applies more broadly, without relying on unimodality. As a sanity check we offer theoretical assurances that apply to the special case of linear bandits. We also present computational results involving simple bandit problems as well as complex neural network models that demonstrate efficacy of the approach. Our approach is inspired by [6], which applies a similar concept to the more complex context of deep reinforcement learning, but without any theoretical analysis. The essential idea is to maintain and incrementally update an ensemble of statistically plausible models, and to sample uniformly from this set in each time period as an approximation to sampling from the posterior distribution. Each model is initially sampled from the prior, and then updated in a manner that incorporates data and random perturbations that diversify the models. The intention is for the ensemble to approximate the posterior distribution and the variance among models to diminish as the posterior concentrates. We refine this methodology and bound the incremental regret relative to exact Thompson sampling 31st Conference on Neural Information Processing Systems (NIPS 2017), Long Beach, CA, USA. for a broad class of online decision problems. Our bound indicates that it suffices to maintain a number of models that grows only logarithmically with the horizon of the decision problem, ensuring computational tractability of the approach. 2 Problem formulation We consider a broad class of online decision problems to which Thompson sampling could, in principle, be applied, though that would typically be hindered by intractable computational requirements. We will define random variables with respect to a probability space (Ω, F, P) endowed with a filtration (Ft : t = 0, . . . , T ). As a convention, random variables we index by t will be Ft -measurable, and we use Pt and Et to denote probabilities and expectations conditioned on Ft . The decisionmaker chooses actions A0 , . . . , AT −1 ∈ A and observes outcomes Y1 , . . . , YT ∈ Y. There is a random variable θ, which represents a model index. Conditioned on (θ, At−1 ), Yt is independent of Ft−1 . Further, P(Yt = y|θ, At−1 ) does not depend on t. This can be thought of as a Bayesian formulation, where randomness in θ reflects prior uncertainty about which model corresponds to the true nature of the system. We assume that A is finite and that each action At is chosen by a randomized policy π = (π0 , . . . , πT −1 ). Each πt is Ft -measurable, and each realization is a probability mass function over actions A; At is sampled independently from πt . The agent associates a reward R(y) with each outcome y ∈ Y, where the reward function R is fixed and known. Let Rt = R(Yt ) denote the reward realized at time t. Let Rθ (a) = E [R(Yt )|θ, At−1 = a]. Uncertainty about θ induces uncertainty about the true optimal action, which we denote by A∗ ∈ arg max Rθ (a). Let R∗ = Rθ (A∗ ). The T -period conditional regret when the a∈A actions (A0 , .., AT −1 ) are chosen according to π is defined by # " T X Regret(T, π, θ) = E (R∗ − Rt ) θ , (1) t=1 where the expectation is taken over the randomness in actions At and outcomes Yt , conditioned on θ. We illustrate with a couple of examples that fit our formulation. Example 1. (linear bandit) Let θ be drawn from ℜN and distributed according to a N (µ0 , Σ0 ) prior. There is a set of K actions A ⊆ ℜN . At each time t = 0, 1, . . . , T − 1, an action At ∈ A is 2 selected, after which a reward Rt+1 = Yt+1 = θ⊤ At +Wt+1 is observed, where Wt+1 ∼ N (0, σw ). Example 2. (neural network) Let gθ : ℜN 7→ ℜK denote a mapping induced by a neural network with weights θ. Suppose there are K actions A ⊆ ℜN , which serve as inputs to the neural network, and the goal is to select inputs that yield desirable outputs. At each time t = 0, 1, . . . , T − 1, an action At ∈ A is selected, after which Yt+1 = gθ (At ) + Wt+1 is observed, where Wt+1 ∼ 2 N (0, σw I). A reward Rt+1 = R(Yt+1 ) is associated with each observation. Let θ be distributed according to a N (µ0 , Σ0 ) prior. The idea here is that data pairs (At , Yt+1 ) can be used to fit a neural network model, while actions are selected to trade off between generating data pairs that reduce uncertainty in neural network weights and those that offer desirable immediate outcomes. 3 Algorithms Thompson sampling offers a heuristic policy for selecting actions. In each time period, the algorithm samples an action from the posterior distribution pt (a) = Pt (A∗ = a) of the optimal action. In other words, Thompson sampling uses a policy πt = pt . It is easy to see that this is equivalent to sampling a model index θ̂t from the posterior distribution of models and then selecting an action At = arg max Rθ̂t (a) that optimizes the sampled model. a∈A Thompson sampling is computationally tractable for some problem classes, like the linear bandit problem, where the posterior distribution is Gaussian with parameters (µt , Σt ) that can be updated incrementally and efficiently via Kalman filtering as outcomes are observed. However, when deal2 Algorithm 1 EnsembleSampling 1: Sample: θ̃0,1 , . . . , θ̃0,M ∼ p0 2: for t = 0, . . . , T − 1 do 3: Sample: m ∼ unif({1, . . . , M }) 4: Act: At = arg max Rθ̃t,m (a) a∈A 5: Observe: Yt+1 6: Update: θ̃t+1,1 , . . . , θ̃t+1,M 7: end for ing with complex models, like neural networks, computing the posterior distribution becomes intractable. Ensemble sampling serves as an approximation to Thompson sampling for such contexts. The posterior can be interpreted as a distribution of “statistically plausible” models, by which we mean models that are sufficiently consistent with prior beliefs and the history of observations. With this interpretation in mind, Thompson sampling can be thought of as randomly drawing from the range of statistically plausible models. Ensemble sampling aims to maintain, incrementally update, and sample from a finite set of such models. In the spirit of particle filtering, this set of models approximates the posterior distribution. The workings of ensemble sampling are in some ways more intricate than conventional uses of particle filtering, however, because interactions between the ensemble of models and selected actions can skew the distribution. While elements of ensemble sampling require customization, a general template is presented as Algorithm 1. The algorithm begins by sampling M models from the prior distribution. Then, over each time period, a model is sampled uniformly from the ensemble, an action is selected to maximize expected reward under the sampled model, the resulting outcome is observed, and each of the M models is updated. To produce an explicit algorithm, we must specify a model class, prior distribution, and algorithms for sampling from the prior and updating models. For a concrete illustration, let us consider the linear bandit (Example 1). Though ensemble sampling is unwarranted in this case, since Thompson sampling is efficient, the linear bandit serves as a useful context for understanding the approach. Standard algorithms can be used to sample models from the N (µ0 , Σ0 ) prior. One possible procedure for updating models maintains a covariance matrix, updating it according to  ⊤ 2 −1 , Σt+1 = Σ−1 t + At At /σw and generates model parameters incrementally according to   2 θ̃t+1,m = Σt+1 Σ−1 t θ̃t,m + At (Rt+1 + W̃t+1,m )/σw , 2 for m = 1, . . . , M , where (W̃t,m : t = 1, . . . , T, m = 1, . . . , M ) are independent N (0, σw ) random samples drawn by the updating algorithm. It is easy to show that the resulting parameter vectors satisfy ! t−1 1 X ⊤ 2 ⊤ −1 θ̃t,m = arg min (Rτ +1 + W̃τ +1,m − Aτ ν) + (ν − θ̃0,m ) Σ0 (ν − θ̃0,m ) , 2 σw ν τ =0 which admits an intuitive interpretation: each θ̃t,m is a model fit to a randomly perturbed prior and randomly perturbed observations. As we establish in the appendix, for any deterministic sequence A0 , . . . , At−1 , conditioned on Ft , the models θ̃t,1 , . . . , θ̃t,M are independent and identically distributed according to the posterior distribution of θ. In this sense, the ensemble approximates the posterior. It is not a new observation that, for deterministic action sequences, such a scheme generates exact samples of the posterior distribution (see, e.g., [7]). However, for stochastic action sequences selected by Algorithm 1, it is not immediately clear how well the ensemble approximates the posterior distribution. We will provide a bound in the next section which establishes that, as the number of models M increases, the regret of ensemble sampling quickly approaches that of Thompson sampling. 3 The ensemble sampling algorithm we have described for the linear bandit problem motivates an analogous approach for the neural network model of Example 2. This approach would again begin with M models, with connection weights θ̃0,1 , . . . , θ̃0,M sampled from a N (µ0 , Σ0 ) prior. It could be natural here to let µ0 = 0 and Σ0 = σ02 I for some variance σ02 chosen so that the range of probable models spans plausible outcomes. To incrementally update parameters, at each time t, each model m applies some number of stochastic gradient descent iterations to reduce a loss function of the form t−1 1 X Lt (ν) = 2 (Yτ +1 + W̃τ +1,m − gν (Aτ ))2 + (ν − θ̃0,m )⊤ Σ−1 0 (ν − θ̃0,m ). σw τ =0 We present computational results in Section 5.2 that demonstrate viability of this approach. 4 Analysis of ensemble sampling for the linear bandit Past analyses of Thompson sampling have relied on independence between models sampled over time periods. Ensemble sampling introduces dependencies that may adversely impact performance. It is not immediately clear whether the degree of degradation should be tolerable and how that depends on the number of models in the ensemble. In this section, we establish a bound for the linear bandit context. Our result serves as a sanity check for ensemble sampling and offers insight that should extend to broader model classes, though we leave formal analysis beyond the linear bandit for future work. Consider the linear bandit problem described in Example 1. Let π TS and π ES denote the Thompson and ensemble sampling policies for this problem, with the latter based on an ensemble of M models, generated and updated according to the procedure described in Section 3. Let R∗ = mina∈A θ⊤ a denote the worst mean reward and let ∆(θ) = R∗ − R∗ denote the gap between maximal and minimal mean rewards. The following result bounds the difference in regret as a function of the gap, ensemble size, and number of actions. Theorem 3. For all ǫ > 0, if M≥ then 4|A|T 4|A| log , 2 ǫ ǫ3 Regret(T, π ES , θ) ≤ Regret(T, π TS , θ) + ǫ∆(θ)T. This inequality bounds the regret realized by ensemble sampling by a sum of the regret realized by Thompson sampling and an error term ǫ∆(θ)T . Since we are talking about cumulative regret, the error term bounds the per-period degradation relative to Thompson sampling by ǫ∆(θ). The value of ǫ can be made arbitrarily small by increasing M . Hence, with a sufficiently large ensemble, the per-period loss will be small. This supports the viability of ensemble sampling. An important implication of this result is that it suffices for the ensemble size to grow logarithmically in the horizon T . Since Thompson sampling requires independence between models sampled over time, in a sense, it relies on T models – one per time period. So to be useful, ensemble sampling should operate effectively with a much smaller number, and the logarithmic dependence is suitable. The bound also grows with |A| log |A|, which is manageable when there are a modest number of actions. We conjecture that a similar bound holds that depends instead on a multiple of N log N , where N is the linear dimension, which would offer a stronger guarantee when the number of actions becomes large or infinite, though we leave proof of this alternative bound for future work. The bound of Theorem 3 is on a notion of regret conditioned on the realization of θ. A Bayesian regret bound that removes dependence on this realization can be obtained by taking an expectation, integrating over θ:     E Regret(T, π ES , θ) ≤ E Regret(T, π TS , θ) + ǫE [∆(θ)] T. We provide a complete proof of Theorem 3 in the appendix. Due to space constraints, we only offer a sketch here. Sketch of Proof. Let A denote an Ft -adapted action process (A0 , . . . , AT −1 ). Our procedure for generating and updating models with ensemble sampling is designed so that, for any deterministic 4 A, conditioned on the history of rewards (R1 , . . . , Rt ), models θ̃t,1 , . . . , θ̃t,M that comprise the ensemble are independent and identically distributed according to the posterior distribution of θ. This can be verified via some algebra, as is done in the appendix. Recall that pt (a) denotes the posterior probability Pt (A∗ = a) = P (A∗ = a|A0 , R1 , . . . , At−1 , Rt ). To explicitly indicate dependence on the action process, we will use a superscript: pt (a) = pA t (a).   P M 1 A A A ⊤ Let p̂t denote an approximation to pt , given by p̂t (a) = M m=1 I a = arg maxa′ θ̃t,m a′ . Note that given an action process A, at time t Thompson sampling would sample the next action A from pA t , while ensemble sampling would sample the next action from p̂t . If A is deterministic then, since θ̃t,1 , . . . , θ̃t,M , conditioned on the history of rewards, are i.i.d. and distributed as θ, p̂A t represents an empirical distribution of samples drawn from pA t . It follows from this and Sanov’s Theorem that, for any deterministic A,  A |A| −Mǫ P dKL (p̂A e . t kpt ) ≥ ǫ|θ ≤ (M + 1) A naive application of the union bound over all deterministic action sequences would establish that, for any A (deterministic or stochastic),    A a a kp ) ≥ ǫ θ ≤ |A|t (M + 1)|A| e−Mǫ ) ≥ ǫ|θ ≤ P max d (p̂ P dKL (p̂A kp KL t t t t t a∈A A However, our proof takes advantage of the fact that, for any deterministic A, pA t and p̂t do not depend on the ordering of past actions and observations. To make it precise, we encode the sequence of actions in terms of action counts c0 , . . . , cT −1 . In particular, let ct,a = |{τ ≤ t : Aτ = a}| be the number of times that action a has been selected by time t. We apply a coupling argument that introduces dependencies between the noise terms Wt and action counts, without changing the distributions of any observable variables. We let (Zn,a : n ∈ N, a ∈ A) be i.i.d. N (0, 1) random variables, and let Wt+1 = Zct,At ,At . Similarly, we let (Z̃n,a,m : n ∈ N, a ∈ A, m = 1, . . . , M ) be i.i.d N (0, 1) random variables, and let W̃t+1,m = Z̃ct,At ,At ,m . To make explicit the dependence on A, we will use a superscript and write cA t to denote the action counts at time t when the action process is given by A. It is not hard to verify, as is done in the appendix, that if a, a ∈ AT are two deterministic action sequences such that cat−1 = cat−1 , then pat = pat and p̂at = p̂at . This allows us to apply the union bound over action counts, instead of action sequences, and we get that for any A (deterministic or stochastic), !  A A a a P dKL (p̂t kpt ) ≥ ǫ|θ ≤ P a max t dKL (p̂t kpt ) ≥ ǫ θ ≤ (t + 1)|A| (M + 1)|A| e−Mǫ . ct−1 :a∈A Now, we specialize the action process A to the action sequence At = AES t selected by ensemble A sampling, and we will omit the superscripts in pA and p̂ . We can decompose the per-period regret t t of ensemble sampling as     E R∗ − θ⊤ At |θ = E (R∗ − θ⊤ At )I (dKL (p̂t kpt ) ≥ ǫ) |θ   + E (R∗ − θ⊤ At )I (dKL (p̂t kpt ) < ǫ) |θ . (2) The first term can be bounded by   E (R∗ − θ⊤ At )I (dKL (p̂t kpt ) ≥ ǫ) |θ ≤ ≤ ∆(θ)P (dKL (p̂t kpt ) ≥ ǫ|θ) ∆(θ)(t + 1)|A| (M + 1)|A| e−Mǫ . To bound the second term, we will use another coupling argument that couples the actions that would be selected by ensemble sampling with those that would be selected by Thompson sampling. Let ATS denote the action√that Thompson sampling would select at time t. On {dKL (p̂t kpt ) ≤ ǫ}, we t have kp̂t − pt kTV ≤ 2ǫ by Pinsker’s inequality. Conditioning on p̂t and pt , if dKL (p̂t kpt ) ≤ ǫ, TS ES we can construct random variables ÃES t and Ãt such that they have the same distributions as At ES TS and ATS t , respectively. Using maximal coupling, we can make Ãt = Ãt with probability at least 5 p 1 − 21 kp̂t − pt kTV ≥ 1 − ǫ/2. Then, the second term of the sum in (2) can be decomposed into   E (R∗ − θ⊤ At )I (dKL (p̂t kpt ) ≤ ǫ) |θ h h   i i ES TS = E E (R∗ − θ⊤ ÃES p̂t , pt , θ θ t )I dKL (p̂t kpt ) ≤ ǫ, Ãt = Ãt  i i h h  ES TS p̂ , p , θ θ , +E E (R∗ − θ⊤ ÃES )I d (p̂ kp ) ≤ ǫ, Ã = 6 Ã t t KL t t t t t which, after some algebraic manipulations, leads to     p ǫ/2 ∆(θ). E (R∗ − θ⊤ At )I (dKL (p̂t kpt ) < ǫ) |θ ≤ E R∗ − θ⊤ ATS t |θ + The result then follows from some straightforward algebra. 5 Computational results In this section, we present computational results that demonstrate viability of ensemble sampling. We will start with a simple case of independent Gaussian bandits in Section 5.1 and move on to more complex models of neural networks in Section 5.2. Section 5.1 serves as a sanity check for the empirical performance of ensemble sampling, as Thompson sampling can be efficiently applied in this case and we are able to compare the performances of these two algorithms. In addition, we provide simulation results that demonstrate how the ensemble size grows with the number of actions. Section 5.2 goes beyond our theoretical analysis in Section 4 and gives computational evidence of the efficacy of ensemble sampling when applied to more complex models such as neural networks. We show that ensemble sampling, even with a few models, achieves efficient learning and outperforms ǫ-greedy and dropout on the example neural networks. 5.1 Gaussian bandits with independent arms We consider a Gaussian bandit with K actions, where action k has mean reward θk . Each θk is drawn i.i.d. from N (0, 1). During each time step t = 0, . . . , T − 1, we select an action k ∈ {1, . . . , K} and observe reward Rt+1 = θk + Wt+1 , where Wt+1 ∼ N (0, 1). Note that this is a special case of Example 1. Since the posterior distribution of θ can be explicitly computed in this case, we use it as a sanity check for the performance of ensemble sampling. Figure 1a shows the per-period regret of Thompson sampling and ensemble sampling applied to a Gaussian bandit with 50 independent arms. We see that as the number of models increases, ensemble sampling better approximates Thompson sampling. The results were averaged over 2,000 realizations. Figure 1b shows the minimum number of models required so that the expected per-period regret of ensemble sampling is no more than ǫ plus the expected per-period regret of Thompson sampling at some large time horizon T across different numbers of actions. All results are averaged over 10,000 realizations. We chose T = 2000 and ǫ = 0.03. The plot shows that the number of models needed seems to grow sublinearly with the number of actions, which is stronger than the bound proved in Section 4. 5.2 Neural networks In this section, we follow Example 2 and show computational results of ensemble sampling applied to neural networks. Figure 2 shows ǫ-greedy and ensemble sampling applied to a bandit problem where the mapping from actions to expected rewards is represented by a neuron. More specifically, we have a set of K actions A ⊆ ℜN . The mean reward of selecting an action a ∈ A is given by gθ (a) = max(0, θ⊤ a), where weights θ ∈ ℜN are drawn from N (0, λI). During each time period, we select an action At ∈ A and observe reward Rt+1 = gθ (At ) + Zt+1 , where Zt+1 ∼ N (0, σz2 ). We set the input dimension N = 100, number of actions K = 100, prior variance λ = 10, and noise variance σz2 = 100. Each dimension of each action was sampled uniformly from [−1, 1], except for the last dimension, which was set to 1. In Figure 3, we consider a bandit problem where the mapping from actions to expected rewards is represented by a two-layer neural network with weights θ ≡ (W1 , W2 ), where W1 ∈ ℜD×N and W2 ∈ ℜD . Each entry of the weight matrices is drawn independently from N (0, λ). There is a set of K actions A ⊆ ℜN . The mean reward of choosing an action a ∈ A is gθ (a) = W2⊤ max(0, W1 a). 6 Ensemble sampling on an independent Gaussian bandit with 50 arms 80 Number of models 2.0 Per-period regret Ensemble sampling on independent Gaussian bandits 100 Thompson sampling 5 models 10 models 20 models 30 models 1.5 1.0 0.5 0.0 60 40 20 0 100 200 300 400 t 500 600 0 700 (a) 0 25 50 75 100 125 Number of actions 150 175 200 (b) Figure 1: (a) Ensemble sampling compared with Thompson sampling on a Gaussian bandit with 50 independent arms. (b) Minimum number of models required so that the expected per-period regret of ensemble sampling is no more than ǫ = 0.03 plus the expected per-period regret of Thompson sampling at T = 2000 for Gaussian bandits across different numbers of arms. During each time period, we select an action At ∈ A and observe reward Rt+1 = gθ (At ) + Zt+1 , where Zt+1 ∼ N (0, σz2 ). We used N = 100 for the input dimension, D = 50 for the dimension of the hidden layer, number of actions K = 100, prior variance λ = 1, and noise variance σz2 = 100. Each dimension of each action was sampled uniformly from [−1, 1], except for the last dimension, which was set to 1. Ensemble sampling with M models starts by sampling θ̃m from the prior distribution independently for each model m. At each time step, we pick a model m uniformly at random and apply the greedy action with respect to that model. We update the ensemble incrementally. During each time period, we apply a few steps of stochastic gradient descent for each model m with respect to the loss function Lt (θ) = t−1 1 X 1 (Rτ +1 + Z̃τ +1,m − gθ (Aτ ))2 + kθ − θ̃m k22 , 2 σz τ =0 λ where perturbations (Z̃t,m : t = 1, . . . , T, m = 1, . . . , M ) are drawn i.i.d. from N (0, σz2 ). Besides ensemble sampling, there are other heuristics for sampling from an approximate posterior distribution over neural networks, which may be used to develop approximate Thompson sampling. Gal and Ghahramani proposed an approach based on dropout [4] to approximately sample from a posterior over neural networks. In Figure 3, we include results from using dropout to approximate Thompson sampling on the two-layer neural network bandit. To facilitate gradient flow, we used leaky ReLUs of the form max(0.01x, x) internally in all agents, while the target neural nets still use regular ReLUs as described above. We took 3 stochastic gradient steps with a minibatch size of 64 for each model update. We used a learning rate of 1e-1 for ǫgreedy and ensemble sampling, and a learning rate of 1e-2, 1e-2, 2e-2, and 5e-2 for dropout with dropping probabilities 0.25, 0.5, 0.75, and 0.9 respectively. All results were averaged over around 1,000 realizations. Figure 2 plots the per-period regret of ǫ-greedy and ensemble sampling on the single neuron bandit. We see that ensemble sampling, even with 10 models, performs better than ǫ-greedy with the best tuned parameters. Increasing the size of the ensemble further improves the performance. An ensemble of size 50 achieves orders of magnitude lower regret than ǫ-greedy. Figure 3a and 3b show different versions of ǫ-greedy applied to the two-layer neural network model. We see that ǫ-greedy with an annealing schedule tends to perform better than a fixed ǫ. Figure 3c plots the per-period regret of the dropout approach with different dropping probabilities, which seems to perform worse than ǫ-greedy. Figure 3d plots the per-period regret of ensemble sampling on the neural net bandit. Again, we see that ensemble sampling, with a moderate number of models, outperforms the other approaches by a significant amount. 7 (a) Epsilon-greedy 40 (b) Ensemble sampling agent name epsilon=0.05 instant regret 30 epsilon=0.1 epsilon=0.2 epsilon=50/(50+t) 20 epsilon=150/(150+t) epsilon=300/(300+t) ensemble=5 10 ensemble=10 ensemble=30 ensemble=50 0 0 500 1000 1500 2000 t 0 500 1000 1500 2000 Figure 2: (a) ǫ-greedy and (b) ensemble sampling applied to a single neuron bandit. (a) Fixed epsilon (b) Annealing epsilon 60 agent name 40 epsilon=0.05 epsilon=0.1 epsilon=0.2 epsilon=0.3 epsilon=10/(10+t) epsilon=30/(30+t) epsilon=50/(50+t) epsilon=70/(70+t) dropout=0.25 dropout=0.5 dropout=0.75 dropout=0.9 ensemble=5 ensemble=10 ensemble=30 ensemble=50 instant regret 20 0 (c) Dropout (d) Ensemble sampling 60 40 20 0 0 100 200 300 400 500 t 0 100 200 300 400 500 Figure 3: (a) Fixed ǫ-greedy, (b) annealing ǫ-greedy, (c) dropout, and (d) ensemble sampling applied to a two-layer neural network bandit. 6 Conclusion Ensemble sampling offers a potentially efficient means to approximate Thompson sampling when using complex models such as neural networks. We have provided an analysis that offers theoretical assurances for the case of linear bandit models and computational results that demonstrate efficacy with complex neural network models. We are motivated largely by the need for effective exploration methods that can efficiently be applied in conjunction with complex models such as neural networks. Ensemble sampling offers one approach to representing uncertainty in neural network models, and there are others that might also be brought to bear in developing approximate versions of Thompson sampling [1, 4]. The analysis of various other forms of approximate Thompson sampling remains open. Ensemble sampling loosely relates to ensemble learning methods [3], though an important difference in motivation lies in the fact that the latter learns multiple models for the purpose of generating a more accurate model through their combination, while the former learns multiple models to reflect uncertainty in the posterior distribution over models. That said, combining the two related approaches may be fruitful. In particular, there may be practical benefit to learning many forms 8 of models (neural networks, tree-based models, etc.) and viewing the ensemble as representing uncertainty from which one can sample. Acknowledgments This work was generously supported by a research grant from Boeing and a Marketing Research Award from Adobe. References [1] Charles Blundell, Julien Cornebise, Koray Kavukcuoglu, and Daan Wierstra. Weight uncertainty in neural networks. In Proceedings of the 32Nd International Conference on International Conference on Machine Learning - Volume 37, ICML’15, pages 1613–1622. JMLR.org, 2015. [2] Olivier Chapelle and Lihong Li. An empirical evaluation of Thompson sampling. In J. ShaweTaylor, R. S. Zemel, P. L. Bartlett, F. Pereira, and K. Q. Weinberger, editors, Advances in Neural Information Processing Systems 24, pages 2249–2257. Curran Associates, Inc., 2011. [3] Thomas G Dietterich. Ensemble learning. The handbook of brain theory and neural networks, 2:110–125, 2002. [4] Yarin Gal and Zoubin Ghahramani. Dropout as a Bayesian approximation: Representing model uncertainty in deep learning. In Maria Florina Balcan and Kilian Q. Weinberger, editors, Proceedings of The 33rd International Conference on Machine Learning, volume 48 of Proceedings of Machine Learning Research, pages 1050–1059, New York, New York, USA, 20–22 Jun 2016. PMLR. [5] Carlos Gómez-Uribe. Online algorithms for parameter mean and variance estimation in dynamic regression. arXiv preprint arXiv:1605.05697v1, 2016. [6] Ian Osband, Charles Blundell, Alexander Pritzel, and Benjamin Van Roy. Deep exploration via bootstrapped DQN. In D. D. Lee, M. Sugiyama, U. V. Luxburg, I. Guyon, and R. Garnett, editors, Advances in Neural Information Processing Systems 29, pages 4026–4034. Curran Associates, Inc., 2016. [7] George Papandreou and Alan L Yuille. Gaussian sampling by local perturbations. In J. D. Lafferty, C. K. I. Williams, J. Shawe-Taylor, R. S. Zemel, and A. Culotta, editors, Advances in Neural Information Processing Systems 23, pages 1858–1866. Curran Associates, Inc., 2010. [8] W.R. Thompson. On the likelihood that one unknown probability exceeds another in view of the evidence of two samples. Biometrika, 25(3/4):285–294, 1933. A Proof of Theorem 3 2 = 1. Recall from Section 3 the procedure for generWithout loss of generality, assume that σw ating and updating models with ensemble sampling. First, θ̃0,1 , . . . , θ̃0,M are sampled i.i.d. from N (µ0 , Σ0 ). Then, these vectors are adapted according to θ̃t,m = arg min ν t−1 X (Rτ +1 + W̃τ +1,m − τ =0 2 A⊤ τ ν) ⊤ + (ν − θ̃0,m ) Σ−1 0 (ν ! − θ̃0,m ) . Note that we have not yet specified how actions are selected. In the formulation we have put forth, each At could be any Ft -measureable random variable. We will denote by A the Ft -adapted process (A0 , . . . , AT −1 ). We say A is deterministic if there exist a0 , . . . , aT −1 ∈ A such that At = at for t = 0, . . . , T − 1 with probability one. Lemma 4. If A is deterministic, then, conditioned on (R1 , . . . , Rt ), θ̃t,1 , · · · , θ̃t,M are i.i.d. N (µt , Σt ) random variables, where µt = E[θ|Ft ] and Σt = E[(θ − µt )(θ − µt )⊤ |Ft ]. 9 Proof. Say A = (a0 , . . . , aT −1 ), where a0 , . . . , aT −1 ∈ A. Let X be an t × N matrix with the j th row equal to aj−1 . Let y = (R1 , . . . , Rt )⊤ . Then, ! t−1 X ⊤ 2 ⊤ −1 (Rτ +1 − aτ ν) + (ν − µ0 ) Σ0 (ν − µ0 ) µt = arg min ν τ =0 = X X + Σ−1 0 ⊤ and −1  X ⊤ y + Σ−1 0 µ0 , Σt = X ⊤ X + Σ−1 0 For any m = 1, . . . , M , we have θ̃t,m = arg min ν t−1 X (Rτ +1 + W̃τ +1,m − τ =0 = X ⊤ X + Σ−1 0 −1 2 a⊤ τ ν) . ⊤ + (ν − θ̃0,m ) Σ−1 0 (ν ! − θ̃0,m )  −1  ⊤ X (y + W̃m ) + Σ−1 0 θ̃0,m , where W̃m = (W̃1,m , . . . , W̃t,m )⊤ . We first observe that, conditioned on y, θ̃t,m follows a normal distribution, since it is affine in θ̃0,m and W̃m . Next, we check its mean and covariance. Since W̃m and θ̃0,m are independently sampled, we have h i h h i i −1  ⊤  y + E W̃m y + Σ−1 X E θ̃t,m y = X ⊤ X + Σ0−1 = µt , 0 E θ̃0,m y and h i i −1  ⊤ h ⊤ X E W̃m W̃m Cov θ̃t,m y = X ⊤ X + Σ0−1 y X  h i −1 −1 ⊤ = Σt . X ⊤ X + Σ−1 + Σ−1 E ( θ̃ − µ )( θ̃ − µ ) y Σ 0,m 0 0,m 0 0 0 0 Therefore, if A is deterministic, then for each m = 1, . . . , M , θ̃t,m is a N (µt , Σt ) random variable conditioned on (R1 , . . . , Rt ). Further, since W̃m and θ̃0,m , m = 1, . . . , M are all independent, θ̃t,1 , . . . , θ̃t,M are independent. Recall that pt (a) denotes the posterior probability Pt (A∗ = a) = P (A∗ = a|A0 , R1 , . . . , At−1 , Rt ). To explicitly indicate dependence on the action process, we will use a superscript: pt (a) = pA t (a).   P M 1 ⊤ A A A Let p̂t denote an approximation to pt , given by p̂t (a) = M m=1 I a = arg maxa′ θ̃t,m a′ . Note that given an action process A, at time t Thompson sampling would sample the next action A from pA t , while ensemble sampling would sample the next action from p̂t . The following lemma shows that for any deterministic action sequence, conditioned on θ, the action distribution that ensemble sampling would sample from is close to the action distribution that Thompson sampling would sample from with high probability. Lemma 5. For any deterministic action sequence a ∈ AT , P (dKL (p̂at kpat ) ≥ ǫ | θ) ≤ (M + 1)|A| e−Mǫ . Proof. If a ∈ AT is deterministic, then conditioned on (R1 , . . . , Rt ), p̂at and pat are independent of θ. Thus, we have P (dKL (p̂at kpat ) ≥ ǫ | θ) = E [E [I (dKL (p̂at kpat ) ≥ ǫ) |R1 , . . . , Rt ] | θ] . By Lemma 4, θ̃t,1 , . . . , θ̃t,M , conditioned on (R1 , . . . , Rt ), are i.i.d. and distributed as the posterior of θ. Thus, p̂at represents an empirical distribution of samples drawn from pat . Sanov’s Theorem then implies that P (dKL (p̂at kpat ) ≥ ǫ|R1 , . . . , Rt ) ≤ (M + 1)|A| e−Mǫ . The result follows. Next, we will establish results for any Ft -adapted action process A, deterministic or stochastic. To do so, it is useful to introduce the notion of action counts. One way of encoding the sequence of 10 actions is in terms of counts c0 , . . . , cT −1 . In particular, let ct,a = |{τ ≤ t : Aτ = a}| be the number of times that action a has been selected by time t. Each ct takes values in a set ( ) X |A| Ct = c ∈ N : ca = t + 1 . a∈A Since ct has |A| components, and each component takes a value in {0, . . . , t + 1}, we have |Ct | ≤ (t + 2)|A| . Sometimes, we use a superscript and write cA t to explicitly denote the dependence on action process A. We now introduce dependencies between the noise terms Wt and action counts, without changing the distributions of any observable variables. This will turn out to be useful when we take the union bound later. We let (Zn,a : n ∈ N, a ∈ A) be i.i.d. N (0, 1) random variables, and let Wt+1 = Zct,At ,At . Similarly, we let (Z̃n,a,m : n ∈ N, a ∈ A, m = 1, . . . , M ) be i.i.d N (0, 1) random variables, and let W̃t+1,m = Z̃ct,At ,At ,m . The following lemma establishes that, for any deterministic action sequence a ∈ AT , pat and p̂at depend on a only through its action counts, cat−1 ; in other words, pat and p̂at do not depend on the ordering of past actions and observations. Lemma 6. For any t = 0, . . . , T −1, if a, a ∈ AT are deterministic sequences such that cat−1 = cat−1 , then pat = pat and p̂at = p̂at . Proof. Recall that Rτ +1 = θ⊤ Aτ + Wτ +1 , where Wτ +1 = Zcτ,Aτ ,Aτ . This means that we observe the same reward the first time we take an action, regardless of where that action appears in the action sequence. Similarly, for all action sequences, we observe the same reward the second time we take that action, and so on. Therefore, if cat−1 = cat−1 , we have µat = µat and Σat = Σat , which implies that pat = pat . By the same reasoning, since W̃τ +1,m = Z̃cτ,Aτ ,Aτ ,m for all τ and m, both action sequences would yield the same model parameters, and it follows that p̂at = p̂at . Lemma 7. For any Ft -adapted process A,  A |A| P dKL (p̂A (M + 1)|A| e−Mǫ . t kpt ) > ǫ | θ ≤ (t + 1) Proof. We have P A dKL (p̂A t kpt ) > ǫ|θ  ≤ (a) = (b) ≤ (c) ≤ P  max a∈AT dKL (p̂at kpat ) max P T ca t−1 :a∈A X T ca t−1 :a∈A >ǫ θ dKL (p̂at kpat )  >ǫ θ ! P (dKL (p̂at kpat ) > ǫ | θ) (t + 1)|A| (M + 1)|A| e−Mǫ , where (a) follows from Lemma 6, (b) follows from the union bound, and (c) follows from Lemma 5 and the fact that the total number of counts |Ct−1 | ≤ (t + 1)|A| . Now, we specialize the action process A to the action sequence At = AES t selected by ensemble A sampling, and we will omit the superscripts in pA t and p̂t . 11 The expected cumulative regret of ensemble sampling conditioned on θ can be decomposed as Regret(T, π ES , θ) = T −1 X t=0 =   E R∗ − θ⊤ AES t |θ T −1  X t=0   E (R∗ − θ⊤ AES t )I (dKL (p̂t kpt ) > ǫ) |θ   . + E (R∗ − θ⊤ AES t )I (dKL (p̂t kpt ) ≤ ǫ) |θ We will bound the per-period regret for the case where the divergence dKL (p̂t kpt ) is large and the case where the divergence is small, respectively. Lemma 8. For any t = 0, . . . , T − 1,   |A| E (R∗ − θ⊤ AES (M + 1)|A| e−Mǫ ∆(θ). t )I (dKL (p̂t kpt ) > ǫ) |θ ≤ (t + 1) Proof. This follows directly from the definition of ∆(θ) and Lemma 7. Assumption 9. For simplicity, assume 0 < ǫ < 1 and 0 < δ < 1 are such that |A|T ǫδ ≥ 9. Lemma 10. If the size of the ensemble satisfies M≥ then T −1 X t=0 |A|T 2|A| log , ǫ ǫδ   E (R∗ − θ⊤ AES t )I (dKL (p̂t kpt ) > ǫ) |θ ≤ δ∆(θ)T. Proof. We show that if M satisfies the condition above, then T |A| (M + 1)|A| e−Mǫ ≤ δ, or, equivalently, 1 |A| log(M + 1) ≥ M− ǫ ǫ We have   1 |A| log T + log . δ   |A| 1 1 M− |A| log T + log log(M + 1) − ǫ ǫ δ   2|A| |A| |A|T |A| |A|T T 4|A| ≥ − log − log log log ǫ ǫδ ǫ ǫ ǫδ ǫ δ     |A| |A|T |A| |A|T 4|A| |A| − log · log log = ǫ ǫ ǫδ ǫ ǫ ǫδ ≥ 0, since Assumption 9 implies that |A|T ǫδ ≥ 4 log |A|T ǫδ . The result then follows from Lemma 8. Lemma 11. Let π TS denote the Thompson sampling policy. We have T −1 X t=0 p   TS E (R∗ − θ⊤ AES , θ) + ǫ/2 ∆(θ)T. t )I (dKL (p̂t kpt ) ≤ ǫ) |θ ≤ Regret(T, π Proof. We apply a coupling argument that couples the actions that would be selected by ensemble sampling with those that would be selected by Thompson sampling. Let ATS t denote the action that Thompson sampling would select at time t. On {dKL (p̂t kpt ) ≤ ǫ}, Pinsker’s inequality implies that √ kp̂t − pt kTV ≤ 2ǫ. 12 TS Conditioning on p̂t and pt , if dKL (p̂t kpt ) ≤ ǫ, we construct random variables ÃES such t and Ãt ES TS that they have the same distribution as At and At , respectively. Using maximal coupling, we can p 1 TS make ÃES = Ã with probability at least 1 − kp̂ − p k ≥ 1 − ǫ/2. Then, t t TV t t 2  ∗  ⊤ ES E (R − θ At )I (dKL (p̂t kpt ) ≤ ǫ) |θ     = E E (R∗ − θ⊤ AES t )I (dKL (p̂t kpt ) ≤ ǫ) p̂t , pt , θ θ h h i i = E E (R∗ − θ⊤ ÃES t )I (dKL (p̂t kpt ) ≤ ǫ) p̂t , pt , θ θ  i i h h  ES TS p̂t , pt , θ θ = E E (R∗ − θ⊤ ÃES t )I dKL (p̂t kpt ) ≤ ǫ, Ãt = Ãt  i i h h  ES TS p̂t , pt , θ θ +E E (R∗ − θ⊤ ÃES t )I dKL (p̂t kpt ) ≤ ǫ, Ãt 6= Ãt On the first part of the sum, we have i h h   ES TS p̂t , pt , θ E E (R∗ − θ⊤ ÃES t )I dKL (p̂t kpt ) ≤ ǫ, Ãt = Ãt  i h h  ES TS p̂ , p , θ = Ã = E E (R∗ − θ⊤ ÃTS )I d (p̂ kp ) ≤ ǫ, Ã t t KL t t t t t h h i i ∗ ⊤ TS ≤ E E (R − θ Ãt ) p̂t , pt , θ θ     = E E (R∗ − θ⊤ ATS t ) p̂t , pt , θ θ   = E R∗ − θ⊤ ATS t |θ , θ θ i i where the inequality follows from the nonnegativity of R∗ − θ⊤ ÃTS t . On the second part of the sum, we have  i i h h  ES TS p̂ , p , θ E E (R∗ − θ⊤ ÃES )I d (p̂ kp ) ≤ ǫ, Ã = 6 Ã θ t t KL t t t t t h h   i i TS ≤ E E (R∗ − R∗ )I dKL (p̂t kpt ) ≤ ǫ, ÃES p̂t , pt , θ θ t 6= Ãt  i i h h  TS p̂ , p , θ θ = ∆(θ)E E I dKL (p̂t kpt ) ≤ ǫ, ÃES = 6 Ã t t t t p ǫ/2 ∆(θ), ≤ ES where the last inequality follows from the way we couple ÃES t and Ãt . Thus, the result follows. Combining Lemma 10 and Lemma 11 delivers a proof for our main result. In particular, we have Regret(T, π ES , θ) = T −1 X t=0 +    2 E (θ⊤ A∗ − θ⊤ AES t )I dKL (p̂t kpt ) > ǫ /2 |θ T −1 X t=0 ≤ =    2 E (θ⊤ A∗ − θ⊤ AES t )I dKL (p̂t kpt ) ≤ ǫ /2 |θ 1 1 ǫ∆(θ)T + Regret(T, π TS , θ) + ǫ∆(θ)T 2 2 Regret(T, π TS , θ) + ǫ∆(θ)T, where the inequality follows from Lemma 10, with δ = ǫ/2, and Lemma 11. 13
2cs.AI
Published as a conference paper at ICLR 2017 D EEP B IAFFINE ATTENTION FOR N EURAL D EPENDENCY PARSING Christopher D. Manning Stanford University [email protected] arXiv:1611.01734v3 [cs.CL] 10 Mar 2017 Timothy Dozat Stanford University [email protected] A BSTRACT This paper builds off recent work from Kiperwasser & Goldberg (2016) using neural attention in a simple graph-based dependency parser. We use a larger but more thoroughly regularized parser than other recent BiLSTM-based approaches, with biaffine classifiers to predict arcs and labels. Our parser gets state of the art or near state of the art performance on standard treebanks for six different languages, achieving 95.7% UAS and 94.1% LAS on the most popular English PTB dataset. This makes it the highest-performing graph-based parser on this benchmark— outperforming Kiperwasser & Goldberg (2016) by 1.8% and 2.2%—and comparable to the highest performing transition-based parser (Kuncoro et al., 2016), which achieves 95.8% UAS and 94.6% LAS. We also show which hyperparameter choices had a significant effect on parsing accuracy, allowing us to achieve large gains over other graph-based approaches. 1 I NTRODUCTION Dependency parsers—which annotate sentences in a way designed to be easy for humans and computers alike to understand—have been found to be extremely useful for a sizable number of NLP tasks, especially those involving natural language understanding in some way (Bowman et al., 2016; Angeli et al., 2015; Levy & Goldberg, 2014; Toutanova et al., 2016; Parikh et al., 2015). However, frequent incorrect parses can severely inhibit final performance, so improving the quality of dependency parsers is needed for the improvement and success of these downstream tasks. The current state-of-the-art transition-based neural dependency parser (Kuncoro et al., 2016) substantially outperforms many much simpler neural graph-based parsers. We modify the neural graphbased approach first proposed by Kiperwasser & Goldberg (2016) in a few ways to achieve competitive performance: we build a network that’s larger but uses more regularization; we replace the traditional MLP-based attention mechanism and affine label classifier with biaffine ones; and rather than using the top recurrent states of the LSTM in the biaffine transformations, we first put them through MLP operations that reduce their dimensionality. Furthermore, we compare models trained with different architectures and hyperparameters to motivate our approach empirically. The resulting parser maintains most of the simplicity of neural graph-based approaches while approaching the performance of the SOTA transition-based one. 2 BACKGROUND AND R ELATED WORK Transition-based parsers—such as shift-reduce parsers—parse sentences from left to right, maintaining a “buffer” of words that have not yet been parsed and a “stack” of words whose head has not been seen or whose dependents have not all been fully parsed. At each step, transition-based parsers can access and manipulate the stack and buffer and assign arcs from one word to another. One can then train any multi-class machine learning classifier on features extracted from the stack, buffer, and previous arc actions in order to predict the next action. Chen & Manning (2014) make the first successful attempt at incorporating deep learning into a transition-based dependency parser. At each step, the (feedforward) network assigns a probability to each action the parser can take based on word, tag, and label embeddings from certain words 1 Published as a conference paper at ICLR 2017 root nsubj dobj root/ROOT Casey/NNP hugged/VBD Kim/NNP Figure 1: A dependency tree parse for Casey hugged Kim, including part-of-speech tags and a special root token. Directed edges (or arcs) with labels (or relations) connect the verb to the root and the arguments to the verb head. on the stack and buffer. A number of other researchers have attempted to address some limitations of Chen & Manning’s Chen & Manning parser by augmenting it with additional complexity: Weiss et al. (2015) and Andor et al. (2016) augment it with a beam search and a conditional random field loss objective to allow the parser to “undo” previous actions once it finds evidence that they may have been incorrect; and Dyer et al. (2015) and (Kuncoro et al., 2016) instead use LSTMs to represent the stack and buffer, getting state-of-the-art performance by building in a way of composing parsed phrases together. Transition-based parsing processes a sentence sequentially to build up a parse tree one arc at a time. Consequently, these parsers don’t use machine learning for directly predicting edges; they use it for predicting the operations of the transition algorithm. Graph-based parsers, by contrast, use machine learning to assign a weight or probability to each possible edge and then construct a maximum spaning tree (MST) from these weighted edges. Kiperwasser & Goldberg (2016) present a neural graph-based parser (in addition to a transition-based one) that uses the same kind of attention mechanism as Bahdanau et al. (2014) for machine translation. In Kiperwasser & Goldberg’s 2016 model, the (bidirectional) LSTM’s recurrent output vector for each word is concatenated with each possible head’s recurrent vector, and the result is used as input to an MLP that scores each resulting arc. The predicted tree structure at training time is the one where each word depends on its highestscoring head. Labels are generated analogously, with each word’s recurrent output vector and its gold or predicted head word’s recurrent vector being used in a multi-class MLP. Similarly, Hashimoto et al. (2016) include a graph-based dependency parser in their multi-task neural model. In addition to training the model with multiple distinct objectives, they replace the traditional MLP-based attention mechanism that Kiperwasser & Goldberg (2016) use with a bilinear one (but still using an MLP label classifier). This makes it analogous to Luong et al.’s 2015 proposed attention mechanism for neural machine translation. Cheng et al. (2016) likewise propose a graph-based neural dependency parser, but in a way that attempts to circumvent the limitation of other neural graph-based parsers being unable to condition the scores of each possible arc on previous parsing decisions. In addition to having one bidirectional recurrent network that computes a recurrent hidden vector for each word, they have additional, unidirectional recurrent networks (leftto-right and right-to-left) that keep track of the probabilities of each previous arc, and use these together to predict the scores for the next arc. 3 3.1 P ROPOSED D EPENDENCY PARSER D EEP BIAFFINE ATTENTION We make a few modifications to the graph-based architectures of Kiperwasser & Goldberg (2016), Hashimoto et al. (2016), and Cheng et al. (2016), shown in Figure 2: we use biaffine attention instead of bilinear or traditional MLP-based attention; we use a biaffine dependency label classifier; and we apply dimension-reducing MLPs to each recurrent output vector ri before applying the biaffine transformation.1 The choice of biaffine rather than bilinear or MLP mechanisms makes the classifiers in our model analogous to traditional affine classifiers, which use an affine transformation over a single LSTM output state ri (or other vector input) to predict the vector of scores si for all classes (1). We can think of the proposed biaffine attention mechanism as being a traditional affine 1 In this paper we follow the convention of using lowercase italic letters for scalars and indices, lowercase bold letters for vectors, uppercase italic letters for matrices, uppercase bold letters for higher order tensors. We also maintain this notation when indexing; so row i of matrix R would be represented as ri . 2 Published as a conference paper at ICLR 2017 H (arc-dep) ⊕ 1 U (arc) H (arc-head) S (arc) ⊤ 1 1 · · = 1 1 (arc-dep) MLP: hi (arc-head) , hi ... BiLSTM: ri Embeddings: xi root ROOT Kim NNP Figure 2: BiLSTM with deep biaffine attention to score each possible head for each dependent, applied to the sentence “Casey hugged Kim”. We reverse the order of the biaffine transformation here for clarity. classifier, but using a (d × d) linear transformation of the stacked LSTM output RU (1) in place of the weight matrix W and a (d × 1) transformation Ru(2) for the bias term b (2). si = W ri + b Fixed-class affine classifier (1)     (arc) (2) (1) Variable-class biaffine classifier (2) ri + Ru = RU si In addition to being arguably simpler than the MLP-based approach (involving one bilinear layer rather than two linear layers and a nonlinearity), this has the conceptual advantage of directly mod(2) eling both the prior probability of a word j receiving any dependents in the term r⊤ and the j u ⊤ (1) likelihood of j receiving a specific dependent i in the term rj U ri . Analogously, we also use a biaffine classifier to predict dependency labels given the gold or predicted head yi (3). (label) (1) Fixed-class biaffine classifier (3) ri + (ryi ⊕ ri )⊤ U (2) + b = r⊤ si yi U This likewise directly models each of the prior probability of each class, the likelihood of a class given just word i (how probable a word is to take a particular label), the likelihood of a class given just the head word yi (how probable a word is to take dependents with a particular label), and the likelihood of a class given both word i and its head (how probable a word is to take a particular label given that word’s head). Applying smaller MLPs to the recurrent output states before the biaffine classifier has the advantage of stripping away information not relevant to the current decision. That is, every top recurrent state ri will need to carry enough information to identify word i’s head, find all its dependents, exclude all its non-dependents, assign itself the correct label, and assign all its dependents their correct labels, as well as transfer any relevant information to the recurrent states of words before and after it. Thus ri necessarily contains significantly more information than is needed to compute any individual score, and training on this superfluous information needlessly reduces parsing speed and increases the risk of overfitting. Reducing dimensionality and applying a nonlinearity (4 - 6) addresses both of these problems. We call this a deep bilinear attention mechanism, as opposed to shallow bilinear attention, which uses the recurrent states directly. (arc-dep) hi (arc-head) hj (arc) si = MLP(arc-dep) (ri ) (4) = MLP(arc-head) (rj ) (5) =H (arc-dep) U (1) hi (arc-head) (2) (arc-head) +H (6) u We apply MLPs to the recurrent states before using them in the label classifier as well. As with other graph-based models, the predicted tree at training time is the one where each word is a dependent of its highest scoring head (although at test time we ensure that the parse is a well-formed tree via the MST algorithm). 3 Published as a conference paper at ICLR 2017 3.2 H YPERPARAMETER CONFIGURATION Param Embedding size LSTM size Arc MLP size Label MLP size LSTM depth α Annealing Value 100 400 500 100 3 2e−3 t .75 5000 Param Embedding dropout LSTM dropout Arc MLP dropout Label MLP dropout MLP depth β1 ,β2 tmax Value 33% 33% 33% 33% 1 .9 50,000 Table 1: Model hyperparameters Aside from architectural differences between ours and the other graph-based parsers, we make a number of hyperparameter choices that allow us to outperform theirs, laid out in Table 1. We use 100-dimensional uncased word vectors2 and POS tag vectors; three BiLSTM layers (400 dimensions in each direction); and 500- and 100-dimensional ReLU MLP layers. We also apply dropout at every stage of the model: we drop words and tags (independently); we drop nodes in the LSTM layers (input and recurrent connections), applying the same dropout mask at every recurrent timestep (cf. the Bayesian dropout of Gal & Ghahramani (2015)); and we drop nodes in the MLP layers and classifiers, likewise applying the same dropout mask at every timestep. We optimize the network with annealed Adam (Kingma & Ba, 2014) for about 50,000 steps, rounded up to the nearest epoch. 4 E XPERIMENTS & R ESULTS 4.1 DATASETS We show test results for the proposed model on the English Penn Treebank, converted into Stanford Dependencies using both version 3.3.0 and version 3.5.0 of the Stanford Dependency converter (PTB-SD 3.3.0 and PTB-SD 3.5.0); the Chinese Penn Treebank; and the CoNLL 09 shared task dataset,3 following standard practices for each dataset. We omit punctuation from evaluation only for the PTB-SD and CTB. For the English PTB-SD datasets, we use POS tags generated from the Stanford POS tagger (Toutanova et al., 2003); for the Chinese PTB dataset we use gold tags; and for the CoNLL 09 dataset we use the provided predicted tags. Our hyperparameter search was done with the PTB-SD 3.5.0 validation dataset in order to minimize overfitting to the more popular PTB-SD 3.3.0 benchmark, and in our hyperparameter analysis in the following section we report performance on the PTB-SD 3.5.0 test set, shown in Tables 2 and 3. 4.2 4.2.1 H YPERPARAMETER CHOICES ATTENTION MECHANISM We examined the effect of different classifier architectures on accuracy and performance. What we see is that the deep bilinear model outperforms the others with respect to both speed and accuracy. The model with shallow bilinear arc and label classifiers gets the same unlabeled performance as the deep model with the same settings, but because the label classifier is much larger ((801 × c × 801) as opposed to (101 × c × 101)), it runs much slower and overfits. One way to decrease this overfitting is by increasing the MLP dropout, but that of course doesn’t change parsing speed; another way is to decrease the recurrent size to 300, but this hinders unlabeled accuracy without increasing parsing speed up to the same levels as our deeper model. We also implemented the MLP-based approach to attention and classification used in Kiperwasser & Goldberg (2016).4 We found this version to 2 We compute a “trained” embedding matrix composed of words that occur at least twice in the training dataset and add these embeddings to their corresponding pretrained embeddings. Any words that don’t occur in either embedding matrix are replaced with a separate OOV token. 3 We exclude the Japanese dataset from our evaluation because we do not have access to it. 4 In the version of TensorFlow we used, the model’s memory requirements during training exceeded the available memory on a single GPU when default settings were used, so we reduced the MLP hidden size to 200 4 Published as a conference paper at ICLR 2017 Classifier UAS LAS 95.75 94.22 95.74 94.00* 95.73 94.05* 95.63* 93.86* 95.53* 93.91* Sents/sec 410.91 298.99 300.04 373.24 367.44 Recurrent Cell UAS LAS 95.75 94.22 93.18* 91.08* 95.67 94.06* Sents/sec 410.91 435.32 463.25 Model Deep Shallow Shallow, 50% drop Shallow, 300d MLP Model LSTM GRU Cif-LSTM Model 3 layers, 400d 3 layers, 300d 3 layers, 200d 2 layers, 400d 4 layers, 400d Size UAS 95.75 95.82 95.55* 95.62* 95.83 LAS 94.22 94.24 93.89* 93.98* 94.22 Sents/sec 410.91 460.01 469.45 497.99 362.09 Table 2: Test accuracy and speed on PTB-SD 3.5.0. Statistically significant differences are marked with an asterisk. Input Dropout Model UAS Default 95.75 No word dropout 95.74 No tag dropout 95.28* No tags 95.77 LAS 94.22 94.08* 93.60* 93.91* Model β2 = .9 β2 = .999 Adam UAS 95.75 95.53* LAS 94.22 93.91* Table 3: Test Accuracy on PTB-SD 3.5.0. Statistically significant differences are marked with an asterisk. likewise be somewhat slower and significantly underperform the deep biaffine approach in both labeled and unlabeled accuracy. 4.2.2 N ETWORK SIZE We also examine more closely how network size influences speed and accuracy. In Kiperwasser & Goldberg’s 2016 model, the network uses 2 layers of 125-dimensional bidirectional LSTMs; in Hashimoto et al.’s 2016 model, it has one layer of 100-dimensional bidirectional LSTMs dedicated to parsing (two lower layers are also trained on other objectives); and Cheng et al.’s 2016 model has one layer of 368-dimensional GRU cells. We find that using three or four layers gets significantly better performance than two layers, and increasing the LSTM sizes from 200 to 300 or 400 dimensions likewise signficantly improves performance.5 4.2.3 R ECURRENT CELL GRU cells have been promoted as a faster and simpler alternative to LSTM cells, and are used in the approach of Cheng et al. (2016); however, in our model they drastically underperformed LSTM cells. We also implemented the coupled input-forget gate LSTM cells (Cif-LSTM) suggested by Greff et al. (2015),6 finding that while the resulting model still slightly underperforms the more popular LSTM cells, the difference between the two is much smaller. Additionally, because the gate and candidate cell activations can be computed simultaneously with one matrix multiplication, the Cif-LSTM model is faster than the GRU version even though they have the same number of parameters. We hypothesize that the output gate in the Cif-LSTM model allows it to maintain a sparse recurrent output state, which helps it adapt to the high levels of dropout needed to prevent overfitting in a way that GRU cells are unable to do. 5 The model with 400-dimensional recurrent states significantly outperforms the 300-dimensional one on the validation set, but not on the test set 6 In addition to using a coupled input-forget gate, we remove the first tanh nonlinearity, which is no longer needed when using a coupled gate 5 Published as a conference paper at ICLR 2017 Type Model English PTB-SD 3.3.0 UAS LAS Chinese PTB 5.1 UAS LAS Transition Ballesteros et al. (2016) Andor et al. (2016) Kuncoro et al. (2016) 93.56 94.61 95.8 91.42 92.79 94.6 87.65 – – 86.21 – – Graph Kiperwasser & Goldberg (2016) Cheng et al. (2016) Hashimoto et al. (2016) Deep Biaffine 93.9 94.10 94.67 95.74 91.9 91.49 92.90 94.08 87.6 88.1 – 89.30 86.1 85.7 – 88.23 Table 4: Results on the English PTB and Chinese PTB parsing datasets Model Catalan UAS LAS Chinese UAS LAS Czech UAS LAS Andor et al. Deep Biaffine 92.67 94.69 84.72 88.90 88.94 92.08 Model English UAS LAS German UAS LAS Spanish UAS LAS Andor et al. Deep Biaffine 93.22 95.21 90.91 93.46 92.62 94.34 89.83 92.02 91.23 93.20 80.85 85.38 89.15 91.44 84.56 87.38 89.95 91.65 Table 5: Results on the CoNLL ’09 shared task datasets 4.2.4 E MBEDDING D ROPOUT Because we increase the parser’s power, we also have to increase its regularization. In addition to using relatively extreme dropout in the recurrent and MLP layers mentioned in Table 1, we also regularize the input layer. We drop 33% of words and 33% of tags during training: when one is dropped the other is scaled by a factor of two to compensate, and when both are dropped together, the model simply gets an input of zeros. Models trained with only word or tag dropout but not both wind up signficantly overfitting, hindering label accuracy and—in the latter case—attachment accuracy. Interestingly, not using any tags at all actually results in better performance than using tags without dropout. 4.2.5 O PTIMIZER We choose to optimize with Adam (Kingma & Ba, 2014), which (among other things) keeps a moving average of the L2 norm of the gradient for each parameter throughout training and divides the gradient for each parameter by this moving average, ensuring that the magnitude of the gradients will on average be close to one. However, we find that the value for β2 recommended by Kingma & Ba— which controls the decay rate for this moving average—is too high for this task (and we suspect more generally). When this value is very large, the magnitude of the current update is heavily influenced by the larger magnitude of gradients very far in the past, with the effect that the optimizer can’t adapt quickly to recent changes in the model. Thus we find that setting β2 to .9 instead of .999 makes a large positive impact on final performance. 4.3 R ESULTS Our model gets nearly the same UAS performance on PTB-SD 3.3.0 as the current SOTA model from Kuncoro et al. (2016) in spite of its substantially simpler architecture, and gets SOTA UAS performance on CTB 5.17 as well as SOTA performance on all CoNLL 09 languages. It is worth noting that the CoNLL 09 datasets contain many non-projective dependencies, which are difficult or impossible for transition-based—but not graph-based—parsers to predict. This may account for some of the large, consistent difference between our model and Andor et al.’s 2016 transition-based model applied to these datasets. 7 We’d like to thank Zhiyang Teng for finding a bug in the original code that affected the CTB 5.1 dataset 6 Published as a conference paper at ICLR 2017 Where our model appears to lag behind the SOTA model is in LAS, indicating one of a few possibilities. Firstly, it may be the result of inefficiencies or errors in the GloVe embeddings or POS tagger, in which case using alternative pretrained embeddings or a more accurate tagger might improve label classification. Secondly, the SOTA model is specifically designed to capture phrasal compositionality; so another possibility is that ours doesn’t capture this compositionality as effectively, and that this results in a worse label score. Similarly, it may be the result of a more general limitation of graph-based parsers, which have access to less explicit syntactic information than transition-based parsers when making decisions. Addressing these latter two limitations would require a more innovative architecture than the relatively simple one used in current neural graph-based parsers. 5 C ONCLUSION In this paper we proposed using a modified version of bilinear attention in a neural dependency parser that increases parsing speed without hurting performance. We showed that our larger but more regularized network outperforms other neural graph-based parsers and gets comparable performance to the current SOTA transition-based parser. We also provided empirical motivation for the proposed architecture and configuration over similar ones in the existing literature. Future work will involve exploring ways of bridging the gap between labeled and unlabeled accuracy and augment the parser with a smarter way of handling out-of-vocabulary tokens for morphologically richer languages. R EFERENCES Daniel Andor, Chris Alberti, David Weiss, Aliaksei Severyn, Alessandro Presta, Kuzman Ganchev, Slav Petrov, and Michael Collins. Globally normalized transitionbased neural networks. In Association for Computational Linguistics, 2016. URL https://arxiv.org/abs/1603.06042. Gabor Angeli, Melvin Johnson Premkumar, and Christopher D Manning. Leveraging linguistic structure for open domain information extraction. In Proceedings of the 53rd Annual Meeting of the Association for Computational Linguistics (ACL 2015), 2015. Dzmitry Bahdanau, Kyunghyun Cho, and Yoshua Bengio. Neural machine translation by jointly learning to align and translate. International Conference on Learning Representations, 2014. Miguel Ballesteros, Yoav Goldberg, Chris Dyer, and Noah A Smith. Training with exploration improves a greedy stack-LSTM parser. Proceedings of the conference on empirical methods in natural language processing, 2016. Samuel R Bowman, Jon Gauthier, Abhinav Rastogi, Raghav Gupta, Christopher D Manning, and Christopher Potts. A fast unified model for parsing and sentence understanding. ACL 2016, 2016. Danqi Chen and Christopher D Manning. A fast and accurate dependency parser using neural networks. In Proceedings of the conference on empirical methods in natural language processing, pp. 740–750, 2014. Hao Cheng, Hao Fang, Xiaodong He, Jianfeng Gao, and Li Deng. Bi-directional attention with agreement for dependency parsing. arXiv preprint arXiv:1608.02076, 2016. Chris Dyer, Miguel Ballesteros, Wang Ling, Austin Matthews, and Noah A Smith. Transitionbased dependency parsing with stack long short-term memory. Proceedings of the conference on empirical methods in natural language processing, 2015. Yarin Gal and Zoubin Ghahramani. Dropout as a bayesian approximation: Representing model uncertainty in deep learning. International Conference on Machine Learning, 2015. Klaus Greff, Rupesh Kumar Srivastava, Jan Koutnı́k, Bas R Steunebrink, and Jürgen Schmidhuber. LSTM: A search space odyssey. IEEE Transactions on Neural Networks and Learning Systems, 2015. 7 Published as a conference paper at ICLR 2017 Kazuma Hashimoto, Caiming Xiong, Yoshimasa Tsuruoka, and Richard Socher. A joint many-task model: Growing a neural network for multiple nlp tasks. arXiv preprint arXiv:1611.01587, 2016. Diederik Kingma and Jimmy Ba. Adam: A method for stochastic optimization. International Conference on Learning Representations, 2014. Eliyahu Kiperwasser and Yoav Goldberg. Simple and accurate dependency parsing using bidirectional LSTM feature representations. Transactions of the Association for Computational Linguistics, 4:313–327, 2016. Adhiguna Kuncoro, Miguel Ballesteros, Lingpeng Kong, Chris Dyer, Graham Neubig, and Noah A. Smith. What do recurrent neural network grammars learn about syntax? CoRR, abs/1611.05774, 2016. URL http://arxiv.org/abs/1611.05774. Omer Levy and Yoav Goldberg. Dependency-based word embeddings. In ACL 2014, pp. 302–308, 2014. Minh-Thang Luong, Hieu Pham, and Christopher D Manning. Effective approaches to attentionbased neural machine translation. Empirical Methods in Natural Language Processing, 2015. Ankur P Parikh, Hoifung Poon, and Kristina Toutanova. Grounded semantic parsing for complex knowledge extraction. In Proceedings of North American Chapter of the Association for Computational Linguistics, pp. 756–766, 2015. Kristina Toutanova, Dan Klein, Christopher D Manning, and Yoram Singer. Feature-rich part-ofspeech tagging with a cyclic dependency network. In Proceedings of the 2003 Conference of the North American Chapter of the Association for Computational Linguistics on Human Language Technology-Volume 1, pp. 173–180. Association for Computational Linguistics, 2003. Kristina Toutanova, Xi Victoria Lin, and Wen-tau Yih. Compositional learning of embeddings for relation paths in knowledge bases and text. In ACL, 2016. David Weiss, Chris Alberti, Michael Collins, and Slav Petrov. Structured training for neural network transition-based parsing. Annual Meeting of the Association for Computational Linguistics, 2015. 8
9cs.NE
1 Minimax Design of Nonlinear Phase FIR Filters with Optimality Certificates arXiv:1608.03161v1 [cs.SY] 10 Aug 2016 Sefa Demirtas Abstract—The Parks-McClellan algorithm provides an efficient method for designing a linear phase FIR filter with a pre-specified weight function on the approximation error. For the given filter order and the specified weight function, the filter designed with this algorithm will have the unique optimal frequency response that approximates a desired filter response as certified by the alternation theorem. In this paper, a nonlinear phase FIR filter design algorithm is provided that allows the specification of a piecewise constant weight function on the approximation error in an analogous manner to linear phase FIR filters. For the given filter order and weight function, the resulting filter will provably have the unique optimal magnitude response that approximates a desired filter response, where the certification of optimality is given and is also based on the alternations that the weighted error function exhibits. Furthermore, the method is applicable to designing filters with both real- and complex-valued coefficients, which in turn determines the number of required alternations. Index Terms—Nonlinear phase FIR design, minimax optimality, alternation theorem I. I NTRODUCTION Despite their desirable properties, FIR filters have certain disadvantages when compared to their IIR counterparts. For example, the minimum order required for an FIR filter to approximate a desired filter response within pre-specified bounds is usually much higher than the order of an IIR filter for the same task, which translates into more multiplications and additions per input sample in a hardware implementation and requires larger power and memory. Furthermore, even though linear phase FIR filters introduce no dispersion but only a uniform latency, the amount of this latency in samples is half the filter order and this may become unacceptably high for latency-sensitive applications. Therefore it is crucial to optimize an FIR filter for a given order while keeping this order as low as possible. The optimality can be stated with respect to a particular norm, and several design methods exist to meet different optimality criteria. For example, the windowing methods can be used to minimize the sum of absolute squares (l2 -norm) of the approximation error between the filter response and the desired response for a given order. On the other hand, the Parks-McClellan method [1] aims to minimize the maximum absolute error (l∞ -norm), also known as the minimax or Chebyshev error. Since minimizing the l2 norm is equivalent to minimizing the energy in the error, it does not prevent large but very narrow deviations between the filter frequency response and the desired response that result in a small l2 -norm. Therefore, even though it is much easier to design for l2 -norm optimality, the minimax-optimality have The author is with Analog Devices Lyric Labs. Email (work): [email protected], (personal): [email protected]. been adopted widely in the signal processing community due to its superior worst-case performance, and it will be the focus in this paper. The Parks-McClellan design method yields the unique globally-optimal linear phase FIR filter for a given order N by exploiting a theorem that provides the necessary and sufficient conditions for global minimax-optimality, which is known as the alternation theorem [2]. Even though it is desirable, asserting linear phase restricts the coefficients of the filter to have even- or odd-symmetry if they are realvalued, or conjugate-symmetry if they are complex-valued. This restriction exhibits itself as halving the number of degrees of freedom available to approximate the desired response because each choice of a filter coefficient already determines another coefficient to generate symmetric pairs. For a variety of applications where linear phase is not crucial, this becomes an unnecessary constraint. Filters with magnitude responses that provide a much better approximation to the desired response can be obtained by removing the linear phase constraint. However, this renders the characterization of optimality by the alternation theorem inapplicable in its currently known form, which in turn prevents direct utilization of the Parks-McClellan method. In this paper, we first provide a characterization method for the global minimax-optimality of FIR filters if no restrictions exist on its phase. In other words, we state the necessary and sufficient conditions for the magnitude response of an FIR filter to be the unique best approximation to a desired response. Of course, due to the restrictions that are imposed in a linear phase design, the optimal filter with unrestricted phase will always be at least as good an approximation to the desired response as the optimal linear phase solution. Since this is a characterization stated in terms of the magnitude response, all the FIR filters sharing the same order and magnitude response will be optimal. Therefore, although the magnitude response is the unique optimal response, there are a finite number of distinct optimal FIR filters related to each other through a cascade with an all-pass filter. Secondly, in this paper, the arguments of the characterization will be shown to naturally lead to a minimax-optimal design method involving the computation of an autocorrelation sequence as an intermediate step, at the end of which the designer will be able to choose from a variety of options for the phase including a minimum phase and a maximum phase design without compromising the global optimality of the magnitude response. Since it was originally introduced in Hermann and Schuessler’s work [3], designing a nonlinear phase FIR filter by first designing an autocorrelation sequence and then finding a filter that admits this as its autocorrelation is a widely known technique 2 [4]–[10]. Spectral factorization is an obvious first choice to obtain the filter coefficients from the designed autocorrelation sequence. This requires finding the roots of the polynomial the coefficients of which are the same as the autocorrelation sequence. Since this is a highly impractical approach for designing high order filters, for minimum phase designs, several algorithms have been proposed as an alternative to polynomial root finding [4]–[8]. However, in most of these earlier methods for nonlinear phase FIR filter design, it is the autocorrelation sequence of the filter impulse response that is designed to have minimax optimality in approximating the desired response, which does not necessarily imply the optimality of the filter itself. Furthermore, since the magnitude response of the filter and that of its autocorrelation sequence are related through squaring, the weight function applied during the design of the autocorrelation will not match the desired weight function on the approximation error attained by the final design. In this paper, we first characterize the optimality of the nonlinear phase FIR filter instead of its autocorrelation sequence and then provide a method to compute the correct weight to be applied during the computation of the autocorrelation sequence so that the resulting filter exhibits the desired ratio of passband to stopband deviations. Spectral factorization using polynomial root finding or any of the alternative methods in the current literature [4]–[8] can then be used to obtain the final design from the autocorrelation sequence leading to the FIR design with the desired error weights, where the global optimality is certified by our characterization of optimality. II. L INEAR P HASE VS N ONLINEAR P HASE FIR F ILTERS Linear phase FIR filters with real-valued coefficients can be expressed as a real-valued amplitude function A(ω) multiplied by a linear phase term e−jαω . Since this linear phase corresponds to a time delay by α samples, a usual approach to designing linear phase FIR filters is to first design the zerophase filter response A(ω), which is necessarily symmetric in time domain for it to be zero phase. Afterwards, the filter is time delayed until it is causal, which corresponds to multiplying with a phase of the form e−jαω . Parks and McClellan [1] exploited the fact that the frequency response A(ω) of a symmetric zero-phase filter a[n] of even order N can be expressed in terms of real sinusoids. More specifically, for example if a[n] = a[−n], then N/2 N/2 A(ω) = X −N/2 a[n]e −jωn = a[0] + X 2a[n]cos(nω). (1) n=1 In other words, A(ω) can be expressed as a linear combination of the basis functions {cos(nω), n = 0, 1, . . . , N/2}. In order to approximate an ideal filter response D(ω), we search for the optimal set of linear combination coefficients for these basis functions such that the maximum absolute error is minimized. The alternation theorem asserts that we need N/2 + 2 alternations for the optimal filter, and the Remez Exchange algorithm can be used to efficiently find this set of coefficients. Since nonlinear phase filters cannot be time-shifted by any amount to exhibit a real-valued (zero-phase) response, and since the alternation theorem and the Remez Exchange Algorithm apply only to real-valued functions, they cannot be used to characterize or design minimax optimal nonlinear phase FIR filters directly. III. C HARACTERIZATION T HEOREM FOR N ONLINEAR P HASE F ILTERS In this section, we describe a very straightforward method to characterize the global minimax optimality of a given nonlinear phase FIR filter h[n], n = 0, 1, . . . , N , where the optimality is implied for the magnitude response of this filter, |H(ejω )|, as compared to the desired filter response, D(ω), which is unity in the passband and zero in the stopband. In other words, by examining the magnitude response |H(ejω )|, we will be able to tell whether this is a filter the magnitude response of which is the best approximation to D(ω) in that no other magnitude response achievable with the same order can attain a smaller infinity norm on the weighted approximation error W (ω)(|H(ejω )|−D(ω)). We will be able to characterize optimality for both real-valued and complexvalued filter coefficients, and we do not require any symmetry in the coefficients, therefore it applies in the most general case. In the next section, the arguments of this characterization will enable us to find an efficient algorithm to design nonlinear phase FIR filters in cases where only the magnitude response is specified and the phase is not restricted. However we will still be able to choose among different available phase characteristics including, for example, a minimum phase design without compromising global optimality with respect to magnitude. Assume that an FIR filter with coefficients h[n], n = 0, 1, 2, . . . , N and a frequency response H(ejω ) is provided with the passband ΩP and the stopband ΩS , both of which are closed subsets of (−π, π], to approximate the desired magnitude response  1, ω ∈ ΩP D(ω) = . (2) 0, ω ∈ ΩS Further assume that a desired weight function Wdes (ω) is provided that expresses the relative emphasis on the error in the stopband as compared to the passband. More specifically,  1, ω ∈ ΩP Wdes (ω) = , (3) Kdes , ω ∈ ΩS where Kdes is a scalar given as a part of the filter specifications. The weighted error function, and the bounds on passband and stopband errors are defined as  EW (ω) = Wdes (ω) H(ejω ) − D(ω) , (4) δP = max ω∈(ΩP ∪ΩS ) and δS = |EW (ω)| δP , Kdes (5) (6) respectively. Theorem 1. |H(ejω )| is the unique minimax-optimal magnitude response that can be attained by any FIR filter of order N in order to approximate the ideal filter magnitude response 3 D(ω) with a desired weight function Wdes (ω) if and only if the adjusted weighted error function  ′ ′ EW (ω) = Wdes (ω) H(ejω ) − D′ (ω) (7) exhibits at least N +2 alternations if the filter coefficients h[n] are restricted to be real-valued, or at least 2N +2 alternations ′ if they are not restricted to be real-valued. Here, Wdes (ω) and ′ D (ω) are defined as  1, ω ∈ ΩP ′ (ω) = Wdes , (8) 2Kdes , ω ∈ ΩS where the subscripts re and im refer to the real and imaginary parts, respectively. The frequency response of a conjugatesymmetric autocorreation sequence p[n] can be represented as jω P (e ) = N X p[n]e−jωn n=−N = p[0] + = p[0] + N X n=1 N X p[n]e−jωn + p∗ [n]ejωn 2pre [n]cos(nω) + n=1 and ′ D (ω) =  1, δS 2 , ω ∈ ΩP . ω ∈ ΩS (9) Note that in the context of linear phase FIR filters where the alternation theorem is used for characterization, the optimality is characterized by counting the alternations in the weighted error function which is computed using the desired response D(ω) and the weight function Wdes (ω). The characterization given here for nonlinear phase FIR filters is based on the ′ adjusted weighted error function EW computed using D′ (ω) ′ and Wdes (ω) as in equation (7). The formal proof of the characterization theorem (Theorem 1) is given in [11] and will be excluded here for brevity. However, intuitively, the optimality of h[n] can be related to the optimality of its autocorrelation sequence p[n] as follows. Due to the specific choice of values in the stopband for ′ D′ (ω) and Wdes (ω), the number of alternations and the points at which alternations occur are the same for |H(ejω )| and P (ejω ) = |H(ejω )|2 . More specifically, if |H(ejω )| attains its extreme value at a specific frequency and hence form ′ an alternation in EW (ω), then the Fourier transform of the autocorrelation function P (ejω ) = |H(ejω )|2 will also attain its extremal value and form an alternation in a related weighted error function at the same frequency. Therefore, the number of required alternations in the magnitude response of the filter can be related to that of the autocorrelation sequence, which is zero-phase and in turn can be characterized for optimality using the traditional form of the alternation theorem. The number of required alternations for filters with complex-valued coefficients are larger than that of filters with real-valued coefficients. This also is consistent with intuition because it reflects the additional degrees of freedom in choosing the filter coefficients by relaxing the constraint to be realvalued. More formally, the autocorrelation function of such filters also have complex-valued coefficients in general, and they exhibit conjugate-symmetry instead of the even-symmetry in the real case. This means that the autocorrelation sequence p[n] of a filter h[n] with complex-valued coefficients satisfy p[n] = p∗ [−n], n = 0, 1, 2, . . . , N, (10) or equivalently pre [n] = pre [−n], n = 0, 1, 2, . . . , N (11) pim [n] = −pim [−n], n = 0, 1, 2, . . . , N, (12) and N X (13) 2pim [n]sin(nω) n=1 This implies that the frequency response P (ejω ) can be represented as a linear combination of basis functions given as {cos(nω), n = 0, 1, 2, . . . , N } ∪ {sin(nω), n = 1, 2, . . . , N } (14) This means the flexibility in choosing the coefficients of h[n] as complex-valued results in an addition of N basis functions to the set of available functions to represent P (ejω ), potentially leading to smaller approximation errors as intuitively expected. Furthermore, the basis set in (14) also satisfies the Haar condition and therefore leads to a unique optimal solution [2]. These additional N basis functions manifest themselves as an increase by N in the number of required alternations to satisfy the traditional form of the alternation theorem for the design of the autocorrelation. Therefore, Theroem 1 applies to complex-valued filters with 2N + 2 alternations as opposed to N + 2 alternations. Example: Before proceeding to the design procedure, we close this section with an example of an FIR filter that is globally minimax optimal to illustrate the computation of the adjusted desired response D′ (ω), the adjusted weight ′ function Wdes (ω) and the alternation counting process in the characterization of nonlinear phase FIR filters for optimality. Our example design with real-valued coefficients in Figure 1a has smaller ripple sizes than the one designed with MATLAB’s firpm function which is based on the Parks-McClellan design [1]. The filter order is N = 26 with the passband and the stopband specified as ΩP = [0, 0.36π] and ΩS = [0.42π, π]. The weight Kdes is chosen as 3 in this example, meaning the degrees of freedom will be chosen to suppress the stopband error more than the passband error by this factor. We compute EW (ω) as in equation (4), which is provided in Figure 1b. From this computation, δP and δS are computed as 0.12 and ′ 0.04, respectively. Therefore, D′ (ω) and Wdes (ω) become  1, ω ∈ [0, 0.36π] D′ (ω) = (15) 0.02, ω ∈ [0.42π, π] and ′ Wdes (ω) =  1, ω ∈ [0, 0.36π] . 6, ω ∈ [0.42π, π] (16) ′ This leads to an adjusted weight function EW (ω) illustrated in Figure 1c, which was obtained as in (7). This error indeed exhibits N + 2 = 28 points, which is a necessary and sufficient condition for the unique and global optimality of the magnitude response |H(ejω )| asserted by Theorem 1. The 4 IV. O PTIMAL N ONLINEAR P HASE FIR F ILTER D ESIGN A LGORITHM 1.2 Ours Parks-McClellan magnitude response 1 In this section, we describe the design algorithm for filters restricted to having real-valued coefficients, therefore we will require N +2 alternations. The same arguments apply to filters with complex-valued coefficients simply by requiring 2N + 2 alternations and including sines in the basis functions for the computation of optimal squared response. 0.8 0.6 0.4 0.2 0 0 0.2 0.4 0.6 0.8 1 A. Design Constraints ω (× π) (a) weighted error 0.2 0.1 0 -0.1 -0.2 0 0.2 0.4 0.6 0.8 1 0.6 0.8 1 0.6 0.8 1 ω (× π) adjusted weighted error (b) 0.2 0.1 0 -0.1 -0.2 0 0.2 0.4 ω (× π) adjusted weighted error (c) 0.2 0.1 0 -0.1 -0.2 0 0.2 0.4 ω (× π) (d) Fig. 1. (a) The magnitude responses of two 26-th order FIR filters with real-valued coefficients, one designed with the algorithm proposed in Section IV and the other using firpm function of MATLAB (b) Weighted function ′ (ω) for our design EW (ω) for our design (c) Adjusted weighted error EW (d) Adjusted weighted error for the firpm design. firpm design exhibits only 23 alternations in the adjusted weighted error which is computed similarly and illustrated in Figure 1d; and is clearly suboptimal. The formal steps provided for testing optimality can be bypassed by a more practical observation. Setting the maximum error in the passband to δP , and the maximum error in the stopband to δS , one can directly verify whether the filter satisfies the desired weight by checking if δδPS equals Kdes . If this is the case, then the alternations can be also counted directly on the magnitude response as the points where the function reaches its extreme points in an alternating ′ fashion including the band edges since Wdes (ω) and D′ (ω) are tailored to turn these points into alternation points of the ′ adjusted weighted error EW (ω). This approach can be verified in Figure 1a where the extremal points are indeed alternations and lead to 28 alternations including those occur at the band edges. Designing a zero-phase sequence g[n] that approximates an ideal filter response, lifting its frequency response G(ejω ) until it is nonnegative and treating the lifted sequence p[n] as the autocorrelation of an FIR filter h[n] has been used as a nonlinear phase FIR filter design method at least since 1970 [3]. However, since the design specifications such as relative weight on the stopband versus passband deviation in the autocorrelation domain do not remain the same for the filter due to the squaring relationship between P (ejω ) and |H(ejω )|, the resulting filter h[n] does not necessarily reflect the desired weight. Furthermore, no optimality arguments are available for the final design h[n] because the optimality of the autocorrelation sequence for one set of metrics does not make the corresponding filter optimal for the same metrics. We now provide a design method that correctly accounts for this relationship and computes the weight to be applied in the design of the autocorrelation sequence such that the final design exhibits the desired ratio between passband and stopband deviations. Furthermore, the characterization theorem of Section III will certify the optimality of the filter itself as opposed to the optimality of the autocorrelation sequence. Since the alternation frequencies and the number of alternations are the same for |H(ejω )| and P (ejω ) due to the specific ′ choice of D′ (ω) and Wdes (ω) in the characterization theorem, designing the autocorrelation sequence p[n] instead of the filter h[n] itself with the correct number of alternations satisfies the conditions of the characterization theorem for the optimality of h[n] itself. Therefore we can design an autocorrelation function that satisfies the required number of alternations and recover the filter coefficients that will accept this function as its autocorrelation function using either spectral factorization, or if a minimum phase filter is particularly desired, any of the methods in [4]–[8]. An autocorrelation sequence with at least N +2 alternations can be designed by first by computing the coefficients of an optimal even-symmetric sequence g[n] of length 2N +1 such that its Fourier transform G(ejω ) approximates the ideal filter, and then by scaling and shifting to obtain P (ejω ) = aG(ejω ) + b such that the following constraints are satisfied: p P (ejω ) swings symmetrically around (i) |H(ejω )| = unity in the passband, i.e. its extremal values become 1 + δP and 1 − δP for some positive δP , (ii) the minimum value of P (ejω ) is zero, p (iii) the maximum value δS of |H(ejω )| = P (ejω ) in the stopband satisfies the desired weight constraint, i.e., δδPS = Kdes . 5 The first condition guarantees that the effects of squaring are properly taken into account in the autocorrelation domain; the second constraint ensures p[n] = ag[n] + bδ[n] is a proper autocorrelation sequence; and the third constraint ensures that the desired weight is not compromised through squaring. The relationship between G(ejω ), P (ejω ) and |H(ejω )| is illustrated with an example in Figure 2. Referring to the passband and stopband deviations of |H(ejω )| as δP and δS and those of G(ejω ) as ∆P and ∆S respectively, these three constraints can be represented mathematically in terms of the scale and shift coefficients a, b and the weight K that will be applied in the design of g[n]. More specifically, we choose the scaling coefficient a and the shifting coefficient b such that the midpoints of the passband and stopband ranges of G(ejω ) and P (ejω ) match as in a · 1 + b = 1 + δP2 and a·0+b= (17) (18) δS2 2 (19) a = 1 + δP2 − 1.2 1 0.8 0.6 0.4 0.2 0 0 δS2 , 2 which yields G(e j! ) 0.2 0.4 0.6 0.8 1 0.6 0.8 1 0.6 0.8 1 (a) P(ej! ) 1.2 1 and δS2 . (20) 2 The relative weight between passband and stopband does not change after scaling G(ejω ), therefore the weights are identical in both: 0.8 b= 2 2 (1 + δP ) − (1 − δP ) 4δP ∆P =K = 2 = δS2 δS ∆S (21) 0.6 0.4 0.2 0 0 0.2 0.4 Since δP /δS = Kdes , we can write this as K= (b) 4Kdes δS |H(e j! )| (22) 1.2 or 4Kdes . (23) K In order to match the upper bound of the filter response in the stopband to that of the autocorrelation after the scale and shift, we have δS2 = a · ∆S + b. (24) δS = Inserting the values of a and b from equations 16K 2 and inserting δS2 = K 2des from equation (23),   4 2 2 16Kdes 8Kdes 16Kdes ∆S + = 1+ − K2 K2 K2 2 8Kdes 4 − 8K 2 . K 2 + 16Kdes des 2 8Kdes K2 (25) (26) and, since ∆P = K∆S , we obtain ∆P = K2 2 8Kdes K 4 − 8K 2 . + 16Kdes des 0.8 0.6 0.4 0.2 (19) and (20), we obtain Solving this for ∆S yields ∆S = 1 (27) Finally, once the appropriate weight K that satisfies this equation is found, the scaling and shifting coefficients can be 0 0 0.2 0.4 (c) Fig. 2. An example for (a) the Fourier Transform of the symmetric sequence g[n] that approximates an ideal filter response, (b) that of the autocorrelation p[n] obtained from g[n] through scaling and shifting, i.e. p[n] = ag[n] + bδ[n], (c) the magnitude response of a nonlinear phase filter h[n] the autocorrelation of which is p[n]. In this example, N = 20, ΩP = [0, 0.30π], ΩS = [0.35π, π] and Kdes = 0.5. 6 computed directly from the parameters of this filter. Using equation (23) and (20), we obtain 2 8Kdes , K2 and from equation (28) and (24), we have b= (28) 2 2 8Kdes 8Kdes = . (29) 2 K ∆S K∆P Equation (27) is an implicit and nonlinear equation that expresses the correct weight K that needs to be applied in the design of G(ejω ) in terms of the actual passband deviation ∆P obtained using the Remez Exchange Algorithm. It can be solved efficiently for example using an iterative procedure where we cut the search space on K each time in a binary search fashion or using Newton-Raphson method. Once the appropriate K is found, we design G(ejω ) with that weight, scale by a and shift by b to obtain the autocorrelation response P (ejω ), and then recover the filter coefficients h[n] using spectral factorization where we can choose the filter to be minimum phase, or maximum phase or anything in between. If the desired filter is minimum phase, then more efficient methods in [4]–[8] can be used instead of spectral factorization. a= B. The Overall Algorithm Assume that we want to compute the minimax-optimal magnitude response |H(ejω )|, which is of order N (therefore has N + 1 coefficients). Given ΩS , ΩP and Kdes , start with an initial guess for K such that K ≥ 4Kdes (Kdes + 1) for a physically meaningful design. (See Appendix A for the derivation of this lower bound for weight as well as the justification for why the following iterations converge.) 1. Compute the coefficients of the minimax-optimal evensymmetric (therefore zero-phase) filter g[n] of order 2N to approximate the target function  1, ω ∈ ΩP D(ω) = (30) 0, ω ∈ ΩS with the weight function  1, ω ∈ ΩP W (ω) = . K, ω ∈ ΩS (31) This can be done directly using the Remez Exchange algorithm, or modifying the Parks-McClellan algorithm, etc. 2. Compute G(ejω ), the frequency response of g[n], and compute the maximum value of passband error ∆P for this g[n]. (This is also equivalent to the maximum value of the absolute weighted error |W (ω)(G(ejω ) − D(ω))|). 3. If the resulting ∆P from step 2 satisfies the equality in equation (27), go to step 4. Otherwise (i) If ∆P is smaller than the expression in equation (27), then increase the value of K and go to step 1. (i) If ∆P is greater than the expression in equation (27), then decrease the value of K and go to step 1. The amount by which K is increased or decreased, or the bounds of the search space, can be decided in several ways, including methods such as binary search (or bisection method), Newton-Raphson method, or any other appropriate numerical method. Any choice of K must satisfy K ≥ 4Kdes (Kdes + 1) for a physically meaningful design. 4. Compute scale and shift coefficients a and b using equations (28) and (29). 5. Compute the function p[n] from g[n] as p[n] = a · g[n] + b · δ[n], where δ[n] is the unit impulse function (not to be confused with passband or stopband ripples of |H(ejω )|, namely δP or δS .). This p[n] is the autocorrelation that we were looking for. 6. Using any method including but not limited to spectral factorization, obtain the coefficients of h[n] from the autocorrelation sequence p[n]. There will be more than one filter for which the autocorrelation sequence is p[n], all of which are related to one another through a cascade with an allpass filter. Choosing the zeros in the unit circle as well as one from each pair of zeros located on the unit circle leads to a minimum phase design. Choosing all the zeros outside the unit circle and one pair from each pair on the unit circle leads to a maximum phase design. If a minimum phase design is desired but the filter order is too high to perform spectral factorization using polynomial root finding, methods in [4]–[8] can be used to find the minimum phase solution. Other solutions can then be found by finding the roots of this lower order polynomial and reflecting the zeros from inside the unit circle to outside of the unit circle as desired. Example: Figure 3 illustrates the design of a high pass filter where N = 500, ΩP = [0.40π, π], ΩS = [0, 0.39π] and Kdes = 2. In this particular design, for the desired relative ratio of Kdes = 2 between the passband and the stopband deviations, the weight K to be applied during the the design of the zero phase sequence g[n] was computed as 9801.96 corresponding to ∆P = 3.2646E −3 in the iterative procedure in Section IV-B. This pair of (K, ∆P ) can be verified to satisfy equation (27) which was obtained through only few iterations using the bisection method. Figure 3a illustrates the minimum phase impulse response obtained using our design algorithm, which is the globally optimal solution that approximates the desired response if no restrictions on phase exist as certified by Theorem 1, and that is designed as a linear phase filter using the firpm function in MATLAB based on the Parks-McClellan algorithm [1]. Figure 3b, 3c and 3d illustrate the comparisons of magnitude responses in the entire frequency range, in the passband and in the stopband respectively. Removing the restrictions on the phase has clearly led to a sharper magnitude response characteristic. Furthermore, since this is a minimum phase design, the group delay in the entire passband is much less than that of the linear phase design at the expense of a non-constant delay profile. Since this is a very high order filter, a polynomial root finding based spectral factorization was impractical and we exploited the algorithm in [4] instead to compute h[n] from the computed p[n], where we used a matlab implementation of this algorithm provided in [12]. 7 0.8 P ROOF our design firpm design 0.6 Impulse Response 0.4 0.2 0 -0.2 -0.4 -0.6 0 100 200 300 400 500 Samples (a) 0 our design firpm design Magnitude Response (dB) -10 -20 -30 FOR A PPENDIX A C ONVERGENCE OF I TERATIONS First we show that the resulting passband ripple ∆P,res of a zero-phase G(ejω ) obtained by applying a weight K is an increasing function of K, i.e. if we design a filter for the same passband and stopband specifications but with a larger K, then ∆P,res will be also higher. Here the subscript res stands for “resulting”. We can prove that ∆P,res (K) is an increasing function of K by contradiction. Assume that the maximum weighted error in a filter G1 (ejω ) designed with a weight function  1, ω ∈ ΩP (32) W1 (ω) = K 1 , ω ∈ ΩS is given by -40 ∆P 1 = -50 max ω∈(ΩP ∪ΩS ) |EW 1 (ω)| (33) -60 where -70 0 0.2 0.4 0.6 0.8  EW 1 (ω) = W1 (ω) G1 (ejω ) − D(ω) . 1 ω (× π) (b) 0.1 our design firpm design 0.08 Magnitude Response (dB) 0.06 0.04 0.02 0 -0.02 -0.04 -0.06 -0.08 -0.1 0.4 0.5 0.6 0.7 ω (× π) 0.8 0.9 1 (c) (34) Similarly define W2 (ω), EW 2 (ω) and ∆P 2 for another filter G2 (ejω ) and weight scalar K2 , which is greater than K1 . Since G1 and G2 are real-valued frequency responses, they can be designed using the Remez Exchange Algorithm and they will be the respective unique optimal-minimax designs since they satisfy the alternation theorem with at least N +2 alternations. In order to obtain the contradiction, assume ∆P 2 ≤ ∆P 1 . We can compute another weighted error function E12 (ω) using the weight W1 (ω) along with G2 (ejω ) as  E12 (ω) = W1 (ω) G2 (ejω ) − D(ω) . (35) The maximum value of this weighted error ∆P 12 becomes our design firpm design -50 Magnitude Response (dB) ∆P 12 = -55 -60 -65 -70 0 0.05 0.1 0.15 0.2 ω (× π) 0.25 0.3 0.35 (d) 250 Samples 200 150 our design firpm design 100 50 0 0.4 0.5 0.6 0.7 ω (× π) 0.8 0.9 1 max ω∈(ΩP ∪ΩS ) |E12 (ω)| = max {∆P 2 , K1 ∆S2 } . (36) Since both ∆P 2 and K1 ∆S2 = K1 ∆KP22 are at most ∆P 2 , the filter G2 (ejω ) is at least as good as G1 (ejω ) in approximating the desired function with the weight function W1 (ω), which contradicts the unique optimality of the latter which had been established by the alternation theorem. Therefore, for K2 > K1 , the passband error ∆P 2 cannot be equal or smaller than ∆P 1 . This implies ∆P (K) is a strictly increasing function of K. Now consider the range of weights K that results in physically meaningful designs. For a given weight Kdes , we can always design a trivial filter h[n] = 1+K1 des δ[n], which leads to Kdes stopband error δS = 1+K1 des and passband error δP = 1+K , des δP which satisfy the desired weight constraint δS = Kdes . The sum of these errors is exactly unity. Therefore, in an optimal design with N + 1 coefficients, the sum of these errors can never be larger than unity, and we have (e) Fig. 3. Comparison of our optimal design to a linear phase design for a high-pass filter where N = 500, ΩP = [0.40π, π], ΩS = [0, 0.39π] and Kdes = 2. (a) the impulse responses, (b) the magnitude responses, (c) the magnitude response zooming into the passband, (d) the magnitude response zooming into the stopband, (e) the group delays in samples in the passband. δP + δS = (Kdes + 1)δS ≤ 1. (37) Inserting δS from equation (23), we obtain (Kdes + 1) 4Kdes ≤ 1, K (38) 8 1 ∆ P (K) ∆ P,res (K) 0.9 0.8 0.7 0.6 0.5 0.4 0.3 0.2 0.1 40 60 80 100 120 140 160 180 200 K Fig. 4. An example of the resulting passband deviation ∆P,res as a function of weight K and the function ∆P given in equation (27). which yields the physically meaningful lower bound for the weight K as K ≥ 4Kdes (Kdes + 1). (39) We need to find the weight K that yields a resulting value of weighted error ∆P,res that is equal to the expression for ∆P in equation (27). We have already established ∆P,res (K) is an increasing function of K and is always lower than 1−∆S (K). On the other hand, ∆P (K) stated in equation (27) equals 1 − δS at the lower bound we just found in equation (39), is monotonically decreasing for weights greater than this lower bound and asymptotically approaching zero. This means these two functions do intersect once and only once in this regime of weights, and that is the weight we are looking for. This is also another proof that an optimum exists and it is unique. Figure 4 illustrates an example of ∆P (K) and ∆P,res curve for wdes = 2, ΩS = [0, 0.36π] and ΩP = [0.42π, π] where the physically meaningful values of K start as 24. During the iterations, if ∆P,res (K) > ∆P (K), the current value of K is to the right of the intersection and therefore needs to be decreased. Otherwise, it is increased, and the iterations continue until the two values meet. The search is particularly efficient if the search space is halved each time, corresponding to the binary search (or bisection) scheme. R EFERENCES [1] T. Parks and J. McClellan, “Chebyshev approximation for nonrecursive digital filters with linear phase,” Circuit Theory, IEEE Transactions on, vol. 19, no. 2, pp. 189 – 194, Mar 1972. [2] E. W. Cheney, Introduction to approximation theory. McGraw-Hill, 1966. [3] O. Herrmann and W. Schuessler, “Design of nonrecursive digital filters with minimum phase,” Electronics Letters, vol. 6, no. 11, pp. 329–330, May 1970. [4] R. Boite and H. Leich, “A new procedure for the design of high order minimum phase fir digital or ccd filters.” Signal Processing, vol. 3, pp. 101 – 108, 1981. [5] X. Chen and T. W. Parks, “Design of optimal minimum phase fir filters by direct factorization,” Signal Process., vol. 10, no. 4, pp. 369–383, Jun. 1986. [6] N. Damera-Venkata and B. L. Evans, “Optimal design of real and complex minimum phase digital fir filters,” in Acoustics, Speech, and Signal Processing, 1999. Proceedings., 1999 IEEE International Conference on, vol. 3, Mar 1999, pp. 1145–1148 vol.3. [7] Y. Kamp and C. Wellekens, “Optimal design of minimum-phase fir filters,” IEEE Transactions on Acoustics, Speech, and Signal Processing, vol. 31, no. 4, pp. 922–926, Aug 1983. [8] G. Mian and A. Nainer, “A fast procedure to design equiripple minimumphase fir filters,” IEEE Transactions on Circuits and Systems, vol. 29, no. 5, pp. 327–331, May 1982. [9] H. Samueli, “On the design of optimal equiripple fir digital filters for data transmission applications,” IEEE Transactions on Circuits and Systems, vol. 35, no. 12, pp. 1542–1546, Dec 1988. [10] S.-P. Wu, S. Boyd, and L. Vandenberghe, “Fir filter design via semidefinite programming and spectral factorization,” in Decision and Control, 1996., Proceedings of the 35th IEEE Conference on, vol. 1, Dec 1996, pp. 271–276 vol.1. [11] S. Demirtas, “Characterization and design of nonlinear phase fir filters for global minimax-optimality,” in preparation. [12] J. O. Smith, Introduction to Digital Filters with Audio Applications. http://ccrma.stanford.edu/˜jos/filters/, accessed (May 2016), online book.
3cs.SY
Statement A: Approved for Release. Distribution is unlimited. Presented In Partial Fulfillment of the Requirements of a Master of Science Degree Penn State Department of Mechanical Engineering February 29, 2016 APPLYING ARTIFICIAL NEURAL NETWORKS TO PREDICT NOMINAL VEHICLE PERFORMANCE Adam J. Last Applied Research Laboratory P.O. Box 30 State College, PA 16804 e-mail: [email protected] ABSTRACT This paper investigates the use of artificial neural networks (ANNs) to replace traditional algorithms and manual review for identifying anomalies in vehicle run data. The specific data used for this study is from undersea vehicle qualification tests. Such data is highly non-linear, therefore traditional algorithms are not adequate and manual review is time consuming. By using ANNs to predict nominal vehicle performance based solely on information available pre-run, vehicle deviation from expected performance can be automatically identified in the post-run data. Such capability is only now becoming available due to the rapid increase in understanding of ANN framework and available computing power in the past decade. The ANN trained for the purpose of this investigation is relatively simple, to keep the computing requirements within the parameters of a modern desktop PC. This ANN showed potential in predicting vehicle performance, particularly during transient events within the run data. However, there were also several performance cases, such as steady state operation and cases which did not have sufficient training data, where the ANN showed deficiencies. It is expected that as computational power becomes more readily available, ANN understanding matures, and more training data is acquired from real world tests, the performance predictions of the ANN will surpass traditional algorithms and manual human review. Timothy F. Miller Applied Research Laboratory P.O. Box 30 State College, PA 16804 e-mail: [email protected] service lives to ensure proper functionality. Results from these qualification runs can include hundreds of channels of data, including speeds, pressures, temperatures, flow rates, vibrations, and many others. Further, each qualification run usually has a unique mission profile, which is the progression of commanded speeds throughout the run. This makes direct comparison between qualification runs difficult. Therefore, identifying anomalous behavior from the post-run data requires many highly trained and experienced engineers manually reviewing each data channel. Even then, due to human error, subtle anomalies can be overlooked or, conversely, normal behavior can be flagged as anomalous. To counter this, creating an algorithm or method to predict results based solely on the mission profile is highly desirable. The current best method is to average the measured values for a given data channel at a given speed from all previous runs, and assume that is the “normal” operating condition for that speed. However, the response of each data channel is highly nonlinear, as not only the current speed command but also the cumulative effect of all prior operation determines current performance. As a result, traditional algorithms become unwieldy and unreliable for this application. PROBLEM Undersea vehicles, like any high performance systems, require many qualification runs prior to and throughout their INTRODUCTION Overcoming the breakdown of traditional algorithms on large non-linear data sets has been a focus for many industries in recent years. Data center optimization [1], handwriting recognition [2], language translation [3], and image classification [4] are examples of problems that traditional algorithms cannot effectively solve. Decades of Statement A: Approved for Release. Distribution is unlimited. 1 exponential growth in available computing power, along with recent developments in mathematical methods, has enabled a new approach to handling large data sets- artificial neural networks (ANNs). ANNs have been deployed in the last few years to enable everything from real time language translation [5] to instant handwriting recognition [6] to financial market analysis [7]. This paper outlines the approach to using the existing undersea vehicle qualification run data to train an ANN to predict future hypothetical run results, with the only input being the mission profile. Then, when the hypothetical qualification run is actually performed in the real world, the results can be fed back to the computer. The ANN can then identify where differences exist between its predicted result and the actual results to automatically flag anomalous behavior. TECHNICAL BACKGROUND The first work on artificial neural networks began in the mid-20th century with the concept of perceptrons. The perceptron is essentially a logic gate, where multiple inputs are taken in, individually weighted, and summed. If the sum of the weighted inputs are greater than a threshold value, then the output of the perceptron is “1”, otherwise the output is “0”. This is shown graphically in Figure 1 (graphic adapted from Nielson [8]). 0 𝑖𝑓 ∑ 𝑤𝑗 𝑥𝑗 ≤ 𝑡ℎ𝑟𝑒𝑠ℎ𝑜𝑙𝑑 𝑜𝑢𝑡𝑝𝑢𝑡 = { 1 𝑖𝑓 ∑ 𝑤𝑗 𝑥𝑗 > 𝑡ℎ𝑟𝑒𝑠ℎ𝑜𝑙𝑑 Figure 1. Perceptron logic The perceptron was later refined to allow for nonbinary output (i.e. output other than just 1 and 0). This is accomplished by replacing the step function logic with a sigmoid function. For this reason, the new model for the perceptron was named the “sigmoid neuron”. The “neuron” portion of the name derives from the sigmoid neuron’s similarity in operation to a biological neuron, which on a very basic level activates an output given a sufficient input [8]. Sigmoid neurons become useful when linked together to perform complex logic, and were renamed “hidden neurons” in the scope of neural networks. Figure 2 (graphic adapted from Nielson [8]) shows an artificial neural network containing 3 inputs, 4 hidden neurons, and one output. Statement A: Approved for Release. Distribution is unlimited. Figure 2. Simple ANN To orient Figure 2 to the current problem at hand, the input layer would be known values (such as the commanded speed). The output layer would be whatever data channel you are trying to simulate, the most intuitive being actual vehicle speed. There will obviously need to be far more than 4 hidden neurons for any meaningful results. For a neural network to be useful, the weighting factors for each input to each hidden layer sigmoid neuron must be defined. To do so, a training process must be undertaken. The training process requires a large set of already known input/output pairings. In this case, this known set is the available previous vehicle qualification runs, which have known inputs (such as commanded speed) and measured output (such as actual speed). Initially in the training process, a random set of weights is defined. The output is then calculated and compared to the actual output. This is the error in the neural network for the current “evolution”. The weights are then adjusted (shown as Δw in Figure 2) and the ANN resolved. This process is repeated until the error is below an acceptable value or a preset number of evolutions has been achieved [9]. There are several methods for determining the amounts by which to adjust each individual weight. One of the easiest to implement and most computationally efficient is the optimization method of stochastic gradient decent. Gradient descent is a well-known mathematical model for finding minima and maxima. Stochastic methods are employed to introduce an element of randomness into the optimization routine. This allows for the optimization to escape local minima and maxima during the solution and continue improving on the solution through many evolutions [10]. While stochastic gradient decent is efficient, it is still very computationally intensive when solving the weights for many (hundreds or more) hidden layer sigmoid neurons. That is why the recent sustained exponential growth in available computing power has been critical to making ANNs practical. Once the ANN weights are solved, it takes very little computational resources to run new inputs through the ANN to find the output. There have been several advances in mathematical methods in recent years that have made ANNs much more powerful and extensible to more applications. However, for the purpose of this paper, using the methods already outlined is sufficient. 2 ANN SETUP A simple ANN was set up that was capable of being run on a single desktop computer with 4 GB RAM. This ANN was built using the Netlab MATLAB toolbox developed by Nabney [11]. The training data was taken from 20 qualification runs of an undersea vehicle. This gave 64,779 unique “time steps”. Each “time step” represents a discrete amount of runtime. Time and speeds have been non-dimensionalized. For each “time step”, input values must be provided to the ANN. For the engine of this vehicle, like many other vehicles, the only true control input is commanded speed. All other engine parameters are adjusted internally for the goal of matching that commanded speed as closely as possible. Though not strictly a “control” parameter, the other engine input is the amount of energy reserves remaining (and, by extension, the amount of reserves that has already been used). For various systems, this could take the form of percentage of combustible fuel remaining in a tank, remaining battery power, etc. For many systems, such as the one under study, this energy reserves input also functions as a “state of health” parameter (i.e. for electric systems, motors may not perform optimally once the batteries drop below a threshold voltage). From these general “inputs”, the specific input data that was deemed pertinent to be provided to the ANN is as follows… 1. 2. Speed Command Information… a. Current Commanded Speed b. Time at Current Commanded Speed c. Previous Commanded Speed % of Energy Reserves Depleted (termed “Utilization” for the purposes of this paper) Also provided for training the ANN was the actual measured vehicle speed for each data point. The “success” of the ANN training would be determined by comparing the actual vehicle measured speed to the ANNs predicted vehicle speed. The ANN was initialized to have 750 hidden sigmoid neurons. The training was set to terminate after 750,000 evolutions. This is about 48 hours of computation time on a PC with an Intel Core i5-2400 CPU running at 3.1 GHz. To assist with visualization of the training process of this specific ANN, the notation from Figure 2 is used in Figure 3 below, depicting the ANN setup. The routine of Figure 3 would be run once for each time step each evolution (64,779 times every evolution for this data set). Figure 3. ANN setup and training visualization Statement A: Approved for Release. Distribution is unlimited. 3 1 Nondimensionalized Speed 0.9 0.8 0.7 0.6 0.5 0.4 0 0.1 0.2 0.3 0.4 0.5 0.6 Nondimensionalized Time 0.7 0.8 0.9 1 Figure 4. Full ANN results Statement A: Approved for Release. Distribution is unlimited. Consistently low prediction of high speed command performance 0.9 0.8 Nondimensionalized Speed ANN RESULTS Figure 4 above shows the commanded speed (dark blue line) and the ANN’s prediction for actual speed (red line). Also given is the true actual speed as measured in the qualification tests (light blue line).Quick inspection of Figure 4 shows that the ANN has largely succeeded in matching the general speed response. However, there are several spans of time where the ANN fails to predict any more accurately than simply guessing that the actual speed is equal to the commanded speed. The most obvious example is during long periods of constant speed, known as steady state. Conversely, there are several spans where the ANN prediction is much more accurate than any traditional algorithm could be, such as during speed changes (transients) It is critical to attempt to understand the reasons why the ANN is very accurate or not accurate in various situations. If these reasons can be well understood, then adjustments can be made to the ANN training routine to address deficiencies and promote strengths. Examples would be providing additional input information, working to obtain test data for situations where the ANN shows deficiencies, changing the number of hidden neurons, or adjusting the evolutions to simulation completion. To that end, the remainder of this section of the paper examines three specific performance cases where the ANN shows interesting prediction behavior. The upcoming Figures 5, 6, and 7 all show magnified subsets of data from Figure 4, to allow for in-depth analysis. 0.7 0.6 0.5 0.4 0.3 0.2 0.1 0.42 0.44 0.46 0.48 0.5 Nondimensionalized Time 0.52 0.54 0.56 Figure 5. ANN results, low predictions of high speed operation Figure 5 shows a magnified portion of the ANN data of Figure 4, from 0.42 to 0.56 of the nondimensional time. Added to the plot, that was not present in Figure 4, is the nondimensionalized utilization (% of energetics used), shown in magenta. Note that there are three separate “runs” shown, as the utilization resetting to zero is indicative of a new run. In this timeframe there are three instances of the vehicle being commanded to its highest speed. In all three instances, the ANN predicts the actual speed will only achieve about 80% of the full speed value. However, this is only true for one of the three occurrences; in the other two the vehicle does achieve 4 high speed operation. It is probable that the ANN is chronically under predicting the actual high speed operation as a “safe” prediction. This is because the speed sometimes undershoots, but almost never overshoots, a high speed command. The likelihood that the vehicle will undershoot the high speed command is increased at high vehicle utilization (near the end of an individual run- because effective control is more difficult), as it was in the one instance of undershooting in Figure 5. The ANN shows slight sensitivity to this as the high speed command in Figure 5 furthest to the right occurs at the lowest utilization; the ANN displays the highest predicted speed. However, the prediction is still too low, and the ANN clearly does not fully incorporate the link between utilization and the potential for undershooting. More run data which contains more high speed command operation at various utilizations would likely remedy this issue. Data overfitting during “staircase” speed increase Accurate prediction of transient performance Figure 7 shows a brief speed command of 0.8 nondimensionalized speed. The ANN predicted speed appears to match the actual speed of the vehicle closely over this time. However, the predicted speed is slowly increasing the entire time, as if “anticipating” the next speed command. The reason is that this speed change is part of a “staircase” pattern of speed changes, where the speed goes from the minimum to the maximum over a series of small changes in speed in rapid succession. These “staircase” patterns are very common in the training run data. Therefore, the ANN learned that when the speed changes from a moderate speed to just a slightly higher speed, in all likelihood it was in the middle of a “staircase” speed profile and should anticipate another small speed step up. However, it is obviously not always true that these small speed steps must be part of a “staircase” sequence. Therefore, the “anticipation” of the ANN for another immediate speed change is unwarranted and indicative of overfitting of the data [12]. This would be remedied by additional run data which showed small speed steps which are not part of a “staircase” pattern. Nondimensionalized Speed 0.65 0.6 0.55 0.5 0.45 0.4 0.45 0.452 0.454 0.456 0.458 Nondimensionalized Time 0.46 0.462 0.464 Figure 6. ANN results, transient performance Figure 6 shows one of the speed command changes in the data. During the transient, the ANN predicted speed showed a sharp drop then gradual step down to the final steady state speed, consistent with actual vehicle operation. This is a feature that a traditional algorithm would have trouble matching, particularly once data other than speed (temperatures, pressures, etc.), which may take a much longer time than speed to reach steady state, are considered. Statement A: Approved for Release. Distribution is unlimited. Nondimensionalized Speed 0.86 0.84 0.82 0.8 0.78 0.76 0.74 0.72 0.144 0.146 0.148 0.15 Nondimensionalized Time 0.152 0.154 Figure 7. ANN results, overfit solution CONCLUSIONS The results show that even simple ANNs show promise of outperforming traditional prediction methods for times in the data which are highly non-linear (such as speed transients). However, the simple ANN does not have adequate performance for all times, most notably during steady state operation. It is highly probably that the ANN would meet or exceed the performance of traditional algorithms if a more complex ANN were solved on a more powerful computer. A more fundamental limitation of the ANN performance may be the potential for overfitting of data. This is a result of not having a sufficiently large set of training data. Specifically, if the same sequence of speed steps is present in most data sets, the ANN will be highly accurate in predicting results for that exact sequence, but not when the sequence is altered slightly. Therefore, it is possible that even with an advanced ANN solved on a powerful computer, the size of the training data set could prove a limitation to ANN effectiveness. The mitigation for this problem is the inclusion of additional 5 data sets in the training data, especially those with a diverse mission profiles. FUTURE WORK The size of the training data set continues to increase, as qualification runs of the vehicle are ongoing. Additionally, computational power continues to become more and more readily available. Therefore, it is prudent to develop an advanced ANN framework now and run it with the existing data set with the understanding that the results may not yet outperform traditional algorithms or manual data analysis. However, with that framework in place, retraining the ANN with new data becomes a trivial exercise. As more data and computational power becomes available it can be expected that at some point the ANN will be provide the best predictive capability. At that point additional data channels (temperatures, pressures, etc.) can all be predicted using the same ANN framework. Once ANNs have been proven to reliably identify anomalies from post run data, it will be possible to extend their use into identifying anomalies during a run itself. For instance, if a vehicle behaves off-prediction by some margin, the ANN can alert the vehicle control which can then evaluate whether to issue an early termination of the run. Even further in the future, ANNs should be capable of assuming control for adjusting vehicle run parameters (flow rates, pressures, etc.) in real time to optimize vehicle performance. CLOSING REMARKS The conclusions of this paper (requiring more computational power and better mathematical techniques, but more importantly additional training data) are consistent with the needs of nearly all ANN projects currently in development. On the computational side, chipmakers are rushing to provide hardware designed specifically for ANN training and deployment [13]. This hardware leverages architecture traditionally used for intensive graphics processing. Brand new architecture is under development which will be even further optimized for machine learning and neural networks [14]. On the training data side, companies have been using devices owned and used by individuals to collect data to improve their algorithms. The most relevant of these to this paper might be Tesla Motors, which receives data from every one of its cars on the road to improve its “autopilot” (autonomous driving) feature [15]. Interestingly, this type of training data collection is a driving force in the recent public debate about the privacy of personal electronic devices. For instance, Google’s efforts to track cell phone activity stems from their desire to expand the training sets for the algorithms that control search result prioritization, traffic congestion prediction, language translation, and more [16]. NOMENCLATURE x = ANN training data input w = ANN sigmoid neuron weight Statement A: Approved for Release. Distribution is unlimited. ACKNOWLEDGMENTS The data for this paper was provided by ARL PSU from experiments performed under NAVSEA contract. We thank the entirety of ARL’s Energy Science and Power Systems division for the support and resources. The Netlab MATLAB toolbox which was utilized to perform the ANN training was developed at Aston University by Ian Nabney and Christopher Bishop. REFERENCES [1] Gao, Jim. Machine Learning Applications for Data Center Optimization. Rep. Mountain View: Google, 2013. Web. <https://docs.google.com/a/google.com/viewer?url=www.google.com/about/dat acenters/efficiency/internal/assets/machine-learning-applicationsfor-datacenteroptimization-finalv2.pdf>. [2] Le Cun, Y. "Handwritten Character Recognition Using Neural Network Architectures." 4th USPS Advanced Technology Conference (1990): n. pag. AT&T Bell Laboratories. Web. 20 Oct. 2015. <http://yann.lecun.com/exdb/publis/pdf/matan-90.pdf>. [3] Auli, Michael. "Joint Language and Translation Modeling with Recurrent Neural Networks." Microsoft Research (n.d.): n. pag. Microsoft. Web. 20 Oct. 2015. <http://research-srv.microsoft.com/enus/um/people/gzweig/Pubs/EMNLP2013RNNMT.pdf>. [4] Szegedy, Christian. "Building a Deeper Understanding of Images." Research Blog. Google, n.d. Web. 20 Oct. 2015. <http://googleresearch.blogspot.com/2014/09/building-deeper-understandingof-images.html#uds-search-results>. [5] Bergen, Mark. "Google's Neural Nets Can Now Translate Text Instantly, Practically Everywhere." Recode. Recode, 29 July 2015. Web. 20 Oct. 2015. <http://recode.net/2015/07/29/googles-neural-nets-can-now-translate-textinstantly-practically-everywhere/>. [6] Martendale, Jon. "Now Our Computers Can Forge Our Letters and Checks." Digital Trends. Digital Trends, 22 July 2015. Web. 20 Oct. 2015. <http://www.digitaltrends.com/computing/researcher-computer-handwriting/>. [7] "Neural Networks - Applications." Neural Networks - Applications. N.p., n.d. Web. 20 Oct. 2015. <http://cs.stanford.edu/people/eroberts/courses/soco/projects/neuralnetworks/Applications/stocks.html>. [8] Nielson, Michael A. Neural Networks and Deep Learning. N.p.: Determination, 2015. Determination Press. Web. 20 Oct. 2015. <http://neuralnetworksanddeeplearning.com/chap1.html>. [9] Bishop, Christopher M. Neural Networks for Pattern Recognition. Oxford: Clarendon, 1995. Print. [10] Bottou, Leon. "Stochastic Gradient Descent Tricks." Microsoft Esearch (n.d.): n. pag. Web. 20 Oct. 2015. <http://research.microsoft.com/pubs/192769/tricks-2012.pdf>. [11] Nabney, Ian T. NETLAB: Algorithms for Pattern Recognition. London: Springer, 2003. Print. [12] "Documentation." Improve Neural Network Generalization and Avoid Overfitting. Mathworks, n.d. Web. 20 Oct. 2015. <http://www.mathworks.com/help/nnet/ug/improve-neural-networkgeneralization-and-avoid-overfitting.html>. [13] Ferrucci, David. "AI MAGAZINE." Building Watson: An Overview of the DeepQA Project. AAAI, Aug. 2007. Web. 03 Feb. 2016. <http://www.aaai.org/ojs/index.php/aimagazine/article/view/2303/2165>. [14] Colaner, Seth. "Movidius, Google Team Up To Leverage Deep Learning On Mobile Devices." Tom's Hardware. Tom's Hardware, 27 Jan. 2016. Web. 3 Feb. 2016. <http://www.tomshardware.com/news/movidius-google-deeplearning-mobile-devices,31078.html>. [15] Fehrenbacher, Katie. "How Tesla Is Ushering in the Age of the Learning Car." How Tesla Is Ushering in the Age of the Learning Car Comments. Fortune, 16 Oct. 2015. Web. 03 Feb. 2016. <http://fortune.com/2015/10/16/how-tesla-autopilot-learns/>. [16] Lafrance, Adrienne. "The Convenience-Surveillance Tradeoff." The Atlantic. Atlantic Media Company, 14 Jan. 2016. Web. 03 Feb. 2016. <http://www.theatlantic.com/technology/archive/2016/01/the-conveniencesurveillance-tradeoff/423891/>. 6 ANNEX A INPUT FILE TO NETLAB TOOLBOX (MATLAB CODE) % Running this script requires installation of Netlab 3.3 MATLAB toolbox % Netlab toolbox available at http://www.aston.ac.uk/eas/research/groups/ncrg/resources/netlab/downloads/ % Script derived from standard Netlab input file, demmlp1.m, by Ian T Nabney clear all; clc % Input arrays must be initialized to variable 'x' as follows... % First Column = Current Commanded Speed % Second Column = Previous Commanded Speed (0 if run just started) % Third Column = Time Since Last Speed Command Change % Fourth Column = Current Utilization % Set up network parameters. nin = 4; % Number of inputs. (see input array comment above) nhidden = 750; % Number of hidden sigmoid neurons. nout = 1; % Number of outputs. alpha = .1; % Coefficient of weight-decay prior. % Create and initialize network weight vector. net = mlp(nin, nhidden, nout, 'linear', alpha); % Set up vector of options for the optimiser. options = zeros(1,18); options(1) = 1; % This provides display of error values. options(14) = 75000; % Number of training cycles. % Run Netlab to train neural network [net, options] = netopt(net, options, x, t, 'scg'); % Use neural network to generate predicted speeds y = mlpfwd(net, x); Statement A: Approved for Release. Distribution is unlimited. 7 ANNEX B VALIDATION SET Several months after the ANN described in this paper had been trained, new field test data became available. This new data was used as a “validation set”, in order to test the efficacy of the ANN without re-training. The results are shown in Figure B-1 below. 1 0.9 0.8 Nondimensionalized Speed 0.7 0.6 0.5 0.4 0.3 0.2 0.1 0 0 0.1 0.2 0.3 0.4 0.5 0.6 Nondimensionalized Time 0.7 0.8 0.9 1 Figure B-1. Validation Set Results A few observations from the ANN results are given below.  Non-dimensionalized time = 0. The ANN is unable to capture the speed change at “startup”. This is likely because there are relatively few “startups” in the training data (there is only 1 startup per field test, with 20 field tests used in the training data).  Non-dimensionalized time = 0.25. Through this speed step, the ANN predicts a near-constant speed that is the average of the speed transient. This is likely due to an insufficiently advance algorithm, as the ANN “settled” into minimizing error by picking a mid-point speed, rather than accurately modeling the transient.  Non-dimensionalized time = 0.3. The ANN anticipated a speed “overshoot” during this transient, which did not occur. Analysis of the training data shows that, on several occasions, an “overshoot” did happen at this speed. Therefore, this ANN error is the results of an insufficient number of training sets that do not have an overshoot during a similar speed step.  Non-dimensionalized time = 0.55. The ANN correctly predicts a speed “undershoot” during this transient.  Non-dimensionalized time = 0.6 through end of run. The ANN predicts that the speed will be much less than the actual speed through the end of the run. This is likely due to previous runs in the training set that have failed to maintain speed late in run. Therefore, more training data is necessary for the ANN to be able to distinguish the characteristics of runs that will and will not be able to maintain speed. From the results, we can calculate the accumulated error using two speed prediction methods. The first method is simply presuming the actual speed is equal to the setpoint (this will be referred to as the “Non-ANN Method”). It should be noted that this method could be improved by simple algorithms, such as assuming a time constant for speed changes, but that is not the focus of this analysis. The second method is the prediction of the ANN. The error Statement A: Approved for Release. Distribution is unlimited. 8 of each of these methods can be calculated as the absolute value of prediction minus the actual speed. A graph of accumulated error is shown in Figure B-2 below. Accumulated Error (|Prediction Speed - Actual Speed|) 300 250 200 150 100 50 0 0 0.1 0.2 0.3 0.4 0.5 0.6 Nondimensionalized Time 0.7 0.8 0.9 1 Figure B-2. Accumulated Error from Non-ANN and ANN Speed Prediction Methods on Validation Set Figure B-2 shows that the Non-ANN and ANN methods for speed prediction have nearly the same error accumulation rate until late in the data set (second to last speed change). This is an encouraging sign that with additional training-set data and more advanced ANN methods, neural networks will be practical tools for predicting vehicle performance in the near future. In summary, the results of this validation set reinforce the assertions made in the conclusion of this paper that ANN performance can be improved with more advanced methods and more computing power, but more training data will be needed as well. Statement A: Approved for Release. Distribution is unlimited. 9
9cs.NE
Feature Engineering for Predictive Modeling using Reinforcement Learning Udayan Khurana, Horst Samulowitz, Deepak Turaga Abstract 1.00 100 0.75 80 0.50 sin(0.32x) Feature engineering is a crucial step in the process of predictive modeling. It involves the transformation of given feature space, typically using mathematical functions, with the objective of reducing the modeling error for a given target. However, there is no well-defined basis for performing effective feature engineering. It involves domain knowledge, intuition, and most of all, a lengthy process of trial and error. The human attention involved in overseeing this process significantly influences the cost of model generation. We present a new framework to automate feature engineering. It is based on performance driven exploration of a transformation graph, which systematically and compactly enumerates the space of given options. A highly efficient exploration strategy is derived through reinforcement learning on past examples. 60 x arXiv:1709.07150v1 [cs.AI] 21 Sep 2017 {ukhurana,samulowitz,turaga}@us.ibm.com IBM TJ Watson Research Center 40 0.25 0.00 0.25 0.50 20 0 0.75 1.00 0 20 40 t 60 (a) Original data 80 100 0 20 40 t 60 80 100 (b) Engineered data. Figure 1: Illustration of different representation choices. Introduction Predictive analytics are widely used in support for decision making across a variety of domains including fraud detection, marketing, drug discovery, advertising, risk management, amongst several others. Predictive models are constructed using supervised learning algorithms where classification or regression models are trained on historical data to predict future outcomes. The underlying representation of the data is crucial for the learning algorithm to work effectively. In most cases, appropriate transformation of data is an essential prerequisite step before model construction. For instance, Figure 1 depicts two different representations for points belonging to a classification problem dataset. On the left, one can see that instances corresponding to the two classes are present in alternating small clusters. For most machine learning (ML) algorithms, it is hard to draw a reasonable classifier on this representation that separates the two classes On the other hand if the feature x is replaced by its sine, as seen in the image on the right, it makes the two classes reasonably separable by most classifiers. The task or process of altering the feature representation of a predictive modeling problem to better fit a training algorithm is called feature engineering (FE). The sine function is an instance of a transformation used to perform FE. Consider the schema of a dataset for forecasting hourly bike rental demand1 in Figure 2(a). Deriving several features (Figure 2(b)) dramatically reduces the modeling error. For instance, extracting 1 https://www.kaggle.com/c/bike-sharing-demand the hour of the day from the given timestamp feature helps to capture certain trends such as peak versus non-peak demand. Note that some valuable features are derived through a composition of multiple simpler functions. FE is perhaps the central task in improving predictive modeling performance, as documented in a detailed account of the top performers at various Kaggle competitions (Wind 2014). In practice, FE is orchestrated by a data scientist, using hunch, intuition and domain knowledge based on continuously observing and reacting to the model performance through trial and error. As a result, FE is often timeconsuming, and is prone to bias and error. Due to this inherent dependence on human decision making, FE is colloquially referred to as “an art/science” 2 3 , making it difficult to automate. The existing approaches to automate FE are either computationally expensive evaluation-centric and/or lack the capability to discover complex features. We present a novel approach to automate FE based on reinforcement learning (RL). It involves training an agent on FE examples to learn an effective strategy of exploring available FE choices under a given budget. The learning and application of the exploration strategy is performed on 2 http://www.datasciencecentral.com/profiles/blogs/ feature-engineering-tips-for-data-scientists 3 https://codesachin.wordpress.com/2016/06/25/ non-mathematical-feature-engineering-techniques-for-data-science/ (a) Original features and target count. (b) Additionally engineered features using our technique. Figure 2: In Kaggle’s biking rental count prediction dataset, FE through our technique reduced Relative Absolute Error from 0.61 to 0.20 while retaining interpretability of features. a transformation graph, a directed acyclic graph representing relationships between different transformed versions of the data. To the best of our knowledge, this is the first work that learns a performance-guided strategy for effective feature transformation from historical instances. Also, this is the only work in FE space that provides an adaptive budget constrained solution. Finally, the output features are compositions of well-defined mathematical functions which make them human readable and usable as insights into a predictive analytics problem, such as the one illustrated in Figure 2(b). Related Work Given a supervised learning dataset, FICUS (Markovitch and Rosenstein 2002) performs a beam search over the space of possible features, constructing new features by applying “constructor functions” (e.g. inserting an original feature into a composition of transformations). FICUS’s search for better features is guided by heuristic measures based on information gain in a decision tree, and other surrogate measures of performance. In constrast, our approach optimizes for the prediction performance criterion directly, rather than surrogate criteria, and that we require no constructor functions. Note that FICUS is more general than a number of less recent approaches (Ragavan et al. 1993; Bagallo and Haussler 1990; Yang, Rendell, and Blix 1991; Matheus and Rendell 1989; Hu and Kibler 1996). Fan et al. (Fan et al. 2010) propose FCTree uses a decision tree to partition the data using both original and constructed features as splitting points (nodes in the tree). As in FICUS (Markovitch and Rosenstein 2002), FCTree uses surrogate tree-based information-theoretic criteria to guide the search, as opposed to the true prediction performance. FCTree is capable of generating only simple features, and is not capable of composing transformations, i.e. it is search in a smaller space than our approach. They also propose a weight update mechanism that helps identify good transformations for a dataset, such that they are used more frequently. The Deep Feature Synthesis component of Data Science Machine (DSM) (Kanter and Veeramachaneni 2015) relies on applying all transformations on all features at once (but no combinations of transformations), and then performing feature selection and model hyper-parameter optimization over the combined augmented dataset. A similar approach is adopted by One Button Machine (Lam et al. 2017). We will call this category as the expansion-reduction approach. This approach suffers performance performance and scalability bottleneck due to performing feature selection on a large number of features that are explicitly generated by simultaneous application of all transforms. In spite of the expansion of the explicit expansion of the feature space, it does not consider the composition of transformations. FEADIS (Dor and Reich 2012) relies on a combination of random feature generation and feature selection. It adds constructed features greedily, and as such requires many expensive performance evaluations. A related work, ExploreKit (Katz et al. 2016) expands the feature space explicitly. It employs learning to rank the newly constructed features and evaluating the most promising ones. While this approach is more scalable than the expand-select type, it still is limited due to the explicit expansion of the feature space, and hence time-consuming. For instance, their reported results were obtained after running FE for days on moderately sized datasets. Due to the complex nature of this method, it does not consider compositions of transformations. We refer to this approach of FE as evolution-centric. Cognito (Khurana et al. 2016) introduces the notion of a tree-like exploration of transform space; they present a few simple handcrafted heuristics traversal strategies such as breadth-first and depth-first search that do not capture several factors such as adapting to budget constraints. This paper generalizes the concepts introduced there. LFE (Nargesian et al. 2017) proposes a learning based method to predict the most likely useful transformation for each feature. It considers features independent of each other; it is demonstrated to work only for classification so far, and does not allow for composition of transformations. Other plausible approaches to FE are hyper-parameter optimization (Bergstra et al. 2011) where each transformation choice could be a parameter, black-box optimization strategies (Li et al. 2016), or bayesian optimization such as the ones for model- and feature-selection (Feurer et al. 2015). To the best of our knowledge, these approaches have been employed for solving FE. (Smith and Bull 2003) employ a genetic algorithm to determine a suitable transformation for a given data set, but is limited to single transformations. Certain ML methods perform some level of FE indirectly.A recent survey on the topic appears can be found here (Storcheus, Rostamizadeh, and Kumar 2015). Dimensionality reduction methods such as Principal Component Analysis (PCA) and its non-linear variants (Kernel PCA) (Fodor 2002) aim at mapping the input dataset into a lower-dimensional space with fewer features.Such methods are also known as embedding methods (Storcheus, Rostamizadeh, and Kumar 2015). Kernel methods (ShaweTaylor and Cristianini 2004) such as Support Vector Machines (SVM) are a class of learning algorithms that use kernel functions to implicitly map the input feature space into a higher-dimensional space. Multi-layer neural networks allow for useful features to be learned automatically, such that they minimize the training loss function. Deep learning methods have made remarkable successes on various data such as video, image and speech, where manual FE is very tedious. (Bengio, Courville, and Vincent 2013). However, deep learning methods require massive amounts of data to avoid overfitting and are not suitable for problems instances of small or medium sizes, which are quite common. Additionally, deep learning has mostly been successful with video, image, speech and natural language data, whereas the general numerical types of data encompasses a wide variety of domains and need FE. Our technique is domain, and model independent and works generally irrespective of the scale of data. Also, the features learned by a deep network may not always be easily explained, limiting application domains such as healthcare (Che et al. 2015). On the contrary, features generated by our algorithm are compositions of well-understood mathematical functions that can be analyzed by a domain expert. Overview The automation of FE is challenging computationally, as well as in terms of decision-making. First, the number of possible features that can be constructed is unbounded since transformations can be composed, i.e., applied repeatedly to features generated by previous transformations. In order to confirm whether a new feature provides value, it requires training and validation of a new model upon including the feature. It is an expensive step and infeasible to perform with respect to each newly constructed feature. The evolution-centric approaches described in the Related Work section operate in such manner and take days to complete even on moderately-sized datasets. Unfortunately, there is no reusability of results from one evaluation trial to another. On the other hand, the expansion-reduction approach performs fewer or only one training-validation attempts by first explicitly applying all transformations, followed by feature selection on the large pool of features. It presents a scalability and speed bottleneck itself; in practice, it restricts the number of new features than can be considered. In both cases, there is a lack of performance oriented search. With these insights, our proposed framework performs a systematic enumeration of the space of FE choices for any given dataset through a transformation graph. Its nodes represent different versions of a given datasets obtained by the application of transformation functions (edges). A transformation when applied to a dataset, applies the function on all possible features (or sets of features in case non-unary functions), and produces multiple additional features, followed by optional feature selection, and training-evaluation. Therefore, it batches the creation of new features by each transformation function. This lies somewhat in the middle of the evolution-centric and the expansion-reduction approaches. It not only provides a computation advantage, but also a logical unit of measuring performance of various transforms, which is used in composing different functions in a performance-oriented manner. This translates the FE problem to finding the node (dataset) on the transformation graph with the highest cross-validation performance, while only exploring the graph as little as possible. It also allows for composition of transformation functions. Secondly, the decision making in manual FE exploration involves initiation and complex associations, that are based on a variety of factors. Some examples are: prioritizing transformations based on the performance with the given dataset or even based on past experience; whether to explore different transformations or exploit the combinations of the ones that have shown promise thus far on this dataset, and so on. It is hard to articulate the notions or set of rules that are the basis of such decisions; hence, we recognize the factors involved and learn a strategy as a function of those factors in order to perform the exploration automatically. We use reinforcement learning on FE examples on a variety of datasets, to find an optimal strategy. This is based on the transformation graph. The resultant strategy is a policy that maps each instance of the transformation graph to the action of applying a transformation on a particular node in the graph. Notation and Problem Description Consider a predictive modeling task consisting of (1) a set of features, F = {f1 , f2 . . . fm }; (2) a target vector, y. A pair of the two is specified as a dataset, D = hF, yi. The nature of y, whether categorical or continuous, describes if it is a classification or regression problem, respectively. For an applicable choice of learning algorithm L (such as Random Forest or Linear Regression) and a measure of performance, m (such as AUROC or -RMSE). We use Am L (F, y) (or simply, A(F ) or A(D)) to signify the cross-validation performance of a the model constructed on given data with using the algorithm L through the performance measure m. Additionally, consider a set of k transformation functions at our disposal, T = {t1 , t2 . . . tk }. The application of a transformation on a set of features, t(F ), suggests the application of the corresponding function on all valid input feature subsets in F , applicable to t. For instance, a square transformation applied to a set of features, F with eight numerical and two categorical features will produce eight new output features, fo = square(fi ), ∀fi ∈ F, fi ∈ Rn . This extends to k-ary functions, which work on k input features. A derived feature is recognized with a hat, fˆ. The entire (open) set of derived features from F is denoted by F̂ . A ‘+’ operator on two feature sets (associated with the same target y) is a union of the two feature sets, Fo = F1 + F2 = F1 ∪ F2 , preserving row order. Generally, transformations add features; on the other hand, a feature selection operator, which is to a transformation in the algebraic notation, removes features. Note that all operations specified on a feature set , T (F ), can exchangeably be written for a corresponding dataset, D = hF, yi, as, T (D), where it is implied that the operation is applied on the corresponding feature set. Also, for a binary, such as sum, Do = D1 + D2 , it is implied that the target is common across the operands and the result. The goal of feature engineering is stated as follows. Given a set of features, F , and target, y, find a set of features, F ∗ where each feature is in F ∗ = F1 ∪ F2 , where F1 ⊆ F (original) and F2 ⊂ F̂ (derived), to maximize the modeling accuracy for a given algorithm, L and measure, m. F ∗ = arg max Am L (F1 ∪ F2 , y) F1 ,F2 (1) even a height bounded tree with a modest number of transforms, computing the cross-validation performance across the entire graph is computationally expensive. D0 log square sum D1 sum D2 square FS1 square log D6 D4 D5 Graph Exploration under a Budget Constraint D3 D7 log sum D8 D9 D10 D4,9 =D4+D9 D5,3 =D5+D3 Figure 3: Example of a Transformation Graph (a DAG). The start node D0 corresponds to the given dataset; that and the hierarchical nodes are circular. The sum nodes are rectangular. In this example, we can see three transformations, log, sum, and square, as well as a feature selection operator F S1 . Transformation Graph Transformation Graph, G, for a given dataset, D0 , and a finite set of transformations, T , is a directed acyclic graph in which each node corresponds to a either D0 or a dataset derived from it through transformation path. Every node’s dataset contains the same target and number of rows. The nodes are divided into three categories: (a) The start or the root node, D0 corresponding to the given dataset; (b) Hierarchical nodes, Di , where i > 0, which have one and only one incoming node from a parent node Dj , i > j ≥ 0, and the connecting edge from Dj to Di corresponds to a transform T ∈ T (including feature selection), i.e., Dj = T (Di ); + (c) Sum nodes, Di,j = Di + Dj , a result of a dataset sum such that i 6= j. Similarly, edges correspond to either transforms or ‘+’ operations, with children as type (b) or type (c) nodes, respectively. The direction of an edge represents the application of transform from source to a target dataset (node). Height (h) of the transformation graph refers to the maximum distance between the root and any other node. A transformation graph is illustrated in Figure 3. Each node of a transformation graph is a candidate solution for the FE problem in Equation 1. Also, a complete transformation graph must contain a node that is the solution to the problem, through a certain combination of transforms including feature selection. The operator θ(G) signifies all nodes of graph G, and θh (G) signifies all hierarchical nodes. Also, λ(Di , Dj ) signifies the transformation T , such that its application on Di created Dj as its child; alternatively if Dj is a sum node and Di is one of its parents, then λ(Di , Dj ) = +. A complete transformation graph is unbounded for a nonempty transformation set. A constrained (bounded height, h) complete transformation graph for t transformations will have th+1 − 2 hierarchical nodes (and an equal number h+1 h+1 −2) of corresponding edges), and (t −1)×(t sum nodes 2 (and 2 times corresponding edges). It can be seen that for It should be emphasized that the exhaustive exploration of a transformation graph is not an option, given its massive potential size. For instance, with 20 transformations and a height = 5, the complete graph contains about 3.2 million nodes; an exhaustive search would imply as many model training and testing iterations. On the other hand, there is no known property that allows us to deterministically verify the optimal solution in a subset of the trials. Hence, the focus of this work is to find a performance driven exploration policy, which maximizes the chances of improvement in accuracy within in a limited time budget. The exploration of the transformation graph begins with a single node, D0 , and grows one node at a time from the then current state of the graph. In the beginning it is reasonable to perform exploration of the environment, i.e., stumble upon the transforms that signal an improvement. Over time (elapsed budget) it is desirable to reduce the amount of exploration and focus more on exploitation. Algorithm 1: Transformation Graph Exploration Input: Dataset D0 , Budget Bmax ; Initialize G0 with root D0 ; while i < Bmax do N ← θ(Gi ); i bratio = Bmax n∗ , t∗ ← arg max R(Gi , n, t, bratio ) n,t@n0 ∀t=λ(n,n0 ) Gi+i ← Apply t∗ to n∗ in Gi i ← i + 1; Output: argmax A(θ(Gi )) D Algorithm 1 outlines our general methodology for exploration. At each step, an estimated reward from each posi sible move, R(Gi , n, t, Bmax ) is used to rank the options of actions available at each given state of the transformation graph Gi , ∀i ∈ [0, Bmax ), where Bmax is the overall allocated budget in number of steps4 . Note that the algorithm allows for different exploration strategies, which is left up to the definition of the function R(. . . ), which defines the relative importance of different steps at each step. The parameters of the function suggest that it depends on the various aspects of the graph at that point, Gi , the remaining budget, and specifically, attributes of the action (node+transformation) being characterized. Below, we briefly discuss such factors that influence the exploration choice at each step. These factors are compared across all choices of node-transformation pairs < n, t > at Gi : 4 Budget can be considered in terms of any quantity that is monotonically increasing in i, such as time elapsed. For simplicity, we work with “number of steps”. 1. Node n’s Accuracy: Higher accuracy of a node incentives further exploration from that node, compared to others. 2. Transformation, t’s average immediate reward till Gi . 3. Number of times transform t has already been used in the path from root node to n. 4. Accuracy gain for node n (from its parent) and gain for n’s parent, i.e., testing if n’s gains are recent. 5. Node Depth: A higher value is used to penalize the relative complexity of the transformation sequence. 6. The fraction of budget exhausted till Gi . 7. Ratio of feature counts in n to the original dataset: This indicates the bloated factor of the dataset. 8. Is the transformation a feature selector? 9. Whether the dataset contain (a) numerical features; or (b) datetime features; or (c) string features? Simple graph traversal strategies can be handcrafted. A strategy essentially translates to the design of the reward estimation function, R(. . . ). In line with Cognito (Khurana et al. 2016), a breadth-first or a depth-first strategy, or perhaps a mix of them can be described. While such simplistic strategies work suitably in specific circumstances, it seems hard to handcraft a unified strategy that works well under various circumstances. We instead turn to machine learning to learn the complex strategy from several historical runs. Traversal Policy Learning So far, we have discussed a hierarchical organization of FE choices through a transformation graph and a general algorithm to explore the graph in a budget allowance. At the heart of the algorithm is a function to estimate reward of an action at a state. The design of the reward estimation function determines the strategy of exploration. Strategies could be handcrafted; however, in this section we try to learn an optimal strategy from examples of FE on several datasets through transformation graph exploration. Because of the behavioral nature of this problem - which can be perceived as continuous decision making (which transforms to apply to which node) while interacting with an environment (the data, model, etc.) in discrete steps and observing reward (accuracy improvement), with the notion of a final optimization target (final improvement in accuracy), it is modeled as a RL problem. We are interested in learning an action-utility function to satisfy the expected reward function, R(. . . ) in Algorithm 1. In the absence of an explicit model of the environment, we employ Q-learning with function approximation due to the large number of states (recall, millions of nodes in a graph with small depth) for which it is infeasible to learn state-action transitions explicitly. Consider the graph exploration process as a Markov Decision Process (MDP) where the state at step i is a combination of two components: (a) transformation graph after i node additions, Gi (G0 consists of the root node corresponding to the given dataset. Gi contains i nodes); (b) the remaini ing budge at step i, i.e., bratio = Bmax . Let the entire set of states be S. On the other hand, an action at step i is a pair of existing tree node and transformation, i.e., < n, t > where n ∈ θ(Gt ), t ∈ T and @n ∈ Gi ∀λ(n, n0 ) = t; it signifies the application of the one transform (which hasn’t already been applied) to one of the exiting nodes in the graph. Let the entire set of actions be C. A policy, Π : S → C, determines which action is taken given a state. Note that the objective of RL here is to learn the optimal policy (exploration strategy) by learning the action-value function, which we elaborate later in the section. Such formulation uniquely identifies each state. Considering the “remaining budget” as factor in the state of the MDP helps us address the runtime exploration versus exploitation trade-off for a given dataset. Note that this runtime explore/exploit trade-off is not identical to the commonly referred trade-off in RL training in context of selecting actions to balance reward and not getting stuck in a local optimum. At step i, the occurrence of an action results in a new node, ni , and hence a new dataset on which a model is trained and tested, and its accuracy A(ni ) is obtained. To each step, we attribute an immediate scalar reward: ri = max n0 ∈θ(Gi+1 ) A(n0 ) − max A(n) n∈θ(Gi ) with r0 = 0, by definition. The cumulative reward over time from state si onwards is defined as: R(si ) = BX max γ i .ri+j j=0 where γ ∈ [0, 1) is a discount factor, which prioritizes early rewards over the later ones. The goal of RL here is to find the optimal policy Π∗ that maximizes the cumulative reward. We use Q-learning (Watkins and Dayan 1992) with function approximation to learn the action-value Q-function. For each state, s ∈ S and action, c ∈ C, Q-function with respect to policy Π is defined as: Q(s, c) = r(s, c) + γRΠ (δ(s, c)) where δ : S × C → S is a hypothetical transition function, and RΠ (s) is the cumulative reward following state s. The optimal policy is: Π∗ (s) = arg max[Q(s, c)] (2) c However, given the size of S, it is infeasible to learn Q-function directly. Instead, a linear approximation the Qfunction is used as follows: Q(s, c) = wc .f (s) (3) c where w is a weight vector for action c and f (s) = f (g, n, t, b) is a vector of the state characteristics described in the previous section and the remaining budget ratio. Therefore, we approximate the Q-functions with linear combinations of characteristics of a state of the MDP. Note that, in each heuristic rule strategy, we used a subset of these state characteristics, in a self-conceived manner. However, in the ML based approach here, we select the entire set of characteristics and let the RL find the appropriate weights of those characteristics (for different actions). Hence, this approach generalizes the other handcrafted approaches. The update rule for wc is as follows: wcj ← wcj + α.(rj + γ. max Q(g 0 , c0 ) − Q(g, c)).f (g, b) 0 0 n ,t (4) where g 0 is the state of the graph at step j + 1, and α is the learning rate parameter. The proof follows from (Irodova and Sloan 2005). A variation of the linear approximation where the coefficient vector w is independent of the action c, is as follows: Q(s, c) = w.f (s) Handcrafted (5) This method reduces the space of coefficients to be learnt by a factor of c, and makes it faster to learn the weights. It is important to note that the Q-function is still not independent of the action c, as one of the factors in f (s) or f (g, n, t, b) is actually the average immediate reward for the transform for the present dataset. Hence, Equation 5 based approximation still distinguishes between various actions (t) based on their performance in the transformation graph exploration so far; however, it does not learn a bias for different transformations in general and based on the feature types (factor #9). We refer to this type of strategy as RL2 . In our experiments RL2 efficiency is somewhat inferior to the strategy to the strategy learned with Equation 3, which we refer to as RL1 . Experiments Training: We used 48 datasets (not overlapping with test datasets) to select training examples using different values for maximum budget, Bmax ∈ {25, 50, 75, 100, 150, 200, 300, 500} with each dataset, in a random order. We used the discount factor, γ = 0.99, and learning rate parameter, α = 0.05. The weight vectors, wc or w, each of size 12, were initialized with 1’s. The training example steps are drawn randomly with the probability  = 0.15 and the current policy with probability 1 − . We have used the following transformation functions in general (except when specified a smaller number): Log, Square, Square Root, Product, ZScore, Min-Max-Normalization, TimeBinning, Aggregation (using Min,Max,Mean,Count,Std), Temporal window aggregate, Spatial Aggregation, Spatio Temporal Aggregation, k-term frequency, Sum, Difference, Division, Sigmoid, BinningU, BinningD, NominalExpansion, Sin, Cos, TanH. Comparison: We tested the impact of our FE on 24 publicly available datasets (different from the datasets used in training) from a variety of domains, and of various sizes. We report the accuracy of (a) base dataset; (b) Our FE routine with RL1 , Bmax = 100; (c) Expansion-reduction implementation where all transformations are first applied separately and add to original columns, followed by a feature selection routine; (d) Random: randomly applying a transform function to a random feature(s) and adding the result to the original dataset and measuring the CV performance; this is repeated 100 times and finally, we consider all the new features whose cases showed an improvement in performance, along with the original features to train a model (e) Tree-Heur: our implementation of Cognito’s (Khurana et al. 2016) global search heuristic for 100 nodes. We used Random Forest with default Weka parameters as our learning algorithm for all the comparisons as it gave us the strongest baseline (no FE) average. A 5-fold cross validation using random stratified sampling was used. The results for a representative are captured in Table 1. It can be seen Learned Figure 4: Comparing efficiencies of exploration policies. that our FE outperforms others in most of the cases but one (where expand-reduce is better) and tied for two with Cognito global search. Our technique reduces the error (relative abs. error, or 1- mean unweighted FScore) by 23.8% (by median) for the 24 datasets presented in Table 1. For reference to time taken, it took the Bikeshare DC dataset 4 minutes, 40 seconds to run for 100 nodes for our FE, on a single thread on a 2.8GHz processor. Times taken by the Random and Cognito were similar to our FE for all datasets, while expand-reduce took 0.1 to 0.9 times the time of our FE, for different datasets. Traversal Policy Comparison: In Figure 4, we see that on an average for 10 datasets, the RL-based strategies are 4-8 times more efficient than any handcrafted strategy (breadthfirst, depth-first and global as described in (Khurana et al. 2016)), in finding the optimal dataset in a given graph with 6 transformations and bounded height, hmax = 4. Also, Figure 5 tells us that while RL1 (Eqn. 3) takes more data to train, it is more efficient than RL2 (Eqn. 5), demonstrating that learning a general bias for transformations and one conditioned on data types makes the exploration more efficient. Figure 5: Policy effectiveness with training dataset sources Dataset Higgs Boson Amazon Employee PimaIndian SpectF SVMGuide3 German Credit Bikeshare DC Housing Boston Airfoil AP-omentum-ovary Lymphography Ionosphere Openml 618 Openml 589 Openml 616 Openml 607 Openml 620 Openml 637 Openml 586 Credit Default Messidor features Wine Quality Red Wine Quality White SpamBase Source UCIrvine Kaggle UCIrvine UCIrvine LibSVM UCIrvine Kaggle UCIrvine UCIrvine OpenML UCIrvine UCIrvine OpenML OpenML OpenML OpenML OpenML OpenML OpenML UCIrvine UCIrvine UCIrvine UCIrvine UCIrvine C/R C C C C C C R R R C C C R R R R R R R C C C C C Rows 50000 32769 768 267 1243 1001 10886 506 1503 275 148 351 1000 1000 500 1000 1000 500 1000 30000 1150 999 4900 4601 Features 28 9 8 44 21 24 11 13 5 10936 18 34 50 25 50 50 25 50 25 25 19 12 12 57 Base 0.718 0.712 0.721 0.686 0.740 0.661 0.393 0.626 0.752 0.615 0.832 0.927 0.428 0.542 0.343 0.380 0.524 0.313 0.547 0.797 0.691 0.380 0.677 0.955 Our RL1 0.729 0.806 0.756 0.788 0.776 0.724 0.798 0.680 0.801 0.820 0.895 0.941 0.587 0.689 0.559 0.647 0.683 0.585 0.704 0.831 0.752 0.387 0.722 0.961 Exp-Red 0.682 0.744 0.712 0.790 0.711 0.680 0.693 0.621 0.759 0.725 0.727 0.939 0.411 0.650 0.450 0.590 0.533 0.581 0.598 0.802 0.703 0.344 0.654 0.951 Random 0.699 0.740 0.709 0.748 0.753 0.655 0.381 0.637 0.752 0.710 0.680 0.934 0.428 0.571 0.343 0.411 0.524 0.313 0.549 0.766 0.655 0.380 0.678 0.937 Tree-Heur 0.702 0.714 0.732 0.780 0.766 0.662 0.790 0.652 0.794 0.758 0.849 0.941 0.532 0.644 0.450 0.629 0.583 0.582 0.647 0.799 0.762 0.386 0.704 0.959 Table 1: Comparing performance for base dataset (no FE), Our FE, Expansion-Reduction style FE, Random FE, and Tree heuristic FE, using 24 datasets. Performance here is FScore for classification (C) and (1−rel. absolute error) for regression (R). exploration cost due to a higher depth. Also, using feature selection (compared to none) as a transform improves the final gain in performance by about 51%, measured on the 48 datasets (aforementioned 24 + another 24). Finally, the use of different models (learning algorithms) lead to different optimal features being engineered for the same dataset, even for similar improvements in performance. Conclusion and Future Work Figure 6: Performance vs. hmax Internal System Comparisons: We additionally performed experimentation to test and tune the internals of our system. Figure 6 shows the maximum accuracy node (for 5 representative datasets) found when the height was constrained to a different numbers, using Bmax = 100 nodes; hmax = 1 signifies base dataset. Majority of datasets find the maxima with hmax = 4 with most find it with hmax = 5. For hmax = 6, a tiny fraction shows deterioration, which can be interpreted as unsuccessful In this paper, we presented a novel technique to efficiently perform feature engineering for supervised learning problems. The cornerstone of our framework are, a transformation graph that enumerates the space of feature options and a RL-based, performance-driven exploration of the available choices to find valuable features. The models produced using our proposed technique considerably reduce the error rate (24% by median) across a variety of datasets, for a relatively small computational budget. This methodology can potentially save a data analyst hours to weeks worth of time. One direction to further improve the efficiency of the system is through a complex non-linear modeling of state variables. Additionally, extending the described framework to other aspects of predictive modeling, such as missing value imputation or model selection, is of potential interest as well. Since optimal features depend on model type (learning algorithm), a joint optimization of the two is particularly interesting. References [Bagallo and Haussler 1990] Bagallo, G., and Haussler, D. 1990. Boolean feature discovery in empirical learning. Machine learning 5(1):71–99. [Bengio, Courville, and Vincent 2013] Bengio, Y.; Courville, A.; and Vincent, P. 2013. Representation learning: A review and new perspectives. IEEE transactions on pattern analysis and machine intelligence 35(8):1798–1828. [Bergstra et al. 2011] Bergstra, J. S.; Bardenet, R.; Bengio, Y.; and Kégl, B. 2011. Algorithms for hyper-parameter optimization. In Shawe-Taylor, J.; Zemel, R. S.; Bartlett, P. L.; Pereira, F.; and Weinberger, K. Q., eds., Advances in Neural Information Processing Systems 24. Curran Associates, Inc. 2546–2554. [Che et al. 2015] Che, Z.; Purushotham, S.; Khemani, R.; and Liu, Y. 2015. Distilling knowledge from deep networks with applications to healthcare domain. arXiv preprint arXiv:1512.03542. [Dor and Reich 2012] Dor, O., and Reich, Y. 2012. Strengthening learning algorithms by feature discovery. Information Sciences 189:176–190. [Fan et al. 2010] Fan, W.; Zhong, E.; Peng, J.; Verscheure, O.; Zhang, K.; Ren, J.; Yan, R.; and Yang, Q. 2010. Generalized and heuristic-free feature construction for improved accuracy. 629–640. [Feurer et al. 2015] Feurer, M.; Klein, A.; Eggensperger, K.; Springenberg, J. T.; Blum, M.; and Hutter, F. 2015. Efficient and robust automated machine learning. NIPS. [Fodor 2002] Fodor, I. K. 2002. A survey of dimension reduction techniques. [Hu and Kibler 1996] Hu, Y.-J., and Kibler, D. 1996. Generation of attributes for learning algorithms. AAAI. [Irodova and Sloan 2005] Irodova, M., and Sloan, R. H. 2005. Reinforcement learning and function approximation. In FLAIRS Conference, 455–460. [Kanter and Veeramachaneni 2015] Kanter, J. M., and Veeramachaneni, K. 2015. Deep feature synthesis: Towards automating data science endeavors. IEEE Data Science and Advanced Analytics 1–10. [Katz et al. 2016] Katz, G.; Chul, E.; Shin, R.; and Song, D. 2016. Explorekit: Automatic feature generation and selection. In IEEE ICDM, 979–984. [Khurana et al. 2016] Khurana, U.; Turaga, D.; Samulowitz, H.; and Parthasarathy, S. 2016. Cognito: Automated feature engineering for supervised learning. In IEEE ICDM (Demo). [Lam et al. 2017] Lam, H. T.; Thiebaut, J.-M.; Sinn, M.; Chen, B.; Mai, T.; and Alkan, O. 2017. One button machine for automating feature engineering in relational databases. arXiv preprint arXiv:1706.00327. [Li et al. 2016] Li, L.; Jamieson, K. G.; DeSalvo, G.; Rostamizadeh, A.; and Talwalkar, A. 2016. Efficient hyperparameter optimization and infinitely many armed bandits. CoRR abs/1603.06560. [Markovitch and Rosenstein 2002] Markovitch, S., and Rosenstein, D. 2002. Feature generation using general constructor functions. Machine Learning. [Matheus and Rendell 1989] Matheus, C. J., and Rendell, L. A. 1989. Constructive induction on decision trees. IJCAI. [Nargesian et al. 2017] Nargesian, F.; Samulowitz, H.; Khurana, U.; Khalil, E. B.; and Turaga, D. 2017. Learning feature engineering for classification. In IJCAI, 2529–2535. [Ragavan et al. 1993] Ragavan, H.; Rendell, L.; Shaw, M.; and Tessmer, A. 1993. Complex concept acquisition through directed search and feature caching. IJCAI. [Shawe-Taylor and Cristianini 2004] Shawe-Taylor, J., and Cristianini, N. 2004. Kernel methods for pattern analysis. Cambridge university press. [Smith and Bull 2003] Smith, M. G., and Bull, L. 2003. Feature Construction and Selection Using Genetic Programming and a Genetic Algorithm. Berlin, Heidelberg: Springer Berlin Heidelberg. 229–237. [Storcheus, Rostamizadeh, and Kumar 2015] Storcheus, D.; Rostamizadeh, A.; and Kumar, S. 2015. A survey of modern questions and challenges in feature extraction. Proceedings of The 1st International Workshop on Feature Extraction, NIPS. [Watkins and Dayan 1992] Watkins, C. J., and Dayan, P. 1992. Q-learning. Machine learning 8(3-4):279–292. [Wind 2014] Wind, D. K. 2014. Concepts in predictive machine learning. Master’s thesis, Technical University of Denmark. [Yang, Rendell, and Blix 1991] Yang, D.-S.; Rendell, L.; and Blix, G. 1991. Fringe-like feature construction: A comparative study and a unifying scheme. ICML.
2cs.AI
Finite Blocklength Rates over a Fading Channel with CSIT and CSIR arXiv:1705.07863v3 [cs.IT] 13 Nov 2017 Deekshith P K and Vinod Sharma ECE Dept., Indian Institute of Science, Bangalore, India. Email: {deeks, vinod}@ece.iisc.ernet.in Abstract—In this work, we obtain lower and upper bounds on the maximal transmission rate at a given codeword length n, average probability of error  and power constraint P̄ , over a finite valued, block fading additive white Gaussian noise (AWGN) channel with channel state information (CSI) at the transmitter and the receiver. These bounds characterize deviation of the finite blocklength coding rates from the channel capacity which is in turn achieved by the water filling power allocation across time. The bounds obtained also characterize the rate enhancement possible due to the CSI at the transmitter in the finite blocklength regime. The results are further elucidated via numerical examples. I. I NTRODUCTION Next generation cellular networks ought to handle mission critical data with delay requirements far more stringent than that in present day cellular networks [1]. Refined engineering insights to build such delay critical systems can be obtained using the analytical methods pioneered in [2], [3], [4]. In this work, we characterize data rate enhancement in a wireless system with delay constraints by means of power adaptation, when the transmitter has certain side information about the channel. We restrict our attention to the delay incurred at the physical layer in sending the codeword to the receiver. In a cellular system, if the instantaneous channel gain can be fed back to the transmitter, the transmitter can use this knowledge to perform power control so as to increase the overall data rate. In particular, under the assumption of perfect CSI at the transmitter (CSIT) and the receiver (CSIR), the optimal power allocation with no delay constraints over a flat fading AWGN channel has the well known interpretation of water filling in time ([5]). With delay constraints imposed at the physical layer, the traditional approach to study rate enhancement due to the knowledge of CSIT is to first characterize either the delay limited, outage or average capacity (see [6] for details) and then obtain a power allocation strategy that maximizes the required one of these quantities. In this regard, [7] obtains the optimal power allocation that maximises the outage capacity under the assumption of non-causal CSIT. In [8], the authors obtain the optimal power allocation scheme maximizing the average capacity with causal CSIT. Nonetheless, the above mentioned schemes do not provide a realistic metric to evaluate the performance of actual delay sensitive systems. This is because, the various notions of capacity used therein are inherently asymptotic. In this work, we provide lower and upper bounds on the maximal channel coding rate over a block fading AWGN channel with CSIT and CSIR in finite blocklength regime under two kinds of constraints on the transmitted codewords. Consequently, we characterize the rate enhancement possible due to power adaptation at the transmitter. Our assumption of perfect CSIT is idealistic. Nevertheless, rates obtained under this assumption provide upper bounds for rates achievable without CSIT or with imperfect CSIT and is commonly made in literature. Also, knowledge of the power control strategies suitable for delay constrained systems sheds insights into how system energy is to be used in such systems. Efficient usage of system energy can be beneficial for energy constrained transmitters ought to become prominent in future wireless networks [9]. An overview of the preceeding works is presented next. A scalar coherent fading channel with stationary fading (generalization of block fading) without CSIT is considered in [10] and the dispersion term is characterized. In [11], the authors show that the (second order) optimal power allocation scheme over a quasi static fading channel with CSIT and CSIR is truncated channel inversion. The quasi static fading model is a special case of the block fading model that we consider. However, our bounds involve asymptotic terms, asymptotic in the number of blocks and is derived under the assumption of a finite valued fading process. A MIMO Rayleigh block fading channel with no CSIT and CSIR is considered in [12] and achievability and converse bounds are derived for the short packet communication regime. In [13], the authors consider a discrete memoryless channel with non-causal CSIT and CSIR, and obtains the second order coding rates under general assumptions on the state process. In contrast, we consider a cost constrained setting with real valued channel inputs. This renders a direct translation of the techniques used therein infeasible. A high-SNR normal approximation of the maximal coding rate over a block fading Rayleigh channel without CSIT and CSIR is obtained in [14]. Our contribution is a finer characterization of the delay limited performance of a wireless link with channel state feedback, under two kinds of power constraints the wireless transmitters are normally subjected to. The bounds obtained (on the maximal coding rate) characterize the rate enhancement due to power adaptation for a given codeword length and error probability. In deriving these bounds, the CSIT assumption makes the analysis involved and non trivial. In particular, in obtaining the upper bounds, the dependence of the channel input on the fading states makes the corresponding optimization problems difficult to solve. To circumvent this, we derive alternate bounds utilizing the properties of asymptotically optimal power allocation scheme, viz, the water filling scheme. The paper is organized as follows. In Section II, we introduce the system model and notation. We provide lower bounds on the maximal channel coding rate in Section III. Next, in Section IV, we provide upper bounds for the maximal coding rate. In Section V, we compare the bounds numerically and exemplify the utility of the bounds derived. We conclude in Section VI. Proofs are delegated to the appendices. II. M ODEL AND N OTATION We consider a point to point discrete time, memoryless block fading channel subject to AWGN noise with density 2 N (0, σN ), where N (a, b) denotes Gaussian density with mean a and variance b. The noise is independent and identically distributed (i.i.d.) across channel uses. Let Tc denote the channel coherence time which is the duration over which the gain of the underlying physical channel remains constant. Let D (in appropriate time units) denote the delay constraint imposed on the communication. Then, B = d TDc e denotes the number of blocks over which the communication spans (where dxe denotes the smallest integer ≥ x). Let nc denote the number of times the channel is used within a block. Then, the number of channel uses for the whole of communication, or equivalently, the codeword length n = Bnc . The channel gain or the fading coefficient in block b is denoted as Hb , which is a random variable taking values in a finite set H = {η1 , . . . , η|H| } such that min{ηi : 1 ≤ i ≤ |H|} > 0. Here |H| (the cardinality of the set) denotes the number of fading states. Let qi denote the probability of Hb taking value ηi and qi > 0. The channel gains are i.i.d. across blocks and is independent of the additive noise process. The instantaneous channel gains are assumed to be known to the transmitter as well as the receiver and the transmitter gets to know them only causally (we refer to it as the full CSIT and CSIR assumption). Let X(b−1)nc +k denote the channel input corresponding to the k th channel use in the bth block, where k ∈ {1, . . . , nc }, b ∈ {1, . . . , B}. For convenience, from here on, [bk] ≡ 2 )) and (b − 1)nc + k. Let Z[bk] (distributed as N (0, σN Y[bk] denote the corresponding noise variable and the channel output, respectively. Then, Y[bk] = Hb X[bk] + Z[bk] . If the delay D tends to infinity (and hence, the number of blocks B tends to infinity), it is well known that the channel capacity is given by ([5]) " #  1 H 2 PWF (H)  C(P̄ ) , EH log 1 + , (1) 2 2 σN  + σ2 where PWF (H) , λ − HN2 , (.)+ = max(0, .), EH [.] denotes the expectation with respect to the distribution of the random variable h i H and λ is obtained by solving the equation EH PWF (H) = P̄ . Here, PWF (.) is the water filling solution with average power constraint P̄ . We make note of certain notations that we use throughout.  Let C(x) , 12 log 1 + σx2 , L(x) , σ2 x+x , V (x) , N N  2  1 − 1 − L(x) . A set of positive integers {1, 2, . . . , N } is denoted as [1: N ]. Wherever required, Pnwe denote a sum of n numbers ak , k ∈ [1 : n] , k=1 ak , as Sn (a). We choose to represent the channel input and output vectors conveniently as a collection of B vectors, each of length nc . Thus, the channel input x ≡ (x1 , . . . , xn ) = (x1 , . . . , xB ), where xb = (x[b1] , . . . , x[bnc ] ), b ∈ [1 : B]. Similarly, we have the noise vector z = (z 1 , . . . , z B ) and the channel output vector y = (y 1 , . . . , y B ). Also, the vector of channel fading gains h = (h1 , . . . , hB ) is a collection of B scalars. Corresponding random variables are denoted as X, Z, Y and H. Let ηmin , min{ηi : i ∈ [1 : |H|]}, qmin , min{qi : i ∈ [1 : |H|]}. Similarly, the corresponding maximum values are denoted as ηmax and qmax , respectively. The Cartesian product of two sets S1 , S2 is denoted as S1 × S2 and n fold Cartesian product of sets S1 , . . . , Sn is denoted as S n . The set of integers is denoted as Z and the set of positive integers as Z+ . The real line is denoted as R, positive real line as R+ , the n dimensional Euclidean space by Rn and Rn+ , R+ ×. . .×R+ (n times). Given vectors x, y ∈ Rn , ||x|| denotes the Euclidean norm of x and hx, yi denotes the inner product between x and y. The variance of a random variable X is denoted as V[X]. The function Φ(.) denotes the cumulative distribution function (cdf) of a standard Gaussian random variable, φ(.) denotes the corresponding density function and Φ−1 (.) denotes its inverse cdf. The notation fn = o(gn ) is equivalent to lim fn /gn = 0. Also, fn = O(gn ) is equivalent n→∞ to |fn | ≤ K|gn |, for some constant K, for all n sufficiently large. The notation lim ≡ lim sup. To indicate relations that hold almost surely, we use the abbreviation a.s.. We use the D notation = to mean equivalence in distribution. We denote the indicator function of an event as 1A . The exponential function is denoted as exp(.). For any set A, Ac denotes its complement. All logarithms are taken to the natural base. 1 2 III. M AXIMAL C ODING R ATE : L OWER BOUNDS In this section, we will obtain lower bounds on the maximal coding rate for a given codeword length and average probability of error, under two different kinds of power constraints on the transmitted codewords. We have the following definitions. Let M ≡ [1 : M ] denote the message set. Let S be a uniformly distributed random variable, corresponding to the message transmitted, taking values in M. Given S ∈ M and the fading coefficients (H1 , . . . , Hb ), at k th instance of channel use in block b, the output of the encoder ζ[bk] : M × Hb → R is denoted as X[bk] . The decoder ψ : Rn × HB → M, on obtaining the (Y, H) pair, outputs an estimate of the message Ŝ. The encoding and decoding is done  so that the average probability of error P ψ(Y, H) 6= S ≤ , where  is prefixed. Throughout this work, we adhere to the average probability of error formalism. In this work, we consider two types of power constraints: ST : nc B X X b=1 k=1 a.s 2 ζ[bk] (m, H b ) ≤ Bnc P̄ , ∀m ∈ M. (2) " LT : EH nc B X X # 2 (m, H b ) ζ[bk] ≤ Bnc P̄ , ∀m ∈ M. (3) b=1 k=1 The constraint in equation (2) is referred to as the short term power constraint (ST) and that in (3), as the long term power constraint (LT). Studying a communication system under the ST constraint is motivated by the peak power limitations of the circuitry involved. Whereas, imposing the LT constraint captures the requirement of power utilization efficiency in a communication device (for instance, battery powered mobile radio transmitters). In addition, in a wireless communication setting, in studying systems which allocate resources (e.g., rate, power) dynamically, the LT constraint is a natural metric to consider. Though in reality these constraints are simultaneously present, in this work, we study them in isolation. For each of the above constraint, the goal is to characterize the maximum size (or cardinality) of the codebook with block length n and average probability of error , denoted as M ∗ (n, , P̄ ) ≡ M ∗ . The maximal coding rate R∗ (n, , P̄ ) ≡ R∗ = n−1 log M ∗ . Our first result gives a lower bound on log M ∗ under ST constraint. Theorem 1. For a block fading channel with input subject to a short term power constraint P̄ and average probability of error , the maximal codebook size M ∗ satisfies r q √ n ∗ log M ≥ nC(P̄ ) − + nVBF (P̄ )Φ−1 () + o( n). 2 (4) Here, with G , H 2 PWF (H),     1   VBF (P̄ ) , EG V (G) + nc V C(G) + V L(G) . 2 Proof. See Appendix A. The following result provides a lower bound on log M ∗ subject to LT constraint. Theorem 2. For a block fading channel with input subject to a long term power constraint P̄ and average probability of error , the maximal codebook size M ∗ at a given blocklength n satisfies q √ log M ∗ ≥ nC(P̄ ) + nVBF (P̄ )Φ−1 () + o( n), (5) where, the notation is as in Theorem 1. Proof. See Appendix B. IV. M AXIMAL C ODING R ATE : U PPER BOUNDS In this section, we provide upper bounds on the maximal coding rate under the ST and LT constraints. In deriving the upper bounds, we assume that CSIT is known non-causally. First, we obtain an upper bound for the ST case. Next, we proceed to provide an upper bound for the LT case. Theorem 3. For a block fading channel with input subject to a short term power constraint P̄ , average probability of error 0 <  < 21 , the maximal codebook size M ∗ satisfies q 0 (P̄ )Φ−1 () + O(log n), log M ∗ ≤ nC(P̄ ) + nVBF (6) 0 where, with G has in Theorem 1 and iλ as in (1), VBF (P̄ ) , L(G) P̄ EG [V (G)] + V nc C(G) + 2λ − 2 . Proof. See Appendix C. Theorem 4. For a block fading channel with input subject to a long term power constraint P̄ and average probability of error 0 <  < 12 , the maximal codebook size M ∗ satisfies r q n ∗ 0 (P̄ )Φ−1 () + O(log n), + nVBF log M ≤ nC(P̄ ) + 4λ2 (7) 0 where, λ is as in (1) and VBF (P̄ ) is as in Theorem 3. Proof. See Appendix D. V. N UMERICAL E XAMPLES In this section, we compare numerically, the various bounds obtained thus far. To that end, we need a refined √ characterization of the lower bounds. In particular, the o( n) terms need √ to be explicitly identified. Terms contributing to the o( n) expression in the lower bound for the LT constraint are same as that in the no CSIT case with ST constraint ([10]). Hence, the terms can be identified by revisiting the analysis in [10] and computing the constants therein, explicitly√ for the i.i.d. √ block fading case. Doing so, we obtain o( n) = log2 n − n1−β + O(nβ ), for some small β > 0. For our computation, we fix β = 0.01. Next, consider the lower bound for the ST constraint case. Note that we are interested in error probability  < 1/2 for which, Φ−1 () < 0. Under this assumption, the right hand side of (9) can be readily simplified using Taylor’s theorem t and the fact that VBF (.) therein, is a monotonically increasing function. By virtue of choice of δB (as mentioned in Appendix 0 −1 A), Φ−1 ( − δB ) = Φ O(1/n1.5 ). Thus, we obtain p () + p √ −1 ∗ log M ≥ nC( √ P̄ ) − n/2 + nVBF (P̄ )Φ () + o( n), where the o( n) term is same as in the LT case. The coefficient of log n/n in the upper bound for the ST and LT case is |H|/2. We compute the terms excluding the O(1/n1−β ) terms in the lower bound and O(1/n) term in the upper bound. Thus, the approximate bound that we compute is akin to the normal approximation for AWGN channels ([3]). With this, we proceed to compute the bounds. We consider the following discrete version of the Rayleigh distribution: fix η0 = 0.1, |H| = 10, η|H|−1 = 4.1 and ∆ = (η|H|−1 − η0 )/(|H| − 1). Define ηi = ηi−1 + i∆, for i ∈ [1 : |H| − 2] and qi = P (ηi ≤ HR ≤ ηi+1 ), for i ∈ [0 : |H| − 1] and q|H|−1 = P (HR ≥ η|H|−1 ) where HR ∼ 2 Rayleigh distribution with parameter unity. Fix σN = 1 and  = 0.01 and nc = 1 (which corresponds to the fast fading case). By fixing P̄ = 5dB, we plot the convergence of various bounds to the channel capacity C(P̄ ) = 0.6502 nats/channel use (equation (1)), as B increases, in Figure 1. The acronyms LB and UB refer to lower bound and upper bound. We have also plotted the rates with no CSIT and ST constraint. In Figure 2, we fix nc = 1, B = 4000 and compare the various bounds for different values of P̄ . By comparing the lower bound under the ST constraint with the rate for no CSIT use C(M, n, , 1) in conjunction with a power controller. Next, we explain the power control scheme.  σ 2 +  Choose λB such that EH λB − HN2 = P̄ − δB , for some δB (to be chosen appropriately later with P̄ > δB > 0). (B) σ 2 + Let PWF (H) = λB − HN2 . At the beginning of block b, the transmitter checks if the constraint CST : b X ||x0 ||2  l l=1 Fig. 1. Rate versus blocklength. nc λB − 2 + σN ≤ B P̄ Hl2 is met. If CST is not met, the ST constraint is violated. The transmission is halted and an error is declared (a short error message is sent to the receiver which it can receive without error). Else, for the k th transmission in blockq b, the channel (B) input X[bk] is chosen such that X[bk] = x0[bk] PWF (Hb ). If the transmitter sends codeword symbols successfully in all B blocks without violating CST for all b ∈ [1 : B], B nc B 1 X ||x0b ||2 (B) 1 XX 2 x[bk] = PWF (Hb ) ≤ P̄ Bnc B nc b=1 k=1 b=1 and the ST constraint is met. If transmission error does not occur, for all q b ∈ [1 : B], k ∈ [1 : nc ], the channel output Fig. 2. Rate versus input power. case under ST constraint, the rate enhancement possible due to the knowledge of CSIT (via power control) is observed. VI. C ONCLUSION In this paper, we have obtained upper and lower bounds for the maximal coding rate over a block fading channel with short term and long term average power constraints on the transmitted codeword. The bounds obtained shed light on the rate enhancement possible due to the availability of CSIT. The bounds also characterize the performance of water filling power allocation in the finite block length regime. ACKNOWLEDGEMENT The authors would like to thank Gautam Konchady Shenoy, ECE Dept., IISc, Bangalore and Wei Yang, Princeton University, for valuable discussions and useful comments. A PPENDIX A Lower bound: ST constraint Let F (n) = {x0 ∈ Rn : ||x0 ||2 = n}. Let C(M, n, , 1) be a codebook with M codewords, codeword length n, average probability of error  and codewords belonging to F (n) , for the same block fading channel under consideration with CSIR but no CSIT. These codewords satisfy the ST constraint. We (B) PWF (Hb )x0[bk] + Z[bk] . q D (B) Let G0 = G0b , Hb PWF (Hb ). Any rate achievable over a block fading channel with i.i.d. fading process {G0b } with CSIR and no CSIT satisfying an ST constraint of unity, is also achievable, over a channel subject to block fading process {Hb } with CSIT and CSIR satisfying an ST constraint of P̄ . Henceforth, we consider the channel with block fading process {G0b } (having CSIR but no CSIT). 0 denote an upper bound on the probability of the Let δB 0 event that CST is violated. A specific choice of δB will be 0 0 made later. Let τ = τ + δB , for some τ > 0. It is immediate to see that the following bound (Theorem 25, [3]) holds: for 0 , 0 < τ < 0 , 0 ,  − δ B   κτ F (n) , QY,G  , M≥ (8) supx0 ∈F (n) β1−0 +τ x0 , QY,G Y[bk] = Hb where βα (x0 , Q) ≡ βα (PY,G|X=x0 (y, g|x0 ), Q), QY,G is an auxiliary output distribution, κτ (F (n) , Q) are as defined in [3] and PY,G|X=x0 (y, g|x0 ) corresponds to the channel transition probability. Now, from the analysis in [10], it follows that  q t −1 0 √ Φ ( − τ ) + o( n), (9) log M ∗ ≥ nC P̄ − δB + nVBF     t t where VBF ≡ VBF (P̄ − δB ) = EG0 V (G02 ) + nc V C(G02 ) +   1 02 t 2 V L(G ) . Note that the difference between VBF and t VBF (P̄ ) (defined in the statement of Theorem 1) is that, VBF 0 is evaluated according to the distribution of G rather than G defined in Theorem 1. As per definition, G0 is evaluated such (B) that EH [PWF (H)] = P̄ − δB . The first order term in the lower bound obtained does not match with the channel capacity and hence we proceed to rectify this shortcoming. For convenience, 00 00 let δB = δB /P̄ . Here, δB ∈ (0, 1). Note that, for G as defined in Theorem 1, i h h i 2  (a) 00 = EG C G(1 − δB ) . C(P̄ − δB ) = EG0 C G0 Here (a) follows because of the following reason: h i h i 00 = P̄ − δB . EH PWF (H) = P̄ ⇒ EH PWF (H) 1 − δB For 00 > 0 and function η, Taylor’s theorem applied to the functional F (.) about a certain function f is given by F (f + 00 η) = F (f ) + 00 dF (f + yη) dy probability of violating the constraint CST in the following way: ( b )! B 2 + [ X ||x0 ||2  σN b λB − 2 P > B P̄ nc Hl b=1 l=1 ! B X ||x0b ||2 (B) =P PWF (Hb ) > B P̄ nc b=1 ! B n o X ||x0b ||2 (B) ≤P PWF (Hb ) − (P̄ − δB ) > BδB nc b=1 ! B  Bδ 2  (b) κ X (a) B ≤ , =P Sb > BδB ≤ exp − 2λ2 B b=1 , y=x for some x ∈ (0, 00 ). Applying Taylor’s theorem to the functional C(P̄ − δB ) yields ||x0 ||2 (B) where, Sb , nbc PWF (Hb ) − (P̄ − δB ) and (a) follows from Hoeffding’s inequality ([15]) as {Sb } is a set of i.i.d. random B P Sb ∈ [−λB , λB ] ⊆ variables with zero mean such that b=1 [−λ, p λ]. For some constant κ, (b) follows by choosing δB = h i  λ 2/B (1−α) , for an arbitrary, small α > 0. For the specified 00 00 00 C(P̄ − δB )=C(P̄ ) − δB EG L(G(1 − α1 δB )) 2(1 − α1 δB ) , choice of δB , by Taylor’s theorem, h i h i h i −1 00 for α1 ∈ p (0, 1). Next, we apply Taylor’s theorem to the EĜ L(Ĝ)(2δ̂B ) = EG L(G)/2 − δB EG L01 G(1 − u) , t (P̄ − δ ), and obtain functional VBF B  00 ) and L01 G(1 − u) denotes the first for some u ∈ (0, α1 δB q q derivative of L1 G(1 t (P̄ − δ )= V (P̄ ) − δ 00 F (P̄ , α , δ ) √ − x) with respect to x at∗ x = u. VBF B BF 2 B B 1 Gathering all the o( n) terms, we obtainpthat log M is upper p (1+α) /2 + bounded by nC( P̄ ) − n nVBF (P̄ )Φ−1 () + √ for some α2 ∈ (0, 1). Here, o( n). Since α is chosen arbitrarily small, the result follows. q  F1 (P̄ , α2 , δB ) = F2 (P̄ , α2 , δB ) 2 VBF (P̄ − α2 δB ), A PPENDIX B t where, VBF (P̄ − α2 δB ) is evaluated in the same way as VBF 2 +   0 σN and VBF , but such that EH λ − H 2 = P̄ − α2 δB . Also, 00 2 2 with δ̄B , (1 − α2δB ), Ḡ , G δ̄B , G̃ , (σN + Ḡ) and 4 2 3 L1 , EG σN G G̃ , F2 (P̄ , α2 , δB ) ≡ F2 is given by Lower bound: LT constraint As in Appendix A, we fix the constraint set F (n) . Let C(M, n, , 1) be a codebook with M codewords, codeword length n, average probability of error  and codewords belonging to F (n) , for a block fading channel (same as the one in    2 2 consideration) with CSIR but no CSIT. By virtue of belonging L1 + nc Co C(Ḡ), L(Ḡ) δ̄B + Co 1 − L(Ḡ), σN L Ḡ) G̃ . to F (n) , the codewords inherently satisfy the ST constraint. Here Co(., .) denotes the covariance function. Finally, we We use this codebook in conjunction with a power controller apply Taylor’s theorem to the function Φ−1 (x), x ∈ [0 , ] in the following way: at the beginning of block b, the channel 0 0 so that Φ−1 (0 ) = Φ−1 () − δB g1 (, δB ), for some α3 ∈ gain Hb for the next nc channel uses will be available to the √  √ 2 transmitter. Fix the water filling power allocation PWF (.) in 0 0 ) = 2πexp Φ−1 ( − α3 δB ) 2 . For (0, 1) and g1 (, δB equation (1). For the k th transmission in block p b, the channel 0 0 0 notational convenience, let g2 ≡ g2 (, δB ) , δB g1 (, δB ), input X 0 is chosen such that X = x [bk] [bk] [bk] PWF (Hb ). Note 00 00 F3 ≡ F3 (P̄ , α2 , δB ) , δB F1 (P̄ , α2 , δB ), δ̂B , (1 − α1 δB ), that −1 Ĝ , δ̂B G2 and L1 (Ĝ) , L(Ĝ)(2δ̂B ) . Substituting these nc B X hX i   2 values in (9), we obtain E P (H )x0 = E P (H) ||x0 ||2 = nP̄ . H h i q L1 (Ĝ) + nVBF (P̄ )Φ−1 () 00 log M ∗ ≥ nC(P̄ ) − nδB EĜ q √ √ √ + nF3 Φ−1 () − nVBF (P̄ )g2 − ng2 F2 + o( n). Next, we fix the choice of δB so as to get an exact 0 00 expression for δB and δB . To that end, we upper bound the WF b [bk] H WF b=1 k=1 For each joint fading state H ∈ RB , the above scheme generates a codebook satisfying LT constraint for the channel with CSIT and CSIR on the fly, in a causal manner. The channel output p Y[bk] = Hb PWF (Hb )x0[bk] + Z[bk] . Now, nconsider a block o fading channel with i.i.d. fading p process Hb PWF (Hb ) . Assume no CSIT and full CSIR. Any rate achievable over such a channel with ST constraint is achievable over the original channel (with full CSIT and CSIR) subject to the LT constraint as well. It follows from the analysis in [10] that q √ log M ∗ ≥ nC(P̄ ) + nVBF (P̄ )Φ−1 () + o( n). Optimizing over the choice of input distributions, for the auxiliary channel under consideration, we have    + log M ∗ ≤ log γ − inf log P Iγ −  . (11) FX With the prescribed choice of the auxiliary channel, for H = B D P h, X = x, under PX,H,Y , i(x, h, Y) = Wb0 , where, b=1 Wb0 = nc C(gb2 ) + 2 2 2 hxb , Z b i − gb2 ||Z b ||2 σN hb ||xb ||2 + 2hb σN  , 2 2 2σN σN + gb2 A PPENDIX C p D Upper bound: ST constraint and gb = hb PWF (hb ). Next, it can be seen that Wb0 = Let M ∗ ≡ M ∗ (n, , P̄ ) denote the maximal codebook Wb00 (Phb (x, h)) ≡ Wb00 , where, for p ≥ 0, size for the channel with average probability of error and √ 2 2 2 nc σN hb p + 2hb pσN h1b , Z b i − gb2 ||Z b ||2 D 2 satisfying the ST constraint. In particular, assume that the ST W 00 (p) =  n C(g ) + , c b b 2 2 2σN σN + gb2 constraint is satisfied with equality. Note that we can make this assumption without loss of optimality (see, for instance, [16], Lemma 65). Next, assume that CSIT is known non-causally. where, Phb (x, h) is as defined in (10) and 001b is the nc length Bound derived under this assumption will give a valid upper vector (1, 1, . . . , 1) for all b. Note that {Wb } are independent   the conditional bound for the causal case under consideration. Corresponding random variables. Let Fh ≡ FX|H=h denote distribution of X given H = h. Then, P Iγ to each codeword x (satisfying ST constraint) and h (obtained Z i h X non causally), we can identify a power allotment vector  P(h) P i(x, h, Y) ≤ log γ x, h dFh (x) = P(x, h) , P1 (x, h), . . . , P|H| (x, h) , where, Rn h∈HB  " B # 0 , n (h) = 0, Z i  X X nP (h) i Pi (x, h) = (10) = P(h) P Wb0 ≤ log γ x, h dFh (x) x2kj (i,h) , ni (h) > 0.  ni1(h) n R B b=1 h∈H j=1 " B # Z X X (a) B P 0 ≥ P(h) inf P Wb ≤ log γ x, h dFh (x), Here, ni (h) = nc 1{hb =ηi } and kj (i, h) = {k ∈ [1 : n] : n x∈Sh b=1 hk = ηi }. Also, P(x, h) is such that |H| P R h∈HB b=1 (12) ti (h)Pi (x, h) = P̄ , i=1 where ti (h) ≡ ti = ni (h)/n. Since we assume perfect CSIT and CSIR, let X̄ = (X, H) and Ȳ = (Y, H) denote the equivalent channel input and output, respectively. Then, we have ([3], Theorem 26) that 0 β1− (PX,H,Y , QX,H,Y ) ≤ 1 −  , where βα (P, Q) is the minimum false alarm probability in deciding between P and Q, subject to a minimum detection probability α > 0, Q denotes an auxiliary channel and 0 is the average probability of error for the auxiliary channel. We choose the auxiliary channel where the channel output Y has the distribution nc B Y   Y 2 QX,H,Y = N 0, σN + Hb2 PWF (Hb ) . where, in (a), Sh denotes the support of Fh . Next, note that, " B # X 0 inf P Wb ≤ log γ x, h x∈Sh (a) = b=1 " inf P(h)∈Πh P B X # Wb00  Phb (h) ≤ log γ h b=1 " # B  1 X 0 = inf P √ Wb ≤ γB h, P(h) h νB P(h)∈Πh b=1 h  (c)  i 0 ≥ inf Φ γB h, P(h) − B h, P(h) (b) P(h)∈Πh (d) ≥ inf P(h)∈Πh   0 Φ γB h, P(h) − b=1 k=1  B1 h, P(h) P(h)∈Πh   0 = min Φ γB h, P(h) − max B1 h, P(h) P(h)∈Πh P(h)∈Πh    (f ) 0 = Φ γB h, P1∗ (h) − B1 h, P2∗ (h) (13) (e) Here, EH [PWF (H)] = P̄ . Since the message M ∈ M is independent of H, the output of the auxiliary channel is independent of M and hence  1  β1− (PX,H,Y , QX,H,Y ) ≤ 1 − 1 − ∗ . M Next, β1− can bounded (as in [3], n equation (102))  be lower   as, β1− ≥ γ1 P Iγ − , where γ > 0, Iγ , i(X, H, Y) ≤ o P log γ and i(X, H, Y) , log QX,H,Y . X,H,Y sup  D where, (a) follows from the fact that Wb0 = Wb00 and the definition of Wb00 and Πh , where, |H| n o X Πh , P(h) ∈ R|H| : ti (h)Pi (h) = P̄ . i=1   0 In (b), Wb = (Wb00 Phbp (h) − µb ), γB h, P(h) ≡ 0 γB (h) = (log γ − µ(h))/ ν(h), the mean of SB (W 0 ) (as noted, SB (.) is our alternate notation for summation), µ(h) = SB (µB ), where, µb ≡ µhb (h) = nc C(gb2 ) +  2 2 2 (hb nc Phb (h) − gb nc ) 2 σN + gb2 . Similarly, the variance of SB (W 0 ), ν(h) = SB (ν), where,  2 2 2 2 νb ≡ νhb (h) = 2σN hb nc Phb (h) + nc gb4 2 σN + gb2 . (14) Next, (c) follows from Berry Esseen Theorem for independent, but not identically distributed random variables ([17], Chapter 16) with B(h) ≡ B h, P(h) , where, B(h) = Cτ (h)  B X 3/2   , τ (h) , ν(h) EZ b |Wb |3 , (15) b=1 for some constant C > 0 (not depending on h). The term  B1 h, P(h) in (d) is defined in the proof of Lemma 1 provided in Appendix E. Also,  from the definition therein, B1 h, P(h) ≥ B h, P(h) . Together with the fact that, taking infimum of the first term and supremum of the second term (on the right hand side of (c)) separately can only lower the value, (d) follows. In (e), the infimum and supremum are replaced with minimum and maximum respectively, by noting the following. The functions B1 (from the definition in Lemma 1 in Appendix E )) and Φ, are continuous in P(h). Also, Πh ⊂ R|H| is a compact set. Hence the minimum and the maximum respectively, are attained. Also, note that the minimum in (e) is not 0 due to the equality constraint in the definition of Πh . Finally, in (f ), P1∗ (.) and P2∗ (.) denote the power allocations that attain the minimum and maximum, respectively. From (12) and (13), we have that h  X    i 0 P Iγ ≥ P(h) Φ γB h, P1∗ (h) − B1 h, P2∗ (h) h∈HB (a) h  i C2 0 ≥ EH Φ γB H, P1∗ (H) −√ , n (16) where, (a) follows from Lemma 1 stated and proved in Appendix E. Here, C2 is a universal positive constant. Next, we proceed to obtain a tractable lower bound for  0 γB H, P1∗ (H) . To that end, we make use of the following two facts. First, since PWF (hb ) ≥ (λ − 2 σN h2b ,   2  2  2 2 σN + gb2 ≥ σN + h2b λ − σN hb = λh2b . (17) Also, using the fact that PWF (hb ) = 1{h2b ≥λ} PWF (hb ), it can be seen that L(gb2 ) = PWF (hb ) . λ Using the above two relationships, it can be seen that nc C(gb2 ) ∗ h2b nc P1,h (h) − gb2 nc b  + ≤ µ0b (hb ), 2 + g2 2 σN b (18)  where, µ0b (hb ) ≡ µ0b = nc C(gb2 ) + nc P̄ − nc PWF (hb ) /2λ. B P Define µ0b (hb ) , µ0 (h). Let R , log γ/n, µ00 (h) = b=1   µ0 (h)/n, ν 0 h, P1∗ (h) = ν h, P1∗ (h) /n. Then, !   √ R − µ00 (h) 0 ∗ Φ γB h, P1 (h) ≥ Φ nq  , Ψ(h). ν 0 h, P1∗ (h) (19) Here, the inequality follows from the fact that Φ(.) is a monotonically increasing function. Now, using Lemma 2 provided in Appendix F, we obtain, !   √ R − C(P̄ ) log n EH Ψ(H) ≥ Φ − C3 np 0 , n VBF (P̄ ) 0 where, VBF (P̄ ) is definedqas in the statement of Theorem   0 (P̄ ) VBF log n 2C2 −1 √ . 3. Choose R = C(P̄ ) + Φ  + C + 3 n n n With the prescribed choice of R, combining (11) and (16) and applying Taylor’s theorem to the function Φ−1 (.), we obtain, p ∗ 0 log M ≤ nC(P̄ ) + nVBF (P̄ )Φ−1 () + O(log n). A PPENDIX D Upper bound: LT constraint Let M ∗ ≡ M ∗ (n, , P̄ ) denote the maximal codebook size for the channel with average probability of error  satisfying the LT constraint. In particular, as in the LT case, assume that the LT constraint is satisfied with equality. As mentioned, this assumption can be made without loss of optimality (see, for instance, [16], Lemma 65). Next, assume that CSIT is known non-causally. Bound derived under this assumption will give a valid upper bound for the causal case under consideration. While ST constraints insists that ||x||2 = nP̄ for every fading realization h and channel input vector x, the LT constraint only requires ||x||2 = nP(h), for some function P : HB → R+ such that EH [P(H)] = P̄ . Fix δn > 0, κ > 0 and c > P̄ + δ. For deriving the upper bound, we will first restrict to the class of policies Πκ,c , where, n o   Πκ,c , P : HB → 0, κ + c : EH [P(H)] = P̄ . Note that, for any P : HB → R+ such that EH [P(H)] = P̄ , P̂(h) = min{κ + c, P(h)} belongs to Πκ,c . As κ → ∞, Πκ,c converges to the original class of policies on R+ . Any P ∈ Πκ,c is a function of the realizations of an i.i.d. random vector H, such that 0 ≤ P(H) ≤ κ+c (where, the inequalities hold in a.s. sense). Hence, in particular, P satisfies the bounded difference condition ([15], Chapter 3). Let En , {h : P(h) > P̄ + δn }. From McDiarmid’s inequality ([15]),  2nδn2  P(En ) ≤ δn0 , δn0 ≡ δn0 (κ, c) , exp − . (κ + c)2 (20) Note that, under the event Enc , the channel input vector x satisfies the ST constraint with power P̄ + δn . Hence, in deriving the upper bound for the LT case, we can lower bound     the probability term P Iγ in (11) by P Iγ ∩ Enc . It follows where, Ψk (H, ν1 ) is the k th derivative of Ψ(H, x) at x = ν1 . from the analysis for the ST case that Let S∞ (H) denote the summation on the right hand side ! of the above equation, Note that |S∞ (H)| ≤ 2. Hence,   √ R − C(P̄ + δn ) c log n E Ψ(H, ν 0 ) is upper bounded by c c p En −C3 P Iγ ∩En ≥ P(En )P Z ≤ n , H 0 (P̄ + δ ) n VBF n    4|H|  where, Z ∼ N (0, 1). Using the fact that, for events A, B EH Ψ(H, ν1 ) + 2 + EH S∞ (H) TB . B P(A ∩ B) ≥ P(A) − P(B c ), we obtain ! Now, we proceed to obtain a tractable upper bound on (ν 0 −   √ R − C(P̄ + δn ) log n − δn0 − C3 np 0 P Iγ ≥ Φ . ν1 )/ν1 . Note that EH [ν 0 ] 6= ν1 and hence we cannot invoke the n VBF (P̄ + δn ) same lines of arguments as in [13]. To that end, observe that, ∗ 1 0 Taylor’s theorem, Vi∗ ≤ Vi + Vi0 (P1,i − PWF,i ), where, Now, we will choose n so that +δn < 2 . Noting the fact that from ∗ ∗ P ≡ P (i, h) denotes the power allocated to ηi according to 1 1,i VBF (P̄ ) is monotonically increasing in P̄ , adopting the same 2 ∗ ∗ ∗ ), V , V (ηi2 PWF (ηi )) P , V (η P , P ≡ P (η ), V i WF,i WF i lines of arguments as in the ST case, we obtain, 1 i 1,i i  2 0 2 2 2 3 0 r  log n  and Vi , σN ηi (σN + ηi PWF (ηi )) . Thus, ν − ν1 does not 0 (P̄ )  log M ∗ VBF |H| P . ≤ C(P̄ +δn )+ Φ−1 +δn0 (κ, c) +O ∗ exceed (ti − qi )Vi + ti [P1,i − PWF,i ]Vi0 . Since we would n n n −(1−α) Applying Taylor’s theorem to C(P̄ + δn ), for δn = n 2 , for some small q α > 0, as in Appendix A, we obtain C(P̄ + δn ) ≤ C(P̄ ) + 4λ2 n1(1−α) . By virtue of choice of δn , δn0 =  ∗ exp − 2nα /(κ + c)2 . Thus, lognM is upper bounded by r  log n  0 (P̄ )  VBF 1 + Φ−1 +δn0 (κ, c) +O . C(P̄ )+ (1−α) n n 2λn 2 Note that, δn0 (κ, c) is monotonically increasing in κ. Since the bound holds good for all κ, we can take the infimum over κ to obtain the tightest bound. Next, from Taylor’s theorem, Φ−1 ( + δn0 ) ≤ Φ−1 () + δn0 1/φ(Φ−1 () . Finally, perform √ (1−α) ) + ing Taylor’s expansion of the function (1 2λ n q  0 (P̄ ) [nφ2 (Φ−1 ())] exp(−2nα /c2 ) around α = 0 VBF yields the required result. A PPENDIX E  Lemma 1. Let Ψ(h) ≡ Ψ h, ν 0 h, P1∗ (h) be as defined in 0 (P̄ ) as in the statement of Theorem 3. Then, (19) and VBF !   √ R − C(P̄ ) log n , EH Ψ(H) ≥ Φ np − C3 0 n VBF (P̄ ) where, C3 is some positive constant. . Proof. The proof follows along similar lines of arguments as in [13] (Lemma 17 and Lemma 18). However, in contrast to the  case therein, the function ν 0 H, P1∗ (H) is not a sum of i.i.d. random variables. This is due to the dependence of the power allocation policy P1∗ non causally on H. We will show how to circumvent this problem and adapt the proof ton our case. To that end, define the high probability set TB , h ∈ RB : q o max ti (h) − qi ≤ logBB . From Hoeffding’s inequality i∈[1:|H|] ([15]), it follows that P(TB c ) ≤ (2|H|)/B 2 .  For notational convenience, let ν 0 h, P1∗ (h) ≡ ν 0 . Then, Taylor’s expansion of Ψ h, ν 0 , as a function of ν 0 h, P1∗ (h) around ν1 yields ∞  0 k   X ν − ν1  Ψk (H, ν1 ) Ψ H, ν 0 = Ψ H, ν1 + , ν1 2k k! k=1 i=1 like to upper bound (ν 0 − ν1 ) under the event TB , noting the fact that Vi ≤ 1, we obtain that under TB , r 0 ν − ν1 ≤ |H| |H| log B X + ti [P1∗ (i, h) − PWF (ηi )]Vi0 . B i=1 p ∗ −PWF,i < δB }. Now, for δB = (log B)/B, let E , {h : P1,i Then, note that the summation in the above inequality can be upper bounded in the following way: |H| X ∗ ∗ ti [P1,i − PWF,i ]Vi0 1E + ti [P1,i − PWF,i ]Vi0 1E c i=1 (a) ≤ δB + |H| X (b) ∗ ti [P1,i − PWF,i ]1E c ≤ δB + P̄ − i=1 |H| X ti PWF,i , i=1 (21) where, in obtaining (a), we have used the definition of E and that Vi0 ≤ 1. In getting (b), we made use of the facts that, ∗ under E c , P1,i − PWF,i > 0, Vi0 ≤ 1 and P1∗ satisfies the P|H| ST constraint with equality. Finally, note that, i=1 ti PWF,i is bounded below by |H| X (a) ti PWF,i 1TB ≥ i=1 |H| X (qi − δB )PWF,i 1TB (22) i=1 (b) ≥ P̄ − λδB |H| − λ|H| , B2 (23) where, (a) follows from the fact, under the event TB , ti ≥ qi − δB . In (b), λ is as in (1) and follows from the fact that 2 PWF,i ≤ λ and P(TB c ) ≤ (2|H|)/B p . Using (21) and (22), 0 we see that ν − ν1 ≤ 2(1 + λ|H|) (log B)/B. As for obtaining a similar upper bound for ν1 − ν 0 , let Vi∗ 0 ∗ be the function obtained by replacing PWF,i with P1,i in the 0 function Vi defined earlier. Again, using Taylor’s theorem, it ∗ follows that Vi ≤ Vi∗ + Vi∗ 0 (PWF,i − P1,i ). Note that, Vi∗ 0 ≤ q |H| P 2 ∗ ηmax . Thus, ν1 − ν 0 ≤ |H| logBB + qi [PWF,i − P1,i ]Vi∗ 0 . i=1 |H| P Now, i=1 ∗ 2 qi [PWF,i − P1,i ]Vi∗ 0 1E ≤ δB ηmax , where we have 2 used the fact that Vi∗ 0 ≤ ηmax and the definition of E. Now, |H| X (a) ∗ 2 qi [PWF,i − P1,i ]Vi∗ 0 1E c ≤ ηmax i=1 |H| X ∗ qi [PWF,i − P1,i ] i=1 |H|  (b) 2 P̄ − = ηmax X ∗ qi P1,i   P̄ − X ∗ qi Pi,1 1 TB i=1 (c) 2 ≤ ηmax  c Proof. Since we are interested in the asymptotic as a function of B, we will prove the case for nc = 1 (so as to avoid unnecessary notation cluttering). The result for nc > 1 can be proved in an identical way. First, we will consider the term B P ν(h) = νhb (h), where νhb (h) as defined in (14). Note that b=1 i=1 |H| 2 =ηmax   on h. Let Bb1 (p) , EH B1 (H, p) and P2∗ be as defined in  1 (13). Then, for Bb1 ≡ Bb1 (P2∗ ), Bb1 = O √Bn . − |H| X ∗ qi Pi,1 1TB c  , i=1 |H| X   ∗ ∗ P̄ − (ti − δB )Pi,1 1TB − (ti + δB )Pi,1 1 TB c |H| B 2 2 ∗ 2 2 ∗ X σN ηi P2,hb (h) σN hb P2,hb (h) X = B (h) ν(h) ≥   i 2 ∗ (η ) 2 2 2 2 σN + gb σN + ηi2 P2,h i i=1 b=1 b |H| (a) X ≥ i=1 Bi (h) ∗ P2,hb (h)Cmin = B P̄ Cmin , B i=1 (d) |H| X (e) δB P̄ ≤ ≤ q min − δB i=1 r (f ) δB P̄ P̄ log B ≤ = , qmin (1 − α) qmin (1 − α) B 2 ηmax ∗ δB Pi,1 1TB 2 where, in (a) we have used the fact that Vi∗ 0 ≤ ηmax and the definition of E, (b) follows from the fact that EH [PWF (H)] = P̄ , in (c) we have made use of the definition of TB , in (d), we have used the fact that P1∗ satisfies the ST constraint with ∗ equality, (e) follows from the fact that, under TB , P1,i ≤ P̄ /(qi − δB ) ≤ P̄ /(qmin − δB ) and (fp ) holds for some fixed α ∈ (0, 1) and B large enough so that (log B)/B < αqmin . Let c1 = max 2(1 + λ|H|), P̄p /qmin (1 − α) . Thus, we have shown that |ν 0 − ν1 | ≤ c1 (log B)/B. Also, for  2  G 2 as in Theorem 1, note that ν ≥ E G /2(1 + G) = 1 G  2 EH PWF (H)/2λ2 ≥ P̄ 2 /2λ2 , where, the first inequality follows from the definition of ν1 , the equality follows by invoking (17) and the last bound follows from Jensen’s inequality. Thus, we have obtained a lower bound p on 1/ν1 . Hence, we have obtained that |(ν 0 − ν1 )/ν1 | ≤ c2 (log B)/B, where c2 = 2c1λ2 /P̄ 2 . It then follows from   the analysis in [13] that EH Ψ(H, ν 0 ) − EH Ψ(H, ν1 ) ≤ C1 logn n , for some constant C1 > 0. Next, note that µ00 (H) in the function Ψ(H) is a sum of i.i.d. random variables taking values in H. Hence, along with the above bound, directly invoking the result in [13] (Lemma 18), we obtain that !   √ R − C(P̄ ) log n EH Ψ(H) ≥ Φ np 0 . − C3 n VBF (P̄ ) where, in (a), Cmin = 2 2 σN ηi min 1≤i≤|H| 2 +η 2 P σN i WF (ηi ) that Cmin > 0, as ηi > 0, for all i. Thus 1 2 . Also, note ≤ ν H 1 B P̄ Cmin a.s.. Now, we consider the term τ (h) as defined in (15). Note that |Wb | = q ∗ (h)σ 2 Z − g 2 (Z 2 − 1) 2hb P2,h N b  b b b ∗  ≤ − µ Wb00 P2,h (h) b b 2 2 2 2σN σN + gb q ∗ (h) hb P2,h b gb2 2   ≤ Zb + (Z − 1) b 2 + g2 2 σ2 + g2 σN 2σN N b b ∗ (h) h2b P2,h Zb (Zb2 − 1) b   + + 2 2 + g2 2 + g2 2σN σN σN b b ∗ 2 (a) P2,hb (h) Zb (Zb − 1) ≤ Zb + 2 + , 2 λ σN σN ≤ Zb where, in (a) we have made use first term.  of (17)  to get the 3 ∗ Thus, it can be seen that EZ |Wb |3 ≤ K3 P2,h (h) + b  ∗ 2  ∗  K2 P2,h (h) + K1 P2,h (h) + K0 , for some constants b b Ki > 0, not depending on h. Next, we will show that B  3 P ∗ (H) is O(B). To that end, since P2∗ (h) ∈ Πh , EH P2,h b b=1 lim B→∞ |H| X ∗ ti (h)P2,i (h) = i=1 |H| X i=1 ∗ qi lim P2,i (h) = P̄ B→∞ This implies that ∗ lim P2,i (h) < P̄ /qi , for all i. B→∞ Hence, A PPENDIX F |H| B X  ∗ 3 X  3 Lemma 2. Given a realization of the fading vector h and lim 1 ∗ qi lim P2,i P2,hb (h) = (h) = C1 . (24) B→∞ a vector p , (p1 , . . . , pB ) (where pb corresponds to the B→∞ B b=1 i=1 power allocated to the state ηib which occurs in block b), let −1 B   P Here, C1 is a constant less than qmin |H|P̄ 2 , where qmin is as B1 (h, p) , (B P̄ Cmin )−1 K3 p3b +K2 p2b +K1 pb +K0 , for |H| S b=1 defined in Section II. Next, denote S , h : |ti (h)−qi | < δ some constants C , K > 0, i = 0, . . . , 3, not depending min i i=1 δ , for 0 < δ < qmin . Also, for any power allocation vector  |H| P P(H), let π H, P(H) , ti (H)P(H). Note that i=1   π H, P2∗ (H) = π H, P2∗ (H)1{ti (H)>0} = P̄ . Hence, P2∗ (H)1{ti (H)>0} ≤ P̄ , for all i ∈ {1, . . . , |H|}. Since, ni (H) ≥ 1 under the event {ti (H) > 0}, we obtain P2∗ (H)1{ti (H)>0} ≤ nP̄ . " (25) #   3  Using (25), EH π H, P2∗ (H)1{ti (H)>0} 1Sδ is upper " #     bounded by EH π H, B 3 P̄ 3 1Sδ . But, π H, B 3 P̄ 3 =  B 3 P̄ 3 P Sδ . By using the union bound and Hoeffding’s inequality ([15]), we have  P Sδ ≤ |H| X  P |ti (H) − qi | > δ ≤ 2|H|e−2δB . i=1 Thus, with C2 , 2|H|P̄ 3 , " #   3  ∗ EH π H, P2 (H)1{ti (H)>0} 1Sδ ≤ C2 B 3 e−2δB . (26) Next, P ∗ (H) ∈ Πh , note that,   from the fact that 3  2 P̄ 3 ∗ π H, P2 (H)1{ti (H)>0} 1Sδc ≤ qmin −δ . Then, using (24) and bounded convergence theorem, it follows that " #   3  ∗ EH π H, P2 (H)1{ti (H)>0} 1Sδc ≤ C1 . (27) From (26) and (27), it follows that EH B  3 P ∗ (H) is P2,h b b=1 O(B). Hence, EH B  i P ∗ P2,h (H) , i = 1, 2 are O(B) as well. b b=1 Combining this with the bound on ν(h), we get the required result. R EFERENCES [1] M. Agiwal, A. Roy, and N. Saxena, “Next Generation 5G Wireless Networks: A Comprehensive Survey,” IEEE Communications Surveys & Tutorials, vol. 18, no. 3, pp. 1617–1655, 2016. [2] V. Strassen, “Asymptotische Abschätzungen in Shannon’s Informationstheorie,” in Trans. Third Prague Conf. Inf. Theory, 1962, pp. 689–723. [3] Y. Polyanskiy, H. V. Poor, and S. Verdú, “Channel Coding Rate in the Finite Blocklength Regime,” IEEE Transactions on Information Theory, vol. 56, no. 5, pp. 2307–2359, 2010. [4] M. Hayashi, “Information Spectrum Approach to Second-Order Coding Rate in Channel Coding,” IEEE Transactions on Information Theory, vol. 55, no. 11, pp. 4947–4966, 2009. [5] A. J. Goldsmith and P. P. Varaiya, “Capacity of Fading Channels with Channel Side Information,” IEEE Transactions on Information Theory, vol. 43, no. 6, pp. 1986–1992, 1997. [6] A. El Gamal and Y.-H. Kim, Network Information Theory. Cambridge university press, 2011. [7] G. Caire, G. Taricco, and E. Biglieri, “Optimum Power Control over Fading Channels,” IEEE Transactions on Information Theory, vol. 45, no. 5, pp. 1468–1489, 1999. [8] R. Negi and J. M. Cioffi, “Delay-Constrained Capacity with Causal Feedback,” IEEE Transactions on Information Theory, vol. 48, no. 9, pp. 2478–2494, 2002. [9] R. Mahapatra, Y. Nijsure, G. Kaddoum, N. U. Hassan, and C. Yuen, “Energy Efficiency Tradeoff Mechanism Towards Wireless Green Communication: A Survey.” IEEE Communications Surveys and Tutorials, vol. 18, no. 1, pp. 686–705, 2016. [10] Y. Polyanskiy and S. Verdú, “Scalar Coherent Fading Channel: Dispersion Analysis,” in Information Theory Proceedings (ISIT), 2011 IEEE International Symposium on. IEEE, 2011, pp. 2959–2963. [11] W. Yang, G. Caire, G. Durisi, and Y. Polyanskiy, “Optimum Power Control at Finite Blocklength,” IEEE Transactions on Information Theory, vol. 61, no. 9, pp. 4598–4615, 2015. [12] G. Durisi, T. Koch, J. Östman, Y. Polyanskiy, and W. Yang, “ShortPacket Communications over Multiple-Antenna Rayleigh-Fading Channels,” IEEE Transactions on Communications, vol. 64, no. 2, pp. 618– 629, 2016. [13] M. Tomamichel and V. Y. Tan, “Second-order Coding Rates for Channels with State,” IEEE Transactions on Information Theory, vol. 60, no. 8, pp. 4427–4448, 2014. [14] A. Lancho, T. Koch, and G. Durisi, “A High-SNR Normal Approximation for Single-Antenna Rayleigh Block-Fading Channels,” in Information Theory (ISIT), 2017 IEEE International Symposium on. IEEE, 2017, pp. 1773–1777. [15] S. Boucheron, G. Lugosi, and P. Massart, Concentration Inequalities: A Nonasymptotic Theory of Independence. Oxford university press, 2013. [16] Y. Polyanskiy, “Channel Coding: Non-Asymptotic Fundamental Limits,” Ph.D. dissertation, Princeton Univ., Princeton, NJ, USA, 2010. [17] W. Feller, Introduction to Probability Theory and Its Applications. John Wyley, 1971, vol. 2.
7cs.IT
A Genetically Modified Hoare Logic G. Bernot1 , J.-P. Comet1 , Z. Khalis1 , A. Richard1 , O. Roux2 1 University Nice-Sophia Antipolis I3S laboratory, UMR CNRS 7271, Les Algorithmes, bât. Euclide B, BP.121, 06903 Sophia Antipolis Cedex, France 2 arXiv:1506.05887v1 [cs.CE] 19 Jun 2015 IRCCyN UMR CNRS 6597, BP 92101, 1 rue de la Noë, 44321 Nantes Cedex 3, France Abstract: An important problem when modeling gene networks lies in the identification of parameters, even if we consider a purely discrete framework as the one of René Thomas. Here we are interested in the exhaustive search of all parameter values that are consistent with observed behaviors of the gene network. We present in this article a new approach based on Hoare Logic and on a weakest precondition calculus to generate constraints on possible parameter values. Observed behaviors play the role of “programs” for the classical Hoare logic, and computed weakest preconditions represent the sets of all compatible parameterizations expressed as constraints on parameters. Finally we give a proof of correctness of our Hoare logic for gene networks as well as a proof of completeness based on the computation of the weakest precondition. 1 Introduction Gene regulation is a complex process where the expression level of a gene at each time depends on a large amount of interactions with related genes. Hence regulations between genes can be seen as a gene network. Different methods for studying the behavior of such gene networks in a systematic way have been proposed. Among them, ordinary differential equations played an important role which however mostly lead to numerical simulations. Moreover, the nonlinear nature of gene regulations makes analytic solutions hard to obtain. Besides, the abstraction procedure of René Thomas [Tho91], approximating sigmoid functions by step functions, makes it possible to describe the qualitative dynamics of gene networks as paths in a finite state space. Nevertheless this qualitative description of the dynamics is governed by a set of parameters which remain difficult to be deduced from classical experimental knowledge. Therefore, even when modeling with the discrete approach of René Thomas, the main difficulty lies in the identification of these parameters. In this context, we are interested in the exhaustive search of parameter values which are consistent with specifications given by the observed behavior of gene regulatory networks. Because of the exponential number of parameterizations to consider, two main kinds of approaches have emerged. On the one hand, information about cooperation or concurrence between two regulators of a same target can be taken into account in order to reduce the number of parameterizations to consider, see for example [KCRB09] and also [CTF+ 09] in which this notion of cooperation is treated via a grouping of states. On the other hand, using constraints can be helpful to represent the set of consistent parameterizations see for example [FCT+ 04, CTF+ 09, MGCLG07]. In this paper, we present a new approach based on Hoare Logic [Hoa69] and on weakest precondition calculus [Dij75] to generate constraints on parameters. A feature of this approach lies in the fact that specifications are partially described by a set of paths, seen as “programs.” Since this method avoids building the complete state graph, it results in a powerful tool to find out the constraints representing the set of consistent parameterizations with a tangible gain for 1 CPU time. Indeed, the weakest precondition computation which builds the constraints, goes through the “program” but is independent of the size of the gene network. Other works were undertaken with such objectives. The application of temporal logic to biological regulatory networks was presented in [BCRG04]. Constraint programming was used for biological systems in [BPGT01] and these ideas were continued specifically for genetic regulatory networks in [Cor08, CTF+ 09]. The paper is organized as follows. The basic concepts of Hoare logic and Dijkstra weakest precondition are quickly reminded in Section 2. The formal definitions for discrete gene regulatory networks are given in Section 3. Section 4 gives the way to describe properties of states, then presents the path language, and finally introduces the notion of Hoare triplet. The semantics of these extended Hoare triples is given in Section 5. With the previous material, in Section 6 an extended Hoare logic for gene networks is defined for Thomas’ discrete models. In Section ??, the example of the “incoherent feedforward loop of type 1” (made popular by Uri Alon in [SOMMA02, MSOI+ 02]) highlights the whole process of our approach to find out the suitable parameter values. Section 8 contains a proof of correctness of our Hoare logic for gene networks as well as a proof of completeness based on the computation of the weakest precondition. We conclude in Section 9. 2 Reminders on standard Hoare logic Hoare logic is a formal system for reasoning about the correctness of imperative programs. In [Hoa69], C. A. R. Hoare introduced the notation “{P } pgm {Q}” to mean “If the assertion P (precondition) is satisfied before performing the program pgm and if the program terminates, then the assertion Q (postcondition) will be satisfied afterwards.” This constitutes de facto a specification of the program under the form of a triple, called the Hoare triple. In [Dij75], E. W. Dijkstra has defined an algorithm taking the postcondition Q and the program pgm as input and computing the weakest precondition P0 that ensures Q if pgm terminates. In other words, the Hoare triple {P0 } pgm {Q} is satisfied and, for any precondition P , {P } pgm {Q} is satisfied if and only if P ⇒ P0 . Hoare logic and weakest preconditions are now widely known and teached all over the world. The basic idea is to stamp the sequential phases of a program with assertions that are infered according to the instruction they surround. There are several equivalent versions of Hoare logic and our prefered one is the following because it offers a simple proof strategy to compute the weakest precondition via a proof tree. Here, p, p1 and p2 stand for programs, P , P1 , P2 , I and Q stand for assertions, v stands for a declared variable of the imperative program, and Q[v ← expr] means that expr is substituted to each free occurrence of v in Q. Assignment rule: {Q[v←expr]} v:=expr {Q} Sequential composition rule: {P2 } p2 {Q} {P1 } p1 {P2 } {P1 } p1 ;p2 {Q} Alternative rule: {P1 } p1 {Q} {P2 } p2 {Q} {(e∧P1 )∨(¬e∧P2 )} if e then p1 else p2 {Q} Iteration rule: {e∧I} p {I} {I} while e with I do p {¬e∧I} Empty program rule: P ⇒Q {P } ε {Q} (where ε stands for the empty program) There are standard additional rules: first order logic (to establish “P ⇒ Q” introduced by the Empty program rule), and in practice some reasonnings about the data structures of the 2 program (e.g. integers) in order to simplify the expressions as much as possible “on the fly” in the proof trees. The Iteration rule requires some comments. The assertion I is called the loop invariant and it is well known that finding the weakest loop invariant is undecidable [Hat74, BG01]. It has been included within the programming language for this reason; we ask the programmer to give a loop invariant explicitely after the with keyword, although it may appear redundant as it is also the precondition of the Hoare triple. By doing so, within a program, each while instruction carries its own (sub)specification and it can consequently be proved apart from the rest of the program. When using these Hoare logic rules, the following proof strategy builds a proof tree that performs the proof by computing the weakest precondition [Dij75]: 1. For each while statement within a Hoare triple {P } p1 ; while e with I do p2 ; p3 {Q} perform 3 independent sub-proofs: • {¬e ∧ I} p3 {Q} • {I} while e with I do p2 {¬e ∧ I} (i.e. {e ∧ I} p2 {I} according to the Iteration rule) • {P } p1 {I} This first step of strategy leads to proofs on subprograms that do not contain any while instruction. 2. Apply the Sequential composition rule only when the program p2 of this rule is reduced to an instruction, which leads to perform the proof starting from postcondition Q at the end and treat the instructions backward. 3. Never apply the Empty program rule, except when the leftmost instruction has been treated, that is when all instructions have been treated. Since the Assignment rule, which is central, makes it possible to precisely define one precondition from its postcondition, and since the other rules relate (but do not evaluate) the conditions, the proof tree is done from the end to the beginning of the program and computes a unique assertion. By doing so, the precondition obtained just before applying the last Empty program rule is actually the weakest precondition (assuming that the programmer has given the weakest loop invariants). In the remainder of the article, we call this strategy the backward strategy. In Section ??, we always follow the backward strategy. The most striking feature of Hoare logic and weakest precondition is that proofs according to the backward strategy consist in very simple sequences of syntactic formula substitutions and end with first order logic proofs. Nevertheless, it is worth noticing that it is only a question of partial correctness since Hoare Logic does not give any proof of the termination of the analyzed program (while instructions may induce infinite loops). 3 Discrete gene regulatory networks with multiplexes This section presents our modeling framework, based on the general discrete method of René Thomas [Td90, TK01] and introduced in [KCRB09, Kha10]. 3 The starting point consists in a labeled directed graph in which vertices are either variables or multiplexes. Variables abstract genes or their products, and multiplexes contain propositional formulas that encode situations in which a group of variables (inputs of multiplexes) influence the evolution of some variables (outputs of multiplexes). Hence multiplexes represent biological phenomena, such as the formation of complexes to activate some genes. In the next definition, this labeled directed graph is formally defined, and it is associated with a family K of integers. As we will see later, these integers correspond to parameters that drive the dynamics of the network. Definition 3.1 A gene regulatory network with multiplexes ( grn for short) is a tuple N = (V, M, EV , EM , K) satisfying the following conditions: • V and M are disjoint sets, whose elements are called variables and multiplexes respectively. • Ñ = (V ∪ M, EV ∪ EM ) is a labeled directed graph such that: – edges of EV start from a variable and end to a multiplex, and edges of EM start from a multiplex and end to either a variable or a multiplex. – every directed cycle of Ñ contains at least one variable. – every variable v of V is labeled by a positive integer bv called the bound of v. – every multiplex m of M is labeled by a formula ϕm belonging to the language Lm inductively defined by: − If v → m belongs to EV and s ∈ IN belongs to the interval [1, bv ], then v ≥ s is an atom of Lm . − If m0 → m belongs to EM then m0 is an atom of Lm . − If ϕ and ψ belong to Lm then ¬ϕ, (ϕ ∧ ψ) and (ϕ ∨ ψ) also belong to Lm . • K = {Kv,ω } is a family of integers indexed by v ∈ V and ω ⊂ N −1 (v), where N −1 (v) is the set of predecessors of v in Ñ (that is, the set of multiplexes m such that m → v is an edge of EM ). Each Kv,ω must satisfy 0 ≤ Kv,ω ≤ bv . Notation 3.2 The flaten version of a formula ϕm , denoted ϕm , is obtained by applying the following algorithm: while the formula contains a multiplex atom m0 , substitute m0 by its associated formula ϕm0 . The formula ϕm exists since Ñ has no directed cycle with only multiplexes. As a result, all the atoms of ϕm are of the form v ≥ s. A state is an assignment of integer values to the variables of V . Such an assignment allows a natural evaluation of any formula ϕm : by replacing variables by their values, ϕm becomes a propositional formula whose atoms are integer inequalities. Definition 3.3 (states, satisfaction relation and resources). Let N be a grn and V be its set of variables. A state of N is a function η : V → IN such that η(v) ≤ bv for all v ∈ V . Let L be the set of propositional formula whose atoms are of the form v ≥ s with v ∈ V and s be a positive integer (so that ϕm is a formula of L for every multiplex m of N ). The satisfaction relation |=N between a state η of N and a formula ϕ of L is inductively defined by: • if ϕ is reduced to an atom of the form v ≥ s, then η |=N ϕ if and only if η(v) ≥ s. • if ϕ ≡ ψ1 ∧ ψ2 then η |=N ϕ if and only if η |=N ψ1 and η |=N ψ2 ; and we proceed similarly for the other connectives. 4 Given a variable v ∈ V , a multiplex m ∈ N −1 (v) is a resource of v at state η if η |=N ϕm . The set of resources of v at state η is defined by ρ(η, v) = {m ∈ N −1 (v) | η |=N ϕm }. From a dynamical point of view, at a given state η, each variable v is supposed to evolve in the direction of a specific level (between 0 and bv ) that only depends on the set ρ(η, v). This focal level is given by the logical parameter Kv,ρ(η,v) . Hence, at state η, v can increase if η(v) < Kv,ρ(η,v) , it can decrease if η(v) > Kv,ρ(η,v) , and it is stable if η(v) = Kv,ρ(η,v) . Suppose for instance that v has two input multiplexes mab and mcd with formula (a ≥ 1∧b ≥ 1) and (c ≥ 1 ∧ d ≥ 1) respectively. Then mab and mcd may be seen as complexes (dimers) regulating the level of v. Suppose, in addition, that Kv,∅ = 0, Kv,{mab } = Kv,{mcd } = 1 and Kv,{mab ,mcd } = 2. Then, complexes mab and mcd specify activator complexes, with an individual effect which is less than a cumulated effect (the focal level of v in the presence of a single complex is less than the focal level of v in the presence of both complexes). This example illustrates the fact that multiplexes encode combinations of variables that regulate a given variable, and that the parameters, by giving a weight to each possible combinations of multiplexes, indicate how multiplexes regulate a given variable. As in Thomas’ method [Td90, TK01], it is assumed that variables evolve asynchronously and by unit steps toward their respective target levels. The dynamics of a gene regulatory network is then described by the following asynchronous state graph. Definition 3.4 (State Graph). Let N = (V, M, EV , EM , K) be a grn. The state graph of N is the directed graph S defined as follows: the set of vertices is the set of states of N , and there exists an edge (or transition) η → η 0 if one of the following conditions is satisfied: • there is no v ∈ V such that η(v) 6= Kv,ρ(η,v) and η 0 = η. • there exists v ∈ V such that η(v) 6= Kv,ρ(η,v) and ( 0 η (v) = η(v) + 1 if η(v) < Kv,ρ(η,v) η(v) − 1 if η(v) > Kv,ρ(η,v) and ∀u 6= v, η 0 (u) = η(u). Hence a state η is a stable state if and only if it has itself as successor, that is, if and only if every variable is stable at state η (i.e. η(v) = Kv,ρ(η,v) for every variable v). If η is not a stable state, then it has at least one outgoing transition. More precisely, for each variable v such that η(v) 6= Kv,ρ(η,v) , there is a transition allowing v to evolve (±1) toward its focal level Kv,ρ(η,v) . Every outgoing transition of η is supposed to be possible, so that there is an indeterminism as soon as η has several outgoing transitions. An example is given in Figure 2 (see also Section 7 for another example). 4 Pre- and post-conditions on path sets In order to formalize known information about a gene network, we introduce in this section a language to express properties of states (assertion language) and a language to express properties of state transitions (path language). Combining properties of state transitions and properties of states, at the beginning and at the end of a sequences of state transitions, leads to the notion of Hoare triplet on path programs. 4.1 An assertion language for discrete models of gene networks To describe properties of states in a meaningful way, we need terms that allow us to check, compare and manipulate variable values while taking parameter values into account. The following definitions define a language suitable for such needs. It extends [Kha10]. 5 Definition 4.1 (Terms of the assertion language) Let N = (V, M, EV , EM , K) be a grn. The well formed terms of the assertion language of N are inductively defined by: • Each integer n ∈ IN constitutes a well formed constant term • For each variable v ∈ V , the name of the variable v, considered as a symbol, constitutes a well formed constant term. • Similarly, for each v ∈ V and for each subset ω of N −1 (v), the symbol Kv,ω constitutes a well formed constant term. • If t and t0 are well formed terms then (t + t0 ) and (t − t0 ) are also well formed terms. Definition 4.2 (Assertion language and its semantics) Let N = (V, M, EV , EM , K) be a grn. The assertion language of N is inductively defined as follows: • If t and t0 are well formed terms then (t = t0 ), (t < t0 ), (t > t0 ), (t ≤ t0 ) and (t ≥ t0 ) are atoms of the assertion language. • If ϕ and ψ belong to the assertion language then ¬ϕ, (ϕ ∧ ψ), (ϕ ∨ ψ) and (ϕ ⇒ ψ) also belong to the assertion language. A state η of the network N satisfies an assertion ϕ if and only if its interpretation is valid in ZZ, after substituting each variable v by η(v) and each symbol Kv,ω by its value according to the family K. We note η |=N ϕ. 4.2 A path language for discrete models of gene networks The assertion language introduced above is a subset of first order logic well suited to describe properties on sets of states. It does not express dynamical aspects, since the dynamics of the system is encoded in the transitions of the state graph. A description of dynamical properties equates to a precise formulation of properties of paths. The language proposed here is suitable for encoding such properties. Definition 4.3 (Path language and path program) Let N = (V, M, EV , EM , K) be a grn. The path language of N is the language inductively defined by: • For each v ∈ V and n ∈ IN the expressions “v+”, “v−” and “v := n” belong to the path language (respectively increase, decrease or assignment of variable value). • If e is a formula belonging to the assertion language of N , then “assert(e)” also belongs to the path language. • If p1 and p2 belong to the path language then (p1 ; p2 ) also belongs to the path language (sequential composition). Moreover the sequential composition is associative, so that we can write (p1 ; p2 ; · · · ; pn ) without intermediate parentheses. • If p1 and p2 belong to the path language and if e is a formula belonging to the assertion language of N , then (if e then p1 else p2 ) also belongs to the path language. • If p belongs to the path language and if e and I are formulas belonging to the assertion language of N , then (while e with I do p) also belongs to the path language. The assertion I is called the invariant of the while loop. • If p1 and p2 belong to the path language then ∀(p1 , p2 ) and ∃(p1 , p2 ) also belong to the path language (quantifiers). Moreover the quantifiers are associative and commutative, so that we can write ∀(p1 , p2 , · · · , pn ) and ∃(p1 , p2 , · · · , pn ) as useful abbreviations. 6 For technical purposes, we also consider the empty program “ε” (outside the inductive definition). A well formed expression in the path language is called a path program. Intuitivelly, “v+” (resp. “v−”, “v := n”) means that the level of variable v is increasing by one unit (resp. decreasing by one unit, set to a particular value n). “assert(e)” allows one to express a property of the current state without change of state. The sequential composition allows one to concatenate two path programs whereas the statement “if ” allows one to choose between two programs according to the evaluation of the formula e. Finally it becomes possible to express properties of several paths thanks to the quantifiers ∀ and ∃. Lastly notice that ε appears in a path program if and only if the path is reduced to the empty program. These intuitions will be formalized in Section 5. 4.3 Syntax of pre- and post-conditions on path programs The next step is to combine properties of state transitions (path program) and properties of states (assertions), at the begining and at the end of the considered path program. This is done via the notion of Hoare triplet on path programs. Notation 4.4 A grn N being given, a Hoare triple on path programs is an expression of the form “{P } p {Q}” where P and Q are well formed assertions, called pre- and post-condition respectively, and p is a path program. Intuitively, the precondition P describes a set of states, e.g. all states for which variable v has value zero (P ≡ v = 0), the path program p describes dynamical processes, e.g. increase of variable v (p ≡ v+), and the postcondition again describes a set of states, e.g. all states for which variable v has value one (Q ≡ v = 1). This small example encodes the process of variable v changing its value from zero to one. Whether or not the expression is satisfied for a given gene network N depends on its state transition graph, thus it depends on the corresponding parameter values in K. 5 Semantics of Hoare triples on path programs We firstly define the semantics of path programs via a binary relation. The general ideas that motivate the definition below are the following: • Starting from an initial state η, sequences of instructions without existential or universal quantifier either transform η into another state η 0 or is not feasible so that η 0 is undefined. For example, the simple instruction v+ transforms η into η 0 (where ∀u 6= v, η 0 (u) = η(u) and η 0 (v) = η(v) + 1) if η → η 0 exists. If, on the contrary, this transition does not exist, the instruction is not feasible. • Existential quantifiers induce a sort of “non determinism” about η 0 : according to the chosen path under each existential quantifier one may get differents resulting states. Consequently, one cannot define the semantics as a partial function that associates a unique η 0 to η; a binary relation “η ; ...” is a more suited mathematical object. • Universal quantifiers induce a sort of “solidarity” between all the states η 0 that can be obtained according to the chosen path under each universal quantifier: all of them will have to satisfy the postcondition later on. For this reason, we define a binary relation that associates a set of states E to the initial state η: “η ; E”. Such a set E can be understood as grouping together the states it contains, under the scope of some universal quantifier. 7 • When the path program p contains both existential and universal quantifiers, we may p consequently get several sets E1 , · · · , En such that “η ; Ei ”, each of the Ei being a possibility through the existential quantifiers of p and all the states belonging to a given Ei being together through the universal quantifiers of p. On the contrary, if p is not p feasible, then there is no set E at all such that “η ; E” Notation 5.1 For a state η, a variable v and k ∈ [0, bv ], we define η[v ← k] as the state η 0 such that η 0 (v) = k and for all u 6= v, η 0 (u) = η(u). p Definition 5.2 [Path program relation ;]. Let N = (V, M, EV , EM , K) be a grn, let S be the state graph of N whose set of vertices is p denoted S and let p be a path program of N . The binary relation ; is the smallest subset of S × P(S) such that, for any state η: 1. If p is reduced to the instruction v+ (resp. v−), then let us consider η 0 = η[v ← (η(v) + 1)] p (resp. η 0 = η[v ← (η(v) − 1)]): if η → η 0 is a transition of S then η ; {η 0 } p 2. If p is reduced to the instruction v := k, then η ; {η[v ← k]} p 3. If p is reduced to the instruction assert(e), if η |=N e, then η ; {η} p1 p2 p1 p p 4. If p is of the form ∀(p1 , p2 ): if η ; E1 and η ; E2 then η ; (E1 ∪ E2 ) p2 p 5. If p is of the form ∃(p1 , p2 ): if η ; E1 then η ; E1 , and if η ; E2 then η ; E2 p1 6. If p is of the form (p1 ; p2 ): if η ; F and if {Ee }e∈F is a F -indexed family of state sets p2 p S such that e ; Ee , then η ; ( e∈F Ee ) 7. If p is of the form (if e then p1 else p2 ): p1 p p2 p • if η |=N e and η ; E then η ; E • if η 6|=N e and η ; E then η ; E 8. If p is of the form (while e with I do p0 ): p0 ;p p • if η |=N e and η ; E then η ; E p • if η 6|=N e then η ; {η} p 9. If p is the empty program ε, then η ; {η} This definition calls for several comments. p The relation ; exists because (i) the set of all relations that satisfy the properties 1–8 of the definition is not empty (the relation which links all states to all sets of states satisfies the properties) and (ii) the intersection of all the relations that satisfy the properties 1–8, also satisfies the properties. A simple instruction such as v+ can be not feasible from a state η (if η → η 0 is not a v+ transition of S). In this case, there is no set E such that η ; E. The same situation happens when the program is an assertion that is evaluated to false at the current state η. Universal quantifiers “propagate” non feasible paths: if one of the pi is not feasible then p ∀(p1 , · · · , pn ) is not feasible. It is not the case for existential quantifiers: if η ;i Ei for one of the pi then η ∃(p1 ···pn ) ; Ei even if one of the pj is not feasible. while... When a while loop does not terminate, there does not exist a set E such that η ; E. p This is due to the minimality of the binary relation ;. On the contrary, when the while loop 8 terminates, it is equivalent to a program containing a finite number of the sub-program p0 in sequence, starting from η. The semantics of sequential composition may seem unclear for whom is not familiar with p1 ;p2 commutations of quantifiers. We better take an example to explain the construction of ; (see Figure 1): p1 p1 ; p2 p2 E1 E1 ∪ E3 ηa F1 = E2 ηb E3 F 2 = ηc E4 gives: E1 ∪ E4 η E2 ∪ E3 η E2 ∪ E4 Figure 1: An example for the semantics of sequential composition p1 • Let us assume that starting from state η, two sets of states are reachable via p1 : η ; F1 = p1 {ηa , ηb } and η ; F2 = {ηc }. It intuitively means that p1 permits a choice between F1 and F2 through some existential quantifier on paths and that the path leading to F1 contains a universal quantifier grouping together ηa and ηb . • Let us also assume that: p2 p2 – starting from state ηa , two sets of states are reachable via p2 : ηa ; E1 and ηa ; E2 , p2 p2 – starting from state ηb , two sets of states are reachable via p2 : ηb ; E3 and ηb ; E4 , p2 – there is not any set E such that ηc ; E When focusing on the paths of (p1 ; p2 ) that encounter F1 after p1 , the paths such that p1 leads to ηa must be grouped together with the ones that leads to ηb . Nevertheless, for each of them, p2 permits a choice: between E1 or E2 for ηa and between E3 or E4 for ηb . Consequently, when grouping together the possible futures of ηa and ηb , one needs to consider the four possible p1 ;p2 p1 ;p2 p1 ;p2 p1 ;p2 combinations: η ; (E1 ∪ E3 ), η ; (E1 ∪ E4 ) η ; (E2 ∪ E3 ) and η ; (E2 ∪ E4 ). Lastly, when focusing on the paths of (p1 ; p2 ) that encounter F2 after p1 , since ηc has no future via p2 , there is no family indexed by F2 as mentioned in the definition and consequently it adds p1 ;p2 no relation into ; . p Lastly, let us remark that, if η ; E then E cannot be empty; it always contains at least one state. The proof is easy by structural induction of the program p (using the fact that a while loop which terminates is equivalent to a program containing a finite number of the sub-program p0 ). Definition 5.3 (Semantics of a Hoare triple). Let N = (V, M, EV , EM , K) be a grn and let S be the state graph of N whose set of vertices is denoted S. A Hoare triple {P } p {Q} is satisfied if and only if: p for all η ∈ S satisfying P , there exists E such that η ; E and for all η 0 ∈ E, η 0 satisfies Q. The previous definition implies the consistency of all the paths described by the path program p with the state graph: if path program p is not feasible from one of the states satisfying precondition P , then the Hoare triplet cannot be satisfied. For instance if some v+ is required by 9 b µ2 a≥1 1 µ1 a b a≥2 (2) (1) 0 µ3 ¬(b ≥ 1) 0 1 a 2 Figure 2: (Left) Graphical representation of the grn N = (V, M, EV , EM , K) with V = {a, b}, the bounds of a and b are respectivelly 2 and 1, M = {µ1 , µ2 , µ3 }, φµ1 is (a ≥ 2), φµ2 is (a ≥ 1), φµ3 is ¬(b ≥ 1). Finally the family of integers is {Ka,∅ = 1, Ka,{µ1 } = 1, Ka,{µ3 } = 2, Ka,{µ1 ,µ3 } = 2, Kb,∅ = 1, Kb,{µ2 } = 1}. (Right) Representation of its state graph. the path program p but the increasing of v is not possible according to the state graph, then the Hoare triple is not satisfied. More generally the path language plays the role of the programming language in the classical Hoare Logic. A Hoare triplet is satisfied iff from the states satisfying the precondition, the program p is feasible and leads to a set of states where the postcondition is satisfied. The path program p can then be viewed as the sequence of actions one can use in order to modify the state (memory) of the system. Nevertheless, similarly to classical Hoare logic which reflects a partial correctness of imperative programming language, the previous definition does not imply termination of while loops. Our path language can also define some infinite paths. Notice that if the non terminating while loop is at the end of the program, then it has a biological meaning: it represents periodic behaviours (such as the circadian cycle for instance). Examples. Let us consider the grn of Figure 2 and its state graph. 1. The Hoare triplet {(a = 0) ∧ (b = 0)} a+; a+; b + {(a = 2) ∧ (b = 1)} is satisfied, because : • There is a unique state satisfying the precondition (a = 0) ∧ (b = 0) and • from this state, the path program a+; a+; b+ is possible and leads to the state (2, 1) and • the state (2, 1) satisfies the postcondition (a = 2) ∧ (b = 1). 2. On the opposite, the Hoare triplet {(a = 2) ∧ (b = 0)} b+; a−; a − {(a = 0) ∧ (b = 1)} is not satisfied because from the state satisfying the precondition, the first “instruction” b+ is possible and leads to the state (2, 1) from which the next instruction b− is not consistant with the state graph. 3. The following Hoare triplet contains two existantial quantifiers and a universal one : {(a = 0) ∧ (b = 0)} ∀(a+, b+); ∃(a+, b+); ∃(ε, b+) {(b = 1)} • We have clearly (0, 0) • Since (1, 0) ∃(a+,b+) ; have both (0, 0) ∀(a+,b+) ; {(1, 0), (0, 1)} {(2, 0)} and (1, 0) ∀(a+,b+);∃(a+,b+) ; • We have trivially (1, 1) ∃(ε,b+) ; • Moreover we have both (2, 0) ∃(a+,b+) ; {(1, 1)} and (0, 1) {(1, 1), (2, 0)} and (0, 0) ∃(a+,b+) ; ∀(a+,b+);∃(a+,b+) ; {(1, 1)} ∃(ε,b+) ; {(2, 0)} and (2, 0) 10 ∃(ε,b+) ; {(2, 1)} {(1, 1)}, we {(1, 1)}. • We deduce that the considered program p can lead to 3 differents set of states : p p p (0, 0) ; {(1, 1), (2, 0)}, (0, 0) ; {(1, 1)} and (0, 0) ; {(1, 1), (2, 1)}. Because the postcondition is satisfied in both states (1, 1) and (2, 1), see the last set of states which is in relation with (0, 0), one can deduce that the Hoare Triplet is satisfied. 6 A Hoare logic for discrete models of gene networks In this section, we define a “genetically modified” Hoare logic by giving the rules for each instruction of our path language (definition 4.3). First, let us introduce a few notations for intensively used formulas. Notation 6.1 Let N = (V, M, EV , EM , K) be a grn and let v be a variable of V . 1. For each subset ω of N −1 (v) (set of predecessors of v in the network), we denote by Φωv the following formula: Φωv ≡ ( ^ ^ ϕm ) ∧ ( m ∈ ω m ∈ ¬ϕm ) N −1 (v)\ω where N −1 (v) \ ω stands for the complementary subset of ω in N −1 (v). From Definition 3.3, for all states η and for all variables v ∈ V , η |=N Φωv if and only if ω = ρ(η, v), that is, ω is the set of resources of v at state η. Consequently, there exists a unique ω such that η |=N Φωv . 2. We denote by Φ+ v the following formula: Φ+ v ≡ ^ (Φωv =⇒ Kv,ω > v) ω⊂G−1 (v) From Definition 3.4, η |=N Φ+ v if and only if there is a transition (η → η[v ← v + 1]) in the state graph S, that is, if and only if the variable v can increase. 3. We denote by Φ− v the following formula: Φ− v ≡ ^ (Φωv =⇒ Kv,ω < v) ω⊂G−1 (v) Similarly, η |=N Φ− v if and only if the variable v can decrease from the state η in the state graph S. By the way, in practice, the assertion assert(Φ= v ) is often ^useful from the biological point of = = view, where Φv is obviously defined by: Φv ≡ (Φωv =⇒ Kv,ω = v) ω⊂G−1 (v) Our Hoare logic for discrete models of gene networks is then defined by the following rules, where v is a variable of the grn and k ∈ IN . 1. Rules encoding Thomas’ discrete dynamics. Incrementation rule: { Φ+ v ∧ Q[v←v+1] } v+ {Q} Decrementation rule: { Φ− v ∧ Q[v←v−1] } v− {Q} 11 2. Rules coming from Hoare Logic. These rules are very similar to the ones given in Section 2. Obvious rules for the instruction assert(Φ) and the quantifiers are added: Assert rule: { Φ ∧ Q } assert(Φ) { Q } Universal quantifier rule: {P1 } p1 {Q} {P2 } p2 {Q} {P1 ∧P2 } ∀(p1 ,p2 ) {Q} Existential quantifier rule: {P1 } p1 {Q} {P2 } p2 {Q} {P1 ∨P2 } ∃(p1 ,p2 ) {Q} Assignment rule: {Q[v←k]} v:=k {Q} Sequential composition rule: {P2 } p2 {Q} {P1 } p1 {P2 } {P1 } p1 ;p2 {Q} Alternative rule: {P1 } p1 {Q} {P2 } p2 {Q} {(e∧P1 )∨(¬e∧P2 )} if e then p1 else p2 {Q} Iteration rule: {e∧I} p {I} {I} while e with I do p {¬e∧I} Empty program rule: P ⇒ Q {P } ε {Q} 3. Axioms. These axioms assert that all values stay between their bounds, where v is a variable of the grn N and ω ⊂ N −1 (v): Boundary axioms: 0≤v v ≤ bv 0 ≤ Kv,ω Kv,ω ≤ bv Remark 6.2 + • (Φ+ v ⇒ v < bv ) can be derived from the previous rules. Indeed, Φv implies that for ω corresponding to the current set of resources, Kv,ω > v and, using the boundary axiom Kv,ω ≤ bv , we get v < bv . • Similarly, we have Φ− v ⇒ v > 0. These implications will be used in section ??. We will prove in Section 8 that this modified Hoare logic is correct, and that it is complete provided that the path program under consideration contains the weakest loop invariants for all while statements. More precisely, the proof strategy called backward strategy, already described at the end of Section 2, also applies here: It computes the weakest precondition. Before giving these two proofs, let us show in the next section the usefulness of our genetically modified Hoare logic via the formal study of the possible biological functions of a very simple network. 7 Example In [SOMMA02, MSOI+ 02] Uri Alon and co-workers have studied the most common in vivo patterns involving three genes. Among them, they have enlightened the “incoherent feedforward loop of type 1”. It is composed by a transcription factor a that activates a second transcription 12 factor c, and both a and c regulate a gene b: a is an activator of b whereas c is an inhibitor of b. There is a “short” positive action of a on b and a “long” negative action via c: a activates c which inhibits b. The left hand side of Figure 3 shows such a feedforward loop. Considering that both thresholds of actions of a are equal leads to a boolean network since, in that case, the variable a can take only the value 0 (a has no action) or 1 (a activates both b and c). The right c c 1 + 1 1 l a≥1 − 1 a 1 + b a 1 λ ¬(c ≥ 1) σ a≥1 b Figure 3: Boolean incoherent feedforward of type 1. At right, graphical representation of the grn N = (V, M, EV , EM , K) with V = {a, b, c}, the bounds of a, b and c are equal to 1, M = {l, λ, σ}, φl is (a ≥ 1), φλ is (¬(c ≥ 1)), φσ is (a ≥ 1). Finally the family of integers is {Ka,∅ , Kc,∅ , Kc,{l} , Kb,∅ , Kb,{σ} , Kb,{λ} , Kb,{σ,λ} }. hand side of the figure shows the corresponding grn with multiplexes: σ encodes the “short” action of a on b, whilst l followed by λ constitute the “long” action. Several authors, like Uri Alon, consider that if a is equal to 0 for a sufficiently long time, both b and c will also be equal to 0, because b and c need a as a resource in order to reach the state 1. They also consider that the function of this feedforward loop is to ensure a transitory activity of b that signals when a has switched from 0 to 1: the idea is that a activates the productions of b and c, and then c stops the production of b. Here, we take a look at this question via four different path programs, and we prove formally that this affirmation is only valid under some constraints on the parameters of the network, and only under the assumption that b starts its activity before c. Is a transitory production of b possible? As already stated, the function classically associated with the feedforward loop is to ensure a transitory activity of b that signals when a has switched from 0 to 1. An interesting question is under which conditions the previous property is true ? For example the path program (1) P1 ≡ (b+; c+; b−) together with the pre-condition P ≡ (a = 1 ∧ b = 0 ∧ c = 0) and the post-condition Q0 ≡ {b = 0}, is a possible formalization of the previous property about the behaviour of the feedforward loop. The backward strategy using our genetically modified Hoare logic on this example gives the following successive conditions. • The weakest precondition obtained through the last instruction “b−” is the following conjunction: Φ− b ∧ Q0 [b ← b − 1] ≡  (¬¬(c ≥ 1) ∧ ¬(a ≥ 1)) =⇒ Kb < b       (¬¬(c ≥ 1) ∧ (a ≥ 1)) =⇒ Kb,σ < b (¬(c ≥ 1) ∧ ¬(a ≥ 1)) =⇒ K <b b,λ    (¬(c ≥ 1) ∧ (a ≥ 1)) =⇒ K  b,σλ < b   b−1=0 13 which simplifies as the conjunction Q1 : Q1 ≡  b=1       ((c ≥ 1) ∧ (a < 1)) =⇒ Kb = 0 ((c ≥ 1) ∧ (a ≥ 1)) =⇒ K =0 b,σ    ((c < 1) ∧ (a < 1)) =⇒ K  b,λ = 0   ((c < 1) ∧ (a ≥ 1)) =⇒ Kb,σλ = 0 • Then, the weakest precondition obtained through the instruction “c+” is: Φ+ c ∧ Q1 [c ← c + 1] ≡   ¬(a ≥ 1) =⇒ Kc > c     a ≥ 1 =⇒ Kc,l > c       b=1 ((c + 1 ≥ 1) ∧ (a < 1)) =⇒ K = 0 b    ((c + 1 ≥ 1) ∧ (a ≥ 1)) =⇒ K  b,σ = 0    ((c + 1 < 1) ∧ (a < 1)) =⇒ Kb,λ = 0     ((c + 1 < 1) ∧ (a ≥ 1)) =⇒ K b,σλ = 0 which simplifies as Q2 owing to the boundary axioms and remarks 6.2: Q2 ≡  c=0      a < 1 =⇒ Kc = 1    a ≥ 1 =⇒ K = 1 c,l  b = 1     a < 1 =⇒ Kb = 0    a ≥ 1 =⇒ Kb,σ = 0 • Lastly, the weakest precondition obtained through the first “b+” of the program is: Φ+ b ∧ Q2 [b ← b + 1] ≡                                    which simplifies as Q3 : Q3 ≡                            (¬¬(c ≥ 1) ∧ ¬(a ≥ 1)) =⇒ Kb > b (¬¬(c ≥ 1) ∧ (a ≥ 1)) =⇒ Kb,σ > b (¬(c ≥ 1) ∧ ¬(a ≥ 1)) =⇒ Kb,λ > b (¬(c ≥ 1) ∧ (a ≥ 1)) =⇒ Kb,σλ > b c=0 a < 1 =⇒ Kc = 1 a ≥ 1 =⇒ Kc,l = 1 b+1=1 a < 1 =⇒ Kb = 0 a ≥ 1 =⇒ Kb,σ = 0 a < 1 =⇒ Kb,λ = 1 a ≥ 1 =⇒ Kb,σλ = 1 c=0 a < 1 =⇒ Kc = 1 a ≥ 1 =⇒ Kc,l = 1 b=0 a < 1 =⇒ Kb = 0 a ≥ 1 =⇒ Kb,σ = 0 Then, using the empty program rule, it comes P =⇒ Q3 i.e. (a = 1 ∧ b = 0 ∧ c = 0) =⇒ Q3 and after simplification we get the correctness if and only if Kb,σλ = 1 and Kc,l = 1 and Kb,σ = 0. This proves that, whatever the values of the other parameters, the system can exhibit a transitory production of b in response to a switch of a from 0 to 1. 14 Is a transitory production of b possible without increasing c? The previous program P1 is not the only one reflecting a transitory production of b, there may be other realisations of this property. For example one can consider the path program : P2 ≡ (b+; b−). (2) With respect to this path program, the weakest precondition obtained through the last instruction “b−” is of course Q1 as previously. Then, the weakest precondition obtained through “b+” is:  b=0       ((c ≥ 1) ∧ (a < 1)) =⇒ ((Kb = 1) ∧ (Kb = 0)) ((c ≥ 1) ∧ (a ≥ 1)) =⇒ ((Kb,σ = 1) ∧ (Kb,σ = 0)) Q4 ≡      ((c < 1) ∧ (a < 1)) =⇒ ((Kb,λ = 1) ∧ (Kb,λ = 0))  ((c < 1) ∧ (a ≥ 1)) =⇒ ((Kb,σλ = 1) ∧ (Kb,σλ = 0)) Q4 is of course not satisfiable: it implies that each parameter associated with b is both equal to 0 and 1. The path program (b+; b−) is not feasible (inconsistent weakest precondition). Indeed, we retrieve an obvious property of the Thomas’ approach: if b has no negative action on itself then the sequence (b+; b−) cannot arise because the resources of b must change in order to switch its direction of evolution. Another possible path compatible with the path program (b+, c+, b−). Let us notice that, when Kb,σλ = 1, Kc,l = 1 and Kb,σ = 0, even if the system can exhibit a transitory production of b via (b+; c+; b−), this does not prevent from some other paths that do not exhibit this behaviour. For example the simple path P3 ≡ c+ leaves b constantly equal to 0, and the Hoare triplet ( a=1 ∧ b=0 ∧ c=0∧ Kb,σλ = 1 ∧ Kc,l = 1 ∧ Kb,σ = 0 ) c+ n b=0 o is satisfied, as the corresponding weakest precondition Q5 is clearly implied by the precondition. Q5 ≡ Φ+ c ∧ Q0 [c ← c + 1] ≡   c=0    a = 0 =⇒ K = 1 c  a = 1 =⇒ K c,l = 1    b=0 When a is constantly equal to 1 and when c = 1, production of b is impossible. Even worst: when a is constantly equal to 1, once c has reached the level 1, it is impossible for b to increase to 1. We prove this property by showing that the following triplet is inconsistent, whatever the loop invariant I: ( (3) a=1 ∧ b=0 ∧ c=1∧ Kb,σλ = 1 ∧ Kc,l = 1 ∧ Kb,σ = 0 ) while b < 1 with I do ∃(b+, b−, c+, c−) | {z P4 n b=1 o } The subprogram ∃(b+, b−, c+, c−) reflects the fact that a stays constant but b or c evolves. The while statement allows b and c to evolve freely until b becomes equal to 1. Applying the Iteration rule, I has to satisfy: • ¬(b < 1) ∧ I =⇒ (b = 1) This property is trivially satisfied whatever the assertion I, due to the boundary axioms. 15 • {b < 1 ∧ I} ∃(b+, b−, c+, c−) {I} We apply the existential quantifier rule, which gives the following weakest precondition: − + − Q6 ≡ (Φ+ b ∧I[b ← b + 1]) ∨ (Φb ∧I[b ← b − 1]) ∨ (Φc ∧I[c ← c + 1]) ∨ (Φc ∧I[c ← c − 1]) Consequently I can be any assertion such that (b = 0 ∧ I) =⇒ Q6 Let us denote P the precondition of the path program P4 . Applying the empty program rule, it comes that I must also satisfy P =⇒ I. So, because P =⇒ (b = 0), we have P =⇒ (b = 0 ∧ I), which, in turn implies Q6 . Moreover, let us remark that − + − Q6 =⇒ (Φ+ b ∨ Φb ∨ Φc ∨ Φc ) Consequently, if the Hoare triple 3 is correct, then: − + − P =⇒ (Φ+ b ∨ Φb ∨ Φc ∨ Φc ) which is impossible because, if P is satisfied, then: + • Φ+ b is false, as a = 1, c = 1 and Kb,σ = 0 (indeed,Φb implies a = 1 ∧ c = 1 ⇒ Kb,σ > 0) − • Φ− b is false, as b = 0 (Φb implies b > 0) + • Φ+ c is false, as c = 1 (Φc implies c < 1) − • Φ− c is false, as a = 1, c = 1 and Kc,l = 1 (Φc implies a = 1 ∧ c = 1 ⇒ Kc,l < 1). So, we have formally proved that when a is constantly equal to 1, once c has reached the level 1, it is impossible for b to increase to 1. 8 Partial Correctness and Completeness ”Partial” has to be understood here as ”Assuming that the while loops terminate”, as usual in Hoare logic. 8.1 Correctness Correctness of our modified Hoare logic means that: if ` {P } p {Q} according to the inference rules of Section 6, then the Hoare triple {P } p {Q} is semantically satisfied according to Definition 5.3, i.e.: for all η ∈ S (S being the set of states of S) such that η |=N P there exists p E ⊂ S such that η ; E and ∀η 0 ∈ E, η 0 |=N Q. The proof is made as usual by induction on the proof tree of ` {P } p {Q}. Hence, we have to prove that each rule of Section 6 is correct. Here we develop only the Incrementation rule and the Sequential composition rule since the correctness of the other inference rules is either similar (Decrementation rule) or trivial (Assert rule, quantifier rules, Assignment rule and Empty program rule) or standard in Hoare Logic (Alternative rule and Iteration rule). Let us note that the correctness of the Sequential composition rule is neither trivial nor standard because its semantics is enriched to cope with the quantifiers. Let N be a grn and let η be any state of the associated state space S: Incrementation rule: { Φ+ v ∧ Q[v←v+1] } v+ {Q} From Definition 5.3, the hypothesis is: 16 (where v is a variable of the grn) H η |=N Φ+ v and η |=N Q[v ← v + 1] and we have to prove the conclusion: v+ C there exists E ⊂ S such that η ; E and ∀η 0 ∈ E, η 0 |=N Q Let us choose E = {η 0 } with η 0 = η[v ← η(v) + 1]. From Notation 6.1, the hypotesis 0 η |=N φ+ v is equivalent to (η → η ) ∈ S, which in turn, according to Definition 5.2, implies v+ η ; {η 0 }. Hence, it only remains to prove that η 0 |=N Q, which results from the hypothesis η |=N Q[v ← v + 1]. 2 Sequential composition rule: {P2 } p2 {Q} {P1 } p1 {P2 } {P1 } p1 ;p2 {Q} From Definition 5.3, we consider the following three hypotheses: p1 H1 for all η1 ∈ S such that η1 |=N P1 there exists E1 such that η1 ; E1 and ∀η 0 ∈ E1 , η 0 |=N P2 p2 H2 for all η2 ∈ S such that η2 |=N P2 there exists E2 such that η2 ; E2 and ∀η 00 ∈ E2 , η 00 |=N Q H3 η |=N P1 and we have to prove the conclusion: p1 ;p2 C there exists E ⊂ S such that η ; E and ∀η 00 ∈ E, η 00 |=N Q p1 Let us arbitrarily choose a set E1 such that η ; E1 and ∀η 0 ∈ E1 , η 0 |=N P2 (we know that E1 exists from H1 and H3 ). 0 For each η 0 ∈ E1 , we similarly choose a set E2η such that: p2 0 0 0 η 0 ; E2η and ∀η 00 ∈ E2η , η 00 |=N Q (we know that the family {E2η }η0 ∈E1 exists from H2 and the fact that η 0 |=N P2 for all η 0 ∈ E2 ) 0 p1 ;p2 Let E = ( η0 ∈E1 E2η ), we have: η ; E from Definition 5.2 and ∀η 00 ∈ E, η 00 |=N Q (from the way the union is built). 2 S 8.2 Weakest precondition Completeness of Hoare logic would be of course defined as follows: If the Hoare triple {P } p {Q} is satisfied (according to Definition 5.3) then ` {P } p {Q} (using the inference rules of Section 6 as well as first order logic and proofs on integers). Obviously, as such, Hoare logics cannot be complete because, as already mentioned for classical Hoare logic, finding the weakest loop invariants is undecidable and there is no complete logic on integers (Gödel). So, following Dijkstra [Dij75], we prove completeness under the assumptions that the loop invariants of all while statements are weakest invariants and that the needed properties on integers are admitted. We adopt the strategy that computes the weakest precondition and we will prove the following theorem: Theorem 8.1 (Dijkstra theorem on the genetically modified Hoare logic) A grn N and a Hoare triple {P } p {Q} being given, the backward strategy defined at the end of Section 2, with the inference rules of Section 6, computes the weakest precondition P0 just before the last inference that uses the Empty program rule. It means that: if {P } p {Q} is satisfied, then P ⇒ P0 is satisfied. 17 This theorem has an obvious corrolary: Corollary 8.2 A grn N being given, our modified Hoare logic is complete under the assumption that all given loop invariants are the weakest ones and that the needed properties on integers are established. Proof of the corollary: if {P } p {Q} is satisfied, then, from the Dijkstra theorem above, there is a proof tree that infers the Hoare triple if there is a proof tree for the property P ⇒ P0 (which is semantically satisfied because P0 is the weakest precondition). First order logic being complete and properties on integers being axiomatically assumed, the proof tree for P ⇒ P0 exists. 2 Proof of Dijkstra theorem: Under the hypotheses that all loop invariants are minimal and that the Hoare triple {P } p {Q} is satisfied, i.e., under the hypotheses: p H1 for all η satisfying P , there exists E such that η ; E and for all η 0 ∈ E, η 0 satisfies Q H2 for all while statements of p, the corresponding loop invariant I is the weakest one one has to prove the conclusion: C P ⇒ P0 is satisfied, where P0 is the precondition computed by the proof of {P } p {Q} according to the backward strategy with the inference rules of Section 6. The proof is done by structural induction according to the backward strategy on p. • If p is of the form while e with I do p0 , then, by construction of the backward strategy, applying the Iteration rule, we get P0 = I, and the conclusion results immediately from H2 . v+ • If p is of the form v+, then the only set E such that η ; E is E = {η[v ← v + 1]}. The hypothesis H1 becomes: H1 for all η satisfying P , η 0 = η[v ← v + 1] satisfies Q and η → η 0 is a transition of S and from the Incrementation rule, the conclusion becomes: C P ⇒ (Φ+ v ∧ Q[v ← v + 1]) is satisfied. So, H1 ⇒ C straightforwardly results from the definition of Φv+ (Notation 6.1) and we do not use H2 . • If p is of the form p1 ; p2 , then we firstly inherit the two structural induction hypotheses: H3 for all assertions P 0 and Q0 , if {P 0 } p1 {Q0 } is satisfied then P 0 ⇒ P1 is satisfied, where P1 is the precondition computed from Q0 via the backward strategy H4 for all assertions P 00 and Q00 , if {P 00 } p2 {Q00 } is satisfied then P 00 ⇒ P2 is satisfied, where P2 is the precondition computed from Q00 via the backward strategy Moreover the hypothesis H1 becomes (Definition 5.2): 18 p1 H1 for all η satisfying P , there exists a family of state sets F = {Ee }e∈F such that η ; F p2 and e ; Ee for all e ∈ F and for all η 0 ∈ E = ( S e∈F Ee ), η 0 satisfies Q Lastly, from the Sequential composition rule, the conclusion becomes: C P ⇒ P1 is satisfied, where P1 is the weakest precondition of {· · ·} p1 {P2 }, P2 being the weakest precondition of {· · ·} p2 {Q}. From H4 (with Q00 = Q) it results that all the states e ∈ F of hypothesis H1 satisfy P2 . Consequently {P } p1 {P2 } is satisfied. Thus, from H3 (with Q0 = P2 and P 0 = P ) it comes P ⇒ P1 , which proves the conclusion. • Similarly to the correctness proof, we do not develop here the other cases of the structural induction. They are either similar to already developed cases (Decrementation rule) or trivial (Assert rule, quantifier rules, and Assignment rule) or standard in Hoare Logic (Alternative rule). 2 This ends the proof. 9 Discussion The cornerstone of the modeling process lies, whatever the application domain, in the determination of parameters. In this paper, we proposed an approach for exhibiting constraints on parameters of gene network models, that relies on the adaptation of the Hoare logic, initially designed for proofs of imperative programs. It leads to several questions about its usability and implementations. 9.1 Language issues The path language is a way to describe formally the specification of correct models of gene networks. Classically, the specifications can be expressed in temporal logics, like CTL and LTL, which also allows the modeler to take into account behavioral information. But even if there exists some links between path language and temporal logics, these formal languages (temporal logics and path language) are not comparable: some properties can be expressed in the path language and not in classical temporal logics and converselly. • On the one hand, in the path program, the assignment instruction allows one to express a knock-out of a gene (v := 0). Such knock-out of a gene is not expressible in CTL or LTL. • On the other hand, CTL or LTL is able to express properties on infinite cyclic traces. Such properties on infinite traces would be expressed in the path language by a program which does not terminate, and consequently, the post-condition would not make sense. Nevertheless, a succession of incrementation/decrementation instructions corresponds to a property that can be expressed in the CTL language. For example, if one knows the starting point, say (v1 = 1 ∧ v2 = 0), the path program v1 +; v2 +; v1 − corresponds to the formula EX(v1 = 2 ∧ EX(v2 = 1 ∧ EX(v1 = 1 ∧ v2 = 0))). Correctness of this program path with the precondition (v1 = 1 ∧ v2 = 0) becomes equivalent to verify that the CTL formula (v1 = 1 ∧ v2 = 0) ⇒ EX(v1 = 2 ∧ EX(v2 = 1 ∧ EX(v1 = 1 ∧ v2 = 0))) is true in all possible states. More generally, the path language is well suited for sequential properties whereas CTL can express non sequential ones. 19 # initializing T3:=1; T4:=1; d3:=1; d2:=0; gi:=0; gp:=0; gt:=0; tr:=0; # evolutions gi+; d2+; T3+; tr+; T3+; gp+; d3-; gt+;               (T 3 = 1) (T 4 = 1) (d3 = 1) (d2 = 0) (gi = 0) (gp = 0) (gt = 0) (tr = 0) ∧ ∧ ∧ ∧ ∧ ∧ ∧               ⇒             EX((gi = 1)∧ EX((d2 = 1)∧ EX((T 3 = 2)∧ EX((tr = 1)∧ EX((T 3 = 3)∧ EX((gp = 1)∧ EX((d3 = 0)∧ EX(gt = 1))))))))               Figure 4: A path program (top) with its corresponding CTL formula (bottom) In the path language, invariants of while loops are mandatory: Hoare logic is able to prove a program with while statements only if invariants are given. In other words, the entire information that the Hoare logic needs to perform the proof, is given by invariants. Unfortunately, invariants are difficult to devise. Thus the while statements are often used in proofs by refutation, where the proof is done for each possible invariant, see our example of section ??. 9.2 Plateform issues The Hoare logic for gene networks has been designed in order to support a software which aims at helping the determination of parameters of models of gene networks. We have already done its proof of feasability. Indeed, after having developped a prototype named SMBioNet which enumerates all possible valuations of parameters and retains only those which are coherent with a specified temporal logic formula, we developped a new prototype called WP-SMBioNet [Kha10], which uses a path program and the Weakest Precondition calculus (backward strategy) to produce constraints on parameters. In order to compare both approaches (CTL formulae versus path programs), we consider a property which can be expressed in both temporal logic CTL and path program. When modeling the biological system triggering the tail resorption during the metamorphose of tadpole, see [TTB+ 07] and references therein, the expression profiles of [LB77] can be translated into a path program, see Fig 4, which in turn can be translated into an equivalent CTL formula. For this example, whereas SMBioNet needs more than 3 hours to selects among all possible parameterizations those which lead to a dynamics coherent with the CTL formula, WP-SMBioNet needs only 10 seconds (on the same computer) to construct the constraints on the parameters. If we ask the enumeration of the parameters satisfying the constraints (using Choco [cT10]), the total search time is about 2 minutes. This example shows that the Hoare logic can speed up the determination of coherent parameterizations. We can notice that the complexity of the weakest precondition calculus is linear with the number of instructions in the path program, and does not depend on the size of gene regulatory networks: each node of the syntaxic tree of the program is visited only once. At the opposite, the CTL model checking algorithm depends on the size of the network. Thus, the use of path program instead of CTL formula leads to postpone the enumeration step which then can use the constraints on parameters to cut down drastically the set of parameterizations to consider. A software plateform dedicated to analysis of gene regulatory networks, should have to 20 combine different technics. Indeed constraints solving technics are necessary to enumerate parameters or give counter-examples, theorem prover can be also useful to get strategies for proofs by refutation, and model checking technics and Hoare logic precondition calculus should be combined in order to give very efficient algorithm. As already noted, it seems natural to use Hoare logic when the behavioural specification focuses on a finite time horizon, whereas model checking is natural when the temporal specification expresses global properties on infinite traces. It would be interesting to complete this plateform with some improved features. From a theoretical point of view, one could also develop approaches to help finding loop invariants. To build them, it seems possible to adapt the iterative approach adopted in ASTREE [CCF+ 05] but in another context (abstract interpretation [CC04]): Pragmatically one begins with a simple invariant I, then one tries to make the proof and completes iterativelly and partially the invariant. From an application point of view, specifications often stem from DNA profiles, it would be valuable to develop a program that automatically produces path programs from DNA chips data. Two questions emerge: the choice of thresholds on which is based the discretization of expression levels, and the determination of good time steps. These questions are out of the scope of this article. They mainly rely on biological expertise and experimental conditions. Acknowledgment We are grateful to Alexander Bockmayr and Heike Siebert for fruitful discussions and comments on this paper. The authors thank the French National Agency for Research (ANR-10-BLANC0218 BioTempo project) for its support. This work has also been supported by the CNRS PEPII project ”CirClock ”. References [BCRG04] G. Bernot, J.-P. Comet, A. Richard, and J. Guespin. Application of formal methods to biological regulatory networks: Extending Thomas’ asynchronous logical approach with temporal logic. Journal of Theoretical Biology, 229(3):339–347, 2004. [BG01] A. Blass and Y. Gurevich. Inadequacy of computable loop invariants. ACM Transactions on Computational Logic, 2(1), 2001. [BPGT01] C. Boileau, J. Prados, J. Geiselmann, and L. Trilling. Using constraint programming for learning from experiments transcriptional activation and the geometry of DNA. In T. Schiex L. Duret, C. Gaspin, editor, Actes des Journes Ouvertes Biologie Informatique Mathmatiques (JOBIM), Toulouse, 2001. [CC04] P. Cousot and R. Cousot. Building the Information Society, chapter Basic Concepts of Abstract Interpretation., pages 359–366. Kluwer Academic Publishers, 2004. [CCF+ 05] P. Cousot, R. Cousot, J. Feret, L. Mauborgne, A. Min, D. Monniaux, and X Rival. The ASTRE analyser. In M. Sagiv, editor, ESOP 2005 The European Symposium on Programming, number 3444 in LNCS, pages 21–30. Springer, 2005. [Cor08] Fabien Corblin. Conception et mise en oeuvre d’un outil déclaratif pour l’analyse des réseaux génétiques discrets. PhD thesis, Université Joseph-Fourier - Grenoble I, 12 2008. 21 [cT10] choco Team. choco: an open source java constraint programming library. Research report 10-02-INFO, Ecole des Mines de Nantes, 2010. [CTF+ 09] F. Corblin, S. Tripodi, E. Fanchon, D. Ropers, and L. Trilling. A declarative constraint-based method for analyzing discrete genetic regulatory networks. Biosystems, 98(2):91–104, 2009. [Dij75] Edsger W. Dijkstra. Guarded commands, nondeterminacy and formal derivation of programs. Commun. ACM, 18:453–457, August 1975. [FCT+ 04] E. Fanchon, F. Corblin, L. Trilling, B. Hermant, and D. Gulino. Modeling the molecular network controlling adhesion between human endothelial cells: Inference and simulation using constraint logic programming. In CMSB, pages 104–118, 2004. [Hat74] W.S. Hatcher. A semantic basis for program verification. J. of Cybernetics, 4(1):61–69, 1974. [Hoa69] C.A.R. Hoare. An axiomatic basis for computer programming. Communications of the ACM, 12(10):576–585, oct 1969. [KCRB09] Z. Khalis, J.-P. Comet, A. Richard, and G. Bernot. The SMBioNet method for discovering models of gene regulatory networks. Genes, Genomes and Genomics, 3(special issue 1):15–22, 2009. [Kha10] Z. Khalis. Logique de Hoare et identification formelle des paramtres d’un rseau gntique. PhD thesis, University of Evry-Val d’Essonne, 2010. [LB77] J. Leloup and M. Buscaglia. La triiodothyronine, hormone de la mtamorphose des amphibiens. CR Acad. Sci., 284:2261–2263, 1977. [MGCLG07] D. Mateus, J.-P. Gallois, J.-P. Comet, and P. Le Gall. Symbolic modeling of genetic regulatory networks. Journal of Bioinformatics and Computational Biology, 5(2B):627–640, 2007. [MSOI+ 02] R. Milo, S. Shen-Orr, S. Itzkovitz, N. Kashtan, D. Chklovskii, and U. Alon. Network motifs: Simple building blocks of complex networks. Science, 298:824–827, 2002. [SOMMA02] S. Shen-Orr, R. Milo, S. Mangan, and U. Alon. Network motifs in the transcriptional regulation network of escherichia coli. Nature Genetics, 31:64–68, 2002. [Td90] R. Thomas and R. d’Ari. Biological Feedback. CRC Press, 1990. [Tho91] R. Thomas. Regulatory networks seen as asynchronous automata : A logical description. J. theor. Biol., 153:1–23, 1991. [TK01] R. Thomas and M. Kaufman. Multistationarity, the basis of cell differentiation and memory. II. logical analysis of regulatory networks in terms of feedback circuits. Chaos, 11:180–195, 2001. [TTB+ 07] S. Troncale, R. Thuret, C. Ben, N. Pollet, J.-P. Comet, and G. Bernot. Modelling of the TH-dependent regulation of tadpole tail resorption. Journal of Biological Physics and Chemistry, 7(2):45–50, 2007. 22
5cs.CE
Parsimonious Random Vector Functional Link Network for Data Streams Mahardhika Pratama, Plamen P. Angelov, Edwin Lughofer Abstract – the theory of random vector functional link network (RVFLN) has provided a breakthrough in the design of neural networks (NNs) since it conveys solid theoretical justification of randomized learning. Existing works in RVFLN are hardly scalable for data stream analytics because they are inherent to the issue of complexity as a result of the absence of structural learning scenarios. A novel class of RVLFN, namely parsimonious random vector functional link network (pRVFLN), is proposed in this paper. pRVFLN adopts a fully flexible and adaptive working principle where its network structure can be configured from scratch and automatically generated in accordance with nonlinearity and time-varying property of system being modelled. pRVFLN is equipped with complexity reduction scenarios where inconsequential hidden nodes can be pruned and input features can be dynamically selected. pRVFLN puts into perspective an online active learning mechanism which expedites the training process and relieves operator’s labelling efforts. In addition, pRVFLN introduces a non-parametric type of hidden node, developed using an interval-valued data cloud. The hidden node completely reflects the real data distribution and is not constrained by a specific shape of the cluster. All learning procedures of pRVFLN follow a strictly single-pass learning mode, which is applicable for online time-critical applications. The advantage of pRVFLN was verified through numerous simulations with real-world data streams. It was benchmarked with recently published algorithms where it demonstrated comparable and even higher predictive accuracies while imposing the lowest complexities. Furthermore, the robustness of pRVFLN was investigated and a new conclusion is made to the scope of random parameters where it plays vital role to the success of randomized learning. Keywords – Random Vector Functional Link, Evolving Intelligent System, Online Learning, Randomized Neural Networks I. Introduction For decades, research in artificial neural networks has mainly investigated the best way to determine network free parameters, which reduces error as close as possible to zero [18]. Various approaches [55], [56] were proposed, but a large volume of work is based on a first or second-order derivative approach in respect to the loss function [19], [36]. Due to the rapid technological progress in data storage, capture, and transmission [34], the machine learning community has encountered an information explosion, which calls for scalable data analytics. Significant growth of the problem space has led to a scalability issue for conventional machine learning approaches, which require iterating entire batches of data over multiple epochs. This phenomenon results in a strong demand for a simple, fast machine learning algorithm to be well-suited for deployment in numerous data-rich applications [58]. This provides a strong case for research in the area of randomized neural networks (RNNs) [10], [13], [52], which was very popular in late 80’s and early 90’s. RNNs offer an algorithmic framework, which allows them to generate most of the network parameters randomly while still retaining reasonable performance [8], [47]. One of the most prominent RNNs in the literature is the random vector functional link (RVFL) network which features solid universal approximation theory under strict conditions [10]. Due to its simple but sound working principle, the RNN has regained its popularity in the current literature [8], [11], [14], [15], [17], [41], [50], [51], [63], [66], [67]. Nonetheless, vast majority of RNNs in the literature suffer from the issue of complexity which make their computational complexity and memory burden prohibitive for data stream analytics since their complexities are manually determined and rely heavily on expert domain knowledge [12]. They presents a fixed-size structure which lacks of adaptive mechanism to encounter changing training patterns in the data streams [15]. Random selection of network parameters often leads the network complexity to go beyond what necessary due to existence of superfluous hidden nodes which contribute little to the generalization performance [45]. Although the universal approximation capability of RNN is assured only when a sufficient complexity is selected, choosing suitable complexity for given problems entails expert-domain knowledge and is problemdependent. A novel RVFLN, namely parsimonious random vector functional link network (pRVFLN), is proposed. pRVFLN combines simple and fast working principles of RFVLN where all network parameters but the output weights are randomly generated with no tuning mechanism of hidden nodes. It characterises the online and adaptive nature of evolving intelligent systems where network components are automatically generated on the fly. pRVFLN is capable of following any variations of data streams no matter how slow, rapid, gradual, sudden or temporal drifts in data streams are because it can initiate its learning structure from scratch with no initial structure and its structure is self-evolved from data streams in the one-pass learning mode by automatically adding, pruning and recall its hidden nodes [45]. Furthermore, it is compatible for online real-time deployment because data streams are handled without revising previously seen samples. pRVFLN is equipped with the hidden node pruning mechanism which guarantees low structural burdens and the rule recall mechanism which aims to address the cyclic concept drift. pRVFLN incorporates a dynamic input selection scenario which makes possible activation and deactivation of input attributes on the fly and an online active learning scenario which rules out inconsequential samples from training process. Moreover, pRVFLN is a plug-and-play scenario where a single training process encompasses all learning scenarios and a sample-wise manner without pre-and/or post-processing steps. Novelties of pRVFLN are elaborated as follows: • Network Architecture: Unlike majority of existing RVFLNs, pRVFLN is structured as a locally recurrent neural network with a self-feedback loop at the hidden node to capture temporal system dynamic [24]. The recurrent network architecture puts into perspective a spatio-temporal activation degree which takes into account compatibility of both previous and current data points without compromising the local learning property because of its local recurrent connection. pRVFLN introduces a new type of hidden node, namely an interval-valued data cloud inspired by the notion of recursive density estimation and AnYa by Angelov [1], [2]. This hidden node is parameter-free and requires no parameterization per scalar variable. It is not constrained by a specific shape and its firing strength is defined as a local density calculated as accumulated distances between a local mean and all data points in the cloud seen thus far. Our version in this paper distinguishes itself from its predecessors in [1], [2] in the fact that an interval uncertainty is incorporated per local region which targets imprecision and uncertainties of sensory data [50]. Interval-valued data cloud still satisfies the universal approximation condition of the RVFLN since it is derived using the Cauchy kernel which is asymptotically a Gaussian-like function. Moreover, the output layer consists of a collection of functional-link output nodes created by the second order Chebyshev polynomial which increases the degree of freedom of the output weight to improve its approximation power [38]. • Online Active Learning Mechanism: pRVFLN possesses an online active learning mechanism which is meant to extract data samples for training process. This mechanism is capable of finding important data streams for training process, while discarding inconsequential samples [54]. This strategy expedites the training mechanism and improves model’s generalization since it prevents redundant samples to be learned. This scenario is underpinned by sequential entropy method (SEM) which forms a modified version of neighbourhood probability method [64] for data streams. The SEM quantifies the entropy of neighbourhood probability recursively and differs from that of [45] because it integrates the concept of data cloud. The concept of data cloud further simplifies the working principle of SEM since its activation degree already abstracts a density of a local region – a key attribute of neighbourhood probability. In realm of classification problems, the SEM does not always call for ground truth which leads to significant reduction of operator annotation’s efforts. • Hidden Node Growing Mechanism: pRVFLN is capable of automatically generating its hidden nodes on the fly with the help of type-2 self-constructing clustering (T2SCC) mechanism which was originally designed for an incremental feature clustering mechanism [26], [32]. This method relies on the correlation measure in the input space and target space, which can be carried out in the single-pass learning mode with ease. The original version, cannot be directly implemented here because the original version is not yet designed for the interval-valued data cloud. This rule growing process also differs from those of other RNNs with a dynamic structure [12], because the hidden nodes are not randomly generated, rather they are created from the rule growing condition, which considers the locations of data samples in the input space. We argue that randomly choosing centers or focal points of hidden nodes independently from the original training data risks on performance deterioration [57], because it may not hold the completeness principle. pRVFLN relies on the data cloud-based hidden node, which does not require any parameterization, thus offering a simple and fast working framework as other RNNs. • Hidden Node Pruning and Recall Mechanism: a rule pruning scenario is integrated in pRVFLN. The rule pruning scenario plays vital role to assure modest network structures since it is capable of detecting superfluous neurons to be removed during the training process [34]. pRVFLN employs the socalled type-2 relative mutual information (T2RMI) method which extends the RMI method [21] to the working principle of the interval-valued hidden node. The T2RMI method examines relevance of hidden nodes to target concept and thus captures outdated hidden nodes which is no longer compatible to portray the current target concept. In addition, the T2RMI method is applied to recall previously pruned rules. This strategy is important to deal with the so-called recurring drift. The recurring drift refers to a situation where old concept re-emerges again in the future. The absence of rule recall scenario risks on the catastrophic forgetting of previously valid knowledge because the cyclic drift imposes an introduction of a new rule without any memorization of learning history. It differs from that [34] because the rule recall mechanism is separated from the rule growing scenario. • Online Feature Selection Mechanism: pRVFLN is capable of carrying out an online feature selection process, borrowing several concepts of online feature selection (OFS) [59]. Note that although feature selection is well-established for an offline situation, online feature selection remains a challenging and unsolved problem because feature contribution must be measured with the absence of a complete dataset. Notwithstanding some online feature reduction scenarios in the literature, the issue of stability is still open, because an input feature is permanently forgotten once pruned. The OFS delivers a flexible online feature selection scenario, because it makes possible to select or deselect input attributes in every training observation by assigning crisp weights (0 or 1) to input features. Another prominent characteristic of the OFS method lies in its capability to deal with partial input features, because the cost of extracting all input features may be expensive in certain applications. The convergence of the OFS for both full and partial input attributes have been also proven. Nevertheless, the original version [59] is originally devised for linear regression and calls for some modification to be perfectly fit to pRVLFN. The generalized OFS (GOFS) is proposed here and incorporates some refinements to adapt to the working principle of the pRVFLN. This paper puts forward the following contributions: 1) it presents a novel random vector functional link network termed pRVFLN. pRVFLN aims to handle the issue of data streams which remains an uncharted territory of current RVFLN works; 2) it puts into perspective the interval-valued data cloud which is not shape-specific and non-parametric. It requires no parameterization per scalar variable and makes use of local density information of a data cloud. This strategy aims to hinder complete randomization of hidden node parameters while still maintaining no tuning principle of RVFLN. Randomization of all hidden node parameters blindly without bearing in mind true data distribution lead to common pitfall of RVFL where the hidden node matrix tend to be ill-defined and compromises the completeness of network structure as confirmed in [57]. ; 3) four learning components, namely SEM, T2SCC, T2RMI, GOFS, are proposed. The efficacy of pRVFLN was thoroughly evaluated using numerous real-world data streams and benchmark with recently published algorithms in the literature where pRVFLN demonstrated a highly scalable approach for data stream analytics with trivial cost of its generalization performance. A supplemental document containing additional numerical studies, analysis of predefined threshold and the effect of learning components is also provided in 1). Moreover, analysis of robustness of random intervals was performed. It is concluded that random regions should be carefully selected and should be chosen close enough to true operating regions of a system being modelled. The MATLAB codes of pRVFLN is made publicly available in 4) to help further study. The rest of this paper is structured as follows: Network architecture of pRVFLN is outlined in Section 2; Algorithmic development of pRVFLN is detailed in Section 3; Proof of concepts are outlined in Section 4; Conclusions are drawn in the last section of this paper. II. Network Architecture of pRVFLN pRVFLN utilises a local recurrent connection at the hidden node which generates the spatiotemporal property. In the literature, there exist at least three types of recurrent network structures referring to its recurrent connections: global [22], [24], interactive [33], and local [23], but the local recurrent connection is deemed to be the most compatible recurrent type to our case because it does not harm the local property, which assures stability when adding, pruning and fine-tuning hidden nodes. pRVFLN utilises the notion of the functional-link neural network which presents the so-called enhancement layer. Furthermore, the hidden layer of pRVFLN is built upon an interval-valued data cloud, which does not require any parametrization and granulation [1]. This hidden node does not have any pre-specified shape and fully evolves its shape with respect to the real data distribution because it is derived from recursive local density estimation. We bring the idea of data cloud further by integrating an interval-valued principle. Suppose that a data tuple streams at t-the time instant, where X t  n is an input vector and Tt  m is a target vector while n and m are respectively the numbers of input and output variables. Because pRVFLN works in a strictly online learning environment, it has no access to previously seen samples, and a data point is simply discarded after being learned. Due to the pre-requisite of an online learner, the total number of data N is assumed to be unknown. The output of pRVFLN is defined as follows: R ~ ~ y o    i Gi ,temporal ( At X t  Bt ), Gtemporal  [G , G ] (1) i 1 where R denotes the number of hidden nodes.  i stands for the i-th output node, produced by weighting the weight vector with an extended input vector  i  xe wi , where xe  ( 2 n1)1 is an extended input vector T resulting from the functional link neural network based on the Chebyshev function and wi  ( 2 n1)1 is a connective weight of the i-th output node. At n is an input weight vector randomly generated here. Bt ~ is the bias fixed at 0 for simplicity. Gi ,temporal is the i-th interval-valued data cloud, triggered by the upper and lower data cloud G i ,temporal , G i ,temporal . By expanding the interval-valued data cloud, the following is obtained: R R i 1 i 1 (2) yo   (1  qo )  i G i ,temporal   qo  i G i ,temporal where q  m is a design factor to reduce an interval-valued function to a crisp one [9]. It is worth noting that the upper and lower activation functions G i ,temporal , G i ,temporal deliver spatiotemporal characteristics as a result of a local recurrent connection at the i-th hidden node, which combines the spatial and temporal firing strength of the i-th hidden node. These temporal activation functions output the following. t 1 t t t 1 G i ,temporal  i G i , spatial  (1  i )G i ,temporal , G i ,temporal  i G i ,spatial  (1  i )G i ,temporal t t where    R is a weight vector of the recurrent link. The local feedback connection here feeds the ~ 1 spatiotemporal firing strength at the previous time step Git,temporal back to itself and is consistent with the local learning principle. This trait happens to be very useful in coping with the temporal system dynamic because it functions as an internal memory component which memorizes a previously generated spatiotemporal activation function at t-1. Also, the recurrent network is capable of overcoming overdependency on time-delayed input features and lessens strong temporal dependencies of subsequent patterns [36]. This trait is desired in practise since it may lower input dimension, because prediction is done based on recent measurement only. Conversely, the feedforward network assumes a problem as a function of current and past input and outputs. This strategy at least entails expert knowledge for system order to determine the number of delayed components. The hidden node of the pRVFLN is an extension of the cloud-based hidden node, where it embeds an interval-valued concept to address the problem of uncertainty [30]. Instead of computing an activation degree of a hidden node to a sample, the cloud-based hidden node enumerates the activation degree of a sample to all intervals in a local region on-the-fly. This results in local density information, which fully reflects real data distributions. This concept was defined in AnYa [1], [3] and was patented in [2]. This concept is also the underlying component of AutoClass and TEDA-Class [4]. All of which come from Angelov’s sound work of RDE [3]. This paper aims to modify these prominent works to the intervalvalued case. Suppose that N i denotes the support of the i-th data cloud, an activation degree of i-th cloudbased hidden node refers to its local density estimated recursively using the Cauchy function: ~ Gi , spatial  1 ~ xk  xt 2 1  ( ) Ni k 1 Ni ~ ~ xk ,i  [ x k ,i , x k ,i ], Gi ,spatial  [G i ,spatial , G i ,spatial ] (3) xk is k-th interval in the i-th data cloud and xt is t-th data sample. It is observed that Eq. (3) requires where ~ the presence of all data points seen so far, which is impossible when dealing with data streams. Its recursive form is formalised in [3] and is generalized here to the interval-valued problem: G i , spatial  1 1  At xt   i , Ni T 2   i , Ni   i , Ni 2 , G i , spatial  1 1  A xt   i , N T t 2 i (4)   i , Ni   i , N 2 i where  i ,  i signify the upper and lower local means of the i-th cloud:  i, N  ( i xi ,k   i xi , N i   i N 1 Ni  1 ,  i ,1  xi ,1   i )  i , N 1  ,  i ,1  xi ,1   i ,  i , Ni  ( i )  i , Ni 1  i Ni Ni Ni N i ,k (5) where  i is an uncertainty factor of the i-th cloud, which determines the degree of tolerance against uncertainty. The uncertainty factor creates an interval of the data cloud, which controls the degree of tolerance for uncertainty. It is worth noting that a data sample is considered as a population of the i-th cloud when resulting in the highest density. Moreover,  i , N i ,  i , Ni are the upper and lower mean square lengths of the data vector in the i-th cloud as follows: 2  i , Ni xi , Ni   i N 1 ( i )i , Ni 1  , i ,1  xi ,1 Ni Ni 2 2   i ,  i , Ni xi , Ni   i N 1  ( i ,k ) i , Ni 1  ,  i ,1  xi ,1 Ni ,k Ni 2  i (6) It can be observed from Eq. (3) that the cloud-based hidden node does not have any specific shape and evolves naturally according to its supports. Furthermore, it is parameter-free, where no parameters – centroid, width, etc. as encountered in the conventional hidden node need to be assigned. Although the concept of the cloud-based hidden node was generalized in TeDaClass [27] by introducing the eccentricity and typicality criteria, the interval-valued idea is uncharted in [27]. Note that the Cauchy function is asymptotically a Gaussian-like function, satisfying the integreable requirement of the RVFLN to be a universal approximator. Unlike conventional RNNs, pRVFLN puts into perspective a nonlinear mapping of the input vector through the Chebyshev polynomial up to the second order. This concept realises an enhancement layer linking the input layer to the output layer - consistent with the original concept of the RVFLN. Note that recently developed RVFLNs in the literature mostly neglect the direct connection because they are designed with a zero-order output node [8], [11], [14], [15], [17], [41], [50], [51], [63], [66],[67] . The direct connection expands the output node to a higher degree of freedom, which aims to improve the local mapping aptitude of the output node. The direct connection produces the extended input vector xe making use of the second order Chebyshev polynomial:  p 1 ( x)  2 x j p ( x j )  p 1 ( x j ) (7) where 0 ( x j )  1, 1 ( x j )  x j , 2 ( x j )  2 x 2j  1 . Suppose that three input attributes are given X  [ x1 , x2 , x3 ] , the extended input vector is expressed as the Chebyshev polynomial up to the second order xe  [1, x1 , 2 ( x1 ), x2 , 2 ( x2 ), x3 , ( x3 )] . Note that the term 1 here represents an intercept of the output node. This avoids an output node from going through origin, which may risk an untypical gradient. There exist other functions as well in functional-link neural networks: trigonometric and polynomial, power. The Chebyshev function, however, scatters fewer parameters to be stored into memory than the trigonometric function, while the Chebyshev function has better mapping capability than other polynomial functions of the same order. In addition, the polynomial power function is not robust against an extrapolation case. pRVFLN implements the random learning concept of the RVFLN, in which all parameters, namely the input weight A , design factor q , recurrent link weight  , and uncertainty factor  , are randomly generated. Only the weight vector is left for parameter learning scenario wi . Since the hidden node is parameter-free, no randomization takes place for hidden node parameters. The network structure of pRVFLN and the interval-valued data cloud are depicted in Fig. 1 and 2 respectively. Fig. 1 Network Architecture of pRVFLN III. Learning Policy of pRVFLN This section discusses the learning policy of pRVFLN. Section 3.1 outlines the online active learning strategy, which deletes inconsequential samples. Samples, selected in the sample selection mechanism, are fed into the learning process of pRVFLN. Section 3.2 deliberates the hidden node growing strategy of pRVFLN. Section 3.3 elaborates the hidden node pruning and recall strategy, while Section 3.4 concerns the online feature selection mechanism. Section 3.5 explains the parameter learning scenario of pRVFLN. Algorithm 1 shows the pRVFLN learning procedure. 3.1 Online Active Learning Strategy The active learning component of the pRVFLN is built on the extended sequential entropy (ESEM) method, which is derived from the SEM method [64]. The ESEM method makes use of the entropy of the neighborhood probability to estimate the sample contribution. There exist at least three salient facets that distinguish the ESEM from its predecessor [64]:1) it forms an online version of the SEM; 2) it is combined with the concept of the data cloud, which accurately represents the local density; and 3) it handles regression as well as classification because the sample contribution is enumerated without the presence of true class label. One may agree that the vast majority of sample selection variants are designed for classification problems only, and delve sample’s location in respect to the decision surface. To the best of our knowledge, only Das et al. [16] address the regression problem, but it still shares the same principle as its predecessors, exploiting the hinge cost function to evaluate sample contribution [54]. The concept of neighborhood probability refers to the probability of an incoming data stream sitting in the existing data clouds, which is written as follows: Ni M ( X t , xk ) Ni P( X t  N i )  Rk 1N i M ( X t , xk )  Ni i 1 k 1  (8) Algorithm 1. Learning Architecture of pRVFLN Algorithm 1: Training Procedure of pRVFLN ( X t , Tt )  ( x1 ,.., xn , t1 ,.., tm ) Predefined Parameters 1 ,  2 Define: Training Data /*Step 1: Online Active Learning Strategy/* For i=1 to R do Calculate the neighborhood probability (8) with spatial firing strength (4) End For Calculate the entropy of neighborhood probability (8) and the ESEM (10) IF (34) Then /*Step 2: Online Feature Selection/* IF Partial=Yes Then Execute Algorithm 3 Else IF Execute Algorithm 2 End IF /*Step 3: Data Cloud Growing Mechanism/* For j=1 to n do Compute  ( x j , To ) End For For i=1 to R do Calculate input coherence (12) For o=1 to m do ~ ,T ) Calculate  (  i o Compute the output coherence (13) End For IF (16) Then Associate a sample to a data cloud to the i* data cloud Ni*=Ni*+1 Update the local mean and the square length of i*-th data cloud (5), (6) Else Create new data cloud Take the next sample and Go to Phase 1 End IF /*Step 4: Data Cloud Pruning Mechanism/* For i=1 to R do For o=1 to m do ~ Calculate  (Gi ,temp , To ) End For IF (19) Then Discard i-th data cloud End IF End For /*Step 5: Adaptation of Output Weight/* For i=1 to R do Update output weights using FWGRLS End For End For where XT is a newly arriving data point and xn is a data sample, associated with the i-th rule. M(XT,xk) stands for a similarity measure, which can be defined as any similarity measure. The bottleneck problem of (8) is however caused by its requirement to revisit already seen samples. This issue can be tackled by formulating the recursive expression of (8). Instead of formulating the recursive definition of (8), the spatial firing strength of the data cloud suffices to be an alternative because it is derived from the idea of local density and is computed based on the local mean [1] which summarizes the characteristic of data streams. (8) is then written as follows: P( X t  N i )  i (9) R  i 1 i where  i is a type-reduced activation degree  i  (1  q)G i ,spatial  qG i ,spatial . is determined, its entropy is formulated as follows: Once the neighbourhood probability R H (  X t )   P( X t  N i ) log P( X t  N i ) (10) i 1 The entropy of the neighbourhood probability measures the uncertainty induced by a training pattern. A sample with high uncertainty should be admitted for the model update, because it cannot be well-covered by an existing network structure. Learning such a sample is beneficial, because it minimises uncertainty. A sample is to be accepted for model updates, provided that the following condition is met: H  thres (11) where thres is an uncertainty threshold. This parameter is not fixed during the training process, rather it is dynamically adjusted to suit the learning context. This strategy is necessary to compensate for the potential increase of training samples to be accepted during the presence of concept drift. The threshold is set as thresN 1  thresN (1  inc) , where it augments thresN 1  thresN (1  inc) when a sample is admitted for the training process, whereas it decreases thresN 1  thresN (1  inc) when a sample is ruled out for the training process. inc here is a step size, set at inc=0.01. This simply follows its default setting in [68]. Fig. 2 Interval Valued Data Cloud 3.2 Hidden Node Growing Strategy pRVFLN relies on the T2SCC method to grow interval-valued data clouds on demands. This notion is extended from the so-called SCC method [26], [65] to be well-suited with the type-2 hidden node working framework. The significance of the hidden nodes in pRVFLN is evaluated by checking its input and output coherence through analysis of its correlation to existing data clouds and the target concept. Let ~i  [  i ,  i ]  1n is a local mean of the i-th interval-valued data cloud (5), X t   n is an input vector and Tt  m is a target vector, the input and output coherence are written as follows: I C ( i , X t )  (1  q) (  i , X t )  q (  i , X t ) (12) OC ( i , X t )  ( ( X t , Tt )   ( i , Tt )),  ( i , Tt )  (1  q) (  i , Tt )  q (  i , Tt ) (13) where  () is the correlation measure. Both linear and non-linear correlation measures are applicable here. However, the non-linear correlation measure is rather hard to deploy in the online environment, because it is usually executed using the Discretization or Parzen Window method [49]. This often leads to an assumption of uniform data distribution as implemented in the differential entropy [28]. The Pearson correlation measure is a widely used correlation measure but it is insensitive to the scaling and translation of variables as well as being sensitive to rotation [35]. The maximal information compression index (MCI) is one of attempts to tackle these problems and is used in the T2SCC to perform the correlation measure  () [35]. It is defined as follows: 1  ( X 1 , X 2 )  (var( X 1 )  var( X 2 )  (var( X 1 )  var( X 2 )) 2  4 var( X 1 ) var( X 2 )(1   ( X 1 , X 2 )2 )) 2  ( X1 , X 2 )  where (X1,X2) cov( X 1 , X 2 ) var( X 1 ) var( X 2 ) are to be (14) (15) substituted by (  i , X t ), (  i , X t ), (  i , Tt ), (  i , Tt ), (  i , X t ), ( X t , Tt ) . var( X ), cov( X 1 , X 2 ),  ( X 1 , X 2 ) respectively stand for the variance of X, covariance of X1 and X2, and Pearson correlation index of X1 and X2. The local mean of the interval-valued data cloud is used to represent a data cloud because it captures the influence of all intervals of a data cloud. In essence, the MCI method indicates the amount of information compression when ignoring a newly observed sample. The principal component direction is referred to here, because it signifies the maximum information compression, resulting in maximum cost to be imposed when ignoring a datum. The MCI method features the following properties: 1) 0   ( X 1 , Y2 )  0.5(var( X 1 )  var( X 2 )) , 2) a maximum correlation is given by  ( X 1 , X 2 )  0 , 3) a symmetric property  ( X 1 , X 2 )   ( X 2 , X 1 ) , 4) the mean expression is discounted here. This makes it invariant against the translation of the dataset, and 5) it is also robust against rotation, which is verifiable from the perpendicular distance of a point to a line, and is unaffected by the rotation of the input features. The input coherence explores the similarity between new data and existing data clouds directly, while the output coherence focusses on their dissimilarity indirectly through a target vector as a reference. The input and output coherence formulates a test that determines the degree of confidence to the current’s hypothesis: I C ( ~i , X t )  1 , OC ( ~ i , X t )   2 (16) where 1  [0.001,0.01],  2  [0.01,0.1] are predefined thresholds. If a hypothesis meets both conditions, a new training sample is assigned to a data cloud with the highest input coherence i*. Accordingly, the ~ number of intervals Ni*, local mean and square length ~i* ,  i* are updated respectively with (5) and (6) as well as Ni*=Ni*+1. A new data cloud is introduced, provided that none of the existing hypotheses pass the test (16) – one of the conditions is violated. This situation reflects the fact that a new training pattern conveys significant novelty, which has to be incorporated to enrich the scope of the current hypotheses. Note that a larger α1 is specified, fewer data clouds are generated and vice versa, whereas a larger α2 is specified, larger data clouds are added and vice versa. The sensitivity of these two parameters are studied in the other section of this paper. Because a data cloud is a non-parametric model, no parameterization is committed for a new data cloud. The output node of a new data cloud is initialised: WR 1  Wi* , R1  I (17) where   10 5 is a large positive constant. The output node is set as the data cloud with the highest input coherence because this data cloud is the closest one to the new data cloud. Furthermore, the setting of covariance matrix can produce a close approximation of the global minimum solution of batched learning, as proven mathematically in [31]. 3.3 Hidden Node Pruning and Recall Strategy pRVFLN incorporates a data cloud pruning scenario, termed the type-2 relative mutual information (T2RMI) method. This method was firstly developed in [21] for the type-1 fuzzy system and extended in [41] to adapt to the interval-valued working principle. This method is convenient to use in pRVFLN because it estimates mutual information between a data cloud and a target concept by analysing their correlation. Hence, the MCI method (14) - (15) can be applied to measure the correlation. Although this method has been well-established [21], [41], its effectiveness in handling data clouds and a recurrent structure as implemented in pRVFLN is to date an open question. Unlike both the RMI method [36] and T2RMI method [41] that apply the classic symmetrical uncertainty method, the T2RMI method is formulated using the MCI method as follows:  (Gi ,temp , Tt )  q (G i ,temp , Tt )  (1  q) (G i ,temp , Tt ) (18) where G i ,temp is a lower temporal activation function of the i-th rule. The temporal activation function is included in (17) rather than the spatial activation function in order for the inter-temporal dependency of the recurrent structure to be considered. The MCI method is chosen here, because it offers a good tradeoff between accuracy and simplicity. It possesses significantly lower computational burden than the symmetrical uncertainty method even when implemented with the differential entropy [28] but is more robust than a widely used Pearson correlation index. A data cloud is deemed inconsequential and thus is able to be removed with negligible impact to accuracy, if (19) is met:  i  mean( i )  2std ( i ) (19) where mean( i ), std ( i ) are respectively the mean and standard deviation of the MCI during its lifespan. This criterion aims to capture an obsolete data cloud, which does not keep up with current data distribution due to possible concept drift, because it computes the downtrend of the MCI during its lifespan. It is worth mentioning that mutual information between hidden nodes and the target variable is a reliable indicator for changing data distributions, because it is in line with the definition of concept drift. Concept drift refers to a situation, where the posterior probability changes overtime P(Tt X t )  P(Tt 1 X t 1 ) . The T2RMI method also functions as a rule recall mechanism, which is capable of coping with cyclic concept drift. Cyclic concept drifts frequently happen in the weather, customer preference, electricity power consumption problems, etc. where seasonal change comes into picture. This points to a situation where previous data distribution reappears again in the current training step. Once pruned by the T2RMI, a data cloud is not forgotten permanently and is inserted into a list of pruned data clouds R*=R*+1. In this case, its local mean, square length, population, an output node, and output covariance matrix ~ ~R* ,  R* , N R* ,  R* , R* are retained in the memory. Such data clouds can be reactivated again in the future, whenever its validity is confirmed by an up-to-date data trend. It is worth noting that adding a completely new data cloud when observing previously learned concept violates the notion of an evolving learner and catastrophically erases learning history. A data cloud is recalled subject to the following condition: max ( i* )  max( i ) i *1,.., R* i 1,.., R (20) This situation reveals that a previously pruned data cloud is more relevant than any existing ones. This condition pinpoints that a previously learned concept may reappear again. A previously pruned data cloud is then regenerated as follows: ~ ~ ~R 1  ~R* ,  R 1   R* , N R 1  N R* ,  R 1   R* , R 1  R* (21) Note that although previously pruned data clouds are stored in the memory, the data cloud pruning module still contributes in lowering the computational load, because all previously pruned data clouds are excluded from any training scenarios except (17). Unlike its predecessors [39], this rule recall scenario is not involved in the data cloud growing process (please refer to Algorithm 1) and plays a role as another data cloud generation mechanism. This mechanism is also developed from the T2RMI method, which can represent the change of posterior probability – concept drift - more accurately than the density concept. 3.4 Online Feature Selection Strategy Although feature selection and extraction problems have attracted considerable research attention; little effort has been paid toward online feature selection. Two common approaches to tackling this issue are through soft or hard dimensionality reduction techniques [39], [46]. Soft dimensionality reduction minimizes the effect of inconsequential features by assigning low weights but still retains a complete set of input attributes in the memory, whereas hard dimensionality reduction lowers the input dimension by cutting off spurious input features. Nonetheless, the hard dimensionality reduction method undermines stability, because an input feature cannot be retrieved once pruned [5]. To date, most of existing works always start the input selection process from a full set of input attributes and gradually reduces the number as more observation are come across. A prominent work, namely online feature selection (OFS), was developed in [3] and covers both partial and full input conditions. The appealing trait of OFS lies in its aptitude for flexible feature selection, where it enables the provision of different combinations of input attributes in each episode by activating or deactivating input features (1 or 0), which adapts to up-to-date data trends. Furthermore, this technique is also capable of handling partial input attributes which happens to be fruitful when the cost of feature extraction is too expensive. OFS was originally devised for the LR and is generalized here to fit the context of pRVFLN. We start our discussion from a condition where a learner is provided with full input variables. Suppose that B input attributes are to be selected in the training process and B<n, the simplest approach is to R discard the input features with marginal accumulated output weights 2   i 1 j 1 i, j and maintain only B input 2 features with the largest output weights. Note that the second term  is required because of the extended j 1 input vector xe (2 n1) . The rule consequent informs a tendency of a rule which can be used as an alternate of gradient information which changes in each point [35]. Although it is straightforward to use, it cannot ensure the stability of the pruning process due to a lack of sensitivity analysis of the feature contribution. To correct this problem, a sparsity property of the L1 norm can be analyzed to examine whether the values of n input features are concentrated in the L1 ball. This allows the distribution of the input values to be checked to determine whether they are concentrated in the largest elements and that pruning the smallest elements won’t harm the model’s accuracy. This concept is actualized by first inspecting the accuracy of pRVFLN. The input pruning process is carried out when the system error is large enough Tt  yt   or, in the realm of the classification problem, misclassification is made. Nevertheless, the system error is not only large in the case of underfitting, but also in the case of overfitting. We modify this condition by taking into account the evolution of system error et   t   et 1   t 1 . The constant  is a predefined parameter and fixed at 1.1 for simplicity. The output nodes are updated using the gradient descent approach and then projected to the L2 ball to guarantee a bounded norm. Algorithm 2 details the algorithmic development of pRVFLN. Algorithm 2. GOFS using full input attributes Input : α learning rate, χ regularization factor, B the number of features to be retained Output: selected input features X t , selected  1 B For t=1,…., T Make a prediction yt IF et   t  1.1 et 1   t 1 // for regression or oˆ  max( yo )  Tt // for classification o 1,..,m  i   i   i   E  i , 1  i  min(1, i  2 ) i R 2 Prune input attributes X t except those of B largest   i 1 j 1 i, j Else  i   i   i End IF End FOR where  ,  are respectively the learning rate and regularization factor. We assign   0.2,   0.01 following the same setting as [3]. The optimization procedure relies on the standard mean square error (MSE) as the objective function, which leads to the following gradient term: R E R   (Tt  yt ) (1  q)G i ,temporal   qG i ,temporal   i i 1  i 1  Furthermore, the system error has been theoretically proven to be bounded in [59] and the upper bound is also found. One can also notice that the GOFS enables different feature subsets to be elicited in each training observation t. A relatively unexplored area of existing online feature selection is a situation where a limited number of features is accessible for the training process. To actualise this scenario, we assume that at most B input variables can be extracted during the training process. This strategy, however, cannot be done by simply acquiring any B input features, because this scenario results in the same subset of input features during the training process. This problem is addressed using the Bernaoulli distribution with confidence level  to sample B input attributes from n input attributes B<n. Algorithm 3 displays the feature selection procedure. Algorithm 3. GOFS using partial input attributes Input : α learning rate, χ regularization factor, B the number of features to be retained,  confidence level Output: selected input features X t , selected  1 B For t=1,…., T Sample  from Bernaoulli distribution with confidence level  IF  t  1 ~ Randomly select B out of n input attributes X t  1 B End IF Make a prediction yt IF et   t  1.1 et 1   t 1 // for regression or oˆ  max( yo )  Tt // for classification o 1,..,m ~ Xˆ t  X t ( B / n )  (1   )  i   i   i   , E ( Xˆ t )  i  min(1,  i 1 i  ) i 2 R 2 Prune input attributes X t except those of B largest   i , j i 1 j 1 Else i ,t  i ,t 1 End IF End FOR As with Algorithm 2, the convergence of this scenario has been theoretically proven and the upper bound is derived in [3]. One must bear in mind that pruning process in Algorithm 1, 2 are carried out by assigning crisp weights (0 or 1), which fully reflects the importance of input features. 3.5 Random Learning Strategy pRVFLN adopts the random parameter learning scenario of the RVFLN leaving only the output nodes W to be analytically tuned with an online learning scenario, whereas others, namely At , q,  ,  , can be randomly generated without any tuning process. To begin the discussion, we recall the output expression of pRVFLN as follows: R ~ yo    i Gi ,temporal ( X t ; At , q,  ,  ) (22) i 1 Note that the pRVFLN possesses the enhancement layer expressed as a nonlinear mapping using the Chebyshev function  i  xe wi as with the original RVFLN [48]. Referring to the RVFLN theory, the ~ hidden node Gi ,spatial and its derivative must be integrable:  G ( x)dx  , or  [G( x)] dx   2 R 2 (23) R Furthermore, a large number of hidden nodes R is usually selected to ensure adequate coverage of hidden nodes to a data space because they are chosen at random [41]. Nevertheless, this condition can be relaxed in the pRVFLN, because the data cloud growing mechanism, namely the T2SCC method, partitions the input region in respect to real data distributions. The concept of data cloud-based neurons features the concept of local density, which adapts to any variation of data streams. Furthermore, this concept is parameter-free and thus does not require any parameterization, which calls for a high-level approximation or complicated optimization procedure. Other parameters, namely At , q,  ,  , are randomly chosen, and their region of randomisation should be carefully selected. Referring to Ingelnik and Pao [20], the random parameters are sampled randomly from the following.  w  [0,]  [,]n    [0,1]n     [2n, 2n] b   w    (24) where  , ,  are probability measures. Nevertheless, this strategy is impossible to implement in the online situations, because it often entails a rigorous trial-error process to determine these parameters. Most RVFL works simply follow Schmidt et al.’s strategy [53], setting the region of random parameters in the range of [-1,1]. Assuming that a complete dataset   [ X , T ]  N ( n  m ) is observable, a closed-form solution of (22) can be defined to determine the output weights W . Although the original RVFLN adjusts the output weight with the conjugate gradient (CG) method, the closed-form solution can be still utilised with ease [48]. The mere obstacle for the use of pseudo-inversion in the original work was the issue of limited computational resources in 90’s. Note that the regularization technique needs to be undertaken if the hidden node matrix is ill-conditioned. Although it is easy to use and ensures a globally optimum solution, this parameter learning scenario however imposes revisiting preceding training patterns which is intractable for online learning scenarios. pRVFLN employs the FWGRLS method [35], [39] to adjust the output weight which is underpinned by a generalized weight decay function. Because the FWGRLS approach has been detailed in [39], it is not recounted here. 3.6 Robustness of RVFLN The network parameters are usually sampled uniformly within a range of [-1,1] in the literature. A new finding of Li and Wang in [29] exhibits that the process of randomly generating network parameters with a fixed scope [-α, α] does not ensure a theoretically feasible network or often the hidden node matrix is not full rank. Surprisingly, the hidden node matrix was not invertible in all their cases when randomly sampling network parameters in the range of [-1,1] and far better numerical results were achieved by choosing the scope [-200,200]. This trend was consistent with different numbers of hidden nodes. How to properly select scopes of random parameters and its corresponding distribution still require in-depth investigation [53]. In practice, a pre-training process is normally required to arrive at decent local mapping. Note that the range of random parameters by Ingelnik and Pao [20] is still at the theoretical level and does not touch implementation issue. We study different random regions in Section IV. C to see how pRVFLN behaves under variations of scope of random parameters. IV. Numerical Examples This section presents numerical validations of our proposed algorithm using case studies and comparisons with prominent algorithms in the literature. Two numerical examples, namely modelling of Nox emissions from a car engine, tool condition monitoring in the ball-nose end milling process, are presented in this section, and the other three numerical examples are placed in the supplemental document1) to keep the paper compact. Our numerical studies were carried out under two scenarios: the time-series scenario and the cross-validation scenario. The time-series procedure orderly executes data streams according to their arrival time and partitions data streams into two parts, namely training and testing. In the time-series mode, pRVFLN was compared against 10 state-of-the-art evolving algorithms: eT2Class [40], BARTFIS [37], PANFIS [42], GENEFIS [43], eTS+ [5], eTS [6], simp_eTS [7], DFNN [61], GDFNN [62], FAOSPFNN [60], ANFIS [25]. The CV scenarios were taken place in our experiment in order to follow the commonly adopted simulation environment of other RVFLNs in the literature. The pRVFLN was benchmarked against 8 prominent RVFLNs in the literature: decorelated neural network ensemble (DNNE) [8], centralized RVFL (A) [51], RLS-consensus-RVFL [51] (B), RLS-local-RVFL (C) [51], LMS-concensus-RVFL (D) [51]. The MATLAB codes of these algorithms are available online 2,3). Comparisons were performed against five evaluation criteria: accuracy, data clouds, input attribute, runtime, network parameters. The scope of random parameters followed Schmidt's suggestion [53] where the scope of random parameters was [-1,1] but we insert analysis of robustness in part C which provides additional results with different random regions. The effect of individual learning component to the end results and the influence of user-defined predefined thresholds are analysed in the supplemental document1). To allow a fair comparison, all consolidated algorithms were executed in the same computational resources under the MATLAB’s environment. Table 1. Prediction of Nox emissions Using Time-Series Mode Model pRVFLN (P) pRVFLN (F) eT2Class PANFIS GENEFIS Simp_eTS BARTFIS DFNN GDFNN eTS FAOS-PFNN ANFIS eTS+ RMSE 0.04 0.05 0.045 0.052 0.048 0.14 0.11 0.18 0.48 0.38 0.06 0.15 0.14 Node 2 2 2 5 2 5 4 548 215 27 6 2 4 Input 5 5 170 170 2 170 4 170 170 170 170 170 4 Runtime 0.24 0.56 17.98 3.37 0.41 5.5 2.55 4332.9 2144.1 1098.4 14.8 100.41 a) Network 22 22 117304 146205 18 1876 52 280198+NS 109865 13797 2216+NS 17178 28 Samples 510 515 667 667 667 667 667 667 667 667 667 667 667 a): the result was obtained under different computer platform Table 2. Prediction of Nox emissions Using CV Mode Model pRVFLN(P) pRVFLN(F) DNNE A-online B-online C-online D-online A-batch B-batch C-batch NRMSE 0.12±0.04 0.12±0.03 0.14±0 0.52±0.02 0.57±0.01 0.93±0.02 1.7±0.04 0.59±0.05 0.62±0.05 0.83±0.09 Node 2 2 50 100 100 100 100 100 100 100 Input 5 5 170 170 170 170 170 170 170 170 Runtime 1.1 5.98 0.81 0.03 0.41 0.21 0.09 0..003 0.001 0.001 Network 22 22 43600+NS 87200 87200 87200 87200 87200+NS 87200+NS 87200+NS Samples 699 630.7 744 744 744 744 744 744 744 744 A. Modeling of Nox Emissions from a Car Engine: this section demonstrates the efficacy of the pRVFLN in modeling Nox emissions from a car engine [32]. This real-world problem is relevant to validate the learning performance, not only because it features noisy and uncertain characteristics as the nature of a car engine, but also it characterizes high dimensionality, containing 170 input attributes. That is, 17 physical variables were captured in 10 consecutive measurements. Furthermore, different engine parameters were applied to induce changing system dynamic to simulate real driving conditions. In the time-series procedure, 826 data points were streamed to consolidated algorithms, where 667 samples were 1) https://www.dropbox.com/s/lytpt4huqyoqa6p/supplemental_document.docx?dl=0 http://homepage.cs.latrobe.edu.au/dwang/html/DNNEweb/index.html 3) http://ispac.ing.uniroma1.it/scardapane/software/lynx/. 2) set as training samples, and the remainder were fed for testing purposes. In the CV procedure, the experiment was run under the 10-fold CV scheme, and each fold was repeated five times similar to the scenario adopted in [22]. This strategy checked the consistency of the RVFLN’s learning performance because it adopts the random learning scenario and avoids data order dependency. Table 1 and 2 exhibit consolidated numerical results of benchmarked algorithms. Table 3. Tool Wear Prediction Using Time Series Mode Model pRVFLN (P) pRVFLN (F) eT2Class Simp_eTS eTS BARTFIS PANFIS GENEFIS DFNN GDFNN FAOS-PFNN ANFIS RMSE 0.14 0.19 0.16 0.22 0.15 0.16 0.15 0.13 0.27 0.26 0.38 0.16 Node 2 2 4 17 7 6 3 42 42 7 7 8 Input 8 8 12 12 12 12 12 12 12 12 12 12 Runtime 0.34 0.15 1.1 1.29 0.56 0.43 0.77 0.88 2.41 2.54 3.76 0.52 Network 34 34 1260 437 187 222 507 507 1092+NS 259+ NS 1022+NS 296+ NS Samples 157 136 320 320 320 320 320 320 320 320 320 320 Table 4. Tool wear prediction using CV Mode Model pRVFLN(P) pRVFLN(F) DNNE A-online B-online C-online D-online A-batch B-batch C-batch NRMSE 0.16±0.01 0.17±0.06 0.11±0 0.16±0.01 0.21±0.01 1.39±0.03 0.25±0.01 0.19±0.04 0.21±0.03 0.23±0.05 Node 1.3±0.2 1.92±0.1 50 100 100 100 100 100 100 100 Input 8 8 12 12 12 12 12 12 12 12 Runtime 0.2 0.3 0.79 0.02 0.05 0.13 0.09 0..002 0.009 0.007 Network 22.1 32.6 3310+NS 1400 1400 1400 1400 1400+NS 1400+NS 1400+NS Samples 245.8 432.1 571.5 571.5 571.5 571.5 571.5 571.5 571.5 571.5 It is evident that pRVFLN outperformed its counterparts in all the evaluation criteria except GENEFIS for the number of input attributes and network parameters. It is worth mentioning however that in the other three criteria: predictive accuracy, execution time, and number of training samples, the GENEFIS was more inferior than ours. pRVFLN is equipped with the online active learning strategy, which discarded superfluous samples. This learning module had a significant effect of predictive accuracy. Furthermore, pRVFLN has the GOFS method, which was capable of coping with the curse of dimensionality. Note that the unique feature of the GOFS method is that it allows different feature subsets to be picked up in every training episode. This case avoids the catastrophic forgetting of obsolete input attributes, temporarily inactive due to changing data distributions. The GOFS can handle partial input attributes during the training process and resulted in the same level of accuracy as that of the full input attributes. The use of full input attributes slowed down the execution time because it needed to deal with 170 input variables first, before reducing the input dimension. In this case study, we selected five input attributes to be kept for the training process. Our experiment showed that the number of selected input attributes is not problem-dependent and able to be set as any desirable number in most cases. There was no significant performance difference when using either the full input mode or partial input mode. On the other hand, consistent numerical results were achieved by pRVFLN, although the pRVFLN is built on the random vector functional link algorithm, as observed in the CV experimental scenario. In addition, pRVFLN produced the most encouraging performance in almost all evaluation criteria but computational speed because the other RVFLNs, (A)-(D), implement less comprehensive training procedure than pRVFLN by only fine-tuning output weights without any structural learning and feature selection mechanisms. B. Tool Condition Monitoring of High-Speed Machining Process: this section presents a real-world problem, taken from a complex manufacturing problem (Courtesy of Dr. Li Xiang, Singapore) [44]. The objective of this case study is to perform predictive analytics of the tool wear in the ball-nose end milling process frequently found in the metal removal process of the aerospace industry. In total, 12 time-domain features were extracted from the force signal and 630 samples were collected during the experiment. Concept drift in this case study was resulted from changing surface integrity, tool wear degradation as well as varying machining configurations. For the time-series experimental procedure, the consolidated algorithms were trained using data from cutter A, while the testing phase exploited data from cutter B. For the CV experimental procedure, the 10-fold CV process was undertaken where each fold was undertaken five times to arrive at consistent finding. Tables 3 and 4 report average numerical results across all folds. Fig. 3 depicts how many times input attributes are selected during one fold of CV process. Fig. 3 the frequency of input features It is observed from Table 3 and 4 that pRVFLN evolved the lowest structural complexities while retaining a very high level of accuracy. It is worth noting that although the DNNE exceeded pRVFLN in accuracy, it imposed considerable complexity because it is an offline algorithm revisiting previously seen data samples and adopts an ensemble learning paradigm. The efficacy of the online sample selection strategy was seen, as it led to significant reduction of training samples to be learned during the experiment. Using partial input information led to subtle differences to those with the full input information. It is seen in Fig. 3 that the GOFS selected different feature subsets in every training episode and it reflected the importance of input variables to the training process. Additional numerical examples, sensitivity analysis of predefined thresholds and analysis of learning modules can be found in 1). C. Analysis of Robustness: this section aims to numerically validate our claim in section III. E that a range [-1,1] does not always assure a reliable model [29],[53]. Additional numerical results with different intervals of random parameters are presented. Four intervals, namely [0,0.1],[0,0.5] [0,0.8] and [0,5] were tried out for two case studies in section IV.A and IV.B. Our experiments were undertaken in the 10-folds CV procedure where each fold was repeated five times to prevent the effect of random sampling. Our experiment made use of the feature selection scenario of a full number of input attributes. Table 5 displays numerical results. Scope [0,0.1] [0,0.5] [0,0.8] [0,5] Table 5. Analysis of Robustness Criteria Tool Wear RMSE 0.13±0.008 Node 1.8±0.25 Input 8 Runtime 0.2±0.1 Network 30.9 Samples 503.1 RMSE 0.14±0.02 Node 1.92±0.2 Input 8 Runtime 0.18±0.008 Network 32.6 Samples 571.5 RMSE 0.47±0.42 Node 1.4±0.05 Input 8 Runtime 0.19±0.13 Network 23.8 Samples 385.1 RMSE Node Input Unstable Runtime Network Samples Nox emission 1.9±0 1 5 0.1±0.02 11 1 0.1±0.01 1.98±0.14 5 5.7±0.3 21.8 743.4 0.18±0.3 1.96±0.19 5 5.56±0.96 21.6 711.24 Unstable For the tool wear case study, the best-performing model was generated by the range [0,0.1]. The higher the range of the model the more inferior the model was. It went up to the point where a model was no longer stable under the range [0,5]. On the other side, the range [0,0.5] induced the best-performing model with the highest accuracy while evolving comparable network complexity for the Nox emission case study. The higher the scope led to the deterioration of numerical results. Moreover, the range [0,0.1] did not deliver a better accuracy than the range [0,0.5] either since this range did not generate diverse enough random values. These numerical results are interpreted from the nature of pRVFLN – a clustering-based algorithm. The success of pRVFLN is mainly determined from the compatibility of zone of influence of hidden nodes to a real data distribution, and its performance worsens when the scope is remote from the true data distribution. This finding is complementary to Li and Wang [29] where it relies on a sigmoidbased RVFL network, and the scope of random parameters can be outside the applicable operating intervals. Its predictive performance is set by its approximation capability in the output space. V. Conclusions A novel random vector functional link network, namely parsimonious random vector functional link network (pRVFLN), is proposed. pRVFLN aims to provide a concrete solution to the issue of data stream by putting into perspective a synergy between adaptive and evolving characteristics and fast and easy-touse characteristics of RVFLN. pRVFLN is a fully evolving algorithm where its hidden nodes can be automatically added, pruned and recalled dynamically while all network parameters except the output weights are randomly generated with the absence of any tuning mechanism. pRVFLN is fitted by the online feature selection mechanism and the online active learning scenario which further strengthens its aptitude in processing data streams. Unlike conventional RVFLNs, the concept of interval-valued data clouds is introduced. This concept simplifies the working principle of pRVFLN because it neither requires any parameterization per scalar variables nor follows pre-specified cluster shape. It features an intervalvalued spatiotemporal firing strength, which provides the degree of tolerance for uncertainty. Rigorous case studies were carried out to numerically validate the efficacy of pRVFLN where pRVFLN delivered the most encouraging performance. The ensemble version of pRVFLN will be the subject of our future investigation which aims to further improve the predictive performance of pRVFLN. VI. ACKNOWLEDGEMENT The third author acknowledges the support of the Austrian COMET-K2 program of the Linz Center of Mechatronics (LCM), funded by the Austrian federal government and the federal state of Upper Austria. We thank Dr. D. Wang for his suggestion pertaining to robustness issue of RVFLN. VII. References [1] P. Angelov, R. Yager, “ A new type of simplified fuzzy rule-based system”, International Journal of General Systems, pp. 1-21, 2011 [2] P.Angelov,“ Anomalous System State Identification”, Patent gb1208542.9, Priority Date 15May2012 [3] P. Angelov, “ Autonomous Learning Systems: From Data Streams to Knowledge in Real-time”, John Wiley and Sons Ltd., 2012 [4] P. Angelov , D. Kangin , X. Zhou , D. Kolev, “Symbol recognition with a new autonomously evolving classifier autoclass”, in Proceedings of 2014 IEEE Conference on Evolving and Adaptive Intelligent Systems, 2014, pp. 1–7 [5] P. Angelov, “ Evolving Takagi-Sugeno Fuzzy Systems from Data Streams (eTS+)”, In Evolving Intelligent Systems: Methodology and Applications (Angelov P., D. Filev, N. Kasabov Eds.), John Willey and Sons, IEEE Press Series on Computational Intelligence, pp. 21-50, ISBN: 978-0-470-287194, April 2010 [6] P.Angelov and D. Filev, "An approach to online identification of Takagi-Sugeno fuzzy models," IEEE Transactions on Systems, Man, and Cybernetics, Part B. vol. 34, pp. 484-498. 2004 [7] P.Angelov and D. Filev, "Simpl_eTS: A simplified method for learning evolving Takagi-Sugeno fuzzy models," in IEEE International Conference on Fuzzy Systems (FUZZ), pp. 1068-1073. 2005 [8] M. Alhandoosh, D. Wang, “ Fast decorrelated neural network ensembles with random weights”, Information Sciences, Vol.264, pp. 104-117, 2014 [9] R. H. Abiyev and O. Kaynak, “Type-2 fuzzy neural structure for identification and control of time-varying plants,” IEEE Transactions on Industrial Electronics , vol. 57, no. 12, pp. 4147–4159, 2010 [10] H. Bakırcıo’glu, T. Kocak, “Survey of random neural network applications”, European Journal of Operational Research, Vol. 126(2), pp. 319–330, 2000 [11] P. L. Barlett, T. Downs, “ Using random weights to train multilayer networks of hard-limiting units”, IEEE Transactions on Neural Networks, Vol. 3(2), pp. 202–210, 1992 [12] H. Berry, Quoy,” Structure and dynamics of random recurrent neural networks”, Adaptive Behaviour, Vol 14(2), pp. 129–137, 2006 [13] D. S. Broomhead and D. Lowe, “Multivariable functional interpolation and adaptive networks,” Complex Systems, vol. 2, pp. 321–355, 198 [14] F. Cao, Y. Tan, M. Cai, “ Sparse algorithms of Random Weight Networks and applications”, Expert Systems with Applications, Vol. 41, pp. 24572462, 2014 [15]F. Cao, H. Ye, D. Wang, “ A probabilistic learning algorithm for robust modeling using neural networks with random weights”, Information Sciences, Vol.313, pp. 62-78, 2015 [16] A. K. Das, K. Subramanian, S. Suresh, “ An Evolving Interval Type-2 Neurofuzzy Inference System and Its Metacognitive Sequential Learning Algorithm. IEEE Transactions on Fuzzy Systems, 23(6), pp. 2080-2093, 2015 [17] A. Elissee, H. Paugam-Moisy, ” JNN, a randomized algorithm for training multilayer networks in polynomial time”, Neurocomputing, Vol. 29(1), pp. 3–24, 1999 [18] S. Haykin,“ Neural Networks: A comprehensive foundation. Neural Networks”, Prentice-Hall, 2nd edition, 1998 [19] M. T. Hagan and M. B. Manhaj, “Training feedforward networks with the Marquardt algorithm,” IEEE Transactions on Neural Networks, vol. 5, pp. 989–993, 1994 [20] B. Igelnik, Y.H. Pao, “Stochastic choice of basis functions in adaptive function approximation and the functional-link net”, IEEE Transactions on Neural Networks, Vol.6(6), pp.1320-1329, 1995 [21] H. Gan, X. L. Wu, J. F. Qiao, “Nonlinear Systems Modeling Based on Self-Organizing Fuzzy-Neural-Network with Adaptive Computation Algorithm “, IEEE Transactions on Cybernetics, Vol. 44(4), pp.554-564, 2014 [22] C.F. Juang and C.T. Lin, “A recurrent self-organizing neural fuzzy inference network,” IEEE Transactions on Neural Networks, vol.10, pp.828-845, 1999 [23] C. F. Juang, Y. Y. Lin, and C. C. Tu, “A recurrent self-evolving fuzzy neural network with local feedbacks and its application to dynamic system processing,” Fuzzy Sets and Systems, vol.161(19), 2010 [24] C.F. Juang, “A TSK-type recurrent fuzzy network for dynamic systems processing by neural network and genetic algorithms,” IEEE Transactions on Fuzzy Systems, vol.10(2), pp.155-170, 2002 [25] J.-S. R. Jang, “ANFIS: Adaptive-network-based fuzzy inference system”, IEEE Transaction on System. Man. Cybernetic, part b: cybernetics, vol. 23, pp. 665–684, 1993 [26] J-Y. Jiang, R-J. Liao, S-J. Lee, “ A Fuzzy Self-Constructing Feature Clustering Algorithm for Text Classification”, IEEE Transactions on Knowledge and Data Engineering, Vol. 23(3), pp. 335-349, 2011 [27] D. Kangin, P. Angelov, J. A. Iglesias, “ Autonomously evolving classifier TEDAClass”, Information Sciences, Vol. 366, pp. 1-11, 2016 [28] A. Lazo, P. N. Rathie,” On the entropy of continuous probability distributions”, IEEE Transactions on Information Theory, 24(1), 120–122, 1978 [29] M. Li, D. Wang, “ Insights into randomized algorithms for neural networks: Practical issues and common pitfalls”, Information Sciences, Vol. 382, pp. 170-178, 2017 [30] Q. Liang and J. M. Mendel, “Interval type-2 fuzzy logic systems: Theory and design,” IEEE Transactions on Fuzzy Systems, vol. 8, no. 5, pp. 535– 550, 2000 [31] E. Lughofer, Evolving Fuzzy Systems --- Methodologies, Advanced Concepts and Applications, Springer, Heidelberg, 2011 [32] E. Lughofer, V. Macian, C. Guardiola and E.P Klement, “ Identifying Static and Dynamic Prediction Models for NOx Emissions with Evolving Fuzzy Systems”, Applied Soft Computing, vol. 11(2), pp. 2487-2500, 2011 [33] Yang-Yin Lin, Jyh-Yeong Chang, Chin-Teng Lin,” Identification and Prediction of Dynamic Systems Using an Interactively Recurrent Self-Evolving Fuzzy Neural Network”, IEEE Transactions on Neural Networks and Learning Systems, Vol.24,no.2,pp.310-321, 2013 [34] T.Martin, “Fuzzy sets in the fight against digital obesity,” Fuzzy Sets and Systems, vol. 156(3), pp. 411–417, 2005 [35] P. Mitra, C.A. Murthy, S.K. Pal,” Unsupervised feature selection using feature similarity”, IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol.24(3), pp.301-312, 2002 [36] D. Mackay, “A practical Bayesian framework for backpropagation networks,” Neural Computing., vol. 4, pp. 448–472, 1992 [37] R. J. Oentaryo, M-J. Er, S. Lin, X. Li, "Online probabilistic learning for fuzzy inference systems," Expert Systems with Applications, vol. 41(11), pp. 5082-5096, 2014 [38] J.C. Patra, A.C. Kot, “ Nonlinear dynamic system identification using Chebyshev functional link artificial neural networks“, IEEE Transactions on Systems, Man and Cybernetics-Part B: Cybernetics, Vol.32,no.4, pp.505-511, 2002 [39] M.Pratama, S. Anavatti, M-J. Er, E. Lughofer, “ pClass: An Effective Classifier to Streaming Examples”, IEEE Transactions on Fuzzy Systems, Vol.23(2), pp.369-386, 2014 [40] M. Pratama, J. Lu, G.Zhang, “ Evolving Type-2 Fuzzy Classifier”, IEEE Transactions on Fuzzy Systems, Vol. 24(3), pp. 574-589, 2016 [41] M. Pratama, G. Zhang, M-J. Er, S. Anavatti, An Incremental Type-2 Meta-cognitive Extreme Learning Machine, IEEE Transactions on Cybernetics, Vol 47(2), pp. 339-353, 2016 [42] M. Pratama, S. Anavatti, P. Angelov, E. Lughofer, PANFIS: A Novel Incremental Learning, IEEE Transactions on Neural Networks and Learning Systems, Vol.25(1), pp.55-68, 2014 [43] M.Pratama, S.Anavatti, E.Lughofer, “ GENEFIS:Towards An Effective Localist Network”, IEEE Transactions on Fuzzy Systems, Vol.25(3), pp. 547-562, 2014 [44] M. Pratama, M-J. Er, X. Li, R. J. Oentaryo, E. Lughofer, I. Arifin, "Data driven modeling based on dynamic parsimonious fuzzy neural network," Neurocomputing, vol. 110, pp. 18-28, 2013 [45] M. Pratama, J.Lu, E. Lughofer, G. Zhang, S. Anavatti," Scaffolding Type-2 Classifier for Incremental Learning under Concept Drifts", Neurocomputing, Vol.191, pp. 304-329, 2016 [46] M.Pratama, S.Anavatti, J.Lu, Recurrent Classifier Based on an Incremental Meta-cognitive-based Scaffolding Algorithm, IEEE Transactions on Fuzzy Systems, Vol.23(6), pp. 2048-2066, 2015 [47] Y.-H. Pao, S.M. Phillips, ” The functional link net and learning optimal control”, Neurocomputing, Vol.9(2), pp. 149–164, 1995 [48] Y-H. Pao, G. H. Park, D. J. Sobajic, “Learning and generalization characteristics of random vector functional-link net,” Neurocomputing, vol. 6, pp. 163-180, 1994 [49] E. Parzen,” On estimation of a probability density function and mode”, The Annals of Mathematical Statistics, Vol.33, 1065–1076, 1962 [50] A. Rubio-Solis, G. Panoutsos, “Interval Type-2 Radial Basis Function Neural Network: A Modeling Framework”, IEEE Transactions on Neural Networks and Learning Systems, Vol. 23(2), pp.457-473, 2015 [51] S. Scardapane, D. Wang, M. Panella, A. Uncini, “ Distributed learning for Random Vector Functional-Link networks”, Information Sciences, Vol. 301, pp. 271-284, 2015 [52] S. Scardapane, D. Wang, “ Randomness in Neural Networks: An Overview”, WIRE’s Data Mining and Knowledge Discovery, 2017 [53] W. Schmidt, M. Kraaijveld, R. Duin,“ Feedforward neural networks with random weights”, in Proceedings of 11th IAPR International Conference on Pattern Recognition Methodology and Systems, 1992, pp. 1-4 [54] K. Subramanian, S. Suresh, N. Sundararajan, “A Meta-Cognitive Neuro-Fuzzy Inference System (McFIS) for sequential classification systems”, IEEE Transactions on Fuzzy Systems, vol.21, no.6, pp.1080-1095, 2013 [55] R. Setiono, L. C. K. Hui, “Use of quasi-Newton method in a feedforward neural network construction algorithm,” IEEE Transactions on Neural Networks, vol. 6, pp. 273–277, 1995 [56] S. Singhal, L. Wu, “Training feed-forward networks with the extended Kalman filter,” in Advances in Neural Information Processing, D. S. Tourezky, Ed. San Mateo, CA: Morgan Kaufman, 1989, pp. 133–140 [57] I.Y. Tyukin , D.V. Prokhorov , Feasibility of random basis function approximators for modeling and control, in: Proceedings of IEEE Conference on Control Applications & Intelligent Control, 2009, pp. 1391–1396 [58] D. Wang, “ Editorial: Randomized algorithms for training neural networks”, Information Sciences, Vol. 364-365, pp. 126-128, 2016 [59] J. Wang, P. Zhao, S. Hoi, R. Jin, “ Online Feature Selection and Its Applications”, IEEE Transactions on Knowledge and Data Engineering, Vol. 26(3), pp. 698-710, 2014 [60] N.Wang, M.J.Er, and M.X, Fast and Accurate Self Organizing Scheme for Parsimonious Fuzzy Neural Network, Neurocomputing, Vol 72, 2009 [61] S-Q. Wu, M-J. Er, Dynamic fuzzy neural networks—a novel approach to function approximation, IEEE Transaction on Systems Man Cybernetics, part b: Cybernetics, Vol.30, pp. 358–364, 2000 [62] S.-Q. Wu, M-J. Er, Y. Gao, A fast approach for automatic generation dynamic of fuzzy rules by generalized dynamic fuzzy neural networks, IEEE Transaction on Fuzzy System, Vol.9(4), pp. 578–594, 2003 [63] L. Xie, Y. Yang, Z. Zhou, M. Tao, Z. Man, “Dynamic neural modelling of fatigue crack growth process in ductile alloys”, Information Sciences, Vol.364-365, pp.167-183, 2016 [64] S. Xiong, J. Azimi, X-Z. Fern,” Active Learning of Constraints for Semi-Supervised Clustering”, IEEE Transactions on Knowledge and Data Engineering, Vol.26(1), pp. 43-54, 2014 [65] R-F. Xu, S-J. Lee, “ Dimensionality Reduction by Feature Clustering for Regression Problems”, Information Sciences, Vol. 299, pp. 42-57, 2015 [66] L. Zhang, P.N. Suganthan, “ A Survey of Randomized Algorithms for Training Neural Networks”, Information Sciences, Vol.364-365, pp. 146-155, 2016 [67] L. Zhang, P. N. Suganthan, “ A comprehensive evaluation of random vector functional link networks”, Information Sciences, 2016, DOI: http://dx.doi.org/10.1016/j.ins.2015.09.025 [68] J. Zhao, Z. Wang, F. Cao, D. Wang, “ A local learning algorithm for random weights networks”, Knowledge-based Systems, Vol.74, pp. 159-166, 2015
9cs.NE
arXiv:1507.06621v2 [math.AG] 16 Jan 2016 CHARACTERS OF EQUIVARIANT D-MODULES ON SPACES OF MATRICES CLAUDIU RAICU Dedicated to Jerzy Weyman, on the occasion of his 60th birthday Abstract. We compute the characters of the simple GL-equivariant holonomic D-modules on the vector spaces of general, symmetric and skew-symmetric matrices. We realize some of these D-modules explicitly as subquotients in the pole order filtration associated to the determinant/Pfaffian of a generic matrix, and others as local cohomology modules. We give a direct proof of a conjecture of Levasseur in the case of general and skew-symmetric matrices, and provide counterexamples in the case of symmetric matrices. The character calculations are used in subsequent work with Weyman to describe the D-module composition factors of local cohomology modules with determinantal and Pfaffian support. 1. Introduction When G is an algebraic group acting on a smooth algebraic variety X over C, it is a natural problem to describe the simple G-equivariant holonomic D-modules on X. When G acts with finitely many orbits, all such D-modules have regular singularities, and they are classified via the Riemann–Hilbert correspondence by the G-equivariant simple local systems on the orbits of the group action. Describing these D-modules explicitly is however a difficult problem (see Open Problem 3 in [MV86, Section 6], and [Vil85]). In this paper we consider the case when X is a vector space of matrices (general, symmetric, or skew-symmetric), and G is a natural rank preserving group of symmetries. In all these cases G is a reductive group and the D-modules are G-admissible representations (they decompose into a direct sum of irreducible representations, each appearing with finite multiplicity). The purpose of this paper is to describe these representations (which we will refer to as the characters of the equivariant D-modules) and to realize these D-modules explicitly. The motivation for this work is two-fold: • Computing local cohomology. In [RW14, RWW14, RW15] we describe the characters, and the D-module composition factors of the local cohomology modules HY• (X, OX ) in the case when X is a space of matrices (general, symmetric, or skew-symmetric), and Y is any orbit closure for the natural group action on X. We expect that the combination of D-module and commutative algebra techniques that we employ to study local cohomology in the case of matrices will apply to other cases of interest [Lev09, Appendix]. We note that character calculations in the context of analyzing local cohomology modules appear also in [Kem78, VdB99]: in both cases, the representations are T -admissible for T a maximal torus in G; the equivariant D-modules that we study in this paper are G-admissible, but in general they are too large to be T -admissible. • Levasseur’s conjecture. For a class of multiplicity-free G-representations X, Levasseur conjectured [Lev09, Conjecture 5.17] an equivalence between the category C of equivariant holonomic D-modules whose characteristic variety is a union of conormal varieties to the orbits of the group action, and a module category admitting a nice quiver description. His formulation is equivalent to the fact that Date: January 19, 2016. 2010 Mathematics Subject Classification. Primary 14F10, 13D45, 14M12. Key words and phrases. Equivariant D-modules, rank stratifications, local cohomology. 1 2 CLAUDIU RAICU any simple D-module M in C contains sections which are invariant under the action of the derived subgroup G′ = [G, G]. Our character description provides a direct proof of this conjecture for general and skew-symmetric matrices, and yields counterexamples for symmetric matrices. Our work complements the existing literature that studies the categories of D-modules on rank stratifications [Nan08, Nan12] (see also [BG99] for the corresponding categories of perverse sheaves), in that we realize concretely the simple objects of these categories and discuss some applications, filling some gaps in the arguments and generally painting a more transparent picture. To give a flavor of the level of concreteness that we seek, we begin with the following (Zndom denotes the set of dominant weights λ = (λ1 ≥ · · · ≥ λn ) ∈ Zn , and Sλ denotes the Schur functor associated to λ; throughout the paper we use the convention λs = ∞ for s ≤ 0, λs = −∞ for s > n): Theorem 1.1. Let X = Cn×n be the vector space of n × n matrices, and let S = C[xi,j ] be the coordinate ring of X. If we write det = det(xi,j ), and let Sdet be the localization of S at det, then we have a filtration 0 ( S ( hdet−1 iD ( · · · ( hdet−n iD = Sdet , where Fs = hdet−s iD denotes the D-submodule of Sdet generated by det−s for s = 0, · · · , n (and F−1 = 0). The successive quotients As = Fs /Fs−1 , s = 0, · · · , n are the simple GLn (C)×GLn (C)-equivariant holonomic D-modules on X (for the natural action by row and column operations) and their characters are given by M As = Sλ C n ⊗ Sλ C n . λ∈Zn dom λs ≥s≥λs+1 In the case of symmetric matrices, the D-modules obtained as in Theorem 1.1 cover roughly half of the simple equivariant D-modules. The remaining half are more mysterious, and they provide counterexamples to [Lev09, Conjecture 5.17]. In the case of m×n matrices with m > n, as well as in the case of skew-symmetric matrices of odd size, the simple equivariant D-modules arise as local cohomology modules, while in the case of skew-symmetric matrices of even size the simple equivariant D-modules arise, just as in Theorem 1.1, from the pole order filtration associated with the Pfaffian of the generic skew-symmetric matrix. Most of our simple D-modules have irreducible characteristic variety, but for roughly half of the ones arising from symmetric matrices the characteristic variety has two connected components: this is deduced in Remark 1.5 as a consequence of the character information. As suggested by Theorem 1.1, one motivation behind our investigation is that the simple D-modules are the building blocks for many D-modules of interest that one would like to understand. More precisely, every holonomic D-module M has finite length, i.e. it has a finite filtration (composition series) whose successive quotients (composition factors) are simple holonomic D-modules. When G is connected and M is G-equivariant, the composition factors are also G-equivariant [VdB99, Prop. 3.1.2]. We are mainly interested in two types of G-equivariant holonomic D-modules: • Local cohomology modules. If Y ⊂ X is a G-invariant subset, then the local cohomology modules HY• (X, OX ) are G-equivariant D-modules. If Y is smooth and irreducible, and if we write c = codimX (Y ) for the codimension of Y inside X, then HYc (X, OX ) is the unique non-vanishing local cohomology module and it is simple. In general, for an irreducible subvariety Y ⊂ X one can define an intersection homology D-module L(Y, X) which is simple (and it is G-equivariant when Y is a G-subvariety), and we have an inclusion L(Y, X) ⊂ HYc (X, OX ), whose cokernel is suported on a proper subset of Y . The case when X = Cn×n and Y is the subvariety of singular matrices is implicitly described in Theorem 1.1: c = 1, L(Y, X) = A1 , HY1 (X, OX ) = Sdet /S, and the cokernel HY1 (X, OX )/L(Y, X) has composition factors A2 , · · · , An . In general, the local cohomology modules HYi (X, OX ) for i 6= c may be non-zero, but they are all supported on proper subsets of Y : it is an CHARACTERS OF EQUIVARIANT D-MODULES ON SPACES OF MATRICES 3 interesting problem to decide their (non)vanishing, or at a more refined level to understand their D-module composition factors. • The D-module (generated by) f α . For a non-zero polynomial f ∈ S = C[x1 , · · · , xN ] and a complex number α, we can define hf α iD – the (holonomic) D-module generated by f α (see [Wal15] for a recent survey). A strict inclusion hf α+1 iD ( hf α iD implies that α is a root of the Bernstein-Sato polynomial of f (this can happen only when α is rational and negative [Kas76]). It is an interesting question to decide whether each root α gives rise to such a strict inclusion [Wal15, Question 2.1], [Sai15, Question 1, Section 4]. More generally, one may be interested in the composition factors of hf α iD . For α ∈ Z and f = det this is completely answered by Theorem 1.1. When α ∈ / Z, hdetα iD is a simple D-module (see the proof of Theorem 7.1). Similar conclusions are obtained when f is the symmetric determinant, or the Pfaffian of a skew-symmetric matrix of even size. Before stating our results in more detail, we give a simple example to illustrate how character calculations alone can allow one to determine the D-module composition factors. Example 1.2. Let X = CN be the N -dimensional affine space, and let G = (C∗ )N be the N -dimensional torus. The orbits XI of the G-action are indexed by subsets I ⊂ [N ] = {1, · · · , N }, where XI = {x ∈ CN : xi 6= 0 if and only if i ∈ I}. The stabilizer of each XI is connected, so there is a one-to-one correspondence between orbits and simple Gequivariant holonomic D-modules DI (Theorem 2.7, Remark 2.8), given by DI = L(YI , X), where YI = XI is the corresponding orbit closure. Since YI is an affine space of codimension N − |I|, it is in particular N −|I| smooth, and therefore the D-module DI is just a local cohomology module DI = HYI (X, OX ). If we write S = C[x1 , · · · , xN ] for the coordinate ring of X, then each YI is defined by the ideal generated by the variables xj , j ∈ / I. Using the Čech complex description of local cohomology we get M DI = C · xλ1 1 · · · xλNN λ∈ZN λi ≥0 if and only if i∈I which is a decomposition into irreducible G-representations. If we take f = x1 · · · xN then we get M Sf = C · xλ1 1 · · · xλNN . λ∈ZN The torus weights appearing in the DI ’s form a partition of those appearing in Sf , so each DI appears as a D-module composition factor of Sf with multiplicity one. Using a similar argument for X = Cn×n we obtain a proof of Theorem 1.1 (see Section 5). Symmetric matrices. Our results run in parallel for the three spaces of matrices (general, symmetric, and skew-symmetric). We have made the effort to apply a uniform strategy to all three cases, but we weren’t able to treat the combinatorial details uniformly. For the sake of brevity, we have chosen to treat only the case of symmetric matrices in full detail, and only indicate the changes that are required in the other cases. Two features that make the case of symmetric matrices more interesting are: (a) the presence of non-trivial equivariant local systems; (b) the existence of counterexamples to Levasseur’s conjecture. For each positive integer n and for s = 0, · · · , n, we consider the collections of dominant weights C 1 (s, n) = {λ ∈ Zndom : λi ( C 2 (s, n) = λ ∈ Zndom (mod 2) ≡ s + 1 for i = 1, · · · , n, λs ≥ s + 1 ≥ λs+2 }, ( ) (mod 2) s + 1 for i = 1, · · · , s : λi ≡ , λs ≥ s + 1, λs+1 ≤ s . s for i = s + 1, · · · , n (1.1) 4 CLAUDIU RAICU Note that C 1 (n, n) = C 2 (n, n). For a positive integer n, we identify Sym2 Cn with the vector space M symm of n × n symmetric matrices, where the squares w2 , w ∈ Cn , correspond to matrices of rank at most one. We write Misymm for the subvariety of matrices of rank at most i. For s = 0, · · · , n, and j = 1, 2, we define M Cjs = Sλ C n . λ∈C j (s,n) Theorem on Equivariant D-modules on Symmetric Matrices (Section 4). There exist (2n+1) simple GLn (C)-equivariant holonomic D-modules on M symm , whose characters are Cjs , s = 0, · · · , n, j = 1, 2. More precisely, if we denote by Csj the D-module with character Cjs then Cn1 = Cn2 = L({0}, M symm ) is the simple holonomic D-module supported at the origin, and for s < n ( symm L(Mn−s , M symm ) if j ≡ s (mod 2), j Cs = symm symm ; 1/2) if j ≡ s + 1 (mod 2). L(Mn−s , M symm symm , M symm ; 1/2) is the , M symm ) is the usual intersection homology D-module, while L(Mn−s Here L(Mn−s intersection homology D-module associated to the non-trivial irreducible GLn (C)-equivariant local system on the orbit of rank (n − s) matrices. We let S = C[xi,j ] be the coordinate ring of M symm , where xi,j = xj,i . We write sdet = det(xi,j ) for the determinant of the generic symmetric matrix, and let Ssdet be the localization of S at sdet. We consider Fs = hsdet−s/2 iD , the D-submodule of Ssdet (or of Ssdet · sdet1/2 ) generated by sdet−s/2 for s = 0, · · · , n + 1 (and F−1 = 0). We have that C02 = F0 = S, and Cs1 = Fs+1 /Fs−1 for s = 0, · · · , n. Remark 1.3. The D-modules Cs2 for s = 1, · · · , n − 1 contain no SLn (C)-invariant sections, so they provide counterexamples to [Lev09, Conjecture 5.17]. It may be interesting to note that when n ≥ 3, among these symm counterexamples there are the intersection homology D-modules L(Mn−s , M symm ) with s even, so the failure of Levasseur’s conjecture can’t be solely explained by the presence of non-trivial local systems! Remark 1.4. We can now give a quick derivation for the Bernstein-Sato polynomial of sdet [Kim03, Appendix]:  n  Y 1+i . (1.2) bsdet (s) = s+ 2 i=1  Q It follows from Cayley’s identity that bsdet (s) divides ni=1 s + 1+i 2 , while for each i = 1, · · · , n the strict inclusion Fi−1 ( Fi+1 shows that − 1+i 2 is a root of bsdet (s). This is enough to conclude the equality (1.2). Remark 1.5. It is interesting to note that the character calculation allows us to determine the characteristic varieties for the D-modules Csj . The Fourier transform F (see Section 2.5) permutes the D-modules Csj , and “rotates” their characteristic varieties by 90◦ (note that “rotating” the conormal variety to the orbit of rank V s matrices yields the conormal variety to rank (n − s) matrices). The formula (2.29) where U = 2 Cn , 2 1 for s = 0, · · · , n. for s = 0, · · · , n − 1, and F(Cs2 ) = Cn−s together with (1.1), shows that F(Cs1 ) = Cn−s−1 symm symm 1 1 Since Cs has support Mn−s and F(Cs ) has support Ms+1 , it follows that the characteristic variety of Cs1 has two components, namely the conormal varieties to the orbits of rank (n−s) and rank (n−s−1) matrices. symm Since Cs2 has support Mn−s and F(Cs2 ) has support Mssymm , it follows that the characteristic variety of Cs2 is irreducible, namely it is the conormal variety to the orbit of rank (n − s) matrices. Similar considerations show that for general and skew-symmetric matrices, the characteristic varieties of the simple equivariant D-modules are irreducible. The calculation of characteristic varieties can also be deduced from [BG99]. CHARACTERS OF EQUIVARIANT D-MODULES ON SPACES OF MATRICES 5 Strategy for computing the characters of equivariant D-modules. Our approach to computing characters of equivariant D-modules is based on performing Euler characteristic calculations using the D-module functoriality together with some combinatorial and R geometric methods. More precisely, for the inclusion of an orbit ι : O ֒→ X, the D-module direct image ι OO is an object in the derived category of G-equivariant Rj DX -modules, whose cohomology groups ι OO are (in the cases that we study) G-admissible representations. Analyzing the inclusion ι directly is complicated, so we make use of a resolution of singularities Z of the orbit closure O. The variety Z is a vector bundle over a Grassmannian G (or a product of Grassmannians), and the inclusion j : O ֒→ Z is an affine open immersion. The map π : Z → X factors as p ◦ s O O j    s / / Z X ×G ❋❋ ❋❋ ❋❋ p π ❋❋❋  #  / O  /X where sRis a regular embedding and p is the projection onto the first factor. We compute the Euler characteristic of ι OO as a virtual admissible G-representation, by using the factorization ι = p ◦ s ◦ j. If we pretend that there is a one-to-one correspondence between simple equivariant D-modules and orbits (which is true for general and skew-symmetric matrices), and write Xs for the D-module corresponding to matrices of rank s, then the Euler characteristic calculations together with general considerations regarding the structure of D-module direct images, allow us to write down an upper-triangular matrix with ones on the diagonal, that represents the change of coordinates in the Grothendieck group of admissible representations, from (Xs )s to appropriately defined linearly independent characters (Xs )s . The Fourier transform on one hand preserves this matrix, and on the other hand it makes it lower-triangular, which allows us to conclude that the matrix is in fact the identity and therefore Xs = Xs for all s (see Section 2.6). In the process of computing Euler characteristics, we are led to the following combinatorial problem. Let X = G(k, Cn ) be the Grassmannian of k-dimensional quotients of Cn , with OX (1) denoting the Plücker line bundle, and ΩiX denoting the sheaf of differential i-forms on X, and define the virtual GLn (C)-representation k·(n−k) pk,r = X (−1)i · χ(X, ΩiX (r)). i=0 Cn The problem is to compute pk,r ⊗ Sλ for λ ∈ Zndom . When k = 1, p1,r corresponds to the r-th power sum symmetric function, and the answer is given in [Mac95, Exercise I.3.11(1)]. The relevance of this formula for computing Euler characteristics is as follows: if we write E = L({0}, X) for the simple holonomic D-module supported at the origin, Ok for the orbit of rank k matrices, and ιk for the inclusion of Ok into the ambient space, then (up to minor adjustments, depending on which space of matrices we analyze)  X Z Z j OOk = OOk = lim pk,r ⊗ E, (−1)j χ ιk j∈Z ιk r→∞ where the limit is taken in the Grothendieck group of admissible representations (see Section 2.1.1 for a precise formulation, and Section 3 for the calculations). Organization. In Section 2 we establish the notation and basic results concerning the representation theory of general linear groups and D-modules that will be used throughout the rest of the paper. In Section 3 we compute the relevant Euler characteristics as limits in the Grothendieck group of GL-admissible representations. In Sections 4, 5, and 6 we prove the main results on characters of equivariant D-modules. Finally, 6 CLAUDIU RAICU in Section 7 we discuss the simple D-modules that arise from non-equivariant local systems on the orbits, and prove Levasseur’s conjecture for skew-symmetric and general matrices. 2. Preliminaries 2.1. Representation Theory [Wey03, Ch. 2]. Let W be a complex vector space of dimension dim(W ) = n, and denote by GL(W ) the group of invertible linear transformations of W . The irreducible finite dimensional GL(W )-representations, denoted Sλ W , are indexed by dominant weights λ = (λ1 ≥ · · · ≥ λn ) ∈ Zn . A dominant weight λ is said to be a partition if all its parts λ1 , · · · , λn are nonnegative. The size of λ is |λ| = λ1 + · · · + λn . The conjugate partition λ′ is defined by transposing the associated Young diagram: λ′i is the number of j’s for which λj ≥ i; for example (5, 2, 1)′ = (3, 2, 1, 1, 1). Write [n] for the set {1, · · · , n}, and for a given a subset I ⊂ [n] and an integer u, let (uI ) be the sequence µ ∈ Zn having µi = u when i ∈ I, and µi = 0 when i ∈ / I. When I = [k] for k ≤ n, we simply write (uk ) instead of (uI ). We have that V Vk W is the k-th exterior power of W , and we let det(W ) denote the top exterior power n W . S(1k ) W = 2.1.1. Admissible representations. Given a reductive algebraic group G, we write Λ for the set of (isomorphism classes of) finite dimensional irreducible G-representations. We will be mainly interested in the case when G = GL(W ) is a general linear group: we write Γ(G) = Γ(W ), and Λ = {Sλ W : λ ∈ Zndom }. We also consider G = GL(W1 ) × GL(W2 ), dim(W1 ) = m, dim(W2 ) = n, and write Γ(G) = Γ(W1 , W2 ) and n Λ = {Sδ W1 ⊗ Sλ W2 : δ ∈ Zm dom , λ ∈ Zdom }. An admissible G-representation decomposes as M M= L⊕aL , L∈Λ where each aL ∈ Z≥0 . We say that M is finite if only finitely many of the aL ’s are non-zero. We define the Grothendieck group Γ(G) of admissible representations to be ZΛ , the direct product of copies of Z, indexed by the set Λ. We call the elements of Γ(G) virtual representations. We write a typical element U ∈ Γ(G) as X aL · L, U= L∈Λ where aL ∈ Z and define hU, Li = aL to be the multiplicity of L inside U . A sequence (Ur )r of virtual representations is said to be convergent (in Γ(G)) if for every L ∈ Λ, the sequence of integers hUr , Li is eventually constant. If (Ur )r is convergent, we write aL = limr→∞ hUr , Li for each L ∈ Λ. We define P U = L∈Λ aL · L to be the limit of (Ur )r , and write lim Ur = U. r→∞ 2.1.2. Combinatorics of weights. It will be convenient to make sense of Sλ W even when λ ∈ Zn is not dominant. In order to do so we let δ = (n − 1, n − 2, · · · , 1, 0) and consider λ + δ = (λ1 + n − 1, λ2 + n − 2, · · · , λn−1 + 1, λn ). We write sort(λ + δ) for the sequence obtained by rearranging the entries of λ + δ in non-increasing order. If λ + δ has non-repeated entries, we let sgn(λ) denote the sign of the unique permutation realizing the sorting of the sequence λ + δ. We define λ̃ = sort(λ + δ) − δ, and let Sλ W be the element of Γ(W ) defined by ( sgn(λ) · Sλ̃ W if λ̃ is dominant (i.e. if λ + δ has non-repeated entries); Sλ W = 0 otherwise. (2.1) CHARACTERS OF EQUIVARIANT D-MODULES ON SPACES OF MATRICES 7 For example, we have S(2,1,4,3) W = 0 and S(1,1,0,7) W = −S(4,2,2,1) W . Note that in particular Sλ W = 0 if λi+1 = λi + 1 for some i = 1, · · · , n − 1. (2.2) [n] We denote by k the collection of subsets I ⊂ [n] of size |I| = k, and write P (k, n − k) for the set of  partitions µ = (µ1 ≥ · · · ≥ µk ) with µ1 ≤ n − k. There is a one-to-one correspondence between sets I ∈ [n] k and partitions µ ∈ P (k, n − k) given by I = {µk + 1, µk−1 + 2, · · · , µ2 + (k − 1), µ1 + k}. If we write µ′ (2.3) ∈ P (n − k, k) for the conjugate partition of µ then the complement of I in [n] is given by I c = [n] \ I = {k + 1 − µ′1 , k + 2 − µ′2 , · · · , n − µ′n−k }. (2.4)  n c For every λ ∈ Zn , I ∈ [n] k and r ∈ Z, we define λ(r, I) ∈ Z as follows: we write the elements of I and I in increasing order I = {i1 < · · · < ik }, I c = {ik+1 < · · · < in }, (2.5) and let ( r + t + λit − it for t = 1, · · · , k; λ(r, I)t = (2.6) t + λit − it for t = k + 1, · · · , n. We define λ1 (I) ∈ Zk and λ2 (I) ∈ Zn−k via λ1 (I)t = t + λit − it , for t = 1, · · · , k, (2.7) λ2 (I)t−k = t + λit − it , for t = k + 1, · · · , n, so that λ(r, I) is the concatenation of λ1 (I) + (r k ) and λ2 (I). In particular λ1 ([k]) = (λ1 , · · · , λk ) and λ2 ([k]) = (λk+1 , · · · , λn ). We define the permutation σ(I) of [n] via σ(I)t = it for t = 1, · · · , n. (2.8) Sλ+(rI ) W = sgn(σ(I)) · Sλ(r,I) W = (−1)|µ| · Sλ(r,I) W, (2.9) With this notation we obtain and note that if λ is dominant and r is sufficiently large then λ(r, I) is also dominant. We define for h, j ∈ Z/2Z the sets of partitions P h,j (a, b) = {µ ∈ P (a, b) : µi ≡ h (mod 2) for i = 1, · · · , a, µ′i ≡ j (mod 2) for i = 1, · · · , b}. A quick counting argument yields the following: Lemma 2.1. The cardinality of P h,j (a, b) is computed by: |P 0,0 (a, b)| =  ⌊ a2 ⌋ +  ⌊ 2b ⌋ ⌊ 2b ⌋  b−1  a   2 +⌊ 2 ⌋ |P 1,0 (a, b)| = ⌊ b−1 2 ⌋  0 , |P 0,1 (a, b)| = a even a odd  a−1 b   ⌊ 2 ⌋+ 2  0 , |P 1,1 (a, b)| = b 2 , b odd b−1  2 a, b odd b−1  a−1   2 +  0 b even 2 otherwise . (2.10) 8 CLAUDIU RAICU 2.1.3. A generalized Pieri rule. The Grothendieck group Γ(W ) is a module over the representation ring R(W ) V of finite dimensional GL(W )-representations. As a ring, R(W ) is generated by the exterior powers k W , V k ≤ n, and by the inverse det(W )−1 = n W ∗ = S(−1n ) W of det(W ). We have Sλ W ⊗ det(W ) = Sλ+(1n ) W . V The following lemma generalizes this by describing the multiplicative action of the exterior powers k W on Γ(W ) (since the multiplication is continuous, i.e. it commutes with limits, it suffices to determine its action on the indecomposables Sλ W ): Lemma 2.2 (Pieri’s rule). For every λ ∈ Zn we have the following equality in Γ(W ): ! k ^ X W ⊗ Sλ W = Sλ+(1I ) W. (2.11) I∈([n] k ) Proof. We may assume without loss of generality that λ is dominant. If λi+1 = λi and I is such that i ∈ /I and (i + 1) ∈ I then it follows from (2.2) that Sλ+(1I ) W = 0. For all the other terms appearing on the right hand side of (2.11) we have that µ = λ + (1I ) is dominant and µ/λ is a vertical strip (i.e. µi − λi ∈ {0, 1} for all i) of size k. (2.11) then follows from the usual Pieri formula [Wey03, Corollary 2.3.5].  We define elements pk,r (W ) ∈ R(W ) for every r ∈ Z and 0 ≤ k ≤ n, by X pk,r (W ) = S(rI ) W, (2.12) [n] k I∈( and note that pk,1 (W ) = Vk ) W . We have the following generalization of Pieri’s rule: Lemma 2.3. For every λ ∈ Zn we have the following equality in Γ(W ): X pk,r (W ) ⊗ Sλ W = Sλ+(rI ) W. [n] k I∈( (2.13) ) Proof. When k = 0, p0,r (W ) = C is the identity element of R(W ), so the conclusion is trivial. We may thus assume that k > 0. As before, we also assume that λ is dominant. Multiplication by det(W ) is an invertible operation, so proving (2.13) for λ is equivalent to proving it for λ + (1n ). In particular, we may assume that λ is a partition and that moreover λn = 0. We consider the ordering of the partitions λ with at most n parts induced by the graded reverse lexicographic order on their conjugates: more precisely, we say that λ ≻ µ if |λ| > |µ|, or if |λ| = |µ| and for the largest index i for which λ′i 6= µ′i one has λ′i > µ′i . We prove (2.13) for all partitions λ, by induction with respect to the said ordering. When λ is the empty partition, (2.13) coincides with (2.12). Assume now that λ1 > 0 and consider the parititon µ obtained from λ by removing the last column of its Young diagram: the conjugate µ′ is given by µ′i = λ′i for i < λ1 and µ′i = 0 for i ≥ λ1 . We let l = λ′λ1 denote the size of the column removed from λ. Using the induction hypothesis for µ ≺ λ and Lemma 2.2 we get   ! l ^ X  X  W = (pk,r (W ) ⊗ Sµ W ) ⊗ Sµ+(rI )+(1J ) W  . (2.14)  J∈([n] l ) I∈([n] k ) Consider the collection of partitions P = {α : α/µ is a vertical strip of size l}, so that ! l ^ X W = Sα W, Sµ W ⊗ α∈P CHARACTERS OF EQUIVARIANT D-MODULES ON SPACES OF MATRICES 9 and note that λ ∈ P and that α ≺ λ for every λ 6= α ∈ P. We can then rewrite the left hand side of (2.14) as X pk,r (W ) ⊗ Sα W, α∈P so in order to prove (2.13) for λ it is sufficient to show that the right hand side of (2.14) is equal to   X X  Sα+(rI ) W  .  α∈P Since P = {µ + (1J ) : J ∈ dominant then [n] l ,µ I∈([n] k ) + (1J ) dominant}, we only have to check that when α = µ + (1J ) is not X Sα+(rI ) W = 0. (2.15) I∈([n] k ) Note that the only way in which α = µ + (1J ) can fail to be dominant is if for some index j, µj = µj+1 and j∈ / J, (j + 1) ∈ J. Fix such an index j, and note that αj+1 = αj + 1. It follows from (2.2) that when I ⊂ [n] is such that both j, j + 1 ∈ I, or both j, j + 1 ∈ / I, then Sα+(rI ) W = 0. To show (2.15) it is then enough to prove that X X Sα+(rI ) W + Sα+(rI ′ ) W = 0. (2.16) I∈([n] k ) j∈I,(j+1)∈I / I ′ ∈([n] k ) j ∈I / ′ ,(j+1)∈I ′ There is a one-to-one correspondence between the collection of subsets I with j ∈ I, (j + 1) ∈ / I, and subsets I ′ with j ∈ / I ′ , (j + 1) ∈ I ′ , given by I ′ = (I ∪ {j + 1}) \ {j}. Moreover, for such a pair I, I ′ it follows from ′ (2.1) that Sα+(rI ) W = −Sα+(rI ′ ) W (because α + (r I ) + δ is obtained from α + (r I ) + δ by switching the j-th part with the (j + 1)-st part), which proves (2.16) and concludes the proof of the lemma.  2.2. Bott’s theorem for Grassmannians [Wey03, Ch. 4]. We consider X = G(k, V ), the Grassmannian of k-dimensional quotients of V (or k-dimensional subspaces of W = V ∗ ), with the tautological sequence 0 −→ R −→ V ⊗ OX −→ Q −→ 0, (2.17) where Q is the tautological rank k quotient bundle, and R is the tautological rank (n − k) sub-bundle. Bott’s Theorem for Grassmannians [Wey03, Corollary 4.1.9] computes the cohomology of a large class of GL-equivariant bundles on X. We only need a weaker version that computes Euler characteristics. Suppose that M is a quasi-coherent GL(W )-equivariant sheaf on X. We say that M has admissible (resp. finite) cohomology if its cohomology groups H j (X, M) are admissible (resp. finite) for j = 0, · · · , dim(X). We can therefore make sense of the Euler characteristic of M as an element of Γ(W ) (resp. R(W )). We define the Euler characteristic of M to be the virtual representation k·(n−k) χ(X, M) = X (−1)j H j (X, M). (2.18) j=0 n−k Theorem 2.4 (Bott). Let α ∈ Zkdom and β ∈ Zdom be dominant weights, and let λ = (α, β) ∈ Zn be their concatenation. The Euler characteristic of Sα Q ⊗ Sβ R is given (with the convention (2.1)) by χ(X, Sα Q ⊗ Sβ R) = Sλ V. We can now give an alternative interpretation of the elements pk,r introduced in (2.12): 10 CLAUDIU RAICU V Lemma 2.5. If we let ΩiX = i (R ⊗ Q∗ ) denote the sheaf of i-differential forms on X, and write OX (1) = det(Q) for the Plücker line bundle on X, then k·(n−k) pk,r (V ) = X (−1)i · χ(X, ΩiX (r)). i=0 Proof. Cauchy’s formula [Wey03, Cor. 2.3.3] yields i ^ (R ⊗ Q∗ ) = M Sµ Q∗ ⊗ Sµ′ R. µ∈P (k,n−k), |µ|=i Twisting by OX (r) = det(Q)⊗r = S(rk ) Q, and taking Euler characteristics, we get using Theorem 2.4 X S(r−µk ,r−µk−1 ,··· ,r−µ1 ,µ′1 ,··· ,µ′n−k ) V. χ(X, ΩiX (r)) = µ∈P (k,n−k), |µ|=i Using (2.9) with λ = 0, we get S(r−µk ,r−µk−1 ,··· ,r−µ1 ,µ′1 ,··· ,µ′n−k ) V = (−1)|µ| · S(rI ) V , so k·(n−k) X i=0 (−1)i · χ(X, ΩiX (r)) = X [n] k I∈( S(rI ) V = pk,r (V ).  ) 2.3. D-modules [BGK+ 87], [HTT08]. For a smooth algebraic variety X over C, we let DX denote the sheaf of differential operators on X [HTT08, Section 1.1]. A D-module M on X (or a DX -module) is a quasi-coherent sheaf M on X, with a left module action of DX . Definition 2.6. Let G be an algebraic group acting on X, and let M be a DX -module. Differentiating the action of G on X yields a map d : Lie(G) → DerX from the Lie algebra of G to the vector fields on X. The DX -module operation DX ⊗ M → M, (2.19) composed with d yields an action of Lie(G) on M. The DX -module M is G-equivariant if (a) M admits an action of G compatible with (2.19) (see [HTT08, Def. 11.5.2] for a precise meaning of compatibility). (b) The action of Lie(G) on M obtained by differentiating the action of G on M coincides with the one induced from d : Lie(G) → DerX and (2.19). As discussed in the Introduction, examples of G-equivariant holonomic DX -modules are OX , and for a G-invariant subset Y ⊂ X, the local cohomology modules HY• (X, OX ), as well as the intersection homology D-modules L(Y, X). When X = U is a vector space, and Y = {0} is the origin, we let dim(U ) E = L({0}, U ) = H{0} (U, OU ), (2.20) be the unique simple DU -module supported at the origin. As a vector space (and a G-representation) E = det(U ) ⊗ Sym(U ). (2.21) The following theorem gives a classification of the simple equivariant holonomic D-modules, for a group action with finitely many orbits (see [HTT08, Section 11.6]): Theorem 2.7. Let G be an algebraic group acting with finitely many orbits on a smooth algebraic variety X. There is a one-to-one correspondence between: CHARACTERS OF EQUIVARIANT D-MODULES ON SPACES OF MATRICES 11 (a) Simple G-equivariant holonomic DX -modules. (b) Pairs (O, L) where O is a G-orbit, and L is an irreducible G-equivariant local system on O. (b’) Pairs (O, L) where O is a G-orbit, and L is an irreducible representation of the component group of the isotropy group of O. Here by the isotropy group of O we mean the stabilizer of any element in O (they are all isomorphic). For an algebraic group H, we denote by H0 the connected component of the identity, which is a normal subgroup of H. The quotient H/H0 is called the component group of H. Remark 2.8. When the representation L in Theorem 2.7(b’) is trivial, the corresponding DX -module in part (a) is L(O, X), where O is the closure of O. It follows that in the case when the isotropy groups for the Gaction on X are connected, there is a one-to-one correspondence between simple G-equivariant DX -modules and orbits of the group action. Let m ≥ n be positive integers and consider the complex vector spaces M of general m × n matrices, M symm of n × n symmetric, and M skew of n × n skew-symmetric matrices respectively. These spaces admit a natural action of a group GL via row and column operations: GLm (C) × GLn (C) acts on M , and GLn (C) acts M symm and M skew . We write Ms (resp. Mssymm ) for the subvariety of M (resp. M symm ) consisting of matrices of rank at most s, for s = 0, · · · , n, and Msskew for the subvariety of M skew consisting of skewsymmetric matrices of rank at most 2s, for s = 0, · · · , ⌊n/2⌋. We have the following: Theorem 2.9 (Classification of simple GL-equivariant holonomic D-modules on spaces of matrices). • (General matrices). There are (n + 1) simple GL-equivariant D-modules on the vector space M of m × n matrices, namely the intersection homology D-modules L(Ms , M ), s = 0, · · · , n. • (Symmetric matrices). There are (2n + 1) simple GL-equivariant D-modules on the vector space M symm of n × n symmetric matrices, (n + 1) of which are the intersection homology D-modules L(Mssymm , M symm ), s = 0, · · · , n, while the remaining ones are the intersection homology D-modules L(Mssymm , M symm ; 1/2), s = 1, · · · , n, corresponding to the non-trivial irreducible equivariant local systems on the orbits. • (Skew-symmetric matrices). There are (⌊n/2⌋ + 1) simple GL-equivariant D-modules on the vector space M skew of n × n skew-symmetric matrices, namely L(Msskew , M skew ), s = 0, · · · , ⌊n/2⌋. Proof. The theorem follows from Theorem 2.7 and Remark 2.8, since the isotropy groups for general and skew-symmetric matrices are connected, while for symmetric matrices the isotropy groups of the non-zero orbits have two connected components.  2.4. Computing Euler characteristics. Let X be a smooth complex projective algebraic variety and denote its dimension by dX . Consider a finite dimensional vector space U , and a short exact sequence 0 −→ ξ −→ U ⊗ OX −→ η −→ 0, (2.22) U∗ where ξ, η are locally free sheaves on X. We think of as an affine space, and of U as linear forms on U ∗ . ∗ We let Y = TotX (η ) denote the total space of the bundle η ∗ , and define a morphism π : Y → U ∗ via the commutative diagram  / U∗ × X (2.23) Y = TotX (η ∗ )  PPP PPP P π PPPP PP'  ∗ U where the top map is the inclusion of into the trivial bundle U ∗ , and the vertical map is the projection onto the U ∗ factor. We will be interested in understanding the (Euler characteristic of the) D-module pushforward η∗ 12 R CLAUDIU RAICU M along the map π for certain DY -modules M. For affine morphisms X ′ → X, we will identify freely quasi-coherent sheaves on X ′ with quasi-coherent OX ′ -modules on X as in [Har77, Exercise II.5.17(e)]. We let S = SymOX (η), so that Y = SpecX (S), and consider a locally free sheaf L of rank one with L ⊂ Symi (η) for some i > 0. We pull-back L to Y , define L = TotY (L∗ ) to be the total space of the line bundle L∗ , and write p : L → Y for the natural map. The inclusion L ⊂ Symi (η) defines a section z : Y → L of p [Har77, Exercise II.5.18(c)], and we define Z to be the zero-locus of z. If X = Spec(C) then Y is an affine space, S is the ring of polynomial functions on Y , L corresponds to (the vector space spanned by) a polynomial f ∈ S of degree i, and Z is the vanishing locus of f . 0 0 We consider the R complement Y = Y \ Z and let j : Y → Y denote the inclusion. Since j is an affine open immersion, j OY 0 = OY 0 can be thought of as a quasi-coherent sheaf of algebras on Y (or on X): π OY 0 = lim L−r ⊗ OY = lim L−r ⊗ S. −→ −→ r r In the case when X = Spec(C), we have OY 0 = Sf is the localization of S at f , which is a D-module on the affine space Y . We define the quasi-coherent sheaf S ∨ on X (the graded dual of S) by S ∨ = det(η ∗ ) ⊗ SymOX (η ∗ ). Proposition 2.10. With the notation above, we assume that X admits an action of a reductive group G, that U is a finite dimensional G-representation, and that ξ, η, L are G-equivariant locally free sheaves. Assume further that we have an isomorphism of G-equivariant quasi-coherent sheaves on X OY 0 ≃ lim Lr ⊗ S ∨ . −→ (2.24) r Let M be a DY -module which is isomorphic, as a quasi-coherent G-equivariant sheaf on X, to OY 0 ⊗OX L′ , with L′ a line bundle on X. We denote by ΩiX the sheaf of i-differential forms on X, and assume that for every i = 0, · · · , dX the sheaves ΩiX ⊗ M ⊗ det(ξ ∗ ) ⊗ SymOX (ξ ∗ ) have G-admissible cohomology. If we define the sequence Pr (X, L; L′ ) ∈ Γ(G) via Pr (X, L; L′ ) = dX X (−1)dX −i · χ(X, Lr ⊗ L′ ⊗ ΩiX ), i=0 then χ Z π  M = lim Pr (X, L; L′ ) ⊗ det(U ∗ ) ⊗ SymC (U ∗ ). r→∞ (2.25) Remark 2.11. We will apply Proposition 2.10 in the case when X = G(k, V ) is a Grassmann variety, and L = OX (1) is the Plücker line bundle (or its square). It follows from Lemma 2.5 that Pr (X, OX (1); OX ) = (−1)k(n−k) · pk,r (V ). It follows that if X = G(k, V1 ) × G(k, V2 ), where dim(V1 ) = m, dim(V2 ) = n, and if L = OX (1, 1) then Pr (X, OX (1); OX ) = (−1)k·(m−n) · pk,r (V1 ) ⊗ pk,r (V2 ). Proof of Proposition 2.10. Since the sheaves ΩiX ⊗ M ⊗ det(ξ ∗ ) ⊗ SymOX (ξ ∗ ) have admissible cohomology, it follows from [Rai14, Corollary 2.10] that  X Z dX (2.26) M = (−1)dX −i · χ(X, ΩiX ⊗ M ⊗ det(ξ ∗ ) ⊗ SymOX (ξ ∗ )). χ π i=0 Computing Euler characteristics commutes with colimits and associated graded constructions. By (2.22) we get a filtration of U ∗ ⊗ OX with gr(U ∗ ⊗ OX ) = ξ ∗ ⊕ η ∗ , which yields a filtration of SymOX (U ∗ ⊗ OX ) with CHARACTERS OF EQUIVARIANT D-MODULES ON SPACES OF MATRICES 13 gr(SymOX (U ∗ ⊗ OX )) = SymOX (ξ ∗ ) ⊗ SymOX (η ∗ ). We also get that det(U ∗ ⊗ OX ) = det(ξ ∗ ) ⊗ det(η ∗ ), and therefore χ(X, ΩiX ⊗ L′ ⊗ Lr ⊗ S ∨ ⊗ det(ξ ∗ ) ⊗ SymOX (ξ ∗ )) = χ(X, ΩiX ⊗ L′ ⊗ Lr ⊗ det(U ∗ ) ⊗ SymOX (U ∗ ⊗ OX )) U ∗ is a trivial bundle = χ(X, ΩiX ⊗ L′ ⊗ Lr ) ⊗ det(U ∗ ) ⊗ SymC (U ∗ ). Multiplying this equality by (−1)dX −i , summing over i = 0, · · · , dX , taking the limit as r → ∞, and using the identification (2.24) tensored with L′ , we get (2.25).  2.5. The Weyl algebra and the Fourier transform. For a positive integer N , the Weyl algebra C[x1 , · · · , xN , ∂1 , · · · , ∂N ], ∂i = ∂ ∂xi (2.27) is the ring of differential operators on CN . In this section we give a coordinate independent description of the Weyl algebra, and use it to describe the Fourier transform. Given a finite dimensional C–vector space U of dimension N , we write h, i for the natural pairing U ×U ∗ → C. We let Ũ = U ⊕ U ∗ and define a non–degenerate skew–symmetric form ω : Ũ ⊗ Ũ → C by  ′  if u ∈ U, u′ ∈ U ∗ , hu, u i ′ ω(u, u ) = − hu′ , ui if u′ ∈ U, u ∈ U ∗ ,   0 otherwise. L We write Tn (Ũ ) for the tensor product Ũ ⊗n , and let T (Ũ ) = n≥0 Tn (Ũ ) denote the tensor algebra on Ũ . V We have a natural inclusion 2 Ũ ⊂ T2 (Ũ ), and define the Weyl algebra DU ∗ as the quotient D U∗ = T (Ũ )/hx − ω(x) : x ∈ 2 ^ Ũ i (2.28) V of the tensor algebra by the bilateral ideal generated by differences x − ω(x), with x ∈ 2 Ũ . Note that DU ∗ is the ring of differential operators on the vector space U ∗ . If we choose a basis x1 , · · · , xN of U , and the dual basis ∂1 , · · · , ∂N of U ∗ , then DU ∗ coincides with (2.27). Lemma 2.12 (Fourier transform). If M is a (left) DU -module, then det(U ∗ ) ⊗ M has the structure of a (left) DU ∗ -module. Example 2.13. The most basic example is when M = Sym(U ∗ ) is the coordinate ring of U . In that case det(U ∗ ) ⊗ Sym(U ∗ ) is equal to E, the simple holonomic DU ∗ -module supported at the origin (see (2.20)). Proof of Lemma 2.12. Using the identification of Ũ ∗ with Ũ coming from the natural isomorphism U ∗ ⊕ U ≃ U ⊕ U ∗ , it is easy to see that DU ∗ ≃ DUop , where op denotes the opposite ring. Since M is a left DU -module, it is also a right DUop -module, i.e. it can be identified with a right DU ∗ -module. The canonical sheaf ωU ∗ on the vector space U ∗ is a free rank one module generated by det(U ). By [HTT08, Prop. 1.2.12], the association M 7→ ωU−1∗ ⊗ M = det(U ∗ ) ⊗ M gives an equivalence between the categories of right DU ∗ -modules and left DU ∗ -modules.  Motivated by Lemma 2.12, we define a Fourier transform relative to U , denoted FU , on the Grothendieck group Γ(G) of admissible G-representations as follows:  X X ai · (det(U ∗ ) ⊗ Mi∗ ). (2.29) ai · Mi = FU 14 CLAUDIU RAICU The context in which we apply the Fourier transform is as follows: we will have constructions which are functorial in U for certain DU -modules MU which are admissible representations for some group G, in such a way that M ⊕a M MU = Mi i if and only if MU ∗ = (Mi∗ )⊕ai . i i P By Lemma 2.12, the Fourier transform of the DU ∗ -module MU ∗ has character equal to FU ( i ai · Mi ). We will slightly imprecisely refer to this as the character of the Fourier transform of MU . 2.6. A little linear algebra. Consider a finite partially ordered set P, and let A denote the free abelian group with basis {vp : p ∈ P}. We write p ≻ q to indicate that p is strictly larger than q with respect to the partial order, and p  q when we allow equality. Assume that F : P −→ P is an order reversing bijection, i.e. p  q if and only if F(q)  F(p). By abuse of notation, we also write F : A −→ A for the induced automorphism of A, given by F(vp ) = vF (p) . We have the following: Lemma 2.14. Suppose that we have a collection of elements vp ∈ A for p ∈ P, for which there exist relations X (2.30) vp = v p + apq · vq , for some integers apq . q≻p If the automorphism F of A permutes the elements vp then vp = vp for all p ∈ P (and hence all apq = 0). Proof. Write F(vp ) = vσ(p) for some permutation σ : P −→ P. Applying F to (2.30) we get X apq · vF (q) , vσ(p) = vF (p) + q≻p which is necessarily a permutation of the relations (2.30). Since F is order-reversing, it follows that σ(p) = F(q) for some q  p, and if σ(p) = F(p) then one also has vσ(p) = vF (p) , i.e. apq = 0 for all q ≻ p. We get that F(p)  σ(p) for all p ∈ P, and the equality F(p) = σ(p) implies vσ(p) = vF (p) . An easy induction on the height of F(p), defined by ht(F(p)) = #{q : F(p) ≻ q}, shows that F(p) = σ(p) for all p, which concludes the proof of the lemma.  3. Some limit calculations in the Grothendieck group of admissible representations Recall the terminology from Sections 2.1.1–2.1.3 which we will be using freely throughout this section. In particular recall the notation Γ(G) for the Grothendieck group of admissible G-representations for some group G, and the definition of pk,r (V ) from (2.12) (also Lemma 2.5). When W is a vector space, we write V = W ∗ for its dual. In this section we compute in three cases limits in Γ(G) of the type lim pk,r ⊗ E, r→∞ (3.1) where (pk,r )r is a sequence of finite virtual G-representations, E = det(U ) ⊗ Sym(U ) is the (character of the) simple DU -module supported at the origin (2.20), where U is a finite dimensional G-representation: • U = Sym2 W , G = GL(W ) (so that Γ(G) = Γ(W )), pk,r = pk,r (V ). The limit (3.1) does not exist if r is arbitrary, but instead we have to consider the cases when r is even resp. odd separately. • U = W1 ⊗ W2 , G = GL(W1 ) × GL(W2 ) (so that Γ(G) = Γ(W1 , W2 )), pk,r = pk,r (V1 ) ⊗ pk,r (V2 ). V • U = 2 W , G = GL(W ), pk,r = pk,r (V ) with k even. As mentioned in the Introduction and explained in Section 2.4, the limits (3.1) correspond to Euler characteristic calculations for certain D-module direct images. They are essential to the character calculations in Sections 4–6 below. The reader who is not interested in the details of the limit calculations may wish to record the results of Propositions 3.1, 3.5, and 3.6 below, and skip to Section 4. CHARACTERS OF EQUIVARIANT D-MODULES ON SPACES OF MATRICES 15 3.1. Symmetric matrices. We let W be a vector space of dimension n. For s = 0, · · · , n and j = 1, 2, we define the elements Cjs ∈ Γ(W ) via M Cjs = Sλ W. (3.2) λ∈C j (s,n) where C j (s, n) is defined in (1.1).   Proposition 3.1. If E = det Sym2 W ⊗ Sym Sym2 W then for k = 0, · · · , n,  n  s−2   s−1  n X X  2 2 2  · Cs + · C1s   n−k−2 n−k  2 2  s=n−k s=n−k+1 !    s even s odd pk,r (V ) ⊗ E = (−1)k(n−k) · lim r→∞   s−1   s−2  n n  r≡k+1 (mod 2) X  X  1 2 2  · Cs − · C2s   n−k−1 n−k−1   2 2 s=n−k s odd (−1)k(n−k) · lim pk,r (V r→∞ r≡k (mod 2) )⊗E ! if n − k even, if n − k odd. s=n−k+1 s even =  n  s  X  2   · C1s  n−k   2  s=n−k   s even   s−1  n  X   2  · C2s   n−k−1  s=n−k 2 if n − k even, if n − k odd. s odd When k = 0 the above equalities are easy to verify: pk,r (V ) = C is the trivial representation, so the left hand side reduces to E, regardless of the parity of r; the right hand side is either C1n or C2n , but E = C1n = C2n . We therefore fix 1 ≤ k ≤ n for the rest of this section. We begin with some notation and preliminary results before proving the proposition. For j ∈ Z/2Z we let C j = {λ ∈ Zkdom : λi ≡ n + 1 + j (mod 2) for i = 1, · · · , k}, j n−k : λi ≡ n + 1 + j (mod 2) for i = 1, · · · , n − k, and λn−k ≥ n + 1}. = {λ ∈ Zdom C≥n+1 (3.3) With the convention λ0 = ∞, λn+1 = −∞, we define for s = 0, · · · , n, Z(s) = {λ ∈ Zndom : λs ≥ s + 1 ≥ λs+1 }, (3.4) Zndom . For h, j ∈ Z/2Z we let and note that the sets Z(s), s = 0, · · · , n form a partition of ( ( ) X (mod 2) h, for i = 1, · · · , s, h,j C (s) = λ ∈ Z(s) : λi ≡ Sλ W. , Ch,j s = j, for i = s + 1, · · · , n. h,j λ∈C (3.5) (s) Comparing with (1.1) we get that C 1 (s, n) = C s+1,s+1 (s) ∪ C s+1,s+1 (s + 1) and C 2 (s, n) = C s+1,s (s) so C1s = Cs+1,s+1 + Cs+1,s+1 , s s+1 [n] and C2s = Css+1,s . 0 Lemma 3.2. If I ∈ k , λ1 (I) ∈ C k+1+j and λ2 (I) ∈ C≥n+1 then • λ ∈ Z(s) for some s = n − k, · · · , n. • {s + 1, · · · , n} ⊂ I. • λs+1 ≡ · · · ≡ λn ≡ j (mod 2). (3.6) 16 CLAUDIU RAICU Proof. Consider the unique s for which λ ∈ Z(s). Let s′ be the maximal element of I c and assume that s′ > s. We have (using (2.5)) that in = s′ and therefore λs′ ≤ λs+1 ≤ s + 1 and (2.7) λ2 (I)n−k = n + λin − in = n + λs′ − s′ ≤ n + s + 1 − s′ < n + 1, 0 which contradicts λ2 (I) ∈ C≥n+1 . It follows that s′ ≤ s and hence {s+1, · · · , n} ⊂ I, which implies n−s ≤ k, or s ≥ n − k. From (2.5) we get it = t + n − k for t = k − n + s + 1, · · · , k, which using the fact that λ1 (I) ∈ C k+1+j yields for t = k − n + s + 1, · · · , k n+1+k+1+j (mod 2) ≡ λ1 (I)t = t + λit − it = t + λt+n−k − (t + n − k) = λt+n−k + k − n so λt+n−k ≡ j (mod 2), concluding the proof of the lemma.  Lemma 3.3. Assume that λ ∈ Z(s) and that there exists an index 1 ≤ i < s such that λi 6≡ λi+1 (mod 2). For any j ∈ Z/2Z, consider the collection     [n] 1 k+1+j 2 0 Pλ (j) = I ∈ : λ (I) ∈ C , λ (I) ∈ C≥n+1 . (3.7) k We have (using notation (2.8)) X sgn(σ(I)) = 0. (3.8) I∈Pλ (j) Proof. We show that if I ∈ Pλ (j) then exactly one of i, i + 1 is contained in I. Moreover, we show that the assignment I ′ = I \ {i} ∪ {i + 1} establishes a bijection between {I ∈ Pλ (j) : i ∈ I} and {I ′ ∈ Pλ (j) : i + 1 ∈ I ′ }. (3.9) sgn(σ(I ′ )) Since = − sgn(σ(I)), the conclusion (3.8) follows. Assume that I is such that i, i + 1 are both in I, or both in I c . We can then find t < k or t > k such that it = i and it+1 = i + 1. If t < k then λ1 (I)t 6≡ λ1 (I)t+1 (mod 2), contradicting λ1 (I) ∈ C k+1+j . If t > k 0 then λ2 (I)t−k 6≡ λ2 (I)t−k+1 (mod 2), contradicting λ2 (I) ∈ C≥n+1 . c Choose now a set I with i ∈ I, i + 1 ∈ I , and choose t0 ≤ k, t1 ≥ k + 1, such that it0 = i, it1 = i + 1. If we let I ′ = I \ {i} ∪ {i + 1} then λ1 (I)t = λ1 (I ′ )t for t 6= t0 , and λ2 (I)t = λ2 (I ′ )t for t 6= t1 − k. We have λ1 (I)t0 = t0 + λi − i, λ1 (I ′ )t0 = t0 + λi+1 − (i + 1), λ2 (I)t1 −k = t1 + λi+1 − (i + 1), λ2 (I ′ )t1 −k = t1 + λi − i, and since λi 6≡ λi+1 (mod 2), we get λ1 (I)t ≡ λ1 (I ′ )t (mod 2) and λ2 (I)t ≡ λ2 (I ′ )t (mod 2) for all t. Since λ2 (I)t1 −k ≤ λ2 (I ′ )t1 −k , the only way in which the correspondence I ↔ I ′ could fail to induce a bijection 0 (3.9) is if for some I, I ′ we get t1 = n and λ2 (I)n−k ≤ n < n + 1 ≤ λ2 (I ′ )n−k , in which case λ2 (I) 6∈ C≥n+1 , 2 ′ 0 2 but λ (I ) ∈ C≥n+1 . However, the inequality λ (I)n−k ≤ n would imply λ2 (I)t1 −k = t1 + λit1 − it1 = n + λi+1 − (i + 1) ≤ n or equivalently λi+1 ≤ i + 1. Since i < s by hypothesis, we get λs ≤ λi+1 ≤ (i + 1) ≤ s, contradicting the fact that λ ∈ Z(s).  Lemma 3.4. If λ ∈ C h,j (s), s ≥ n − k, then there is a one-to-one correspondence between elements Pλ (j) and the set P n−k+j−h,s+1−h(k − n + s, n − k) (defined in (2.10)). Moreover, for every I ∈ Pλ (j) we have sgn(σ(I)) = (−1)(n−k)·(k+h) , and Pλ (j) is empty if h ≡ s ≡ j + 1 (mod 2). CHARACTERS OF EQUIVARIANT D-MODULES ON SPACES OF MATRICES 17  c Proof. The correspondence between sets I ∈ [n] k (resp. their complements I ) and partitions µ ∈ P (k, n−k) (resp. their conjugates µ′ ) is given in (2.3) (resp. (2.4)). If I ∈ Pλ (j) then it follows from Lemma 3.2 that s + 1, · · · , n are the largest elements of I, namely ik−n+s+1 , · · · , ik , so µ1 = · · · = µn−s = n − k. The set I is then determined by µ = (µn−s+1 , · · · , µk ) ∈ P (k − n + s, n − k). Since λ ∈ C h,j (s), the condition 0 λ1 (I) ∈ C k+1+j is equivalent to µi ≡ n − k + j − h (mod 2). The condition λ2 (I) ∈ C≥n+1 is equivalent to ′ ′ µi ≡ n + 1 − h (mod 2), which in turn is equivalent to µi ≡ s + 1 − h (mod 2). It follows that I ∈ Pλ (j) if and only if µ ∈ P n−k+j−h,s+1−h(k − n + s, n − k), which establishes the desired bijection. Moreover ′ sgn(σ(I)) = (−1)|µ| = (−1)|µ | = (−1)(n−k)·(n+1−h) = (−1)(n−k)·(k+h) , where the last equality follows from the fact that (n − k) · (n + 1 − k) is even. If h ≡ s ≡ j + 1 (mod 2) then |Pλ (j)| = |P n−k+1,1 (k − n + s, n − k)| = 0 by Lemma 2.1.  Proof of Proposition 3.1. We have (2.13),(2.9) hSλ W, pk,r (V ) ⊗ Ei = hSλ W ⊗ pk,r (W ), Ei = X [n] k I∈( sgn(σ(I)) · Sλ(r,I) W, E . ) Since det(Sym2 W ) = det(W )⊗(n+1) = S(n+1)n W , we get using Cauchy’s formula [Wey03, Prop. 2.3.8] that   E = det Sym2 W ⊗ Sym Sym2 W = M Sλ W. λ∈Zn dom ,λn ≥n+1 λi ≡n+1 (mod 2) Using notation (2.6–2.7) and (3.3) we obtain for r ≫ 0 ( 0 1, if λ1 (I) ∈ C r and λ2 (I) ∈ C≥n+1 , Sλ(r,I) W, E = 0, otherwise. It follows (using notation (3.7)) that for j ∈ Z/2Z pk,r (V lim r→∞ r≡k+1+j (mod 2) )⊗E = X λ∈Zn dom   X I∈Pλ (j)  sgn(σ(I)) · Sλ W, (3.10) and by Lemmas 3.2 and 3.3 we only need to consider λ ∈ Z(s) for s ≥ n − k such that (for some h ∈ Z/2Z) λ1 ≡ · · · ≡ λs ≡ h (mod 2) and λs+1 ≡ · · · ≡ λn ≡ j (mod 2), i.e. λ ∈ C h,j (s). Multiplying both sides of (3.10) by (−1)k·(n−k) and using Lemma 3.4 we get   X   pk,r (V ) ⊗ E  = (−1)k·(n−k) ·  lim (−1)(n−k)·h · |P n−k+j−h,s+1−h(k − n + s, n − k)| · Ch,j s . r→∞ r (mod 2) ≡ k+1+j n−k≤s≤n h=j,j+1 We separate the contributions of the right hand side according to two cases: 18 CLAUDIU RAICU Terms with h = j + 1: By Lemma 3.4 we can consider only the terms with s ≡ j (mod 2), in which case s+1,s we get from (3.6) that Ch,j = C2s . We have s = Cs  s−1  ⌊ 2 ⌋    n − k odd,  n−k−1   2      Lemma 2.1 s−2  n−k+j−h,s+1−h n−k+1,0 |P (k − n + s, n − k)| = |P (k − n + s, n − k)| = 2  n − k and s even,  n−k−2   2        0 otherwise. Comparing the coefficient of C2s in Proposition 3.1 with (−1)(n−k)·h · |P n−k+j−h,s+1−h(k − n + s, n − k)| in each of the cases j = 0, 1, and (n − k) even and odd, we see that they agree. Terms with h = j: The terms with s ≡ j + 1 (mod 2) contribute Ch,j = Cs+1,s+1 with coefficient s s h,j (n−k)·h n−k,0 (−1) · |P (k − n + s, n − k)|. The terms with s ≡ j (mod 2) contribute Cs = Cs,s s with co(n−k)·h n−k,1 n−k,1 efficient (−1) · |P (k − n + s, n − k)|. For s = n − k we get |P (k − n + s, n − k)| = 0 so Cs,s s only appears for s > n − k. Observing that |P n−k,0 (k − n + s, n − k)| = |P n−k,1 (k − n + s + 1, n − k)| for s ≥ n − k, and using C1s = Cs+1,s+1 + Cs+1,s+1 in (3.6), we conclude that the terms with h = j contribute s s+1 X (−1)(n−k)·h · |P n−k,0 (k − n + s, n − k)| · C1s , s≡j+1 (mod 2) where  s  ⌊2⌋     n−k   2      Lemma 2.1 s−1  |P n−k,0 (k − n + s, n − k)| = 2   n−k−1   2       0 n − k even, n − k and s odd, otherwise. Comparing with the coefficient of C1s in Proposition 3.1 we conclude the proof of the proposition.  3.2. General matrices. For positive integers m ≥ n and for s = 0, · · · , n, we let A(s; m, n) = {λ ∈ Zndom : λs ≥ s + m − n, λs+1 ≤ s}. (3.11) If λ ∈ A(s; m, n) then we define a dominant weight λ(s) ∈ Zm dom by λ(s) = (λ1 − (m − n), · · · , λs − (m − n), s, · · · , s, λs+1 , · · · , λn ) | {z } (3.12) m−n For vector spaces W1 , W2 , with dim(W1 ) = m, dim(W2 ) = n, and s = 0, · · · , n we define As ∈ Γ(W1 , W2 ) by M As = Sλ(s) W1 ⊗ Sλ W2 . (3.13) λ∈A(s;m,n) CHARACTERS OF EQUIVARIANT D-MODULES ON SPACES OF MATRICES 19 Proposition 3.5. We write W = W1 ⊗ W2 . If E = det(W ) ⊗ Sym(W ) then for k = 0, · · · , n,   n   X s (m−n)·(n−k−s) k·(m−n) (−1) · (−1) · lim pk,r (V1 ) ⊗ pk,r (V2 ) ⊗ E = · As . r→∞ s−n+k s=n−k n Proof of Proposition 3.5. Consider dominant weights δ̃ ∈ Zm dom and λ̃ ∈ Zdom , and let δ = δ̃ − (nm ), λ = λ̃ − (mn ). (3.14) We obtain using (2.9), (2.13), and easy manipulations that Sδ̃ W1 ⊗ Sλ̃ W2 , pk,r (V1 ) ⊗ pk,r (V2 ) ⊗ E equals X sgn(σ(I)) · sgn(σ(J)) · Sδ(r,I) W1 ⊗ Sλ(r,J) W2 , Sym(W ) . I∈([m] , J∈([n] k ) k ) Using (2.7) and writing µ|(0m−n ) for the sequence obtained by appending m − n zeros to µ, we get for r ≫ 0 ( 1, if δ1 (I) = λ1 (J), δ2 (I) = λ2 (J)|(0m−n ), and δ2 (I) ∈ Zm−k ≥0 , Sδ(r,I) W1 ⊗ Sλ(r,J) W2 , Sym(W ) = 0, otherwise. is Let u ∈ {0, · · · , m} be the unique index such that δu ≥ u − m ≥ δu+1 . The condition δ2 (I) ∈ Zm−k ≥0 equivalent to the inclusion {u+ 1, · · · , m} ⊂ I, which implies u ≥ m − k. When m > n, the last m − n entries of δ2 (I) being 0 forces δu = δu−1 = · · · = δu−m+n+1 = u − m, and all the elements u, u − 1, · · · , u − m + n + 1  to be contained in I c = [m] \ I. We modify δ and I as follows: we consider δ ∈ Zndom and I ∈ [n] k defined by δ = (δ1 , · · · , δu−m+n , δu+1 − (m − n), · · · , δm − (m − n)), I = {i1 , · · · , ik−m+u , u + 1 − (m − n), u + 2 − (m − n), · · · c I \{u, u−1, · · · , u−m+n+1}. The conditions δ1 (I) = λ1 (J) , n}, so that I = [n]\I = and δ2 (I) = λ2 (J)|(0m−n ) 1 2 1 2 are then equivalent to δ (I) = λ (J) and δ (I) = λ (J). Since both λ, δ are dominant weights, these equalities can only hold for δ = λ and I = J. Note that the freedom in choosing I (orI = J) is in the choice of an increasing sequence i1 < · · · < ik−m+u inside {1, · · · , u}, i.e. there are u−m+n k−m+u choices for I once we fix δ. Writing s = u − m + n we get c s ≥ (m − k) − m + n = n − k, λs+1 λs = δs = δu−m+n ≥ δu ≥ u − m = s − n, = δu+1 − (m − n) ≤ (u − m) − (m − n) = (s − n) − (m − n) = s − m, and moreover δ = (λ1 , · · · , λs , s − n, · · · , s − n, λs+1 + (m − n), · · · , λn + (m − n)). | {z } m−n It follows (using (3.12), (3.14)) that δ̃ = λ̃(s). Since sgn(σ(I)) = (−1)(m−n)·(m−u) · sgn(σ(I)), it follows that if I = J and m − u = n − s then sgn(σ(I)) · sgn(σ(J)) = (−1)(m−n)·(n−s) .   s Putting everything together, and using u−m+n k−m+u = s−n+k , we obtain for r    s (m−n)·(n−s)   · (−1) s−n+k Sδ̃ W1 ⊗ Sλ̃ W2 , pk,r (V1 ) ⊗ pk,r (V2 ) ⊗ E =    0 ≫0 if λ̃ ∈ A(s; m, n) and δ̃ = λ̃(s) for some s ≥ n − k, otherwise. 20 CLAUDIU RAICU Multiplying by (−1)k·(m−n) and taking the limit r → ∞ yields the desired conclusion.  3.3. Skew-symmetric matrices. For a positive integer m and for s = 0, · · · , m, we let B(s, 2m) = {λ ∈ Z2m dom : λ2s ≥ (2s − 1), λ2s+1 ≤ 2s, λ2i−1 = λ2i for all i}, B(s, 2m + 1) = {λ ∈ Z2m+1 dom : λ2s+1 = 2s, λ2i−1 = λ2i for i ≤ s, λ2i = λ2i+1 for i > s}. For a vector space W with dim(W ) = n, and for s = 0, · · · , m = ⌊n/2⌋ we define Bs ∈ Γ(W ) via M Bs = Sλ W. (3.15) (3.16) λ∈B(s,n) Proposition 3.6. If E = det V 2  W ⊗ Sym V 2 W lim p2k,r (V ) ⊗ E = r→∞  and k = 0, · · · , m = ⌊n/2⌋, then  m X s=m−k  s · Bs . m−k With m = ⌊n/2⌋ and 1 ≤ k ≤ m, we define the following collections of dominant weights B = {λ ∈ Z2k dom : λ2i−1 = λ2i for i = 1, · · · , k}, n−2k B≥n−1 = {λ ∈ Zdom : λ2i−1 = λ2i ≥ n − 1 for i = 1, · · · , m − k, λn−2k = n − 1 if n is odd}. (3.17) We partition Zndom into the following collections of dominat weights Y(u), u = 0, · · · , n, defined by Y(u) = {λ ∈ Zndom : λu ≥ u − 1 ≥ λu+1 }, (3.18) In analogy with Lemma 3.2 one can prove:  1 2 Lemma 3.7. If I ∈ [n] 2k , then the conditions λ (I) ∈ B and λ (I) ∈ B≥n−1 are equivalent to • λ ∈ Y(u) for some u = n − 2k, · · · , n. • {u + 1, · · · , n} ⊂ I. • λi2t−1 = λi2t and i2t = i2t−1 + 1 for all t = 1, · · · , m. If n is odd then u ∈ I c is odd and λu = u − 1. Lemma 3.8. Assume that λ, I satisfy the equivalent conditions in Lemma 3.7. If n = 2m is even then {(i1 , i2 ), (i3 , i4 ), · · · , (i2m−1 , i2m )} = {(1, 2), (3, 4), · · · , (2m − 1, 2m)}. (3.19) If n = 2m + 1 is odd and if we write u = 2s + 1, then we have {(i1 , i2 ), (i3 , i4 ), · · · , (i2m−1 , i2m )} = {(1, 2), · · · , (2s − 1, 2s), (2s + 2, 2s + 3), · · · , (2m, 2m + 1)}. (3.20) Moreover, we have that λ ∈ B(s, n) for some s = m − k, · · · , m. Proof. The conclusions (3.19–3.20) follow from the fact that i1 , · · · , in give a permutation of [n] with i2t = i2t−1 + 1, and in = u is odd when n is odd. If n is odd and u = 2s + 1, it follows from u ≥ n − 2k that s ≥ m − k. Moreover, we have λ2s+1 = λu = u − 1 = 2s, and it follows from (3.20) that λ ∈ B(s, n). Assume now that n = 2m is even. It follows from (3.19) that in is even, so we can write in = 2s′ . Since in + 1, · · · , n ∈ I, we get n − in ≤ 2k, i.e. s′ ≥ m − k. Since in ≤ u, we have λ2s′ ≥ λu ≥ u − 1 ≥ 2s′ − 1. We have by (3.19) that λ2i−1 = λ2i for i = 1, · · · , m, so taking s to be the maximal index for which λ2s ≥ 2s − 1 we find that s ≥ s′ and λ2s+1 = λ2s+2 < 2s + 1, i.e. λ ∈ B(s, n).  CHARACTERS OF EQUIVARIANT D-MODULES ON SPACES OF MATRICES 21 Lemma 3.9. Let m = ⌊n/2⌋, and for m − k ≤ s ≤ m define the collection of partitions B(k, n/2 − k, s) = {µ ∈ P (2k, n − 2k) :µ′i even for i = 1, · · · , n − 2k, µ′n−2k = 2m − 2s, µi even for i = 2m − 2s + 1, · · · , 2k}. (3.21) Every partition µ ∈ B(k, n/2 − k, s) has even size, and the cardinality of the set B(k, n/2 − k, s) is given by ( s  if n = 2m + 1 is odd; m−k |B(k, n/2 − k, s)| = s−1  if n = 2m is even. m−1−k Proof. Since each µ′i is even, |µ| = |µ′ | is even. To compute the size of B(k, n/2 − k, s) we first note that the condition µ′n−2k = 2m − 2s implies that µ1 = · · · = µ2m−2s = n − 2k, so any µ ∈ B(k, n/2 − k, s) is determined by µ = (µ2m−2s+1 , · · · , µ2k ) ∈ P (2(k + s − m), n − 2k). Since µ′n−2k = 2m − 2s, we must have µ1 < n − 2k. The condition µ ∈ B(k, n/2 − k, s) is then equivalent (using (2.10)) to ( P 0,0 (2(k + s − m), 2(m − k)) if n is odd, µ∈ 0,0 P (2(k + s − m), 2(m − 1 − k)) if n is even.   s s−1 By Lemma 2.1, the number of choices for µ is m−k if n is odd, respectively m−1−k if n is even.   Lemma 3.10. Assume that λ ∈ B(s, n) for some s ≥ m − k. The collection of subsets I ∈ [n] 2k for which ′ 1 2 λ (I) ∈ B and λ (I) ∈ B≥n−1 corresponds via (2.3) to B (k, n/2 − k, s), where  n/2 − k, s) if n is odd,  B(k, s ′ [ B (k, n/2 − k, s) = B(k, n/2 − k, s′ ) if n is even.   s′ =m−k  Proof. Consider λ ∈ B(s, n) for s ≥ m−k, and I ∈ [n] 2k satisfying the conditions of Lemma 3.7. If n = 2m+1 is odd then in = 2s + 1 and I contains 2s + 2, · · · , n, i.e. the corresponding µ ∈ P (2k, n − 2k) has µ1 = · · · = µ2m−2s = n − 2k, µ2m−2s+1 < n − 2k, = 2m − 2s. For 2k < t < n we have that it ≤ 2s, so µ′t−2k = t − it is even by (3.20). The set of µi so with 2m − 2s < i ≤ 2k coincides with that of differences it − t for 1 ≤ t ≤ 2(k − m + s), which are all even again by (3.20) and the fact that it ≤ 2s for t ≤ 2(k − m + s). Assume next that n = 2m is even, and use (3.19) to write in = 2s′ . As in the previous paragraph, this implies µ′n−2k = 2m − 2s′ . By (3.19) all the differences t − it are even, so all µi , µ′i are even. This shows that I ∈ B(k, n/2 − k, s′ ). Since in + 1, · · · , n ∈ I we get as before s′ ≥ m − k. If s′ > s then λ2 (I)n−2k = λin + n − in = λ2s′ + n − 2s′ ≤ λ2s+1 + n − 2s′ ≤ 2s + n − 2s′ ≤ n − 2, a contradiction. The verification that µ ∈ B ′ (k, n/2 − k, s) yields a subset I with λ1 (I) ∈ B and λ2 (I) ∈ B≥n−1 follows easily by tracing back the arguments.  µ′n−2k Proof of Proposition 3.6. We have hSλ W, p2k,r (V ) ⊗ Ei = hSλ W ⊗ p2k,r (W ), Ei (2.13),(2.9) = X I∈( sgn(σ(I)) Sλ(r,I) W, E . [n] 2k ) Using notation (2.7) and (3.17) we get that for r ≫ 0 ( 1, if λ1 (I) ∈ B and λ2 (I) ∈ B≥n−1 , Sλ(r,I) W, E = 0, otherwise. 22 CLAUDIU RAICU It follows that X lim p2k,r (V ) ⊗ E = r→∞  m  X Lemmas 3.8−3.10  =   s=m−k sgn(σ(I)) · Sλ W [n] 2k λ∈Zn dom , I∈( ) λ1 (I)∈B, λ2 (I)∈B≥n−1   m  |µ| even X X   (−1)|µ| Sλ W  =  X s=m−k λ∈B(s,n) µ∈B′ (k,n/2−k,s) λ∈B(s,n)  |B ′ (k, n/2 − k, s)| · Sλ W  s  , and the desired equality follows. If n = 2m + 1 is odd, then |B ′ (k, n/2 − k, s)| = |B(k, n/2 − k, s)| = m−k Similarly, when n = 2m is even, we get  ′    s s X X s −1 s |B ′ (k, n/2 − k, s)| = |B(k, n/2 − k, s′ )| = = .  m−1−k m−k ′ ′ s =m−k s =m−k 4. Equivariant D-modules on symmetric matrices In this section we compute the characters of the GL-equivariant D-modules on the vector space M symm of symmetric n×n matrices. We let W denote a complex vector space of dimension n, V = W ∗ , and we identify Sym2 W with M symm , where squares w2 correspond to matrices of rank one. If we write GL = GL(W ), and let Mssymm denote the subvariety of matrices of rank at most s then the main result of this section is: Theorem 4.1. There exist (2n + 1) simple GL-equivariant holonomic D-modules on M symm , namely ( symm L(Mn−s , M symm ) if j ≡ s (mod 2), Csj = for s = 0, · · · , n − 1, j = 1, 2, symm symm ; 1/2) if j ≡ s + 1 (mod 2), L(Mn−s , M and Cn1 = Cn2 = L({0}, M symm ). For all s, j, the character of Csj is Cjs (as defined in (3.2)). The remaining assertion of the Theorem on Equivariant D-modules on Symmetric Matrices described in the Introduction is the identification Cs1 = Fs+1 /Fs−1 for s = 0, · · · , n: its proof follows closely the proof of Theorem 1.1 in the next section, so we leave the details to the interested reader. The classification of GL-equivariant holonomic simple D-modules is explained in Theorem 2.9, so we only need to check that Cjs is the character of Csj . For k = 1, · · · , n, we consider the situation of Section 2.4, with X = Xk = G(k, V ) and R, Q as in (2.17). We let U = Sym2 V , η = Sym2 Q. If we write Y = Yk , π = πk , then (2.23) becomes / Sym2 W × G(k, V ) ❚❚❚❚ ❚❚❚❚ ❚❚ πk ❚❚❚❚❚❚  ❚* Yk = TotXk (Sym2 Q∗ )   (4.1) Sym2 W Locally on Xk , Q∗ trivializes to a vector space of dimension k, and Yk gets identified with the space of k × k symmetric matrices. We take L = (det Q)⊗2 , consider its GL-equivariant inclusion L ⊂ Symk η and note that L is locally generated by the symmetric determinant. If we let Yk0 ⊂ Yk be the open set defined locally by the non-vanishing of the determinant, M0k = OY 0 is a DYk -module. Note that Yk0 maps isomorphically k via πk to the orbit of symmetric matrices of rank k. As a GL-equivariant quasi-coherent sheaf on Xk M   (det Q)⊗r ⊗ det Sym2 Q∗ ⊗ Sym Sym2 Q∗ , (4.2) Sλ Q = lim M0k = −→ λ∈Zkdom ,λi even r≡k+1 (mod 2) CHARACTERS OF EQUIVARIANT D-MODULES ON SPACES OF MATRICES so condition (2.24) is satisfied in our context. The Euler characteristic of the D-module pushforward is now easily computed as a consequence of Proposition 2.10 and of Remark 2.11: !  Z   M0k = (−1)k·(n−k) · pk,r (V ) ⊗ det Sym2 W ⊗ Sym Sym2 W , lim χ r→∞ πk 23 R πk M0k (4.3) r≡k+1 (mod 2) which is evaluated explicitly in Proposition 3.1. We next explain why M0k ⊗ det(Q) also has the structure of a DYk -module. Consider the étale double 1/2 cover Yk of Yk0 defined locally by the square-root of the symmetric determinant. The structure sheaf OY 1/2 k is naturally a DY 0 -module [CL01] and hence also a DYk -module. It contains M0k so we can define M1k as k the cokernel of the inclusion M0k ⊂ OY 1/2 . As a GL-equivariant quasi-coherent sheaf on Xk , M1k is given by k M M1k = λ∈Zkdom ,λi Sλ Q = OY 0 ⊗ det(Q). k (4.4) odd It follows that M1k satisfies the setting of Proposition 2.10 with L′ = det(Q) so we can compute the Euler characteristic of its direct image via πk as !  Z   1 k·(n−k) 2 2 Mk = (−1) · lim , (4.5) χ pk,r (V ) ⊗ det Sym W ⊗ Sym Sym W r→∞ πk r≡k (mod 2) which is evaluated in Proposition 3.1. We are now ready to prove the main result of this section: Proof of Theorem 4.1. The classification of simple D-modules follows from Theorem 2.9, so it remains to check that in Γ(W ) we have the equalities Csj = Cjs for s = 0, · · · , n and j = 1, 2. The equalities (4.3–4.5) together with Proposition 3.1 yield for s = 1, · · · , n and j = 1, 2, j Cn−s = Cjn−s + n X (asi · C1i + bsi · C2i ), for some integers asi , bsi . i=n−s+1 Since Cnj = det(Sym2 W ) ⊗ Sym(Sym2 W ) has character Cjn (by Cauchy’s formula [Wey03, Prop. 2.3.8]), the equation above is also satisfied for s = 0. The Fourier transform F permutes the modules Csj , and it takes F(C1s ) = C1n−s for s = 0, · · · , n and F(C2s ) = C2n−s−1 for s = 0, · · · , n − 1. We can then apply Lemma 2.14 to the poset P = {(s, j) : s = 0, · · · , n − 1, j = 1, 2} ∪ {(n, 1)} with the lexicographic ordering given by (s, j) < (s′ , j ′ ) if and only if s < s′ , or s = s′ and j < j ′ . We let v(s,j) = Cjs and v(s,j) = Csj , and conclude using Lemma 2.14 that Csj = Cjs for all s = 0, · · · , n and j = 1, 2.  5. Equivariant D-modules on m × n matrices In this section we compute the characters of the GL-equivariant D-modules on the vector space M of m × n matrices, for m ≥ n. We consider W1 , W2 vector spaces of dimension dim(W1 ) = m, dim(W2 ) = n, let Vi = Wi∗ , and identify W = W1 ⊗ W2 with M , where tensor products w1 ⊗ w2 correspond to matrices of rank one. If we write GL = GL(W1 ) × GL(W2 ), let Ms denote the subvariety of matrices of rank at most s, and recall the notation (3.13) for the characters As , then the main result of this section is: 24 CLAUDIU RAICU Theorem on Equivariant D-modules on General Matrices. The simple GL-equivariant holonomic D-modules on M are As = L(Mn−s , M ), s = 0, · · · , n, and for each s the character of As is As . When m = n, As is as described in Theorem 1.1, while for m > n it can be expressed in terms of local cohomology: 1+s·(m−n) As = HMn−1 codim(Mn−s ) (M, OM ) = HMn−s (M, OM ). (5.1) We only need to show that As is the character of As , and to prove Theorem 1.1. The classification of GL-equivariant holonomic simple D-modules is explained in Theorem 2.9, while (5.1) follows by comparing As with the characters of local cohomology modules from [RWW14, Thm. 4.5] and [RW14, Thm. 6.1]. Proof of Theorem 1.1. Let’s assume for now that As is the character of As , and write W1 = W2 = Cn . Using Cauchy’s formula [Wey03, Cor. 2.3.3], we get an equality of GL-representations Sdet = M S λ W1 ⊗ S λ W2 = λ∈Zn dom n M Ai . i=0 As in Example 1.2, this shows that A0 , · · · , An are the D-module composition factors of Sdet , each appearing with multiplicity one. It remains to check that As = Fs /Fs−1 where Fs = hdet−s iD . We prove by induction on s that the D-module composition factors of Fs are A0 , · · · , As , which is clearly true Ln for s = 0. Assume that s > 0 and that the induction hypothesis is valid for Fs−1 , so that Sdet /Fs−1 = i=s Ai as GL-representations. We must then have for some i ≥ s an inclusion of D-modules Ai ⊂ Sdet /Fs−1 . Using the character description, Ai must contain the class of det−i inside the quotient Sdet /Fs−1 , and therefore it must also contain the classes of det−i+1 , det−i+2 , · · · . If i > s this contradicts the formula for the character of Ai . We conclude that i = s and that we have an inclusion As ⊂ Sdet /Fs−1 . Since As is simple, it is generated by the class of det−s , so the image of As is Fs /Fs−1 .  We note that, just as in Remark 1.4, the strict inclusions Fi−1 ( Fi , i = 1, · · · , n, in Theorem 1.1 combined Qn with Cayley’s identity show that the b-function of the generic determinant is bdet (s) = i=1 (s + i). We conclude by showing that As is the character of As . For k = 1, · · · , n, we consider the situation of Section 2.4, with X = Xk = G(k, V1 ) × G(k, V2 ) and R1 , Q1 , R2 , Q2 as in (2.17). We let U = V1 ⊗ V2 , η = Q1 ⊗ Q2 , and write Y = Yk , π = πk in (2.23). We note that locally on Xk , Q∗1 , Q∗2 trivialize to vector spaces of dimension k, and Yk gets identified with the space of k × k matrices. We take the line bundle L = det Q1 ⊗ det Q2 , consider its GL-equivariant inclusion L ⊂ Symk η, and note that L is locally generated by the function that assigns to a matrix its determinant. If we let Yk0 ⊂ Yk be the open set defined locally by the non-vanishing of the determinant, then as a GL-equivariant quasi-coherent sheaf on Xk , OY 0 is given by k OY 0 = k M λ∈Zkdom Sλ Q1 ⊗ Sλ Q2 = lim L⊗r ⊗ det (Q∗1 ⊗ Q∗2 ) ⊗ Sym (Q∗1 ⊗ Q∗2 ) , −→ r so condition (2.24) is satisfied in our context. The Euler characteristic of the D-module pushforward is now easily computed as a consequence of Propositions 2.10 and 3.5, and of Remark 2.11:  Z OY 0 = (−1)k·(m−n) · lim pk,r (V1 ) ⊗ pk,r (V2 ) ⊗ det(W ) ⊗ Sym(W ) χ πk R πk OY 0 k r→∞ k = n X s=n−k (m−n)·(n−k−s) (−1)   s · · As . s−n+k Since OY 0 maps isomorphically via πk to the orbit of rank k matrices in M , the conclusion that As is the k character of As follows as in the proof of Theorem 4.1 by the linear algebra trick in Section 2.6. CHARACTERS OF EQUIVARIANT D-MODULES ON SPACES OF MATRICES 25 6. Equivariant D-modules on skew-symmetric matrices In this section we compute the characters of the GL-equivariant D-modules on the vector space of skewsymmetric a complex vector space of dimension n, V = W ∗ , and we V2n × n matrices. We let W denote skew W with the vector space M of n × n skew-symmetric matrices, where exterior products identify w1 ∧ w2 correspond to matrices of rank two. If we write GL = GL(W ), m = ⌊n/2⌋, let Msskew denote the subvariety of matrices of rank at most 2s, and recall the notation (3.16) for the characters Bs then we have: Theorem on Equivariant D-modules on Skew-symmetric Matrices. The simple GL-equivariant skew , M skew ), s = 0, · · · , m, and for each s the character of holonomic D-modules on M skew are Bs = L(Mm−s Bs is Bs . If n = 2m + 1 is odd then for s = 1, · · · , m, Bs can be described in terms of local cohomology: skew ) codim(Mm−s 2s+1 skew Bs = H M , OM skew ) = HM skew skew (M m−1 m−s (M skew , OM skew ). (6.1) skew . We let S denote the coordinate If n = 2m is even, we let Pf be an equation defining the hypersurface Mm−1 ring of M skew , and consider Fs = hPf −2s iD , the D-submodule of the localization SPf generated by Pf −2s for s = 0, · · · , m (and F−1 = 0). We have that Bs = Fs /Fs−1 for s = 0, · · · , m. The classification of GL-equivariant holonomic simple D-modules is explained in Theorem 2.9, while the equality (6.1) follows from [RWW14, Theorem 5.5] and [RW15, (1.4)]. When n = 2m, we get that Bs = Fs /Fs−1 just as in the proof of Theorem 1.1. Note that Cayley’s identity shows that bPf (s) divides Q m −2i iD = hPf −2i+1 iD . The i=1 (s + 2 · i − 1), which in turn implies that hPf Q strict inclusions Fi−1 ( Fi then force 2 · i − 1 to be a root of bPf (s) for i = 1, · · · , m, so in fact bPf (s) = m i=1 (s + 2 · i − 1). To prove the theorem, it remains to check that Bs is the character of Bs . For k = 1, · · ·V, m, we consider V the situation of Section 2.4, with X = Xk = G(2k, V ) and R, Q as in (2.17). We let U = 2 V , η = 2 Q, and write Y = Yk , π = πk in (2.23). Locally on Xk , Q∗ trivializes to a vector space of dimension 2k, and Yk gets identified with the space of 2k × 2k skew-symmetric matrices. We take the line bundle L = det Q to be the Plücker line bundle on X, consider its GL-equivariant inclusion L ⊂ Symk η, and note that L is locally generated by the function that assigns to a skew-symmetric matrix its Pfaffian. If we let Yk0 ⊂ Yk be the open set defined locally by the non-vanishing of the Pfaffian, then we get using Cauchy’s formula [Wey03, Prop. 2.3.8] that condition (2.24) is satisfied. As a consequence of Propositions 2.10 and 3.6, and of Remark 2.11 we obtain ! !   Z  m 2 2 X ^ ^ s W = OY 0 = lim p2k,r (V ) ⊗ det W ⊗ Sym χ · Bs . (6.2) k r→∞ m−k πk s=m−k Since OY 0 maps isomorphically via πk to the orbit of rank 2k matrices in M skew , we conclude as in the proof k of Theorem 4.1 that Bs is the character of Bs for all s. 7. The simple regular holonomic D-modules on rank stratifications We let X denote any of the vector spaces of general, symmetric, or skew-symmetric matrices, with the natural group action by row and column operations of the corresponding group G as considered in the previous sections. We denote by Λ the union of conormal varieties to the orbits of G, and consider the category C = modrh Λ (DX ) of regular holonomic DX -modules whose characteristic variety is contained in Λ. The goal of this section is to describe explicitly the simple objects in C and obtain as a corollary a direct proof of Levasseur’s conjecture [Lev09, Conj. 5.17] in the case of general and skew-symmetric matrices. Via the Riemann–Hilbert correspondence, the simple objects in C are classified by irreducible local systems on the G-orbits. When the local systems are G-equivariant, the corresponding DX -modules have been 26 CLAUDIU RAICU described in the previous sections. The only orbits with irreducible non-equivariant local systems are the orbits O ⊂ X of rank n matrices, when X is the vector space of n × n general or symmetric matrices, or when X is the vector space of 2n × 2n skew-symmetric matrices. In each of these cases, the complement of O in X is defined by a single polynomial f which is the determinant of the generic (symmetric) n × n matrix in the first two cases, and it is the Pfaffian of the generic 2n × 2n skew-symmetric matrix in the last case. The fundamental group of O is equal to Z, so the monodromy of the corresponding local system is given by a non-zero complex number λ = e2πiα with α ∈ C/Z. We let S denote the coordinate ring of X and for α ∈ C we consider the DX -module Fα = Sf · f α (which only depends on the class of α in C/Z). Theorem 7.1. With notation as above, consider the irreducible local system Lα on O whose monodromy is given by λ = e2πiα . If Lα is not G-equivariant then the corresponding simple object in modrh Λ (DX ) is Fα . Proof. The restriction of Fα to O is a rank one integrable connection whose corresponding local system has monodromy given by λ = e2πiα . It follows that in order to prove the theorem we need to check that Fα is a simple DX -module. The condition that Lα is not G-equivariant is equivalent to (see Theorems 2.7 and 2.9) • α∈ / Z if X is the space of general or skew-symmetric matrices. • α∈ / 21 Z if X is the space of symmetric matrices. From now on we assume that Lα is not G-equivariant. It follows from the Cayley’s identity (and its symmetric and skew-symmetric versions) that Fα is generated as a DX -module by f α (or by f r+α for any r ∈ Z). In order to prove that Fα is simple, it is then sufficient to show that any non-zero DX -submodule F ⊂ Fα contains f r+α for r ≫ 0. Fix any such F . We write g for the Lie algebra of G, and note that any DX -module is a g-representation. In particular this is true about F ⊂ Fα . Since Fα has a multiplicity free decomposition into irreducible g-representations of the form M · f α , where M ⊂ Sf is an irreducible integral g-representation, we may assume that F contains one such M · f α . Replacing α by α − r and M by M · f r for r ∈ Z, we may assume that M ⊂ S. Since M generates a non-zero ideal which is invariant under the action of G, it defines set-theoretically a proper closed G-invariant subset of X, which is necessarily contained in the zero locus of f (the complement of f is a dense orbit for the G-action). We obtain that the ideal in S generated by M contains all large enough powers of f , and therefore that F contains f r+α for r ≫ 0, which concludes the proof of the theorem.  We end by remarking that Theorem 7.1 yields a proof of Levasseur’s conjecture in the case of general and skew-symmetric matrices. We have already seen that the irreducible G-equivariant local systems on the orbits of the group action give rise to simple DX -modules containing (and hence generated by) non-zero sections invariant under the action of the derived subgroup G′ . By Theorem 7.1, the remaining simple objects of C are all of the form Fα = Sf · f α . Since f is a G′ -invariant, the same is true about f α , so Fα contains non-zero G′ -invariant sections. Acknowledgments I am grateful to Nero Budur, David Eisenbud, Sam Evens, Mircea Mustaţă, Uli Walther and Jerzy Weyman for interesting conversations and helpful advice, as well as to the anonymous referee for suggesting many improvements to the presentation. Experiments with the computer algebra software Macaulay2 [GS] have provided numerous valuable insights. This work was supported by the National Science Foundation Grant No. 1458715. References + [BGK 87] A. Borel, P.-P. Grivel, B. Kaup, A. Haefliger, B. Malgrange, and F. Ehlers, Algebraic D-modules, Perspectives in Mathematics, vol. 2, Academic Press, Inc., Boston, MA, 1987. MR882000 (89g:32014) CHARACTERS OF EQUIVARIANT D-MODULES ON SPACES OF MATRICES 27 [BG99] Tom Braden and Mikhail Grinberg, Perverse sheaves on rank stratifications, Duke Math. J. 96 (1999), no. 2, 317–362, DOI 10.1215/S0012-7094-99-09609-6. MR1666554 (2000f:14031) [CL01] S. C. Coutinho and D. Levcovitz, D-modules and étale morphisms, Comm. Algebra 29 (2001), no. 4, 1487–1497, DOI 10.1081/AGB-100002114. MR1853107 (2002m:14014) [GS] Daniel R. Grayson and Michael E. Stillman, Macaulay 2, a software system for research in algebraic geometry, Available at http://www.math.uiuc.edu/Macaulay2/. [Har77] Robin Hartshorne, Algebraic geometry, Springer-Verlag, New York, 1977. Graduate Texts in Mathematics, No. 52. MR0463157 (57 #3116) [HTT08] Ryoshi Hotta, Kiyoshi Takeuchi, and Toshiyuki Tanisaki, D-modules, perverse sheaves, and representation theory, Progress in Mathematics, vol. 236, Birkhäuser Boston, Inc., Boston, MA, 2008. Translated from the 1995 Japanese edition by Takeuchi. MR2357361 (2008k:32022) [Kas76] Masaki Kashiwara, B-functions and holonomic systems. Rationality of roots of B-functions, Invent. Math. 38 (1976/77), no. 1, 33–53. MR0430304 (55 #3309) [Kem78] George Kempf, The Grothendieck-Cousin complex of an induced representation, Adv. in Math. 29 (1978), no. 3, 310–396, DOI 10.1016/0001-8708(78)90021-X. MR509802 (80g:14042) [Kim03] Tatsuo Kimura, Introduction to prehomogeneous vector spaces, Translations of Mathematical Monographs, vol. 215, American Mathematical Society, Providence, RI, 2003. Translated from the 1998 Japanese original by Makoto Nagura and Tsuyoshi Niitani and revised by the author. MR1944442 (2003k:11180) [Lev09] Thierry Levasseur, Radial components, prehomogeneous vector spaces, and rational Cherednik algebras, Int. Math. Res. Not. IMRN 3 (2009), 462–511, DOI 10.1093/imrn/rnn137. MR2482122 (2010g:22028) [Mac95] I. G. Macdonald, Symmetric functions and Hall polynomials, 2nd ed., Oxford Mathematical Monographs, The Clarendon Press Oxford University Press, New York, 1995. With contributions by A. Zelevinsky; Oxford Science Publications. MR1354144 (96h:05207) [MV86] Robert MacPherson and Kari Vilonen, Elementary construction of perverse sheaves, Invent. Math. 84 (1986), no. 2, 403–435, DOI 10.1007/BF01388812. MR833195 (87m:32028) [Nan08] Philibert Nang, On a class of holonomic D-modules on Mn (C) related to the action of GLn (C) × GLn (C), Adv. Math. 218 (2008), no. 3, 635–648, DOI 10.1016/j.aim.2008.01.001. MR2414315 (2009c:14028) [Nan12] , On the classification of regular holonomic D-modules on skew-symmetric matrices, J. Algebra 356 (2012), 115–132, DOI 10.1016/j.jalgebra.2012.01.021. MR2891125 [Rai14] Claudiu Raicu, Characters of equivariant D-modules on Veronese cones, arXiv 1412.8148 (2014). To appear in Trans. AMS. [RW14] Claudiu Raicu and Jerzy Weyman, Local cohomology with support in generic determinantal ideals, Algebra & Number Theory 8 (2014), no. 5, 1231–1257, DOI 10.2140/ant.2014.8.1231. MR3263142 [RWW14] Claudiu Raicu, Jerzy Weyman, and Emily E. Witt, Local cohomology with support in ideals of maximal minors and sub-maximal Pfaffians, Adv. Math. 250 (2014), 596–610, DOI 10.1016/j.aim.2013.10.005. MR3122178 [RW15] Claudiu Raicu and Jerzy Weyman, Local cohomology with support in ideals of symmetric minors and Pfaffians, arXiv 1509.03954 (2015). [Sai15] Morihiko Saito, D-modules generated by rational powers of holomorphic functions, arXiv 1507.01877 (2015). [VdB99] Michel Van den Bergh, Local cohomology of modules of covariants, Adv. Math. 144 (1999), no. 2, 161–220, DOI 10.1006/aima.1998.1809. MR1695237 (2000d:14051) [Vil85] K. Vilonen, Intersection homology D-module on local complete intersections with isolated singularities, Invent. Math. 81 (1985), no. 1, 107–114, DOI 10.1007/BF01388774. MR796193 (87f:32023) [Wal15] Uli Walther, Survey on the D-module f s , arXiv 1504.07516 (2015). [Wey03] Jerzy Weyman, Cohomology of vector bundles and syzygies, Cambridge Tracts in Mathematics, vol. 149, Cambridge University Press, Cambridge, 2003. MR1988690 (2004d:13020) Department of Mathematics, University of Notre Dame, 255 Hurley, Notre Dame, IN 46556 Institute of Mathematics “Simion Stoilow” of the Romanian Academy E-mail address: [email protected]
0math.AC
LE CAM THEORY ON THE COMPARISON OF STATISTICAL MODELS arXiv:1605.03301v1 [math.ST] 11 May 2016 ESTER MARIUCCI Abstract. We recall the main concepts of the Le Cam theory of statistical experiments, especially the notion of Le Cam distance and its properties. We also review classical tools for bounding such a distance before presenting some examples. A proof of the classical equivalence result between density estimation problems and Gaussian white noise models will be analyzed. Keywords: Statistical experiments, Le Cam distance, deficiency, density estimation model. AMS Classification: Primary 62B15; secondary 62G20, 62G07. 1. Introduction The theory of Mathematical Statistics is based on the notion of statistical model, also called statistical experiment or just experiment. A statistical model, as in its original formulation due to Blackwell (1951), is a triple P = (Ω, T , (Pθ : θ ∈ Θ)), where (Ω, T ) is a sample space, Θ is a set called the parameter space and (Pθ : θ ∈ Θ) is a family of probability measures on (Ω, T ). This definition is a mathematical abstraction intended to represent a concrete experiment; consider for example the following situation taken from the book of Le Cam and Yang (2000). A physicist decides to estimate the half life of Carbon 14, C 14 . He supposes that the life of a C 14 atom has an exponential distribution with parameter θ and, in order to develop his investigation, he takes a sample of n atoms of C 14 . The physicist fixes in advance the duration of the experiment, say 2 hours, and then he counts the number of disintegrations. Formally, this leads to the definition of the statistical model P1 = (N, P(N), (Pθ : θ ∈ (0, ∞))) where Pθ represents the law of the random variable X counting the number of disintegrations observed in 2 hours. This is not the only way to proceed if we want to estimate the half life of Carbon 14. Indeed, the physicist could choose to consider the first random time Y after which a fixed number of disintegrations, say 106 , have occurred. In this case he will represent the experiment via the statistical model P2 = (R+ , B(R+ ), (Qθ : θ ∈ (0, ∞))) where Qθ is the law of the random variable Y . A natural question is then how much “statistical information” the considered experiments contain or, more precisely, when the experiment P1 will be more informative than P2 and conversely. The quest for comparison of statistical experiments was initiated by the paper of Bohnenblust, Shapley and Sherman (1949) followed by the papers of Blackwell (1951, 1953) where the following definition was introduced: “P1 is more informative than P2 ” if for any bounded loss function L, kLk∞ ≤ 1, and any decision procedure ρ2 in the experiment P2 there exists a decision procedure ρ1 in the experiment P1 such that Rθ (P1 , ρ1 , L) ≤ Rθ (P2 , ρ2 , L), ∀θ ∈ Θ. Date: 12th May 2016. The research leading to these results has received funding from the European Research Council under ERC Grant Agreement 320637. 1 2 ESTER MARIUCCI Here we denote by Rθ (P1 , ρ1 , L) and Rθ (P2 , ρ2 , L) the statistical risk for the experiments P1 and P2 , respectively. However, this can lead to two models being non-comparable. This issue was solved by Le Cam who introduced the notion of deficiency δ(P1 , P2 ). We will give a precise definition in the forthcoming sections. Here, we only remark two interesting properties: • δ(P1 , P2 ) is a well defined non-negative real number for every two given statistical models P1 and P2 sharing the same parameter space. • For every loss function L with 0 ≤ L ≤ 1 and every decision procedure ρ2 available on Θ using P2 , there exists a decision procedure ρ1 in P1 such that for all θ ∈ Θ, Rθ (P1 , ρ1 , L) ≤ Rθ (P2 , ρ2 , L) + δ(P1 , P2 ). This solves the issue mentioned above: It could be that both δ(P1 , P2 ) and δ(P2 , P1 ) are strictly positive, in which case they will not be comparable according to the first definition; nevertheless, we can still say “how much information” we lose when passing from one model to the other one. Le Cam’s theory has found applications in several problem in statistical decision theory and it has been developed, for example, for nonparametric regression, nonparametric density estimation problems, generalized linear models, diffusion models, Lévy models, spectral density estimation problem. Historically, the first results of asymptotic equivalence in a nonparametric context date from 1996 and are due to Brown and Low (1996) and Nussbaum (1996). The first two authors have shown the asymptotic equivalence of nonparametric regression and a Gaussian white noise model while the third one those of density estimation problems and Gaussian white noise models. Over the years many generalizations of these results have been proposed such as Brown et al. (2002); Carter (2006, 2007, 2009); Grama and Nussbaum (2002); Meister and Reiß (2013); Reiß (2008); Rohde (2004); Schmidt-Hieber (2014) for nonparametric regression or Brown et al. (2004); Carter (2002); Jähnisch and Nussbaum (2003); Mariucci (To appear) for nonparametric density estimation models. Another very active field of study is that of diffusion experiments. The first result of equivalence between diffusion models and Euler scheme was established in 1998, see Milstein and Nussbaum (1998). In later papers generalizations of this result have been considered (see Genon-Catalot and Laredo (2014); Mariucci (2016b)) as well as different statistical problems always linked with diffusion processes (see, e.g., Dalalyan and Reiß (2006, 2007); Delattre and Hoffmann (2002); Genon-Catalot, Laredo and Nussbaum (2002)). Among others we can also cite equivalence results for generalized linear models (see, e.g., Grama and Nussbaum (1998)), time series (see, e.g., Grama and Neumann (2006); Milstein and Nussbaum (1998)), GARCH model (see, e.g., Buchmann and Müller (2012)), functional linear regression (see, e.g.,Meister (2011)), spectral density estimation (see, e.g. Golubev, Nussbaum and Zhou (2010)), volatility estimation (see, e.g. Reiß (2011)) and jump models (see, e.g., Mariucci (2015, 2016a)). Negative results are somewhat harder to come by; the most notable among them are Brown and Zhang (1998); Efromovich and Samarov (1996); Wang (2002). Another new research direction that has been explored involves quantum statistical experiments (see, e.g., Buscemi (2012)). The aim of this survey paper is to present some basic concepts of the Le Cam theory of asymptotic equivalences between statistical models. Our aim in this review is to give an accessible introduction to the subject. Therefore, we will not follow the most general approach to the theory, also because such an approach is already available in the literature, see e.g., Le Cam (1986); Le Cam and Yang (2000); van der Vaart (2002). In order to achieve such a goal, the paper has been organized as follows. In Section 2 we recall the definition of the Le Cam distance and its statistical meaning. Particular attention has been payed to the interpretation of the Le Cam distance in terms of decision theory. In Section 3 we collect some classical tools to control the Le Cam LE CAM THEORY ON THE COMPARISON OF STATISTICAL MODELS 3 distance before passing to some examples described in Section 4. Section 5 is devoted to show in details a proof of a classical result in Le Cam theory, namely the asymptotic equivalence between density estimation problems and Gaussian white noise models. 2. Deficiency and Le Cam distance As we have already pointed out, a possible way to compare two given statistical models (having the same parameter space) could be to compare the corresponding risk functions or to ask “how much information” we lose when passing from one model to the other one, saying that there is no loss if we have at our disposal a mechanism able to convert the observations from the distribution P1,θ to observations from P2,θ . If we adopt the latter point of view a natural formalization for such a mechanism is the notion of Markov kernel. Definition 2.1. Let (Xi , Ti ), i = 1, 2, be two measurable spaces. A Markov kernel K with source (X1 , T1 ) and target (X2 , T2 ) is a map K : X1 × T2 → [0, 1] with the following properties: • The map x 7→ K(x, A) is T1 -measurable for every A ∈ T2 . • The map A 7→ K(x, A) is a probability measure on (X2 , T2 ) for every x ∈ X1 . We will denote by K : (X1 , T1 ) → (X2 , T2 ) a Markov kernel with source (X1 , T1 ) and target (X2 , T2 ). Starting from a Markov kernel K : (X1 , T1 ) → (X2 , T2 ) and a probability measure P1 on (X1 , T1 ) one can construct a probability measure on (X2 , T2 ) in the following way: Z KP1 (A) = K(x, A)P1 (dx), ∀A ∈ T2 . Roughly speaking we can think that two models P1 and P2 contain “the same amount of information about θ” if there exist two Markov kernels, K1 and K2 , not depending on θ, such that K1 P1,θ = P2,θ and K2 P2,θ = P1,θ . This idea has been formalized in the sixties by Lucien Le Cam and led to the notion of the deficiency, hence to the introduction of a pseudo-metric on the class of all statistical experiments having the same parameter space. The definition of the deficiency in its most general form involves the notion of “transition” which is a generalization of the concept of Markov kernel. In this paper, however, we prefer to keep things simpler and only focus on the case in which one has to deal with dominated statistical models having Polish sample spaces (see below for a definition). The advantage is that in this case the definition of deficiency simplifies and the abstract concept of transition coincides with that of Markov kernel (see Proposition 9.2 in Nussbaum (1996)). Definition 2.2. A statistical model P1 = (X1 , T1 , (P1,θ : θ ∈ Θ)) is called Polish if its sample space (X1 , T1 ) is a separable completely metrizable topological space. P1 is said to be dominated if there exists a σ-finite measure µ on (X1 , T1 ) such that, for all θ ∈ Θ, P1,θ is absolutely continuous with respect to µ. The measure µ is called the dominating measure. Example 2.3. Typical examples of Polish spaces in probability theory are the spaces R, Rn , R∞ , the space CT of continuous functions on [0, T ] equipped with the supremum norm d(x, y) = sup0≤t≤T |xt − yt |, the space D of càdlàg functions equipped with the Skorokhod metric. Definition 2.4. Let Q1 and Q2 be two probability measures defined on a measurable space Ω. The total variation distance between Q1 and Q2 is defined as the quantity: 1 kQ1 − Q2 kT V = sup |Q1 (A) − Q2 (A)| = L1 (Q1 , Q2 ), 2 A⊆Ω 4 ESTER MARIUCCI where L1 (Q1 , Q2 ) denotes the L1 norm between Q1 and Q2 . Definition 2.5. Let Pi = (Xi , Ti , (Pi,θ : θ ∈ Θ)), i = 1, 2, be two experiments. The deficiency δ(P1 , P2 ) of P1 with respect to P2 is the number δ(P1 , P2 ) = inf sup kT P1,θ − P2,θ kT V , T θ∈Θ for an infimum taken over all Markov kernels T : (X1 , T1 ) → (X2 , T2 ) and k · kT V denotes the total variation distance. Definition 2.6. The Le Cam distance or ∆-distance between P1 and P2 is defined as ∆(P1 , P2 ) = max(δ(P1 , P2 ), δ(P2 , P1 )). The ∆-distance is a pseudo-metric on the space of all statistical models: It satisfies the triangle inequality ∆(P1 , P3 ) ≤ ∆(P1 , P2 ) + ∆(P2 , P3 ) but the equality ∆(P1 , P2 ) = 0 does not imply that P1 and P2 actually coincide. Concerning the glossary, when δ(P1 , P2 ) = 0 (i.e. if the experiment P2 can be reconstructed from the experiment P1 by a Markov kernel), we will say that P2 is less informative than P1 , or that P1 is better than P2 , or that P1 is more informative than P2 . When ∆(P1 , P2 ) = 0 the models P1 and P2 are said to be equivalent and two sequences of statistical models (P1,n )n∈N and (P2,n )n∈N are called asymptotically equivalent when ∆(P1,n , P2,n ) → 0 as n → ∞. A way to interpret the Le Cam distance between experiments is to see it as a numerical indicator of the cost needed to reconstruct one model from the other one and viceversa, via Markov kernels. But, as we said in the introduction, a way to compare statistical models that seems just as natural is to compare the respective risk functions. Let us then highlight how the definition of the deficiency has a clear interpretation in terms of statistical decision theory. To that aim, we will start by recalling the standard framework: • A statistical model, which is just an indexed set P = (X , T , (Pθ : θ ∈ Θ)) of probability measures all defined on the same measurable space (X , T ), for some set X equipped with a σ-field T . The elements of Θ are sometimes called the states of Nature. • A space A of possible actions or decisions that the statistician can take after observing x ∈ X . For example, in estimation problems we can take A = Θ. To make sense of the notion of integral on A we need it to be equipped with a σ-field A. • A loss function L : Θ × A 7→ (−∞, ∞], with the interpretation that action z ∈ A incurs a loss L(θ, z) when θ is the true state of Nature. • A (randomized) decision rule ρ in P is a Markov kernel ρ : (X , T ) → (A, A ). • The risk is:  Z Z L(z, θ)ρ(y, dz) Pθ (dy). Rθ (P, ρ, L) = X A More precisely, the standard interpretation of risk is as follows. The statistician observes a value x ∈ X obtained from a probability measure Pθ . He does not know the value of θ and must take a decision z ∈ A. He does so by choosing a probability measure ρ(x, ·) on A and picking a point in A at random according to ρ(x, ·). If he has chosen z when the true distribution of x is R Pθ , he suffers a loss L(θ, z). His average loss when x is observed is then L(θ, z)ρ(x,Rdz). loss when x is picked according to Pθ is R His all over average  the integral L(θ, z)ρ(x, dz) Pθ (dx). A very important result allowing to translate the notion of deficiency as described above in a decision theory language is the following: LE CAM THEORY ON THE COMPARISON OF STATISTICAL MODELS 5 Theorem 2.7 (See Le Cam (1964) or Theorem 2, page 20 in Le Cam (1986)). Let ε > 0 be fixed. δ(P1 , P2 ) < ε if and only if: ∀ decision rule ρ2 on P2 and for all bounded loss function L, kLk∞ ≤ 1, there exists a decision rule ρ1 on P1 such that Rθ (P1 , ρ1 , L) < Rθ (P2 , ρ2 , L) + ε, In other words we have that ∀θ ∈ Θ. δ(P1 , P2 ) = inf sup sup sup |R(P1 , ρ1 , L, θ) − R(P2 , ρ2 , L, θ)|, ρ1 ρ2 θ L where the last supremum is taken on the set of all loss functions L s.t. 0 ≤ L(θ, z) ≤ 1, ∀z ∈ A, ∀θ ∈ Θ and ρi belongs to the set of all randomised decision procedures in the experiment Pi , i = 1, 2. Remark 2.8. An important consequence of the previous theorem is that if two sequences of experiments (P1,n )n∈N and (P2,n )n∈N are asymptotically equivalent in the Le Cam’s sense then asymptotic properties of any inference problem are the same for these experiments. This means that when two sequences of statistical experiments are proven to be asymptotically equivalent it is enough to choose the simplest one, to study there the inference problems one is interested in and to transfer the knowledge about such inference problems to the more complicated sequence, via Markov kernels. 2.1. How to transfer decision rules via randomisations. p Let Pi,n = (Xi,n , Ti,n , (Pi,n,θ : θ ∈ Θ)), i = 1, 2, be two sequences of statistical models sharing the same parameter space Θ and having Polish sample spaces (Xi,n , Ti,n ). Suppose that there exist Markov kernels Kn such that kKn P1,n,θ − P2,n,θ kT V → 0 uniformly on the parameter space. Then, given a decision rule (or an estimator) π2,n on P2,n we can define a decision rule π1,n on P1,n that, asymptotically, has the same statistical risk as π2,n . To show that let us start by considering the easier case in which both Kn and π2,n are deterministic. More precisely, we suppose that Kn is of the form Kn (A) = IA Sn (x) for all A ∈ T2,n for some functions Sn . Then, we have (suppressing the index n to shorten notations): Z Z L(θ, π2 (y))P2,θ (dy) ≤ L(θ, π1 (y))P1,θ (dy) − X2 X1 Z L(θ, π1 (y))P1,θ (dy) − X1 + Z X2 ≤ Z X1 Z L(θ, π2 (y))KP1,θ (dy) X2   L(θ, π2 (y)) KP1,θ (dy) − P2,θ (dy) L(θ, π1 (y))P1,θ (dy) − Z X1 L(θ, π2 (S(y)))P1,θ (dy) + kLk∞ kKP1 − P2 kT V In particular, assuming that the loss function L is bounded by 1 and defining π1 (y) := π2 (S(y)) one finds that Z Z L(θ, π1 (y))P1,θ (dy) − X2 X1 L(θ, π2 (y))P2,θ (dy) ≤ kKP1 − P2 kT V → 0, that is, the decision rule π1,n (y) = π2,n (Sn (y)) has asymptotically the same risk as π2,n . The same kind of computations work in the general case in which the Kn ’s are not deterministic and (π2,n ) is a sequence of decision rule having (An , An ) as action’s spaces. In this case one can show that the randomized sequence of decision rules Z π2,n (x, C)K(y, dx), ∀y ∈ X1,n , ∀C ∈ An π1,n (y, C) := X2,n has asymptotically the same risk as π2,n . 6 ESTER MARIUCCI Remark 2.9. Let Pi be a probability measure on (EiQ , Ei ) and Ki a Markov kernel on n (Gi , Gi ). One can then define a Markov kernel K on ( i=1 Ei , ⊗ni=1 Gi ) in the following way: n Y Ki (xi , Ai ), ∀xi ∈ Ei , ∀Ai ∈ Gi . K(x1 , . . . , xn ; A1 × · · · × An ) := i=1 Clearly K ⊗ni=1 Pi = ⊗ni=1 Ki Pi . 3. How to control the Le Cam distance Even if the definition of deficiency has a perfectly reasonable statistical meaning, it is not easy to compute: Explicit computations have appeared but they are rare (see Hansen and Torgersen (1974); Torgersen (1972, 1974) and Section 1.9 in Shiryaev and Spokoiny (2000)). More generally, one may hope to find more easily some upper bounds for the ∆-distance. We collect below some useful techniques for this purpose. Property 3.1. Let Pj = (X , T , (Pj,θ ; θ ∈ Θ)), j = 1, 2, be two statistical models having the same sample space and define ∆0 (P1 , P2 ) := supθ∈Θ kP1,θ − P2,θ kT V . Then, ∆(P1 , P2 ) ≤ ∆0 (P1 , P2 ). In particular, Property 3.1 allows us to bound the ∆-distance between statistical models sharing the same sample space by means of classical bounds for the total variation distance. To that aim, we collect below some useful (and classical) results. Fact 3.2 (see Le Cam 1969, p. 35). Let P1 and P2 be two probability measures on X , i dominated by a common measure ξ, with densities gi = dP dξ , i = 1, 2. Define Z |g1 (x) − g2 (x)|ξ(dx), L1 (P1 , P2 ) = X H(P1 , P2 ) = Z X Then, 1/2 2 p p g1 (x) − g2 (x) ξ(dx) . 1 H 2 (P1 , P2 ) ≤ kP1 − P2 kT V = L1 (P1 , P2 ) ≤ H(P1 , P2 ). 2 2 An important property is the following: Property ν are product measures defined on the same measurable space, Nm 3.3. If µ and Nm µ = j=1 µj and ν = j=1 νj , then   m  Y H 2 (µj , νj ) 1− . H 2 (µ, ν) = 2 1 − 2 j=1 Proof. See, e.g., Zolotarev (1983), p. 279.  Thus one can express the distance between distributions of vectors with independent components in terms of the component-wise distances. A consequence of Property 3.3 is: Property ν are product measures defined on the same measurable space, Nm 3.4. If µ and Nm µ = j=1 µj and ν = j=1 νj , then H 2 (µ, ν) ≤ m X H 2 (µi , νi ). i=1 Proof. See, e.g., Strasser (1985), Lemma 2.19.  LE CAM THEORY ON THE COMPARISON OF STATISTICAL MODELS 7 Property 3.5. The Hellinger distance between two normal distributions µ ∼ N (m1 , σ12 ) and ν ∼ N (m2 , σ22 ) is:     1/2 2σ1 σ2 (m1 − m2 )2 H 2 (µ, ν) = 2 1 − 2 exp − σ1 + σ22 4(σ12 + σ22 ) σ2 (m1 − m2 )2 ≤ 2 1 − 12 + . σ2 2σ22 Proof. See, e.g., Mariucci (2015), Fact 1.5.  3.1. The likelihood process. Another way to control the Le Cam distance lies in the deep relation linking the equivalence between experiments to the proximity of the distributions of the related likelihood ratios. Let Pj = (Xj , Tj , (Pj,θ : θ ∈ Θ)) be a statistical model dominated by Pj,θ0 , θ0 ∈ Θ, dPj,θ and let Λj (θ) = dPj,θ be the density of Pj,θ with respect to Pj,θ0 . In particular, one can 0 see Λj (θ) as a real random variable defined on the probability space (Xj , Tj ), i.e. one can see (Λj (θ))θ∈Θ as a stochastic process. For that reason we introduce the notation ΛPj := (Λj (θ), θ ∈ Θ) and we call ΛPj the likelihood process. A key result of the theory of Le Cam is the following. Property 3.6. Let Pj = (Xj , Tj , (Pj,θ : θ ∈ Θ)), j = 1, 2, be two experiments. If the family (Pj,θ : θ ∈ Θ) is dominated by Pj,θ0 , then P1 and P2 are equivalent if and only if their likelihood processes under the dominating measures P1,θ0 and P2,θ0 coincide. Proof. see Strasser (1985), Corollary 25.9.  Let us now suppose that there are two processes (Λn,∗ j (θ))θ∈Θ , j = 1, 2 defined on a same probability space (X ∗ , T ∗ , Π∗ ) and such that the law of (Λnj (θ))θ∈Θ under Pj,θ0 ∗ is equal to the law of (Λn,∗ j (θ))θ∈Θ under Π , j = 1, 2. Then, the following holds (see Le Cam and Yang (2000), Lemma 6). Property 3.7. If ΛP1 and ΛP2 are the likelihood processes associated with the experiments P1 and P2 , then n,∗ ∆(P1n , P2n ) ≤ sup EΠ∗ Λn,∗ 1 (θ) − Λ2 (θ) . θ∈Θ 3.2. Sufficiency and Le Cam distance. A very useful tool, when comparing statistical models having different sample spaces, is to look for a sufficient statistic. The introduction of the term sufficient statistic is usually attributed to R.A. Fisher who gave several definitions of the concept. We cite here the presentation of the subject from Le Cam (1964). Fisher’s most relevant statement seems to be the requirement “...that the statistic chosen should summarize the whole of the relevant information supplied by the sample.” Such a requirement may be made precise in various ways, the following three interpretations are the most common. (i) The classical, or operational definition of sufficiency, claims that a statistic S is sufficient if, given the value of S, one can proceed to a post-experimental randomization reproducing variables which have the same distributions as the originally observable variables. (ii) The Bayesian interpretation. A statistic S is sufficient if for every a priori distribution of the parameter the a posteriori distributions of the parameter given S is the same as if the entire result of the experiment was given. (iii) The decision theoretical concept. A statistic S is sufficient if for every decision problem and every decision procedure made available by the experiment there is a decision procedure, depending on S only, which has the same performance characteristics. 8 ESTER MARIUCCI The study of sufficiency in an abstract way can be found in Halmos and Savage (1949). The last section of such a work is named “The value of sufficient statistics in statistical methodology" and starts with the following observation: We gather from conversations with some able and prominent mathematical statisticians that there is doubt and disagreement about just what a sufficient statistic is sufficient to do, and in particular about in what sense if any it contains “all the information in a sample". In Bahadur (1954) a continuation of the work of Halmos and Savage (1949) can be found. A particular effort was done to highlight the interest of using sufficient statistics in statistical methodology. One of the main results in Bahadur (1954) is Theorem 7.1 establishing the equivalence of the decision theoretical concept of sufficiency and the operational concept in terms of conditional probabilities. We mention this fact because of its similarity with the result of Le Cam, here stated as Theorem 2.7, that is the core of the theory of comparison of statistical experiments. Formally, let P = (X , T , (Pθ : θ ∈ Θ)) be a statistical model. A statistic is a measurable map from a measurable space (X , T ) to another measurable one (X2 , T2 ). We denote by S# Pθ the image law of S under Pθ , i.e S# Pθ (B) = Pθ (S −1 (B)), for all B ∈ T2 . Definition 3.8. S is a sufficient statistic for (Pθ : θ ∈ Θ) if for any A ∈ T there exists a function φA , with φA ◦ S T -measurable, such that Z Pθ (A ∩ S −1 (B)) = φA (y)S# Pθ (dy), ∀A ∈ T , ∀B ∈ T2 , ∀θ ∈ Θ. B An arbitrary subalgebra T0 of T is said to be sufficient for (Pθ : θ ∈ Θ) if for all A ∈ T there exists a T0 -measurable function φA such that Z φA (x)Pθ (dx), ∀A0 ∈ T0 , ∀θ ∈ Θ. Pθ (A ∩ A0 ) = A0 The set {S −1 (B) : B ∈ T2 } is called the subalgebra induced by the statistic S. Property 3.9 (See, e.g. Bahadur (1954)). A statistic S is sufficient for (Pθ : θ ∈ Θ) if the subalgebra induced by S is sufficient for (Pθ : θ ∈ Θ). In accordance with the notation introduced in Section 2, we will state Theorem 7.1 in Bahadur (1954) as follows (recall that (A, A ) denotes the action/decision space.) Theorem 3.10 (See Theorem 7.1, Bahadur (1954)). If the subalgebra T0 of T is sufficient for (Pθ : θ ∈ Θ), then for every decision rule ρ : (X , T ) 7→ (A, A ) there exists a decision rule π : (X , T0 ) 7→ (A, A ) such that Pθ ρ(C) = Pθ π(C), ∀C ∈ A , ∀θ ∈ Θ. Before focusing on the relation between the notion of sufficient statistic and the one of equivalence between statistical models, let us recall the Neyman-Fisher factorization theorem, a powerful tool for identifying sufficient statistics for a given dominated family of probabilities. Let (Pθ : θ ∈ Θ) be a family of probabilities on (Ω, T ), absolutely θ continuous with respect to a σ-finite measure µ, and denote by pθ := dP dµ the density. Theorem 3.11. A statistic S : (Ω, T ) → (X , B) is sufficient for (Pθ : θ ∈ Θ) if and only if there exists a B-measurable function gθ ∀θ ∈ Θ and a T -measurable function h 6= 0 such that pθ (x) = gθ (S(x))h(x), µ-a.s. ∀x ∈ Ω. An important result linking the Le Cam distance with the existence of a sufficient statistic is the following: LE CAM THEORY ON THE COMPARISON OF STATISTICAL MODELS 9 Property 3.12. Let Pi = (Xi , Ti , (Pi,θ : θ ∈ Θ)), i = 1, 2, be two statistical models. Let S : X1 → X2 be a sufficient statistic such that the distribution of S under P1,θ is equal to P2,θ . Then ∆(P1 , P2 ) = 0. Proof. In order to prove that δ(P1 , P2 ) = 0 it is enough to consider the Markov kernel M : (X1 , T1 ) → (X2 , T2 ) defined as M (x, B) := IB (S(x)) ∀x ∈ X1 and ∀B ∈ T2 . Conversely, to show that δ(P2 , P1 ) = 0 one can consider the Markov kernel K : (X2 , T2 ) → (X1 , T1 ) defined as K(y, A) = EP2,θ (IA |S = y), ∀y ∈ X2 , ∀A ∈ T1 . Since S is a sufficient statistic, the Markov kernel K does not depend on θ. Denoting by S# P1,θ the distribution of S under P1,θ , one has: Z Z KP2,θ (A) = K(y, A)P2,θ (dy) = EP2,θ (IA |S = y)S# P1,θ (dy) = P1,θ (A).  For asymptotic arguments, one also needs an appropriate version of the notion of sufficiency. Definition 3.13. Let Pn = (Xn , Tn , (Pn,θ : θ ∈ Θ)) be a sequence of statistical models. The sequence of subalgebras T˜n of Tn is asymptotically sufficient for (Pn,θ : θ ∈ Θ) if ∆(Pn , Pn|T˜ ) → 0, where Pn|T˜ denotes the restriction of the experiment Pn to T˜n , n n i.e. Pn| = (Xn , T˜n , (P̃n,θ : θ ∈ Θ)), where P̃n,θ (A) = Pn,θ (A), for all A ∈ T˜n . T˜n This is a stronger notion than asymptotic equivalence; indeed, let P1,n and P2,n be two sequences of experiments having the same parameter space. Then, by the triangle inequality, it is clear that if there exist two sequences S1,n and S2,n of asymptotically sufficient statistics in P1,n and P2,n respectively, taking values in the same measurable space, and such that sup kS1,n # P1,θ − S2,n # P2,θ kT V → 0 θ∈Θ as n → ∞, then the sequences P1,n and P2,n are asymptotically equivalent. We also recall that an important generalization of the notion of sufficiency is the notion of insufficiency. The discussion of this concept is beyond the purposes of this paper, the reader is referred to Le Cam (1974) or Chapter 5 in Le Cam (1986) for an exhaustive treatment of the subject. 4. Examples To better understand what is the typical form of an asymptotic equivalence result let us analyze some examples. As a toy example let us start by considering the following parametric case. Example 4.1. Let P1,n be the statistical model associated with the observation of a vector X of n independent Gaussian random variables N (θ, 1). Here the inference concerns θ and the parameter space Θ will be an interval of R. Formally P1,n = (Rn , B(Rn ), (P1,θ : θ ∈ Θ)), where Pθ is the law of X. Then, let us denote by P2,n the experiment associated with the observation of the empirical mean relative to the previous random variables, i.e. P2,n = (R, B(R), (P2,θ : θ ∈ Θ)), where P2,θ is the law of a Gaussian random variable N (θ, 1/n). By means of the Neyman-Fisher factorization theorem it is easy to see that the application S : Rn → R, Pn i=1 xi S(x1 , . . . , xn ) = is a sufficient statistic. An immediate application of Property n 3.12 implies that ∆(P1,n , P2,n ) = 0 for all n. 10 ESTER MARIUCCI Before passing to some examples in a nonparametric framework, let us recall a result due to Carter and concerning the asymptotic equivalence between a multinomial and a Gaussian multivariate experiment. The parameter space will be a subset of Rm and the reason for which we focus on such a result lies on its being a very useful tool in establishing global asymptotic equivalence results for density estimation problems. Example 4.2. Let X = (X1 , . . . , Xm ) be a random vector having a multinomial distriP bution of parameters n and (p1 , . . . , pm ) with pi ≥ 0 for i = 1, . . . , m and m p i=1 i = 1. Denote by P the statistical model associated with a multinomial distribution Pθ = M(n; (θ1 , . . . , θm )) with parameters θ = (θ1 , . . . , θm ) that belong to ΘR ⊂ Rm , a set consisting of all vectors of probabilities such that maxi θi ≤ R. mini θi The main result in Carter (2002) is a bound of the Le Cam distance between statistical models associated with multinomial distributions and multivariate normal distributions with the same means and covariances as the multinomial ones. More precisely, let us denote by Q the statistical model associated with a family of multivariate normal distributions Qθ = N (µ, Σ), θ ∈ ΘR , where µ = (nθ1 , . . . , nθm ), Σ = (σi,j )i,j=1,...,m with σi,j = nθi (1 − θi )δi=j − nθi θj δi6=j . Theorem 4.3 (see Carter (2002), p. 709). With the notations above, m ln m ∆(P, Q) ≤ CR √ n for a constant CR that depends only on R. Another interesting result contained in Carter (2002) is the approximation of Q by a Gaussian experiment with independent coordinates. Let us denote by √ Q˜ the statistical model associated with m independent Gaussian random variables N ( θi , 1/(4n)), i = 1, . . . , m. Theorem 4.4 (see Carter (2002), p. 717–719). With the notations above, m ˜ ≤ CR √ ∆(Q, Q) n for a constant CR that depends only on R. Let us now consider some examples in a nonparametric framework. More precisely, we will recall the results of Brown and Low (1996) and Nussbaum (1996) that are the first asymptotic equivalence results for nonparametric experiments. Example 4.5. In Brown and Low (1996), the authors consider the problem of estimating the function f from a continuously observed Gaussian process y(t), t ∈ [0, 1], which satisfies the SDE σ(t) dyt = f (t)dt + √ dWt , t ∈ [0, 1], n where dWt is a Gaussian white noise. They find that the statistical model associated with the continuous observation of (yt ) is asymptotically equivalent to the statistical model associated with its discrete counterpart, i.e. the nonparametric regression: yi = f (ti ) + σ(ti )ξi , i−1 n , i = 1, . . . , n. The time grid is uniform, ti = and the ξi ’s are standard normal variables; they assume that f varies in a nonparametric subset F of L2 [0, 1] defined by some smoothness conditions and n tends to infinity not too slowly. More precisely, the drift function f (·) is unknown and such that, for B a positive constant, one has:  sup |f (t)| : t ∈ [0, 1], f ∈ F = B < ∞. LE CAM THEORY ON THE COMPARISON OF STATISTICAL MODELS Moreover, defining f¯n (t) = one asks:   if i−1 f ni n ≤t< f (1) if t = 1; lim sup n n→∞ f ∈F Z 0 1 i n, 11 i = 1, . . . , n; (f (t) − f¯n (t))2 dt = 0. σ 2 (t) The diffusion coefficient σ 2 (·) > 0 is supposed to be a known absolutely continuous function on [0, 1] such that d ln σ(t) ≤ C, dt t ∈ [0, 1], for some positive constant C. Example 4.6. In Nussbaum (1996) the author establishes a global asymptotic equivalence between the problem of density estimation from an i.i.d. sample and a Gaussian white noise model. More precisely, let (Yi )ni=1 be i.i.d. random variables with density f (·) on [0, 1] with respect to the Lebesgue measure. The densities f (·) are the unknown parameters and they are supposed to belong to a certain nonparametric class F subject to a Hölder restriction: |f (x) − f (y)| ≤ C|x − y|α with α > 12 and a positivity restriction: f (x) ≥ ε > 0. Let us denote by P1,n the statistical model associated with the observation of the Yi ’s. Furthermore, let P2,n be the experiment in which one observes a stochastic process (yt )t∈[0,1] such that p 1 dyt = f (t)dt + √ dWt , t ∈ [0, 1], 2 n where (Wt )t∈[0,1] is a standard Brownian motion. Then the main result in Nussbaum (1996) is that ∆(P1,n , P2,n ) → 0 as n → ∞. This is done by first showing that the result holds for certain subsets Fn (f0 ) of the class F described above. Then it is shown that one can estimate the f0 rapidly enough to fit the various pieces together. Without entering into any detail, let us just mention that the key steps are a Poissonization technique and the use of a functional KMT inequality. In the last years, asymptotic equivalence results have also been established for discretely observed stochastic processes. As an example, let us present the result in Mariucci (2015), very close in spirit to the one of Brown and Low (1996). Example 4.7. Let {Xt }t≥0 be a sequence of one-dimensional time inhomogeneous jump-diffusion processes defined by Z t Z t Nt X Yi , t ∈ [0, T ], f (s)ds + εn Xt = η + σ(s)dWs + 0 0 i=1 where: • η is some random initial condition; • W = {Wt }t≥0 is a standard Brownian motion; • N = {Nt }t≥0 is an inhomogeneous Poisson process with intensity function λ(·), independent of W ; • (Yi )i≥1 is a sequence of i.i.d. real random variables with distribution G, independent of W and N ; • σ 2 (·) is supposed to be known. The horizon of observation T is finite and εn → 0 as n → ∞. • f (·) belongs to some non-parametric class F . • λ(·) and G are also unknown and belong to non-parametric classes Λ and G , respectively. 12 ESTER MARIUCCI In Mariucci (2015), the problem of estimating f from high frequency observations of {Xt }t≥0 is considered. More precisely, we suppose to observe  {Xt }t≥0 at discrete times 0 = t0 < t1 < · · · < tn = T such that ∆n = max1≤i≤n |ti − ti−1 | ↓ 0 as n goes to infinity. Let Pn be the statistical model associated with the continuous observation of {Xt }t∈[0,T ] and Qn the one associated with the observations (Xti )ni=0 . Finally, let Wn be the Gaussian white noise model associated with the continuous observation of the Gaussian process dyt = f (t)dt + εn σ(t)dWt , y0 = η, t ∈ [0, T ]. Suppose that F is a subclass of α-Hölder, uniformly bounded functions on R and the nuisance parameters σ(·) and λ(·) satisfy the following conditions: • There exist two constants m and M such that 0 < m ≤ σ(·) ≤ M < ∞ and σ(·) is derivable with derivative σ ′ (·) in L∞ (R). • There exists a constant L < ∞ such that for all λ ∈ Λ, kλkL2 ([0,T ]) < L. −2 Then, under the assumption that ∆2α n εn → 0 as n → ∞, the three models Pn , Qn and Wn are asymptotically equivalent. A bound for ∆(Qn , Wn ) and ∆(Pn , Qn ) is given by −2 + T ∆2α ∆β/2 n εn + T ∆n , n where β = 1 if G is a subclass of discrete distributions with support on Z and β = 1/2 if G is a subclass of absolutely continuous distributions with respect to the Lebesgue measure on R with uniformly bounded densities on a fixed neighborhood of 0. In particular, this result tells us that the jumps of the process {Xt }t≥0 can be ignored when the goal is the estimation of the drift function f (·). Moreover, the proof is constructive: an explicit Markov kernel is constructed to filter the jumps out. 5. Density estimation problems and Gaussian white noise models: A constructive proof In this Section, following Carter (2002) (see p. 720-725), we will detail how one can prove, in a constructive way, the asymptotic equivalence between a density estimation problem and a Gaussian white noise model, as presented in Example 4.6. However, with respect to the work of Nussbaum (1996), we will ask some stronger hypotheses on the parameter space in order to simplify the proofs. More precisely, for fixed γ ∈ (0, 1] and K, ε, M strictly positive constants, we will consider a functional parameter space of the form n o F(γ,K,ε,M) = f ∈ C 1 (I) : ε ≤ f (x) ≤ M, |f ′ (x) − f ′ (y)| ≤ K|x − y|γ , ∀x, y ∈ [0, 1] . As in Example 4.6, P1,n will be a density estimation problem: (1) (Yi )1≤i≤n i.i.d. r.v. with density f ∈ F(γ,K,ε,M) and P2,n a Gaussian with noise model: p 1 dyt = f (t)dt + √ dWt , 2 n t ∈ [0, 1], f ∈ F(γ,K,ε,M) . The idea of Carter was to use the bound on the distance between multinomial and Gaussian normal variables as presented in Example 4.2 to make assertions about density estimation experiments. The intuition is to see the multinomial experiment as the result of grouping independent observations from a continuous density into m subsets, say Ji , i = 1, . . . , m. Using the square root as a variance-stabilizing transformation, these multinomial variables can be asymptotically approximated by m normal variables with constant variances. These normal variables, in turn, are approximations to the increments of the process (yt ) over the sets Ji . In Subsection 5.1 we will analyze how LE CAM THEORY ON THE COMPARISON OF STATISTICAL MODELS 13 to obtain a asymptotically equivalent multinomial experiment starting from P1,n . Assuming the results of Carter stated here as Theorems 4.3 and 4.4 we will then obtain a bound of the ∆-distance between such a multinomial experiment and one associated with independent Gaussian random variables. In Subsection 5.2 we will explain how to show the asymptotic equivalence between an adequate normal approximation with independent coordinates and P2,n . 5.1. Density estimation problems and multinomial experiments. Let us consider a partition of [0, 1] in m intervals Ji = [(i − 1)/m, i/m] and denote by S : [0, 1]n → {1, . . . , n}m the application mapping the n-tuple (x1 , . . . , xn ) to the m-tuple (#{j : xj ∈ J1 }, . . . , #{j : xj ∈ Jm }), where the writing #{j : xj ∈ Ji } stands for the number of xj belonging to the interval Ji . Let Pf⊗n be the law of (Y1 , . . . , Yn ) as in (1). R The law of S under Pf⊗n is a multinomial distribution M (n; θ1 , . . . , θm ), θi = Ji f (x)dx, i = 1, . . . , m. In particular this means that an appropriate multinomial experiment is more informative than P1,n . More precisely, we have proven that the statistical model associated with the multinomial distribution (M (n; θ1 , . . . , θm ) : f ∈ F ), denoted by Pm , is such that δ(P1,n , Pm ) = 0. Let us now investigate the quantity δ(Pm , P1,n ). A trivial observation is that the total variation distance between the multinomial distribution M (n; θ1 , . . . , θm ) and the law Pf⊗n is always 1, hence, in order to prove that δ(Pm , P1,n ) → 0 we need to construct a non trivial Markov kernel. We will divide the proof in three main steps. Step 1: We denote by x∗i the midpoints of the intervals Ji , i.e. x∗i = 2i−1 2m , and we introduce a discrete random variable X ∗ concentrated at the points x∗i with masses θi . Let us then denote by P ∗ the statistical model associated with the observation of n independent realizations of X ∗ . Then, by means of a “sufficient statistic” argument we can get ∆(Pm , P ∗ ) = 0. Indeed, consider the application S : {x∗1 , . . . , x∗m }n → {1, . . . , n}m mapping (y1 , . . . , yn ) to (#{j : yj = x∗1 }, . . . , #{j : yj = x∗m }) and observe that the density h of the law of n independent realizations of X ∗ with respect to the counting measure is given by h(y1 , . . . , yn ) = n Y #{j:yj =x∗ 1} P(X ∗ = yi ) = θ1 i=1 #{j:yj =x∗ m} · · · · · θm . By means of the Neyman-Fisher factorization theorem, we conclude that S is a sufficient statistic, thus ∆(Pm , P ∗ ) = 0. Step 2: Starting from n realizations of X ∗ we want to obtain something close to n independent realizations of Pf , the law of Y1 as in (1). To that aim we define an approximation of f as follows: fˆm (x) = m X Vj (x)θj , j=1 where Vj ’s are piecewise linear functions interpolating the values in the points x∗j as in Figure 1. Figure 1. The definition of the Vj functions. V1 m 0 x∗1 x∗2 Vj m 1 0 x∗j−1 x∗j x∗j+1 Vm m 1 0 x∗m−1 x∗m 1 14 ESTER MARIUCCI In particular, fˆm is a piecewise linear function that   mθ1 I[0,x∗1 ] (x),  ˆ fm (x) = m − m2 |x − x∗i | I[x∗i ,x∗i+1 ] (x)   mθm I[x∗m ,1] (x), We then consider the Markov kernel Z m X I{x∗j } (k) Vj (y)dy, M (k, A) = A j=1 can be written as if i = 1, if i ∈ {2, . . . , m − 1}, if i = m. ∀k ∈ N, ∀A ∈ B([0, 1]). Denoting by P ∗ the law of the random variable X ∗ , we have ∗ M P (A) = X ∗ M (k, A)P(X = k) = m X θi M (x∗i , A) = i=1 k∈N m X θi i=1 Z Vi (y)dy = Z fˆm (y)dy. A A Let P̂m be the statistical model associated with the observation of n i.i.d. random variables (Ŷi )1≤i≤n having fˆm as a density with respect to the Lebesgue measure on [0, 1]. Applying Remark 2.9 we get δ(P ∗ , P̂m ) = 0. Step 3: We are only left to check that δ(P̂m , P1,n ) → 0. This is actually the case and we can show that √  ∆(P1,n , P̂m ) = O n m−3/2 + m−1−γ . Indeed, the total variation distance between the family of probabilities associated with √ the experiments P1,n and P̂m is bounded by nH(f, fˆm ). Since f (x) ≥ ε for all x ∈ [0, 1] one can write: 2 Z 1 f (x) − fˆm (x) q dx H 2 (f, fˆm ) = p 0 f (x) + fˆm (x) Z 1 2 1 ≤ f (x) − fˆm (x) dx. 4ε 0 R1 In order to control the L2 distance between f and fˆm we will split 0 f (x) − 2 fˆm (x) dx as follows: Z 0 1 2 f (x) − fˆm (x) dx = Z 1/2m 0 + Z 1 2 f (x) − mθ1 dx + 1−1/2m Z 1−1/2m 1/2m 2 f (x) − mθm dx. 2 f (x) − fˆm (x) dx+ 2 R An application of the mean theorem gives Ji f (x) − mθi dx = O(m−3 ), i = 1, . . . , m. R 1−1/2m 2 To control the term 1/2m f (x) − fˆm (x) dx, let us consider the Taylor expansion of f at points x∗i , where x denotes a point in Ji , i = 2, . . . , m − 1: (2) f (x) = f (x∗i ) + f ′ (x∗i )(x − x∗i ) + Ri (x). The smoothness condition on f allows us to bound the error Ri as follows: |Ri (x)| = f (x) − f (x∗i ) − f ′ (x∗i )(x − x∗i ) (3) = f ′ (ξi ) − f ′ (x∗i ) |ξi − x∗i | ≤ Km−1−γ , where ξi is a certain point in Ji . By the linear character of fˆm , we can write: ′ fˆm (x) = fˆm (x∗i ) + fˆm (x∗i )(x − x∗i ) LE CAM THEORY ON THE COMPARISON OF STATISTICAL MODELS 15 ′ where fˆm denotes the left or right derivative of fˆm in x∗i depending whether x < x∗i ′ ∗ (x∗i ) = f ′ (χi ) for some χi ∈ Ji ∪ Ji+1 (here, we are or x > xi . Let us observe that fˆm considering right derivatives; for left ones, this would be Ji−1 ∪ Ji ), indeed: ′ fˆm (x∗i ) = −m(fˆm (x∗i ) − fˆm (x∗i+1 )) = −m2 =m 2 Z i m i−1 m Z i m i−1 m  f (s + 1/m) − f (s) ds = m Z f (s)ds − Z i+1 m f (s)ds i m  f ′ (ξs )ds Ji for some ξs ∈ [s, s + 1/m]. Applying the mean theorem to the function g(s) = f ′ (ξs ) R 1 ′ ′ f (t) for some t ∈ Ji ∪ Ji+1 . The fact that fˆm (x∗i ) = f ′ (t), we get that Ji f ′ (ξs )ds = m allows us to exploit the Hölder condition. Indeed, if x ∈ Ji , i = 1, . . . , m, then there exists t ∈ Ji ∪ Ji+1 such that: |f (x) − fˆm (x)| ≤ |f (x∗i ) − fˆm (x∗i )| + |f ′ (x∗i ) − f ′ (t)||x − x∗i | + |Ri (x)| ≤ |f (x∗i ) − fˆm (x∗i )| + K|t − x∗i ||x − x∗i |γ + Km−1−γ ≤ |f (x∗i ) − fˆm (x∗i )| + 3Km−1−γ . R Using (2) and the fact that Ji (x − x∗i )dx = 0, we get: Z  ∗ ∗ ˆ f (xi ) − fm (xi ) = m f (x∗i ) − f (x) dx ≤ Km−1−γ . Ji Collecting all the pieces together we find Z 1  2 f (x) − fˆm (x) dx = O m−3 + m−2γ−2 , 0 hence we can conclude that ∆(P1,n , P̂m ) = O  √ n(m−3/2 + m−1−γ ) . 5.2. Independent Gaussian random variables and Gaussian white noise experiments. In Subsection 5.1 we have seen how to reduce a density estimation problem to an adequate multinomial experiment. An application of the results of Carter (2002) recalled in Example 4.2 allows us to obtain an asymptotic equivalence between the statistical model associated with the observation of n i.i.d. random variables of density f : [0, 1] → R with respect to the Lebesgue measure and an experiment√ in which one observes m = mn Gaussian and independent random variables N ( θi , 1/4n), i = 1, . . . , m. Of course, such a Gaussian experiment is equivalent to Nmq , the stat θi 1 istical model associated with independent Gaussian random variables N m , 4nm , i = 1, . . . , m. We claim that Nm is asymptotically equivalent to the white noise model P2,n associated with the continuous observation of a trajectory of a Gaussian process (yt )t∈[0,1] solution of the SDE: (4) dyt = p 1 f (t)dt + √ dWt , 2 n t ∈ [0, 1], where (Wt )t is a standard Brownian motion. We will divide the proof in two steps. Denote by Nm∗ the statistical model associated with the observation of (yt )t over the ∗ intervals Ji , i = 1, . . . , m, i.e. N associated with m independent  R mpis the experiment 1 , i = 1, . . . , m. Firstly, we will show Gaussian random variables N Ji f (s)ds, 4nm that Nm is asymptotically equivalent to Nm∗ , then that observing (yt )t is asymptotically equivalent to observing its increments. 16 ESTER MARIUCCI Step 1: By means of Property 3.5 we get v r 2 u m Z p uX √ θi ∗ t f (t)dt − ∆(Nm , Nm ) ≤ 2mn m Ji i=1 v um  Z 2 p p √ uX  1 t m = 2n f (t) − mθi dt m Ji i=1  R p √ f (t) − mθi dt|. By the triangular inequality, we bound Denote by Ei = |m Ji Ei by Fi + Gi where: Z p q q p and Gi = Fi = mθi − f (x∗i ) f (x∗i ) − m f (y)dy . Ji Using the same trick as in Step 3 of Subsection 5.1, we can bound: Z  |mθi − f (x∗i )| m 1 |mθi − f (x∗i )| ∗ √ √ p ≤ = f (s) − f (x ) ds = √ kRi k∞ , Fi = √ i 2 ε 2 ε Ji 2 ε mθi + f (x∗i ) R where we have used the fact that Ji (x − x∗i ) = 0 and Ri denotes the remainder in the Taylor expansion of f in x∗i , as in (2). On the other hand, Z q p  Gi = m f (x∗i ) − f (y) dy Jj  f ′ (x∗i ) ∗ p (x − xi ) + R̃i (y) dy ≤ kR̃i k∞ , =m 2 f (x∗i ) Ji √ ∗ where R̃i is the remainder in the Taylor expansion √ of f in xi . We observe that if f belongs to the functional class F(γ,K,ε,M) then f is still bounded away from zero and √ from infinity with a Hölder continuous derivative, more precisely f ∈ F(γ,K/√ε,√ε,√M) . q In particular, we deduce that kR̃i k∞ has the same magnitude as M ε kRi k∞ . Thanks to Z  (3) we know that kRi k∞ ≤ Km−1−γ for any i = 2, . . . , m − 1 and kRi k∞ = O(m−3/2 ) for i ∈ {1, m}. Hence the quantities Fi and Gi are of the same order and we find that √ 3  ∆(Nm , Nm∗ ) = O n m−1−γ + m− 2 . Step 2: Since Nm∗ is the model associated with the observation of the increments (Ȳi )1≤i≤n of the process (yt )t defined as in (4) it is clear that δ(P2,n , Nm∗ ) = 0. Let us now discuss how to bound δ(Nm∗ , P2,n ). We start by introducing a new stochastic process: Z t m m X 1 X Ȳi Vi (y)dy + √ yt∗ = Bi (t), t ∈ [0, 1], 2 nm i=1 0 i=1 where the functions Vi are defined as in Figure 1 and Bi (t) are independent centered Gaussian processes independent of (Wt ) and with variances Z t 2 Z t Var(Bi (t)) = Vi (y)dy − Vi (y)dy . 0 0 These processes can be constructed from a standard Brownian bridge B(t), independent of (Wt ), via Z t  Bi (t) = B Vi (y)dy . 0 REFERENCES 17 By construction, (yt∗ ) is a Gaussian process with mean and variance given by, respectively: Z t Z t m Z p m X X ∗ E[Ȳi ] Vi (y)dy = E[yt ] = f (y)dy Vi (y)dy, Var[yt∗ ] = i=1 m X 0 Var[Ȳi ] i=1 = 1 4nm Z Z tX m i=1 2 t Vi (y)dy 0 Vi (y)dy = 0 i=1 Ji + t . 4n 1 4nm 0 m X Var(Bi (t)) i=1 One can compute in the same way the covariance of (yt∗ ) and deduce that Z tp Z t 1 d ∗ √ dWs∗ , t ∈ [0, 1], Yt = f m (y)dy + 2 n 0 0 where (Wt∗ ) is a standard Brownian motion and  m Z p X p d f m (x) := f (y)dy Vi (x). i=1 Ji Applying Fact 3.5, we get that the total variation distance between the process (yt∗ )t∈[0,1] constructed from the random variables Ȳi , i = 1, . . . , m and the Gaussian process (yt )t∈[0,1] is bounded by s Z 1 p p 2 d 4n f m (y) − f (y) dy. 0 √ Since f ∈ F(γ,K,ε,M) implies f ∈ F(γ,K √M/√ε,√ε,√M ) , the same kind of computations made in Step 3 of Subsection 5.1 allows us to conclude that  √ ∆(Nm∗ , P2,n ) = δ(Nm∗ , P2,n ) = O n m−3/2 + m−1−γ . 5.3. The choice of m. In Subsection 5.1 we have proven that the cost needed to pass from the model associated to the observation of n i.i.d. random variables with unknown density f ∈ F(γ,K,ε,M) to an adequate multinomial approximation M(n; θ1 , . . . , θm )  √ is of the order of n m−3/2 + m−1−γ . Using Theorem 4.3 we can take a further step obtaining a Gaussian approximation (with independent coordinates) starting from the multinomial one. This comes to the price of m√lnnm . Finally, in Subsection 5.2 we have found that for appropriate choices of m there is an asymptotic equivalence between such a Gaussian approximation and the Gaussian with noise model P2,n . A bound for the rate of convergence of the ∆-distance up to constants is, again, given by √ n m−3/2 + m−1−γ . In particular we deduce that  (  γ O n− 2(γ+2) log n , if 0 < γ ≤ 21 , ∆(P1,n , P2,n ) = 1 if 12 < γ ≤ 1. 0(n− 10 log n) after the choice m = n1/(2+γ) . References Bahadur, R. R. (1954). ‘Sufficiency and statistical decision functions’. In: Ann. Math. Statistics 25, pp. 423–462. Blackwell, D. (1951). ‘Comparison of experiments’. In: Proceedings of the Second Berkeley Symposium on Mathematical Statistics and Probability, 1950. Berkeley and Los Angeles: University of California Press, pp. 93–102. 18 REFERENCES Blackwell, D. (1953). ‘Equivalent comparisons of experiments’. In: Ann. Math. Statistics 24, pp. 265–272. Bohnenblust, A., L. Shapley and S. Sherman (1949). ‘Reconnaissance in game theory’. In: Rand Research Memorandum 1949/208. Brown, L. D. and M. G. Low (1996). ‘Asymptotic equivalence of nonparametric regression and white noise’. In: Ann. Statist. 24.6, pp. 2384–2398. Brown, L. D. and C.-H. Zhang (1998). ‘Asymptotic nonequivalence of nonparametric experiments when the smoothness index is 1/2’. In: Ann. Statist. 26.1, pp. 279–287. Brown, L. D., T. T. Cai, M. G. Low and C.-H. Zhang (2002). ‘Asymptotic equivalence theory for nonparametric regression with random design’. In: Ann. Statist. 30.3. Dedicated to the memory of Lucien Le Cam, pp. 688–707. Brown, L. D., A. V. Carter, M. G. Low and C.-H. Zhang (2004). ‘Equivalence theory for density estimation, Poisson processes and Gaussian white noise with drift’. In: Ann. Statist. 32.5, pp. 2074–2097. Buchmann, B. and G. Müller (2012). ‘Limit experiments of GARCH’. In: Bernoulli 18.1, pp. 64–99. Buscemi, F. (2012). ‘Comparison of quantum statistical models: equivalent conditions for sufficiency’. In: Comm. Math. Phys. 310.3, pp. 625–647. Carter, A. V. (2002). ‘Deficiency distance between multinomial and multivariate normal experiments’. In: Ann. Statist. 30.3. Dedicated to the memory of Lucien Le Cam, pp. 708–730. – (2006). ‘A continuous Gaussian approximation to a nonparametric regression in two dimensions’. In: Bernoulli 12.1, pp. 143–156. – (2007). ‘Asymptotic approximation of nonparametric regression experiments with unknown variances’. In: Ann. Statist. 35.4, pp. 1644–1673. – (2009). ‘Asymptotically sufficient statistics in nonparametric regression experiments with correlated noise’. In: J. Probab. Stat. Art. ID 275308, 19. Dalalyan, A. and M. Reiß (2006). ‘Asymptotic statistical equivalence for scalar ergodic diffusions’. In: Probab. Theory Related Fields 134.2, pp. 248–282. – (2007). ‘Asymptotic statistical equivalence for ergodic diffusions: the multidimensional case’. In: Probab. Theory Related Fields 137.1-2, pp. 25–47. Delattre, S. and M. Hoffmann (2002). ‘Asymptotic equivalence for a null recurrent diffusion’. In: Bernoulli 8.2, pp. 139–174. Efromovich, S. and A. Samarov (1996). ‘Asymptotic equivalence of nonparametric regression and white noise model has its limits’. In: Statist. Probab. Lett. 28.2, pp. 143– 145. Genon-Catalot, V. and C. Laredo (2014). ‘Asymptotic equivalence of nonparametric diffusion and Euler scheme experiments’. In: The Annals of Statistics 42.3, pp. 1145– 1165. Genon-Catalot, V., C. Laredo and M. Nussbaum (2002). ‘Asymptotic equivalence of estimating a Poisson intensity and a positive diffusion drift’. In: Ann. Statist. 30.3. Dedicated to the memory of Lucien Le Cam, pp. 731–753. Golubev, G. K., M. Nussbaum and H. H. Zhou (2010). ‘Asymptotic equivalence of spectral density estimation and Gaussian white noise’. In: Ann. Statist. 38.1, pp. 181– 214. Grama, I. and M. Nussbaum (1998). ‘Asymptotic equivalence for nonparametric generalized linear models’. In: Probab. Theory Related Fields 111.2, pp. 167–214. – (2002). ‘Asymptotic equivalence for nonparametric regression’. In: Math. Methods Statist. 11.1, pp. 1–36. Grama, I. G. and M. H. Neumann (2006). ‘Asymptotic equivalence of nonparametric autoregression and nonparametric regression’. In: Ann. Statist. 34.4, pp. 1701–1732. REFERENCES 19 Halmos, P. R. and L. J. Savage (1949). ‘Application of the Radon-Nikodym theorem to the theory of sufficient statistics’. In: Ann. Math. Statistics 20, pp. 225–241. Hansen, O. H. and E. N. Torgersen (1974). ‘Comparison of linear normal experiments’. In: The Annals of Statistics, pp. 367–373. Jähnisch, M. and M. Nussbaum (2003). ‘Asymptotic equivalence for a model of independent non identically distributed observations’. In: Statist. Decisions 21.3, pp. 197– 218. Le Cam, L. (1964). ‘Sufficiency and approximate sufficiency’. In: Ann. Math. Statist. 35, pp. 1419–1455. Le Cam, L. (1969). Théorie asymptotique de la décision statistique. Séminaire de Mathématiques Supérieures, No 33 (Été, 1968). Les Presses de l’Université de Montréal, Montreal, Que., p. 140. Le Cam, L. (1974). ‘On the information contained in additional observations’. In: Ann. Statist. 2, pp. 630–649. Le Cam, L. (1986). Asymptotic methods in statistical decision theory. Springer Series in Statistics. New York: Springer-Verlag, pp. xxvi+742. Le Cam, L. and G. L. Yang (2000). Asymptotics in statistics. Second. Springer Series in Statistics. Some basic concepts. New York: Springer-Verlag, pp. xiv+285. Mariucci, E. (2015). ‘Asymptotic equivalence for inhomogeneous jump diffusion processes and white noise’. In: ESAIM Probab. Stat. 19, pp. 560–577. – (2016a). ‘Asymptotic equivalence for pure jump Lévy processes with unknown Lévy density and Gaussian white noise’. In: Stochastic Process. Appl. 126.2, pp. 503–541. – (2016b). ‘Asymptotic equivalence of discretely observed diffusion processes and their Euler scheme: small variance case’. In: Stat. Inference Stoch. Process. 19.1, pp. 71–91. – (To appear). ‘Asymptotic equivalence for density estimation and Gaussian white noise: an extension’. In: Annales de l’ISUP. ArXiv:1503.05019. Meister, A. (2011). ‘Asymptotic equivalence of functional linear regression and a white noise inverse problem’. In: Ann. Statist. 39.3, pp. 1471–1495. Meister, A. and M. Reiß (2013). ‘Asymptotic equivalence for nonparametric regression with non-regular errors’. In: Probab. Theory Related Fields 155.1-2, pp. 201–229. Milstein, G. and M. Nussbaum (1998). ‘Diffusion approximation for nonparametric autoregression’. In: Probab. Theory Related Fields 112.4, pp. 535–543. Nussbaum, M. (1996). ‘Asymptotic equivalence of density estimation and Gaussian white noise’. In: Ann. Statist. 24.6, pp. 2399–2430. Reiß, M. (2008). ‘Asymptotic equivalence for nonparametric regression with multivariate and random design’. In: Ann. Statist. 36.4, pp. 1957–1982. – (2011). ‘Asymptotic equivalence for inference on the volatility from noisy observations’. In: Ann. Statist. 39.2, pp. 772–802. Rohde, A. (2004). ‘On the asymptotic equivalence and rate of convergence of nonparametric regression and Gaussian white noise’. In: Statist. Decisions 22.3, pp. 235–243. Schmidt-Hieber, J. (2014). ‘Asymptotic equivalence for regression under fractional noise’. In: The Annals of Statistics 42.6, pp. 2557–2585. Shiryaev, A. N. and V. G. Spokoiny (2000). Statistical experiments and decisions. Vol. 8. Advanced Series on Statistical Science & Applied Probability. Asymptotic theory. River Edge, NJ: World Scientific Publishing Co. Inc., pp. xvi+281. Strasser, H. (1985). Mathematical theory of statistics. Vol. 7. de Gruyter Studies in Mathematics. Statistical experiments and asymptotic decision theory. Berlin: Walter de Gruyter & Co., pp. xii+492. Torgersen, E. N. (1972). ‘Comparison of translation experiments’. In: The Annals of Mathematical Statistics 43.5, pp. 1383–1399. – (1974). ‘Comparison of experiments by factorization’. In: Stat.Res.Report, Univ. of Oslo. 20 REFERENCES van der Vaart, A. (2002). ‘The statistical work of Lucien Le Cam’. In: Ann. Statist. 30.3. Dedicated to the memory of Lucien Le Cam, pp. 631–682. Wang, Y. (2002). ‘Asymptotic nonequivalence of Garch models and diffusions’. In: Ann. Statist. 30.3. Dedicated to the memory of Lucien Le Cam, pp. 754–783. Zolotarev, V. M. (1983). ‘Probability metrics’. In: Teoriya Veroyatnostei i ee Primeneniya 28.2, pp. 264–287. Leiden University. E-mail address: [email protected]
10math.ST
An Adaptive Algorithm for Precise Pupil Boundary Detection using Entropy of Contour GradientsI Cihan Topala , Halil Ibrahim Cakirb , Cuneyt Akinlarb a Department of Electrical and Electronics Engineering, Anadolu University, 26470 Eskisehir, Turkey of Computer Engineering, Anadolu University, 26470 Eskisehir, Turkey,II arXiv:1709.06366v1 [cs.CV] 19 Sep 2017 b Department Abstract Eye tracking spreads through a vast area of applications from ophthalmology, assistive technologies to gaming and virtual reality. Detection of pupil is the most critical step in many of these tasks hence needs to be performed accurately. Although detection of pupil is a smooth task in clear sight, possible occlusions and odd viewpoints complicate the problem. We present an adaptive pupil boundary detection method that is able to infer whether entire pupil is in clearly visible by a modal heuristic. Thus, a faster detection is performed with the assumption of no occlusions. If the heuristic fails, a deeper search among extracted image features is executed to maintain accuracy. Furthermore, the algorithm can find out if there is no pupil as an aidful information for many applications. We prepare a dataset containing 1509 high resolution eye images collected from five subjects and perform an extensive set of experiments to obtain quantitative results in terms of accuracy, localization and timing. The proposed method outperforms three other state of the art algorithms and can run up to 140 Hz in single-thread on a standard laptop computer. Keywords: Pupil detection, eye tracking, elliptical arc detection, ellipse detection, gaze estimation, shape recognition. 1. Introduction Eye tracking (ET) has emerged as an important research area with a diverse set of applications including human computer interaction, diagnosis of psychological, neurological and ophthalmologic individuals, assistive systems for drivers and disabled people, marketing research, and biometrics. In addition, there are efforts to integrate ET technology in virtual reality (VR) studies to increase the feeling of immersion via rendering virtual environment with a depth of field effect similar to human vision. Pupil boundary detection and center estimation is an essential step in all eye tracking systems and I This work is supported by The Scientific and Technological Research Council of Turkey (TUBITAK) and Anadolu University Commission of Scientific Research Projects (BAP) under the grant numbers 111E053 and 1207F113, respectively. II Cuneyt Akinlar was with Department of Computer Engineering, Anadolu University during the time of this study. Email addresses: [email protected] (Cihan Topal), [email protected] (Halil Ibrahim Cakir), [email protected] (Cuneyt Akinlar) Preprint submitted to Elsevier has to be performed precisely. In point-of -gaze (PoG) detection, the extraction of pupil center is required to estimate the location of gaze. In such applications, even loss of a single pixel precision in pupil center may cause an error of a few degrees in the gaze direction vector, which would result in a significant drift in the estimated gaze point. Pupil boundary detection is a more difficult problem which has to be performed accurately for biometric applications and medical studies. Another emerging application area of eye tracking is virtual reality (VR) technologies which recently have a significant leap in popularity. VR technology renders a 3D scene from two different point of views, ie. from the views of left and right eyes of a user. To prevent problems like motions sickness, these rendering 3D locations should match the interpupillary distance of the user. Moreover, developers integrate eye tracking into VR systems to better simulate the human visual system. They render locations where the user focuses sharper and blur other regions to boost immersion effect and enhance the VR experience. September 20, 2017 In this study, we propose a novel adaptive pupil boundary detection method from eye images, which works by extracting arcs from the edge segments of the image and joining them to find the pupil boundary, hence the center. Organization of the paper is as follows; we give a comprehensive related work on pupil boundary and center detection in section 2, we explain our method with fine detail in section 3, analysis of the method in terms of accuracy (F-measure), localization and running time are presented in section 4, and we finalize the paper with concluding remarks. boundaries aiming to maximize the contour integral value on the smoothed image derivative (Eq. 1). max(r,x0 ,y0 ) Gσ (r) ∗ ∂ ∂r I (r,x0 ,y0 ) I(x, y) ds 2πr (1) Arvacheh and Tizhoosh [16] developed an iterative algorithm based on an active counter model which is also capable of detecting near-circular shapes. These methods work fine; however, they require a full search of the image plane in order to find r, x0 , y0 parameters that maximize the response to the given model. Model-based search approach is computationally expensive and therefore, cannot be employed in real-time eye tracking applications. In [17] authors use curvature of pupil contour to sort out boundary pixels which belong to prospective occlusions. They detect blobs in the binarized image and extract contour of the biggest blob. Finally, edge pixels of the pupil boundary are selected by employing a set of heuristics (e.g. eyelids have positive curvature, etc.) and ellipse fit applied to chosen pixels. Another interesting approach on pupil detection is proposed and utilized in EyeSeeCam project [18]. The algorithm extracts edge segments, then removes glints and other unfavourable artefacts by a sequence of morphological operations based on several assumptions. Finally, Delaunay Triangulation is applied to remaining pixels and pupil boundary is detected assuming it is a convex hull. Starburst algorithm [19] estimates the pupil center by an iterative radial feature detection technique instead of finding all edges. It starts by locating and removing glints if any exists. Then, rays are cast from an initial point within a 20◦ of radial step. Each ray stops where image derivative is greater than a threshold value, i.e., when a sharp intensity change occurs. This operation is iterated with an updated starting point and a set of feature points are collected at each step. Finally, ellipse fit is applied to the collected points with RANSAC [11]. In another study, authors aim to adapt the Starburst algorithm to elliptical iris segmentation problem [20]. In [21], Świrski et al. approximately detects pupil region by a Haar-like feature [23, 11]. Secondly, they apply a k -means segmentation to determine a proper pupil threshold. Then a modified RANSAC-based ellipse fitting method is employed which utilizes gradient information as well as the 2. Related Work The literature on pupil detection is very rich, and many different techniques have been proposed. In this section, our goal is to give a high-level picture of the proposed solutions for pupil boundary detection and/or pupil center estimation. Many early methods in the literature utilize discriminative visual structure of human eye to detect the pupil. Dark intensity of pupil region and its high contrast between bright sclera region offers a relatively easy way to solve the problem. In this manner, many algorithms extracts pupil (or iris in some studies) center with combinations of several methods like thresholding, morphological operations, connected component analysis and center of mass algorithms with various additional steps [1, 2, 3, 4, 5]. In addition, there are methods which also benefit model fitting approaches to find pupil or iris boundary as a circle or ellipse [6, 7, 8, 9]. In these studies, edge and contour extraction is employed and followed by Hough transform or RANSAC algorithm to accurately estimate the boundary [10, 11]. Dark/bright pupil differencing is another approach to roughly detect eye locations in a remotely taken image [12, 13, 14]. It works by differencing two successive frames that captured with on-axis and off-axis illumination, respectively. Due to the physical structure of human eye, on-axis illumination causes a significant brightness inside the pupil. Therefore, pupil regions become more salient in the difference image. Along with the feature-based methods, there are also purely model-based approaches which are mostly utilized in iris recognition studies in the literature. Daugman [15] proposes an integrodifferential operator for detecting the pupil and iris 2 Lin et al. [5] • Wang and Sun [6] Ma et al. [7] Dey and Samanta [8] • • 4 , ∅ • • • • • • vertical ellipse • Hough • for edges • 1 ellipse • • • Hiley et al. [13] • • iterative • Morimoto et al. [14] • • • • • Fuhl et al [22] • ∅ ∅ 2 ellipse ,3 for edges radial ellipse 4 • • iterative ,5 • • ellipse 6 Li et al. [19] k-means ∅ • • Świrski et al. [21] , ∅ circle • Kumar et al. [18] 1 4 Ebisawa [12] Zhu et al. [17] , ∅, parallelogram • ∅ symmetric for glint adaptive Agustin et al. [9] modified Other / Comments • Use of Temporal Information Keil et al. [4] • Center of Mass Algorithm • • Circle / Ellipse Fitting • Long et al. [3] Blob Detection/ Connected Comp. Analysis Mäenpää [2] Gõni et al. [1] Edge Detection Morphological Operations • Bright/Dark Pupil Differencing adaptive Algorithms Downsampling Image Thresholding / Binarization Table 1: A brief taxonomy for pupil boundary detection / center estimation algorithms. ∅ does not detect the pupil boundary, only estimates its center. 4 performs iris detection.  performs ROI detection. 1 applies histogram back-projection or non-linear power transform on the image to make the pupil more salient. 2 before ellipse fitting, tries to determine the false pupil contour pixels w.r.t. their curvature values by a set of heuristics. 4 requires removal of glints. Assumes that the initial point for ray casting is inside the pupil. Iterative algorithm. 3 performs Fast Radial Symmetry detection and Delaunay Triangulation. Removes glints and artefacts by a set of morphological assumptions. tries to find an ellipse that matches the edge image points and is orthogonal to the gradients of the image. 5 6 detects and filter edges. Uses two different approaches, i.e. algorithmic and morphological. Rescales image if it fails in the first attempt. spatial coordinates to find the pupil boundary. In a more recent study Fuhl et al. detect edges on the eye image and filter them with respect to several morphological criteria [22]. Later, edge segments are constructed from the remaining edge pixels and some of the edge segments (i.e. straight lines) are eliminated by various heuristics. Finally remaining contours evaluated by ellipse fitting and the best ellipse is selected by a cost function which utilize inner gray value and the roundest shape. Table 1 gives a brief taxonomy of the abovementioned pupil detection algorithms. As seen in the table, thresholding is a common technique in the literature. Despite thresholding can quickly discriminate image regions having different intensity values, it is highly vulnerable to lighting conditions and parameter configuration. Consequently, it fails on finding the exact location where intensity change occurs and can easily causes a decrease on the ac- curacy. Another frequently employed technique is morphological operations which are applied on the thresholded binary image to suppress remaining undesired pixel sets and improve modal structure of the image. However, morphological operations may also degrade the actual information on the image and cause significant errors on the result. Similarly, algorithms that utilize thresholding and blob detection to find a center point for pupil are obviously not capable of detecting the boundary. Hence, they cannot be applied on most biometrics or medical studies which requires precise detection of the boundaries of pupil and iris. Downsampling the image to save computational time has an obvious cost as it decreases the accuracy by wasting spatial resolution. Bright/dark pupil differencing requires a little amount of computation and eases roughly locating the pupil, however it has important drawbacks. First, it needs addi3 Near-circular segment YES Input Frame ROI Detection Edge Segment Detection Near-circular Segment Search Corner Detection ? Near-Circular Segment NO Ellipse Fitting Pupil Candidate Generation Pupil Detection Elliptical Arc All segments Extraction Figure 1: Processing pipeline of the proposed algorithm. in the image as a very aidful information for many applications. The proposed method has a simple flow and consists of the processing pipeline shown in Fig. 1. The processing starts by detection of region of interest (ROI) by convolving eye image with a Haar-like feature. Then, we extract edge segments each of which is a contiguous array of pixels. The next step is to determine whether a near-circular segment exists that traces the entire boundary of the pupil. Such an edge segment would be found if the pupil is clearly visible with no or very little occlusion. To find whether an edge segment has a circular geometry, we devise a fast heuristic method which utilizes gradient distribution of an edge segments. On the condition that a near-circular segment is found, we extract elliptical arcs from only that segment. If no near-circular segment is found, which would be the case if the pupil is severely occluded by the eyelids or eyelashes, then arcs from all edge segments in the ROI are extracted. Following the extraction of the elliptical arcs, we join them in every possible combination to generate a set of ellipse candidates that at least one of them traces the pupil boundary. Candidates are finally evaluated for their relevance to be the actual pupil contour and the best one, if it exists, is chosen among the candidate ellipses. In the following subsections we elaborate each step of the proposed algorithm in fine detail to make the discussion clear. tional hardware to obtain bright and dark pupil images consecutively in a synchronous manner. Furthermore, it reduces temporal resolution since it needs two frames to perform a single detection. Due to the same reason it is very sensitive to motion and it fails if a large pupil displacement occurs between two consecutive images. Ebisawa specifically addresses this problem in [24], and proposes various methods for positional compensation. In this section we presented an overview of related studies covering both biometrics and eye tracking areas from the viewpoint of pupil detection problem. For interested readers, there are also comprehensive surveys that review the gaze estimation literature; in particular [25, 26]. 3. Proposed Method In this study, we propose an adaptive method for pupil boundary detection which is able to save computation by inferring whether an occlusion is the case or not. In this manner, the computation takes very little time if the pupil is in clear sight by the camera. On the contrary, algorithm infers if the pupil is severely occluded, and spends more effort to detect the pupil without compromising real-time applicability. The main strategy which improves the algorithm against occlusions is extracting the elliptical arcs from input image and finding one arc or a group of arcs representing the pupil contour. In this way, relevant features from a partially visible pupil can be extracted and detection can be performed by fusion of separate features. Besides detecting the pupil boundary and center precisely, the algorithm can also identify if there is no pupil 3.1. ROI Estimation In the first step of the proposed method we roughly estimate the pupil area in the entire eye image. For this purpose, we utilize pupil’s geomet4 3R factor: 3x = * 5R (a) external r = 4x internal r = 3x Figure 3: Sample eye image in which detected ROI is indicated (left), edge segments obtained by EDPF algorithm within the ROI are indicated in different colors (right). (b) edge localization. ED outputs not only a binary edge map similar to those output by conventional edge detectors, but it also outputs the result as a set of edge segments each of which is a contiguous and connected pixel chain [29]. This property of ED extremely eases the application of the algorithm to further detection and recognition problems. Similar to other edge detectors, ED has several parameters that must be tuned by the user for different tasks. Ideally, one would want to have an edge detector which runs with a fixed set of parameters for any type of image. To achieve this goal, we have incorporated ED with the a contrario edge validation mechanism due to the Helmholtz principle [30, 31], and obtained a fast parameter-free edge segment detector, i.e. EDPF2 [32]. EDPF works by running ED with all ED’s parameters at their extremes, which detects all possible edge segments in a given image with many false positives. It then validates the extracted edge segments by the Helmholtz principle, which eliminates false detections leaving only perceptually meaningful segments with respect to the a contrario approach with very little overhead of computation. Fig. 3 illustrates detected edge segments for an example eye image. In the figure, each color represents a different edge segment, which is one-pixel width, contiguous array of pixels. Figure 2: (a) ROI detection by means of a convolution operation with a Haar-like feature. (b) Detected ROIs of two eye images having different size of pupils. ric and intensity attributes in a similar vein as the method [21]. A pupil can be described as a dark and compact blob since it consists of darker intensity levels than its surrounding iris, and it has usually a low-eccentric elliptical shape. To locate pupil region we convolve input image with a Haar-like feature and find the maximum response on the image as shown in Fig. 2(a) [23]. Pupil size can vary in real life due to the reasons like physiological differences and pupil dilation in light changes. For this reason, the Haar-like feature kernel is applied in various aperture sizes and the maximum response per unit is picked at the end. In Fig. 2(b) results of ROI estimation process for two eye images from two individuals having different pupil sizes are presented. 3.2. Edge Segment Detection To detect all edge segments inside the ROI, we employ Edge Drawing (ED) edge segment detector1 [27, 28]. Unlike traditional edge detectors which work by identifying a set of potential edge pixels in an image and eliminating non-edge pixels through operations such as morphological operations, non-maximal suppression, hysteresis thresholding etc., ED follows a proactive approach. The ED algorithm works by first identifying a set of points in the image, called the anchors, and then joins these anchors in a way which maximizes the gradient response of edge paths, hence ensures good 1 Online: 3.3. Near-Circular Segment Search The main goal of this step is detecting the pupil in an easy and computation efficient way when its circumference is entirely visible in case of no occlusion. Once we have the edge segments detected, we need to find the one that traverses the pupil 2 Demo http://c-viz.anadolu.edu.tr/EdgeDrawing 5 page: http://c-viz.anadolu.edu.tr/EDPF |G| Gy a few values dominate. Thus, we can distinguish edge segments in circular shapes by picking the ones which result in plain gradient distribution. To achieve this, we use the entropy function (Eq. 2) on the quantized gradient distributions of the segments. n X E=− pi . log(pi ) (2) y 67.5° α 45° Gx 22.5° 0° Gradient operator x -22.5° G α = tan −1  y  Gx (a)    -90° i -45° -67.5° Since entropy function maximizes for flat distributions where the frequency of each symbol is equal, we compute the entropy of gradient distribution for each separate edge segments as follows: (b) Figure 4: (a) Gradient computation with image derivatives, (b) Quantization of computed gradient directions. arg max 8 X fGi . log(fGi ) (3) i boundary. The most intuitive solution is to apply a brute force search as follows: fit an ellipse to each edge segment, compute the fitting error, and pick the edge segment that has the smallest fitting error. This method might work only when the pupil is clearly visible, i.e., when it is not occluded by IR-LED glints or eyelashes, however, fitting an ellipse and calculating fitting error for each segment requires too much computation. To reduce this computational burden, we devise a faster method based on the analysis of gradient directions to find the near-circular segment, if one exists. Gradients of the segments contain substantial information about the geometrical structure and is used in shape matching, retrieval and recognition problems [33, 34]. Since we already have the vertical and horizontal derivatives of eye image computed during the edge detection scheme, we can find the gradient directions by very little amount of computation (see Fig. 4.a). The arctan function obviously results angle values in an interval [−π/2, π/2], providing an angle range of 180◦ . Before examining the distribution of gradients, we quantize the angles with 22.5◦ to obtain discrete symbols, thus we divide the unit circle into 16 regions into 8 different directions (see Fig. 4.b). Once we get quantized gradient directions for all pixels in a segment, we infer the modal characteristics of that segment by analyzing their gradient distributions. It is easy to observe that any segment in near-circular form would have an even gradient distribution if the tangential gradients on its perimeter is sampled with a fixed angular step. Intuitively, circular edge segments would have relatively uniform gradient distribution; whereas, straight edge segments have an unbalanced distribution where where fGi is the frequency of the ith gradient direction. The entropy values for edge segments are maximized for a perfect circle and gets lower as the segment shape differs from being a circle (elliptic, etc.), and finally entropy becomes zero for straight lines since a straight line has only one gradient direction along its trajectory. Since we quantize the unit circle into 8 direction (see Fig. 4.b), the number of different symbols is 8 and the maximum entropy value is log2 8 = 3 in our case. Fig. 5 shows edge segments of an input eye image and gradient distributions, lengths and entropy values for 10 sample segments. It is easy to observe that circular edge segments have higher gradient entropy values regardless their size, whereas straight edge segments have lower values as expected. With this heuristic, we can discard the segments producing small entropy values than a certain threshold in an extremely fast manner. When examining speed of this method, we measure that computing the gradient entropy of an edge segment with available image derivatives is faster than ellipse fitting and error computation up to 200 times. In this way, we avoid spending computation time on the segments which have irrelevant geometries than ellipticals. Following the computation of gradient entropies of edge segments, one segment is chosen to be the near-circular segment to extract elliptical arcs if it satisfies the following three criteria: i) must have a high gradient entropy. The theoretical entropy upper-bound for 8 different gradient directions is log2 8 = 3. Accordingly, we choose the segments which have 2.9 or more gradient entropy. 6 due to the small occlusions such as glints, we consider a 15 pixels threshold for the distance between the start and end points of the segment. Edge Segment Gradient Distr. Length Entropy 512 2.96 348 0.95 186 1.35 246 2.89 314 2.86 88 2.03 63 2.82 71 2.61 73 1.38 86 1.04 Along with the second criterion, ellipse fitting is an essential tool employed in various steps of the proposed method. Through a crowd literature, there are two renowned ellipse fitting methods which are known to be fast and robust [35], [36]. Among these two algorithms, Taubin’s method [35] results a better ellipse contour with slightly lower error, however, it does not guarantee that the resulted conic is an ellipse, rather it can return a hyperbola as well. In addition, Fitzgibbon’s method [36] always ensures that the resulted conic is an ellipse, but it tends to extract more eccentric ellipses with higher fitting errors. To benefit advantages of both methods, we follow a simple Taubin-prior procedure as the following. First, we use Taubin’s method and examine the coefficients of resulted conic to understand whether its an ellipse or hyperbola. If it turns out that we get a hyperbola, then we use Fitzgibbon’s method and get an ellipse. Due to the fact that we apply ellipse fit to consecutive edge elements rather than scattered pixel data, we usually end up with a valid ellipse with Taubin’s method. In both ellipse fitting methods, we need to compute a fitting error to quantitatively evaluate the success. For this purpose, there is no straightforward method in the literature except numerical approximations [37]. Since inaccurate approximations easily cause misjudgements of elliptical features, we developed a more quantitative fitting error computation method based on [38]. We estimate the distance between the ellipse and each point by solving the equations described in [38] with NewtonRaphson method in a couple of iterations. Once we estimate all distance values between each point and the ellipse, we calculate the normalized rms distance to obtain a single scalar to represent the fitting error. For ellipse perimeter calculation, which also does not have an exact solution, hence we employ Ramanujan’s second approximation [39]. In the event that more than one edge segment satisfies all three conditions given above, the one having the minimum ellipse fitting error is chosen to be the near-circular segment. While existence of a near-circular segment speeds up the computation, its not compulsory for the detection of pupil. It is important to note that shape of a segment Figure 5: Two sample eye ROI with and without occlusion and detected edge segments (top), List of gradient distributions, lengths ans entropy value of several edge segments selected from above sample images (bottom). ii) must have a small ellipse fitting error, e.g., 2 pixels, when an ellipse is fit to the pixels which form the segment. iii) must be a closed segment. To avoid problems 7 Figure 6: ROI detection, arc extraction, pupil candidate generation and pupil detection steps. The first two rows consist of examples where the pupil is completely in clear sight; there are examples with occlusions in the rows 2-to-5, and there is no pupil in the last one. (a) Input image with detected ROI, (b) Detected edge segments within the ROI. Near-circular segment is indicated in red, if exists. High entropy segments which are subjected to arc extraction if a near-circular segment could be found indicated in green. Short and low gradient entropy segments which are not omitted indicated in blue. (c) Detected corners (green boxes) and ellipses which are fit to pixels lying in between two consecutive corners. Only successful (i.e. having low fitting error) ellipses are indicated. (d) Extracted elliptical arcs. (e) 2n − 1 pupil candidates are generated by joining all possible arc combinations, (f) the selected ellipse representing the pupil contour using the argument in Eq. 5 (Best viewed in color) does not necessarily have to be near-circular to give high entropy values. In addition to segments with near-circular geometry, gradient distributions of segments which have concave shapes or follow complex trajectories can also end up with high entropy values. Therefore, we use entropy test as a prerequisite to accelerate the algorithm and make final decision about a segment by ellipse fitting. then all segments which have high gradient entropy (i.e., > 2) are subjected to arc extraction process. In this manner, the algorithm adapts itself and requires less computation when there is no occlusions and pupil contour is entirely visible. Due to the fact that their straight geometry rarely contains elliptical arcs, we omit segments having low gradient entropy and short segments (i.e., < 25 pixels) to save further computation time. In a previous work, we extract circular arcs by combining consecutive line segments to detect circles in an image3 [27]. However, pupil’s projection onto the camera plane can be more elliptic, hence we need to detect the elliptical arcs in this study. 3.4. Elliptical Arc Extraction The next step of the algorithm is extracting the elliptical arcs (which will be referred to as arc hereafter) from edge segments obtained in the previous step. If a near-circular segment could be found at the previous step, arcs are extracted only from that segment. If no near-circular segment is found, 3 Demo 8 page: http://c-viz.anadolu.edu.tr/EDCircles Cost Function vs. Frames 1000 Cost Function Threshold 100 10 1 0.1 0.01 Figure 8: Images of apparatus that we collect database video sequences. Figure 7: Output of our cost function for a set of example frames. It is seen that the result of cost function increases proportional to the pupil occlusion. If the occlusion is dramatic or there is no pupil in the image, the value of the function overshoots. (Note that the plot is in logarithmic scale.) we try to fit ellipse to each subset of all extracted arcs. Excluding the empty set, there are 2n − 1 different arc combinations for n arcs. Fig. 6.e shows all generated pupil candidates generated from extracted arcs in Fig. 6.d. Since the pupil candidate generation process considers all subsets of selected arcs, groups of unrelated arcs which do not form a valid elliptic structure are also subjected to be eliminated after ellipse fit. Therefore, we eliminate those candidates which result in high fitting error due to the fact hat they cannot belong to the pupil boundary. After we eliminate candidates which result high fitting error, one of the remaining candidates is going to be selected as the final pupil by utilization of a cost function in the final step. Or, the algorithm ends up with the decision that there is no pupil in the image, if the output of the cost function diverges. To solve this problem, we devise another strategy that finds the start and end points of a potential elliptical arc within an edge segment by locating the corners along the segment [40]. We detect corners on the segments with a fast curvature scale-space (CSS) method which utilize image gradient information to compute turning angle curvature [41]. Afterwards, we apply ellipse fit to the points lying in between two consecutive corners along each segment and obtain elliptical arcs. In Fig. 6.b-d we present the results of arc extraction process for several test images. In the first two rows, the pupil is completely visible; hence, the near-circular segment (indicated in red) is detected. Therefore, arc extraction is applied to only this segment. When no near-circular segment is found due to occlusions, arcs are extracted from all segments having high gradient entropy to avoid missing any critical information (see 3rd , 4th and 5th rows of Fig. 6). We should note that even if the pupil is in clear sight, it may appear highly elliptical because of the view angle. In such cases, pupil’s segment may result a low gradient entropy and near-circular segment would not be detected. As a consequence, elliptical arc extraction would be applied to all segments even though there is no occlusion. 3.6. Detection of The Pupil In the previous step, we get a number of pupil candidates each of which is a subset of elliptical arcs consisting several arcs. Accordingly, we still need to select one candidate ellipse to be the final pupil contour. To make the decision, we define a cost function Jc which considers the following properties of a candidate ellipse: i. the ellipse fitting error (ε), ii. the eccentricity (e), iii. the ratio of the arc pixels to the perimeter of resulting ellipse (φ). 3.5. Generation of the Pupil Candidates In this step, we generate candidate ellipses by grouping the extracted arcs. Thus we aim to detect the pupil boundary completely even if its boundary is partially visible. To generate pupil candidates, Each of the pupil candidates is formed by one or more arcs. If the pupil boundary is detected from multiple arcs, the fitting error should be reasonable because we expect the arcs to be parts of the same 9 elliptic contour. Thus we need to minimize the fitting error ε. The eccentricity (e) indicates the compactness of an ellipse, or in other words, diversity of an ellipse from a circle and it is computed as r b2 0<e<1 (4) e= 1− 2 , a where a and b are semi-major and semi-minor axes, respectively. The eccentricity is 0 for a circle and 1 for a parabola. Among the pupil candidates each of which is a subset of elliptical arcs, there are also diverse ellipses whose eccentricities can get close to 1. However, pupil’s projection onto the image plane is usually closer to a circle rather than a skewed ellipse in majority of the applications. Therefore, we tend to select a candidate having an eccentricity close to 0. The parameter φ is the ratio of the number of pixels involved in ellipse fitting to the perimeter of the resulting ellipse. In some circumstances, one single and short arc may result in a large pupil candidate ellipse that may lead to inconsistency. Therefore, we look for the pupil candidates which are formed by consensus of more arc pixels and have a greater φ. During our experiments, we observed that the effect of the eccentricity (e) is less than the effect of ε and φ due to the possibility of true pupil not being the most compact ellipse among the candidates. Accordingly, we take squares of ε and φ to increase their effect on the cost function. Finally, we need to minimize ε and e and maximize φ in our formulation, and select the candidate that minimizes the following argument: Jc (pi ) = arg min(ε,e,φ) ε2i . πie φ2i Figure 9: A snapshot of our pupil annotation tool. Two different ellipse fitting algorithms are utilized to find the best conic to represent the pupil GT. After clicking a location inside the pupil, a guide is displayed in order to help user to equally sample contour points. gorithm, it is still possible to obtain arcs and pupil candidates although there is actually no pupil. We observe that the cost function overshoots in these circumstances due to large ε and small φ values. Therefore, we can easily find if there is no pupil by quantifying output of Jc . In Fig. 7 we present a plot of the cost function versus a number of frames sampled from an eye blink operation. It is clearly seen that the Jc ’s output rapidly increases as the visible part of the pupil periphery gets smaller due to occlusions. Similarly, the algorithm ends up that there is no pupil in the image because the cost function overshoots for all of pupil candidates in the last row of Fig. 6. By examining several frames, we find out that a stable threshold value can provide promising results on deciding whether there is no pupil. We provide more detail on this topic in the next section with quantitative experimental results. (5) 4. Experimental Results where pi is the ith pupil candidate and π is constant. Fig. 6.f shows the pupil detection results for sample images. Among the pupil candidates shown in Fig. 6.e, the one that minimizes the Jc in Eq. 5 is selected as the pupil. In this section, we present results of a comprehensive set of experiments in both quantitative and qualitative manner. We compare the proposed algorithm to three state of the art pupil detection algorithms, i.e. Starburst [19], Świrski et al. [21] and ElSe [22]. We quantitatively assess algorithms in terms of pupil detection accuracy (by means of Fmeasure), pupil localization and running time. We also provide qualitative results which provide useful insight to readers about the performance of algorithms. In addition to the content that we present in the paper, we also provide more supplementary 3.7. Detection of True Negatives In many applications, having the information that there is no pupil in the image is important as much as detecting it. This information can provide very useful extensions to eye tracking applications such as blink detection. In the proposed al10 (a) (b) (c) (d) Figure 10: Illustration of localization test. (a) Input image, (b) Pupil ground truth pupil (GT), (c) Detected pupil (Det), (d) Subject4_0022.png (Swirski) Overlapping (indicated in blue) and non-overlapping (indicated in red and green) pixels. material (e.g. codes, videos, etc.) on our webEven though having 5 points is sufficient to fit Other Candidates an ellipse hence its degree of freedom, we picked 10 site [42]. points in average from each pupil’s boundary to better reduce the effect of perspective distortion. Note 4.1. Pupil Detection Dataset that a circle’s projection onto image may not be a perfect ellipse due to the perspective distortion and In order to perform experiments, we first prelens distortion. Once all points are set along the pare a dataset containing 1509 high resolution pupil’s boundary, then we fit ellipse to them with (1280×720) eye frames collected from 5 Subject1_0074.png subjects. (Starburst) two different algorithms [36, 35] and select the paWe used a simple head-mounted eye tracking apparameters which provides lower fitting error. Thereratus (see Fig. 8) consisting of two HD cameras (for fore, we obtain the best possible conic to represent scene & eye) that we built for 3D gaze estimation the pupil GT in each eye image. study. To our knowledge, this is the only available pupil detection dataset in resolution higher than VGA (640×480) in the literature. 4.2. Localization Assessment During collection of the frames, we ask all subThe first quantitative test we perform is localiza(Starburst) jects to move their eyes different directionsSubject1_0075.png in a certion assessment of pupil detection algorithms. In tain order. In this way, we obtain eye images as this evaluation, we quantify success of algorithms pupil is viewed in diverse angles with and without for how precisely they detect pupils with respect occlusions by camera. Furthermore, we also want to ground truth data. We apply this test only the users to blink several times to obtain negative imframes in which the pupil is truly detected by each age samples that pupil does not exist. Eventually, algorithm in the dataset. Source codes of all algoin 57% of the frames pupil is in clear sight, in 16% rithms were downloaded from websites that authors of them there are severe occlusions and in 27% of provided in corresponding papers [43, 44, 45]. We them there is no pupil in the dataset. We count a set all parameters of all algorithms according to corpupil positive sample if more than half of its peresponding publications, or use the best performing riphery is visible, otherwise it is considered as a values if it is not explicitly indicated in the paper or negative sample. code. For each algorithm, we used a single parameAfter we collect the test frames, we implement an ter set for all images in the dataset which provides efficient annotation tool which eases rigorous annothe best overall result. tation procedure (see Fig. 9). Our annotation tool In order to quantify the localization performance, overlays a grid in polar form to ease the selection we compute overlap ratio OR between the detected of pixels from pupil boundary in an equal angular pupil and ground truth by counting number of corresolution. In addition, to ensure localization of responding pixels as follows: ground truth (GT) conics, it does not collect the exact pixel coordinates that users click. Instead, it Area(EDet ) ∩ Area(EGT ) (6) OR(EDet , EGT ) = searches a local pixel neighborhood of clicked locaArea(EDet ) ∪ Area(EGT ) tion to find the maximum image gradient response where EDet and EGT are ellipse of detected pupil and picks that location. In this way, we guarantee the selection of exact edge pixels in between pupil and ground truth ellipse, respectively [46]. In this manner we calculate the ratio of the number of overand iris in high resolution images precisely. 11 1.00 0.98 0.97 0.95 0.98 0.97 0.96 0.96 0.94 0.92 0.97 0.95 0.95 0.92 0.93 0.92 0.90 0.90 0.86 0.85 Localization 0.83 0.80 0.77 0.76 0.75 0.70 0.70 0.67 0.60 Subject 1 Subject 2 Starburst Subject 5 Subject 4 Subject 3 Swirski ElSe Overall Proposed Figure 11: Localization test results of each algorithm for each subject. lapping pixels to total number of overlapping and non-overlapping pixels as seen in Fig. 10. Once the number of overlapping and nonoverlapping pixels are determined, we calculate OR and take the average for all images for each algorithm. Higher OR indicates better localization, hence provides higher accuracy in the application which pupil detection is utilized, obviously. In Fig. 11 we present average localization results for individual subjects and overall for each algorithm. Although ElSe and Świrski also give prospering results, the proposed algorithm performs the best with a 4% improvement over the runner up in overall results. we count TP, FP, TN ve FN samples, we calculate Precision (Eq. 8) and Recall (Eq. 9) values in order to compute F-Measure (Eq. 10). We present F-Measure results in Fig. 12 with respect to a range of εO in between 0.0 to 0.2 which corresponds to OR varying from a perfectly aligned ellipses at 80% overlap. We do not evaluate pupils as TP if they are detected with a OR lower than 80%. From the sketches in Fig. 12 it is clearly seen that accuracy tests are less contentious than localization experiments where the competition among the algorithms are tighter. In this experiment, proposed method outperforms others as its accuracy rapidly increases even in very small εO errors and follows a very stable path regardless the subject. We also see that Świrski and ElSe algorithms performs very closely with a significant success over Starburst algorithm. 4.3. Accuracy Assessment In the previous experiment we assess the localization performance of algorithms by considering only the images that they detect pupil correctly. In this step, we evaluate the accuracy of algorithms by counting the number of images that the pupil is correctly detected in the entire frame sequences. To consider a pupil image as a correct detection (TP), we calculate overlap error (εO ) as in Eq. 7 and compare the result with a threshold value [47]. εO (EDet , EGT ) = 1 − OR Precision = Recall = count(TP Pupils) cellipsest(TP Pupils + FP Pupils) (8) count(TP Pupils) count(TP Pupils + FN Pupils) (7) F-Measure = The range of εO is in between 0 and 1, and its value obviously increases as the intersection area between detected ellipse and GT decreases. We compare εO with a threshold value to make a decision on the detected pupil on whether it is a true positive (TP) or a false positive (FP). Likewise, we also evaluate images in which algorithms do not detect a pupil as true negative (TN) if there is no actual pupil in the image; or false negative (FN) vice versa. After 2 × Precision × Recall Precision + Recall (9) (10) 4.4. Qualitative Results Along with quantitative accuracy and localization results, we also present qualitative results in Fig. 13. In the figure, we provide two results from each of five subjects from top to bottom. It is also clearly shown that the algorithm can successfully 12 Subject 2 0.9 0.9 0.9 0.8 0.8 0.8 0.7 0.7 0.7 0.6 0.5 0.4 F-Measure 1.0 0.6 0.5 0.4 0.6 0.5 0.4 0.3 0.3 0.3 0.2 0.2 0.2 0.1 0.1 0.1 0.0 0.0 0.00 0.02 0.04 0.06 0.08 0.10 0.12 0.14 0.16 0.18 0.0 0.00 0.20 0.02 0.04 0.06 0.08 0.10 0.12 0.14 0.16 0.18 0.20 0.00 Subject 4 0.8 0.8 0.7 0.7 0.7 0.6 0.5 0.4 0.6 0.5 0.4 0.3 0.3 0.2 0.2 0.1 0.1 0.0 0.08 0.10 0.12 0.14 0.16 0.18 0.20 F-Measure 0.9 0.8 F-Measure 0.9 0.06 0.08 0.12 0.14 0.16 0.18 0.20 0.14 0.16 0.18 0.20 0.6 0.5 0.4 0.3 0.2 0.1 0.0 0.0 Overlap Error 0.10 Overall 1.0 0.9 0.04 0.06 Subject 5 1.0 0.02 0.04 Overlap Error 1.0 0.00 0.02 Overlap Error Overlap Error F-Measure Subject 3 1.0 F-Measure F-Measure Subject 1 1.0 0.00 0.02 0.04 0.06 0.08 0.10 0.12 0.14 0.16 0.18 0.20 0.00 0.02 Overlap Error Starburst Swirski ElSe 0.04 0.06 0.08 0.10 0.12 Overlap Error Proposed Figure 12: F-Measure results of each algorithm for each subject. determine true negatives, i.e. in 2nd and 9th rows. In Fig. 14 we present several examples where the proposed algorithm fails. The most common reason for fail cases is motion blur where the algorithm cannot extract edges from the pupil contour. Therefore, elliptical arcs, hence the pupil contour cannot be detected. Besides the images presented here, we also provide video sequences of all algorithms in [42] for interested readers. into consideration. All algorithm implementations are in C++ except Starburst which is in MATLAB. According to a study [48], a typical execution in MATLAB is 50 times slower than a C++ based application, therefore we divide timing results of Starburst by 50. Świrski’s implementation was implemented in order to benefit from parallel computing libraries in order to utilize multi-core CPUs. To able to make a fair comparison, we assign the application to a specific core and measure running times. The running times of all algorithms in average for all images are summarized in Table 2. According to average running times in Table 2, proposed method is the fastest one among all algorithms. It can be seen that the proposed algorithm can run up to 140 Hz in single thread for HD images in 1280×720 resolution. In per subject analysis we see that the proposed method is slightly slower than the ElSe algorithm for subject 4. When we investigate the reason behind the longer execution of subject 4, we see that there are too many occlusions which cause algorithm to fail on detecting a near-circular segment and extract arcs from all edge segments. Table 3 gives a dissection of running times of the proposed algorithm for separate steps. ROI detection is obviously the most computation demanding 4.5. Running Time Assessment We run all experiments on a laptop computer with Intel i7 2.40 GHz CPU. To be able to make a fair comparison, we take implementation platforms Table 2: Average running times of algorithms for each subject in milliseconds. Best timings are indicated in bold. Algorithm Subject Subject 1 Subject 2 Subject 3 Subject 4 Subject 5 Average Starburst Świrski ElSe Proposed 113.36 56.36 55.89 66.89 183.71 93.79 81.34 79.63 74.62 70.34 92.35 79.48 9.79 9.51 9.72 10.14 9.88 9.81 5.58 6.39 5.04 10.77 6.51 7.25 13 Figure 13: Qualitative results from all algorithms and all subjects (images in every two-rows from the beginning belong to a different subject). step of the algorithm which takes roughly half of the entire execution due to the computation of in- tegral images and convolution of Haar-like features at several scales. Another time-consuming step 14 (a) (b) (c) (d) (e) Figure 14: Several examples in which the proposed algorithm fails. The algorithm could detect no pupil in the last two images. especially when a near-circular segment could not be detected- is the last step, i.e. pupil detection, which is the main reason behind the algorithm’s fall back at subject 4. Since this step contains too many computationally expensive ellipse fitting and error calculation routines, it significantly stretchs out the execution time if absence of a near-circular segment is the case. analysis, we boost the execution of algorithm and pave the way for real-time applications for high resolution images. We performed a comprehensive set of experiments by comparing the proposed method with three state of the art algorithms and provided both quantitative and qualitative results. Experimental evaluations show that the proposed algorithm can detect the pupil even in tough occlusive cases without compromising the real-time applicability constraints. 5. Conclusions Pupil detection is an indispensable step in many eye tracking applications and have to be performed precisely. In most studies, pupil detection is handled with straightforward methods which lack accuracy and fail in occlusive cases. In this study we focused on developing an efficient feature-based algorithm for pupil boundary detection by using the entropy of edge segments. We basically find elliptical arcs in an input image and try to obtain a final ellipse encircling the pupil with the consensus of all obtained features. Because the edge segment detection method we employed provide optimum localization, elliptical arcs we extract from edge segments accurately encircle pupil boundary and estimates its center. Moreover, by means of the gradient distribution References References [1] S. Goni, J. Echeto, A. Villanueva, R. Cabeza, Robust algorithm for pupil-glint vector detection in a videooculography eyetracking system, in: Int’l Conf. Pattern Recognition (ICPR), 2004, pp. 941–944. [2] T. Mäenpää, An iterative algorithm for fast iris detection, in: Advances in Biometric Person Authentication, Springer, Berlin, Heidelberg, 2005, pp. 127–134. [3] X. Long, O. K. Tonguz, A. Kiderman, A high speed eye tracking system with robust pupil center estimation algorithm, in: IEEE Int’l Conf. Engineering in Medicine and Biology, 2007, pp. 3331–3334. [4] A. Keil, G. Albuquerque, K. Berger, M. A. Magnor, Real-time gaze tracking with a consumer-grade video camera, Václav Skala-UNION Agency, 2010. [5] L. Lin, L. Pan, L. Wei, L. Yu, A robust and accurate detection of pupil images, in: Int’l Conf. Biomedical Engineering and Informatics, Vol. 1, 2010, pp. 70–74. [6] J.-G. Wang, E. Sung, Study on eye gaze estimation, IEEE Trans. Systems, Man, and Cybernetics, Part B (Cybernetics) 32 (3) (2002) 332–350. [7] L. Ma, T. Tan, Y. Wang, D. Zhang, Efficient iris recognition by characterizing key local variations, IEEE Transactions on Image Processing 13 (6) (2004) 739– 750. [8] S. Dey, D. Samanta, An efficient approach for pupil detection in iris images, in: Int’l Conf. Advanced Computing and Communications, 2007, pp. 382–389. [9] J. San Agustin, H. Skovsgaard, E. Mollenbach, M. Barret, M. Tall, D. W. Hansen, J. P. Hansen, Evaluation of a low-cost open-source gaze tracker, in: ACM Int’l Symposium on Eye-Tracking Research & Applications (ETRA), New York, NY, USA, 2010, pp. 77–80. [10] D. Ballard, Generalizing the hough transform to detect arbitrary shapes, Pattern Recognition 13 (2) (1981) 111 – 122. Table 3: Detailed average timing results of proposed algorithm for different subjects Dataset ROI Detection Edge Segment Detection Gradient Entropy Comp. Corner Detection Arc Extraction Pupil Detection TOTAL (ms) Step Subject 1 Subject 2 Subject 3 Subject 4 Subject 5 Overall 3.47 3.31 2.81 3.91 3.52 3.49 1.46 1.51 1.28 1.96 1.71 1.68 0.07 0.21 0.20 0.17 0.27 0.23 0.06 0.09 0.06 0.14 0.08 0.09 0.25 0.43 0.29 0.62 0.41 0.46 0.27 0.83 0.39 3.97 0.52 1.30 5.58 6.39 5.04 10.77 6.51 7.25 15 [11] M. A. Fischler, R. C. Bolles, Random sample consensus: A paradigm for model fitting with applications to image analysis and automated cartography, Communications of the ACM 24 (6) (1981) 381–395. [12] Y. Ebisawa, Improved video-based eye-gaze detection method, IEEE Transactions on Instrumentation and Measurement 47 (4) (1998) 948–955. [13] J. B. Hiley, A. H. Redekopp, R. Fazel-Rezai, A low cost human computer interface based on eye tracking, in: Int’l Conf. IEEE Engineering in Medicine and Biology Society (EMBS), 2006, pp. 3226–3229. [14] C. Morimoto, D. Koons, A. Amir, M. Flickner, Pupil detection and tracking using multiple light sources, Image and Vision Computing 18 (4) (2000) 331 – 335. [15] J. Daugman, How iris recognition works, in: IEEE Int’l Conf. Image Processing (ICIP), Vol. 1, 2002, pp. I–33– I–36. [16] E. M. Arvacheh, H. R. Tizhoosh, Iris segmentation: Detecting pupil, limbus and eyelids, in: IEEE Int’ Conf. Image Processing (ICIP), 2006, pp. 2453–2456. [17] D. Zhu, S. T. Moore, T. Raphan, Robust pupil center detection using a curvature algorithm, Computer Methods and Programs in Biomedicine 59 (3) (1999) 145 – 157. [18] N. Kumar, S. Kohlbecher, E. Schneider, A novel approach to video-based pupil tracking, in: IEEE Int’l Conf. Systems, Man and Cybernetics (SMC 2009), 2009, pp. 1255–1262. [19] D. Li, D. Winfield, D. J. Parkhurst, Starburst: A hybrid algorithm for video-based eye tracking combining feature-based and model-based approaches, in: IEEE Conf. Computer Vision and Pattern Recognition (CVPR) Workshops, 2005, pp. 79–79. [20] W. J. Ryan, D. L. Woodard, A. T. Duchowski, S. T. Birchfield, Adapting starburst for elliptical iris segmentation, in: IEEE Int’l Conf. Biometrics: Theory, Applications and Systems,, 2008, pp. 1–7. [21] L. Świrski, A. Bulling, N. Dodgson, Robust real-time pupil tracking in highly off-axis images, in: ACM Int’l Symposium on Eye Tracking Research and Applications (ETRA), 2012, pp. 173–176. [22] W. Fuhl, T. C. Santini, T. Kuebler, E. Kasneci, Else: Ellipse selection for robust pupil detection in real-world environments, ACM Int’l Symp. Eye Tracking Research and Applications (ETRA). [23] P. Viola, M. Jones, Rapid object detection using a boosted cascade of simple features, in: IEEE Conf. Computer Vision and Pattern Recognition (CVPR), Vol. 1, 2001, pp. 511–518. [24] Y. Ebisawa, Robust pupil detection by image difference with positional compensation, in: IEEE Int’l Conf. Virtual Environments, Human-Computer Interfaces and Measurements Systems, 2009, pp. 143–148. [25] D. W. Hansen, Q. Ji, In the eye of the beholder: A survey of models for eyes and gaze, IEEE Trans. Pattern Analysis and Machine Intelligence (PAMI) 32 (3) (2010) 478–500. [26] C. H. Morimoto, M. R. Mimica, Eye gaze tracking techniques for interactive applications, Computer Vision and Image Understanding 98 (1) (2005) 4 – 24. [27] C. Akinlar, C. Topal, EDCircles: A real-time circle detector with a false detection control, Pattern Recognition 46 (3) (2013) 725 – 740. [28] C. Topal, C. Akinlar, Edge Drawing: A combined realtime edge and segment detector, Journal of Visual Com- [29] [30] [31] [32] [33] [34] [35] [36] [37] [38] [39] [40] [41] [42] [43] [44] [45] [46] [47] 16 munication and Image Representation 23 (6) (2012) 862 – 872. C. Topal, O. Ozsen, C. Akinlar, Real-time edge segment detection with edge drawing algorithm, in: Int’l Symp. Image and Signal Processing and Analysis (ISPA), 2011, pp. 313–318. A. Desolneux, L. Moisan, J.-M. Morel, Edge detection by helmholtz principle, Journal of Mathematical Imaging and Vision 14 (3) (2001) 271–284. A. Desolneux, L. Moisan, J. M. Morel, From Gestalt Theory to Image Analysis: A Probabilistic Approach, Springer Publishing Company, Incorporated, 2007. C. Akinlar, C. Topal, EDPF: A Real-time Parameterfree Edge Segment Detector with a False Detection Control, Int’l Journal of Pattern Recognition and Artificial Intelligence 26 (1). L. Jia, L. Kitchen, Object-based image similarity computation using inductive learning of contour-segment relations, IEEE Transactions on Image Processing 9 (1) (2000) 80–87. C. Martinez-Ortiz, J. Žunić, Curvature weighted gradient based shape orientation, Pattern Recognition 43 (9) (2010) 3035 – 3041. G. Taubin, Estimation of planar curves, surfaces, and nonplanar space curves defined by implicit equations with applications to edge and range image segmentation, IEEE Trans. Pattern Anal. Mach. Intell. 13 (11) (1991) 1115–1138. A. Fitzgibbon, M. Pilu, R. B. Fisher, Direct least square fitting of ellipses, IEEE Trans. Pattern Anal. Mach. Intell. (PAMI) 21 (5) (1999) 476–480. P. L. Rosin, Assessing error of fit functions for ellipses, Graphical models and image processing 58 (5) (1996) 494–502. R. Nürnberg, Distance from a point to an ellipse, wwwf.imperial.ac.uk/~rn/distance2ellipse.pdf, accessed September 15, 2017 (2006). S. Ramanujan, Collected papers of srinivasa ramanujan, Chelsea Publishing, New York. H. I. Cakir, C. Topal, C. Akinlar, An occlusion-resistant ellipse detection method by joining coelliptic arcs, in: European Conference on Computer Vision (ECCV), 2016, pp. 492–507. C. Topal, K. Özkan, B. Benligiray, C. Akinlar, A robust CSS corner detector based on the turning angle curvature of image gradients, in: ICASSP, 2013, pp. 1444–1448. Pupil detector supplementary webpage, http://c-viz. anadolu.edu.tr/PupilDetector, accessed on September 15, 2017. Starburst source codes page., https://github.com/ thirtysixthspan/Starburst, accessed on September 15, 2017. Swirski’s source codes page., https://github.com/ LeszekSwirski/pupiltracker/, accessed on September 15, 2017. ElSe source codes page., ftp://messor.informatik. uni-tuebingen.de/, accessed on September 15, 2017. D. K. Prasad, M. K. H. Leung, S. Y. Cho, Edge curvature and convexity based ellipse detection method, Pattern Recognition 45 (9) (2012) 3204–3221. A. Y. S. Chia, S. Rahardja, D. Rajan, M. K. Leung, A split and merge based ellipse detector with selfcorrecting capability, IEEE Transactions on Image Processing 20 (7) (2011) 1991–2006. [48] M. Fornaciari, A. Prati, R. Cucchiara, A fast and effective ellipse detector for embedded vision applications, Pattern Recognition 47 (2014) 3693–3708. 17
1cs.CV
Received: 00 Month 0000 Revised: 00 Month 0000 Accepted: 00 Month 0000 DOI: xxx/xxxx LEARNING-BASED ADAPTIVE CONTROL : THEORY AND APPLICATIONS Observer-based Adaptive Optimal Output Containment Control problem of Linear Heterogeneous Multi-agent Systems with Relative Output Measurements arXiv:1803.11411v1 [cs.SY] 30 Mar 2018 Majid Mazouchi1 | Mohammad Bagher Naghibi-Sistani1 | Seyed Kamal Hosseini Sani1 | Farzaneh Tatari2 | Hamidreza Modares3 1 Department of Electrical Engineering, Ferdowsi University of Mashhad, Mashhad, Iran 2 Department of Electrical Engineering, University of Semnan, Semnan, Iran 3 Missouri University of Science and Technology, Rolla, MO 65401, USA Summary This paper develops an optimal relative output-feedback based solution to the containment control problem of linear heterogeneous multi-agent systems. A distributed optimal control protocol is presented for the followers to not only assure that their outputs fall into the convex hull of the leaders’ output (i.e., the desired or safe region), but also optimizes their transient performance. The proposed optimal control solution is composed of a feedback part, depending of the followers’ state, and a feed-forward part, depending on the convex hull of the leaders’ state. To comply with most real-world applications, the feedback and feed-forward states are assumed to be unavailable and are estimated using two distributed observers. That is, since the followers cannot directly sense their absolute states, a distributed observer is designed that uses only relative output measurements with respect to their neighbors (measured for example by using range sensors in robotic) and the information which is broadcasted by their neighbors to estimate their states. Moreover, another adaptive distributed observer is designed that uses exchange of information between followers over a communication network to estimate the convex hull of the leaders’ state. The proposed observer relaxes the restrictive requirement of knowing the complete knowledge of the leaders’ dynamics by all followers. An off-policy reinforcement learning algorithm on an actor-critic structure is next developed to solve the optimal containment control problem online, using relative output measurements and without requirement of knowing the leaders’ dynamics by all followers. Finally, the theoretical results are verified by numerical simulations. KEYWORDS: adaptive distributed observer, cooperative output regulation, output containment control, optimal control, reinforcement learning 1 INTRODUCTION Distributed control of multi-agent systems has attracted a surge of interest in variety of disciplines, due to its broad applications, including cooperation of multiple robot systems 1,2 , satellite formation flying 3 , vehicles formation control 4 , transportation 2 systems 5 , cooperative surveillance 6 , distributed sensor networks 7 and so forth. Distributed cooperative control offers many advantages such as less communication requirement, more flexibility, enhanced reliability, and scalability, compared with its centralized counterpart. A fundamental problem in distributed cooperative control of multi-agent systems is consensus or synchronization, in which the goal is to design distributed control policies for agents to ensure that they reach an agreement on certain quantities of interest on their states or outputs, using only the local state or output information available to each agent. A comprehensive review of consensus and synchronization problems is provided in Olfati-Saber et al. 8 . Based on the number of leaders, consensus or synchronization problems can be categorized into three classes, namely, leaderless 6,9 , leader-following 10,11 and containment control 2,12,13 . In the latest problem, which is the problem of interest in this paper, there exist multiple leaders, and the objective is to drive the followers into a convex geometric space spanned by the leaders. The containment control problem has been extensively investigated in recent years 2,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27 , due to its numerous potential applications in practical engineering, for example, in stellar observation for satellite formation 28 , removing hazardous materials for autonomous robots 2 , and so forth. In most practical situations, the full state information of agents is unavailable for measurement and/or expensive to measure. For instance, for a group of mobile agents navigating in environments that global navigation satellite systems signals are rather attenuated, such as forests, urban canyons, and even some building interiors, no position measurement might be possible using ordinary global positioning system (GPS) receivers. In this situation, one obvious solution might be attained by installing more precise and powerful GPS receivers on all the agents. However, not only a more precise and powerful GPS receiver is costly, but also it uses more electrical power due to the fact that it requires more amplifying of attenuated signal and possibly more burden of weight. Therefore, in some real world scenarios, this solution may be unfeasible or too costly. Motivating by the concept of anchor agents 29 in localization problem 30 in the context of wireless sensor networks, another solution to the aforementioned situation and scenario is to equip only small fraction of agents (leaders) with more precise and powerful GPS receivers to measure their absolute states. However, the rest of agents (followers), which are just equipped with ordinary GPS receivers, do not have access to their absolute position measurements, and they just have access to relative output measurements with respect to their neighbors and the information which is broadcasted to them through the communication network by their neighbors. Most of existing containment control protocols focus on the case of homogeneous agents, in which all agents have identical dynamics 15,16,19,24,31 . Some recent results on the containment control problem 22,25 have considered the case of heterogeneous followers with non-identical dynamics, but assumed that the dimensions of all agents are the same. However, in many real-world applications, for which there are different types of agents performing different tasks, not only the agents’ dynamics but also their dimensions are different. This requires designing distributed control protocols to drive the followers’ output into a convex hull spanned by the leaders’ output. Nevertheless, existing results based on relative state measurements in zheng et al. 22 and Haghshenas et al. 25 cannot be used, as the relative state does not make sense anymore for followers with different dimensions. Although the design of distributed relative output-feedback based control protocols is considered in Li et al. 21 and Wen et al. 31 , these results are still limited to homogeneous multi-agent systems. Output containment control of heterogeneous multi-agent systems is considered in Zuo et al. 32 . However, in their method, all the followers require their absolute state or output, as well as complete knowledge of the leaders’ dynamics, which may not be available to the followers in many applications. Moreover, their approach requires the restrictive assumption of requiring a strongly connected communication graph. Besides the above mentioned shortcomings of existing results, another shortcoming is that they do not take into account the transient behavior of the followers and give importance only to the steady-state response of the followers, i.e., they only assure that the followers’ states or outputs eventually converge to a convex combination of the leaders’ states or outputs. However, it is desired to find optimal solutions that not only guarantee steady-state convergence, but also minimize the transient containment error over time. Another important issue which is not considered in the existing results for containment control is designing online solutions that do not require complete knowledge of the leaders. Reinforcement learning (RL) 33,34 has been successfully used to design adaptive optimal controllers for single-agent systems 35,36,37,38,39,40,41,42,43 and multi-agent systems 44,45,46,47,48 online in real time. However, to our knowledge, there is no RL-based solution to the optimal containment control problem. To overcome the aforementioned shortcomings of the existing work, this paper presents an observer-based adaptive optimal solution to the output containment control problem of linear heterogeneous multi-agent systems, where two distributed observers are used. A distributed adaptive observer is designed to estimate followers’ state, and another distributed adaptive observer is developed to estimate the convex hull of the leaders’ state. The proposed distributed adaptive observer relaxes the restrictive requirement of knowing the complete knowledge of the leaders’ dynamics by all followers. Then, an off-policy reinforcement learning algorithm on an actor-critic structure is developed to solve the optimal output containment control problem 3 online in real time. The proposed algorithm does not require any knowledge of leaders’ dynamics and uses only the relative output measured data of the followers and the information which is broadcasted through the communication network by neighbors. The main contributions of the paper are as follows : 1. A novel distributed dynamic relative output feedback control protocol is developed based on cooperative output regulation framework to solve the output containment control problem of linear fully heterogeneous multi-agent systems. 2. An adaptive distributed observer is presented to estimate the leaders’ dynamics, as well as their outputs, and a convex combination of the leaders’ states for each follower. In contrast to the existing work, this observer relaxes the restrictive requirement of knowing the complete knowledge of the leaders’ dynamics by all followers. 3. An optimal solution to the distributed containment control problem is presented to optimize the transient output containment error of followers as well as their control efforts, while assuring a zero-steady state containment error. 4. An off-policy RL algorithm is developed to solve the formulated optimal output containment control problem online in real time, using relative output measurements of followers with respect to their neighbors and the information which is broadcasted by neighbors, and without requirement of knowing the complete knowledge of the leaders’ dynamics by all followers. The subsequent sections are organized as follows: some basic concepts of graph theory, definitions and notations are presented in Section 2. Section 3 states the output containment control problem in output regulation framework. Moreover, analysis is provided to find containment control problem offline and non-optimal solution. Distributed adaptive observer is designed in Section 4. The optimality is explicitly imposed in solving the containment control problem in Section 5, which enables us to use RL techniques to learn solution online in real time. Numerical simulation is given to validate the effectiveness of the theoretical results in Section 6. Finally, in Section 7 conclusions are drawn. 2 2.1 PRELIMINARIES Notations The following notations are used throughout the paper. Let ℜ𝑛 and ℜ𝑛×𝑚 represent the 𝑛 dimensional real vector space and the 𝑛 × 𝑚 real matrix space, respectively. 0𝑚×𝑛 denotes the 𝑚 × 𝑛 matrix with all zeros. Let 1𝑛 be a column vector with all entries ( ) equal to 1. 𝐼𝑛 represents an 𝑛 × 𝑛 identity matrix. 𝑑𝑖𝑎𝑔 𝑑1 , ..., 𝑑𝑛 represents a block-diagonal matrix with matrices 𝑑1 , ..., 𝑑𝑛 on its diagonal. ‖.‖2 denotes the Euclidean norm. For any matrix 𝐻𝑖 ∈ ℜ𝑛×𝑞 , 𝑖 = 1, ..., 𝑚, 𝑐𝑜𝑙(𝐻1 , ..., 𝐻𝑚 ) = [𝐻1𝑇 , ..., 𝐻𝑚𝑇 ]𝑇 and [ ] 𝑉 𝑒𝑐(𝐻𝑖 ) = 𝑐𝑜𝑙(𝐻𝑖1 , ..., 𝐻𝑖𝑞 ) where 𝐻𝑖𝑗 ∈ ℜ𝑛 is the 𝑗-th column of 𝐻𝑖 . 𝐻𝑖 𝑗 denotes the 𝑗-th row of the matrix 𝐻𝑖 . The symbol ⊗ represents the Kronecker product. The distance from 𝑥 ∈ ℜ𝑁 to the set  ⊆ ℜ𝑁 is denoted by 𝑑𝑖𝑠𝑡(𝑥, ) = inf ‖𝑥 − 𝑦‖2 . 𝑦∈ 2.2 Graph Theory In this subsection, some basic concepts on algebraic graph theory are briefly reviewed. Let the communication topology among 𝑛 + 𝑚 agents be presented by a weighted directed acyclic graph  = (𝑉 , , 𝐴) with a set of nodes 𝑉 = {𝜈1 , … , 𝜈𝑛+𝑚 }, a set of edges  ⊆ 𝑉 ×𝑉 , and a weighted adjacency matrix 𝐴 = [𝑎𝑖𝑗 ] with non-negative adjacency elements 𝑎𝑖𝑗 , i.e., an edge (𝜈𝑗 , 𝜈𝑖 ) ∈  if and only if 𝑎𝑖𝑗 > 0. Node 𝜈𝑗 is called the parent node, node 𝜈𝑖 is the child node, and 𝜈𝑗 is a neighbor of 𝜈𝑖 . We assume that there are no self-connections, i.e. (𝜈𝑖 , 𝜈𝑖 ) ∉ . A directed graph is acyclic if graph does not have any directed cycle. The set of node 𝜈𝑖 neighbors is denoted by 𝑁̄ 𝑖 = {𝜈𝑗 ∈ 𝑉 ∶ (𝜈𝑗 , 𝜈𝑖 ) ∈ , 𝑗 ≠ 𝑖}. A directed path from node 𝜈𝑖 to node 𝜈𝑗 is a sequence of edges (𝜈𝑖 , 𝜈𝑘1 ), (𝜈𝑘1 , 𝜈𝑘2 ), ..., (𝜈𝑘𝓁 , 𝜈𝑗 ) with distinct nodes 𝜈𝑘𝑚 , 𝑚 = 1, ..., 𝓁 in a directed graph. A directed graph is strongly connected if there is a directed path between every ordered pair of nodes. A directed graph is said to have a spanning forest if there exists at least one node such that there is a directed path from this node to all the other nodes. An agent is called leader if it does not receive any information from others, i.e., it has no neighbor. Otherwise, it is called a follower. We assume that agents 1 to 𝑛 are Δ Δ followers, and agents 𝑛 + 1 to 𝑛 + 𝑚 are leaders. For notational convenience,  = {1, ..., 𝑛} and  = {𝑛 + 1, ..., 𝑛 + 𝑚} are used to denote, the set of followers and the set of leaders, respectively. The Laplacian matrix 𝐿 = [𝓁𝑖𝑗 ] ∈ ℜ(𝑛+𝑚)×(𝑛+𝑚) associated 4 with 𝐴 is defined as 𝓁𝑖𝑖 = ∑ 𝑗∈𝑁𝑖 𝑎𝑖𝑗 and 𝓁𝑖𝑗 = −𝑎𝑖𝑗 where 𝑖 ≠ 𝑗. The Laplacian matrix 𝐿 associated with  can be partitioned as [ ] 𝐿1 𝐿2 𝐿= (1) 0𝑚×𝑛 0𝑚×𝑚 where 𝐿1 ∈ ℜ𝑛×𝑛 and 𝐿2 ∈ ℜ𝑛×𝑚 . Note that since the last 𝑚 agents are the leaders, the last 𝑚 rows of 𝐿 are all equal to zero. In the sequel, we assume that the communication graph satisfies the following assumption. Assumption 1. The directed graph  is acyclic, and for each follower, there exists at least one leader that has a directed path to it. Lemma 1 (Meng et al. 14 ). Under Assumption 1, 𝐿1 is invertible, all the eigenvalues of 𝐿1 have positive real parts, each entry of −𝐿−1 𝐿2 is non-negative, and each row of −𝐿−1 𝐿2 has a sum equal to one. 1 1 Proposition 1 (Qin et al. 49 ). A directed acyclic graph  can be relabeled such that its Laplacian matrix is lower triangular matrix. Definition 1 ( Rockafellar 50 ). A set  ⊆ ℜ is said to be convex if (1 − 𝜆)𝑥 + 𝜆𝑦 ∈ , whenever 𝑥, 𝑦 ∈  and 0 ≤ 𝜆 ≤ 1. { } The convex hull 𝐶𝑜(𝑋) of a finite set of points 𝑋 = 𝑥1 , ..., 𝑥𝑛 is the minimal convex set containing all points in 𝑋. That is {∑𝑛 } ∑ 𝑛 𝐶𝑜(𝑋) = 𝛼 𝑥 |𝑥 ∈ 𝑋, 𝛼𝑖 ∈ ℜ, 𝛼𝑖 ≥ 0, 𝑖=1 𝛼𝑖 = 1 . 𝑖=1 𝑖 𝑖 | 𝑖 3 OUTPUT CONTAINMENT CONTROL: AN OFFLINE AND NON-OPIMAL SOLUTION In this section, the output containment control problem is first introduced, and some standard assumptions are listed. Then, a distributed dynamic output feedback control protocol is introduced for each follower that uses only the relative output measured data of the followers and the information which is broadcasted through the communication network by neighbors. The output containment control problem is then formulated into a linear cooperative output regulation problem and a non-optimal offline solution is provided. Consider a set of agents with 𝑛 heterogeneous followers whose models are described as 𝑥̇ 𝑖 = 𝐴𝑖 𝑥𝑖 + 𝐵𝑖 𝑢𝑖 , (2) 𝑦𝑖 = 𝐶𝑖 𝑥𝑖 (3) and a set of 𝑚 homogeneous leaders as 𝜔̇ 𝑘 = 𝑆𝜔𝑘 , (4) 𝑦𝑘 = 𝐷𝜔𝑘 (5) where 𝑖 ∈  is the set of followers, 𝑘 ∈  is the set of leaders, 𝑥𝑖 ∈ ℜ𝑁𝑖 is the state of agent 𝑖, 𝑢𝑖 ∈ ℜ𝑝𝑖 is its control input, and 𝑦𝑖 ∈ ℜ𝑞 is its output, 𝜔𝑘 ∈ ℜ𝑞̄ is the state of leader 𝑘 and 𝑦𝑘 ∈ ℜ𝑞 is its output. The following standard assumptions are made on the dynamics of agents 51,52 . Assumption 2. The pairs (𝐴𝑖 , 𝐵𝑖 ) for 𝑖 ∈  are stabilizable. Assumption 3. The pairs (𝐴𝑖 , 𝐶𝑖 ) for 𝑖 ∈  are detectable, and 𝐶𝑖 for 𝑖 ∈  , are full row rank. Assumption 4. The leaders’ dynamics in (4)-(5) are marginally stable, and 𝐷 is full row rank. Assumption 5. The linear matrix equations Π𝑖 𝑆 = 𝐴𝑖 Π𝑖 + 𝐵𝑖 Γ𝑖 , 𝐷 = 𝐶𝑖 Π𝑖 (6) have unique solutions Π𝑖 ∈ ℜ𝑁𝑖 ×𝑞̄ and Γ𝑖 ∈ ℜ𝑝𝑖 ×𝑞̄ for all 𝑖 ∈  . Assumption 6. Each follower has access only to the relative output measured data between itself and its neighbors, and the information which is gotten by its neighbors, i.e., the absolute output measurements of followers are not available. Assuming 𝐶𝑖 to be full row rank in Assumption 3, is a standard assumption for output feedback (See Gadewadikar et al. 53 ) which is made to avoid redundant measurements. Furthermore, the transmission zeros condition (Huang 51 , Assumption 1.4) is a standard assumption which is satisfied if 𝐶𝑖 is required to be full row rank. Therefore, Assumption 3 is a standard assumption. 5 Regarding Assumption 4, it is worth to mention that, in containment control problem, the leaders’ dynamic cannot be unstable, due to the fact that convex hull should be bounded, and it is not reasonable to have unbounded convex hull. Assumption 6 is made here to relax the need for the full or relative state measurements in the existing literature, which might not be feasible in some scenarios. The output containment control problem is now defined as follows. Definition 2. The multi-agent system (2)-(5) achieves the output containment if the followers outputs, converge to the convex hull spanned by the leaders outputs. That is, ( ( )) 𝑙𝑖𝑚 𝑑𝑖𝑠𝑡 𝑦𝑖 (𝑡) , 𝐶𝑜 𝑦𝑘 (𝑡) , 𝑘 ∈  = 0, ∀𝑖 ∈  . (7) 𝑡→∞ Now, define the containment error of the follower 𝑖 as 𝑛 ∑ ∑ 𝑛+𝑚 𝛿𝑖𝑘 (𝑦𝑖 − 𝑦𝑘 ) (8) 𝑛+𝑚 ∑ ( ) ( ) Δ𝑘 1𝑛 ⊗ 𝑦𝑘 𝑒 = 𝐿1 ⊗ 𝐼𝑞 𝑌𝐹 − (9) 𝑒𝑖 = 𝑎𝑖𝑗 (𝑦𝑖 − 𝑦𝑗 ) + 𝑘=𝑛+1 𝑗=1 which, in compact form, yields 𝑘=𝑛+1 where 𝑒 and 𝑌𝐹 are the stack column vectors of 𝑒𝑖 and 𝑦𝑖 for 𝑖 ∈  , respectively, 𝐿1 is defined in (1) and Δ𝑘 denotes the connection weight of leader 𝑘, which is a diagonal matrix with diagonal elements 𝛿𝑖𝑘 = 𝑎𝑖𝑘 where 𝑖 ∈  and 𝑘 ∈ . Remark 1. lim𝑡→∞ 𝑒(𝑡) = 0 with 𝑒 defined in (9) implies that the followers’ outputs converge to the convex hull spanned by the leaders’ outputs ∑ ( 𝑛+𝑚 𝐿−1 Δ𝑘 1𝑛 ⊗ 𝑦𝑘 1 ) (10) 𝑘=𝑛+1 where 𝐿1 is defined in (1). Note that, 𝐿2 in (1) can be expressed as [ ] 𝐿2 = − Δ𝑛+1 1𝑛 , ..., Δ𝑛+𝑚 1𝑛 (11) then, one has ∑ ( 𝑛+𝑚 ) 𝐿−1 Δ𝑘 1𝑛 ⊗ 𝑦𝑘 = −(𝐿−1 𝐿2 ⊗ 𝐼𝑞 )𝑌𝑅 . 1 1 (12) 𝑘=𝑛+1 where 𝑌𝑅 is the stack column vector of 𝑦𝑘 for 𝑘 ∈ . To solve the containment control problem in Definition 2, the following distributed dynamic measurement relative output feedback control protocol is introduced in this paper. 𝑢𝑖 =𝐾𝑖1 𝜉𝑖 + 𝐾𝑖2 𝜂𝑖 , (13) 𝑛 𝑛+𝑚 ∑ ∑ 𝜉̇ 𝑖 =𝐴𝑖 𝜉𝑖 + 𝐵𝑖 𝑢𝑖 − 𝜇𝑖 𝐹𝑖 ( 𝑎𝑖𝑗 ((𝑦𝑗 − 𝑦𝑖 ) + 𝑦̂𝑖 − 𝑦̂𝑗 ) + 𝛿𝑖𝑘 ((𝑦𝑘 − 𝑦𝑖 ) + 𝑦̂𝑖 − 𝐷𝜔𝑘 ), 𝑗=1 𝑛 ∑ 𝜂̇ 𝑖 =𝑆 𝜂𝑖 + 𝛽( 𝑗=1 (14) 𝑘=𝑛+1 ∑ 𝑛+𝑚 𝑎𝑖𝑗 (𝜂𝑗 − 𝜂𝑖 ) + 𝛿𝑖𝑘 (𝜔𝑘 − 𝜂𝑖 )) (15) 𝑘=𝑛+1 for 𝑖 ∈  , where 𝜉𝑖 ∈ ℜ𝑁𝑖 denotes the estimate of the state of agent 𝑖, 𝑦̂𝑖 = 𝐶𝑖 𝜉𝑖 denotes the estimate of the output 𝑦𝑖 , 𝜂𝑖 ∈ ℜ𝑞̄ denotes the estimate of the convex combination of the leaders’ states. Moreover, 𝜇𝑖 > 0 and 𝐹𝑖 ∈ ℜ𝑁𝑖 ×𝑞 are coupling gains and gain matrices, respectively, to be designed in Lemma 3, and 𝛽 > 0 is a coupling gain. Finally, 𝐾𝑖1 ∈ ℜ𝑝𝑖 ×𝑁𝑖 and 𝐾𝑖2 ∈ ℜ𝑝𝑖 ×𝑞̄ are design feedback and feed-forward gain matrices, respectively, for 𝑖 ∈  . Note that the (15) is a dynamic compensator which its compact form can be regarded as an observer for the convex combination of the leaders’ states 25 , and (14) is a distributed observer for the state of 𝑖th follower, i.e., 𝑥𝑖 . Note also that absolute output measurements of followers are not used in this control protocol. 6 Remark 2. Since the leaders act as command generators and are usually equipped with more powerful sensors, we reasonably assume that they know their own states and can broadcast them to their neighbors. This assumption is a standard assumption in cooperative control with relative measurements literature (For instant see (Zhang et al. 54 , Section IV) and (Wu et al. 55 , Eqn. (6)). However, the followers are assumed to have not access to their absolute output measurements. Remark 3. Note that the leaders are autonomous agents in the sense that they do not receive information from other agents and acts autonomously to guide other followers. That is, leaders are not being influenced by followers and, therefore, the observer design in (14) and as well as the control design in (13) are only designed for the followers to assure that they converge into a convex hull of the leaders’ output trajectory, which is the ultimate goal of the output containment control problem. Consider the distributed state observer (14) and let the global state estimation error be 𝑋̃ = 𝑋 − 𝜉 (16) where 𝑋 and 𝜉 are the stack column vectors of 𝑥𝑖 and 𝜉𝑖 , for 𝑖 ∈  , respectively. Using (14) and (2), the dynamics of the global state estimation error yields ( ( ) ) 𝑋̃̇ = 𝐴 − 𝜇𝐹 𝐿 ⊗ 𝐼 𝐶̄ 𝑋̃ (17) 1 𝑞 where 𝐴 = 𝑑𝑖𝑎𝑔(𝐴1 , ..., 𝐴𝑛 ), 𝐶̄ = 𝑑𝑖𝑎𝑔(𝐶1 , ..., 𝐶𝑛 ), 𝜇 = 𝑑𝑖𝑎𝑔(𝐼𝑁1 ⊗ 𝜇1 , ..., 𝐼𝑁𝑛 ⊗ 𝜇𝑛 ), and 𝐹 = 𝑑𝑖𝑎𝑔(𝐹1 , ..., 𝐹𝑛 ). Before proceeding, the following technical results are required. Lemma 2. Let Assumptions 1 and 3 be satisfied. Let 𝜆𝑖 be the 𝑖-th eigenvalue of 𝐿1 . Design the observer gain 𝐹𝑖 in (14) for 𝑖 ∈  as 𝐹𝑖 = Φ𝑖 𝐶𝑖𝑇 𝑅−1 𝑖 (18) where Φ𝑖 is the unique positive definite solution of the observer ARE 𝐴𝑖 Φ𝑖 + Φ𝑖 𝐴𝑇𝑖 + 𝐸𝑖 − Φ𝑖 𝐶𝑖𝑇 𝑅−1 𝐶𝑖 Φ𝑖 = 0 𝑖 (19) with 𝐸𝑖 = 𝐸𝑖𝑇 ∈ ℜ𝑁𝑖 ×𝑁𝑖 and 𝑅𝑖 = 𝑅𝑇𝑖 ∈ ℜ𝑞×𝑞 positive definite design matrices. Then, the global state estimation error dynamic (17) is asymptotically stable if the coupling gain satisfies 1 (20) 𝜇𝑖 ≥ 2𝜆𝑖 min where 𝜆𝑖 min = min𝑖∈𝑁̄ 𝑖 Re(𝜆𝑖 ). Proof. One can show that, using Proposition 1 and the same procedure as Theorem 3 in Fax et al. 4 , if all the matrices 𝐴𝑖 − 𝜇𝑖 𝜆𝑖 𝐹𝑖 𝐶𝑖 , ∀𝑖 ∈  are Hurwitz, then, the global state estimation error dynamic (17) is asymptotically stable. Under Assumption 1 and based on Lemma 1, all the eigenvalues of 𝐿1 have positive real parts. The rest of proof is similar to that of Theorem 1 in Zhang et al. 54 and is omitted. Remark 4. It is worth noting that, the requirement for acycle assumption in Lemma 2 can be obviated if all agents have identical dynamics (See Zhang et al. 54 for more details). The composition of (2)-(5), the containment error (9), and the control laws (13)-(15) result in the following closed-loop system 𝑥̇ 𝑐 = 𝐴𝑐 𝑥𝑐 + 𝐵𝑐 Ω ̄ Ω̇ = 𝑆Ω (21) 𝑒 = 𝐶𝑐 𝑥𝑐 + 𝐷𝑐 Ω (23) (22) where ̄ 1 𝐵𝐾 ̄ 2⎤ 0𝑁×𝑚𝑞̄ ⎡ 𝐴 𝐵𝐾 ⎡ ⎤ [ ] ⎥ , 𝐶𝑐 = (𝐿 ⊗ 𝐼 )𝐶̄ 0 ̄ 2 ⎥ , 𝐵𝑐 = ⎢ 𝐴𝑐 = ⎢ 𝐴𝑐21 𝐴𝑐22 𝐵𝐾 (24) 0𝑁×𝑚𝑞̄ 1 𝑞 𝑛𝑞×𝑁 0𝑛𝑞×𝑛 ̄ 𝑞̄ , 𝐷𝑐 = 𝐿2 ⊗ 𝐷, ⎢ ⎥ ⎢ ⎥ 0 0 𝐴 −(𝐿 ⊗ 𝛽𝐼 ) ⎣ 𝑛𝑞×𝑁 ⎣ ̄ 𝑛𝑞×𝑁 ̄ 𝑐33 ⎦ 2 𝑞̄ ⎦ [ 𝑇 𝑇 𝑇 ]𝑇 𝑥𝑐 = 𝑋 𝜉 𝜂 is the closed-loop state, 𝜂 is the stack column vectors of 𝜂𝑖 , Ω is the stack column vectors of 𝜔𝑘 , 𝐴𝑐21 = ̄ 𝐴𝑐22 = 𝐴 + 𝐵𝐾 ̄ 1 − 𝜇𝐹 (𝐿1 ⊗ 𝐼𝑞 )𝐶, ̄ 𝐴𝑐33 = 𝑆̄ − (𝐿1 ⊗ 𝛽𝐼𝑞̄ ) , 𝑆̄ = 𝐼𝑚 ⊗ 𝑆, 𝑆̄ = 𝐼𝑛 ⊗ 𝑆, 𝐴 = 𝑑𝑖𝑎𝑔(𝐴1 , ..., 𝐴𝑛 ), 𝜇𝐹 (𝐿1 ⊗ 𝐼𝑞 )𝐶, 𝑛 ∑ 𝐵̄ = 𝑑𝑖𝑎𝑔(𝐵1 , ..., 𝐵𝑛 ), 𝐶̄ = 𝑑𝑖𝑎𝑔(𝐶1 , ..., 𝐶𝑛 ), 𝑁 = 𝑁𝑖 , 𝐾1 = 𝑑𝑖𝑎𝑔(𝐾11 , ..., 𝐾𝑛1 ) and 𝐾2 = 𝑑𝑖𝑎𝑔(𝐾12 , ..., 𝐾𝑛2 ). 𝑖=1 7 Now, by using (21)-(24), we are ready to describe the output containment control problem, defined in Definition 2, as a cooperative output regulation problem as follows. Problem 1 (Cooperative output regulation problem). Given the multi-agent system (2)-(5) and digraph , find the control protocol of the form (13) such that the closed-loop system (21)-(23) has the following properties: Property 1 The origin of the closed-loop system (21)-(23) with Ω being set to zero is asymptotically stable, i.e., the matrix 𝐴𝑐 in (24) is Hurwitz. Property 2 For any initial conditions 𝑥𝑖 (0), 𝜉𝑖 (0), 𝜂𝑖 (0), 𝑖 ∈  and 𝜔𝑘 (0), 𝑘 ∈ , lim 𝑒 (𝑡) = 0. 𝑡→∞ Remark 5. The Property 1 indicates that all solutions of the closed-loop system (21)-(23) forget their initial conditions and converge to zero when the exosystems (i.e., leaders) are disconnected. Moreover, Properties 1 and 2 together indicate that all solutions of the closed-loop system (21)-(23) forget their initial conditions and converge to some solutions, depending only on the exosignals (i.e., 𝜔𝑘 for 𝑘 ∈ ). (See (Haghshenas et al. 25 , Problem 3) and (Huang 52 , Problem 1 and 2) for more details) Remark 6. Note that, the error given in (23) is actually the output containment error of (9). Therefore, based on Remark 1, by solving Problem 1, the output containment control problem, described in Definition 2, is also solved. In order to solve Problem 1, we present following lemma on the closed-loop system (21)-(23). Lemma 3. Suppose that the closed-loop system (21)-(23) satisfies Property 1, under the distributed control laws (13)-(15). Then, lim 𝑒(𝑡) = 0, if there exists a matrix 𝑋𝑐 that satisfies the following linear matrix equations: 𝑡→∞ { 𝐴𝑐 𝑋𝑐 + 𝐵𝑐 = 𝑋𝑐 𝑆̄ (25) 𝐶𝑐 𝑋𝑐 + 𝐷𝑐 = 0𝑛𝑞×𝑚𝑞̄ Proof. Let 𝑥̃ 𝑐 = 𝑥𝑐 − 𝑋𝑐 Ω. Using (25), one has 𝑥̃̇ 𝑐 = 𝐴𝑐 𝑥̃ 𝑐 (26) Since 𝐴𝑐 is Hurwitz, lim 𝑥̃ 𝑐 (𝑡) = 0. Using (25) and some manipulation, (23) can be rewritten as 𝑡→∞ 𝑒 = 𝐶𝑐 𝑥̃ 𝑐 (27) then, it follows from lim 𝑥̃ 𝑐 (𝑡) = 0, that lim 𝑒(𝑡) = 0. 𝑡→∞ 𝑡→∞ Now the following theorem shows that Problem 1 can be solved using the distributed control laws (13)-(15). Theorem 1. Consider the multi-agent system (2)-(5). Let Assumptions 1 and 5 be satisfied and 𝜇𝑖 and 𝐹𝑖 in the control protocol (13) be designed as of Lemma 2. Design 𝐾𝑖1 such that 𝐴𝑖 + 𝐵𝑖 𝐾𝑖1 is Hurwitz and 𝐾𝑖2 using 𝐾𝑖2 = Γ𝑖 − 𝐾𝑖1 Π𝑖 . (28) where Γ𝑖 and Π𝑖 are solutions of (6). Then, Problem 1 is solved using the distributed control laws (13)-(15), for any positive constant 𝛽. Proof. For nonsingular matrix ⎡ 𝐼𝑁 0𝑁×𝑁 0𝑁×𝑛𝑞̄ ⎤ 𝑇 = ⎢ 𝐼𝑁 𝐼𝑁 0𝑁×𝑛𝑞̄ ⎥ , ⎢ ⎥ 0𝑛𝑞×𝑁 𝐼𝑛𝑞̄ ⎦ ⎣ 0𝑛𝑞×𝑁 ̄ ̄ one can verify that 𝑇 −1 ̄ 1 ̄ 1 ̄ 2 𝐵𝐾 𝐵𝐾 ⎡ 𝐴 + 𝐵𝐾 ⎤ ̄ ⎢ ⎥ 0𝑁×𝑁 𝐴 − 𝜇𝐹 (𝐿1 ⊗ 𝐼𝑞 )𝐶 0𝑁×𝑛𝑞̄ 𝐴𝑐 𝑇 = ⎢ ⎥ ⎣ 0𝑛𝑞×𝑁 0𝑛𝑞×𝑁 𝑆̄ − (𝐿1 ⊗ 𝛽𝐼𝑞̄ ) ⎦ ̄ ̄ (29) which has the block-triangular structure. Under Assumption 2, there exists 𝐾𝑖1 , ∀𝑖 ∈  such that 𝐴𝑖 + 𝐵𝑖 𝐾𝑖1 is Hurwitz. Based on Lemma 2, 𝐴 − 𝜇𝐹 (𝐿1 ⊗ 𝐼𝑞 )𝐶̄ is Hurwitz, if positive constants 𝜇𝑖 and 𝐹𝑖 , ∀𝑖 ∈  are chosen as (20) and (18), respectively. Based on Lemma 1, under Assumption 1, all the eigenvalues of 𝐿1 have positive real parts. Therefore, under Assumption 4, one 8 can see that 𝑆̄ − (𝐿1 ⊗ 𝛽𝐼𝑞̄ ) is Hurwitz for any positive constant 𝛽. Thus, under the distributed control laws (13)-(15), Property 1 in Problem 1 is satisfied. Next we verify the Property 2 in Problem 1. Let 𝐾𝑖2 , ∀𝑖 ∈  be given by (28). Then, under Assumption 5, one has ( ) ̄ 1 )Π + 𝐵𝐾 ̄ 2 = Π 𝐼𝑛 ⊗ 𝑆 (𝐴 + 𝐵𝐾 (30) where Π = 𝑑𝑖𝑎𝑔(Π𝑖 ) for 𝑖 ∈  , Let 𝐿2 ⊗ 𝐷) ⎤ ⎡ −𝐶̄ −1 (𝐿−1 1 −1 −1 ⎢ ̄ 𝑋𝑐 = −𝐶 (𝐿1 𝐿2 ⊗ 𝐷) ⎥ . ⎢ ⎥ 𝐿2 ⊗ 𝐼𝑞̄ ) ⎦ ⎣ −(𝐿−1 1 (31) ̄ 1 )𝐶̄ −1 (𝐿−1 𝐿2 ⊗ 𝐷) + 𝐵𝐾 ̄ 2 (𝐿−1 𝐿2 ⊗ 𝐼𝑞̄ ) ⎤ ⎡ (𝐴 + 𝐵𝐾 1 1 −1 −1 ̄ 1 )𝐶̄ (𝐿 𝐿2 ⊗ 𝐷) + 𝐵𝐾 ̄ 2 (𝐿−1 𝐿2 ⊗ 𝐼𝑞̄ ) ⎥ 𝐴𝑐 𝑋𝑐 + 𝐵𝑐 = − ⎢ (𝐴 + 𝐵𝐾 1 1 ⎢ ⎥ ⎣ (𝑆̄ − (𝐿1 ⊗ 𝛽𝐼𝑞̄ ))(𝐿−1 𝐿2 ⊗ 𝐼𝑞̄ ) + (𝐿2 ⊗ 𝛽𝐼𝑞̄ ) ⎦ 1 𝐿2 ⊗ 𝐷)𝑆̄ ⎤ ⎡ 𝐶̄ −1 (𝐿−1 1 −1 −1 ̄ = − ⎢ 𝐶̄ (𝐿1 𝐿2 ⊗ 𝐷)𝑆̄ ⎥ = 𝑋𝑐 𝑆. ⎢ ⎥ −1 ̄ ⎣ (𝐿 𝐿2 ⊗ 𝐼𝑞̄ )𝑆 ⎦ (32) Δ Then, using (21)-(23) and (30), yields 1 Note that ̄ −1 𝐿 ⊗ 𝐼 ) = (𝐼 ⊗ 𝑆)(𝐿−1 𝐿 ⊗ 𝐼 ) 𝑆(𝐿 2 𝑞̄ 𝑛 2 𝑞̄ 1 1 ̄ = (𝐿−1 𝐿2 ⊗ 𝐼𝑞̄ )𝑆. 1 (33) Moreover, 𝐿2 ⊗ 𝐷) + (𝐿2 ⊗ 𝐷) 𝐶𝑐 𝑋𝑐 + 𝐷𝑐 = −(𝐿1 ⊗ 𝐼𝑞 )𝐶̄ 𝐶̄ −1 (𝐿−1 1 = 0. (34) Hence, 𝑋𝑐 satisfies the linear matrix equations (25) and it follows from Lemma 3 that property 2 is also satisfied, i.e., lim 𝑒(𝑡) = 0. This completes the proof. 𝑡→∞ Remark 7. It is seen from (31) in the proof of Theorem 1 that, Assumption 1-5 guarantees the feasibility of the solution in Lemma 3, i.e., 𝑋𝑐 . Remark 8. The graph condition in Haghshenas et al. 25 and Zuo et al. 32 is unnecessarily strong. In this paper, by defining the output containment error as (9), the restrictive required assumption of strongly connected communication graph in (Haghshenas et al. 25 , Assumption 6) and (Zuo et al. 32 , Assumption 1) is relaxed to a milder assumption of communication graph with spanning forest. Remark 9. The solutions to the output regulator equations (6) as well as the distributed observer (15) need complete knowledge of leaders’ dynamics. This knowledge, however, is not available to the followers in many applications. In order to obviate the requirement of the leaders’ dynamics in (15), a distributed adaptive observer is designed for convex combination of the leaders’ states in Section 4. Optimality is next implicitly incorporated in the design of the containment control problem in Section 5 to optimize the transient containment errors of agents. An off-policy RL algorithm is developed to solve the optimal output containment control problem online in real time and without requiring the knowledge of the leaders’ dynamics. 4 DISTRIBUTED ADAPTIVE OBSERVER FOR LEADERS CONVEX HULL In this section, a distributed adaptive observer is developed to estimate convex combination of the leaders’ states and outputs for each follower, as well as the leaders’ dynamics, simultaneously. To estimate the convex combination of the leaders’ states and outputs for each follower, consider the following distributed adaptive observer 𝑛 ∑ 𝜂̂̇ 𝑖 = 𝑆𝑖 𝜂̂𝑖 + 𝛽2 ( 𝑗=1 ∑ 𝑛+𝑚 𝑎𝑖𝑗 (𝜂̂𝑗 − 𝜂̂𝑖 ) + 𝑘=𝑛+1 𝛿𝑖𝑘 (𝜔𝑘 − 𝜂̂𝑖 )) (35) 9 where 𝑛 ∑ 𝑆̇ 𝑖 = 𝛽1 ( ∑ 𝛿𝑖𝑘 (𝑆 − 𝑆𝑖 )) (36) 𝑘=𝑛+1 𝑛+𝑚 𝑗=1 𝑛 𝐷̇ 𝑖 = 𝛽3 ( ∑ 𝑛+𝑚 𝑎𝑖𝑗 (𝑆𝑗 − 𝑆𝑖 ) + 𝑎𝑖𝑗 (𝐷𝑗 − 𝐷𝑖 ) + ∑ 𝛿𝑖𝑘 (𝐷 − 𝐷𝑖 )) (37) 𝑘=𝑛+1 𝑗=1 𝑦0𝑖 = 𝐷𝑖 𝜂̂𝑖 (38) ̄ 𝑞̄ where 𝑆𝑖 ∈ ℜ𝑞× and 𝐷𝑖 ∈ ℜ𝑞×𝑞̄ , for 𝑖 ∈  , are the estimation of the leaders’ dynamics 𝑆 and 𝐷 respectively, 𝜂̂𝑖 ∈ ℜ𝑞̄ 𝑞 and 𝑦0𝑖 ∈ ℜ are the estimation of convex combination of the leaders’ states and outputs for 𝑖th follower, respectively, and 𝛽1 , 𝛽2 , 𝛽3 > 0. The following lemma is used in the proof of Theorem 2 for the observer design. Lemma 4 (Cai et al. 56 ). Consider the following system 𝜐̇ = 𝜀Z𝜐 + Z1 (𝑡)𝜐 + Z2 (𝑡) 𝑞̄ (39) 𝑞× ̄ 𝑞̄ 𝑞× ̄ 𝑞̄ 𝑞̄ where 𝜐 ∈ ℜ , Z ∈ ℜ is asymptotically stable, 𝜀 is a positive constant, Z1 (𝑡) ∈ ℜ and Z2 (𝑡) ∈ ℜ are bounded and continuous for all 𝑡 ≥ 𝑡𝑜 . If Z1 (𝑡) and Z2 (𝑡) decay to zero exponentially as time go to infinity, then, for any 𝜐(𝑡0 ) and any 𝜀 > 0, 𝜐(𝑡) decays to zero exponentially as time go to infinity. Theorem 2. Consider the leader dynamics (4)-(5), and the adaptive observer (35)-(37). Let 𝑆̃𝑖 = 𝑆𝑖 − 𝑆, 𝐷̃ 𝑖 = 𝐷𝑖 − 𝐷 be leaders’ dynamics estimation errors and 𝜂̃𝑖 = 𝜂̂𝑖 − 𝜔∗𝑖 and 𝑦̃0𝑖 (𝑡) = 𝐷𝑖 𝜂̂𝑖 − 𝐷𝜔∗𝑖 be 𝑖th follower state estimation error of the convex ] [ 𝐿2 𝑖 ⊗ 𝐼𝑞̄ )𝜔 with 𝜔 = 𝑐𝑜𝑙(𝜔1 , ..., 𝜔𝑚 ). Then, combination of the leaders’ states and outputs, respectively, where 𝜔∗𝑖 is −( 𝐿−1 1 for any initial conditions 𝑆̃𝑖 (0), 𝐷̃ 𝑖 (0), 𝑦̃0𝑖 (0) and 𝜂̃𝑖 (0), one obtains 1. for any positive constant 𝛽1 , ∀𝑖 ∈  , lim𝑡→∞ 𝑆̃𝑖 (𝑡) = 0 exponentially; 2. for any positive constant 𝛽3 , ∀𝑖 ∈  , lim𝑡→∞ 𝐷̃ 𝑖 (𝑡) = 0 exponentially; 3. for any positive constant 𝛽1 and 𝛽2 , ∀𝑖 ∈  , lim𝑡→∞ 𝜂̃𝑖 (𝑡) = 0 exponentially; 4. for any positive constant 𝛽1 , 𝛽2 and 𝛽3 , ∀𝑖 ∈  , lim𝑡→∞ 𝑦̃0𝑖 (𝑡) = 0 exponentially. Proof. The dynamics of the global leaders’ dynamics estimation error can be written as 𝑆̃̇ = −𝛽 (𝐿 ⊗ 𝐼 )(𝑆 + (𝐿−1 𝐿 ⊗ 𝐼 )(1 ⊗ 𝑆)) 1 1 𝑞 𝑐 1 2 𝑞̄ 𝑚 (40) where 𝑆𝑐 = 𝑐𝑜𝑙(𝑆1 , ..., 𝑆𝑛 ). Using Lemma 1, it is easy to show that −(𝐿−1 𝐿2 ⊗ 𝐼𝑞̄ )(1𝑚 ⊗ 𝑆) = (1𝑛 ⊗ 𝑆). 1 (41) 𝑆̃̇ = −𝛽1 (𝐿1 ⊗ 𝐼𝑞̄ )𝑆̃ (42) ̃̇ = −𝛽1 (𝐼𝑞̄ ⊗ 𝐿1 ⊗ 𝐼𝑞̄ )𝑉 𝑒𝑐(𝑆). ̃ 𝑉 𝑒𝑐(𝑆) (43) Then, or equivalently ̃ According to Assumption 1 and Lemma 1, all the eigenvalues of 𝐿1 have positive real parts. Hence, lim𝑡→∞ 𝑉 𝑒𝑐(𝑆(𝑡)) =0 ̃ ̃ exponentially, which yields lim𝑡→∞ 𝑆𝑖 (𝑡) = 0, ∀𝑖 ∈  . Similar to part (1), one can see that lim𝑡→∞ 𝐷𝑖 (𝑡) = 0, ∀𝑖 ∈  exponentially for any positive constant 𝛽3 . Next, it remains to prove part (3) and part (4), i.e. lim𝑡→∞ 𝜂̃𝑖 (𝑡) = 0 and lim𝑡→∞ 𝑦̃0𝑖 (𝑡) = 0. To this end, using (35) and some manipulations yields 𝑛 ∑ 𝜂̃̇ 𝑖 =𝑆𝑖 𝜂̂𝑖 + 𝛽2 ( ∑ 𝑛+𝑚 𝑎𝑖𝑗 (𝜂̂𝑗 − 𝜂̂𝑖 ) + 𝑗=1 [ ] 𝛿𝑖𝑘 (𝜔𝑘 − 𝜂̂𝑖 )) + ( 𝐿−1 𝐿2 𝑖 ⊗ 𝐼𝑞̄ )(𝐼𝑚 ⊗ 𝑆)𝜔 1 𝑘=𝑛+1 𝑛 𝑛+𝑚 ∑ ∑ 𝛿𝑖𝑘 (𝜔𝑘 − 𝜂̂𝑖 )) + 𝑆 𝜂̃𝑖 + 𝑆̃𝑖 𝜂̃𝑖 + 𝑆̃𝑖 𝜔∗𝑖 . =𝛽2 ( 𝑎𝑖𝑗 (𝜂̂𝑗 − 𝜂̂𝑖 ) + 𝑗=1 𝑘=𝑛+1 (44) 10 The global form of (44) can be written as 𝜂̃̇ =((𝐼𝑛 ⊗ 𝑆))𝜂̃ + 𝑆̃𝑑 𝜂̃ + 𝑆̃𝑑 𝜔∗ − 𝛽2 (𝐿2 ⊗ 𝐼𝑞̄ )𝜔 − 𝛽2 (𝐿1 ⊗ 𝐼𝑞̄ )(𝜂̃ − (𝐿−1 𝐿2 ⊗ 𝐼𝑞̄ )𝜔) 1 ∗ =((𝐼𝑛 ⊗ 𝑆) − 𝛽2 (𝐿1 ⊗ 𝐼𝑞̄ ))𝜂̃ + 𝑆̃𝑑 𝜂̃ + 𝑆̃𝑑 𝜔 (45) where 𝜂̃ = 𝑐𝑜𝑙(𝜂̃1 , ..., 𝜂̃𝑛 ), 𝜔∗ = 𝑐𝑜𝑙(𝜔∗1 , ..., 𝜔∗𝑛 ) and 𝑆̃𝑑 = 𝑑𝑖𝑎𝑔(𝑆̃1 , ..., 𝑆̃𝑛 ). According to Assumption 4, for any 𝛽1 , 𝛽2 > 0, the matrix ((𝐼𝑛 ⊗ 𝑆) − 𝛽2 (𝐿1 ⊗ 𝐼𝑞̄ )) is Hurwitz, and 𝑆̃𝑑 𝜔∗ decays to zero exponentially. Hence, applying Lemma 4 we conclude that lim𝑡→∞ 𝜂̃𝑖 (𝑡) = 0 exponentially. Adding and subtracting 𝐷𝑖 𝜔∗𝑖 to the right hand side of 𝑦̃0𝑖 (𝑡), we have 𝑦̃0𝑖 (𝑡) = 𝐷𝑖 (𝜂̂𝑖 − 𝜔∗𝑖 ) + (𝐷𝑖 − 𝐷)𝜔∗𝑖 . (46) Therefore, if lim𝑡→∞ 𝜂̃𝑖 (𝑡) = 0 and lim𝑡→∞ 𝐷̃ 𝑖 (𝑡) = 0, then lim𝑡→∞ 𝑦̃0𝑖 (𝑡) = 0, which completes the proof. 5 OPTIMAL OUTPUT CONTAINMENT CONTROL PROBLEM In this section, first an optimal formulation for the output containment control problem is introduced. Then, an off-policy reinforcement learning (RL) algorithm is proposed to drive the followers optimally into a convex hull spanned by the leaders’ outputs. At first, it is assumed that followers can have access to their states and the leaders’ states and dynamics. Then, this restrictive assumption is relaxed by combining the RL based optimal control presented in this section with distributed adaptive observer designed in Section 4 and the distributed observer (14). 5.1 Problem Formulation and Its Offline Solution The aim of optimal output containment control problem is to design the distributed control laws (13)-(15) such that the followers converge into a convex hull spanned by the leaders’ outputs, and at the same time, the transient output containment error captured by (9) as well as the followers’ control efforts are minimized. To do so, an optimal output containment control problem is defined as follows. Problem 2 (Optimal output containment control problem). Consider the control protocol (13) and let the distributed state observer (14) be designed as of Lemma 2. Moreover, let the distributed observers (35)-(37) be designed as of Theorem 2. Design the gain matrices 𝐾𝑖1 and 𝐾𝑖2 , ∀𝑖 ∈  in the control protocol (13), so that not only properties 1 and 2 in Problem 1 are satisfied, but also the following discounted performance function is minimized. ∞ 𝑉𝑖 (𝑡) = ∫ 𝑒−𝛾𝑖 (𝜏−𝑡) (𝑒̄𝑇𝑖 𝑄𝑖 𝑒̄𝑖 + 𝑢𝑖 𝑇 𝑊𝑖 𝑢𝑖 )𝑑𝜏 (47) 𝑡 𝑝 for 𝑖 ∈  ,where 𝑄𝑖 ∈ ℜ𝑞×𝑞 and 𝑊𝑖 = 𝑑𝑖𝑎𝑔(𝑤1𝑖 , ..., 𝑤𝑖 𝑖 ) ∈ ℜ𝑝𝑖 ×𝑝𝑖 are symmetric positive definite weight matrices, 𝑤𝑗𝑖 > 0 for 𝑗 = 1, ..., 𝑝𝑖 , 𝛾𝑖 > 0 is the discount factor, and 𝑒̄𝑖 = 𝑦𝑖 − 𝐷𝜔∗𝑖 (48) ( ) 𝑒 = 𝐿1 ⊗ 𝐼𝑞 𝑒̄ (49) ( ) 𝑒̄ = 𝑌𝐹 + 𝐿−1 𝐿2 ⊗ 𝐼𝑞 𝑌𝑅 . 1 (50) [ ] is the containment error with 𝜔∗𝑖 = −( 𝐿−1 𝐿2 𝑖 ⊗ 𝐼𝑞̄ )𝜔, 𝜔 = 𝑐𝑜𝑙(𝜔1 , ..., 𝜔𝑚 ). 1 Remark 10. Note that (9) can be rewritten as follows where Therefore, according to Lemma 1, one can see that minimizing 𝑒̄ results in minimizing the output containment error (9). It was shown that if the state observer gains in (14) are designed as of Lemma 2, then 𝜉𝑖 → 𝑥𝑖 . Moreover, it was shown that if the distributed observers (35)-(37) are designed as of Theorem 2, then 𝑆𝑖 → 𝑆, 𝐷𝑖 → 𝐷, and 𝜂̂𝑖 → 𝜔∗𝑖 . Therefore, in steady-state, the control protocol (13) becomes 𝑢𝑖 = 𝐾𝑖1 𝑥𝑖 + 𝐾𝑖2 𝜔∗𝑖 . (51) 11 It is shown in the following that if this control protocol is designed to minimize (47), then the output containment control Problem 2 is solved. One can write (51) in the following form 𝑢𝑖 = 𝐾̄ 𝑖 𝑋̄ 𝑖 (52) where 𝐾̄ 𝑖 = [𝐾𝑖1 , 𝐾𝑖2 ] and 𝑋̄ 𝑖 (𝑡) = [𝑥𝑖 𝑇 , 𝜔∗𝑖 𝑇 ]𝑇 denotes an augmented state. The augmented dynamics is given by 𝑋̄̇ = 𝑃 𝑋̄ + 𝐵̄ 𝑢 𝑖 𝑖 𝑖 𝑖 𝑖 𝑒̄𝑖 = 𝐶̄𝑖 𝑋̄ 𝑖 with (53) (54) [ ] [ ] 𝐴𝑖 0 𝐵𝑖 ̄ 𝑃𝑖 = , 𝐵𝑖 = 0 𝑆 0 [ ] ̄ 𝐶𝑖 = 𝐶𝑖 −𝐷 . (55) (56) Now, the value function (47) can be written as the following quadratic form ∞ 𝑉 (𝑋𝑖 , 𝑢𝑖 ) = ∫ 𝑇 𝑒−𝛾𝑖 (𝜏−𝑡) 𝑋̄ 𝑖𝑇 (𝐶̄ 𝑖 𝑄𝑖 𝐶̄ 𝑖 + 𝐾̄ 𝑖𝑇 𝑊𝑖 𝐾̄ 𝑖 )𝑋̄ 𝑖 𝑑𝜏 𝑡 = 𝑋̄ 𝑖𝑇 Ψ𝑖 𝑋̄ 𝑖 . (57) Hamiltonian is defined as follows 𝑑𝑉 (𝑋𝑖 ) 𝑇 − 𝛾𝑖 𝑉 (𝑋𝑖 ) + 𝑋̄ 𝑖𝑇 (𝐶̄𝑖 𝑄𝑖 𝐶̄𝑖 + 𝐾̄ 𝑖𝑇 𝑊𝑖 𝐾̄ 𝑖 )𝑋̄ 𝑖 𝐻(𝑋̄ 𝑖 , 𝑢𝑖 , 𝑉 (𝑋𝑖 )) = 𝑑𝑡 / Then, using stationary condition 57 , i.e., 𝜕𝐻 𝜕𝑢𝑖 = 0, the optimal control gain in (52) is derived as follows (58) 𝑢∗𝑖 = 𝐾̄ 𝑖∗ 𝑋̄ 𝑖 (59) ∗ ∗ 𝐾̄ 𝑖∗ = [𝐾 1𝑖 , 𝐾 2𝑖 ] = −𝑊 −1 𝐵̄ 𝑇 Ψ𝑖 (60) with 𝑖 𝑖 where Ψ𝑖 satisfies the discounted algebraic Riccati equation (ARE) (61). Substituting (59), (60), and (57) into (58), yields the discounted ARE as follows 𝑇 𝑃𝑖𝑇 Ψ𝑖 + 𝑃𝑖 Ψ𝑖 − 𝛾𝑖 Ψ𝑖 + 𝐶̄𝑖 𝑄𝑖 𝐶̄𝑖 − Ψ𝑖 𝐵̄ 𝑖 𝑊𝑖−1 𝐵̄ 𝑖𝑇 Ψ𝑖 = 0. (61) Remark 11. Note that the ARE (61) and consequently the control gain (60) requires complete knowledge of the leaders’ dynamics. To learn the gains (60) in an online fashion without requiring complete knowledge of the leaders’ dynamics, an off-policy RL algorithm is designed in Subsection 5.2. Remark 12. It is shown in Modares et al. 58 that if discount factor 𝛾𝑖 in (47) satisfies 1∕2 ‖ ‖ 𝛾𝑖 ≤ 𝛾𝑖∗ = 2 ‖(𝐵̄ 𝑖 𝑊𝑖−1 𝐵̄ 𝑖𝑇 𝑄𝑖 ) ‖ , (62) ‖ ‖ then, the value function (47) is bounded for the control policy (59) and the closed-loop agents’ dynamics are stable. This is equivalent to Property 1 in Problem 1. The following results show that solving Problem 2 actually solves Problem 1 in an optimal manner. Lemma 5. Consider the multi-agent system (2)-(5) and the control policy (59) with gain given by (60) and (61). If the dis( ) count factors 𝛾𝑖 satisfies (62), then 𝑒̄ = 𝑌𝐹 + 𝐿−1 𝐿2 ⊗ 𝐼𝑞 𝑌𝑅 and consequently output containment error (9) goes to zero 1 asymptotically. Proof. First, let the ARE (61) be written in the compact form as follows ̄ −1 𝐵̄ 𝑇 Ψ = 0 𝑃 𝑇 Ψ + 𝑃 Ψ − 𝛾̄ Ψ + 𝐶̄ 𝑇 𝑄̄ 𝐶̄ − Ψ𝐵𝑊 (63) 12 where 𝑃 = 𝑑𝑖𝑎𝑔(𝑃1 , ..., 𝑃𝑛 ), Ψ = 𝑑𝑖𝑎𝑔(Ψ1 , ..., Ψ𝑛 ), 𝛾̄ = 𝑑𝑖𝑎𝑔(𝛾1 , ..., 𝛾𝑛 ), 𝑊 = 𝑑𝑖𝑎𝑔(𝑊1 , ..., 𝑊𝑛 ), 𝐶̄ = 𝑑𝑖𝑎𝑔(𝐶̄1 , ..., 𝐶̄𝑛 ), 𝑄̄ = 𝑑𝑖𝑎𝑔(𝑄1 , ...𝑄𝑛 ), and 𝐵̄ = 𝑑𝑖𝑎𝑔(𝐵1 , ..., 𝐵𝑛 ). Multiplying 𝑋̄ 𝑇 and 𝑋̄ to right and left sides of (63), respectively, one has ( )𝑇 ̄ −1 𝐵̄ 𝑇 Ψ𝑋̄ = 0. (64) 2𝑋̄ 𝑇 𝑃 𝑇 Ψ𝑋̄ − 𝑋̄ 𝑇 𝛾̄ Ψ𝑋̄ + 𝑋̄ 𝑇 𝐶̄ 𝑇 𝑄̄ 𝐶̄ 𝑋̄ − Ψ𝑋̄ 𝐵𝑊 ̄ Using this observation, it can be Observing (64), one can see that, the null space of Ψ is a subspace of the null space of 𝐶̄ 𝑇 𝑄̄ 𝐶. ̄ ̄ −1 𝑇 𝑇 𝑇 𝑇 ̄ 𝐹 − (𝐿−1 𝐿2 ⊗ 𝐼𝑞 )𝑌𝑅 ) = 0 which seen that if 𝑋̄ Ψ𝑋̄ = 0, then 𝑋̄ 𝐶 𝑄̄ 𝐶 𝑋̄ = 0 and consequently (𝑌𝐹 − (𝐿1 𝐿2 ⊗ 𝐼𝑞 )𝑌𝑅 ) 𝑄(𝑌 1 yields 𝑌𝐹 + (𝐿−1 𝐿 ⊗ 𝐼 )𝑌 = 0 and consequently the containment error 𝑒 = 0, which is defined in (9). Therefore, one can 2 𝑞 𝑅 1 conclude that the null space of Ψ is a subspace in which the containment error 𝑒 is zero. It remains to show that providing the discount factors 𝛾𝑖 satisfies the (62), then the null space of Ψ is attractive. To this end, choose the following Lyapunov function Taking the derivative of (65) gives where 𝐴̄ 𝑐 = 𝑑𝑖𝑎𝑔(𝐴𝑐1 , ..., 𝐴𝑐𝑛 ) and ̄ = 𝑋̄ 𝑇 Ψ𝑋. ̄ 𝑉 (𝑋) (65) ( ) ̄ = ∑ 𝑋̄ 𝑇 Ψ𝑖 𝐴𝑐𝑖 + 𝐴𝑇 Ψ𝑖 𝑋̄ 𝑖 𝑉̇ (𝑋) 𝑖 𝑐𝑖 𝑖∈ ( ) = 𝑋̄ 𝑇 Ψ𝐴̄ 𝑐 + 𝐴̄ 𝑇𝑐 Ψ 𝑋̄ (66) [ ∗ 𝐴𝑖 + 𝐵𝑖 𝐾 1𝑖 𝐵𝑖 𝐾 2𝑖 𝐴𝑐𝑖 = 0 𝑆 ∗ ] (67) . It was mentioned in Remark 12 that 𝐴𝑖 + 𝐵𝑖 𝐾𝑖1 is Hurwitz, providing that the discount factors 𝛾𝑖 satisfies the (62). Therefore, under Assumption 4, one can conclude ∀𝑖 ∈  , 𝐴𝑐𝑖 and consequently 𝐴̄ 𝑐 are marginally stable. Therefore, there exist a positive ( ) ̄ = −𝑋̄ 𝑇 Υ𝑋̄ ≤ 0. Based on LaSalle’s invariance principle, 𝑋̄ semi definite matrix Υ = − Ψ𝐴̄ 𝑐 + 𝐴̄ 𝑇𝑐 Ψ such that 𝑉̇ (𝑋) ̄ = 0. As mentioned above, the null space of Ψ is a subspace of where converges to the largest invariance subspace where 𝑉̇ (𝑋) ̄ = 0 if Ψ𝑋 = 0 and consequently the output the output containment error 𝑒 is equal to zero, therefore based on (66), 𝑉̇ (𝑋) containment error 𝑒 is equal to zero, which completes the proof. Note that 𝑋̄ 𝑖 (𝑡) = [𝑥𝑖 𝑇 , 𝜔∗𝑖 𝑇 ]𝑇 in (59) is depending on absolute state of the 𝑖th follower, and requiring the knowledge of the leaders’ dynamics and the graph topology , which are not available for 𝑖th follower, therefore 𝑋̂̄ 𝑖 (𝑡) = [𝜉𝑖 𝑇 , 𝜂̂𝑖 𝑇 ]𝑇 should be used in place of 𝑋̄ 𝑖 (𝑡) to implement the optimal control (59) without requiring the knowledge of the leaders’ dynamics, graph topology , and absolute state of the 𝑖th follower. By doing so, optimal control (59) becomes 𝑢∗ = 𝐾̄ ∗ 𝑋̄̂ (68) 𝑖 𝑖 𝑖 where 𝑋̂̄ 𝑖 (𝑡) = [𝜉𝑖 𝑇 , 𝜂̂𝑖 𝑇 ]𝑇 and 𝐾̄ 𝑖∗ is obtained by (60)-(61). Theorem 3. Consider the multi-agent system (2)-(5) and the distributed adaptive observer (35) along with adaptation laws (36) and (37). Under Assumptions 1 - 6, Problem 2 and consequently Problem 1 are solved using optimal control policy (68) with 𝐾̄ 𝑖∗ given by (60) and (61). As long as, 𝜇𝑖 and 𝐹𝑖 be designed as of Lemma 2, the discount factors 𝛾𝑖 satisfy (62), and 𝛽1 , 𝛽2 , and 𝛽3 in (35)-(37) be any positive constant. Proof. Using (2)-(5), (14), (35), and (68), we obtain ̄ ∗ ̄ ∗ 𝐴 𝐵𝐾 𝐵𝐾 0𝑁×𝑚𝑞̄ ⎡ 𝑋̇ ⎤ ⎡ ⎤⎡𝑋 ⎤ ⎡ ⎤ 1 2 ∗ ∗ ̄ ̄ ̄ ⎢ 𝜉̇ ⎥ = ⎢ 𝜇𝐹 (𝐿1 ⊗ 𝐼𝑞 )𝐶̄ 𝐴 + 𝐵𝐾 ⎥ ⎢ ⎥ ⎢ ⎥Ω − 𝜇𝐹 (𝐿 ⊗ 𝐼 ) 𝐶 𝐵𝐾 + 𝜉 (𝐿 ⊗ 𝐷 ) 1 𝑞 2 𝑖 1 2 ⎢ ̇ ⎥ ⎢ ⎥⎢ ⎥ ⎢ ⎥ ̄ 𝜂 ̂ 𝜂 ̂ −(𝐿 ⊗ 𝛽𝐼 ) ⎣ ⎦ ⎣ 0𝑛𝑞×𝑁 0𝑛𝑞×𝑁 𝑆 𝑖 − (𝐿1 ⊗ 𝛽𝐼𝑞̄ ) ⎦ ⎣ ⎦ ⎣ 2 𝑞̄ ⎦ ̄ ̄ (69) 𝑛 ∑ where 𝜂̂ = 𝑐𝑜𝑙(𝜂̂1 , ..., 𝜂̂𝑛 ), 𝐴 = 𝑑𝑖𝑎𝑔(𝐴1 , ..., 𝐴𝑛 ), 𝐵̄ = 𝑑𝑖𝑎𝑔(𝐵1 , ..., 𝐵𝑛 ), 𝐶̄ = 𝑑𝑖𝑎𝑔(𝐶1 , ..., 𝐶𝑛 ), 𝑁 = 𝑁𝑖 , 𝐾1∗ = ∗ ∗ ∗ ∗ 𝑑𝑖𝑎𝑔(𝐾11 , ..., 𝐾𝑛1 ), 𝐾2∗ = 𝑑𝑖𝑎𝑔(𝐾12 , ..., 𝐾𝑛2 ) and 𝑆̄𝑖 = 𝐼𝑛 ⊗ 𝑆𝑖 . For nonsingular matrix 𝑖=1 ⎡ 𝐼𝑁 0𝑁×𝑁 0𝑁×𝑛𝑞̄ ⎤ 𝑇 = ⎢ 𝐼𝑁 𝐼𝑁 0𝑁×𝑛𝑞̄ ⎥ , ⎢ ⎥ 0𝑛𝑞×𝑁 𝐼𝑛𝑞̄ ⎦ ⎣ 0𝑛𝑞×𝑁 ̄ ̄ one can verify that (69) has a block-triangular structure and according to separation principle, the distributed observers and control gains in (69) can be designed separately. It is shown in Theorem 2 that, for any positive constant 𝛽1 , 𝛽2 , and 𝛽3 , 𝑆𝑖 → 13 𝑆, 𝐷𝑖 → 𝐷, 𝜂̂𝑖 → 𝜔∗𝑖 , ∀𝑖 ∈  , 𝐷𝑖 𝜂̂𝑖 → 𝐷𝜔∗𝑖 and thus for any full row rank matrix 𝐷, (𝐼𝑛 ⊗ 𝐷)𝜂̂ → −(𝐿−1 𝐿2 ⊗ 𝐼𝑞 )𝑌𝑅 1 asymptotically. Besides, it is shown in Lemma 2 that 𝜉𝑖 → 𝑥𝑖 , 𝐶𝑖 𝜉𝑖 → 𝑦𝑖 , ∀𝑖 ∈  asymptotically. Finally, Lemma 5 shows that 𝑌𝐹 → (𝐼𝑛 ⊗ 𝐷)𝜂̂ asymptotically, therefore 𝑌𝐹 → −(𝐿−1 𝐿2 ⊗ 𝐼𝑞 )𝑌𝑅 asymptotically, which completes the proof. 1 Remark 13. Theorem 3 shows that one can design the observers gains appear in (14), (35)-(37) and the control gains 𝐾̄ 𝑖∗ in (68) independently. As stated in Theorem 3, for 𝑖 ∈  , 𝜇𝑖 should be chosen sufficiently large, 𝐹𝑖 should be designed as (18) according to Lemma 2, and 𝛽1 , 𝛽2 , and 𝛽3 in (35)-(37) are any positive constants. It can be seen from (43) and (45) that the larger 𝛽1 , 𝛽2 , and 𝛽3 are , the faster the estimation errors of the distributed observer (35)-(37) decays. It can also be seen from (17) that the larger 𝜇𝑖 for 𝑖 ∈  are, the faster the estimation errors decays for the observer (14). Choosing sufficiently large 𝜇𝑖 for 𝑖 ∈ 𝐹 , 𝛽1 , 𝛽2 , and 𝛽3 makes the convergence of the observers sufficiently fast, and therefore, their effects on the control performance are negligible. The weight matrices 𝑄𝑖 and 𝑊𝑖 for 𝑖 ∈  are design parameters and they should be chosen as symmetric positive definite matrices. The discount factors 𝛾𝑖 for 𝑖 ∈  are used to guarantee that the performance functions is bounded for given control policies, and to do so, they should be chosen to satisfy condition (62) in Remark 12. 5.2 Distributed Optimal Output Containment Control: An Online and Optimal Solution In this subsection, an off-policy RL method 58 is combined with actor-critic algorithm to solve discounted ARE (61) and learn the optimal gain (60) online in real time, using relative output measurements of followers with respect to their neighbors and the information which is broadcasted by neighbors, and without requiring complete knowledge of the leaders’ dynamics. Since Value function (57) is in the form of a quadratic polynomial, the quadratic polynomial basis vector for the critic neural network (NN) of each follower is chosen as 𝜎𝑐 𝜎𝑐 2 2 𝜎𝑖𝑐 (𝑋̄ 𝑖 ) = [ 𝑋̄ 𝑖1 𝑋̄ 𝑖1 𝑋̄ 𝑖2 … 𝑋̄ 𝑖𝑁 𝜎𝑐 ]𝑇 ∈ ℜ𝑁𝑖 (𝑁𝑖 +1)∕2 (70) 𝑖 𝜎 where 𝑋̄ 𝑖 = [𝑋̄ 𝑖1 , ..., 𝑋̄ 𝑖𝑁𝑖𝜎𝑐 ]𝑇 and 𝑁𝑖 𝑐 = 𝑁𝑖 + 𝑞. ̄ Then, the optimal value function 𝑉𝑖 (𝑋̄ 𝑖 ) can be perfectly approximated by ( )𝑇 (71) 𝑉𝑖 (𝑋̄ 𝑖 ) = 𝑊̄ 𝑖𝑐 𝜎𝑖𝑐 (𝑋̄ 𝑖 ) / 𝜎𝑐 𝜎 𝜎 𝜎 where 𝑊̄ 𝑖𝑐 ∈ ℜ𝑀𝑖 is the optimal critic NN weight of 𝑖th follower and 𝑀𝑖 𝑐 = 𝑁𝑖 𝑐 (𝑁𝑖 𝑐 + 1) 2 is the number of hidden-layer neurons of the critic NN of 𝑖th follower. By the same token, the optimal policy in (59) can be perfectly approximated by an actor NN for each follower in the form of ( )𝑇 (72) 𝑢𝑖 ∗ (𝑋̄ 𝑖 ) = 𝑊̄ 𝑖𝑎 𝜎𝑖𝑎 (𝑋̄ 𝑖 ) 𝜎 𝑎 𝜎 𝜎 where 𝜎𝑎 (𝑋̄ 𝑖 ) = [𝑋̄ 𝑖1 , ..., 𝑋̄ 𝑖𝑀𝑖𝜎𝑎 ]𝑇 , 𝑊̄ 𝑖𝑎 ∈ ℜ𝑀𝑖 ×𝑝𝑖 is the optimal actor NN weight of 𝑖th follower and 𝑀𝑖 𝑎 = 𝑁𝑖 𝑐 is the number of hidden-layer neurons of the actor NN of 𝑖th follower, for 𝑖 ∈  . The ideal weights of the critic NNs, i.e., 𝑊̄ 𝑖𝑐 , and the ideal weights of the actor NNs, i.e., 𝑊̄ 𝑖𝑎 , are unknown and must be estimated. Let the value function corresponding to 𝑢̂ 𝑘𝑖 be written as follows ∞ 𝑇 𝑇 𝑉̂𝑖𝑘 (𝑋̄ 𝑖 ) = ∫ 𝑒−𝛾𝑖 (𝜏−𝑡) 𝑋̄ 𝑖𝑇 (𝐶̄ 𝑖 𝑄𝑖 𝐶̄ 𝑖 + 𝐾̄ 𝑘𝑖 𝑊𝑖 𝐾̄ 𝑖𝑘 )𝑋̄ 𝑖 𝑑𝜏 = 𝑋̄ 𝑖𝑇 Ψ𝑘𝑖 𝑋̄ 𝑖 (73) 𝑢̂ 𝑘𝑖 = 𝐾̄ 𝑖𝑘 𝑋̄ 𝑖 (74) 𝐾̄ 𝑖𝑘 = −𝑊𝑖−1 𝐵̄ 𝑖𝑇 Ψ𝑖 𝑘 (75) 𝑡 where with ∗ 𝑘 is the estimation of 𝑢𝑖 in the 𝑘th iteration, and Ψ𝑖 satisfies the discounted ARE (80). Let the estimation of 𝑊̄ 𝑖𝑐 in the 𝑘th iteration be denoted by 𝑊̂̄ 𝑐𝑖 𝑘 . Then, the value function (71) and its gradient ∇𝑉𝑖 (𝑋̄ 𝑖 ) = / 𝜕𝑉𝑖 𝜕 𝑋̄ 𝑖 are approximated as 𝑉̂𝑖𝑘 (𝑋̄ 𝑖 ) = (𝑊̄̂ 𝑐𝑖 𝑘 )𝑇 𝜎𝑖𝑐 (𝑋̄ 𝑖 ) (76) 14 ∇𝑉̂𝑖𝑘 (𝑋̄ 𝑖 ) = (∇𝜎𝑖𝑐 (𝑋̄ 𝑖 ))𝑇 𝑊̂̄ 𝑐𝑖 𝑘 (77) Correspondingly, let 𝑊̂̄ 𝑎𝑖 𝑘 denote the estimation of 𝑊̄ 𝑖𝑎 in the 𝑘th iteration. Then, the estimation of u∗𝑖 (𝑋̄ 𝑖 ) in the 𝑘th iteration is 𝑢̂ 𝑘𝑖 (𝑋̄ 𝑖 ) = (𝑊̂̄ 𝑎𝑖 𝑘 )𝑇 𝜎𝑖𝑎 (𝑋̄ 𝑖 ) (78) One can now write (53) in following augmented form as 𝑋̄̇ 𝑖 = 𝑃 𝑘 𝑋̄ 𝑖 + 𝐵̄ 𝑖 (𝑢𝑖 − 𝑢̂ 𝑘 ) (79) 𝑖 𝑖 where 𝑃𝑖𝑘 = 𝑃𝑖 + 𝐵̄ 𝑖 𝐾̄ 𝑖𝑘 and 𝑢𝑖 is a behavior policy, which is an admissible policy, applied to the 𝑖th follower and 𝑢̂ 𝑘𝑖 is the estimation of target policy, which is the optimal policy, in the 𝑘th iteration. Using (73)-(75), (79) and some manipulation, the discounted ARE (61) becomes 𝑇 Ψ𝑘𝑖 𝑃𝑖𝑘 + (𝑃𝑖𝑘 )𝑇 Ψ𝑘𝑖 − 𝛾𝑖 Ψ𝑘𝑖 + 𝐶̄𝑖 𝑄𝑖 𝐶̄𝑖 − (𝐾̄ 𝑖𝑘 )𝑇 𝑊𝑖 𝐾̄ 𝑖𝑘 = 0 (80) Consider the control policy update law as follows 𝑢𝑘+1 = −𝑊𝑖−1 𝐵̄ 𝑖𝑇 Ψ𝑘𝑖 𝑋̄ 𝑖 𝑖 (81) The derivative of (73) with respect to time along the system dynamics (79) can be derived as 𝑉̂̇ 𝑘 (𝑋̄ ) = 𝑋̄ 𝑇 (Ψ𝑘 𝑃 𝑘 + (𝑃 𝑘 )𝑇 Ψ𝑘 )𝑋̄ + 2𝑋̄ 𝑇 Ψ𝑘 𝐵̄ (𝑢 − 𝑢̂ 𝑘 ) 𝑖 𝑖 𝑖 𝑖 𝑖 𝑖 𝑖 𝑖 𝑖 𝑖 𝑖 𝑖 𝑖 (82) 𝑇 𝑇 = 𝛾𝑖 𝑉̂𝑖𝑘 (𝑋̄ 𝑖 ) − 𝑋̄ 𝑖𝑇 𝐶̄ 𝑖 𝑄𝑖 𝐶̄ 𝑖 𝑋̄ 𝑖 − (𝑢̂ 𝑘𝑖 )𝑇 𝑊𝑖 𝑢̂ 𝑘𝑖 − 2(𝑢̂ 𝑘+1 ̂ 𝑘𝑖 ) 𝑖 ) 𝑊𝑖 (𝑢𝑖 − 𝑢 Multiplying 𝑒−𝛾𝑖 (𝜏−𝑡) to the both sides of (82), and integrating both sides on the time interval of [𝑡; 𝑡 + 𝑇 ], one can obtain the off-policy Bellman equation as follows 𝑡+𝑇 𝑒−𝛾𝑖 𝑇 𝑉̂𝑖𝑘 (𝑋̄ 𝑖 (𝑡 + 𝑇 )) − 𝑉̂𝑖𝑘 (𝑋̄ 𝑖 (𝑡)) = ∫ 𝑡 𝑡+𝑇 𝑑 ( 𝑒−𝛾𝑖 (𝜏−𝑡) 𝑉̂𝑖𝑘 (𝑋̄ 𝑖 ))𝑑𝜏 𝑑𝜏 = (83) 𝑡+𝑇 −𝛾𝑖 (𝜏−𝑡) ∫ 𝑒 𝑡 𝑇 𝑇 𝑇 (−𝑋̄ 𝑖𝑇 𝐶̄ 𝑖 𝑄𝑖 𝐶̄ 𝑖 𝑋̄ 𝑖 − (𝑢̂ 𝑘𝑖 ) 𝑊𝑖 𝑢̂ 𝑘𝑖 )𝑑𝜏 + ∫ 𝑒−𝛾𝑖 (𝜏−𝑡) (−2(𝑢̂ 𝑘+1 ̂ 𝑘𝑖 ))𝑑𝜏 𝑖 ) 𝑊𝑖 (𝑢𝑖 − 𝑢 𝑡 Remark 14. Note that to calculate the first integrand in the right-hand-side of (83), the knowledge of the leaders’ dynamic 𝐷 is ( )𝑇 𝑇 𝑇 required due to dependency of 𝐶̄𝑖 𝑄𝑖 𝐶̄𝑖 to it, i.e., 𝑋̄ 𝑖𝑇 𝐶̄𝑖 𝑄𝑖 𝐶̄𝑖 𝑋̄ 𝑖 = 𝑦𝑖 − 𝐷𝜔∗𝑖 𝑄𝑖 (𝑦𝑖 − 𝐷𝜔∗𝑖 ). To obviate this requirement, the ( )𝑇 𝑇 term of 𝑋̄ 𝑇 𝐶̄𝑖 𝑄𝑖 𝐶̄𝑖 𝑋̄ 𝑖 , in first integrand in the right-hand-side of (83), is replaced by 𝑦̂𝑖 − 𝑦0𝑖 𝑄𝑖 (𝑦̂𝑖 − 𝑦0𝑖 ) , where 𝑦0𝑖 is the 𝑖 estimation of convex combination of the leaders’ outputs, defined in (38) and 𝑦̂𝑖 = 𝐶𝑖 𝜉𝑖 is the output estimation of 𝑖th follower. 𝑝 Define 𝜐𝑘𝑖 = 𝑢𝑖 − 𝑢̂ 𝑘𝑖 , exploiting the critic NN (76), actor NN (78), weighted matrices of 𝑊𝑖 = 𝑑𝑖𝑎𝑔(𝑤1𝑖 , ..., 𝑤𝑖 𝑖 ), and Remark 14, (83) can be put into the following form 𝑇 ∑ 𝑒𝑘𝑖 = (𝑊̂̄ 𝑐𝑖 𝑘 )𝑇 [𝑒−𝛾𝑖 𝑇 𝜎𝑖𝑐 (𝑋̄ 𝑖 (𝑡 + 𝑇 )) − 𝜎𝑖𝑐 (𝑋̄ 𝑖 (𝑡))] + 2 (𝑊̂̄ 𝑎𝑖,𝑗 𝑘+1 ) 𝑤𝑗𝑖 ∫ 𝑒−𝛾𝑖 (𝜏−𝑡) 𝜎𝑖𝑎 (𝑋̄ 𝑖 )𝜐𝑘𝑖,𝑗 𝑑𝜏 𝑡+𝑇 𝑝𝑖 𝑗=1 𝑡+𝑇 −𝛾𝑖 (𝜏−𝑡) −∫ 𝑒 𝑡 𝑇 (−(𝐶𝑖 𝜉𝑖 − 𝐷𝑖 𝜂̂𝑖 ) 𝑄𝑖 (𝐶𝑖 𝜉𝑖 − 𝐷𝑖 𝜂̂𝑖 ) − 𝑡 𝑇 𝑇 𝜎𝑖𝑎 (𝑋̄ 𝑖 ) 𝑊̂̄ 𝑎𝑖 𝑘 𝑊𝑖 (𝑊̂̄ 𝑎𝑖 𝑘 ) (84) 𝜎𝑖𝑎 (𝑋̄ 𝑖 ))𝑑𝜏 where 𝑊̂̄ 𝑎𝑖 𝑘+1 = [ 𝑊̂̄ 𝑎𝑖,1 𝑘+1 ⋯ 𝑊̂̄ 𝑎𝑖,𝑝 𝑘+1 ], 𝜐𝑘𝑖 = [ 𝜐𝑘𝑖,1 ⋯ 𝜐𝑘𝑖,𝑝𝑖 ]𝑇 , and 𝑒𝑘𝑖 is the Bellman approximation error which should be 𝑖 minimized in order to drive the critic NN weights and actor NN weights toward their ideal values, i.e., 𝑊̂̄ 𝑐𝑖 𝑘 → 𝑊̄ 𝑖𝑐 and 𝑊̂̄ 𝑎 𝑘+1 → 𝑊̄ 𝑎 . 𝑖 𝑖 Rearranging (84), the Bellman equation (83) can be reformulated as follows 𝑌𝑖 𝑘 (𝑡) = (𝑊̂ 𝑖𝑘 )𝑇 Ξ𝑘𝑖 (𝑡) − 𝑒𝑘𝑖 (85) where 𝑡+𝑇 𝑘 𝑌𝑖 (𝑡) = ∫ 𝑡 𝑇 𝑇 𝑒−𝛾𝑖 (𝜏−𝑡) (−(𝐶𝑖 𝜉𝑖 − 𝐷𝑖 𝜂̂𝑖 )𝑇 𝑄𝑖 (𝐶𝑖 𝜉𝑖 − 𝐷𝑖 𝜂̂𝑖 ) − 𝜎𝑖𝑎 (𝑋̄ 𝑖 ) 𝑊̂̄ 𝑎𝑖 𝑘 𝑊𝑖 (𝑊̂̄ 𝑎𝑖 𝑘 ) 𝜎𝑖𝑎 (𝑋̄ 𝑖 ))𝑑𝜏 (86) 15 𝜎 𝜎 𝑐 𝑎 𝑊̂ 𝑖𝑘 = [(𝑊̂̄ 𝑐𝑖 𝑘 )𝑇 , (𝑊̂̄ 𝑎𝑖,1 𝑘+1 )𝑇 , ..., (𝑊̂̄ 𝑎𝑖,𝑝 𝑘+1 )𝑇 ]𝑇 ∈ ℜ𝑀𝑖 +𝑝𝑖 ×𝑀𝑖 (87) ⎡ 𝑒−𝛾𝑖 𝑇 𝜎𝑖𝑐 (𝑋̄ 𝑖 (𝑡 + 𝑇 )) − 𝜎𝑖𝑐 (𝑋̄ 𝑖 (𝑡)) ⎤ ⎢ ⎥ 𝑡+𝑇 ⎢ 2𝑤1 ∫ 𝑒−𝛾𝑖 (𝜏−𝑡) 𝜎 𝑎 (𝑋̄ )𝜐𝑘 𝑑𝜏 ⎥ 𝑖 𝑖 𝑖 𝑖,1 𝜎𝑐 𝜎𝑎 ⎢ ⎥ 𝑡 Ξ𝑘𝑖 (𝑡) = ⎢ ∈ ℜ𝑀𝑖 +𝑝𝑖 ×𝑀𝑖 ⎥ ⋮ ⎢ ⎥ 𝑡+𝑇 ⎢ ⎥ 𝑝𝑖 𝑎 ̄ 𝑘 −𝛾 (𝜏−𝑡) 𝑖 𝜎𝑖 (𝑋𝑖 )𝜐𝑖,𝑝 𝑑𝜏 ⎥ ⎢ 2𝑤𝑖 ∫ 𝑒 𝑖 ⎣ ⎦ 𝑡 (88) 𝑖 𝜎 𝜎 Assume that 𝑌𝑖 𝑘 (𝑡) and Ξ𝑘𝑖 (𝑡) are collected at 𝕟𝑖 ≥ 𝑀𝑖 𝑐 + 𝑝𝑖 × 𝑀𝑖 𝑎 points 𝑡1 to 𝑡𝕟𝑖 , over the same time interval [𝑡; 𝑡 + 𝑇 ]. Using least square method in average sense, one has 𝑊̂ 𝑖𝑘 = (Ξ̄ 𝑘𝑖 (Ξ̄ 𝑘𝑖 )𝑇 )−1 Ξ̄ 𝑘𝑖 𝑌̄𝑖𝑘 (89) Ξ̄ 𝑘𝑖 = [Ξ𝑘𝑖 (𝑡1 ), ..., Ξ𝑘𝑖 (𝑡𝕟𝑖 )] (90) 𝑌̄𝑖𝑘 = [𝑌𝑖 𝑘 (𝑡1 ), ..., 𝑌𝑖 𝑘 (𝑡𝕟𝑖 )]𝑇 (91) where Remark 15. Note that to calculate the information in (86) and (88) for each follower, the knowledge of graph topology  and absolute states of followers are required due to the dependency of 𝑋̄ 𝑖 (𝑡) = [𝑥𝑖 𝑇 , 𝜔∗𝑖 𝑇 ]𝑇 in (86) and (88) to them. To obviate these requirements, in Algorithm 2, the term of 𝑋̂̄ 𝑖 (𝑡) = [𝜉𝑖 𝑇 , 𝜂̂𝑖 𝑇 ]𝑇 will be used in place of 𝑋̄ 𝑖 (𝑡) = [𝑥𝑖 𝑇 , 𝜔∗𝑖 𝑇 ]𝑇 in (86) and (88). To this end, by using 𝑋̂̄ 𝑖 (𝑡) = [𝜉𝑖 𝑇 , 𝜂̂𝑖 𝑇 ]𝑇 in place of 𝑋̄ 𝑖 (𝑡) = [𝑥𝑖 𝑇 , 𝜔∗𝑖 𝑇 ]𝑇 , (89) can be rewritten as follows 𝑊̂ 𝑖𝑘 = (Ξ̂̄ 𝑘𝑖 (Ξ̂̄ 𝑘𝑖 )𝑇 )−1 Ξ̂̄ 𝑘𝑖 𝑌̂̄𝑖𝑘 (92) Ξ̂̄ 𝑘𝑖 = [Ξ̂ 𝑘𝑖 (𝑡1 ), ..., Ξ̂ 𝑘𝑖 (𝑡𝕟𝑖 )] (93) where 𝑊̂ 𝑖𝑘 is given in (87), and 𝑘 𝑘 𝑘 𝑌̂̄𝑖 = [𝑌̂𝑖 (𝑡1 ), ..., 𝑌̂𝑖 (𝑡𝕟𝑖 )]𝑇 (94) 𝑡+𝑇 𝑌̂𝑖𝑘 (𝑡) = ∫ 𝑒−𝛾𝑖 (𝜏−𝑡) (−(𝐶𝑖 𝜉𝑖 − 𝐷𝑖 𝜂̂𝑖 )𝑇 𝑄𝑖 (𝐶𝑖 𝜉𝑖 − 𝐷𝑖 𝜂̂𝑖 ) − 𝜎𝑖𝑎 (𝑋̂̄ 𝑖 )𝑇 𝑊̂̄ 𝑎𝑖 𝑘 𝑊𝑖 (𝑊̂̄ 𝑎𝑖 𝑘 )𝑇 𝜎𝑖𝑎 (𝑋̂̄ 𝑖 ))𝑑𝜏 (95) 𝑡 ⎡ 𝑒−𝛾𝑖 𝑇 𝜎 𝑐 (𝑋̂̄ 𝑖 (𝑡 + 𝑇 )) − 𝜎 𝑐 (𝑋̂̄ 𝑖 (𝑡)) ⎤ 𝑖 𝑖 ⎢ ⎥ 𝑡+𝑇 ⎢ 2𝑤1 ∫ 𝑒−𝛾𝑖 (𝜏−𝑡) 𝜎 𝑎 (𝑋̂̄ )𝜐𝑘 𝑑𝜏 ⎥ 𝑖 𝑖,1 𝑖 𝑖 ⎥ ⎢ 𝑡 Ξ̂ 𝑘𝑖 (𝑡) = ⎢ (96) ⎥ ⋮ ⎢ ⎥ 𝑡+𝑇 ⎥ ⎢ 𝑝 ⎢ 2𝑤𝑖 𝑖 ∫ 𝑒−𝛾𝑖 (𝜏−𝑡) 𝜎𝑖𝑎 (𝑋̂̄ 𝑖 )𝜐𝑘𝑖,𝑝𝑖 𝑑𝜏 ⎥ ⎦ ⎣ 𝑡 To simultaneously solve the ARE (83) and find the optimal policy (72) online, i.e., solve Problem 2, the off-policy RL algorithm is given in Algorithm 1. Note that, Algorithm 1 solve Problem 2 without requiring any knowledge about graph topology , and absolute states or outputs of followers. Moreover, Algorithm 1 solve problem 2 without the restrictive assumption of which all followers should have knowledge about the leaders’ dynamics 𝑆 and 𝐷. 16 Algorithm 1: Online Off-policy RL Algorithm 1) Start with an admissible control policy 𝑢𝜅𝑖 = 𝐾𝑖𝜅 𝑋̂̄ 𝑖 + 𝜀, where 𝜀 is the exploration noise and 𝜅 = 0, and collect required information, i.e., Ξ̂̄ 𝑘𝑖 and 𝑌̂̄𝑖𝑘 . 2) Solve the least square problem (92) to obtain 𝑊̂̄ 𝑐𝑖 𝑘 and 𝑊̂̄ 𝑎𝑖 𝑘+1 simultaneously. 3) Let 𝜅 = 𝜅 + 1, and repeat step 2 until ‖𝑊̂ 𝑖𝑘 − 𝑊̂ 𝑖𝑘−1 ‖ ≤ 𝜏, where 𝜏 is a small predefined positive constant. 4) On convergence set 𝑢∗ = 𝑢̂ 𝑘 = (𝑊̂̄ 𝑎 𝑘 )𝑇 𝜎 𝑎 (𝑋̂̄ 𝑖 ) as the optimal control policy. 𝑖 𝑖 𝑖 𝑖 Remark 16. Note that, due to the terms 𝜂̂𝑖 and 𝜉𝑖 in (94) and (96), information about Ξ̂̄ 𝑘𝑖 and 𝑌̂̄𝑖𝑘 , which are required in Algorithm 1, cannot be collected and used from the beginning of the learning process. However, once the distributed observers in (14) and (35)-(37) converge, information about Ξ̂̄ 𝑘𝑖 and 𝑌̂̄𝑖𝑘 is collected, and then, it is used by Algorithm 1. Note also that, as mentioned in Remark 13, the observers gains appear in (14), (35)-(37), and the control gains 𝐾̄ 𝑖∗ in (68) can be designed independently, and choosing sufficiently large 𝜇𝑖 for 𝑖 ∈  , 𝛽1 , 𝛽2 , and 𝛽3 makes the convergence of the observers sufficiently fast, and therefore, the effect of this issue on Algorithm 1 is negligible. 6 SIMULATION RESULTS In this section, an output containment control example is given to validate the proposed approach. Consider the multi-agent system consists of four heterogeneous followers and three leaders. The leaders’ dynamics are given as [ ] [ ] 1 −3 10 𝑆= ,𝐷 = (97) 1 −1 01 The initial leaders’ state vectors are chosen as 𝜔5 (0) = [ 2 1 ]𝑇 , 𝜔6 (0) = [ −1 1 ]𝑇 , and 𝜔7 (0) = [ 0.4 0.4 ]𝑇 . The dynamics of heterogeneous followers are given as ⎡0 0⎤ ⎡4⎤ ⎡ −1 0 0 ⎤ 𝑇 ⎥ ⎥ ⎢ ⎢ 𝐴1 = 0 3 0 , 𝐵1 = 1 , 𝐶1 = ⎢ 1 0 ⎥ ⎥ ⎢ ⎥ ⎢ ⎥ ⎢ ⎣0 1⎦ ⎣1⎦ ⎣ 0 3 2⎦ [ [ ] ] [ ] 10 1 −1 −2 𝑇 𝐴2 = , 𝐵2 = , 𝐶2 = 01 1 0 −1 [ ] ] [ ] 10 20 −1 𝑇 𝐴3 = , 𝐵3 = , 𝐶3 = 01 22 −1 [ (98) ⎡ −1 0 0 ⎤ ⎡5⎤ ⎡0 0⎤ 𝐴4 = ⎢ 0 2 −1 ⎥ , 𝐵4 = ⎢ 1 ⎥ , 𝐶4𝑇 = ⎢ 1 0 ⎥ . ⎢ ⎥ ⎢ ⎥ ⎢ ⎥ ⎣ 0 3 3 ⎦ ⎣2⎦ ⎣0 1⎦ The communication graph among the agents is given in Fig. 1, where nodes 5, 6, and 7 represent the leaders and other nodes represent four heterogeneous agents. Moreover, all the communication weights, in Fig. 1, are chosen to be one. It can be verified that Assumptions 1-5 are satisfied. The distributed observer (14) is implemented for 𝑖 = 1, 2, 3, 4. The observer matrices and gains are set as [ ] ⎡2 0 0⎤ 0.19 −0.11 ⎢ ⎥ Φ1 = 𝐼3 , 𝐸1 = 0 1 0 , 𝑅1 = ⎢ ⎥ −0.11 0.26 ⎣0 0 1⎦ 17 FIGURE 1 The multi-agent systems communication graph. x1 − ξ1 x2 − ξ2 x3 − ξ3 x4 − ξ4 2.5 2 2 1.5 1 X̃ 1 0 0.5 −1 0 0.5 1 1.5 2 0 −0.5 −1 0 2 4 6 8 10 12 14 16 18 20 Time (Sec) FIGURE 2 Error between state observer (14) and followers’ states. [ Φ2 = 𝐼2 , 𝐸2 = 𝐼2 , 𝑅2 = [ 0.33 0 0 1 ] 0.23 −0.09 Φ3 = 𝐼2 , 𝐸3 = 𝐼2 , 𝑅3 = −0.09 0.23 ] (99) [ ] ⎡2 0 0⎤ 0.22 −0.06 , Φ4 = 𝐼3 , 𝐸4 = ⎢ 0 1 0 ⎥ , 𝑅4 = ⎥ ⎢ −0.06 0.16 ⎣0 0 1⎦ and 𝜇𝑖 = 1, for 𝑖 = 1, 2, 3, 4. The error between state observer (14) and followers’ states is given in Fig. 2. It can be observed from Fig. 2 that the error between state observers and the followers’ states converges to zero. The distributed adaptive observer (35) along with adaptation laws (36) and (37) are also implemented for 𝑖 = 1, 2, 3, 4. The observer and adaptive laws gains are set as 𝛽1 = 3, 𝛽2 = 10, and 𝛽3 = 3. It can be seen from Fig. 3 that the error between observers (35) and the convex combination of the leaders’ states converges to zero, i.e., the adaptive observers (35) converge to the convex combination of the leaders’ states. 18 0.2 η̃1 η̃2 η̃3 η̃4 0.15 0.1 0.05 η̃ i 0 −0.05 0 −0.1 −0.15 −0.5 −0.2 −1 −0.25 0 −0.3 0 0.5 1 5 1.5 10 15 20 Time (Sec) FIGURE 3 Error between the adaptive observer (35) and the convex combination of the leaders’ states. By solving the output regulator equation (6), one can obtain ⎡ 4 −16 ⎤ [ ] Π1 = ⎢ 1 0 ⎥ , Γ1 = −2 −3 ⎥ ⎢ ⎣0 1 ⎦ [ ] Π2 = 𝐼2 , Γ2 = 0 1 (100) [ ] Π3 = 𝐼2 , Γ3 = 1 3 ⎡ 3.33 −11.66 ⎤ [ ] Π4 = ⎢ 1 0 ⎥ , Γ4 = −1 −2 . ⎥ ⎢ 1 ⎦ ⎣ 0 The weight matrices 𝑄𝑖 , 𝑊𝑖 , and the discount factors 𝛾𝑖 for 𝑖 = 1, 2, 3, 4 are chosen as 𝑄1 = 10𝐼3 , 𝑊1 = 10, 𝛾1 = 0.01 𝑄2 = 10𝐼2 , 𝑊2 = 10, 𝛾2 = 0.01 𝑄3 = 10𝐼2 , 𝑊3 = 10, 𝛾3 = 0.01 𝑄4 = 10𝐼3 , 𝑊4 = 10, 𝛾4 = 0.01. (101) Using (98), (101), and LQR method, the optimal dynamic output feedback gains are [ ] 𝐾11 = −0.13 7.91 −20.65 [ ] 𝐾21 = 1 1.78 [ ] 𝐾31 = −0.23 8.61 [ ] 𝐾41 = −0.29 7.02 −10.1 . (102) We now use Algorithm 1 to find the optimal dynamic output feedback control online in real-time. To do so, time interval is 𝜎 𝜎 𝜎 𝜎 𝜎 𝜎 𝜎 𝜎 𝜎 set as 𝑇 = 0.5 Sec, and 𝑁1 𝑐 = 5, 𝑁2 𝑐 = 4, 𝑁3 𝑐 = 4, 𝑁4 𝑐 = 5, 𝑀1 𝑐 = 15, 𝑀2 𝑐 = 10, 𝑀3 𝑐 = 10, 𝑀4 𝑐 = 15, 𝑀1 𝑎 = 5, 𝜎 𝜎 𝜎 2 ̂̄ 𝑋 𝑖1 𝑋̂̄ 𝑖2 … 𝑋̂̄ 2 𝜎𝑐 ]𝑇 , 𝜎 𝑎 (𝑋̂̄ 𝑖 ) = [ 𝑋̂̄ 𝑖1 ⋯ 𝑋̂̄ 𝑖𝑀 𝜎𝑎 ]𝑇 , for 𝑖 = 1, 2, 3, 4. 𝑀 𝑎 = 4, 𝑀 𝑎 = 4, 𝑀 𝑎 = 5, 𝜎 𝑐 (𝑋̂̄ 𝑖 ) = [ 𝑋̂̄ 𝑖1 2 3 4 𝑖 𝑖𝑁𝑖 𝑖 𝑖 Figs. 4 and 5 show the evaluation of learned optimal dynamic output feedback controls along with the state observer (14), and the adaptive observer (35) with adaptation laws (36) and (37) for the heterogeneous multi-agent systems (98). Fig. 4 confirms that the followers move into the convex hull formed by the leaders’ outputs. Note that, there exist directed paths from the leaders 5 and 6 to followers 1 and 2 and there is no directed path from the leader 7 to these followers, i.e., the leader 7 is disconnected 19 Leaders Follower Follower Follower Follower 2 1.5 1 2 3 4 t= 4 Sec 1 yi2 0.5 0 t= 7.2 Sec −0.5 −1 −1.5 t= 15 Sec −2 −3 −2 −1 0 yi1 1 2 3 FIGURE 4 The outputs of the agents using Algorithm 1, along with adaptive observer (35) and state observer (14). 4 Leaders Envelope Followers yi1 2 0 −2 0 5 10 15 yi2 4 20 Leaders Envelope Followers 2 0 −2 0 5 10 15 20 Time (Sec) FIGURE 5 The outputs of all four heterogeneous agents. from the followers 1 and 2. In this case, the convex hull is a line segment which is spanned by the outputs of these two leaders. Therefore, these two followers converge into the line segment which is spanned by the outputs of the leaders 5 and 6. Note also that, there exists a directed path from the leaders 5, 6, and 7 to the followers 3 and 4. Therefore, these two followers converge into the triangular area which is spanned by the outputs of the leaders 5, 6, and 7. The followers and the leaders’ outputs along with the envelope of the leaders’ outputs are shown in Fig. 5. It can be seen in Fig. 5 that the followers’ outputs move into the envelopes formed by the leaders’ outputs and stay in them. The time history of output containment errors of followers is shown in Fig. 6. It can be observed that the containment errors decay to zero. Therefore, it can be seen that the followers’ outputs converge to the convex hull formed by leaders’ outputs, i.e., the containment control problem 1 is solved. These results show that the introduced approach solves Problem 2 without requiring all followers to have knowledge of leaders’ dynamics or states and based on only relative output measurements of followers with respect to their neighbors and the information which is broadcasted to them through the communication network. 20 i=1 i=2 i=3 i=4 4 ei1 2 0 −2 0 5 10 15 i=1 i=2 i=3 i=4 2 ei2 20 0 −2 −4 0 5 10 15 20 Time (Sec) FIGURE 6 Time history of output containment errors. 7 CONCLUSIONS In this paper, an online optimal relative output-feedback based solution for the output containment control problem of linear multi-agent systems was presented. The followers were assumed heterogeneous in dynamics and dimensions. First, a distributed dynamic relative output-feedback control protocol was developed based on cooperative output regulation framework, which was provided the offline and non-optimal solution to the output containment control problem in hand. The proposed control protocol was composed of a feedback part and a feed-forward part. However, the feedback and feed-forward states were assumed to be unavailable to followers and were estimated using two distributed observers. A distributed adaptive observer was designed to estimate followers’ states using only relative output measurements of followers with respect to their neighbors and the information which is broadcasted to them through the communication network. Another distributed observer was developed to estimate the convex hull of the leaders’ states. To relax the restrictive assumption in existent work that each follower should have the knowledge of the leader’s dynamics, an adaptive distributed observer was next designed to estimate both the leaders’ dynamics and convex combination of the leaders’ states. Optimality was explicitly imposed in finding the feedback and feed-forward control gains to not only assure convergence of followers’ outputs to a convex combination of the leaders’ outputs, but also optimize their transient output containment errors. To do this, augmented AREs were employed to solve the optimal output containment control problem in hand. An off-policy RL algorithm on an actor-critic structure was next developed to solve these AREs online in real time, based on using only relative output measurements of followers with respect to their neighbors and the information which is broadcasted to them through the communication network, and without requirement of knowing the complete knowledge of the leaders’ dynamics by all followers. Finally, a simulation example verified the effectiveness of the proposed algorithm. References 1. Jadbabaie A, Jie Lin, Morse AS. Coordination of groups of mobile autonomous agents using nearest neighbor rules. IEEE Transactions on Automatic Control. 2003;48(6):988-1001. 2. Ji M, Ferrari-Trecate G, Egerstedt M, Buffa A. Containment Control in Mobile Networks. IEEE Transactions on Automatic Control. 2008;53(8):1972-1975. 3. Russell Carpenter J. Decentralized control of satellite formations. International Journal of Robust and Nonlinear Control. 2002;12(2-3):141-161. 4. Fax JA, Murray RM. Information Flow and Cooperative Control of Vehicle Formations. IEEE Transactions on Automatic Control. 2004;49(9):1465-1476. 21 5. Tomlin C, Pappas GJ, Sastry S. Conflict resolution for air traffic management: a study in multiagent hybrid systems. IEEE Transactions on Automatic Control. 1998;43(4):509-521. 6. Wei Ren, Beard RW, Atkins EM. Information consensus in multivehicle cooperative control. IEEE Control Systems Magazine. 2007;27(2):71-82. 7. Olfati-Saber R, Shamma JS. Consensus Filters for Sensor Networks and Distributed Sensor Fusion. In: Proceedings of the 44th IEEE Conference on Decision and Control. IEEE. 8. Olfati-Saber R, Fax JA, Murray RM. Consensus and Cooperation in Networked Multi-Agent Systems. Proceedings of the IEEE. 2007;95(1):215-233. 9. Wei Ren, Beard RW. Consensus seeking in multiagent systems under dynamically changing interaction topologies. IEEE Transactions on Automatic Control. 2005;50(5):655-661. 10. Hong Y, Hu J, Gao L. Tracking control for multi-agent consensus with an active leader and variable topology. Automatica. 2006;42(7):1177-1182. 11. Hong Y, Chen G, Bushnell L. Distributed observers design for leader-following control of multi-agent networks. Automatica. 2008;44(3):846-850. 12. Lou Y, Hong Y. Target containment control of multi-agent systems with random switching interconnection topologies. Automatica. 2012;48(5):879-885. 13. Notarstefano G, Egerstedt M, Haque M. Containment in leader-follower networks with switching communication topologies. Automatica. 2011;47(5):1035-1040. 14. Meng Z, Ren W, You Z. Distributed finite-time attitude containment control for multiple rigid bodies. Automatica. 2010;46(12):2092-2099. 15. Cao Y, Ren W, Egerstedt M. Distributed containment control with multiple stationary or dynamic leaders in fixed and switching directed networks. Automatica. 2012;48(8):1586-1597. 16. Liu H, Xie G, Wang L. Necessary and sufficient conditions for containment control of networked multi-agent systems. Automatica. 2012;48(7):1415-1422. 17. Liu H, Xie G, Wang L. Containment of linear multi-agent systems under general interaction topologies. Systems and Control Letters. 2012;61(4):528-534. 18. Mei J, Ren W, Ma G. Distributed containment control for Lagrangian networks with parametric uncertainties under a directed graph. Automatica. 2012;48(4):653-659. 19. Li J, Ren W, Xu S. Distributed Containment Control with Multiple Dynamic Leaders for Double-Integrator Dynamics Using Only Position Measurements. IEEE Transactions on Automatic Control. 2012;57(6):1553-1559. doi:10.1109/tac.2011.2174680. 20. Yoo SJ. Distributed adaptive containment control of uncertain nonlinear multi-agent systems in strict-feedback form. Automatica. 2013;49(7):2145-2153. 21. Li Z, Ren W, Liu X, Fu M. Distributed containment control of multi-agent systems with general linear dynamics in the presence of multiple leaders. International Journal of Robust and Nonlinear Control. 2011;23(5):534-547. 22. Zheng Y, Wang L. Containment control of heterogeneous multi-agent systems. International Journal of Control. 2013;87(1):1-8. 23. Wang Y, Cheng L, Hou Z-G, Tan M, Wang M. Containment control of multi-agent systems in a noisy communication environment. Automatica. 2014;50(7):1922-1928. 24. Liu H, Cheng L, Tan M, Hou Z-G. Containment control of continuous-time linear multi-agent systems with aperiodic sampling. Automatica. 2015;57:78-84. 22 25. Haghshenas H, Badamchizadeh MA, Baradarannia M. Containment control of heterogeneous linear multi-agent systems. Automatica. 2015;54:210-216. 26. Kan Z, Klotz JR, Pasiliao EL Jr, Dixon WE. Containment control for a social network with state-dependent connectivity. Automatica. 2015;56:86-92. 27. 1. Kan Z, Shea JM, Dixon WE. Leader-follower containment control over directed random graphs. Automatica. 2016;66:5662. doi:10.1016/j.automatica.2015.12.016. 28. Dimarogonas DV, Tsiotras P, Kyriakopoulos KJ. Leader-follower cooperative attitude control of multiple rigid bodies. Systems and Control Letters. 2009;58(6):429-435. 29. Mahalik NP, ed. Chapter 13 - Sensor Networks and Configuration. Springer Berlin Heidelberg; 2007. 30. Shames I, Fidan B, Anderson BDO. Minimization of the effect of noisy measurements on localization of multi-agent autonomous formations. Automatica. 2009;45(4):1058-1065. 31. Wen G, Zhao Y, Duan Z, Yu W, Chen G. Containment of Higher-Order Multi-Leader Multi-Agent Systems: A Dynamic Output Approach. IEEE Transactions on Automatic Control. 2016;61(4):1135-1140. 32. Zuo S, Song Y, Lewis FL, Davoudi A. Output Containment Control of Linear Heterogeneous Multi-Agent Systems Using Internal Model Principle. IEEE Transactions on Cybernetics. 2017;47(8):2099-2109. 33. Sutton RS, Barto AG. Reinforcement Learning-An Introduction. Cambridge, MA, USA: MIT Press, 1998. 34. Powell WB. Approximate Dynamic Programming: Solving the Curses of Dimensionality. Hoboken, NJ, USA: Wiley, 2007. 35. Cui X, Zhang H, Luo Y, Jiang H. Adaptive dynamic programming for Hinf tracking design of uncertain nonlinear systems with disturbances and input constraints. International Journal of Adaptive Control and Signal Processing. 2017;31(11):15671583. 36. Moghadam R, Lewis FL. Output-feedback Hinf quadratic tracking control of linear systems using reinforcement learning. International Journal of Adaptive Control and Signal Processing. October 2017. 37. Vamvoudakis KG, Lewis FL, Dixon WE. Open-loop Stackelberg learning solution for hierarchical control problems. International Journal of Adaptive Control and Signal Processing. October 2017. 38. Yasini S, Karimpour A, Naghibi Sistani M-B, Modares H. Online concurrent reinforcement learning algorithm to solve twoplayer zero-sum games for partially unknown nonlinear continuous-time systems. International Journal of Adaptive Control and Signal Processing. 2014;29(4):473-493. 39. Modares H, Lewis FL, Sistani M-BN. Online solution of nonquadratic two-player zero-sum games arising in the Hinf control of constrained input systems. International Journal of Adaptive Control and Signal Processing. 2012;28(3-5):232-254. 40. Song R, Lewis FL, Wei Q, Zhang H. Off-Policy Actor-Critic Structure for Optimal Control of Unknown Systems With Disturbances. IEEE Transactions on Cybernetics. 2016;46(5):1041-1050. 41. Luo B, Liu D, Huang T, Wang D. Model-Free Optimal Tracking Control via Critic-Only Q-Learning. IEEE Transactions on Neural Networks and Learning Systems. 2016;27(10):2134-2144. 42. Yang X, He H, Liu D. Event-Triggered Optimal Neuro-Controller Design With Reinforcement Learning for Unknown Nonlinear Systems. IEEE Transactions on Systems, Man, and Cybernetics: Systems. 2017:1-13. 43. Luo B, Liu D, Wu H-N. Adaptive Constrained Optimal Control Design for Data-Based Nonlinear Discrete-Time Systems With Critic-Only Structure. IEEE Transactions on Neural Networks and Learning Systems. 2017:1-13. 44. Modares H, Nageshrao SP, Lopes GAD, Babuska R, Lewis FL. Optimal model-free output synchronization of heterogeneous systems using off-policy reinforcement learning. Automatica. 2016;71:334-341. 23 45. Adib Yaghmaie F, Lewis FL, Su R. Output regulation of heterogeneous linear multi-agent systems with differential graphical game. International Journal of Robust and Nonlinear Control. 2015;26(10):2256-2278. 46. Tatari F, Naghibi-Sistani M-B, Vamvoudakis KG. Distributed learning algorithm for non-linear differential graphical games. Transactions of the Institute of Measurement and Control. 2016;39(2):173-182. 47. Tatari F, Naghibi-Sistani M-B, Vamvoudakis KG. Distributed optimal synchronization control of linear networked systems under unknown dynamics. In: 2017 American Control Conference (ACC). IEEE; 2017. 48. Mazouchi M, Naghibi-Sistani MB, Sani SKH. A novel distributed optimal adaptive control algorithm for nonlinear multiagent differential graphical games. IEEE/CAA Journal of Automatica Sinica. 2018;5(1):331-341. 49. Qin J, Yu C. Cluster consensus control of generic linear multi-agent systems under directed topology with acyclic partition. Automatica. 2013;49(9):2898-2905. 50. Rockafellar RT. Convex analysis. New Jersey: Princeton University Press, 1972. 51. Huang J. Nonlinear Output Regulation: Theory and Applications. SIAM: Philadelphia, 2004. 52. Huang J. Chapter Fourteen - Certainty Equivalence, Separation Principle, and Cooperative Output Regulation of Multi-agent Systems by the Distributed Observer Approach. In: Control of Complex Systems. Elsevier; 2016:421-449. 53. Gadewadikar J, Lewis FL, Xie L, Kucera V, Abu-Khalaf M. Parameterization of all stabilizing Hinf static state-feedback gains: Application to output-feedback design. Automatica, 2007; 43(9):1597-1604. 54. Hongwei Zhang, Lewis FL, Das A. Optimal Design for Synchronization of Cooperative Systems: State Feedback, Observer and Output Feedback. IEEE Transactions on Automatic Control. 2011;56(8):1948-1952. 55. Wu J, Ugrinovskii V, Allgower F. Observer-based synchronization with relative measurements and unknown neighbour models. In: 2016 Australian Control Conference (AuCC). IEEE; 2016. 56. Cai H, Lewis FL, Hu G, Huang J. The adaptive distributed observer approach to the cooperative output regulation of linear multi-agent systems. Automatica. 2017;75:299-305. 57. Lewis FL, Syrmos VL. Optimal Control. John Wiley and Sons: 1995. 58. Modares H, Lewis FL, Jiang Z-P. 𝐻∞ Tracking Control of Completely Unknown Continuous-Time Systems via Off-Policy Reinforcement Learning. IEEE Transactions on Neural Networks and Learning Systems. 2015;26(10):2550-2562.
3cs.SY
arXiv:1604.08603v1 [cs.DS] 28 Apr 2016 Decomposing Cubic Graphs into Connected Subgraphs of Size Three Laurent Bulteau1 , Guillaume Fertin2 , Anthony Labarre1, Romeo Rizzi3 , and Irena Rusu2 1 2 Université Paris-Est, LIGM (UMR 8049), CNRS, ENPC, ESIEE Paris, UPEM, F-77454, Marne-la-Vallée, France Laboratoire d’Informatique de Nantes-Atlantique, UMR CNRS 6241, Université de Nantes, 2 rue de la Houssinière, 44322 Nantes Cedex 3, France 3 Department of Computer Science, University of Verona, Italy Abstract. Let S = {K1,3 , K3 , P4 } be the set of connected graphs of size 3. We study the problem of partitioning the edge set of a graph G into graphs taken from any non-empty S ′ ⊆ S. The problem is known to be NP-complete for any possible choice of S ′ in general graphs. In this paper, we assume that the input graph is cubic, and study the computational complexity of the problem of partitioning its edge set for any choice of S ′ . We identify all polynomial and NP-complete problems in that setting, and give graph-theoretic characterisations of S ′ -decomposable cubic graphs in some cases. 1 Introduction General context. Given a connected graph G and a set S of graphs, the Sdecomposition problem asks whether G can be represented as an edge-disjoint union of subgraphs, each of which is isomorphic to a graph in S. The problem has a long history that can be traced back to Kirkman [7] and has been intensively studied ever since, both from pure mathematical and algorithmic point of views. One of the most notable results in the area is the proof by Dor and Tarsi [3] of the long-standing “Holyer conjecture” [6], which stated that the S-decomposition problem is NP-complete when S contains a single graph with at least three edges. Many variants of the S-decomposition problem have been studied while attempting to prove Holyer’s conjecture or to obtain polynomial-time algorithms in restricted cases [12], and applications arise in such diverse fields as traffic grooming [10] and graph drawing [5]. In particular, Dyer and Frieze [4] studied a variant where S is the set of connected graphs with k edges for some natural k, and proved the NP-completeness of the S-decomposition problem for any k ≥ 3, even under the assumption that the input graph is planar and bipartite (see Theorem 3.1 in [4]). They further claimed that the problem remains NPcomplete under the additional constraint that all vertices of the input graph have degree either 2 or 3. Interestingly, if one looks at the special case where k = 3 and G is a bipartite cubic graph (i.e., each vertex has degree 3), then G can clearly be decomposed in polynomial time, using K1,3 ’s only, by selecting 1 either part of the bipartition and making each vertex in that set the center of a K1,3 . This shows that focusing on the case k = 3 and on cubic graphs can lead to tractable results — as opposed to general graphs, for which when k = 3, and for any non empty S ′ ⊆ S, the S ′ -decomposition problems all turn out to be NP-complete [4, 6]. In this paper, we study the S-decomposition problem on cubic graphs in the case k = 3 — i.e., S = {K1,3 , K3 , P4 }. For any non-empty S ′ ⊆ S, we settle the computational complexity of the S ′ -decomposition problem by showing that the problem is NP-complete when S ′ = {K1,3 , P4 } and S ′ = S, while all the other cases are in P. Table 1 summarises the state of knowledge regarding the complexity of decomposing cubic and arbitrary graphs using connected subgraphs of size three, and puts our results into perspective. Allowed subgraphs Complexity according to graph class K1,3 K3 P4 cubic arbitrary X in P (Proposition 3) NP-complete [4, Theorem 3.5] X O(1) (impossible) NP-complete [6] X in P [8] NP-complete [4, Theorem 3.4] X X in P (Proposition 6) NP-complete [4, Theorem 3.5] X X NP-complete (Theorem 2) NP-complete [4, Theorem 3.1] X X in P (Proposition 2) NP-complete [4, Theorem 3.4] X X X NP-complete (Theorem 3) NP-complete [4, Theorem 3.1] Table 1. Known complexity results on decomposing graphs using subsets of {K1,3 , K3 , P4 }. Terminology. We follow Brandstädt et al. [2] for notation and terminology. All graphs we consider are simple, connected and nontrivial (i.e. |V (G)| ≥ 2 and |E(G)| ≥ 1). Given a set S of graphs, a graph G admits an S-decomposition, or is S-decomposable, if E(G) can be partitioned into subgraphs, each of which is isomorphic to a graph in S. Throughout the paper, S denotes the set of connected graphs of size 3, i.e. S = {K3 , K1,3 , P4 }. We study the following problem: S ′ -decomposition Input: a cubic graph G = (V, E), a non-empty set S ′ ⊆ S. Question: does G admit a S ′ -decomposition? We let G[U ] denote the subgraph of G induced by U ⊆ V (G). Given a graph G = (V, E), removing a subgraph H = (V ′ ⊆ V, E ′ ⊆ E) of G consists in removing edges E ′ from G as well as the possibly resulting isolated vertices. Finally, let G and G′ be two graphs. Then: – subdividing an edge {u, v} ∈ E(G) consists in inserting a new vertex w into that edge, so that V (G) becomes V (G) ∪ {w} and E(G) is replaced with E(G) \ {u, v} ∪ {u, w} ∪ {w, v}; – attaching G′ to a vertex u ∈ V (G) means building a new graph H by identifying u and some v ∈ V (G′ ); 2 – attaching G′ to an edge e ∈ E(G) consists in subdividing e using a new vertex w, then attaching G′ to w. Figure 1 illustrates the process of attaching an edge to an edge of the cube graph, and shows other small graphs that we will occasionally use in this paper. u v u (a) v (b) (c) (d) Fig. 1. (a) Attaching a new edge to {u, v}; (b) the diamond graph; (c) the co-fish graph; (d) the net graph. 2 Decompositions Without a K1,3 In this section, we study decompositions of cubic graphs that use only P4 ’s or K3 ’s. Note that no cubic graph is {K3 }-decomposable, since all its vertices have odd degree. According to Bouchet and Fouquet [1], Kotzig [8] proved that a cubic graph admits a {P4 }-decomposition iff it has a perfect matching. However, the proof of the forward direction as presented in [1] is incomplete, as it requires the use of Proposition 1.(b) below, which is missing from their paper. Therefore, we provide the following proposition for completeness, together with another result which will also be useful for the case where S ′ = {K3 , P4 }. Proposition 1. Let G be a cubic graph that admits a {K3 , P4 }-decomposition D. Then, in D, (a) no K3 is used, and (b) no three P4 ’s are incident to the same vertex. Proof. Partition V (G) into three sets V1 , V2 and V3 , where V1 (resp. V2 , V3 ) is the set of vertices that are incident to exactly one P4 (resp. two, three P4 ’s) in D. Note that V1 is exactly the set of vertices involved in K3 ’s in D. Let ni = |Vi |, 1 ≤ i ≤ 3. Our goal is to show that n1 = n3 = 0, i.e. V1 = V3 = ∅. For this, note that (1) each vertex in V3 is the extremity of three different P4 ’s, (2) each vertex in V2 is simultaneously the extremity of one P4 and an inner vertex of another P4 , while (3) each vertex in V1 is the extremity of one P4 . Since each P4 has two extremities and two inner vertices, if p is the number of P4 ’s in D, we have: • p= • p= 3n3 +n2 +n1 2 n2 2 (by (2) (by (1), (2) and (3) above, counting extremities); above, counting inner vertices). Putting together the above two equalities yields n1 = n3 = 0, which completes the proof. ⊓ ⊔ 3 Since K3 ’s cannot be used in cubic graphs for {K3 , P4 }-decompositions by Proposition 1 above, we directly obtain the following result, which implies that {K3 , P4 }-decomposition is in P. Proposition 2. A cubic graph admits a {K3 , P4 }-decomposition iff it has a perfect matching. 3 Decompositions Without a P4 In this section, we study decompositions of cubic graphs that use only K1,3 ’s or K3 ’s. Proposition 3. A cubic graph G admits a {K1,3 }-decomposition iff it is bipartite. Proof. For the reverse direction, select either set of the bipartition, and make each vertex in that set the center of a K1,3 . For the forward direction, let D be a {K1,3 }-decomposition of G, and let C and L be the sets of vertices containing, respectively, all the centers and all the leaves of K1,3 ’s in D. We show that this is a bipartition of V (G). First, C ∪ L = V since D covers all edges and therefore all vertices. Second, C ∩ L = ∅ since a vertex in C ∩ L would have degree at least 4. Finally, each edge in D connects the center of a K1,3 and a leaf of another K1,3 in D, which belong respectively to C and L. Therefore, G is bipartite. ⊓ ⊔ We now prove that {K1,3 , K3 }-decompositions can be computed in polynomial time. Recall that a graph is H-free if it does not contain an induced subgraph isomorphic to a given graph H. Since bipartite graphs admit a {K1,3 }decomposition (by Proposition 3), we can restrict our attention to non-bipartite graphs that contain K3 ’s (indeed, if they were K3 -free, then only K1,3 ’s would be allowed and Proposition 3 would imply that they admit no decomposition). Our strategy consists in iteratively removing subgraphs from G and adding them to an initially empty {K1,3 , K3 }-decomposition until G is empty, in which case we have an actual decomposition, or no further removal operations are possible, in which case no decomposition exists. Our analysis relies on the following notion: a K3 induced by vertices {u, v, w} in a graph G is isolated if V (G) contains no vertex x such that {u, v, x}, {u, x, w} or {x, v, w} induces a K3 . Lemma 1. If a cubic graph G admits a {K1,3 , K3 }-decomposition D, then every isolated K3 in G belongs to D. Proof (contradiction). If an isolated K3 were not part of the decomposition, then exactly one vertex of that K3 would be the center of a K1,3 , leaving the remaining edge uncovered and uncoverable. ⊓ ⊔ C6 is a minimal example of a cubic non-bipartite graph with K3 ’s that admits no {K1,3 , K3 }-decomposition: both K3 ’s in that graph must belong to the decomposition (by Lemma 1), but their removal yields a perfect matching. 4 Observation 1. Let G be a connected cubic graph. Then no sequence of at least one edge or vertex removal from G yields a cubic graph. Proof (contradiction). If after applying at least one removal from G we obtain a cubic graph G′ , then the graph that precedes G′ in this removal sequence must have had a vertex of degree at least four, since G is connected. ⊓ ⊔ Proposition 4. For any non-bipartite cubic graph G whose K3 ’s are all isolated, one can decide in polynomial time whether G is {K1,3 , K3 }-decomposable. Proof. We build a {K1,3 , K3 }-decomposition by iteratively removing K1,3 ’s and K3 ’s from G, which we add as we go to an initially empty set D. By Lemma 1, all isolated K3 ’s must belong to D, so we start by adding them all to D and removing them from G; therefore, G admits a {K1,3 , K3 }-decomposition iff the resulting subcubic graph G′ admits a {K1,3 }-decomposition. Observe that G′ contains vertices of degree 1 and 2; we note that: 1. each vertex of degree 1 must be the leaf of some K1,3 in D; 2. each vertex of degree 2 must be the meeting point of two K1,3 ’s in D. The only ambiguity arises for vertices of degree 3, which may either be the center of a K1,3 in D or the meeting point of three K1,3 ’s in D; however, there will always exist at least one other vertex of degree 1 or 2 until the graph is empty (by Observation 1.). Therefore, we can safely remove K1,3 ’s from our graph and add them to D by following the above rules in the stated order; if we succeed in deleting the whole graph in this way, then D is a {K1,3 , K3 }-decomposition of G, otherwise no such decomposition exists. ⊓ ⊔ We conclude with the case where the graph may contain non-isolated K3 ’s. Proposition 5. If a cubic graph G contains a diamond, then one can decide in polynomial time whether G is {K1,3 , K3 }-decomposable. Proof. The only cubic graph on 4 vertices is K4 , which is diamond-free and {K1,3 , K3 }-decomposable, so we assume |V (G)| ≥ 6. Let D be a diamond in G induced by vertices {u, v, w, x} and such that {u, x} 6∈ E(G), as shown in Figure 2(a). D is connected to two other vertices u′ and x′ of G, which are respectively adjacent to u and x, and there are only two ways to use the edges of D in a {K1,3 , K3 }-decomposition, as shown in Figure 2(b) and (c). If u′ = x′ , regardless of the decomposition we choose for D, u′ and its neighbourhood induce a P3 in the graph obtained from G by removing the parts added to D. But then that P3 cannot be covered, so no {K1,3 , K3 }-decomposition exists for G. Therefore, we assume that u′ 6= x′ . As Figure 2(b) and (c) show, either {u, v, w} or {v, w, x} must form a K3 in D, thereby forcing either {v, w, x, x′ } or {u′ , u, v, w} to form a K1,3 in D. In both cases, removing the K3 and the K1,3 yields a graph G′ which contains vertices of degree 1, 2 or 3. As in the proof of Proposition 4, Observation 1 allows us to make the following helpful observations: 5 1. every leaf in G′ must be the leaf of some K1,3 in D; 2. every vertex y of degree two in G′ must either belong to a K3 or be a leaf of two distinct K1,3 ’s in D, which can be decided as follows: (a) if y belongs to a K3 in G′ , then it must also belong to a K3 in D; otherwise, it would be the leaf of a K1,3 and the graph obtained by removing that K1,3 would contain a P3 , which we cannot cover; (b) otherwise, y must be a leaf of two K1,3 ’s in D. We therefore iteratively remove subgraphs from our graph and add them to D according to the above rules, which we follow in the stated order; if we succeed in deleting the whole graph in this way using either decomposition in Figure 2(b) or (c) as a starting point, then D is a {K1,3 , K3 }-decomposition of G, otherwise no such decomposition exists. ⊓ ⊔ v u v x u′ u x′ v x u′ u x′ x u′ x′ w w w (a) (b) (c) Fig. 2. (a) A diamond in a cubic graph, and (b), (c) the only two ways to decompose it in a {K1,3 , K3 }-decomposition. All the arguments developed in this section lead to the following result. Proposition 6. The {K1,3 , K3 }-decomposition problem on cubic graphs is in P. 4 Decompositions That Use Both K1,3 ’s and P4 ’s In this section, we show that problems {K1,3 , P4 }-decomposition and {K1,3 , K3 , P4 }-decomposition are NP-complete. Our hardness proof relies on two intermediate problems that we define below and is structured as follows: cubic planar monotone 1-in-3 satisfiability ≤P degree-2,3 {K1,3 , K3 , P4 }-decomposition with marked edges ≤P {K1,3 , K3 , P4 }-decomposition with marked edges ≤P {K1,3 , P4 }-decomposition (Theorem 1 page 10) (Lemma 4 page 9) (Lemma 3 page 7) We start by introducing the following intermediate problem: {K1,3 , K3 , P4 }-decomposition with marked edges Input: a cubic graph G = (V, E) and a subset M ⊆ E of edges. Question: does G admit a {K1,3 , K3 , P4 }-decomposition D such that no edge in M is the middle edge of a P4 in D and such that every K3 in D has either one or two edges in M ? 6 The drawings that illustrate our proofs in this section show marked edges as dotted edges. The proof of Lemma 3 uses the following result. Lemma 2. Let e be a bridge in a cubic graph G which admits a {K1,3 , K3 , P4 }decomposition D. Then e must be the middle edge of a P4 in D. Proof (contradiction). First note that e cannot belong to a K3 in D. Now suppose e is part of a K1,3 in D. The situation is as shown below (without loss of generality): e bank A bank B If we remove from G the K1,3 in D that contains e, then summing the terms of the degree sequence of G[V (B)] yields 2 + 3(|V (B)| − 1) = 2|E(B)|, which means that 2|E(B)| ≡ 2 (mod 3), so |E(B)| 6≡ 0 (mod 3) and therefore B admits no decomposition into components of size three. The very same argument shows that if e belongs to a P4 in D, then it must be its middle edge, which completes the proof. ⊓ ⊔ Lemma 3. Let (G, M ) be an instance of {K1,3 , K3 , P4 }-decomposition with marked edges, and G′ be the graph obtained by attaching a co-fish to every edge in M . Then G can be decomposed iff G′ admits a {K1,3 , P4 }-decomposition. Proof. We prove each direction separately. ⇒: we show how to transform a decomposition D of (G, M ) into a decomposition D′ of G′ . The subgraphs in D that have no edge in M are not modified. For the other subgraphs, we distinguish between four cases: (a) if an edge of M belongs to a K1,3 in D, then attaching a co-fish does not prevent us from adapting the decomposition of G in G′ : (b) if an edge of M belongs to a P4 in D, then it is an extremity of that P4 and attaching a co-fish does not prevent us from adapting that part of the decomposition: (c) if a K3 in D has one edge in M , we can adapt the partition as follows: 7 (d) if a K3 in D has two edges in M , we can adapt the partition as follows: ⇐: we now show how to transform any {K1,3 , P4 }-decomposition D′ of G′ into a decomposition of (G, M ). Again, the only parts of D′ that will need adapting are those connected to the co-fishes that we inserted when transforming G into G′ . Since the leaf u of the co-fish we inserted has a neighbour x such that {u, x} is a bridge in G′ , {u, x} is the middle edge of a P4 in D′ (Lemma 2) and we may therefore assume without loss of generality that our starting point in G′ is as follows: v G′ : v x u w G: w with {v, w} 6∈ E(G′ ) since G is simple; therefore {u, w} cannot belong to a K3 in G′ , and we have two cases to consider: (a) if {u, w} belongs to a K1,3 in D′ , that K1,3 can be mapped onto a K1,3 in D by replacing {u, w} with {v, w}; (b) otherwise, {u, w} is an extremal edge of a P4 in D′ ; since {u, w} 6∈ E(G), either that edge will remain in a P4 when removing the co-fish and replacing {u, w} with {v, w}, or it will end up in a K3 with either one or two marked edges. Either way, the part can be added as such to D. ⊓ ⊔ We now show that we can restrict our attention to the following variant of {K1,3 , K3 , P4 }-decomposition with marked edges. We say a graph is degree-2,3 if its vertices have degree only 2 or 3. degree-2,3 {K1,3 , K3 , P4 }-decomposition with marked edges Input: a degree-2,3 graph G = (V, E) and a subset M ⊆ E of edges. Question: does G admit a {K1,3 , K3 , P4 }-decomposition D such that no edge in M is the middle edge of a P4 in D and such that every K3 in D has either one or two edges in M ? The following observation will help. Observation 2. Let G be a degree-2,3 graph with |V2 | degree-2 vertices. If G is {K1,3 , K3 , P4 }-decomposable, then |V2 | ≡ 0 (mod 3). 8 t1 t1 v1 v2 v1 v3 t2 v2 t3 v3 t2 (a) t3 (b) Fig. 3. Adding a net (a) to a graph with degree-2 vertices t1 , t2 , t3 (dotted edges belong to M ′ ), and (b) its only possible decomposition (up to symmetry). Proof. If G = (V, E) admits a {K1,3 , K3 , P4 }-decomposition, then |E| ≡ 0 (mod 3). Let V2 and V3 be the subsets of vertices of degree 2 and 3 in G. Then 2|V2 | + 3|V3 | = 2|E|, so 2|V2 | ≡ 0 (mod 3). ⊓ ⊔ We prove that allowing degree-2 vertices does not make the problem substantially more difficult, by adding the following gadgets until all vertices have degree 3. Let (G, M ) be an instance of degree-2,3 {K1,3 , K3 , P4 }-decomposition with marked edges, where G has at least three degree-2 vertices t1 , t2 , t3 ; by adding a net over {t1 , t2 , t3 }, we mean attaching a net by its leaves to v1 , v2 and v3 and adding the edges incident to the net’s leaves to M (see Figure 3(a)). Proposition 7. Let (G, M ) be an instance of degree-2,3 {K1,3 , K3 , P4 }-decomposition with marked edges, where G has at least three degree-2 vertices t1 , t2 , t3 , and let (G′ , M ′ ) be the instance obtained by adding a net to (G, M ). Then (G′ , M ′ ) has three degree-2 vertices less than (G, M ), and (G, M ) can be decomposed iff (G′ , M ′ ) can be decomposed. Proof. By construction, G′ has fewer degree-2 vertices, since t1 , t2 , t3 now have degree 3 instead of 2, other vertices of G are unchanged, and new vertices {v1 , v2 , v3 } have degree 3. We now prove the equivalence. ⇒: given a decomposition D for (G, M ), we only need to add the K1,3 induced by {v1 , t1 , v2 , v3 } and the P4 induced by {t2 , v2 , v3 , t3 } to cover the edges of the added net in order to obtain a decomposition D′ for (G′ , M ′ ) (see Figure 3(b)). ⇐: we show that the only valid decompositions must include the choice we made in the proof of the forward direction. Indeed, the marked edges cannot be middle edges in a P4 , and the K3 induced by v1 , v2 and v3 cannot appear as a K3 in a decomposition. Moreover, no marked edge can be the extremity of a P4 with two edges lying in the K3 , since this would force another marked edge to be the middle edge of a P4 . Therefore the only possible decomposition of the net is the one defined above (up to symmetry), and we can safely remove the P4 and the K1,3 from D′ while preserving the rest of the decomposition. ⊓ ⊔ Lemma 4. degree-2,3 {K1,3 , K3 , P4 }-decomposition with marked edges ≤P {K1,3 , K3 , P4 }-decomposition with marked edges. 9 Proof. Given an instance (G, M ) of degree-2,3 {K1,3 , K3 , P4 }-decomposition with marked edges, create an instance (G′ , M ′ ) by successively adding a net to any triple of degree-2 vertices, until no such triple remains. By Proposition 7, (G, M ) is decomposable iff (G′ , M ′ ) is decomposable. Moreover, either G′ is cubic (hence (G′ , M ′ ) is an instance of {K1,3 , K3 , P4 }-decomposition with marked edges), or G is trivially a no-instance by Observation 2. ⊓ ⊔ Finally, we show that degree-2,3 {K1,3 , K3 , P4 }-decomposition with marked edges is NP-complete. Our reduction relies on the cubic planar monotone 1-in-3 satisfiability problem [9]: cubic planar monotone 1-in-3 satisfiability a Boolean formula φ = C1 ∧ C2 ∧ · · · ∧ Cn without negations over a set Σ = {x1 , x2 , . . . , xm }, with exactly three distinct variables per clause and where each literal appears in exactly three clauses; moreover, the graph with clauses and variables as vertices and edges joining clauses and the variables they contain is planar. Question: does there exist an assignment of truth values f : Σ → {true, false} such that exactly one literal is true in every clause of φ? Input: Theorem 1. degree-2,3 {K1,3 , K3 , P4 }-decomposition with marked edges is NP-complete. Proof. We first show how to transform an instance φ = C1 ∧ C2 ∧ · · · ∧ Cn of cubic planar monotone 1-in-3 satisfiability into an instance (G, M ) of degree-2,3 {K1,3 , K3 , P4 }-decomposition with marked edges. The transformation proceeds by: 1. mapping each variable xi onto a K1,3 denoted by K(xi ) and whose edges all belong to M ; 2. mapping each clause C = {xi , xj , xk } onto a cycle with five vertices in such a way that K(xi ), K(xj ) and K(xk ) each have a leaf that coincides with a vertex of the cycle and exactly two such leaves are adjacent in the cycle. Figure 4 illustrates the construction, which yields a degree-2,3 graph. We now show that φ is satisfiable iff (G, M ) admits a decomposition. ⇒: we apply the following rules for transforming a satisfying assignment for φ into a decomposition D for (G, M ): – if variable xi is set to false, then the corresponding K(xi ) is added as such to D; – otherwise, the three edges of K(xi ) will be the meeting points of three different K1,3 ’s in the decomposition, one of which will have two edges in the current clause gadget. Two cases can be distinguished based on whether or not a leaf of K(xi ) is adjacent to a leaf of K(xj ) or K(xk ), but in both cases the rest of the clause gadget yields a P4 that we add as such to the decomposition (see Figure 4(b) and (c)). 10 ⇐: we now show how to convert a decomposition D for (G, M ) into a satisfying truth assignment for φ. First, we observe that D must satisfy the following crucial structural property: For each clause C = (xi ∨ xj ∨ xk ), exactly two subgraphs out of K(xi ), K(xj ) and K(xk ) appear as K1,3 ’s in D. Indeed, G is K3 -free by construction, and: (a) if all of them appear as K1,3 ’s in D, then the remaining five edges of the clause gadget cannot be decomposed; (b) if only K(xi ) appear as a K1,3 in D, then xj — without loss of generality — must be a leaf either of a K1,3 in D with a center in the clause gadget or of a P4 in D with two edges in the clause gadget (the P4 cannot connect xj and xk , otherwise the rest of the gadget cannot be decomposed); in both cases, the remaining three edges of the clause gadget must form a P4 , thereby causing K(xk ) to appear as a K1,3 in D, a contradiction (a similar argument allows us to handle K(xj ) and K(xk )); (c) finally, if none of them appear as K1,3 ’s in D, then xi must be the leaf either of a K1,3 in D with a center in the clause gadget, or of a P4 with two edges in the clause gadget; in both cases, the remaining three edges of the clause gadget must form a P4 in D, which in turn makes it impossible to decompose the rest of the graph. Therefore, D yields a satisfying assignment for φ in the following simple way: if K(xi ) appears as a K1,3 in D, set it to false, otherwise set it to true. ⊓ ⊔ Theorem 2. {K1,3 , P4 }-decomposition is NP-complete. ⊓ ⊔ Proof. Immediate from Lemmas 3 and 4 and Theorem 1. xi xj xi xk (a) xj xi xk (b) xj xk (c) Fig. 4. (a) Connecting clause and variable gadgets in the proof of Theorem 1; dotted edges belong to M . (b), (c) Converting truth assignments into decompositions in the proof of Theorem 1; the only variable set to true is mapped onto a K1,3 in the decomposition; (b) shows the case where the only variable set to true — namely, xi — is such that K(xi ) has no leaf adjacent to a leaf of K(xj ) nor K(xk ); (c) shows the other case, where xj is set to true and K(xi ) and K(xk ) have leaves made adjacent by the clause gadget. 11 A like-minded reduction1 allows us to prove the hardness of {K1,3 , K3 , P4 }decomposition. Theorem 3. {K1,3 , K3 , P4 }-decomposition is NP-complete, even on K3 -free graphs. 5 Conclusions and Future Work We provided in this paper a complete complexity landscape of {K1,3 , K3 , P4 }decomposition for cubic graphs. A natural generalisation, already studied by other authors, is to study decompositions of k-regular graphs into connected components with k edges for k > 3. We would like to determine whether our positive results generalise in any way in that setting. It would also be interesting to identify tractable classes of graphs in the cases where those decomposition problems are hard, and to refine our characterisation of hard instances; for instance, does there exist a planarity-preserving reduction for Theorem 3? Finally, we note that some applications relax the size constraint by allowing the use of graphs with at most k edges in the decomposition [10]; we would like to know how that impacts the complexity of the problems we study in this paper. References [1] A. Bouchet and J.-L. Fouquet, Trois types de décompositions d’un graphe en chaı̂nes, in Combinatorial Mathematics: Proceedings of the International Colloquium on Graph Theory and Combinatorics, C. Berge, D. Bresson, P. Camion, J. F. Maurras, and F. Sterboul, eds., vol. 75 of North-Holland Mathematics Studies, North-Holland, 1983, pp. 131–141. [2] A. Brandstädt, V. B. Le, and J. P. Spinrad, Graph classes: a survey, SIAM Monographs on Discrete Mathematics and Applications, Society for Industrial Mathematics, 1987. [3] D. Dor and M. Tarsi, Graph decomposition is NP-complete: A complete proof of Holyer’s conjecture, SIAM J. Comput., 26 (1997), pp. 1166–1187. [4] M. E. Dyer and A. M. Frieze, On the complexity of partitioning graphs into connected subgraphs, Discrete Appl. Math., 10 (1985), pp. 139–153. [5] É. Fusy, Transversal structures on triangulations: A combinatorial study and straight-line drawings, Discrete Math., 309 (2009), pp. 1870–1894. [6] I. Holyer, The NP-completeness of some edge-partition problems, SIAM J. Comput., 10 (1981), pp. 713–717. [7] T. P. Kirkman, On a problem in combinatorics, Cambridge Dublin Mathematical Journal, 2 (1847), pp. 191–204. [8] A. Kotzig, Z teorie konečných pravidelných grafov tretieho a štvrtého stupňa, Časopis pro pěstovánı́ matematiky, (1957), pp. 76–92. [9] C. Moore and J. M. Robson, Hard tiling problems with simple tiles, Discrete Comput. Geom., 26 (2001), pp. 573–590. 1 See Appendix for details. 12 [10] X. Muñoz, Z. Li, and I. Sau, Edge-partitioning regular graphs for ring traffic grooming with a priori placement of the ADMs, SIAM J. Discrete Math., 25 (2011), pp. 1490–1505. [11] T. J. Schaefer, The complexity of satisfiability problems, in Proc. 10th STOC, San Diego, California, USA, May 1978, ACM, pp. 216–226. [12] R. Yuster, Combinatorial and computational aspects of graph packing and graph decomposition, Computer Science Review, 1 (2007), pp. 12–26. 13 A Appendix: Omitted Proofs Our hardness proof uses ideas similar to those used for {K1,3 , P4 }-decomposition, and is based on a slightly different intermediate problem. The structure is as follows: monotone not-all-equal 3-satisfiability ≤P K3 -free {K1,3 , P4 }-decomposition with marked edges ≤P {K1,3 , K3 , P4 }-decomposition (Theorem 4 page 14) (Lemma 5 page 14) We use the following intermediate problem. K3 -free {K1,3 , P4 }-decomposition with marked edges Input: a cubic, K3 -free graph G = (V, E) and a subset M ⊆ E of edges. Question: does G admit a {K1,3 , P4 }-decomposition D such that no edge in M is the middle edge of a P4 in D? Lemma 5. Let (G, M ) be an instance of K3 -free {K1,3 , P4 }-decomposition with marked edges, and G′ be the graph obtained by attaching a co-fish to every edge in M . Then G can be decomposed iff G′ admits a {K1,3 , K3 , P4 }-decomposition. Proof. The proof of the forward direction is exactly the same as that of the forward direction of Lemma 3. For the reverse direction, let D′ be a {K1,3 , K3 , P4 }-decomposition of G′ . The only K3 ’s in G′ are those that belong to the co-fishes we inserted, so we only need to show that removing those co-fishes does not prevent us from adapting the decomposition of G′ in order to obtain a {K1,3 , P4 }-decomposition D of G. The proof is similar to that of the reverse direction of Lemma 3, with the following modification: since G is K3 -free, we have NG (u) ∩ NG (w) = ∅, so if {u, w} is the extremal edge of a P4 in D′ , then it will map onto {v, w} in G, where it will become the extremal edge of a P4 in D (as opposed to, possibly, a K3 in the proof of Lemma 3). ⊓ ⊔ We give a reduction from the following NP-complete variant of sat [11]: monotone not-all-equal 3-satisfiability a Boolean formula φ = C1 ∧ C2 ∧ · · · ∧ Cn without negations over a set Σ = {x1 , x2 , . . . , xm }, with exactly three distinct variables per clause. Question: does there exist an assignment of truth values f : Σ → {true, false} such that exactly one or two literals are true in every clause of φ? Input: Theorem 4. K3 -free {K1,3 , P4 }-decomposition with marked edges is NP-complete. 14 Proof. Given an instance φ of monotone not-all-equal 3-satisfiability, we build an instance (G, M ) of K3 -free {K1,3 , P4 }-decomposition with marked edges as follows: 1. For each variable xi with k occurrences (we can assume k ≥ 2), we create a tree T (xi ) with 3k leaves, called a variable tree, whose edges are all marked (see Figure 5(a)). Edges incident to a leaf are called border edges, the others are called internal edges. 2. For each clause xi ∨ xj ∨ xk , we create a P7 (v1 , v2 , . . . , v7 ), called a clause path, with marked edges {v2 , v3 } and {v5 , v6 }, to which we join three border edges of each variable tree as follows (see Figure 6): • one leaf of T (x1 ) is joined to v1 , another to v3 , and another to v7 ; • one leaf of T (x2 ) is joined to v1 , another to v5 , and another to v7 ; • one leaf of T (x2 ) is joined to v2 , another to v4 , and another to v6 . Note that the resulting graph is indeed cubic: each inner vertex of a variable tree has degree 3, and each leaf is also part of a clause path. Furthermore, the inner vertices of a clause path are adjacent to two other vertices in the path and one other vertex in a variable tree, and each endpoint of a clause path is adjacent to another vertex in the path and two vertices in different variable trees. We further observe that G is K3 -free. First, any cycle included only in variable trees has length at least 4 (since it must be included in at least 2 such tree, and in each tree the path between any pair of leaves has length at least 2). Therefore, a K3 would have to use 1 or 2 edges in a clause path. If it uses only one edge {vi , vi+1 }, then both vi and vi+1 must be joined to leaves of the same variable tree, which is impossible since each clause consists of three different variables. If two edges are used, then the last edge of the K3 would be joining two leaves in some variable tree, which is also impossible. Therefore, G is K3 -free. We now prove that φ is satisfiable iff (G, M ) admits a decomposition. ⇒: From a satisfying truth assignment, we create a {K1,3 , P4 }-decomposition of (G, M ) as described in Figures 5(b − c) and 6(b − e). Specifically, for each variable xi with k occurrences, if xi = true, then we cover all edges of T (xi ) with 2k − 1 K1,3 ’s (Figure 5(b)). If xi = false, then we cover all internal edges of T (xi ) with k − 1 K1,3 ’s(Figure 5(c)). Now for any clause xi ∨ xj ∨ xk , at least 1 and at most 2 variables among {xi , xj , xk } are set to false. For these two variables and the corresponding variable trees, the border edges are still uncovered (for variables assigned true, border edges are covered with the rest of the variable tree). Each tree has 3 border edges coming to the clause path, so there are either 9 or 12 edges to cover (6 in the clause path and 3 or 6 in border variable trees). As shown in Figures 5(b − e), there always exist a decomposition of these edges into K1,3 ’s and P4 ’s (with the constraint that no marked edge is the middle of a P4 ). Overall, all edges in all variable trees and clause paths are covered by a K1,3 or a P4 , therefore (G, M ) admits a {K1,3 , P4 }-decomposition. 15 A ... B leaves (a) ... (b) ... (c) Fig. 5. (a) A variable tree T (xi ) for a variable xi with k occurrences: all its edges are marked, and it has 3k leaves. Internal vertices are partitioned into two sets A and B. (b) A decomposition of T (xi ), corresponding to xi = true. (c) A decomposition of the internal edges of T (xi ), corresponding to xi = false. ⇐: We first consider any variable tree, and show that the decompositions used for true and false assignments above are in fact the only two possible decompositions of the internal edges of this tree. Indeed, consider internal vertices and their partition into A and B (see Figure 5(a)): because of marked edges, all edges between any two internal vertices must be part of a K1,3 , linking a leaf to a center. Since internal vertices form a path, they must alternate along this path between leaves and centers of K1,3 ’s, so either all vertices of B are centers, or all vertices of A are centers. Each case yields only one possible decomposition of adjacent edges, as described respectively in Figures 5(b) and 5(c). Naturally, we assign true to any variable whose tree is decomposed as in the first case, and false to other variables. We further make the following observation for the false case: consider any leaf x of the tree, and its parent y. Due to marked edges, x can only be the center of a K1,3 , or a middle node of a P4 , of which y is an endpoint. We now consider a clause xi ∨xj ∨xk , and show that its variables can neither be all set to true nor all set to false. Aiming at a contradiction, assume first that all variables are set to true. Then all border edges of their trees are already covered, and the K1,3 ’s and P4 ’s covering the clause path may only use the 6 edges of the path. The only possibility to decompose the path in such a way is to use two P4 ’s, however, such P4 ’s would have marked 16 T (xi ) v1 T (xj ) v3 v5 v2 v4 v7 v6 T (xk ) (a) T (xi ) v1 T (xj ) v3 v2 T (xi ) v5 v4 v7 v1 v6 T (xj ) v3 v2 v5 v4 v7 v6 T (xk ) T (xk ) (b) xi = true, xj = true, xk = false (c) xi = true, xj = false, xk = true T (xi ) v1 T (xj ) v3 v2 T (xi ) v5 v4 v7 v6 v1 T (xj ) v3 v2 v5 v4 v7 v6 T (xk ) T (xk ) (d) xi = false, xj = true, xk = false (e) xi = false, xj = false, xk = true Fig. 6. (a) A clause path and its connections to the variable trees. (b − e) For each truth assignment of xi , xj , xk (up to symmetry), a decomposition of the path edges and the neighboring uncovered edges of variable trees for false variables. 17 edges as middle edges, which is forbidden. We now assume that all variables of a clause are set to false, i.e. it remains to cover the clause path and all border edges of the variable trees. Thanks to the observation made on leaves of the tree in the false case, vertices v1 and v2 are either centers of K1,3 ’s, or middle nodes in P4 ’s. They cannot both be centers of K1,3 ’s, and due to marked edges, they must both be middle nodes of the same P4 . However, as noted above, the parents of v1 in both trees T (xi ) and T (xj ) should be endpoints of this P4 , which is impossible. Finally, each variable has been assigned a truth value, and for each clause there must be at least one true and one false variable: therefore, we have a satisfying assignment for our instance of monotone not-all-equal 3satisfiability. ⊓ ⊔ 18
8cs.DS
1 Fuel-Efficient En Route Formation of Truck Platoons arXiv:1704.08836v1 [cs.SY] 28 Apr 2017 Sebastian van de Hoef, Karl H. Johansson, Fellow, IEEE and Dimos V. Dimarogonas, Member, IEEE Abstract—The problem of how to coordinate a large fleet of trucks with given itinerary to enable fuel-efficient platooning is considered. Platooning is a promising technology that enables trucks to save significant amounts of fuel by driving close together and thus reducing air drag. A setting is considered in which each truck in a fleet is provided with a start location, a destination, a departure time, and an arrival deadline from a higher planning level. Fuel-efficient plans should be computed. The plans consist of routes and speed profiles that allow trucks to arrive by their arrival deadlines. Hereby, trucks can meet on common parts of their routes and form platoons, resulting in decreased fuel consumption. We formulate a combinatorial optimization problem that combines plans involving only two vehicles. We show that this problem is hard to solve for large problem instances. Hence a heuristic algorithm is proposed. The resulting plans are further optimized using convex optimization techniques. The method is evaluated with Monte Carlo simulations in a realistic setting. We demonstrate that the proposed algorithm can compute plans for thousands of trucks and that significant fuel savings can be achieved. I. I NTRODUCTION LATOONING is foreseen to become a common element in intelligent transportation systems. The term refers to a group of vehicles forming a road train without any physical coupling between them. A short inter-vehicle distance is maintained by automatic control and vehicle-to-vehicle communication. Platooning has received a lot of attention due to its potential to increase road throughput by reducing the intervehicle gaps. It can also help facilitate the (semi-)automatic operation of vehicles [1]. This paper focuses on the potential of platooning in reducing fuel consumption. Similar to what racing cyclists exploit, the follower vehicles, and to a lesser degree the lead vehicle, experience a reduction in air drag, which translates into reduced fuel consumption [2]–[4]. Advances in wireless communication, satellite-based position, and advanced driver support systems have made the wide deployment of platooning systems feasible and have attracted the attention of major truck manufacturers. Increased fuel costs and environmental awareness make the implementation of such systems likely in the near future. Using platooning to reduce fuel consumption for a large number of trucks leads to a challenging coordination problem. Consider two trucks that travel between the same two regions but from different locations and at approximately the same time. Then the trucks can adjust their speeds slightly at the beginning of their journeys, form a platoon at the start of the P ACCESS Linnaeus Center and the School of Electrical Engineering, KTH Royal Institute of Technology, SE-100 44, Stockholm, Sweden (e-mail: {shvdh,kallej,dimos}@kth.se). common part of their route and thus save fuel during part of their trips. This approach might involve one of the trucks having to drive slightly faster before the two merge, which increases air-drag and consequently fuel consumption during the initial phase. One truck might instead slow down to let the other truck catch up but then travel at an increased speed later on to arrive at its destination on time. If many trucks are involved, it is not straightforward to compute an optimal plan for all trucks. The main contribution of the paper is to derive an efficient and scalable method to coordinate platooning of a large number of trucks in a fuel-efficient way explicitly considering the effect of speed and platooning on the fuel consumption. The core novelty is that the computation of platoon plans is done in three computationally and mathematically tractable stages. The first stage involves the computation of platoon plans only taking into account two vehicles at a time. The second stage selects one such plan for each vehicle. Since the problem to be solved in the second stage is shown to be NP-hard, an iterative algorithm to compute heuristic solutions is proposed. In the third stage, the resulting plans are optimized further using convex optimization techniques. The potential of the method is demonstrated using Monte Carlo simulations. The simulations demonstrate that the method is able to significantly reduce the fuel consumption of a fleet of vehicles as well as to handle a realistic number of transport assignments for the example of Sweden. The efficient operation of transport systems is a widely studied field due to its large economic and environmental impact. Planning conducted by transportation operators ranges all the way from strategic over tactical to operational planning [5]. The planning on the latter stage typically happens on the level of departure and arrival times which is the input to the problem considered in this paper. Research on eco-routing aims to reduce fuel consumption by appropriate choice of route and travel speeds for individual vehicles [6]. Furthermore, operators of road infrastructure use variable speed limits, ramp metering, variable route recommendations, etc. to improve safety and efficiency of the road transportation system [7]. Various aspects of platoon coordination have been considered in the literature. In [8] the authors formulate a mixed integer linear programming problem, without considering the speed dependency of fuel consumption, and prove that the problem is NP-hard. In [9] the authors consider a simple catch-up coordination scheme and evaluate it on real fleet data. In [10] local controllers for coordinating the formation of platoons are proposed. In [11] the authors use data-mining to identify economic platoons based on various criteria. Unlike 2 this paper the method presented in [11] allows that trucks wait for other trucks to form the platoon. Preliminary material used in this paper has been presented in [12], [13]. One of the key elements to make the problem tractable for realistic numbers of trucks, is to select a subset of vehicles called coordination leaders to which other vehicles adapt. The way we select this subset of vehicles is inspired by a clustering algorithm called partitioning around medoids [14]. Clustering is present in a variety of different contexts. A large body of research focuses on clustering methods as an analysis tool to structure, understand, and classify large data sets [15], [16]. Examples include the clustering of graphs in the scope of community detection [17]–[19]. Closely related to our problem of choosing coordination leaders is leader election, where a group of agents has to jointly determine a leader [20], [21]. The approach developed in this paper can be seen as local leader election, where pairwise fuel savings are interpreted as preferences for trucks being coordination leaders. The paper is organized as follows. We start in Section II by formulating the coordination problem and introduce the structure of the proposed solution in Section III. In Section IV the problem is broken down to a purely combinatorial problem of selecting coordination leaders and the problem is shown to be NP-hard. In Section V an iterative algorithm is developed to find heuristic solutions to the combinatorial problem. Section VI discusses how to jointly optimize the plans when the trucks are constrained to the platoons as proposed by the algorithm from Section V. In Section VII the method is demonstrated by Monte Carlo simulations in a realistic scenario with up to 5 000 trucks on the Swedish road network. II. P ROBLEM F ORMULATION In this section we formulate the problem and introduce the notation. We have an index set Nc of finitely many transport assignments, each tied to a specific truck. A transport assignment A = (P S , P D , tS , tD ) consists of a start position P S , a destination P D , a start time tS , and an arrival deadline tD . We model the road network as a directed graph Gr = (Nr , Er ) with nodes Nr and edges Er . Nodes correspond to intersections or endpoints in the road network and edges correspond to road segments connecting these intersections. The function L : Er → R+ maps each edge in Er to the length of the corresponding road segment. A vehicle position is a pair (e, x) ∈ Er × [0, L(e)] where e indicates the current road segment and x how far the vehicle has traveled along that segment. The goal is to compute fuel-efficient plans for the trucks that ensure arrival before each trucks’ individual deadline. Each plan includes a route in the road network from start to destination and encodes a piecewise constant speed trajectory. The speed is constrained to a range of feasible speeds [vmin , vmax ], which is supposed to be the same for all vehicles and road segments.1 For the sake of this high-level planning, it is reasonable to assume that trucks change their speed instantaneously. 1 The approach developed in this paper can be generalized in order to relax this assumption. Definition 1 (Vehicle Plan). A vehicle plan P = (e, v, t̂) consists of a route e, a speed sequence v, and a time sequence t̂. The route is a sequence of Ne edges in the road network: e = (e[1], . . . , e[Ne ]), e[i] ∈ Er . The speed sequence is a sequence of Nv speeds v = (v[1], . . . , v[Nv ]), where speeds are within the feasible speed range 0 < vmin ≤ v[i] ≤ vmax . The time sequence t̂ = (t̂[1], . . . , t̂[Nv + 1]) defines when the speed changes. Speed v[i] is selected from t̂[i] until t̂[i + 1]. Note that changes in speed can happen, in principle, everywhere and not only at the beginning of route segments. The symbols Ne and Nv are introduced for notational convenience and their value may be different for different vehicle plans. We want to compute a vehicle plan for each truck. A valid vehicle plan brings the truck from its start position P S = (eS , xS ), where it is at time tS , to its destination P D = (eD , xD ) before its deadline tD . Vehicle plans are constrained by two conditions. The first condition requires the trip to start at the start time t̂[1] = tS and ends before the deadline t̂[Nv +1] = tA ≤ tD . The second condition ensures that the truck arrives at its destination when the trip ends, i.e., the distance traveled is D := NX e −1 i=1 L(e[i]) + xD − xS = Nv X i=1 v[i](t̂[i + 1] − t̂[i]). We introduce the notion of trajectories as functions of continuous time. A vehicle trajectory consists of an edge trajectory  and a linear position trajectory ξ. The edge trajectory for t ∈ [tS , tA ) is given by (t) = e[j] where j depends on t j−1 P L(e[i]) − xS < and is the largest integer that satisfies i=1 Rt φ(τ )dτ , and where the speed trajectory φ(t) = v[i] for tS t ∈ [t̂[i], t̂[i + 1]), i ∈ {1, . . . , Nv }. The linear position, i.e., the second element of the position, at time t is given j−1 Rt P by ξ(t) = φ(τ )dτ − L(e[i]) + xS . tS i=1 When trucks platoon, their positions coincide in our model and hence we neglect the physical dimension of the trucks. Each platoon consists of a platoon leader and a number of platoon followers. We introduce the platoon trajectory πn : [tSn , tA n ) → {0, 1} for truck n ∈ Nc . A platoon trajectory equals 1 when truck n is a platoon follower and 0 when it is a platoon leader or traveling alone. Thus πn (t) = 1 implies that there is another truck m ∈ Nc with m 6= n and (n (t), ξn (t)) = (m (t), ξm (t)). We model the fuel consumption per distance traveled as a function of the speed and of whether the truck is a platoon follower or not. A platoon leader is assumed to have the same fuel consumption as a truck that travels alone while a platoon follower has a reduced fuel consumption. Hereby, we neglect the relatively small reduction in fuel consumption when a truck is a platoon leader compared to traveling by itself. We denote the fuel consumption per distance traveled as f : [vmin , vmax ] × {0, 1} → R+ where  f0 (v) if p = 0 f (v, p) = (1) fp (v) if p = 1. 3 The function f0 models the fuel consumption when the truck is a platoon leader or when it travels solo, and fp the fuel consumption when the truck is a platoon follower. These functions can either be derived from an analytical model or fitted to data [22]. We purposely omit that fuel consumption depends on road and vehicle parameters in order to keep the presentation concise. All the presented results can be augmented to handle those additional parameters. The problem that we want to solve is to find a vehicle plan for each vehicle, and we want to minimize the combined fuel consumption of these plans. The total fuel consumption F (φn , πn ) associated with vehicle n’s plan is given by integrating the fuel consumption according to (1) over the duration of the trip Platoon Coordinator Assignments D An = (PnS , PnD , tS n , tn ) n=1 n=2 Vehicle Plans Pn = (en , vn , t̂n ) ... Fig. 1. Schematic of the platoon coordinator. Trucks provide their assignment data and the platoon coordinator computes fuel efficient vehicle plans. A Ztn F (φn , πn ) = f (φn (t), πn (t))φn (t)dt, (2) tS n where φn is the speed trajectory, πn the platoon trajectory, tSn the start time, and tA n the arrival time of truck n. The combined fuel consumption Fc is given by X Fc = F (φn , πn ). (3) n∈Nc Our primary goal is to compute vehicle plans that minimize Fc . III. P LATOON C OORDINATOR Consider the centralized platoon coordinator in Fig. 1. Trucks connect to the coordinator via vehicle-to-infrastructure communication and share their assignment data. The coordinator then computes fuel-efficient vehicle plans for the trucks. These plans are sent to the trucks and executed. This process is repeated whenever there is updated information, such as deviations from the plans and new assignments. The current vehicle position is then the new start position of an assignment that is already being executed. The computation of the vehicle plans happens in four stages: 1) Computation of the routes en , n ∈ Nc : routes are calculated using an algorithm for route calculation in road networks. 2) Computation of pairwise vehicle plans: many plans involving two vehicles are computed. The fuel savings of these plans are recorded as the coordination graph Gc introduced in the following. 3) Selection of pairwise plans: a consistent subset of the plans computed in the previous stage is combined by selecting a subset Nl ⊂ Nc , so-called called coordination leaders. 4) Joint speed-profile optimization: the selected pairwise plans are jointly optimized for lower fuel consumption while platoon partners as well as merge and split locations are kept as computed in step 3). Stage 1) computes the routes en , n ∈ Nc and stages 2)-4) compute the speed sequences vn and time sequences t̂n for n ∈ Nc making use of the ability of the trucks to form platoons in order to achieve low fuel consumption. Algorithms for route calculation in road networks are well developed [6], [23] and not further discussed in this paper. We discuss stages 2)-4) in the following sections. IV. S ELECTING PAIRWISE V EHICLE P LANS In this section, we formulate a combinatorial optimization problem corresponding to the second and third computation stage introduced in Section III. The problem is proven to be NP-hard which motivates the heuristic algorithm developed in Section V. To begin with, we need to be able to compute what we call a default plan. This is a valid vehicle plan according to Definition 1 with either the lowest possible or most fuel optimal constant speed. Definition 2 (Default Plan). The default plan is a vehicle plan P = (e, v, t̂) with speed sequence v = (vcd ) and time sequence t̂ = (tS , D/vcd ). The most fuel optimal speed without platooning vcd is computed as vcd = argmin f0 (v), v∈(vcm ,vmax ] where vcm is the lowest constant speed to arrive before the deadline:   D vcm = max vmin , D . t − tS An adapted plan, as introduced next, is such that the speed sequence vn and time sequence t̂n of a follower truck n is adapted in a way that allows the follower to platoon during part of its journey with a leader m. The leader sticks to its default plan, which is important in order to be able to compose these plans. The plan is computed in a way that minimizes the fuel consumption of n. Definition 3 (Adapted Plan). An adapted plan is a vehicle plan Pn = (en , vn , t̂n ) adapted to vehicle plan Pm = (em , vm , t̂m ), such that (n (t), ξn (t)) = (m (t), ξm (t)) for t ∈ [t̂n [2], t̂n [Nv,n ]). We denote the merge time as tM = t̂n [2] and the split time as tSp = t̂n [Nv,n ]. Truck n becomes the platoon follower of truck m at time tM , stays platoon follower until tSp , when the two trucks separate. This sequence of events occurs only 4 (n (tM ), ξn (tM )) (n (tSp ), ξn (tSp )) (n (tS ), ξn (tS )) (n (tA ), ξn (tA )) Fig. 2. Overview of the relevant time instances of the adapted plan. The solid line illustrates the route of the adapted plan n and the dashed line the one of the plan that it is adapted to and has index m. The parallel sections of the line indicate that the trucks share the route and the section where the lines are on top of each other indicates that the trucks platoon there. once. Fig. 2 illustrates the adapted plan. We denote the speed trajectory φ corresponding to the speed sequence v and the time sequence t̂ of the adapted vehicle plan of truck n adapted to truck m as φn,m . The fuel consumption of truck n with its plan adapted to truck m is modeled as in (2). We denote the platoon trajectory of the adapted plan πn,m (t). We have that πn,m (t) = 1 for t ∈ [tM , tSp ) and πn,m (t) = 0 for t ∈ [tS , tM ) ∪ [tSp , tA ). The fuel consumption of m is not altered by the fact that n and m platoon, since m’s speed trajectory does not change and since m takes the role of a platoon leader. The reduction in fuel consumption that results from n implementing the adapted plan and not its default plan is ∆F (n, m) = F (φn , πn ) − F (φn,m , πn,m ) where πn ≡ 0, which is positive if n adapting to m saves fuel. If no plan that is adapted to m exists for n, we define ∆F (n, m) = 0. There might exist no adapted plan because the routes do not overlap or because the constraint on the maximum speed in conjunction with the arrival deadline makes it impossible for the trucks to form a platoon. We now compute ∆F for all 2-permutations in Nc . We are only interested in adapted plans that save fuel, i.e., for which ∆F is positive. We can conveniently collect this information in a weighted graph that we call the coordination graph. Definition 4 (Coordination Graph). The coordination graph is a weighted directed graph Gc = (Nc , Ec , ∆F ). Recall that the elements of Nc represent the trucks. Ec ⊆ Nc × Nc is a set of edges, and ∆F : Ec → R+ are edge weights, such that there is an edge (n, m) ∈ Ec , if the adapted plan of n to m saves fuel compared to i’s default plan, i.e., Ec = {(i, j) ∈ Nc × Nc : ∆F (i, j) > 0, i 6= j}. Furthermore, we introduce the set of in-neighbors of a node n ∈ Nc as Nni = {i ∈ Nc : (i, n) ∈ Ec } and the set of outneighbors n as Nno = {i ∈ Nc : (n, i) ∈ Ec }. We define the the maximum over an empty set to be zero, i.e., max(·) = 0. i∈∅ With these definitions, we are ready to formulate the problem of finding a fuel optimal set of coordination leaders Nl . Problem 1. Given as input a coordination graph Gc = (Nc , Ec , ∆F ) find a subset Nl ⊂ Nc of nodes that maximizes fce (Nl ) = X i∈Nc \Nl max ∆F (i, j). j∈Nio ∩Nl (4) The coordination leaders select their default plans. The remaining assignments, called coordination followers, select Input: Gc Output: Nl Nl ← ∅ while {n̄ ∈ Nc : ∆u(n̄, Nl ) > 0} = 6 ∅ do Select n ∈ {n̄ ∈ Nc : ∆u(n̄, Nl ) > 0} if n ∈ Nl then Nl ← Nl \ {n} else Nl ← Nl ∪ {n} end if end while Fig. 3. The clustering algorithm, which is an iterative algorithm to compute the set of coordination leaders Nl . their plans adapted to the coordination leader that yields the largest fuel savings ∆F (n, m). Since the selection of adapted plans does not alter the speed trajectories of the coordination leaders, several coordination followers can select the same coordination leader without affecting the fuel savings that result from this adaptation, potentially resulting in platoons of more than two vehicles. The objective function fce (Nl ) equals the sum of all these fuel savings. If (n, m) ∈ Ec with n ∈ Nc \ Nl and m = arg max ∆F (n, m), we o m∈Nn ∩Nl say that n is the coordination follower of m and m is the coordination leader of n. If m has no out-neighbor in Nl , then maxm∈(Nno ∩Nl ) ∆F (n, m) = maxm∈∅ ∆F (n, m) = 0. Problem 1 is a combinatorial optimization problem. We can compute an optimal solution in finite time by using exhaustive search or a branch and bound technique. However, the computational complexity of such an exact computation might be too high. In fact, we show in the following that this problem is an NP-hard problem. This a strong indicator that searching for an algorithm that computes solutions for every coordination graph and scales well in the size of the coordination graph is futile [24]. Proposition 1. Problem 1 is NP-hard, where the size of the input Gc is measured as |Nc | + |Ec |. The proof can be found in the appendix. One disadvantage of the approach presented in this section is that each truck can only join one platoon. This can however be somewhat mitigated by frequent re-planning. For instance, at some later point in time, it might turn out more beneficial for a truck to leave its current platoon and join another one. V. I TERATIVE S ELECTION OF C OORDINATION L EADERS In this section we present an algorithm that computes heuristic solutions to Problem 1. Motivated by the result that Problem 1 is NP-hard, we apply an iterative strategy that converges to a local maximum. Consider the algorithm in Fig. 3, which we call the clustering algorithm. The input is a coordination graph Gc and the output is a set of coordination leaders Nl . Initially Nl is an empty set. In each iteration, a node n ∈ Nc is selected for which the objective function fce is increased if it is added to Nl or removed from Nl , and Nl is updated accordingly. The 5 difference in fce when adding or removing a node in Nc to or from the set of coordination leaders Nl is given by a function ∆u. The algorithm iterates until no further increase of fce is possible. The function ∆u that measures how much is gained from switching whether n belongs to Nl is defined as follows:  fce (Nl \ {n}) − fce (Nl ) if n ∈ Nl ∆u(n, Nl ) = fce (Nl ∪ {n}) − fce (Nl ) otherwise . (5) If n ∈ / Nl , we get fce (Nl ∪ {n}) − fce (Nl ) = X  ∆F (i, j) − max o i∈Nni \Nl − j∈Ni ∩(Nl ∪{n})  max ∆F (i, j) o j∈Ni ∩Nl max ∆F (n, i). i∈Nno ∩Nl The sum over i covers nodes that can select n as their new coordination leader. The last summand accounts for n possibly not being a coordination follower any longer. If n ∈ Nl , we get fce (Nl \ {n}) − fce (Nl ) = X  max ∆F (i, j) − o i∈Nni \Nl + j∈Ni ∩(Nl \{n}) max i∈Nno ∩(Nl \{n})  max ∆F (i, j) o j∈Ni ∩Nl ∆F (n, i). The sum over i covers nodes that can have n as their coordination leader before the change. The last summand accounts for n possibly becoming a coordination follower. In this paper, we consider two methods to select n from the set {n̄ ∈ Nc : ∆u(n̄, Nl ) > 0}. The first method is to select n in a greedy manner according to n = arg max ∆u(n̄, Nl ). The n̄∈Nc second method is to choose n randomly with equal probability from the set {n̄ ∈ Nc : ∆u(n̄, Nl ) > 0}. The clustering algorithm is guaranteed to converge in finite time. This is due to the number of possible subsets of Nc being finite and thus the number of possible assignments of Nl is finite. In every iteration fce (Nl ) strictly increases which means that Nl changes in every iteration and the same assignment for Nl never reoccurs. So in the worst case the clustering algorithm iterates over all subsets of Nc before termination. The clustering algorithm can be efficient. Note for instance that the function ∆u can be computed based on the sub-graph induced by the one- and two-hop neighbors of n only. This means that the average complexity of computing ∆u is a function of the average node degree and not of the number of nodes in the coordination graph. Furthermore, if a node is added to or removed from Nl , then only the ∆u for the two-hop neighbors needs to be recomputed. Simulations suggest that selecting n in a greedy or a random manner makes little difference for the quality of the computed solution. However, greedy node selection tends to lead to less iterations of the algorithm and is thus better suited for a serial implementation. Random node selection might be preferable for a parallel implementation due to the reduced need for synchronization. Having computed the set of coordination leaders, there is immediately a vehicle plan for each truck. These plans are jointly optimized as discussed in the following section. VI. J OINT V EHICLE P LAN O PTIMIZATION In this section, we derive how to jointly optimize the vehicle plans that are selected by the clustering algorithm. We do this by formulating a convex optimization problem with linear constraints for a group consisting of a coordination leader and its coordination followers. Hereby, the timing when platoons are assembled and broken apart is adjusted while the locations where this happens is not changed. Trucks that are not matched to any coordination leader or are not coordination leaders themselves just follow their default plans and are not considered in this section. Consider a coordination leader nl ∈ Nl and its followers Nfl,nl = {n ∈ Nc \ Nl : nl = arg max o ∆F (n, i)}. This i∈Nl ∩Nn group of agents is denoted Ng = {nl } ∪ Nfl,nl . We construct an ordered set of time instances t = (t[1], t[2], . . . ). This set contains the start time and the arrival deadline of the coordination leader, and the merge times and the split times of its followers. We divide the distance traveled by the leader from start to destination according to these time instances and get the distances Wnl [i] = (t[i + 1] − t[i])/vcd between these points, where vcd is the speed of the leader according to its default plan. These are the distances between the points where coordination followers join or leave the platoon. Similarly, for a coordination follower n ∈ Nfl,nl , we have Wn = Sp A Sp M S (vn [1](tM n −tn ), Wnl [in ], . . . , Wnl [in ], vn [Nv,n ](tn −tn )). S M Sp A The variables tn , tn , tn , tn denote the start time, merge time, split time, and arrival time of follower n according to its adapted plan. The first element of Wn is the distance along the route from start to the merge point. For the part of the route the follower platoons with the coordination leader, the entries are the same as for the coordination leader. The indices Sp iM n , in are defined accordingly. The last element of Wn is the distance from the split point to the destination of the follower. Fig. 4 illustrates the definition of Wn . We introduce sequences pn = (pn [1], . . . , pn [|Wn |]) that indicate on which segments of the journey the coordination follower is a platoon follower. If truck n is a platoon follower on the segment that corresponds to Wn [i] for some i, then pn [i] = 1. Otherwise we have pn [i] = 0. For the coordination leader nl , we have pnl = (0, . . . , 0) and for a coordination follower n ∈ Nfl,nl , we have that pn = (0, 1, 1, . . . , 1, 0). We express the speed and time sequence of truck n ∈ {nl } ∪ Nfl,nl as traversal times Tn = (Tn [1], . . . , Tn [|Wn |]) of the segments Wn . The speed on each such segment remains constant and can be computed as vn [i] = Wn [i]/Tn [i]. The traversal times of the segments in all trucks’ routes are the optimization variables. Working with traversal times rather than the sequence of speeds v allows us to state the optimization problem with linear constraints. The times when i−1 P the speed changes t̂n , are computed as t̂n [i] = tSn + Tn [j] j=1 for i = 1, . . . , Nv,n + 1. With these definitions, we are ready to state the following optimization problem: 6 vn [1](tM − tS n) Wnl [1] Wnl [2] Wnl [3] Wnl [5] Wnl [4] Wnl [8] Wnl [6] Wnl [7] Fig. 4. Illustration of how the sequences Wn are defined. The red, dotted line represents the route of the coordination leader and the black, solid lines with arrows represent the routes of the coordination followers. The thin lines indicate the distances that the elements of Wnl correspond to. Problem 2. min {Tn :n∈Ng }   v,n X NX Wn [i] f , pn [i] Wn [i] Tn [i] i=1 (6a) n∈Ng s.t. for n ∈ Ng : Wn [i] ≤ Tn [i], i ∈ {1, . . . , Nv,n } vmax Wn [i] ≥ Tn [i], i ∈ {1, . . . , Nv,n } vmin Nv,n X tSn + Tn [i] ≤ tD n (6b) (6c) (6d) i=1 and for n ∈ Nfl,nl : tSn + Tn [1] = tSnl + When f0 , fp are such that f0 (T −1 ) and fp (T −1 ) are convex in T for T > 0, then the objective (6a) is a sum of convex functions and hence convex. For instance, polynomials with arbitrary constant part and non-negative coefficients fulfill this requirement. Furthermore, all constraints are linear. Thus, Problem 2 is a convex optimization problem for which well developed numerical solvers are readily available [25], [26]. The optimization is initialized with the pairwise plans. iM n −1 X Tnl [i] (6e) i=1 Sp M Tn [1 + i] = Tnl [iM n + i − 1], i ∈ {1, . . . , in − in + 1}. (6f) The objective P function (6a) equals the combined fuel consumption F (φn , πn ) for the assignments Ng which is n∈Ng Fig. 5. Population density map from which the start and goal locations are sampled. The brighter the pixel, the larger the population density in that area. Areas not belonging to mainland Sweden are shown in blue. part of the sum that defines the combined fuel consumption of all assignment Fc defined in (3). It is composed of the fuel consumption of the coordination leader and the coordination followers. The coordination leader is considered to travel alone or take the role as the platoon leader throughout its journey. The coordination followers travel alone on the first and the last segment of their journey. They become platoon followers in-between these segments. There are two sets of constraints. The first set applies to all trucks and ensures that the sequences Tn correspond to valid vehicle plans. In particular, the constraints (6b) and (6c) express that the trajectories stay within the allowed range of speed. The constraints (6d) express that all trucks arrive before their deadline. The second set of constraints ensures that platooning happens as specified in the original pairwise plans. The constraints (6e) ensure that the coordination leader and each of its followers arrive at the same time at their respective merge point. The constraints (6f) ensure that the speed of the leader and the speed of the follower are the same when they are supposed to platoon. VII. S IMULATIONS In this section, we evaluate the coordination method outlined in the previous sections with Monte Carlo simulations. We show that coordination of truck platooning can lead to significant reductions in fuel consumption compared to the current situation where trucks do not platoon, as well as compared to spontaneous platooning where trucks only form platoons if they happen to be in the vicinity of another. We generate transport assignments randomly. The start and goal locations are sampled within mainland Sweden. The probability of an assignment starting or ending at a particular location is proportional to the population density [27], see Fig. 5. The resolution is 0.1 degrees in longitude and latitude and the road network node that is closest to the sampled coordinate is chosen. We calculate the routes with the Open Source Routing Machine [28]. Assignments for which no route can be found are disregarded. If the route is longer than 400 kilometers, a 400 kilometers long subsection of the route is randomly selected. This is to take into account that merge points too far from the current position should not be considered for coordination since the uncertainty becomes too large due to traffic, new assignments, and rest periods of the driver. Start locations along the route are considered since we believe that platoon coordination systems will frequently replan for assignments that are already en route and suspended for the driver to rest. 7 any kind of coordination effort which would be present for time gaps up to one minute. In order to assess the the quality of the solution computed by the clustering algorithm, we establish an upper bound on the solution of Problem 1. This upper bound is based on the intuition to assign every truck its best coordination leader and ignore that coordination leaders do not contribute to the objective. We have that X fce (Nl ) = max ∆F (i, j) o i∈Nc \Nl ≤ ≤ Fig. 6. The routes of a platoon coordinator with four coordination followers. The route of the coordination leader in shown in black, the routes of the coordination followers are dashed. The beginning of a route is marked with a star. The merge point of a follower is indicated with an upwards-facing triangle and the split point with a downwards-facing triangle. The fuel model is an affine approximation around 80 km/h of the analytical fuel model in [29]. We have for the fuel per distance traveled in kilograms diesel per meter f0 (v) = 8.4159 · 10−6 v + 4.8021 · 10−5 fp (v) = 5.0495 · 10−6 v + 8.5426 · 10−5 . According to this model, the relative reduction in fuel consumption of a platoon follower is 15.9 percent at a speed of 80 km/h. We consider a default speed of 80 km/h and we assume that the speed can be freely chosen between vmin = 70 km/h and vmax = 90 km/h throughout the entire journey. We sample the start time of the assignments uniformly in an interval of 2 hours and compute the arrival deadlines according to the default speed. The pairwise plans are such that trucks platoon as long as possible. Once a coordination follower splits up from the coordination leader, it drives fast enough to arrive in time at its destination and at least at default speed. The split points are such that arriving in time is feasible. Thus, trucks are guaranteed to meet their deadlines and the initial value for the joint vehicle plan optimization fulfills the constraints. Fig. 6 shows an example of the routes of a coordination leader and its coordination followers and where the coordination followers join and leave the platoon. We compare our proposed platoon coordinator to fuel savings that arise from spontaneous platooning, i.e., that trucks happen to get into each others vicinity and then spontaneously form platoons. To this end, we collect all the link arrival times according to the default plans for each link in the scenario. We sort these times and collect them in ascending order in groups of at most one minute difference in their edge arrival time. We assume that each of these groups forms a platoon driving at default speed and that the default trajectory is not altered by the platooning. This is a generous estimate since it neglects X i∈Nc \Nl X i∈Nc j∈Ni ∩Nl max ∆F (i, j) j∈Nio (7) max ∆F (i, j), j∈Nio where the second inequality holds since ∆F (i, j) > 0 for all (i, j) ∈ E. This bound can only be tight when there is an optimal solution where no coordination leader has an out-neighbor. Otherwise the coordination leaders cannot contribute to the sum. Nevertheless, the bound helps us assess how far a heuristic solution can be away from the optimum. We implemented platoon coordination in Python and used CVXOPT [26] for convex optimization. The execution of the clustering algorithm takes less than a second for 2000 transport assignments. Even faster computation times could be achieved by optimizing the implementation. Each simulation consists of the following steps: 1) Random generation of transport assignments 2) Computation of routes and default plans 3) Computation of the coordination graph 4) Computation of coordination leaders according to Section V 5) Joint vehicle plan optimization according to Section VI We evaluate how different numbers of assignments affect the amount of platooning and the fuel savings relative to the default plans. For comparison we compute the fuel savings of spontaneous platooning. We run the clustering algorithm with greedy and random node selection and compute the upper bound of the objective function fce . The results are averaged over 150 simulation runs. Fig. 7 visualizes an example coordination graph. In addition it shows which assignments are selected in step 4). We can see that only a small fraction of assignment pairs can save fuel by forming a platoon. As the number of assignments grows, more opportunities are available for each assignment which can translate into larger fuel savings [30]. Fig. 8 shows the effect on the fuel savings when the numbers of transport assignments that are coordinated is varied. It is possible to make a number of observations based on these data. First of all, the fuel savings increase rapidly with the number of transport assignments when the absolute number of assignments is small. As more and more assignments are added, this trend stagnates and the relative fuel savings increase only slowly. Ideally this should approach asymptotically the maximum fuel savings of 15.9 % as the number of transport assignments goes to infinity, since then virtually every truck 8 Upper Bound Greedy, Before Random, Before Greedy, After Random, After Spontaneous 14 Relative Fuel Savings [%] 12 Fig. 7. This plots visualizes the adjacency matrix of a coordination graphs with 100 assignments. Nonzero entries are indicated with a black or a red dot, each corresponding to an edge in the coordination graph. Edges whose corresponding plans are selected by the clustering algorithm correspond to the red dots. 10 8 6 4 2 0 is a platoon follower for its entire journey. There is only a small difference between greedy and random node selection, however, with the greedy node selection outperforming the random node selection consistently. For a parallel or even a distributed implementation of the clustering algorithm, random node selection would be preferable due to the reduced need for synchronization whereas greedy node selection is faster in a centralized setting. Furthermore, the results after selecting the coordination leaders and before the joint convex optimization are less than the upper bound but only about 30 % worse. Since the upper bound is not tight, this indicates that the clustering algorithm performs well. We can see a clear improvement in the fuel savings by the joint optimization of the vehicle plans. Spontaneous platooning gives fuel savings that are less than half of what can be achieved by coordination. Also bear in mind that this is a generous estimate of fuel savings by spontaneous platooning so that the real difference would probably be even larger. We conclude that coordinated platooning can yield significant fuel savings and that coordination is crucial leveraging these savings. For 2000 transport assignments starting over the course of two hours, we get 7.6 % reduction in fuel consumption. A number of 2000 trucks starting in that time interval on an area like Sweden is a realistic number. The total distance traveled in the simulated scenario is in the same order of magnitude as the total distance traveled by domestic road freight transport in Sweden within two hours, assuming that traffic volume is equally spread over the year [31]. The density of the road freight traffic that was simulated is only a fraction of the total road freight traffic in countries with high population density. The small fuel savings for the platoon leaders, which have been neglected, would further increase the platooning benefit. Fig. 9 shows how the distribution of platoon sizes changes with the number of transport assignments. We can see that the larger the number of transport assignments, the more distance is traveled in large platoons. For 2000 assignments over half the distance traveled is in a platoon. Most of the distance is 0 1000 2000 3000 4000 5000 Number of Transport Assignments Fig. 8. The relative fuel savings due to platooning compared to the default plans with varying numbers of assignments. “Greedy” indicates that greedy node selection was used in the clustering algorithm, whereas “Random” indicates random node selection. The keywords “Before”/“After” refer to the relative fuel savings before/after the joint optimization of the vehicle plans. “Spontaneous” are the relative fuel savings based on the estimate of fuel savings due to spontaneous platooning. “Upper Bound” refers to the upper bound the fce as stated in (7). traveled in platoons with ten or less vehicles. This is promising since large platoons might be difficult to control and thus the platoon coordinator would have to prevent planning for larger platoons. Since these large platoons only account for a small fraction of the distance traveled, this would not have too large an impact on the total fuel savings. The largest platoon formed has 28 vehicles. A noticeable effect occurs at a number of 200 transport assignments when more distance is traveled in relatively large platoons compared to the distribution with a number of 300 transport assignments. It seems that some kind of phase transition occurs at these points, where enough assignments are in the system to go from one coordination leader with many followers to having several coordination leaders that are better suited for their followers. To understand this phenomenon is subject of future work. The simulations show that computing plans for a large number of vehicles to form platoons is feasible with the methods outlined in this paper. It motivates that real-time platoon coordination enables significant reductions in fuel consumption and might be the key to leveraging the full potential of truck platooning. VIII. C ONCLUSION A centralized truck platoon coordinator was proposed. The system provides trucks with vehicle plans that lead to reduced fuel consumption by making use of platooning. As time evolves, plans are updated to account for deviations and new 9 Greedy Platoon Size Distribution [%] 100 10 9 8 7 6 5 4 80 60 3 2 40 20 0 1 1000 2000 3000 4000 5000 Number of Transport Assignments Random Platoon Size Distribution [%] 100 10 9 8 7 6 5 4 80 60 3 2 40 20 0 network relate to fuel savings achieved by this method. Furthermore, we want to study a receding horizon implementation of the platoon coordinator under the presence of disturbances. Another direction is to study the system in a setting where more practical details such as speed limits, traffic, driver rest times, different vehicle types etc. are taken into account. Finally, similar coordination strategies might be relevant for other types of multi-agent systems. This work was carried out in the scope of the COMPANION EU project [32] and the proposed platoon coordinator is being implemented in a demonstrator featuring simulated and real trucks. 1 1000 2000 3000 4000 5000 Number of Transport Assignments Fig. 9. This figure shows the distribution of platoon sizes per distance traveled over the number of assignments in percent. The upper plot shows the results of greedy node selection whereas the lower plot shows those of random node selection in the clustering algorithm. To the right, the size of platoon is indicated for a platoon size up to ten. So, when the difference between the first and the second boundary from below is for instance at 20 %, it means that 20 % of the distance was traveled as member of a platoon of size 2. assignments. In order to handle the complexity of such coordination, the problem was formulated in a way that for each truck a number of plans adapted to the default plans of other vehicles are computed. Each adapted plan involves platooning for some distance as platoon follower and thus saving fuel. It was derived how these plans should be systematically combined in order to maximize the total fuel savings. The NP-hardness of this problem motivates the proposed heuristic solution method. Furthermore, we derived how to jointly optimize the vehicle plans resulting from the combination of default plans and adapted plans. The effectiveness of the method was demonstrated in a realistic simulation study. The simulations motivate that such systems should be deployed once trucks with the ability to platoon are commercially available. There are various directions of future work. One direction is to understand how the transport assignments and the road A PPENDIX P ROOF OF P ROPOSITION 1 We show the result by reduction of the optimization version of the set covering problem to Problem 1. The optimization version of the set covering problem is well known to be NP-hard. Reduction to a known hard problem is a common proof technique for this kind of result [24]. We do this by constructing a coordination graph Gc for which there is a one-to-one correspondence between coordination leaders and selected sets for the cover. Then we show that the minimum number of leaders that corresponds to a set cover gives the maximum value for fce . Consider the following set covering problem. We have a finite set S U. Furthermore, let Su be a family of subsets of U with S = U. The problem is to find the smallest number S∈Su of subsets in Su whose union is U. We construct the coordination graph as the one shown in Fig. 10. We introduce a node for each element in U. We denote the set of these nodes with N3 and let µ3 : U → N3 be a bijective mapping from the elements in U to the nodes in N3 . We introduce a node for each element in Su . We denote the set of these nodes with N2 and let µ2 : Su → N2 be a bijective mapping from elements in Su to nodes in N2 . Consider a node n2 ∈ N2 that corresponds to the element S ∈ Su . The in-neighbors of n2 are Nni 2 = {µ3 (S) : S ∈ µ−1 2 (n2 )}. The weight of the corresponding edges is 1. We introduce an additional node N1 . There is an edge from each node in N2 to N1 with weight 0.5. Clearly, this reduction is linear in the size of the input U, Su . Since N1 has no out-neighbors, its membership in Nl can only increase fce (Nl ). Since all nodes in N3 have no inneighbors, adding a node in N3 to Nl can only decrease fce (Nl ). Thus, the problem of finding the optimal Nl reduces to finding which nodes in N2 belong to Nl . In the optimal solution, each node in N3 has at least one out-neighbor in Nl . Otherwise we could add any out-neighbor of that node to Nl and increase fce (Nl ) by at least 0.5. Therefore, {µ−1 2 (n) : n ∈ Nl ∩ N2 } is a set cover of U. Otherwise there would be u ∈ U such that there is no S ∈ {µ−1 2 (n) : n ∈ Nl ∩ N2 } with u ∈ S. If such a u existed, µ3 (u) would be a node with no out-neighbor in Nl ∩ N2 . Furthermore let S¯u ⊆ Su be a set cover {µ2 (S) : S ∈ S¯u } has the property that S of U. Then i Nn = N3 , so any set cover has the property n∈{µ2 (S):S∈S¯u } that all nodes in N3 have at least one out-neighbor in Nl . 10 N1 .5 N2 1 N3 Fig. 10. Illustration of the graph used to prove that Problem 1 is NP-hard. Each node in N2 contributes with 0.5 to the objective if it is not in Nl . Therefore, the optimal Nl contains a minimum number of nodes from N2 such that every node in N3 has at least one out-neighbor in Nl ∩ N2 . Since any Nl ∩ N2 that fulfills this property maps to a set cover S¯u and vice versa, and since |Nl ∩ N2 | = |S¯u |, we have that S¯u is the solution to the set covering problem. Thus the NP-hard set-covering problem can be reduced to Problem 1, which shows that Problem 1 is NP-hard. ACKNOWLEDGMENTS This work was supported by the COMPANION EU project, the Knut and Alice Wallenberg Foundation, the Swedish Strategic Research Foundation, and the Swedish Research Council. R EFERENCES [1] R. Horowitz and P. Varaiya, “Control design of an automated highway system,” Proc. IEEE, vol. 88, no. 7, pp. 913–925, Jul. 2000. [2] C. Bonnet and H. Fritz, “Fuel consumption reduction in a platoon: Experimental results with two electronically coupled trucks at close spacing,” SAE Tech. Paper 2000-01-3056, 2000. [3] M. P. Lammert et al., “Effect of platooning on fuel consumption of class 8 vehicles over a range of speeds, following distances, and mass,” SAE Int. J. Commer. Veh., vol. 7, pp. 626–639, Sep. 2014. [4] S. Tsugawa, “An overview on an automated truck platoon within the Energy ITS Project,” Advances in Automotive Control, vol. 7, pp. 41– 46, 2013. [5] T. G. Crainic and G. Laporte, “Planning models for freight transportation,” European J. Operational Research, vol. 97, no. 3, pp. 409–438, 1997. [6] K. Boriboonsomsin et al., “Eco-routing navigation system based on multisource historical and real-time traffic information,” IEEE Trans. Intell. Transp. Syst., vol. 13, no. 4, pp. 1694–1704, Dec. 2012. [7] M. Papageorgiou et al., “Review of road traffic control strategies,” Proc. IEEE, vol. 91, no. 12, pp. 2043–2067, Dec. 2003. [8] E. Larsson et al., “The vehicle platooning problem: Computational complexity and heuristics,” Transportation Research Part C: Emerging Technologies, vol. 60, pp. 258–277, 2015. [9] K.-Y. Liang et al., “When is it fuel efficient for a heavy duty vehicle to catch up with a platoon?” in 7th IFAC Symp. Advances in Automotive Control, 2013. [10] J. Larson et al., “A distributed framework for coordinated heavy-duty vehicle platooning,” IEEE Trans. Intell. Transp. Syst., vol. 16, no. 1, pp. 419–429, Feb. 2015. [11] P. Meisen et al., “A data-mining technique for the planning and organization of truck platoons,” in Int. Conf. Heavy Vehicles, Heavy Vehicle Transport Technology, 2008, pp. 389–402. [12] S. van de Hoef et al., “Fuel-optimal coordination of truck platooning based on shortest paths,” in American Control Conf., 2015. [13] ——, “Coordinating truck platooning by clustering pairwise fuel-optimal plans,” in 18th IEEE Int. Conf. Intelligent Transportation Syst., 2015. [14] L. Kaufman and P. J. Rousseeuw, Finding Groups in Data: An introduction to Cluster Analysis. John Wiley & Sons, Inc., 2008. [15] A. K. Jain and R. C. Dubes, Algorithms for Clustering Data. Upper Saddle River, NJ, USA: Prentice-Hall, Inc., 1988. [16] A. K. Jain, “Data clustering: 50 years beyond K-means,” Pattern Recognition Lett., vol. 31, no. 8, pp. 651–666, 2010. [17] V. Blondel et al., “Fast unfolding of communities in large networks,” J. Stat. Mech., P10008, 2008. [18] S. Harenberg et al., “Community detection in large-scale networks: a survey and empirical evaluation,” Wiley Interdisciplinary Reviews: Computational Stat., vol. 6, no. 6, pp. 426–439, 2014. [19] S. Fortunato, “Community detection in graphs,” Physics Rep., vol. 486, no. 3–5, pp. 75–174, 2010. [20] H. Garcia-Molina, “Elections in a distributed computing system,” IEEE Trans. Comput., vol. C-31, no. 1, pp. 48–59, 1982. [21] S. Singh and J. Kurose, “Electing “good” leaders,” J. Parallel and Distributed Computing, vol. 21, no. 2, pp. 184–201, 1994. [22] E. Demir et al., “A review of recent research on green road freight transportation,” European J. Operational Research, vol. 237, no. 3, pp. 775–793, 2014. [23] P. Sanders and D. Schultes, “Engineering fast route planning algorithms,” in Proc. Experimental Algorithms: 6th International Workshop, Rome, Italy, Jun. 2007, pp. 23–36. [24] T. H. Cormen et al., Introduction to Algorithms, 3rd ed. MIT Press, 2009. [25] S. Boyd and L. Vandenberghe, Convex Optimization. New York, NY: Cambridge University Press, 2004. [26] M. S. Andersen et al. (2013) CVXOPT: A Python package for convex optimization. [Online]. Available: cvxopt.org [27] Socioeconomic Data and Application Center, “Population density grid, v3, 2000,” 2015. [28] D. Luxen and C. Vetter, “Real-time routing with openstreetmap data,” in Proc. 19th ACM SIGSPATIAL Int. Conf. Advances in Geographic Inform. Syst., ser. GIS ’11, New York, NY, USA, 2011, pp. 513–516. [29] B. Besselink et al., “Cyber-physical control of road freight transport,” Proc. IEEE, 2016. [30] J. Larson et al., “A distributed framework for coordinated heavy-duty vehicle platooning,” IEEE Trans. Intell. Transp. Syst., vol. 16, no. 1, pp. 419–429, Feb. 2015. [31] “Swedish national and international road goods transport 2014,” Transport Analysis Stockholm, Tech. Rep., 2015. [32] S. Eilers et al., “COMPANION – Towards Co-operative Platoon Management of Heavy-Duty Vehicles,” in 18th IEEE Int. Conf. Intelligent Transportation Syst., 2015.
3cs.SY
Optimal Dynamic Sensor Subset Selection for Tracking a Time-Varying Stochastic Process arXiv:1711.10610v1 [cs.SY] 28 Nov 2017 Arpan Chattopadhyay, Urbashi Mitra Abstract—Motivated by the Internet-of-things and sensor networks for cyberphysical systems, the problem of dynamic sensor activation for the tracking of a time-varying process is examined. The tradeoff is between energy efficiency, which decreases with the number of active sensors, and fidelity, which increases with the number of active sensors. The problem of minimizing the time-averaged mean-squared error over infinite horizon is examined under the constraint of the mean number of active sensors. The proposed methods artfully combine three key ingredients: Gibbs sampling, stochastic approximation for learning, and modifications to consensus algorithms to create a high performance, energy efficient tracking mechanisms with active sensor selection. The following progression of scenarios are considered: centralized tracking of an i.i.d. process; distributed tracking of an i.i.d. process and finally distributed tracking of a Markov chain. The challenge of the i.i.d. case is that the process has a distribution parameterized by a known or unknown parameter which must be learned. The key theoretical results prove that the proposed algorithms converge to local optima for the two i.i.d process cases; numerical results suggest that global optimality is in fact achieved. The proposed distributed tracking algorithm for a Markov chain, based on Kalman-consensus filtering and stochastic approximation, is seen to offer an error performance comparable to that of a competetive centralized Kalman filter. Index Terms—Wireless sensor networks, active sensing, sensor subset selection, distributed tracking, data estimation, Gibbs sampling, stochastic approximation, Kalman-consensus filter. I. I NTRODUCTION Controlling and monitoring physical processes via sensed data are integral parts of internet-of-things (IOT), cyberphysical systems, and defense with applications to industrial process monitoring and control, localization, tracking of mobile objects, environmental monitoring, system identification and disaster management. In such applications, sensors are simultaneously resource constrained (power and/or bandwdith) and tasked to achieve high performance sensing, control, communication, and tracking. Wireless sensor networks must further contend with interference and fading. One strategy for balancing resource use with performance is to activate a subset of the total possible number of sensors to limit both computation as well as bandwidth use. Parts of this paper have been published in previous conferences; see [1], [2]. Arpan Chattopadhyay and Urbashi Mitra are with Ming Hsieh Department of Electrical Engineering, University of Southern California, Los Angeles, USA. Email: {achattop,ubli}@usc.edu This work was funded by the following grants: ONR N00014-15-1-2550, NSF CNS-1213128, NSF CCF-1410009, AFOSR FA9550-12-1-0215, and NSF CPS-1446901. Herein, we address the fundamental problem of optimal dynamic sensor subset selection for tracking a time-varying stochastic process. We first examine the centralized tracking of an iid process with an unknown, parametric distribution which serves as a benchmark for the first extension to decentralized tracking of this process. For both proposed algorithms, almost sure convergence to local optima can be proven. Next a distributed algorithm for tracking a Markov process with a known probability transition matrix is developed. All algorithms are numerically validated. A. Related Literature Optimal sensor subset selection problems can be broadly classified into two categories: (i) optimal sensor subset selection for static data with known prior distribution, but unknown realization, and (ii) dynamic sensor subset selection to track a time-varying stochastic process. There have been several recent attempts to solve the first problem; see [3], [1]. This problem poses two major challenges: (i) computing the estimation error given the observations from a subset of sensors, and (ii) finding the optimal sensor subset from exponentially many number of subsets. In [3], a tractable lower bound on performance addressed the first challenge and a greedy algorithm addressed the second. In [1] only the second challenge is addressed via Gibbs sampling approach. Dynamic sensor subset selection for a time-varying stochastic process is considered in e.g. [4], [5], [6], [7], [8], [9]. Markov process tracking with centralized controllers for single ([6]) or multiple sensor selection with energy constraints and sequential decision making ([4], [5]) have been previously studied. The optimal policy and its structural properties for a special case of dynamic sensor selection over an infinite horizon was examined in [7]. Single sensor selection with the broadcast of sensor data is studied in [8]. To our knowledge, the combination of Gibbs sampling (e.g. [10]) and stochastic approximation (e.g. [11]) has not been previously applied to iid process tracking as we do herein. The paper [12], using Thompson sampling, has solved the problem of centralized tracking of a linear Gaussian process (with unknown noise statistics) via active sensing. Given our consideration of dynamic sensor subset selection for distributed tracking of a Markov process, traditional Kalman filtering is not applicable; however, there is much prior, recent art on the developmemt of consensus-based Kalman filtering [13], [14], [15], [16], [17] which we further adapt to work with our Gibbs sampling/stochastic approxi- mation approach for the iid case. This distributed tracking problem does not appear to be heavily studied. In [8] perfect information sharing between sensors is assumed, which is impractical and [18] assumes that the estimation is done in a centralized fashion, while sensors make decentralized decisions about whether to sense or communicate to the fusion center. In [18], the sparsity of the Markov process is also exploited. iid process having a parametric distribution with unknown parameters. Distributed tracking of iid process is discussed in Section V. Distributed tracking of a Markov chain is described in Section VI. Numerical results are presented in Section VII, followed by the conclusion in Section VIII. B. Our Contribution We consider a connected single or multi-hop wireless sensor network. The sensor nodes are denoted by the set N = {1, 2, · · · , N }. It might also be possible that the connectivity in the network is maintained via a few relay nodes, but we ignore this possibility for the ease of analysis. There can be a fusion center (connected to all sensors via single hop wireless links) responsible for all control or estimation operations in the network, or, alternatively, the sensors can operate autonomously in a multihop mesh network. The physical process under measurement is denoted by {X(t)}t≥0 , where t is a discrete time index and X(t) ∈ Rq×1 . We consider two models for the evolution of {X(t)}t≥0 : In this paper, we make the following contributions: 1) A centralized tracking and learning algorithm for an iid process with an unknown, but parametric distribution is developed. In particular, Gibbs sampling minimizes computational complexity with stochastic approximation to achieve the mean number of activated sensors constraint. Furthermore, simultaneous perturbation stochastic approximation (SPSA) is employed for parameter estimation obviating the need for the expectation-maximization algorithm. A challenge we overcome in the analysis, is handling updates at different time scales. As a precursor to the algorithm for unknown parameters, algorithms have been developed for a simpler version of the problem when the parameter of the distribution is known. 2) The centralized algorithm, which serves as a benchmark, is adapted to the distributed case by exploiting partial consensus. Our partial consensus is novel in that SPSA is again employed to learn the optimal consensus gains adaptively. 3) A trick for ensuring that all sensors employ similar sampling strategies is to have each sensor use the same seed in a random number generator. 4) For both the centralized and distributed algorithms, we can prove almost sure convergence to local optima. Furthermore, we an prove that the resources needed for communication and learning can be made arbitrarily small, by exploiting properties of the multi-scale updates. 5) Our final generalization to is to develop an algorithm for sensor subset selection for the decentralized tracking of a Markov chain with known probability transition matrix. We adapt methods for Kalman consensus filtering to our framework with Gibbs sampling and stochastic approximation. 6) Numerical results show that the decentralized scheme for a Markov chain performs close to that of the centralized scheme. Numerical results also show a tradeoff between performance and message exchange for learning. Furthermore, the numerical results show that global (not local) optima are achieved in tracking iid process. C. Organization The rest of the paper is organized as follows. The system model is described in Section II. Centralized tracking of an iid process with known distribution is described in Section III. Section IV deals with centralized tracking of an II. S YSTEM M ODEL A. Network, data and sensing model • • IID model: {X(t)}t≥0 is an i.i.d. process with a parametric distribution pθ0 (X), where the unknown parameter θ0 needs to be be learnt via the measurements. θ0 lies inside the interior of a compact subset Θ ⊂ Rd . Markov model: {X(t)}t≥0 is a finite-state ergodic Markov chain with known transition probability matrix. At time t, if a sensor k is used to sense the process, then the observation at sensor k is provided by a r-dimensional column vector zk (t) = Hk X(t) + vk (t) where Hk is an observation matrix of appropriate dimension, and vk (t) is a Gaussian vector; the observation noise vk (t) is assumed to be independent across k and i.i.d. across t. Let B(t) ∈ {0, 1}1×N be a vector where Bk (t) is the indicator that the sensor k is activated at time t; Bk (t) = 1 if sensor k is active at time t, or else Bk (t) = 0. The decision to activate any sensor for sensing and communicating the observation is taken either by the fusion center or by the sensor itself in the absence of a fusion center. We denote by B := {0, 1}N the set of all possible configurations in the network, and by B a generic configuration. Clearly, B(t) ∈ B. Each configuration represents a set of activated sensors. B−j ∈ {0, 1}N −1 is used to represent the configuration B with its j-th entry removed. The observation made by sensor k at time t is Zk (t) = Bk (t)zk (t). We define Z(t) := {Zk (t) : 1 ≤ k ≤ N }}. B. Centralized estimation problem The estimate of X(t) at the fusion center (connected to all sensors via direct wireless links) is denoted by X̂(t). We denote by Hp (t) the information available at time t at the fusion center about the history of observations, activations and estimates up to time (t − 1), before the fusion center determines B(t). On the other hand, we define Hc (t) := {B(t); Z(t); θ(t)} where θ(t) is the current estimate of θ0 ; Hc (t) denotes the information used by the fusion center at time t to estimate X̂(t). For i.i.d. time varying process, Hc (t) is sufficient to estimate X(t) and obtain X̂(t), and Hc (t) will be available only after deciding the activation vector B(t) and collecting all observations. In order to optimally decide B(t), the fusion center needs knowledge about the performance of all configurations in the past. Hence, Hp (t) and Hc (t) have two different information structures. However, we will see that, our Gibbs sampling algorithm determines B(t) by using only a sufficient statistic calculated iteratively in each slot. The information structure Hc (t) used to track a Markov chain will be different, which we will see in Section VI. We define a policy µ = {(µ1 , µ2 } as a pair of mappings, where µ1 (Hp (t)) = B(t) and µ2 (Hc (t)) = X̂(t). Our first goal is to solve the following centralized problem of minimizing the time-average mean squared error (MSE) subject to a constraint on the mean number of sensors active per unit time: µ t→∞ (P1) t N 1 X 1 X Eµ ||X(τ ) − X̂ (k) (τ )||2 t τ =1 N k=1 s.t. lim sup t→∞ t 1 X Eµ ||B(τ )||1 ≤ N̄ t τ =1 (P4) :=f (B) In the absence of a fusion center in a multi-hop network, the estimate of X(t) at sensor k is denoted by X̂ (k) (t). We denote (k) by Hp (t) the information available at time t at sensor k about the history before the sensor determines Bk (t), and by (k) Hc (t) the information available at sensor k at time t just before X̂ (k) (t) is estimated. (k) (k) We define a policy µ = {(µ1 , µ2 )}1≤k≤N , where (k) (k) (k) (k) µ1 (Hp (t)) = Bk (t) and µ2 (Hc (t)) = X̂ (k) (t). We seek to solve the following distributed problem: arg min lim sup   t 1X 2 Eµ ||X(τ )−X̂(τ )|| +λ||B(τ )||1 µ = arg min lim sup µ t→∞ t τ =1 (P3) The multiplier λ ≥ 0 can be viewed as the cost incurred for activating a sensor at any time instant. Now, since (P3) is an unconstrained problem and X(t) is i.i.d. across t, there exists one optimizer B ∗ ∈ B (not necessarily unique) for the problem (P3); if the configuration B ∗ is chosen at each t, the minimum cost of (P3) can be achieved by the law of large numbers. Hence, for known θ0 , the problem (P3) can be equivalently written as: ∗ {z | C. Distributed estimation problem µ∗ = We relax (P1) by using a Lagrance multiplier λ and obtain the following unconstrained problem: arg min Eµ2 ,B ||X(τ ) − X̂(τ )||2 +λ||B||1 B∈B | {z } t 1 X Eµ ||X(τ ) − X̂(τ )||2 µ∗ = arg min lim sup µ t→∞ t τ =1 t 1 X s.t. lim sup Eµ ||B(τ )||1 ≤ N̄ t→∞ t τ =1 A. The relaxed version of the constrained problem (P2) III. C ENTRALIZED T RACKING OF IID PROCES : KNOWN θ0 In this section, we provide an algorithm for solving the centralized problem (P1) when X(t) ∼ pθ0 (x) i.i.d. This is done by relaxing (P1) by a Lagrange multiplier. Though our final goal is to track an i.i.d. process with unknown θ0 , we discuss algorithms for known θ0 in this section, as a precursor to the algorithms developed in subsequent sections for unknown θ0 and also tracking a Markov chain. Also, extension to distributed tracking will be discussed in Section V for unknown θ0 , and hence will be omitted in this section. :=h(B) } The following result tells us how to choose the optimal λ∗ to solve (P1). Theorem 1: Consider problem (P1) and its relaxed version (P4). If there exists a Lagrange multiplier λ∗ ≥ 0 and a B ∗ ∈ B, such that an optimal configuration for (P4) under λ = λ∗ is B ∗ , and the constraint in (P1) is satisfied with equality under the pair (B ∗ , λ∗ ), then B ∗ is an optimal configuration for (P1). In case there exist multiple configurations ∗ , a multiplier λ∗ ≥ 0, and a probability B1∗ , B2∗ , · · · , Bm mass function (p1 , p2 , · · · , pm ) such that (i) each of ∗ is optimal for problem (P4) under λ∗ , · · · , Bm B1∗ , B2∗ , P m and (ii) i=1 pi ||Bi∗ ||1 = N̄ , then an optimal solution for ∗ (P1) is to choose one configuration from B1∗ , B2∗ , · · · , Bm with probability mass function (p1 , p2 , · · · , pm ). Proof: See Appendix A. Remark 1: Theorem 1 allows us to obtain a solution for (P1) from the solution of by choosing an appropriate λ∗ ; this will be elaborated upon in Section III-D. B. Basics of Gibbs sampling for known pθ0 (·) Finding the optimal solution of (P4) requires us to search over 2N possible configurations and to compute MMSE for each of these configurations. Hence, we propose Gibbs sampling based algorithms to avoid this O(2N ) computation. Let us define the probability distribution πβ (·) over B as (with β > 0): e−βh(B) e−βh(B) := . 0 −βh(B ) Zβ B 0 ∈B e πβ (B) := P (1) Following the terminology in statistical physics, we call β the inverse temperature, and Zβ the partition function. h(B) is P viewed as the energy under configuration B. Now, limβ↑∞ B∈arg minA∈B h(A) πβ (B) = 1. Hence, if a con- figuration B(t) is selected at each time t with probability distribution πβ (·) for sufficiently large β > 0, then B(t) will belong to the set of minimizers of (P3) with high probability. However, computing Zβ requires 2N addition operations; hence, we use a sequential subset selection algorithm based on Gibbs sampling (see [10, Chapter 7]) in order to avoid explicit computation of Zβ while picking X(t) ∼ pθ0 (·). Algorithm 1: Start with an initial configuration B(0). At time t, pick a random sensor jt uniformly from the set of all sensors. Choose Bjt (t) = 1 with probability p(t) := −βh(B−j (t−1),1) t e −βh(B−j (t−1),1) −βh(B−j (t−1),0) and choose Bjt (t) = 0 t t e +e with probability (1 − p(t)). For k 6= jt , choose Bk (t) = Bk (t − 1). Activate the sensors according to B(t). Theorem 2: Under Algorithm 1, {B(t)}t≥0 is a reversible, ergodic, time-homogeneous Markov chain with stationary distribution πβ (·). Proof: Follows from the theory in [10, Chapter 7]). Remark 2: Theorem 2 tells us that if the fusion center runs Algorithm 1 and reaches the steady state distribution of the Markov chain {B(t)}t≥0 , then the configuration chosen by the algorithm will have distribution πβ (·). For very large β > 0, if one runs {B(t)}t≥0 for a sufficiently long, finite time T , then the terminal state BT will belong to arg minB∈B h(B) with high probability. Also, by the ergodicity of {B(t)}t≥0 , the time-average occurence rates of all configurations match the distribution πβ (·) almost surely. C. The exact solution Algorithm 1 is operated with a fixed β; but the optimal soultion of the unconstrained problem (P3) can only be obtained with β ↑ ∞; this is done by updating β at a slower time-scale than the iterates of Algorithm 1. Algorithm 2: This algorithm is same as Algorithm 1 except that at time t, we use β(t) := β(0) log(1 + t) to compute the update probabilities, where β(0) > 0, β(0)N ∆ < 1, and ∆ := maxB∈B,A∈B |h(B) − h(A)|. Theorem 3: Under Algorithm 2, the Markov chain {B(t)}t≥0 is strongly ergodic, and the limiting probability distribution satisfies P limt→∞ A∈arg minC∈B h(C) P(B(t) = A) = 1. Proof: See Appendix C. We have used the notion of weak and strong ergodicity of time-inhomogeneous Markov chains from [10, Chapter 6, Section 8]), which is provided in Appendix B. The proof is similar to the proof of one theorem in [19], but is given here for completeness. Remark 3: Theorem 3 shows that we can solve (P3) exactly if we run Algorithm 2 for infinite time, in contrast with Algorithm 1 which provides an approximate solution. Remark 4: For i.i.d. time varying {X(t)}t≥0 with known joint distribution, we can either: (i) find the optimal configuration B ∗ using Algorithm 2 and use B ∗ for ever, or (ii) run Algorithm 2 at the same timescale as t, and use the running configuration B(t) for sensor activation; both schemes will minimize the cost in (P3). By the strong ergodicity of {B(t)}t≥0 , optimal cost will be achieved for (P3) under Algorithm 2. 1) Convergence rate of Algorithm 1: Let π (t) denote the probability distribution of B(t) under Algorithm 1. Let us consider the transition probability matrix P of the Markov chain {Y (l)}l≥0 with Y (l) = B(lN ), under Algorithm 1. Let us recall the definition of the Dobrushin’s ergodic coefficient δ(P ) from [10, Chapter 6, Section 7] for the matrix P ; using a method similar to that of the proof of Theorem 3, we can −βN ∆ show that δ(P ) ≤ (1 − e N N ). Then, by [10, Chapter 6, Theorem 7.2], we can say that under Algorithm 1, we have  dV (π (lN ) , πβ ) ≤ dV (π (0) , πβ ) 1 − e−βN ∆ NN l . We can prove similar bounds for any t = lN + k, where 0 ≤ k ≤ N − 1. Unfortunately, we are not aware of such a closed-form bound for Algorithm 2. Remark 5: Clearly, under Algorithm 1, the convergence rate decreases as β increases. Hence, there is a trade-off between convergence rate and accuracy of the solution in this case. Also, the rate of convergence decreases with N . For Algorithm 2, the convergence rate is expected to decrease with time. D. Gibbs sampling and stochastic approximation based approach to solve the constrained problem In Section III-B and Section III-C, we presented Gibbs sampling based algorithms for (P3). Now we provide an algorithm that updates λ with time in order to meet the constraint in (P1) with equality, and thereby solves (P1) (via Theorem 1). Lemma 1: For the unconstrained problem (P4), the optimal mean number of active sensors, Eµ2 ||B ∗ ||1 , decreases with λ. Similarly, the optimal error, Eµ2 f (B ∗ ), increases with λ. Proof: See Appendix D. Remark 6: The optimal mean number of active sensors, Eµ2 ||B ∗ ||1 , for the unconstrained problem (P4) is a decreasing staircase function of λ, where each point of discontinuity is associated with a change in the optimizer B ∗ (λ). Lemma 1 provides an intuition about how to update λ in Algorithm 1 or in Algorithm 2 in order to solve (P1). We seek to provide one algorithm which updates λ(t) at each time instant, based on the number of active sensors in the previous time instant. In order to maintain the necessary timescale difference between the {B(t)}t≥0 process and the λ(t) update process, we use stochastic approximation ([11]) based update rules for λ(t). But the above remark tells us that the optimal solution of the constrained problem (P1) requires us to randomize between two values of λ in case the optimal λ∗ as in Theorem 1 belongs to the set of such discontinuities. However, this randomization will require us to update a randomization probability at another timescale; having stochastic approximations running in multiple timescales leads to slow convergence. Hence, instead of using a varying β(t), we use a fixed, but large β and update λ(t) in an iterative fashion using stochastic approximation. Our proposed Algorithm 3 updates λ(t) iteratively in order to solve (P1). Algorithm 3: Choose any initial B(0) ∈ {0, 1}N and λ(0) ≥ 0. At each discrete time instant t = 0, 1, 2, · · · , pick a random sensor jt ∈ N independently and uniformly. For sensor jt , choose Bjt (t) = 1 with probability −βhλ(t) (B−j (t−1),1) t e p := −βhλ(t) (B−j (t−1),1) −βhλ(t) (B−j (t−1),0) and choose t t e +e Bjt (t) = 0 with probability (1−p). For k 6= jt , we choose Bk (t) = Bk (t − 1). After this operation, before the (t + 1) decision instant, update λ(t) at each node as follows. λ(t + 1) = [λ(t) + a(t)(||B(t − 1)||1 − N̄ )]cb The stepsize sequence P∞{a(t)}t≥1 constitutes P∞a positive 2 such that t=1 a(t) = ∞ and t=1 a (t) = ∞. The nonnegative projection boundaries b and c for the λ(t) iterates are such that λ∗ ∈ (b, c) where λ∗ is defined in Assumption 1. The update of λ(t) in Algorithm 3 is inspired by the following result which is crucial in the convergence proof. Lemma 2: Under Algorithm 1, Eµ2 ||B(t)||1 is a Lipschitz continuous and decreasing function of λ. Proof: See Appendix E. Discussion of Algorithm 3: • • If ||B(t−1)||1 is more than N̄ , then λ(t) is increased with the hope that this will reduce the number of active sensors in subsequent iterations, as suggested by Lemma 2. The B(t) and λ(t) processes run on two different timescales; B(t) runs in the faster timescale whereas λ(t) runs in a slower timescale. This can be understood from the fact that the stepsize in the λ(t) update process decreases with time t. Here the faster timescale iterate will view the slower timescale iterate as quasi-static, while the slower timescale iterate will view the faster timescale as almost equilibriated. This is reminiscent of two-timescale stochastic approximation (see [11, Chapter 6]). We make the following feasibility assumption for (P1), under the chosen β > 0. Assumption 1: There exists λ∗ ≥ 0 such that the constraint in (P1) under λ∗ and Algorithm 1 is met with equality. Remark 7: By Lemma 2, E||B||1 continuously decreases in λ. Hence, if N̄ is feasible, then such a λ∗ must exist by the intermediate value theorem. Let us define: hλ(t) (B) := f (B) + λ(t)||B||1 . Let πβ|λ∗ (·) denote πβ (·) under λ = λ∗ . Theorem 4: Under Algorithm 3 and Assumption 1, we have λ(t) → λ∗ almost surely, and the limiting distribution of {B(t)}t≥0 is πβ|λ∗ (·). Proof: See Appendix F. This theorem says that Algorithm 3 produces a configuration from the distribution πβ|λ∗ (·) under steady state. E. A hard constraint on the number of activated sensors Let us consider the following modified constrained problem: min f (B) s.t. ||B||1 ≤ N̄ B∈B (MCP) It is easy to see that (MCP) can be easily solved using similar Gibbs sampling algorithms as in Section III, where the Gibbs sampling algorithm runs only on the set of configurations which activate N̄ number of sensors. Thus, as a by-product, we have also proposed a methodology for the problem in [3], though our framework is more general than [3]. Remark 8: The constraint in (P1) is weaker than (MCP). Remark 9: If we choose β very large, then the number of sensors activated by GIBBSLEARNING will have very small variance. This allows us to solve (MCP) with high probability. IV. C ENTRALIZED T RACKING OF IID PROCESS : U NKNOWN θ0 In Section III, we described algorithms for centralized tracking of an i.i.d. process where pθ0 (·) is known. In this section, we will deal with the centralized tracking of an i.i.d. process {X(t)}t≥0 where X(t) ∼ pθ0 (·) with θ0 unknown; in this case, θ0 has to be learnt over time through observations, which creates many nontrivial issues that need to be addressed before using Gibbs sampling for sensor subset selection. A. The proposed algorithm for unknown θ0 Since θ0 is unknown, its estimate θ(t) has to be updated over time using the sensor observations. On the other hand, to solve the constrained problem (P1), we need to update λ(t) over time so as to attain the optimal λ∗ of Theorem 1 iteratively. Further, f (B) (MSE under configuration B) in (P4) is unknown since θ0 is unknown, and f (t) (B) has to be learnt over time using the sensor observations. Hence, we combine the Gibbs sampling algorithm with update schemes for f (t) (B), λ(t) and θ(t) using stochastic approximation (see [11]). The algorithm also requires a sufficiently large positive number A0 and a large integer T as input. Let J (t) denote the indicator Pt that time t is an integer multiple of T . Define ν(t) := τ =0 J (τ ). We first describe some key features and steps of the algorithm and then provide a brief summary of the algorithm. 1) Step size: For the stochastic approximation updates, the algorithm uses step sizes which are nonnegative sequences {a(t)}t≥0 , {b(t)}t≥0 , {c(t)}t≥0 , {d(t)}t≥0 such that: P∞ a(t) 2 (t) a < t=0 (i) P∞ (iii) t=0 limt→∞ d(t) limt→∞ b(t) a(t) P∞ = b(t) P∞t=02 ∞, t=0 b (t) = = limt→∞ 0, t c) c(b T b(t) P∞ = = t=0 c(t) P 2 (t) < ∞, ∞ c t=0 P∞ c2 (t) < (iv) t=0 d2 (t) = 0. ∞, (ii) < ∞, ∞, (v) 2) Gibbs sampling step: The algorithm also maintains a running estimate h(t) (B) of h(B) for all B ∈ B. At time t, it selects a random sensor jt ∈ N with uniformly and independently, and sets Bjt (t) = 1 with probability p(t) := −βh(t) (B−j (t−1),1) t e −βh(t) (B−j (t−1),1) −βh(t) (B−j (t−1),0) t t e +e and Bjt (t) = 0 with probability (1−p(t)) (similar to Algorithm 1). For k 6= jt , it sets Bk (t) = Bk (t−1). This operation can even be repeated multiple times. The sensors are activated according to B(t), and the observations ZB(t) (t) := {zk (t) : Bk (t) = 1} are collected. Then the algorithm declares X̂(t) = µ2 (Hc (t)). 3) Occasional reading of all the sensors: If J (t) = 1, the fusion center reads all sensors and obtains Z(t). This is required primarily because we seek to update θ(t) iteratively and reach a local maximum of the function g(θ) = EX(t)∼pθ0 (·),B(t)=[1,1,··· ,1] log p(Z(t)|θ). 4) θ(t) update when J (t) = 1: Since we seek to reach a local maximum of g(θ) = EX(t)∼pθ0 (·),B(t)=[1,1,··· ,1] log p(Z(t)|θ), a gradient ascent scheme needs to be used. The gradient of g(θ) along any coordinate can be computed by perturbing θ in two opposite directions along that coordinate and evaluating the difference of g(·) at those two perturbed values. However, if θ0 is high-dimensional, then estimating this gradient along each coordinate is computationally intensive. Moreover, evaluating g(θ) for any θ requires us to compute an expectation, which might also be expensive. Hence, we perform a noisy gradient estimation for g(θ) by simultaneous perturbation stochastic approximation (SPSA) as in [20]. Our algorithm generates ∆(t) ∈ {1, −1}d uniformly over all sequences, and perturbs the current estimate θ(t) by a random vector d(ν(t))∆(t) in two opposite directions, and estimates each component of the gradient from the difference log p(Z(t)|θ(t) + d(ν(t))∆(t)) − log p(Z(t)|θ(t) − d(ν(t))∆(t)); this estimate is noisy because (i) Z(t) and ∆(t) are random, and (ii) d(ν(t)) > 0. The k-th component of θ(t) is updated as follows: θk (t + 1) =   log p(Z(t)|θ(t) + d(ν(t))∆(t)) θk (t) + c(ν(t))J (t) 2d(ν(t))∆k (t)  log p(Z(t)|θ(t) − d(ν(t))∆(t)) − (2) 2d(ν(t))∆k (t) Θ The iterates are projected onto the compact set Θ to ensure boundedness. The diminishing sequence {d(t)}t≥0 ensures that the gradient estimate becomes more accurate with time. 5) λ(t) update: λ(t) is updated as follows: 0 λ(t + 1) = [λ(t) + b(t)(||B(t)||1 − N̄ )]A 0 . (3) The intuition here is that, if ||B(t)||1 > N̄ , the sensor activation cost λ(t) needs to be increased to prohibit activating large number of sensors in future; this is motivated by Lemma 2. The goal is to converge to λ∗ as defined in Theorem 1. 6) f (t) (B) update: Since pθ0 (X) is not known initially, the true value of f (B) is not known; hence, the algorithm updates an estimate f (t) (B) using the sensor observations. If J (t) = 1, the fusion center obtains Z(t) by reading all sensors. The goal is to obtain an estimate YB (t) of the MSE under a configuration B, by using these observations, and update f (t) (B) using YB (t). However, since θ0 is unknown and only θ(t) is available, as an alternative to the MSE under configuration B, the fusion center uses the trace of the conditional covariance matrix of X(t) given ZB (t), assuming that X(t) ∼ pθ(t) (·). Hence, we define a random variable YB (t) := EX(t)∼p(·|θ(t),ZB (t)) (||X(t) − X̂B (t)||2 |ZB (t), θ(t)) for all B ∈ B, where X̂B (t) is the MMSE estimate declared by µ2 under configuration B, and ZB (t) is the observation made by active sensors determined by B. Clearly, YB (t) is a random variable with the randomness coming from two sources: (i) randomness of θ(t), and (ii) randomness of ZB (t) which has a distribution p(ZB (t)|θ0 ) since the original X(t) process that yields ZB (t) has a distribution pθ0 (·). Computation of YB (t) is simple for Gaussian X(t) and the MMSE estimator, since closed form expressions are available to compute YB (t). Using YB (t), the following update is made for all B ∈ B: 0 f (t+1) (B) = [f (t) (B) + J (t)a(ν(t))(YB (t) − f (t) (B))]A 0 (4) The iterates are projected onto [0, A0 ] to ensure boundedness. The goal here is that, if θ(t) → θ∗ , then f (t) (B) will converge to EZB (t)∼p(·|θ0 ) EX(t)∼p(·|θ∗ ,ZB (t)) (||X(t) − X̂B (t)||2 |ZB (t), θ∗ ), which is equal to f (B) under θ∗ = θ0 . We will later argue that this occasional O(2N ) computation for all B ∈ B can be avoided, but convergence will be slow. 7) The algorithm: A summary of all the steps of our scheme is provided in Algorithm 4. We will show in Theorem 5 that this algorithm almost surely converges to the set of locally optimum solutions for (P1). Algorithm 4: Initialize all iterates arbitrarily. For any time t = 0, 1, 2, · · · : 1. Perform the Gibbs sampling step as in Section IV-A2, obtain the observations ZB(t) (t), and estimate X̂(t). Update λ(t) according to (3). 2. If J (t) = 1, compute h(t) (B) = f (t) (B) + λ(t)||B||1 for all B ∈ B. Read all sensors and obtain Z(t). Update f (t) (B) for all B ∈ B using (4) and θ(t) using (2). 8) Multiple timescales in Algorithm 4: Algorithm 4 has multiple iterations running in multiple timescales (see [11, Chapter 6]). The {B(t)}t≥0 process runs ar the fastest timescale, whereas the {θ(t)}t≥0 update scheme runs at the slowest timescale. The basic idea is that a faster timescale iterate views a slower timescale iterate as quasi-static, whereas a slower timescale iterate views a faster timescale iterate as c(t) = 0, almost equilibriated. For example, since limt→∞ a(t) the θ(t) iterates will vary very slowly compared to f (t) (B) iterates; as a result, f (t) (B) iterates will view quasi-static θ(t). B. Complexity of Algorithm 4 1) Sampling and communication complexity: Since all sensors are activated when J (t) = 1, the mean number of additional active sensors per unit time is O( N T ); these observations need to be communicated to the fusion center. O( N T ) can be made arbitrarily small by choosing T large enough. 2) Computational complexity: The computation of YB (t) in (4) for all B ∈ B requires O(2N ) computations whenever J (t) = 1. However, if one chooses large T (e.g., O(4N )), then this additional computation per unit time will be small. However, if one wants to avoid that computation also, then one can simply compute YB(t) (t) and update f (t) (B(t)) instead of doing it for all configurations B ∈ B. However, the stepsize sequence a(ν(t)) cannot be used; instead, a stepsize a(νB (t)) has to be used when P B(t) = B and f (t) (B) is updated using t (4), where νB (t) := τ =0 J (τ )I(B(τ ) = B) is the number of times configuration B was chosen till time t. In this case, the convergence result (Theorem 5) on Algorithm 4 will still hold; however, the proof will require a technical condition lim inf t→∞ νBt(t) > 0 almost surely for all B ∈ B, which will be satisfied by the Gibbs sampler using finite β and bounded h(t) (B). However, we discuss only (4) update in this paper for the sake of simplicity in the convergence proof, since technical details of asynchrounous stochastic approximation required in the variant is not the main theme of this paper. When J (t) = 1, one can avoid computation of h(t+1) (B) for all B ∈ B in Step 2 of Algorithm 4. Instead, the fusion center can update only h(t) (B(t)), h(t) (B−jt (t − 1), 1) and h(t) (B−jt (t − 1), 0) at time t, since only these iterates are required in the Gibbs sampling. C. Convergence of Algorithm 4 1) List of assumptions: Assumption 2: The distribution pθ (·) and the mapping (k) µ2 (·; ·; θ) (or µ2 for distributed case) as defined before are Lipschitz continuous in θ ∈ Θ. Assumption 3: µ2 is known to the fusion center (centralized (k) case), and {µ2 }k≥1 are known to all sensors (distributed). Remark 10: Assumption 3 allows us to focus only on the sensor subset selection problem rather than the problem of estimating the process given the sensor observations. For optimal MMSE estimators, µ2 (Hc (t)) = E(X(t)|Hc (t)). Computation of µ2 (·) will depend on the exact functional form of pθ (X), and it can be done by using Bayes’ theorem. Assumption 4: Let us consider YB (t) with θ(t) = θ fixed in Algorithm 4. Suppose that, one uses Algorithm 1 to solve (P3) for a given λ but with the MSE ||X(t) − X̂(t)||2 replaced by YB(t) (t) in the objective function of (P3), and then finds the λ∗ (θ) as in Theorem 1 to meet the constraint N̄ . We assume that, for the given β and N̄ , and for each θ ∈ Θ, there exists λ∗ (θ) ∈ [0, A0 ) such that, the optimal Lagrange multiplier to relax this new unconstrained problem is λ∗ (θ) (Theorem 1). Also, λ∗ (θ) is Lipschitz continuous in θ ∈ Θ. Remark 11: Assumption 4 makes sure that the λ(t) iteration (3) converges, and the constraint is met with equality. Θ −θ . Let us define the function Γ̄θ (φ) := limδ↓0 [θ+δφ] δ Assumption 5: Consider the function g(θ) = EX(t)∼pθ0 (·),B(t)=[1,1,··· ,1] log p(Z(t)|θ); this is the expected conditional log-likelihood function of Z(t) conditioned on θ, given that X(t) ∼ pθ0 (·) and B(t) = [1, 1, · · · , 1]. We assume that the ordinary differential equation θ̇(t) = Γ̄θ(t) (∇g(θ(t))) has a globally asymptotically stable solution θ∗ in the interior of Θ. Also, ∇g(θ) is Lipschitz continuous in θ. Remark 12: One can show that the θ(t) iteration (2) asymptotically tracks the ordinary differential equation θ̇(τ ) = ∇g(θ(τ )) inside the interior of Θ. In fact, Γ̄θ(τ ) (∇g(θ(τ )) = ∇g(θ(τ )) when θ(τ ) lies inside the interior of Θ. The condition on θ̇(τ ) = Γ̄θ(τ ) (∇g(θ(τ ))) is required to make sure that the iteration does not converge to some unwanted point on the boundary of Θ due to the forced projection. The assumption on θ∗ makes sure that the θ(t) iteration converges to θ∗ . 2) The main result: Now we present convergence result for Algorithm 4. This result tells us that the iterates of Algorithm 4 almost surely converge to the set of local optima for (P1). Theorem 5: Under Assumptions 2, 3, 4, 5 and Algorithm 4, we have limt→∞ θ(t) = θ∗ almost surely. Correspondingly, λ(t) → λ∗ (θ∗ ) almost surely. Also, f (t) (B) → EZB (t)∼p(·|θ0 ) EX(t)∼p(·|θ∗ ,ZB (t)) (||X(t) − X̂B (t)||2 |ZB (t), θ∗ ) =: fθ∗ (B) almost surely for all B ∈ B. The B(t) process reaches the steady-state distribution πβ,fθ∗ ,λ∗ (θ∗ ),θ∗ (·) which can be obtained by replacing h(B) in (1) by fθ∗ (B) + λ∗ ||B||1 . Proof: See Appendix G. Remark 13: If θ(t) → θ∗ , but the constraint in (P1) is satisfied with λ = 0 and policy µ2 (·; ·; θ∗ ), then λ(t) → 0, i.e., λ∗ (θ∗ ) = 0, and the constraint becomes redundant. If θ∗ = θ0 , then the algorithm reaches the global optimum. Remark 14: If all sensors are not read when J (t) = 1, then one has to update θ(t) based on the observations ZB(t) (t) collected from the sensors determined by B(t). In that case, θ(t) will converge to a local maximum θ1 of limt→∞ Eπβ,fθ ,λ∗ (θ),θ log p(ZB(t) (t)|θ), which will be different from θ∗ of Theorem 5 in general. However, in the numerical example in Section VII, we observe that θ1 = θ∗ . V. D ISTRIBUTED TRACKING OF THE I . I . D . PROCESS We next seek to solve the constrained problem (P2). This problem brings in additional challenges compared to (P1): (i) each sensor k has access only to its local measurement, i.e., zk (t), if Bk (t) = 1, (ii) sharing measurements across the network will consume a large amount of energy and bandwidth, and (iii) ideally, the iterates λ(t) and θ(t) should be known at all sensors. To resolve these issues, we propose an algorithm that combines Algorithm 4 with consensus among sensor nodes (see [16]). However, our approach is different from traditional consensus schemes in the following aspects: (i) traditional consensus schemes run many steps of a consensus iteration, thus requiring many rounds of message exchange among neighbouring nodes, and (ii) traditional consensus schemes do not care about the correctness of the data at any particular sensor node. In contrast, our proposed algorithm allows each sensor to broadcast its local information only once to its neighbours in a time slot. Also, since many of the sensors may use outdated estimates, we propose an on-line learning scheme based on stochastic approximation in order to optimize the coefficients of the linear combination used in consensus. the following updates are done for all links (i, j): (t+1) KB  Y (t) A0 Y (t) KB +d(νB (t))Γt KB −d(νB (t))Γt I(B(t) = B) − (6) 2d(νB (t))Γt (i, j) 2d(νB (t))Γt (i, j) −A0 A. The proposed algorithm Note that, if the Gibbs sampling step of Algorithm 4 is run at all sensors to make their individual activation decisions, but all sensors are supplied with the same initial seed for randomization, then all sensors will sample the same B(t) at each time t. We will exploit this fact in the next algorithm. However, depending on the current configuration B(t) = B, each node uses a linear combination of its own estimate and the estimates made by its neighbours. Let us denote the initial estimate made by node k at time t by X̄ (k) (t); this estimation is done at node k based on Hc (t). The actual estimate X̂(t) := [X̂ (1) (t), X̂ (2) (t), · · · , X̂ (N ) (t)]0 is obtained from X̄(t) := [X̄ (1) (t), X̄ (2) (t), · · · , X̄ (N ) (t)]0 by (t) X̂(t) = KB(t) X̄(t); this method is motivated by the Kalman (t) consensus filter proposed in [15]. Here KB ∈ RN ×N is the weight matrix to be used at time t under configuration B; this matrix has (i, j)-th entry zero if nodes i and j are not connected in the wireless network, it can induce a consensus (t) such as in [16]. The matrices KB for all B ∈ B are updated for all t when J (t) = 1, and are broadcast to the sensors. As with the θ(t) update in (2), we use SPSA to find optimal KB in order to minimize the error. First we the algorithm. Define Ptdescribe some special steps Pof t ν(t) = τ =1 J (τ ), and νB (t) = τ =1 J (τ )I(B(τ ) = B) (the number of times configuration B is sampled till time t). 1) f (t) (B) update when J (t) = 1: If J (t) = 1, all sensors are read to obtain Z(t); this Z(t) is either supplied to all sensors, or sent to some specific node which does centralized computation (this is done only when J (t) = 1) and broadcasts the results to all sensors. For each B ∈ B, all estimates (k) (k) {X̂B (t)}1≤k≤N are computed using ZB (t), where X̂B (t) denotes the estimate at node k at time t if B(t) P = B. Then, the N quantity YK (t) := EX(t)∼p(·|θ(t),ZB (t),K (t) ) ( N1 k=1 ||X(t) − B (k) (t) B X̂B (t)||2 |θ(t), ZB (t), KB ) is computed, and the following update is done for all B ∈ B:  f (t+1) (B) = f (t) (B) + J (t)a(ν(t)) Y  (t) (i, j) = KB (i, j) − b(νB (t))J (t) (t) KB  − f (t) (B) Remark 15: Algorithm 5 is similar to Algorithm 4 except that (i) consensus is used for deciding the estimates, and (ii) an additional SPSA algorithm has been used to optimize the consensus gains. However, this scheme does not achieve perfect consensus, and is optimal only when one round message exchange among neighbouring nodes is allowed per slot. (t) Remark 16: Since KB iteration does not depend on λ(t), we can run (6) at the same timescale as λ(t) iteration. B. Performance of Algorithm 5 1) Complexity and distributed nature: The mean number of additional sensors activated per slotis O( N T ), which can be made small by taking T large enough. The same argument applies to the computation of YK (t) . Moreover, one can deB cide only to compute YK (t) (t) and update f (t) (B(t)) when B(t) (5) We will see in Section V-B1 that this O(2N ) computation can be avoided without sacrificing convergence. (t) 2) KB update when J (t) = 1: The algorithm requires P∞ b2 (t) another condition t=0 d2 (t) < ∞ (apart from those in (t) (6) is a gradient descent scheme, with the goal to converge ∗ to some KB so that limt→∞ E(YK (t) (t)) (if it exists) is B minimized. ∇E(YK (t) (t)) is estimated by SPSA. B 3) Outline of the proposed algorithm: The entire scheme is described in Algorithm 5. Algorithm 5: The same seed is supplied to all sensors for Gibbs sampling. All iterates are initialized arbitrarily. For any time t = 0, 1, 2, · · · , do at each sensor k: 1. Run Gibbs sampling as in Section IV-A2, once or multiple times. All sensors will have the same B(t); they will be activated according to B(t) and make observations. (k) (t) Compute X̄ (k) (t) = µ2 (Hc (t)) and X̂(t) = KB(t) X̄(t) locally. Update λ(t) using (3). 2. If J (t) = 1, read all sensors and obtain Z(t). For (k) each B ∈ B, compute all estimates {X̂B (t)}1≤k≤N using (k) ZB (t), where X̂B (t) denotes the estimate at node k at (t) time t if B(t) = B. Update f (t) (B) using (5), and KB using (6) for all B ∈ B. 3. Do the same θ(t) update as in (2). (t+1) 4. Broadcast KB(t) , f (t) (B) and θ(t + 1) if J (t) = 1. Section IV-A1) to ensure convergence of the KB iterates which are updated via the following SPSA algorithm whenever J (t) = 1 (i.e., t is an integer multiple of T ). A random matrix Γt ∈ RN ×N is generated such that Γt (i, j) = 0 if i and j are not neighbours, otherwise Γt (i, j) ∈ {−1, 1} independently with equal probability. Now, J (t) = 1 as discussed in Section IV-B2; the algorithm will converge slowly but O(2N ) computation will be avoided. Gibbs sampling is run at all nodes; they will yield the same B(t) since all sensors have the same seed. All sensors will have the same λ(t), and can update h(t) (B(t)) for each t. The consensus gains and f (t) (B) updates need to be sent to all sensors if J (t) = 1; however, a bounded delay in broadcast does not affect convergence. Since nodes use only local consensus and periodic broadcast, and Gibbs sampling step is distributed, Algorithm 5 is distributed. 2) Convergence of Algorithm 5: Assumption 6: For given λ ∈ [0, A0 ], θ ∈ Θ, for all B ∈ B, the function E(YKB ) of KB (Section V-A1) is Lipschitz continuous in KB . The set of ordinary differential equations K̇B (τ ) = −∇E(YKB (τ ) (τ )) (vectorized) for any fixed θ ∈ Θ ∗ has a globally asymptotically stable equilibrium KB (θ) which is Lipschitz continuous in θ. Now we present the main result related to Algorithm 5, which shows that the iterates of Algorithm 5 almost surely converge to a set of locally optimal solutions of (P2). Theorem 6: Under Assumptions 2-6 and Algorithm 5, we have limt→∞ θ(t) = θ∗ almost surely. Correspondingly, λ(t) → λ∗ (θ∗ ) almost surely. As a result, for all B ∈ B, we have ∗ KB (t) → KB (θ∗ ) almost surely. Also, f (t) (B) → PN 1 − k=1 EZB (t)∼p(·|θ0 ) Eµ(k) (·;·;θ ∗ ),K ∗ (θ ∗ ),θ ∗ (||X(τ ) N 2 to combine the estimates made by its neighbouring sensors. Kalman filtering operation is required since the dynamical system can be expressed as a linear stochastic system (for which Kalman filter is the best linear MMSE estimator): X(t + 1) = AX(t) + (X(t + 1) − AX(t)) {z } | zk (t + 1) = [mk,1 , mk,2 , · · · , mk,|X | ] X(t) + {z } | Zk (t) = Bk (t)zk (t) :=w(t) :=Hk vk (t) | {z } ∼N (mk,i ,Σk,i ) if X(t)=ei Since A is known, the conditional covariance matrix Q(i) of w(t) given X(t) = ei is known to all sensors. B X̂ (k) (τ )||2 |ZB (t)) := fθ∗ (B) almost surely for all B ∈ B. The B(t) process reaches the steady-state distribution πβ,λ∗ (θ∗ ),KB∗ (θ∗ ),θ∗ (·) which can be obtained by replacing h(B) in (1) by fθ∗ (B) + λ∗ ||B||1 . Proof: The proof is similar to that of Theorem 5. If θ∗ = θ0 , then global optimum for (P2) is reached. VI. D ISTRIBUTED TRACKING OF A M ARKOV CHAIN In this section, we seek to track a Markov chain {X(t)}t≥0 with transition probability matrix AT and finite state space X . In order to have a meaningful problem, we enumerate each state and denote the i-th state by ei which is an |X |-length 0 − 1 column vector with 1 only at the i-th location. Thus, the state space becomes X = {ei : 1 ≤ i ≤ |X |}. We also consider a measurement process where, given X(t) = ei and a configuration B(t) = B of active sensors, any sensor k with Bk = 1 makes an observation zk (t) ∼ N (mk,i , Σk,i ) where the mean mk,i and covariance matrix Σk,i depend on the state ei . Under this model, a centralized, finite horizon version of the dynamic sensor subset selection problem has been solved in [4], where it is shown that a sufficient statistic for decision making is a belief vector on the state space conditioned on the history. The authors of [4] formulated a partially observable Markov decision process (POMDP) with this belief vector working as a proxy to the (hidden) state, and also proposed a Kalman-like estimator to make on-line update to the belief vector using new observations made by chosen sensors. Hence, in this section, we skip the centralized problem (P1) and directly solve the distributed problem (P2). The centralized problem in [4] itself leads to intractability in the sequential subset selection problem; the POMDP formulation in [4] does not provide any structural result on the optimal policy. Hence, for solving the distributed problem (P2), we restrict ourselves to the class of myopic policies which seek to minimize the cost at the current time instant. The estimation scheme yields X̂ (k) (t) at each node k; X̂ (k) (t) is the belief vector on the state space, and is generated by the use of a Kalman-consensus filter (KCF) as in [15]. Consensus is required since all nodes do not have access to the complete observation set; consensus requires each sensor A. Kalman consensus filtering The KCF that we use is adapted from [15] with the additional consideration of B(t). Here each sensor k maintains an estimate X̄ (k) (t) at time t before making any observation. Once the observations are made, sensor k computes X̂ (k) (t) by using KCF. The estimates evolve as follows: X̂ (k) (t) = [X̄(t) + Kk (t)Bk (t)(zk (t) − Hk X̄ (k) (t)) X +Ck (X̄ (j) (t) − X̄ (k) (t))]D X̄ (k) (t + 1) = AX̂ (k) (t) j∈nbr(k) (7) Here Ck and Kk (t) are called consensus gain and Kalman gain matrices for sensor k, and nbr(k) is the set of neighbours of sensor k. Projection on the probability simple D is done to ensure that X̂ (k) (t) is a valid probability belief vector. In [15, Theorem 1], the Kalman gains Kk (t) at all nodes areP optimized for given consensus gains Ck , so that the MSE N 1 (k) (t) − X(t)||2 at the current time step is mink=1 E||X̂ N imized; but the computational and communication complexity per node for its implementation grows rapidly with N . Hence, [15, Section IV] also provides an alternative suboptimal KCF algorithm to compute Kk (t) at each sensor k, which has low complexity and is easily implementable. Hence, we adapt this suboptimal algorithm from [15, Section IV] to our problem. The KCF gain update scheme from [15, Section IV] maintains two matrices Mk (t) and Pk (t) for each k, which are viewed as proxies for the covariance matrices of the two errors X̂ (k) (t) − X(t) and X̄ (k) (t) − X(t). It also requires system noise covariance matrix; since system noise w(t) is dependent on X(t) whose PNexact value is unknown to the sensors, we use Qk (t) = i=1 X̄ (k) (t + 1)(i)Q(i) at node k as an estimate of the covariance matrix of w(t + 1). Similarly, P|X | Rk (t + 1) = Bk (t) i=1 X̄ (k) (t + 1)(i)Σk,i is used as an alternative to the covariance matrix vk (t + 1). The KCF filter also maintains an abstract iterate Fk (t). The overall KCF gain update equations from [15, Section IV] are as follows: Kk (t) = Rk (t + 1) = Qk (t) = small enough by making T arbitrarily large but finite, and the broadcast can even be done over T slots to avoid network congestion at any particular slot. Interestingly, Mk (t) and Pk (t) can be updated using local iterates, and do not need any communication. Computing Mk (t) and Pk (t) involves simple matrix operations which have polynomial complexity. Bk (t)Pk (t)HkT (Rk (t) + Hk Pk (t)HkT )−1 |X | X Bk (t) X̄ (k) (t + 1)(i)Σk,i i=1 N X X̄ (k) (t + 1)(i)Q(i) i=1 Fk (t) = I − Kk (t)Hk Bk (t) Mk (t) = Fk (t)Pk (t)FkT (t) + Kk (t)Rk (t + 1)KkT (t) Pk (t + 1) = AMk (t)AT + Qk (t) VII. N UMERICAL R ESULTS (8) B. The proposed algorithm The sensor subset selection is done via Gibbs sampling run at all nodes supplied with the same seed; all nodes generate the same configuration B(t) at each time t. The quantity f (t) (B) is updated via stochastic approximation to converge to the MSE under configuration B; but since the MSE PNunder B cannot be computed directly, sensor k uses 1 k=1 T r(Mk (t − T )) of a past slot (t − T ) to update N f (t) (B). λ(t) is varied at a slower timescale. The proposed scheme is provided in Algorithm 6. Algorithm 6: Input: A0 , T > 0 stepsize sequences {a(t)}t≥0 and {b(t)}t≥0 as in Section IV, consensus gain matrices Ck for all k ∈ {1, 2, · · · , N }, the same seed for randomization to all sensors, initial covariance matrix P (0) of X(0). Pt All iterates are initialized arbitrarily. Define νB (t) := τ =0 I(B(τ ) = B)J (t). For any time t = 0, 1, 2, · · · , do at each sensor k: 1. Select B(t) at each sensor by running the Gibbs sampling step as in Section IV-A2. Activate sensors autonomously according to the common B(t) selected by them, and make observations accordingly. 2. At sensor k, perform state estimation with (7) and gain update with (8). Update λ(t) at all sensors using (3). Compute h(t+1) (B) = f (t+1) (B) + λ(t)||B||1 either for all B ∈ B, or for B(t) if computation is a bottleneck. 3. If J (t) = 1, update: f (t+1) (B) = [f (t) (B) + J (t)I(B(t − T ) = B)a(νB (t − T )) ( N 1 X T r(Mk (t − T )) − f (t) (B))]0A0 N k=1 4. If J (t) = 1, broadcast T r(Mk (t)) to all sensors, so that step 3 can be performed at time (t + T ). Remark 17: Algorithm 6 is suboptimal for (P2) because: (i) it greedily chooses B(t) via Gibbs sampling without caring about the future cost, and (ii) KCF update is suboptimal. But it has low complexity, and it performs well (see Section VII). C. Complexity of Algorithm 6 At each time t, a sensor k needs to obtain X̄ (j) (t) from all its neighbours j ∈ nbr(k) for consensus. Also, {T r(Mk (t))}1≤k≤N needs to be broadcast to all nodes when J (t) = 1 so that f (t+T ) (B) update can be done at each node; but the per slot communication for this broadcast can be made Now we demonstrate the performance of Algorithm 4 (centralized) and Algorithm 6 (distributed). We consider the 1 , following parameter values: N = 5, N̄ = 2, a(t) = t0.6 2 1 0.2 b(t) = t0.8 , c(t) = t , d(t) = t0.1 , T = 20, λ(0) = 0.1, β = 150. Gibbs sampling is run 10 times per slot. 1) Performance of Algorithm 4: For illustration purpose, we assume that X(t) ∼ N (θ0 , (1 − θ0 )2 ) scalar, and zk (t) = X(t) + wk (t), where θ0 = 0.5 and wk (t) is zero mean i.i.d. Gaussian noise independent across k. Standard deviation of wk (t) is chosen uniformly and independently from the interval [0, 0.5], for each k ∈ {1, 2, · · · , N }. Initial estimate θ(0) = 0.2, Θ = [0, 0.8]. We consider three possible algorithms: (i) Algorithm 4 in its basic form, which we call GIBBS, (ii) a variation of Algorithm 4 called LOWCOMPLEXGIBBS where all sensors are not read when J (t) = 1, and the relatively expensive f (t) (B(t)) and θ(t) updates are done every T slots, and (iii) an algorithm GREEDY where N̄ sensors are picked arbitrarily and used for ever with the wrong estimate θ(0) = 0.2 without any update. The MSE per slot, mean number of active sensors per slot, λ(t) and θ(t) are plotted against t in Figure 1. MSE of all these three algorithms are much smaller than V ar(X(t)) = (1 − θ0 )2 (this is MMSE without any observation). We notice that GIBBS and LOWCOMPLEXGIBBS significantly outperform GREEDY in terms of time-average MSE; this shows the power of Gibbs sampling and learning θ(t) over time. We have plotted only one sample path since GIBBS and LOWCOMPLEXGIBBS converge almost surely to the global optimum. We also observe that GIBBS converges faster than LOWCOMPLEXGIBBS, since it uses more computational and communication resources. We observe that Pt 1 ||B(τ )|| 1 → N and θ(t) → θ0 almost surely for τ =1 t both GIBBS and LOWCOMPLEXGIBBS (verified by simulating multiple sample paths). It is interesting to note that θ∗ = θ1 = θ0 in this numerical example (recall Theorem 5 and Remark 14), i.e., both GIBBS and LOWCOMPLEXGIBBS converge to the true parameter. Convergence rate will vary with stepsize and other parameters. 2) Performance of Algorithm 6: We consider |X | = 4 states, and assume that the sensors form a line topology. Transition probability matrix AT is chosen randomly, and Ck = 0.1 is set in Algorithm 6 (which we call GIBBSKCF here) for all k. The values mk,i are chosen uniformly from [0, 1], and Σk,i = 0.05 ∗ (1 + |k − i|) (scalar values in this case) are set for all 1 ≤ i ≤ |X |, 1 ≤ k ≤ N . We compared the MSE performance of three algorithms: (i) GIBBSKCF, i.e., Algorithm 6, (ii) CENTRALKALMAN, 0.15 0.1 0.09 GIBBS GREEDY LOWCOMPLEXGIBBS 0.1 0.08 0.07 (t) MSE 0.06 GIBBS 0.05 0.04 0.05 0.03 0.02 0.01 0 0 2000 4000 6000 8000 0 0 10000 1 2 t 3 4 2.5 5 104 t 0.7 0.5 2 0.4 (t) Mean number of active sensors per slot 0.6 GIBBS LOWCOMPLEXGIBBS 1.5 0.3 GIBBS LOWCOMPLEXGIBBS 0.2 0.1 1 0 2000 4000 6000 8000 10000 0 0 1 2 Fig. 1. 3 t t 4 5 104 Performance of Algorithm 4 for centralized tracking of the iid process. where a centralized Kalman filter tracks X(t) using observations only from two arbitrary sensors, and (iii) PERFECTBLIND, where at each time t, the state X(t − 1) is known perfectly to all sensors, but no observation is allowed to compute X̂ (k) (t). The MSE of PERFECTBLIND will be limt→∞ E(V ar(X(t)|X(t − 1))). In Figure 2, we plot the time-average P MSE for all three t algorithms along one sample path, and 1t τ =1 ||B(τ )||1 for Pt 1 GIBBSKCF. We observe that, t τ =1 ||B(τ )||1 converges to N̄ . For the given sample path, GIBBSKCF provides better MSE than PERFECTBLIND, but the MSE was seen to be slightly worse along some other sample paths. We also observe that the MSE of GIBBSKCF is slightly worse than CENTRALKALMAN for the given instance, but they are very close in many other problem instances (verified numerically); this establishes the efficacy of GIBBSKCF and the power of Gibbs sampling based sensor subset selection, despite using only one round of consensus per slot. Basically, dynamic subset selection compensates for the performance loss due to lack of a fusion center. VIII. C ONCLUSIONS We have proposed low-complexity centralized and distributed learning algorithms for dynamic sensor subset selection for tracking i.i.d. time-varying as well as Markovian processes. We first provided algorithms based on Gibbs sampling and stochastic approximation for i.i.d. time-varying data with unknown parametric distribution, and proved almost sure convergence. Next, we provided an algorthm based on Kalman consensus filtering, Gibbs sampling and stochastic approximation for distributed tracking of a Markov chain. Numerical results demonstrate the efficacy of the algorithms against simple algorithms without learning. R EFERENCES [1] A. Chattopadhyay and U. Mitra. Optimal sensing and data estimation in a large sensor network. Technical Report, available in https://arxiv.org/abs/1707.08074, a shorter version has been accepted in IEEE Globecom 2017, 2017. [2] A. Chattopadhyay and U. Mitra. Optimal dynamic sensor subset selection for tracking a time-varying stochastic process. submitted to IEEE INFOCOM 2018, https://drive.google.com/open?id=0B458nrWAgTUEbjd4R3Z5NS1wSlk. [3] D. Wang, J. Fisher III, and Q. Liu. Efficient observation selection in probabilistic graphical models using bayesian lower bounds. In 0.9 0.8 0.7 MSE 0.6 0.5 0.4 0.3 0.2 0.1 0 0 PERFECTBLIND CENTRALKALMAN GIBBSKCF 2000 4000 6000 8000 10000 8000 10000 t 2.1 Mean number of active sensors per slot 2 1.9 GIBBSKCF 1.8 1.7 [13] S. Das and J.M.F. Moura. Consensus+innovations distributed kalman filter with optimized gains. IEEE Transactions on Signal Processing, 65(2):467–481, 2017. [14] S. Kar and J.M.F. Moura. Gossip and distributed kalman filtering: Weak consensus under weak detectability. IEEE Transactions on Signal Processing, 59(4):1766–1784, 2011. [15] R. Olfati-Saber. Kalman-consensus filter : Optimality, stability, and performance. In Conference on Decision and Control, pages 7036–7042. IEEE, 2009. [16] L. Xiao, S. Boyd, and S. Lall. A scheme for robust distributed sensor fusion based on average consensus. In International Symposium on Information Processing in Sensor Networks (IPSN), pages 63–70. IEEE, 2005. [17] V. Tzoumas, A. Jadbabaie, and G.J. Pappas. Near-optimal sensor scheduling for batch state estimation: Complexity, algorithms, and limits. In Conference on Decision and Control, pages 2695–2702. IEEE, 2016. [18] N. Michelusi and U. Mitra. Cross-layer estimation and control for cognitive radio: Exploiting sparse network dynamics. IEEE Transactions on Cognitive Communications and Networking, 1(1):128–145, 2015. [19] A. Chattopadhyay and B. Baszczyszyn. Gibbsian on-line distributed content caching strategy for cellular networks. https:// arxiv.org/ abs/ 1610.02318, 2016. [20] J.C. Spall. Multivariate stochastic approximation using a simultaneous perturbation gradient approximation. IEEE Transactions on Automatic Control, 37(3):332–341, 1992. [21] A. Chattopadhyay, M. Coupechoux, and A. Kumar. Sequential decision algorithms for measurement-based impromptu deployment of a wireless relay network along a line. IEEE/ACM Transactions on Networking, longer version available in http:// arxiv.org/ abs/ 1502.06878, 24(5):2954–2968, 2016. 1.6 1.5 1.4 0 Fig. 2. chain. [4] [5] [6] [7] [8] [9] [10] [11] [12] 2000 4000 6000 Performance of Algorithm 6 for distributed tracking of a Markov Proceedings of the Thirty-Second Conference on Uncertainty in Artificial Intelligence (UAI), pages 755–764. ACM, 2016. D.S. Zois, M. Levorato, and U. Mitra. Active classification for pomdps: A kalman-like state estimator. IEEE Transactions on Signal Processing, 62(23):6209–6224, 2014. D.S. Zois, M. Levorato, and U. Mitra. Energy-efficient, heterogeneous sensor selection for physical activity detection in wireless body area networks. IEEE Transactions on Signal Processing, 61(7):1581–1594, 2013. V. Krishnamurthy and D.V. Djonin. Structured threshold policies for dynamic sensor schedulinga partially observed markov decision process approach. IEEE Transactions on Signal Processing, 55(10):4938–4957, 2007. W. Wu and A. Arapostathis. Optimal sensor querying: General markovian and lqg models with controlled observations. IEEE Transactions on Automatic Control, 53(6):1392–1405, 2008. V. Gupta, T.H. Chung, B. Hassibi, and R.M. Murray. On a stochastic sensor selection algorithm with applications in sensor scheduling and sensor coverage. Automatica, 42:251–260, 2006. A. Bertrand and M. Moonen. Efficient sensor subset selection and link failure response for linear mmse signal estimation in wireless sensor networks. In European Signal Processing Conference (EUSIPCO), pages 1092–1096. EURASIP, 2010. P. Bremaud. Markov Chains, Gibbs Fields, Monte Carlo Simulation, and Queues. Springer, 1999. Vivek S. Borkar. Stochastic approximation: a dynamical systems viewpoint. Cambridge University Press, 2008. F. Schnitzler, J.Y. Yu, and S. Mannor. Sensor selection for crowdsensing dynamical systems. In International Conference on Artificial Intelligence and Statistics (AISTATS), pages 829–837, 2015. Arpan Chattopadhyay obtained his B.E. in Electronics and Telecommunication Engineering from Jadavpur University, Kolkata, India in the year 2008, and M.E. and Ph.D in Telecommunication Engineering from Indian Institute of Science, Bangalore, India in the year 2010 and 2015, respectively. He is currently working in the Ming Hsieh Department of Electrical Engineering, University of Southern California, Los Angeles as a postdoctoral researcher. Previously he worked as a postdoc in INRIA/ENS Paris. His research interests include wireless networks, cyber-physical systems, machine learning and control. Urbashi Mitra is a Deans Professor in the Departments of Electrical Engineering and Computer Science, University of Southern California, Los Angeles, CA, USA. Previous appointments inPLACE clude Bellcore and the Ohio State University. Her PHOTO honors include: U.S.-U.K. Fulbright, Leverhulme HERE Trust Visiting Professorship, Editor-in-Chief IEEE TRANSACTIONS ON MOLECULAR, BIOLOGICAL AND MULTISCALE COMMUNICATIONS, IEEE Communications Society Distinguished Lecturer, U.S. NAE Galbreth Lectureship, Okawa Foundation Award, and an NSF CAREER Award. Her research is in wireless communications. A PPENDIX A P ROOF OF T HEOREM 1 We will prove only the first part of the theorem where there exists one B ∗ . The second part of the theorem can be proved similarly. Let us denote the optimizer for (P1) by B, which is possibly different from B ∗ . Then, by the definition of B ∗ , we have f (B ∗ ) + λ∗ ||B ∗ ||1 ≤ f (B) + λ∗ ||B||1 . But ||B||1 ≤ K (since B is a feasible solution to the constrained problem) and ||B ∗ ||1 = K (by assumption). Hence, f (B ∗ ) ≤ f (B). This completes the proof. Hence, ∞ X (1 − δ(Pl )) l=0 = ≥ ≥ = A PPENDIX B W EAK AND S TRONG E RGODICITY Consider a discrete-time Markov chain (possibly not timehomogeneous) {B(t)}t≥0 with transition probability matrix (t.p.m.) P (m; n) between t = m and t = n. We denote by D the collection of all possible probasbility distributions on the state space. Let dV (·, ·) denote the total variation distance between two distributions in D. Then {B(t)}t≥0 is called weakly ergodic if, for all m ≥ 0, we have limn↑∞ supµ,ν∈D dV (µP (m; n), νP (m; n)) = 0. The Markov chain {B(t)}t≥0 is called strongly ergodic if there exists π ∈ D such that, limn↑∞ supµ∈D dV (µT P (m; n), π) = 0 for all m ≥ 0. A PPENDIX C P ROOF OF T HEOREM 3 We will first show that the Markov chain {B(t)}t≥0 in weakly ergodic. Let us define ∆ := maxB∈B,A∈B |h(B) − h(A)|. Consider the transition probability matrix (t.p.m.) Pl for the inhomogeneous Markov chain {Y (l)}l≥0 (where Y (l) := B(lN )). The Dobrushin’s ergodic coefficient δ(Pl ) is given by (see [10, Chapter 6, Section 7] for definition) δ(Pl ) = P 0 00 1 − inf B 0 ,B 00 ∈B B∈B min{Pl (B , B), Pl (B , B)}. A sufficient condition P∞for the Markov chain {B(t)}t≥0 to be weakly ergodic is l=1 (1 − δ(Pl )) = ∞ (by [10, Chapter 6, Theorem 8.2]). Now, with positive probability, activation states for all nodes 0 are updated over a period of N slots. Hence, Pl (B , B) > 0 for 0 all B , B ∈ B. Also, once a node jt for t = lN + k is chosen in MODIFIEDGIBBS algorithm, the sampling probability for −β(lN +k)∆ . Hence, any activation state in a slot is greater than e 2 for independent sampling over N slots, we have, for all pairs 0 B , B: N −1  −β(lN +k)∆  Y 0 e Pl (B , B) > >0 2N k=0 ≥ ∞ X 0 l=0 ∞ X X inf00 B ,B ∈B 2N 0 00 min{Pl (B , B), Pl (B , B)} B∈B   N −1 −β(0) log(1+lN +k)×∆ Y e 2N l=0 k=0 ∞ N −1  −β(0) log(1+lN +N )×∆  X Y e l=0 k=0 ∞ X 1 NN l=1 1 N N +1 N 1 (1 + lN )β(0)N ∆ ∞ X 1 β(0)N ∆ (1 + i) i=N +1 = ∞ (9) Here the first inequality uses the fact that the cardinality of B is 2N . The second inequality follows from replacing k by N in the numerator. The thirdP inequality follows from lowerlN +N −1 1 bounding (1+lN )1β(0)N ∆ by N1 i=lN β(0)N ∆ . The last P∞ (1+i) equality follows from the fact that i=1 i1a diverges for 0 < a < 1. Hence, the Markov chain {B(t)}t≥0 is weakly ergodic. In order to prove strong ergodicity of {B(t)}t≥0 , we invoke [10, Chapter 6, Theorem 8.3]. We denote the t.p.m. of {B(t)}t≥0 at a specific time t = T0 by Q(T0 ) , which is a given specific matrix. If {B(t)}t≥0 evolves up to infinite time with fixed t.p.m. Q(T0 ) , then it will reach the stationary −βT h(B) distribution πβT0 (B) = e Zβ0 . Hence, we can claim that T0 Condition 8.9 of [10, Chapter 6, Theorem 8.3] is satisfied. Next, we check Condition 8.10 of [10, Chapter 6, Theo0 rem 8.3]. For any B ∈ arg minB 0 ∈B h(B ), we can argue that πβT0 (B) increases with T0 for sufficiently large T0 ; this can be verified by considering the derivative of πβ (B) w.r.t. 0 β. For B ∈ / arg minB 0 ∈B h(B ), the probability πβT0 (B) decreases with T0 for large T0 . Now, using the fact that any bounded sequence converges, we can write P∞ monotone, P T0 =0 B∈B |πβT0 +1 (B) − πβT0 (B)| < ∞. Hence, by [10, Chapter 6, Theorem 8.3], the Markov chain {B(t)}t≥0 is strongly ergodic. It is straightforward to verify the claim regarding the limiting distribution. A PPENDIX D P ROOF OF L EMMA 1 Let λ1 > λ2 > 0, and the corresponding optimal error and mean number of active sensors under these multiplier values be (f1 , n1 ) and (f2 , n2 ), respectively. Then, by definition, f1 + λ1 n1 ≤ f2 + λ1 n2 and f2 + λ2 n2 ≤ f1 + λ2 n1 . Adding these two inequalities, we obtain λ1 n1 + λ2 n2 ≤ λ1 n2 + λ2 n1 , i.e., (λ1 − λ2 )n1 ≤ (λ1 − λ2 )n2 . Since λ1 > λ2 , we obtain n1 ≤ n2 . This completes the first part of the proof. The second part of the proof follows using similar arguments. 1) Convergence in the fastest timescale: Let us denote the probability distribution of B(t) under Algorithm 4 by π (t) (a column vector indexed by the cofigurations from B), and the A PPENDIX E corresponding transition probability matrix (TPM) by A(t); P ROOF OF L EMMA 2 (t+1) T i.e., (π ) = (π (t) )T A(t) = (1 − 1) × (π (t) )T + 1 × P −βh(B) (t) T B∈B ||B||1 e Let us denote Eµ2 ||B||1 =: g(λ) = . (π ) A(t). This form is similar to a standard stochastic Zβ It is straightforward to see that Eµ2 ||B||1 is continuously approximation scheme as in [11, Chapter 2] except that the differentiable in λ. Let us denote Zβ by Z for simplicity. The step size sequence for π (t) iteration is a constant sequence. derivative of g(λ) w.r.t. λ is given by: Also, if f (t) (B), λ(t) and θ(t) are constant with time t, then 0 A(t) = A will also be constant with time t, and the stationary g (λ) P −β(f (B)+λ||B||1 ) − P −β(f (B)+λ||B||1 ) dZ −Zβ B∈B ||B||2 distribution for the TPM A will exist and will be Lipschitz B∈B ||B||1 e 1e dλ = Z2 continuous in all (constant) slower timescale iterates. Hence, by using similar argument as in [11, Chapter 6, Lemma 1], Now, it is straightforward to verify that dZ dλ = −βZg(λ). Hence, one can show the following for all B ∈ B: 0 g (λ) −Zβ = P −β(f (B)+λ||B||1 ) βZg(λ) 2 −β(f (B)+λ||B||1 ) + P B∈B ||B||1 e B∈B ||B||1 e Z2 Now, g 0 (λ) ≤ 0 is equivalent to P ||B||21 e−β(f (B)+λ||B||1 ) g(λ) ≤ PB∈B −β(f (B)+λ||B||1 ) B∈B ||B||1 e Noting that E||B||1 =: g(λ) and dividing the numerator and denominator of R.H.S. by Z, the condition is reduced to E||B||2 E||B||1 ≤ E||B||11 , which is true since E||B||21 ≥ (E||B||1 )2 . Hence, E||B||1 is decreasing in λ for any β > 0. Also, it is easy to verify that |g 0 (λ)| ≤ (β + 1)N 2 . Hence, g(λ) is Lipschitz continuous in λ. A PPENDIX F P ROOF OF T HEOREM 4 Let the distribution of B(t) under Algorithm 3 be π (t) (·). Since limt→∞ a(t) = 0, it follows that limt→∞ dV (π (t−1) , πβ|λ(t−1) ) = 0 (where dV (·, ·) is the total variation distance), and limt→∞ (Eπ(t−1) ||B||1 − Eπβ |λ(t−1) ||B||1 ) := limt→∞ e(t) = 0. Now, we can rewrite the λ(t) update equation as follows: λ(t + 1) = [λ(t) + a(t)(Eπβ |λ(t−1) ||B||1 − N̄ + Mt + et )]cb (10) Here Mt := ||B(t − 1)||1 − Eπ(t−1) ||B(t − 1)||1 is a Martingale difference noise sequence, and limt→∞ et = 0. It is easy to see that the derivative of Eπβ |λ ||B||1 w.r.t. λ is bouned for λ ∈ [b, c]; hence, Eπβ |λ ||B||1 is a Lipschitz continuous function of λ. It is also easy to see that the sequence {Mt }t≥0 is bounded. Hence, by the theory presented in [11, Chapter 2] and [11, Chapter 5, Section 5.4], λ(t) converges to the unique zero of Eπβ |λ ||B||1 − N̄ almost surely. Hence, λ(t) → λ∗ almost surely. Since limt→∞ dV (π (t−1) , πβ|λ(t−1) ) = 0 and πβ|λ is continuous in λ, the limiting distribution of B(t) becomes πβ|λ∗ . A PPENDIX G P ROOF OF T HEOREM 5 The proof involves several steps, and the brief outline of these steps are provided one by one. lim |π (t) (B) − πβ,f (t) ,λ(t),θ(t) (B)| = 0 a.s. t→∞ (11) 2) Convergence of iteration (4): Note that, (4) depends on θ(t) and not on B(t) and λ(t); the iteration (4) depends on θ(t) through the estimation function µ2 (·; ·; ·). Now, f (t) (B) is updated at a faster timescale compared to θ(t). Let us consider the iterations (4) and (2); they constitute a twotimescale stochastic approximation. Note that, for a given θ, the iteration (4) remains bounded inside a compact set independent of θ; hence, using [11, Chapter 2, Theorem 2] with additional modification as suggested in [11, Chapter 5, Section 5.4] for projected stochastic approximation, we can claim that limt→∞ f (t) (B) → fθ (B) almost surely for all B ∈ B, if θ(t) is kept fixed at a value θ. Also, since µ2 (·; ·; θ) is Lipschitz continuous in θ, we can claim that fθ (B) is Lipschitz continuous in θ for all B ∈ B. c(ν(t)) = 0. We also have limt→∞ a(ν(t)) Hence, by using an analysis similar to that in [21, Appendix E, Section C.2] (which uses [11, Chapter 6, Lemma 1]), one can claim that: lim |f (t) (B) − fθ(t) (B)| = 0 a.s. ∀B ∈ B t→∞ (12) This proves the desired convergence of the iteration (4). 3) Convergence of λ(t) iteration: The λ(t) iteration will view θ(t) as quasi-static and B(t), f (t) (·) iterations as equilibriated. Let us assume that θ(t) is kept fixed at θ. Then, by (11) and (12), we can work with πβ,fθ ,λ(t) ,θ in this timescale. Under this situation, (3) P asymptotically tracks the iteration λ(t + 1) = [λ(t) + b(t)( B∈B πβ,fθ ,λ(t),θ (B)||B||1 − N̄ + Mt )]A 0 where {Mt }t≥0 is a Martingale differenece sequence. Now, πβ,fθ ,λ(t),θ (B) is Lipschitz continuous in θ and λ(t) (using Assumption 2, Assumption 4 and a little algebra on the expression (1)). If A0 is large enough, then, by the theory of [11, Chapter 2, Theorem 2] and [11, Chapter 5, Section 5.4], one can claim that λ(t) → λ∗ (θ) almost surely, and λ∗ (θ) is Lipschitz continuous in θ (by Assumption 4). Hence, by using similar analysis as in [21, Appendix E, Section C.2] (which uses [11, Chapter 6, Lemma 1]), we can say that, under iteration (3): lim |λ(t) − λ∗ (θ(t))| = 0 a.s. t→∞ (13) 4) Convergence of the θ(t) iteration: Note that, (2) is the slowest timescale iteration and hence it will view all other there iterations (at three different timescales) as equilibriated. However, this iteration is not affected by other iterations. Hence, this iteration is an example of simultaneous perturbation stochastic approximation as in [20] (since θ∗ lies inside the interior of Θ), but with a projection operation applied on the iterates. Hence, by combining [20, Proposition 1] and the discussion in [11, Chapter 5, Section 5.4], we can say that limt→∞ θ(t) = θ∗ almost surely. 5) Completing the proof: We have seen that limt→∞ θ(t) = θ∗ almost surely. Hence, by (13), limt→∞ λ(t) = λ∗ (θ∗ ) almost surely. By (12), limt→∞ f (t) (B) = fθ∗ (B) almost surely for all B ∈ B. Then, by (11), limt→∞ π (t) (B) = πβ,fθ∗ ,λ∗ (θ∗ ),θ∗ (B) almost surely. Hence, Theorem 5 is proved.
3cs.SY
Priv’IT: Private and Sample Efficient Identity Testing Bryan Cai EECS, MIT [email protected] Constantinos Daskalakis EECS and CSAIL, MIT [email protected] Gautam Kamath EECS and CSAIL, MIT [email protected] arXiv:1703.10127v3 [cs.DS] 7 Jun 2017 June 8, 2017 Abstract We develop differentially private hypothesis testing methods for the small sample regime. Given a sample D from a categorical distribution p over some domain Σ, an explicitly described distribution q over Σ, some privacy parameter ε, accuracy parameter α, and requirements βI and βII for the type I and type II errors of our test, the goal is to distinguish between p = q and dTV (p, q) ≥ α. We provide theoretical bounds for the sample size |D| so that our method both satisfies (ε, 0)differential privacy, and guarantees βI and βII type I and type II errors. We show that differential privacy may come for free in some regimes of parameters, and we always beat the sample complexity resulting from running the χ2 -test with noisy counts, or standard approaches such as repetition for endowing non-private χ2 -style statistics with differential privacy guarantees. We experimentally compare the sample complexity of our method to that of recently proposed methods for private hypothesis testing [GLRV16, KR17]. 1 Introduction Hypothesis testing is the age-old problem of deciding whether observations from an unknown phenomenon p conform to a model q. Often p can be viewed as a distribution over some alphabet Σ, and the goal is to determine, using samples from p, whether it is equal to some model distribution q or not. This type of test is the lifeblood of the scientific method and has received tremendous study in statistics since its very beginnings. Naturally, the focus has been on minimizing the number of observations from the unknown distribution p that are needed to determine, with confidence, whether p = q or p 6= q. In several fields of research and application, however, samples may contain sensitive information about individuals; consider for example, individuals participating in some clinical study of a disease that carries social stigma. It may thus be crucial to guarantee that operating on the samples needed to test a statistical hypothesis protects sensitive information about the samples. This is not at odds with the goal of hypothesis testing itself, since the latter is about verifying a property of the population p from which the samples are drawn, and not of the samples themselves. Without care, however, sensitive information about the sample might actually be divulged by statistical processing that is improperly designed. As recently exhibited, for example, it may be possible to determine whether individuals participated in a study from data that would typically be published in genome-wide association studies [HSR+ 08]. Motivated in part by this realization, there has been increased recent interest in developing data sharing techniques which are private [JS13, USF13, YFSU14, SSB16]. Protecting privacy when computing on data has been extensively studied in several fields ranging from statistics to diverse branches of computer science including algorithms, cryptography, database theory, and machine learning; see, e.g., [Dal77, AW89, AA01, DN03, Dwo08, DR14] and their references. A notion of privacy proposed by theoretical computer scientists which has found a lot of traction is that of differential privacy [DMNS06]. Roughly speaking, it requires that the output of an algorithm on two neighboring datasets D and D0 that differ in the value of one element be statistically close. For a formal definition see Section 2. Our goal in this paper is to develop tools for privately performing statistical hypothesis testing. In particular, we are interested in studying the tradeoffs between statistical accuracy, power, significance, and 1 privacy in the sample size. To be precise, given samples from a categorical distribution p over some domain Σ, an explicitly described distribution q over Σ, some privacy parameter ε, accuracy parameter α, and requirements βI and βII for the type I and type II errors of our test, the goal is to distinguish between p = q and dTV (p, q) ≥ α. We want that the output of our test be (ε, 0)-differentially private, and that the probability we make a type I or type II error be βI and βII respectively. Treating these as hard constraints, we want to minimize the number of samples that we draw from p. Notice that the correctness constraint on our test pertains to whether we draw the right conclusion about how p compares to q, while the privacy constraint pertains to whether we respect the privacy of the samples that we draw from p. The pertinent question is how much the privacy constraint increases the number of samples that are needed to guarantee correctness. Our main result is that privacy may come for free in certain regimes of parameters, and has a mild cost for all regimes of parameters. To be√ precise, without privacy constraints, it is well known that identity testing can be performed from O( α2n · log β1 ) samples, where n is the size of Σ and β = min{βI , βII }, and that this is tight [BFF+ 01, Pan08, VV14, ADK15]. Our main theoretical result is that, with privacy constraints, the number of samples that are needed is  √   √ n n n1/3 , , Õ max · log(1/β) . (1) α2 α3/2 ε α5/3 ε2/3 Our statistical test is provided in Section 5 where the above upper bound on the number of samples that it requires is proven as Theorem 3. Notice that privacy comes for free when the privacy requirement ε is √ Ω( α) – for example when ε = 10% and the required statistical accuracy is 3%. The precise constants sitting in the O(·) notation of Eq. (1) are given in the proof of Theorem 3. We experimentally verify the sample efficiency of our tests by comparing them to recently proposed private statistical tests [GLRV16, KR17], discussed in more detail shortly. Fixing a differential privacy and type I, type II error constraints, we compare how many samples are required by our and their methods to distinguish between hypotheses that are α = 0.1 apart in total variation distance. We find that different algorithms are more efficient depending on the regime and properties desired by the analyst. Our experiments and further discussion of the tradeoffs are presented in Section 6. Approach. A standard approach to turn an algorithm differentially private is to use repetition. As already mentioned above,√ absent differential privacy constraints, statistical tests have been provided that use an optimal m = O( α2n · log β1 ) number of samples. A trivial way to get (ε, 0)-differential privacy using such a non-private test is to create O(1/ε) datasets, each comprising m samples from p, and run the non-private test on one of these datasets, chosen randomly. It is clear that changing the value of a single element in the combined dataset may only affect the output of the test with probability at most ε. Thus the output is (ε, 0)-differentially private; see Section√3 for a proof. The issue with this approach is that the total number of samples that it draws is m/ε = O( εαn2 · log β1 ), which is higher than our target. See Corollary 1. A different approach towards private hypothesis testing is to look deeper into the non-private tests and try to “privatize” them. The most sample-efficient tests are variations of the classical χ2 -test. They compute the number of times, Ni , that element i ∈ Σ appears in the sample and aggregate those counts using a statistic that equals, or is close to, the χ2 -divergence between the empirical distribution defined by these counts and the hypothesis distribution q. They accept q if the statistic is low and reject q if it is high, using some threshold. A reasonable approach to privatize such a test is to add noise, e.g. Laplace(1/ε) noise, to each count Ni , before running the test. It is well known that adding Laplace(1/ε) noise to a set of counts makes them differentially private, see Theorem 1. However, it also increases the variance of the statistic. This has been noticed empirically in recent work of [GLRV16] for the χ2 -test. We show that the variance of the optimal χ2 style test statistic significantly increases if we add Laplace noise to the counts, in Section 4.1, thus increasing √ the sample complexity from O( n) to Ω(n3/4 ). So this route, too, seems problematic. A last approach towards designing differentially private tests is to exploit the distance beween the null and the alternative hypotheses. A correct test should accept the null with probability close to 1, and reject an alternative that is α-far from the null with probability close to 1, but there are no requirements for correctness when the alternative is very close to the null. We could thus try to interpolate smoothly between 2 datasets that we expect to see when sampling the null and datasets that we expect to see when sampling an alternative that is far from the null. Rather than outputting “accept” or “reject” by merely thresholding our statistic, we would like to tune the probability that we output “reject” based on the value of our statistic, and make it so that the “reject” probability is ε-Lipschitz as a function of the dataset. Moreover, the probability should be close to 0 on datasets that we expect to see under the null and close to 1 on datasets that we expect to see under an √alternative that is α-far. As we show in Section 4.2, χ2 -style statistics have high sensitivity, requiring ω( n) samples to be made appropriately Lipschitz. While both the approach of adding noise to the counts, and that of turning the output of the test Lipschitz fail in isolation, our test actually goes through by intricately combining these two approaches. It has two steps: 1. A filtering step, whose goal is to “reject” when p is blatantly far from q. This step is performed by comparing the counts Ni with their expectations under q, after having added Laplace(1/ε) noise to these counts. If the noisy counts deviate from their expectation, taking into account the extra variance introduced by the noise, then we can safely “reject.” Moreover, because noise was added, this step is differentially private. 2. If the filtering step fails to reject, we perform a statistical step. This step just computes the χ2 -style statistic from [ADK15], without adding noise to the counts. The crucial observation is that if the filtering step does not reject, then the statistic is actually ε-Lipschitz with respect to the counts, and thus the value of the statistic is still differentially private. We use the value of the statistic to determine the bias of a coin that outputs “reject.” Details of our test are given in Section 5. Related Work. Identity testing is one of the most classical problems in statistics, where it is traditionally called hypothesis or goodness-of-fit testing, see [Pea00, Fis35, RS81, Agr12] for some classical and contemporary references. In this field, the focus is often on asymptotic analysis, where the number of samples goes to infinity, and we wish to get a grasp on their asymptotic distributions and error exponents [Agr12, TAW10]. In the past twenty years, this problem has enjoyed significant interest in the theoretical computer science community (see, i.e., [BFF+ 01, Pan08, LRR13, VV14, ADK15, CDGR16, DK16, DDK16], and [Can15] for a survey), where the focus has instead been on the finite sample regime, rather than asymptotics. Specifically, the goal is to minimize the number of samples required, while still remaining computationally tractable. A number of recent works [WLK15, GLRV16, KR17] (and a simultaneous work, focused on independence testing [KSF17]) investigate differential privacy with the former set of goals. In particular, their algorithms focus on fixing a desired significance (type I error) and privacy requirement, and study the asymptotic distribution of the test statistics. On the other hand, we are the first work to apply differential privacy to the latter line of inquiry, where our goal is to minimize the number of samples required to ensure the desired significance, power and privacy. As a point of comparison between these two worlds, we provide an empirical evaluation of our method versus their methods. The problem of distribution estimation (rather than testing) has also recently been studied under the lens of differential privacy [DHS15]. This is another classical statistics problem which has recently piqued the interest of the theoretical computer science community. We note that the techniques required for this setting are quite different from ours, as we must deal with issues that arise from very sparsely sampled data. 2 Preliminaries In this paper, we will focus on discrete probability distributions over [n]. For a distribution p, we will use the notation pi to denote the mass p places on symbol i. Definition 1. The total variation distance between p and q is defined as dTV (p, q) = 1 X |pi − qi | . 2 i∈[n] 3 Definition 2. A randomized algorithm M with domain Nn is (ε, δ)-differentially private if for all S ⊆ Range(M ) and for all pairs of inputs D, D0 such that kD − D0 k1 ≤ 1: Pr [M (D) ∈ S] ≤ eε Pr [M (D0 ) ∈ S] + δ. If δ = 0, the guarantee is called pure differential privacy. In the context of distribution testing, the neighboring dataset definition corresponds to two datasets where one dataset is generated from the other by removing one sample. Up to a factor of 2, this is equivalent to the alternative definition where one dataset is generated from the other by arbitrarily changing one sample. Definition 3. An algorithm for the (α, βI , βII )-identity testing problem with respect to a (known) distribution q takes m samples from an (unknown) distribution p and has the following guarantees: • If p = q, then with probability at least 1 − βI it outputs “p = q;” • If dTV (p, q) ≥ α, then with probability at least 1 − βII it outputs “p 6= q.” In particular, βI and βII are the type I and type II errors of the test. Parameter α is the radius of distinguishing accuracy. Notice that, when p satisfies neither of cases above, the algorithm’s output may be arbitrary. We note that if an algorithm is to satisfy both these definitions, the latter condition (the correctness property) need only be satisfied when p falls into one of the two cases, while the former condition (the privacy property) must be satisfied for all realizations of the samples from p (and in particular, for p which do not fall into the two cases above). We recall the classical Laplace mechanism, which states that applying independent Laplace noise to a set of counts is differentially private. Theorem 1 (Theorem 3.6 of [DR14]). Given a set of counts N1 , . . . , Nn , the noised counts (N1 +Y1 , . . . , Nn + Yn ) are (ε, 0)-differentially private when the Yi ’s are i.i.d. random variables drawn from Laplace(1/ε). Finally, we recall the definition of zero-concentrated differential privacy from [BS16] and its relationship to differential privacy. Definition 4. A randomized algorithm M with domain Nn is ρ-zero-concentrated differentially private (ρ-zCDP) if for all pairs of inputs D, D0 such that kD − D0 k1 ≤ 1 and all α ∈ (1, ∞): Dα (M (D)||M (D0 )) ≤ ρα, where Dα is the α-Rényi divergence between the distribution of M (D) and M (D0 ). Proposition 1 (Propositions 1.3 and 1.4 of [BS16]). If a mechanism M1 satisfies (ε, 0)-differential privacy, p 2 then M1 satisfies ε2 -zCDP. If a mechanism M2 satisfies ρ-zCDP, then M2 satisfies (ρ + 2 ρ log(1/δ), δ)differential privacy for any δ > 0. 3 A Simple Upper Bound √  In this section, we provide an O α2nε upper bound for the differentially private identity testing problem. More generally, we show that if an algorithm requires a dataset of size m for a decision problem, then it can be made (ε, 0)-differentially private at a multiplicative cost of 1/ε in the sample size. This is a folklore result, but we include and prove it here for completeness. Theorem 2. Suppose there exists an algorithm for a decision problem P which succeeds with probability at least 1 − β and requires a dataset of size m. Then there exists an (ε, 0)-differentially private algorithm for P which succeeds with probability at least 45 (1 − β) + 1/10 and requires a dataset of size O(m/ε). 4 Proof. First, with probability 1/5, we flip a coin and output yes or no with equal probability. This guarantees that we have probability at least 1/10 of either outcome, which will allow us to satisfy the multiplicative guarantee of differential privacy. We then draw 10/ε datasets of size m, and solve the decision problem (non-privately) for each of them. Finally, we select a random one of these computations and output its outcome. The correctness follows, since we randomly choose the right answer with probability 1/10, or with probability 4/5, we solve the problem correctly with probability 1 − β. As for privacy, we note that, if we remove a single element of the dataset, we may only change the outcome of one of these computations. Since we pick a random computation, this is selected with probability ε/10, and thus the probability of any outcome is additively shifted by at most ε/10. Since we know the minimum probability of any output is 1/10, this gives the desired multiplicative guarantee required for (ε, 0)-differential privacy. √ We obtain the following corollary by noting that the tester of [ADK15] (among others) requires O( n/α2 ) samples for identity testing. Corollary 1. There exists an (ε, 0)-differentially private testing algorithm for the (α, βI , βII )-identity testing problem for any distribution q which requires  √ n · log(1/β) m=O εα2 samples, where β = min (βI , βII ). 4 Roadblocks to Differentially Private Testing In this section, we describe roadblocks which prevent two natural approaches to differentially private testing from working. In Section 4.1, we show that if one simply adds Laplace noise to the empirical counts of a dataset (i.e., runs the Laplace mechanism of Theorem 1) and then attempts to run an optimal identity tester, the variance of the statistic increases dramatically, and thus results in a much larger sample complexity, even for the case of uniformity testing. The intuition behind this phenomenon is as follows. When performing uniformity testing in the small sample regime (when the number √ of samples m is the square root of the domain size n), we will see a (1 − o(1))n elements 0 times, O( n) elements 1 time, and O(1) elements 2 times. If we add Laplace(10) noise to guarantee (0.1, 0)-differential privacy, this obliterates the signal provided by these collision statistics, and thus many more samples are required before the signal prevails. In Section 4.2, we demonstrate that χ2 statistics have high sensitivity, and thus are not naturally differentially private. In other words, if we consider a χ2 statistic Z on two datasets D and D0 which differ in one record, |Z(D) − Z(D0 )| may be quite large. This implies that methods such as rescaling this statistic and interpreting it as a probability, or applying noise to the statistic, will not be differentially private until we have taken a large number of samples. 4.1 A Laplaced χ2 -statistic has large variance Proposition 2. Applying the Laplace mechanism to a dataset before applying the identity tester of [ADK15] results in a significant increase in the variance, even when considering the case of uniformity. More precisely, if we consider the statistic X (Ni + Yi − m/n)2 − (Ni + Yi ) Z 0 (D) = m/n i∈[n] where Ni is the number of occurrences of symbol i in the dataset D (which is of size P oisson(m)) and Yi ∼ Laplace(1/ε), then • If p is uniform, then E[Z 0 ] = 2n2 ε2 m and Var[Z 0 ] ≥ 20n3 ε4 m2 . • If p is a particular distribution which is α-far in total variation distance from uniform, then E[Z 0 ] = 2 4mα2 + ε2n 2m . 5 The variance of the statistic can be compared to that of the unnoised statistic, which is upper bounded by m2 α4 . We can see that the noised statistic has larger variance until m = Ω(n3/4 ). Proof. First, we compute the mean of Z 0 . Note that since |D| ∼ P oisson(m), the Ni ’s will be independently distributed as P oisson(mpi ) (see, i.e., [ADK15] for additional discussion).  X (Ni + Yi − m/n)2 − (Ni + Yi ) 0 E[Z ] = E m/n i∈[n] X (Ni − m/n)2 − Ni =E m/n i∈[n] X Y 2 + 2Yi (Ni − m/n) − Yi  i + m/n i∈[n] X = m · χ2 (p, q) + i∈[n] 2 ε2 m/n 2n2 ε2 m = m · χ2 (p, q) + In other words, the mean is a rescaling of the χ2 distance between p and q, shifted by some constant amount. When p = q, the χ2 -distance between p and q is 0, and the expectation is just the second term. Focus on the case where n is even, and consider p such that pi = (1 + 2α)/n if i is even, and (1 − 2α)/n otherwise. This is α-far from uniform in total variation distance. Furthermore, by direct calculation, χ2 (p, q) = 4α2 , 2 and thus the expectation of Z 0 in this case is 4mα2 + ε2n 2m . Next, we examine the variance of Z 0 . Let λi = mpi and λ0i = mqi = m/n. By a similar computation as before, we have that X 1  Var[Z 0 ] = 2λ2i + 4λi (λi − λ0i )2 λ02 i∈[n] i  20 1 0 2 + 2 (8λi + 2(2λi − 2λi − 1) ) + 4 . ε ε Since all four summands of this expression are non-negative, we have that Var[Z 0 ] ≥ 20n3 20 X 1 = . ε4 λ02 ε4 m 2 i i∈[n] If we wish to use Chebyshev’s inequality to separate these two cases, we require that Var[Z 0 ] is at most the square of the mean separation. In other words, we require that 20n3 ≤ m2 α 4 , ε4 m2 or that  m=Ω 4.2 n3/4 εα  . A χ2 -statistic has high sensitivity Consider the primary statistic which we use in Algorithm 1: Z(D) = 1 X (Ni − mqi )2 − Ni . mα2 mqi i∈[n] 6 As shown in Section 5, E[Z] = 0 if p = q and E[Z] ≥ 1 if dTV (p, q) ≥ α, and the variance of Z is such that these two cases can be separated with constant probability. A natural approach is to truncate this statistic to the range [0, 1], interpret it as a probability and output the result of Bernoulli(Z) – if p = q, the result is likely to be 0, and if dTV (p, q) ≥ α, the result is likely to be 1. One might hope that this statistic is naturally private. More specifically, we would like that the statistic Z has low sensitivity, and does not change much if we remove a single individual. Unfortunately, this is not the case. We consider datasets D, D0 , where D0 is identical to D, but with one fewer occurrence of symbol i. It can be shown that the difference in Z is |Z(D) − Z(D0 )| = 2|Ni − mqi − 1| m2 α2 qi Letting q be the uniform distribution and requiring that this is at most ε (for the sake of privacy), we have a constraint which is roughly of the form 2Ni n ≤ ε, m2 α2 or that √ √  Ni n m=Ω . ε0.5 α √ In particular, if Ni = nc for any c > 0, this does not achieve the desired O( n) sample complexity. One may observe that, if Ni is this large, looking at symbol i alone is sufficient to conclude p is not uniform, even if the count Ni had Laplace noise added. Indeed, our main algorithm of Section 5 works in part due to our formalization and quantification of this intuition. 5 Priv’IT: A Differentially Private Identity Tester In this section, we prove our main testing upper bound: Theorem 3. There exists an (ε, 0)-differentially private testing algorithm for the (α, βI , βII )-identity testing problem for any distribution q which requires    √ √ n n n1/3 m = Õ max , , · log(1/β) α2 α3/2 ε α5/3 ε2/3 samples, where β = min (βI , βII ). The pseudocode for this algorithm is provided in Algorithm 1. We fix the constants c1 = 1/4 and c2 = 3/40. For a high-level overview of our algorithm’s approach, we refer the reader to the Approach paragraph in Section 1. Proof of Theorem 3: We will prove the theorem for the case where β = 1/3, the general case follows at the cost of a multiplicative log(1/β) in the sample complexity from a standard amplification argument. To be more precise, we can consider splitting our dataset into O(log(1/β)) sub-datasets and run the β = 1/3 test on each one independently. We return the majority result – since each test is correct with probability ≥ 2/3, correctness of the overall test follows by Chernoff bound. It remains to argue privacy – note that a neighboring dataset will only result in a single sub-dataset being changed. Since we take the majority result, conditioning on the result of the other sub-tests, the result on this sub-dataset will either be irrelvant to or equal to the overall output. In the former case, any test is private, and in the latter case, we know that the individual test is ε-differentially private. Overall privacy follows by applying the law of total probability. We require the following two claims, which give bounds on the random variables Ni and Yi . Note that, due to the fact that we draw P oisson(m) samples, each Ni ∼ P oisson(mpi ) independently.   Claim 1. |Yi | ≤ c22ε log 1−(1−c12 )1/|A| simultaneously for all i ∈ A with probability exactly 1 − c2 . Proof. The survival function of the folded Laplace distribution with  parameter 2/c2 ε is exp (−c2 εx/2), and the probability that a sample from it exceeding the value c22ε log 1−(1−c12 )1/|A| is equal to 1 − (1 − c2 )1/|A| . The probability that probability that it does not exceed this value is (1 − c2 )1/|A| , and since the Yi ’s are independent, the probability that none exceeds this value is 1 − c2 , as desired. 7 Algorithm 1 Priv’IT: A differentially private identity tester 1: Input: ε; an explicit distribution q; sample access to a distribution p 2: Define A ← {i : qi ≥ c1 α/n}, Ā ← [n] \ A 3: Sample Yi ∼ Laplace(2/c2 ε) for all i ∈ A   4: 5: 6: 7: 8: 9: 10: 11: 12: 13: 14: 15: 16: 17: 18: 19: 20: 21: if there exists i ∈ A such that |Yi | ≥ c22ε log 1−(1−c12 )1/|A| then return either “p 6= q” or “p = q” with equal probability end if Draw a multiset S of P oisson(m) samples from p Let Ni be the number of occurrences of the ith domain element in S for i ∈ A do    √ if |Ni + Yi − mqi | ≥ c22ε log 1−(1−c12 )1/|A| + max 4 mqi log n, log n then return “p 6= q” end if end for P (Ni −mqi )2 −Ni 2 Z ← mα 2 i∈A mqi Let T be the closest value to Z which is contained in the interval [0, 1] Sample b ∼ Bernoulli(T ) if b = 1 then return “p 6= q” else return “p = q” end if  √ Claim 2. |Ni − mpi | ≤ max 4 mpi log n, log n 2 − 1.1 1 − n0.84 n . simultaneously for all i ∈ A with probability at least Proof. We consider this in two cases. Let X be a P oisson(λ) random variable. First, assume that λ ≥ e−3 log n. By Bennett’s inequality, we have the following tail bound [Pol15, Can17]:   x2  x  Pr [|X − λ| ≥ x] ≤ 2 exp − ψ , 2λ λ where ψ(t) = (1 + t) log(1 + t) − t . t2 /2 √ Consider x = 4 λ log n. At this point, we have p ψ(x/λ) = ψ(4 log n/λ) ≥ ψ(4e3/2 ) ≥ 0.23. Thus, i h p Pr |X − λ| ≥ 4 λ log n ≤ 2 exp (−0.23 · 8 log n) ≤ 2n−1.84 . Now, we focus on the other case, where λ ≤ e−3 log n. Here, we appeal to Proposition 1 of [Kla00], which implies the following via Stirling’s approximation: Pr [|X − λ| ≥ kλ] ≤ k exp(−λ + kλ − kλ log k). k−1 We set kλ = log n, giving the upper bound k n1−log k ≤ 1.1 · n−2 . k−1 We conclude by taking a union bound over [n], with the argument for each i ∈ [n] depending on whether λ = mpi is large or small. We proceed with proving the two desiderata of this algorithm, correctness and privacy. 8 Correctness. We use the following two properties of the statistic Z(D), which rely on the condition that √ m = Ω( n/α2 ). The proofs of these properties are identical to the proofs of Lemma 2 and 3 in [ADK15], and are omitted. Claim 3. If p = q, then E[Z] = 0. If dTV (p, q) ≥ α, then E[Z] ≥ 1. Claim 4. If p = q, then Var[Z] ≤ 1/1000. If dTV (p, q) ≥ α, then Var[Z] ≤ 1/1000 · E[Z]2 . First, we note that, by Claim 1, the probability that we return in line 5 is exactly c2 . We now consider the case where p = q. We note that by Claim 2, the probability that we output “p 6= q” in line 10 is o(1), and thus negligible. By Chebyshev’s inequality, we get that Z ≤ 1/10 with probability at least 9/10, and we output “p = q” with probability at least c2 /2 + (1 − c2 ) · (9/10 − c2 )2 ≥ 2/3 (note that we subtract c2 from 9/10 since we are conditioning on an event with probability 1 − c2 , and by union bound). Similarly, when dTV (p, q) ≥ α, Chebyshev’s inequality gives that Z ≥ 9/10 with probability at least 9/10, and therefore we output “p 6= q” with probability at least 2/3. Privacy. We will prove (0, c2 ε/2)-differential privacy. By Claim 1, the probability that we return in line 5 is exactly c2 . Thus the minimum probability of any output of the algorithm is at least c2 /2, and therefore (0, c2 ε/2)-differential privacy implies (ε, 0)-differential privacy. We first consider the possibility of rejecting in line 11. Consider two neighboring datasets D and D0 , which differ by 1 in the frequency of symbol i. Coupling the randomness of the Yj ’s on these two datasets, the only case in which the output differs is when Yi is such that the value of |Ni + Yi − mqi | lies on opposite sides of the threshold for the two datasets. Since Ni differs by 1 in the two datasets, and the probability mass assigned by the PDF of Yi to any interval of length 1 is at most c2 ε/4, the probability that the outputs differ is at most c2 ε/4. Therefore, this step is (0, c2 ε/4)-differentially private. We next consider the value of Z for two neighboring datasets D and D0 , where D0 has one fewer occurrence of symbol i. We only consider the case where we have not already returned in line 11, as otherwise the value of Z is irrelevant for determining the output of the algorithm. Z(D) − Z(D0 )   (Ni − mqi )2 − Ni (Ni − 1 − mqi )2 − (Ni − 1) 1 − = mα2 mqi mqi   2 2 1 (Ni − mqi ) − Ni (Ni − mqi ) − 2(Ni − mqi ) + 1 − Ni + 1 = − mα2 mqi mqi 2(Ni − mqi − 1) . = m2 α2 qi Since we did not return in line 11,   n p o 1 4 log + max 4 mq log n, log n |Ni − mqi | ≤ i c2 ε 1 − (1 − c2 )1/n n p o 4 log(n/c2 ) ≤ + max 4 mqi log n, log n c2 ε This implies that 2|Ni − mqi − 1| m2 α 2 qi   p 2 6 log(n/c2 ) ≤ 2 2 + 4 mqi log n . m α qi c2 ε |Z(D) − Z(D0 )| = We will enforce that each of these terms are at most c2 ε/8. s p n log(n/c2 ) 12 log(n/c2 ) c2 ε 96 ≤ ⇒m≥ m2 α2 qi c2 ε 8 c22 c1 α1.5 ε √  2/3 8 log n c2 ε 64 (n log n)1/3 ≤ ⇒ m ≥ √ √ m1.5 α2 qi 8 c2 c1 α5/3 ε2/3 9 Since both terms are at most c2 ε/8, this step is (0, c2 ε/4)-differentially private. Combining with the previous step gives the desired (0, c2 ε/2)-differential privacy, and thus (as argued at the beginning of the privacy section of this proof) ε-pure differential privacy. 6 Experiments We performed an empirical evaluation of our algorithm, Priv’IT, on synthetic datasets. All experiments were performed on a laptop computer with a 2.6 GHz Intel Core i7-6700HQ CPU and 8 GB of RAM. Significant discussion is required to provide a full comparison with prior work in this area, since performance of the algorithms varies depending on the regime. We compared our algorithm with two recent algorithms for differentially private hypothesis testing: 1. The Monte Carlo Goodness of fit test with Laplace noise from [GLRV16], MCGOF; 2. The projected Goodness of Fit test from [KR17], zCDP-GOF. We note that we implemented a modified version of Priv’IT, which differs from Algorithm 1 in lines 14 to 21. In particular, we instead consider a statistic Z= X (Ni − mqi )2 − Ni mqi i∈A . We add Laplace noise to Z, with scale parameter Θ(∆/ε), where ∆ is the sensitivity of Z, which guarantees (ε/2, 0)-differential privacy. Then, similar to the other algorithms, we choose a threshold for this noised statistic such that we have the desired type I error. This algorithm can be analyzed to provide identical theoretical guarantees as Algorithm 1, but with the practical advantage that there are fewer parameters to tune. To begin our experimental evaluation, we started with uniformity testing. Our experimental setup was as follows. The algorithms were provided q as the uniform distribution over [n]. The algorithms were also provided with samples from some distribution p. This (unknown) p was q for the case p = q, or a distribution which we call the “Paninski construction” for the case dTV (p, q) ≥ α. The Paninski construction is a distribution where half the elements of the support have mass (1 + α)/n and half have mass (1 − α)/n. We use this name for the construction √ as [Pan08] showed that this example is one of the hardest to distinguish from uniform: one requires Ω( n/α2 ) samples to (non-privately) distinguish a random permutation of this construction from the uniform distribution. We fixed parameters ε = 0.1 and α = 0.1. In addition, recall that Proposition 1 implies that pure differential privacy (the privacy guaranteed by Priv’IT) is stronger than zCDP (the privacy guaranteed by zCDP-GOF). In particular, our guarantee of ε-pure differential privacy implies ε2 /2-zCDP. As a result, we ran zCDP-GOF with a privacy parameter of 0.005-zCDP, which is equivalent to the amount of zCDP our algorithm provides. Our experiments were conducted on a number of different support sizes n, ranging from 10 to 10600. For each n, we ran the testing algorithms with increasing sample sizes m in order to discover the minimum sample size when the type I and type II errors were both empirically below 1/3. To determine these empirical error rates, we ran all algorithms 1000 times for each n and m, and recorded the fraction of the time each algorithm was correct. As the other algorithms take a parameter βI as a target type I error, we input 1/3 as this parameter. The results of our first test are provided in Figure 1. The x-axis indicates the support size, and the y-axis indicates the minimum number of samples required. We plot three lines, which demonstrate the empirical number of samples required to obtain 1/3 type I and type II error for the different algorithms. We can see that in this case, zCDP-GOF is the most statistically efficient, followed by MCGOF and Priv’IT. To explain this difference in statistical efficiency, we note that the theoretical guarantees of Priv’IT imply that it performs well even when data is sparsely sampled. More precisely, one of the benefits of our tester is that it can reduce the variance induced by elements whose expected number of occurrences is less than 1. Since none of these testers reach this regime (i.e., even zCDP-GOF at n = 10000 expects to see each element 10 times), we do not reap the benefits of Priv’IT. Ideally, we would run these algorithms on the uniform distribution at sufficiently large support sizes. However, since this is prohibitively expensive to do 10 Uniformity Testing Priv’IT zCDP-GOF MCGOF 250000 Sample Complexity (m) 200000 150000 100000 50000 0 0 2000 4000 6000 Support Size (n) 8000 10000 Figure 1: The sample complexities of Priv’IT, MCGOF, and zCDP-GOF for uniformity testing with thousands of repetitions (for any of these methods), we instead demonstrate the advantages of our tester on a different distribution. Our second test is conducted with q being a 2-histogram1 , where all but a vanishing fraction of the probability mass is concentrated on a small, constant fraction of the support2 . This serves as our proxy for a very large support, since now we will have elements which have a sub-constant expected number of occurrences. The algorithms are provided with samples from a distribution p, which is either q or a similar Paninski construction as before, where the total variation distance from q is placed on the support elements containing non-negligible mass. We ran the test on support sizes n ranging from 10 to 6800. All other parameters are the same as in the previous test. The results of our second test are provided in Figure 2. In this case, we compare Priv’IT and zCDP-GOF, and note that our test is slightly better for all support sizes n, though the difference can be pronounced or diminished depending on the construction of the distribution q. We found that MCGOF was incredibly inefficient on this construction – even for n = 400 it required 130000 samples, which is a factor of 10 worse than zCDP-GOF on a support of size n = 6800. To explain this phenomenon, we can inspect the contribution of a single domain element i to their statistic: (Ni + Yi − mqi )2 . mqi Y2 In the case where mqi  1 and p = q, this is approximately equal to mqi i . The standard deviation of this term will be of the order mq1i ε2 , which can be made arbitrarily large as mqi → 0. While zCDP-GOF may naively seem susceptible to this same pitfall, their projection method appears to elegantly avoid it. As a final test, we note that zCDP-GOF guarantees zCDP, while Priv’IT guarantees (vanilla) differen2 tial privacy. In our previous tests, our guarantee was ε-differential privacy, while theirs was ε2 -zCDP: by Proposition 1, our guarantees imply theirs. In the third test, we revisit uniformity testing, but when their 2 guarantees imply ours. More specifically, again with ε = 0.1, we ran zCDP-GOF with the guarantee of ε2 p 2 zCDP and Priv’IT with the guarantee of ( ε2 + ε 2 log(1/δ), δ) for various δ > 0. We note that δ is often thought in theory to be “cryptographically small” (such as 2−100 ), but we compare with a wide range of δ, both large and small: δ = 1/et for t ∈ {1, 2, 4, 8, 16}. This test was conducted on support sizes n ranging from 10 to 6000. The results of our third test are provided in Figure 3. We found that, for all δ tested, Priv’IT required fewer samples than zCDP-GOF. This is unsurprising for δ very large and small, since the differential privacy guarantees become very easy to satisfy, but we found it to be true for even “moderate” values of δ. This 1 A k-histogram is a distribution where the domain can be partitioned into k intervals such that the distribution is uniform over each interval. 2 In particular, in Figure 3, n/200 support elements contained 1 − 10/n probability mass, but similar trends hold with modifications of these parameters. 11 Identity Testing on a 2-Histogram 14000 Priv’IT zCDP-GOF 12000 Sample Complexity (m) 10000 8000 6000 4000 2000 0 0 1000 2000 3000 4000 Support Size (n) 5000 6000 7000 Figure 2: The sample complexities of Priv’IT and zCDP-GOF for identity testing on a 2-histogram Uniformity Testing, Revisited zCDP-GOF Priv’IT (δ = 1/e) 80000 Priv’IT (δ = 1/e2 ) Priv’IT (δ = 1/e4 ) Priv’IT (δ = 1/e8 ) Sample Complexity (m) 60000 Priv’IT (δ = 1/e16 ) 40000 20000 0 0 1000 2000 3000 Support Size (n) 4000 5000 6000 Figure 3: The sample complexities of Priv’IT and zCDP-GOF for uniformity testing, with approximate differential privacy implies that if an analyst is satisfied with approximate differential privacy, she might be better off using Priv’IT, rather than an algorithm which guarantees zCDP. While the main focus of our evaluation was statistical in nature, we will note that Priv’IT was more efficient in runtime than our implementation of MCGOF, and more efficient in memory usage than our implementation of zCDP-GOF. The former point was observed by noting that, in the same amount of time, Priv’IT was able to reach a trial corresponding to a support size of 20000, while MCGOF was only able to reach 10000. The latter point was observed by noting that zCDP-GOF ran out of memory at a support size of 11800. This is likely because zCDP-GOF requires matrix computations on a matrix of size O(n2 ). It is plausible that all of these implementations could be made more time and memory efficient, but we found our implementations to be sufficient for the sake of our comparison. Acknowledgments The authors would like to thank Jon Ullman for helpful discussions in the early stages of this work. The authors were supported by NSF CCF-1551875, CCF-1617730, CCF-1650733, and ONR N00014-12-1-0999. 12 References [AA01] Dakshi Agrawal and Charu C. Aggarwal. On the design and quantification of privacy preserving data mining algorithms. In Proceedings of the 20th ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, PODS ’01, pages 247–255, New York, NY, USA, 2001. ACM. [ADK15] Jayadev Acharya, Constantinos Daskalakis, and Gautam Kamath. Optimal testing for properties of distributions. In Advances in Neural Information Processing Systems 28, NIPS ’15, pages 3577–3598. Curran Associates, Inc., 2015. [Agr12] Alan Agresti. Categorical Data Analysis. Wiley, 2012. [AW89] Nabil R. Adam and John C. Worthmann. Security-control methods for statistical databases: A comparative study. ACM Computing Surveys (CSUR), 21(4):515–556, 1989. [BFF+ 01] Tugkan Batu, Eldar Fischer, Lance Fortnow, Ravi Kumar, Ronitt Rubinfeld, and Patrick White. Testing random variables for independence and identity. In Proceedings of the 42nd Annual IEEE Symposium on Foundations of Computer Science, FOCS ’01, pages 442–451, Washington, DC, USA, 2001. IEEE Computer Society. [BS16] Mark Bun and Thomas Steinke. Concentrated differential privacy: Simplifications, extensions, and lower bounds. In Proceedings of the 14th Conference on Theory of Cryptography, TCC ’16-B, pages 635–658, Berlin, Heidelberg, 2016. Springer. [Can15] Clément L. Canonne. A survey on distribution testing: Your data is big. but is it blue? Electronic Colloquium on Computational Complexity (ECCC), 22(63), 2015. [Can17] Clément L. Canonne. A short note on Poisson tail bounds. http://www.cs.columbia.edu/ ~ccanonne/files/misc/2017-poissonconcentration.pdf, 2017. [CDGR16] Clément L. Canonne, Ilias Diakonikolas, Themis Gouleakis, and Ronitt Rubinfeld. Testing shape restrictions of discrete distributions. In Proceedings of the 33rd Symposium on Theoretical Aspects of Computer Science, STACS ’16, pages 25:1–25:14, 2016. [Dal77] Tore Dalenius. Towards a methodology for statistical disclosure control. Statistisk Tidskrift, 15:429–444, 1977. [DDK16] Constantinos Daskalakis, Nishanth Dikkala, and Gautam Kamath. Testing Ising models. arXiv preprint arXiv:1612.03147, 2016. [DHS15] Ilias Diakonikolas, Moritz Hardt, and Ludwig Schmidt. Differentially private learning of structured discrete distributions. In Advances in Neural Information Processing Systems 28, NIPS ’15, pages 2566–2574. Curran Associates, Inc., 2015. [DK16] Ilias Diakonikolas and Daniel M. Kane. A new approach for testing properties of discrete distributions. In Proceedings of the 57th Annual IEEE Symposium on Foundations of Computer Science, FOCS ’16, pages 685–694, Washington, DC, USA, 2016. IEEE Computer Society. [DMNS06] Cynthia Dwork, Frank McSherry, Kobbi Nissim, and Adam Smith. Calibrating noise to sensitivity in private data analysis. In Proceedings of the 3rd Conference on Theory of Cryptography, TCC ’06, pages 265–284, Berlin, Heidelberg, 2006. Springer. [DN03] Irit Dinur and Kobbi Nissim. Revealing information while preserving privacy. In Proceedings of the 22nd ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, PODS ’03, pages 202–210, New York, NY, USA, 2003. ACM. [DR14] Cynthia Dwork and Aaron Roth. The Algorithmic Foundations of Differential Privacy. Now Publishers, Inc., 2014. 13 [Dwo08] Cynthia Dwork. Differential privacy: A survey of results. In Proceedings of the 5th International Conference on Theory and Applications of Models of Computation, TAMC ’08, pages 1–19, Berlin, Heidelberg, 2008. Springer. [Fis35] Ronald A. Fisher. The Design of Experiments. Macmillan, 1935. [GLRV16] Marco Gaboardi, Hyun-Woo Lim, Ryan M. Rogers, and Salil P. Vadhan. Differentially private chi-squared hypothesis testing: Goodness of fit and independence testing. In Proceedings of the 33rd International Conference on Machine Learning, ICML ’16, pages 1395–1403. JMLR, Inc., 2016. [HSR+ 08] Nils Homer, Szabolcs Szelinger, Margot Redman, David Duggan, Waibhav Tembe, Jill Muehling, John V. Pearson, Dietrich A. Stephan, Stanley F. Nelson, and David W. Craig. Resolving individuals contributing trace amounts of dna to highly complex mixtures using high-density snp genotyping microarrays. PLoS Genetics, 4(8):1–9, 2008. [JS13] Aaron Johnson and Vitaly Shmatikov. Privacy-preserving data exploration in genome-wide association studies. In Proceedings of the 19th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD ’13, pages 1079–1087, New York, NY, USA, 2013. ACM. [Kla00] Bernhard Klar. Bounds on tail probabilities of discrete distributions. Probability in the Engineering and Informational Sciences, 14(02):161–171, 2000. [KR17] Daniel Kifer and Ryan M. Rogers. A new class of private chi-square tests. In Proceedings of the 20th International Conference on Artificial Intelligence and Statistics, AISTATS ’17, pages 991–1000. JMLR, Inc., 2017. [KSF17] Kazuya Kakizaki, Jun Sakuma, and Kazuto Fukuchi. Differentially private chi-squared test by unit circle mechanism. In Proceedings of the 34th International Conference on Machine Learning, ICML ’17. JMLR, Inc., 2017. [LRR13] Reut Levi, Dana Ron, and Ronitt Rubinfeld. Testing properties of collections of distributions. Theory of Computing, 9(8):295–347, 2013. [Pan08] Liam Paninski. A coincidence-based test for uniformity given very sparsely sampled discrete data. IEEE Transactions on Information Theory, 54(10):4750–4755, 2008. [Pea00] Karl Pearson. On the criterion that a given system of deviations from the probable in the case of a correlated system of variables is such that it can be reasonably supposed to have arisen from random sampling. Philosophical Magazine Series 5, 50(302):157–175, 1900. [Pol15] David Pollard. A few good inequalities. http://www.stat.yale.edu/~pollard/Books/Mini/ Basic.pdf, 2015. [RS81] Jon N.K. Rao and Alastair J. Scott. The analysis of categorical data from complex sample surveys: Chi-squared tests for goodness of fit and independence in two-way tables. Journal of the Americal Statistical Association, 76(374):221–230, 1981. [SSB16] Sean Simmons, Cenk Sahinalp, and Bonnie Berger. Enabling privacy-preserving gwass in heterogeneous human populations. Cell Systems, 3(1):54–61, 2016. [TAW10] Vincent Y.F. Tan, Animashree Anandkumar, and Alan S. Willsky. Error exponents for composite hypothesis testing of Markov forest distributions. In Proceedings of the 2010 IEEE International Symposium on Information Theory, ISIT ’10, pages 1613–1617, Washington, DC, USA, 2010. IEEE Computer Society. [USF13] Caroline Uhler, Aleksandra Slavković, and Stephen E. Fienberg. Privacy-preserving data sharing for genome-wide association studies. The Journal of Privacy and Confidentiality, 5(1):137–166, 2013. 14 [VV14] Gregory Valiant and Paul Valiant. An automatic inequality prover and instance optimal identity testing. In Proceedings of the 55th Annual IEEE Symposium on Foundations of Computer Science, FOCS ’14, pages 51–60, Washington, DC, USA, 2014. IEEE Computer Society. [WLK15] Yue Wang, Jaewoo Lee, and Daniel Kifer. Differentially private hypothesis testing, revisited. arXiv preprint arXiv:1511.03376, 2015. [YFSU14] Fei Yu, Stephen E. Fienberg, Aleksandra B. Slavković, and Caroline Uhler. Scalable privacypreserving data sharing methodology for genome-wide association studies. Journal of Biomedical Informatics, 50:133–141, 2014. 15
8cs.DS
Under review as a conference paper at ICLR 2016 I DENTIFYING L EARNING THE A BSORPTION B UMP WITH D EEP arXiv:1511.05607v2 [cs.CV] 20 Nov 2015 Min Li, Sudeep Gaddam, Xiaolin Li Department of Electrical and Computer Engineering University of Florida Gainesville, FL 32611, USA {minli, sudeepgaddam}@ufl.edu, [email protected] Yinan Zhao, Jingzhe Ma, Jian Ge Department of Astronomy University of Florida Gainesville, FL 32611, USA {yinanzhao, jingzhema}@ufl.edu, [email protected] A BSTRACT The pervasive interstellar dust grains provide significant insights to understand the formation and evolution of the stars, planetary systems, and the galaxies, and may harbor the building blocks of life. One of the most effective way to analyze the dust is via their interaction with the light from background sources. The observed extinction curves and spectral features carry the size and composition information of dust. The broad absorption bump at 2175 Å is the most prominent feature in the extinction curves. Traditionally, statistical methods are applied to detect the existence of the absorption bump. These methods require heavy preprocessing and the co-existence of other reference features to alleviate the influence from the noises. In this paper, we apply Deep Learning techniques to detect the broad absorption bump. We demonstrate the key steps for training the selected models and their results. The success of Deep Learning based method inspires us to generalize a common methodology for broader science discovery problems. We present our on-going work to build the DeepDis system for such kind of applications. 1 I NTRODUCTION The pervasive interstellar dust contains footprints of how the cosmos has been evolving. Dust grains come from condensation of heavy elements produced by stars. They are considered the primary reaction sites for molecules to form and essentially the source for all the H2 in the interstellar medium (Gould & Salpeter (1963); Hollenbach & Salpeter (1971)). Dust grains also play an important role in controlling the gas-phase metal abundances and the thermodynamic evolution of the interstellar medium. Besides, coagulation of interstellar dust grains in a protostellar disk, along with their catalyzed complex organic molecules, eventually leads to planets. Dust is thought to harbor the secrets of planetary formation, and even life. Research on dust and gas is conducted by analyzing the reddening and extinction effects on the spectra of background light sources and re-radiated emission. In the Local Universe, it is feasible to compare stellar spectra and explore the extinction curves to investigate the dust grains. However, more luminous background light sources, such as quasars, are necessary to probe the dust and gas ingredients in the galaxies at larger distances. Among the research topics on cosmic dust grains, the 2175 Å broad absorption bump 1 stands out with significant values. Although the precise characteristics have not yet been established, the 2175 Å broad absorption bump is believed to be tightly bounded with some types of aromatic carbonaceous materials (Draine (2003); Li & Greenberg (2003)). The most promising carriers of the bump 1 We use the 2175 Å broad absorption bump and absorption bump for short in the rest of this paper. 1 Under review as a conference paper at ICLR 2016 are the Polycyclic Aromatic Hydrocarbon (PAH) molecules. PAHs are recognized as the most abundant organic molecules in our Milk Way and other neighboring galaxies (Peeters et al. (2003)), and are believed to be the building blocks of organic life (Bernstein et al. (2002); Caro et al. (2002)). The traditional way of discovering the absorption bump mainly depends on statistic techniques (Jiang et al. (2011)). It generally involves three steps. First, a composite quasar spectrum is constructed using median combining (Jiang et al. (2010a;b)). The composite spectrum is then reddened and used to fit every spectrum from the candidate absorption bump spectra with a parameterized absorption profile. Finally, by applying constrains on peak position, bump width and bump height, a large portion of spectra without bump features are filtered out. In order to further exclude the false positives caused by some noises, a simulation technique (Jiang et al. (2010a;b)) is applied to determine the detection significance. Among the steps, curve fitting occupies considerable amount of time. In order to convolve the absorption bump with the composite spectrum, extra information is needed to determine the absorption redshift. This significantly constrains the available observations due to the lack of this extra information in some cases. While the composite quasar spectrum could potentially be reused for other related computations, the fitting procedure evolves iterative error minimization to get the best bump profile using curve fitting method, and is required for each and every new observation. The fitting is restricted to relatively smooth continuum of the quasar spectrum. However, the complicated types of emission and absorption in the candidate spectra could potentially disturb the fitting process, reducing the effectiveness of the method. All these issues are tightly coupled with the method itself, and cannot be easily resolved. In this paper, we propose to apply a Deep Learning based method to detect the absorption bump and try to alleviate the aforementioned issues. Deep Learning is recently recognized with its ability to automatically extract high level features and accurately recognize or classify the target objects (Hinton & Salakhutdinov (2006); LeCun et al. (2015)). Deep Learning is most effective when the model is trained with sufficient data and the features are complex. For the absorption bump application, a normal observed spectrum consists of over 4,000 raw features. Each of them is a flux value at a certain wavelength. Due to the complex cosmos environment, the relation space among the features could be complicated. We also observe that in the traditional method, the curving fitting process is actually generating various spectra with bumps. These two facts make Deep Learning model a natural fit for such an application. For the rest of this paper, we present the details of our Deep Learning based method for the absorption bump detection. Specifically, we first give more background information about the problem and the traditional method. We then show how we generate the raw training and testing data sets. Next, we present how we transform the raw data into different formats for models including fully connected neural networks and two convolutional neural networks. The details and the results are also reported. Finally, we present a generalization from our methodology to simplify and improve the efficiency for similar astronomy problems, and also resembling problems in other science fields. We discuss the workflow and the design details of our ongoing work, the DeepDis system, which aims to provide such services. 2 T RADITIONAL METHOD FOR DISCOVERING ABSORPTION BUMP Previous research (Fitzpatrick & Massa (1990)) showed that the extinction curve and the variation of the intrinsic spectral slopes of a quasar can be represented by a parameterized linear component. A Drude component can be added to approximate the possible absorption bump. Overall, the representation for an extinction spectrum with an absorption bump can be expressed as: A(λ) = c1 + c2 x + c3 D(x, x0 , γ) (1) , where λ is the wavelength, and x = λ−1 . The component D(x, x0 , γ) is a Drude profile, and its definition is: x2 D(x, x0 , γ) = (2) (x2 − + x2 γ 2 , where x0 and γ is the peak position and full width at half maximum (FWHM) of the Drude profile, respectively. The strength can be measured by the area of the bump, i.e., Abump = πc3 /(2γ). x20 )2 2 Under review as a conference paper at ICLR 2016 Rest Wavelength in Absorber Frame 2000 1500 Flux (10-17 erg s-1 cm-2 -1 ) SDSS J1211+0833 Best-fit model with bump Reddened by linear component only 2500 Bump 3000 MgII 10 1 4000 5000 6000 7000 Observed Wavelength 8000 9000 Figure 1: Absorption Bump Example The most popular method for discovering the 2175 Å absorption bump is rule-based filtering after fitting. The main idea is to get the best fitted parameters for each observed quasar spectrum, following Equation 1 and Equation 2. The whole procedure consists of three major steps. First, obtaining the median quasar composite spectrum. The basic assumption is that the quasars under similar condition will have similar observed spectrum. A median quasar composite spectrum is regarded as the base spectrum. It is created by combining the spectra from a set of observed quasars at their rest frame (e.g., Fitzpatrick & Massa (1990); Schneider et al. (2010)). Second, curve fitting based on method such as Chi-Square Testing. The median quasar spectrum is first reddened to the quasar’s emission redshift, and an absorption bump profile is convolved at the absorption redshift. The absorption redshift is obtained by referring to some unique absorption lines, such as the Mg II absorption lines. The parameters in Equation 1 and Equation 2 are selected to minimize the fitting error. With the parameters, the last step is conducted by applying a set of rules to filter out low confidence candidates. One fitting example is shown in Figure 1, where the black curve is the observed spectrum, the green curve is the reddened normal extinction spectrum continuum, and the red line is the continuum with absorption bump. There are a couple of issues in this method. First, hard dependency on Mg II absorption lines. The absorption redshift is obtained by referring to the Mg II absorption lines. The Mg II absorption lines are identified using some extra step, and is itself a research topic (Quider et al. (2011); Zhu & Ménard (2013)). However, not all observations contain this absorption feature, due to different emission and absorption redshift ranges. Second, the error minimizing curve fitting method is not effective in some cases, e.g., broader Fe emission. This sometimes requires human identification. Third, the fitting procedure for each observation is time consuming. Multiple iterations of error minimizing steps are required to produce the best profile. 3 I DENTIFYING THE A BSORPTION B UMP WITH D EEP L EARNING For the several aforementioned drawbacks of the traditional method, we propose a Deep Learning based method that could alleviate these issues and provide more flexible usage. Specifically, the proposed method exhibits the following merits. • Large data set empowers accurate representation learning. The curve fitting step in the traditional method is repeatedly generating training samples. By carefully designing the generation, we are able to train an accurate model for the absorption bump detection. • No hard dependency on Mg II absorption lines. When generating the samples, we are in control of selecting the emission and absorption redshifts. After the model is trained, no extra information is needed for new observations. • Easy to use and share. With a trained model, each prediction on newly added observations is just one feed forward process. Trained models could also be easily shared among researchers. Beyond trained models, simulation parameters and simulated data sets are all sharing-friendly. 3 Under review as a conference paper at ICLR 2016 • Easy to extend. Extensions of already trained models happen at two levels. First, additional training samples could be included to cover more cases. Second, multiple targets could also be added based on the same feature set. These extensions could be achieved conveniently by fine tuning of a trained model. In order to validate the feasibility, we present our work on applying Deep Learning based method for the absorption bump detection in the following subsections. Specifically, we show the details of training data generation, and our experience on model selection and data transformation. 3.1 R AW DATA G ENERATION We applied two methods to generate the data set. The first method follows the corresponding part from the curve fitting procedure. We refer to Berk et al. (2001) and obtain the SDSS data release 7 composite quasar spectrum as the intrinsic spectrum. We then change the emission and absorption redshifts and add the absorption bump profile according to Equation 2. We choose a typical bump profile: x0 = 4.59, γ = 1.0 and Abump = 2.0. In order to increase the diversity and closely simulate the real-world observations, we apply the second method. We selected a subset of the spectra from the SDSS data release 7 according to the Mg II catalog from Zhu & Ménard (2013). We follow the fitting method described in Jiang et al. (2010a; 2011), and convolve them with the absorption bump profile same as the above one. These generated samples are extremely close to real-world cases. Note that we refer to existing Mg II catalog to generate data. However, no dependency is required for predicting with new observations. A total of 30K samples are generated with the two methods described above. Half of them contains the absorption bump and half does not. Each generated sample is stored in a file following the <wavelength, flux> pattern. There are around 4600 pairs in each file. We divide the data into two parts, 22K as the training data set and 8K as the testing data set. 3.2 C ASE O NE : F ULLY C ONNECTED N EURAL N ETWORK Table 1: Configurations and Test Results for Fully Connected Neural Network One-Layer neurons accuracy 10000 71.603% 1000 71.677% 600 71.727% Four-Layer neurons accuracy 800 95.826% 600 96.460% 400 95.603% Two-Layer neurons accuracy 800 96.658% 600 96.485% 400 96.758% Five-Layer neurons accuracy 800 96.298% 600 96.236% 400 96.124% Three-Layer neurons accuracy 800 95.540% 600 95.888% 400 96.211% The first straightforward choice for the model is the fully connected neural network. Its effectiveness in capturing the non-linearity relationships among the input features has been tested through the past decades. In order to feed the training data into the fully connected neural network, we extracted the flux value as a vector, and use this vector to train the model. We perform this data transformation based on the observation that the absorption bump is not related to the absolute wavelength value due to redshifts, but rather the neighboring flux value relationship. In addition, the wavelength interval between two consecutive wavelength-flux pair is relative stable in the data (both simulated and realworld). Due to the data collection mechanism, the number of pairs in one sample could be slightly different. We padded the samples with zeros to round up to a total of 4761 flux values. We changed the configurations of the fully connected neural network and vary the number of hidden layers and the number of neurons per layer. The output layer is softmax with two classes, with or without absorption bump. The initial learning rate is set to 0.01 and step decreasing police is applied. The testing results after converged training are shown in Table 1. The performance for one hidden 4 Under review as a conference paper at ICLR 2016 layer is significantly worse than multiple-hidden-layer neural networks, due to its incapability to capture the non-linearity. The best performance is observed in a two-hidden-layer network with 400 neurons per layer. Its total number of trainable parameters is around 2 million. 3.3 C ASE T WO : I MAGE AND C ONVOLUTIONAL N EURAL N ETWORK A quasar spectrum is plotted as the black curve in Figure 1 when inspected by researchers. This inspires us to transform raw data into images. We first plot all the training and testing samples. The coverage span for the wavelength is 8000 Å and around 50 for the flux. The raw image drawn can be as large as hundreds of KB. The images are down scaled to 256*256 gray images and used for training and testing. Convolutional Neural Network (CNN) (LeCun & Bengio (1995)) recently has proved its effectiveness in image related recognition and classification, due to its capability of parameter sharing and capturing localized patterns. We adapted two popular CNN based models, the AlexNet (Krizhevsky et al. (2012)) and the GoogLeNet (Szegedy et al. (2014)). The results we get for modified AlexNet is 98.52% and for GoogLeNet is 98.55%. (b) (d) (c) (e) 1 (a) Figure 2: Visualization for AlexNet. (a) shows the filters for the first convolutional layer. (b) and (d) plot two test images with absorption bump, marked with red dashed circle. (c) and (e) are the last convolutional layer feature maps for the two test images. The maps with effective activation are marked with red dashed rectangles. Better viewed in electronic version. In order to understand the learned representation, we select the trained AlexNet model and visualize the first convolutional layer filters and also the last convolutional layer feature maps, as shown in Figure 2. The first convolutional layer filters are typical edge detection filters. The effective activation area in the feature maps (Figure 2c and 2e, marked with red dash rectangles) corresponds to the absorption bump locations in the test images. This proves that the representation is sensitive to the absorption bump. We also reconstructed the input images from a randomly generated image with respect to the given classes (with or without bump) using the gradient ascend method. The reconstructed images are shown in Figure3. The image for with bump clearly shows that the model is sensitive to the absorption bump in the input spectrum. 3.4 C ASE T HREE : M ATRIX AND C ONVOLUTIONAL N EURAL N ETWORK The 256*256 image plus CNN model improves the accuracy. However, the input image is too sparse considering the large white background. In order to condense the input as well as empower the CNN model, we perform another data transformation. This transformation is also based on the assumption used for fully connected neural network. Different from the previous one, where the input is a 1D vector, we pad and fold the vector into a 69*69 matrix. These folded matrices are fed into the CNN models. This transformation makes it possible for filters in the convolutional layer to capture the localized information with neighboring flux values. We use different configurations of the CNN and 5 Under review as a conference paper at ICLR 2016 (a) Without Bump (b) With Bump Figure 3: Reconstructed Input Image for with and without bump post the best results we find in Table 2. We fix the CNN models with two fully connected layers after the convolutional layers, and alter the number of convolutional layers, the number of filters in each convolutional layer, and the kernel size. The best model we get achieves 99.404% test accuracy, and is a model with 4 convolutional layers, each with 50 filters, and the filter size is 5*5, 3*3, 3*3, 3*3 for the convolutional layers, respectively. The trainable parameters is around 900,000, instead of several or tens of millions in the previous two cases. Table 2: Configurations and results for CNN on 69*69 Matrix Configurations Conv Layers 2, 3, 4 Filters 40, 50, 60, 70 Kernel Size 7*7, 5*5, 3*3 3.5 Best Results CNN2 98.696% CNN3 99.155% CNN4 99.404% D ISCUSSION In previous sections, we present three kinds of models and the corresponding data transformations. We select some of the trained models and plot their ROC curves, shown in Figure 4, and the corresponding AUCs are given in Table 3. The ROC curves for the selected models are consistent with the previously reported testing accuracy. For this absorption bump detection application, we could improve the sensitivity of the trained models by slightly decreasing the decision threshold. This could result in slightly more false positive signals, but is more confident in capturing the potential absorption bump events we are interested in. true positive rate 1.0 Table 3: AUC of the ROC curves 0.9 alexnet googlenet convnet2 convnet3 convnet4_1 convnet4_2 convnet4_3 fc2 0.8 0.7 0.6 0.0 0.1 0.2 0.3 false positive rate 0.4 Figure 4: ROC curves for various models 6 Type AlexNet GoogLeNet ConvNet2 ConvNet3 ConvNet4-1 ConvNet4-2 ConvNet4-3 FC2 AUC 0.99915 0.99898 0.99802 0.99873 0.99943 0.99947 0.99875 0.99455 Under review as a conference paper at ICLR 2016 Based on our experience with absorption bump detection application, there are a couple of things worth notice for data preparation and model selection. When generating raw data, in order to eliminate the bias in the trained model, carefully designed criteria should be followed to cover the cases as much as possible. Another necessary step before feeding the data into training is shuffling. The raw data are generated in a systematical manner. Using non-shuffled data, localized characteristics in the training batches could impede the convergence of the model. It could also cause diverged performance on training and testing data set. We have experienced these problems at early stage. The accuracy for the best model we get from non-shuffled data is as low as 88%. From the presented details, we believe that Deep Learning based method for absorption bump detection is effective. With a trained model, Mg II information is not required to filter new observations for candidates. The specifications for data generation and model configuration, and the trained model are easy to share and reuse. We observe from our experience that the data generation could also be modeled into a MapReduce-like programming model, significantly relieving users from heavy programming, but still benefiting from the power of distributed computing. In the following section, we present our generalization and current work on providing such a Deep Learning based framework for similar problems. 4 4.1 G ENERALIZATION : B OOSTING S CIENCE D ISCOVERY WITH D EEP L EARNING S CIENCE D ISCOVERY P ROBLEM Similar as the absorption bump detection, a category of problems in other science field involves the detection of a certain phenomenon among the background events. We call them the Science Discovery Problem. These discoveries are building blocks for further scientific research. Scientists rely on them to propose ideas, validate hypotheses, and prove theories. A typical science discovery problem consists of two main components, the feature set, F = {fi |0 < i <= N }, and the relation among the features, R. A science discovery problem can be expressed as: D = {F|F ∼ Rtarget (P, C), Rtarget ⊂ R} (3) D is the targeted discoveries, P and C are parameters and constants. F is one event in F. Rtarget defines the relations among the features that depict the targeted phenomenon. Rtarget and its complementary set Rctarget compose R. With the F, R, Rtarget , scientists aim to pick the discoveries out of the observations. The mainstream method to perform the detection is rule-based filtering. The filtering rules are constructed upon raw features or extracted high level features. High level feature extraction can be done by numerically combining raw features, or by some fitting method, similar as the absorption bump application. While scientists are concerned with the accuracy of the approximation theories and continue improving their effectiveness, there are some issues with such methods. Feature Engineering. Feature engineering is a time-consuming procedure. It also depends on a lot of experience and numerous trial-and-error experiments. The complex and mysterious nature of the science discovery problems also increase the difficulty of extracting meaningful high level features to effectively capture the target event characteristics. Even with a carefully developed feature extraction technique with excellent theoretical explanation, real-world data could also offset the expected effectiveness considering the existence of various noise and uncertainty during the data collection phase. Extra Dependency. In some science discovery cases, in order to get a better approximated representation for the targeted event, extra effort is required to obtain additional information. For example, the approximated absorption bump representation requires emission and absorption redshifts. While the emission redshift is included in the public data set, the absorption redshift is calculated based on Mg II absorption lines. Similar requirements occur in other science fields. Two potential drawbacks in such scenarios impede the science exploration. First, these extra dependencies incur considerable amount of time and efforts. Second, they may not co-exist with the target discovery, thus, restricting the exploration scope due to incomplete data sets. 7 Under review as a conference paper at ICLR 2016 Sharing and Collaboration. Information exchange and collaboration are two significant factors to speed up the science discoveries. The theories and findings are well shared by researchers, but heavy data processing are required to generate results with existing methods for each new observation. Even though distributed computing technologies are pervasive and performance-ascendant, crossdiscipline knowledge requirement impedes its wide adoption. 4.2 D EEP L EARNING BASED M ETHOD Inspired by the advance and practical effectiveness of Deep Learning, we propose a data-driven, simulation-based method for science discovery problems. The proposed method is rooted in three observations. First, Deep Learning has proven itself with practical success on classification and recognition problems. Second, Deep Learning is more powerful when the relations among features are complicated. This is often the case in science discovery problems. Finally, Deep Learning requires a large amount of training data to be effective. Despite of the fact that real-world data might not be adequate and they are sometimes biased (i.e., the targeted discoveries are normally rare compared with the background events), we observe that it is relatively easy to simulate enough eligible training samples with desired information embedded in. The control over the training data sets ensures us to accurately capture the targeted phenomena. This both solves the biased training issue and satisfies Deep Learning requirement for large-scale training samples. Existing Knowledge , , , 1 Raw Data Set 2 Training Samples 3 Train Model 4 Trained Model Additional Knowledge Raw Data Set 6 Fine Tuning Trained Model Real Data Decision 5 Training Samples Model Figure 5: Workflow for DeepDis. The mark on the top left corner means able-to-share. The workflow of the proposed method is shown in Figure 5. There are three main steps: data preparation, model training, and model service. During data preparation, two operations are performed: data generation (1) and data transformation (2). The approximation theory Rtarget and Rctarget , the constant variables C, and a set of range parameters P are used to generate enough labeled raw data. The raw data can be represented by a series of key-value pairs. The data transformation phase maps the raw data sets into desired formats for training, e.g., images or multi-dimensional matrix. The transformed data sets are used in model training step to train a pre-defined model (3). After the converge criteria are satisfied, the trained model will be published and ready for use (4). In model service step, the trained model is used to give decisions for real-world data (5). The real-world data set go through similar transformations as the simulated raw data sets. In science discovery problems, various phenomena could be detected upon the same feature set. This inspires us to introduce the fine tuning and transfer learning techniques into the workflow (6). Specifically, additional data could be generated to further tune an already trained model. By substituting some layers in the previous model and apply the fine tuning using extra data sets, a new model could be trained to identify the new phenomenon. The architecture of the proposed DeepDis system is shown in Figure 6. There are four layers in DeepDis, namely user interface layer, control layer, runtime layer, and compute and storage resource layer. From the beginning of the design, several main considerations are planted in the gene of DeepDis. The first one is flexibility and easy-to-use. The second one is harnessing the power of various computing and storage resources. The third one is sharing. We show how we emphasize on these aspects in the following descriptions. User Interface Layer. Two kinds of information are required from the users. The first part is the data generation function and parameters. Users are requested to implement their own generation functions. The function will take a dictionary of parameters, including constants and range parameters, and output all possible key-value pairs constrained by the ranges. It resembles the flat map function in many programming languages. Data specifications also contains instructions on how to 8 Under review as a conference paper at ICLR 2016 Generation Function Parameter Specs Data Specs Model Specs User Interface DeepDis Controller Data Coordinator Model Coordinator Generation Training Service Coordinator Control Detection Transformation Sharing DeepDis Caffe Runtime Compute & Storage Resources Figure 6: Architecture Overview for DeepDis transform raw data sets into ready-to-process data format. The second part is the model configuration. The specifications are passed to DeepDis by json/prototxt. Only these configurations are required from the users. This makes DeepDis easy-to-use even for scientists with less knowledge about distributed computing or Deep Learning. Control Layer. This layer is responsible for understanding users requests and translate them into computing tasks. Specifically, DeepDis has a controller and three coordinators, Data Coordinator, Model Coordinator and Service Coordinator, to fulfill this. The controller divides the requests into several inter-dependent tasks and use DAG to schedule. The coordinators are responsible for the designated tasks: preparing, dividing, and distributing them to the underlying runtime. This layer also opens pluggable and extensible interfaces for advanced users to provide new data format, transformation functions, etc. Runtime Layer and Compute and Storage Resources Layer. DeepDis integrates state-of-the-art distributed in-memory computing framework, Spark (Zaharia et al. (2012)), and the Caffe (Jia et al. (2014)) Deep Learning toolbox to efficiently execute the data generation and model training tasks. Spark will be extended to incorporate adaptations from the control layer and to collaborate with Caffe for distributed model training. For the Compute and Storage Resources Layer, different types of resources will be utilized to achieve efficient data processing, model training, and sharing. 5 C ONCLUSION In this paper, we presented a Deep Learning based method for detecting the absorption bump. We discussed in detail about how we generated and transformed the training data according to the selected models. For different models, we presented the results. In order to get a sense of what the models have learned, we chose the CNN based AlexNet model and provided the visualizations of filters, feature maps and reconstructed maximum activation input images. The resulted images prove that the model is identifying the absorption bump, rather than any other background noise. With the success in applying Deep Learning based method for the absorption bump application, we generalized the methodology to the broad science discovery problems, where Deep Learning models can be effectively trained upon sufficient amount of data. We also showed our ongoing work in building a specialized system, DeepDis, to support the proposed method. Distributed data processing techniques are used to automatically handle data generation, data transformation, model training and sharing. DeepDis is designed to provide science discovery as a service for researchers without too much knowledge about distributed computing and Deep Learning. With DeepDis, we hope to boost the science discovery process. R EFERENCES Berk, Daniel E Vanden, Richards, Gordon T, Bauer, Amanda, Strauss, Michael A, Schneider, Donald P, Heckman, Timothy M, York, Donald G, Hall, Patrick B, Fan, Xiaohui, Knapp, GR, et al. 9 Under review as a conference paper at ICLR 2016 Composite quasar spectra from the sloan digital sky survey. The Astronomical Journal, 122(2): 549, 2001. Bernstein, Max P, Elsila, Jamie E, Dworkin, Jason P, Sandford, Scott A, Allamandola, Louis J, and Zare, Richard N. Side group addition to the polycyclic aromatic hydrocarbon coronene by ultraviolet photolysis in cosmic ice analogs. The Astrophysical Journal, 576(2):1115, 2002. Caro, GM Munoz, Meierhenrich, UJ, Schutte, WA, Barbier, B, Segovia, A Arcones, Rosenbauer, H, Thiemann, WH-P, Brack, A, and Greenberg, JM. Amino acids from ultraviolet irradiation of interstellar ice analogues. Nature, 416(6879):403–406, 2002. Draine, BT. Interstellar dust grains. Annu. Rev. Astron. Astrophys, 41:241–89, 2003. Fitzpatrick, Edward L and Massa, Derck. An analysis of the shapes of ultraviolet extinction curves. iii-an atlas of ultraviolet extinction curves. The Astrophysical Journal Supplement Series, 72: 163–189, 1990. Gould, Robert J and Salpeter, Edwin E. The interstellar abundance of the hydrogen molecule. i. basic processes. The Astrophysical Journal, 138:393, 1963. Hinton, Geoffrey E and Salakhutdinov, Ruslan R. Reducing the dimensionality of data with neural networks. Science, 313(5786):504–507, 2006. Hollenbach, David and Salpeter, EE. Surface recombination of hydrogen molecules. The Astrophysical Journal, 163:155, 1971. Jia, Yangqing, Shelhamer, Evan, Donahue, Jeff, Karayev, Sergey, Long, Jonathan, Girshick, Ross, Guadarrama, Sergio, and Darrell, Trevor. Caffe: Convolutional architecture for fast feature embedding. In Proceedings of the ACM International Conference on Multimedia, pp. 675–678. ACM, 2014. Jiang, P, Ge, J, Prochaska, JX, Kulkarni, VP, Lu, HL, and Zhou, HY. A Dusty Mg II Absorber Associated with the Quasar SDSS J003545. 13+ 011441.2. The Astrophysical Journal, 720(1): 328, 2010a. Jiang, Peng, Ge, Jian, Prochaska, J Xavier, Wang, Junfeng, Zhou, Hongyan, and Wang, Tinggui. High Dust Depletion in two Intervening Quasar Absorption Line Systems with the 2175 Å Extinction Bump at z˜ 1.4. The Astrophysical Journal, 724(2):1325, 2010b. Jiang, Peng, Ge, Jian, Zhou, Hongyan, Wang, Junxian, and Wang, Tinggui. Toward Detecting the 2175 Å Dust Feature Associated with Strong High-redshift Mg II Absorption Lines. The Astrophysical Journal, 732(2):110, 2011. Krizhevsky, Alex, Sutskever, Ilya, and Hinton, Geoffrey E. Imagenet classification with deep convolutional neural networks. In Advances in Neural Information Processing Systems, pp. 1097–1105, 2012. LeCun, Yann and Bengio, Yoshua. Convolutional networks for images, speech, and time series. The handbook of brain theory and neural networks, 3361(10), 1995. LeCun, Yann, Bengio, Yoshua, and Hinton, Geoffrey. Deep learning. Nature, 521(7553):436–444, 2015. Li, Aigen and Greenberg, J Mayo. In dust we trust: an overview of observations and theories of interstellar dust. In Solid State Astrochemistry, pp. 37–84. Springer, 2003. Peeters, Els, Allamandola, LJ, Hudgins, DM, Hony, S, and Tielens, AGGM. The unidentified infrared features after iso. arXiv preprint astro-ph/0312184, 2003. Quider, Anna M, Nestor, Daniel B, Turnshek, David A, Rao, Sandhya M, Monier, Eric M, Weyant, Anja N, and Busche, Joseph R. The pittsburgh sloan digital sky survey mg ii quasar absorptionline survey catalog. The Astronomical Journal, 141(4):137, 2011. 10 Under review as a conference paper at ICLR 2016 Schneider, Donald P, Richards, Gordon T, Hall, Patrick B, Strauss, Michael A, Anderson, Scott F, Boroson, Todd A, Ross, Nicholas P, Shen, Yue, Brandt, WN, Fan, Xiaohui, et al. The sloan digital sky survey quasar catalog. v. seventh data release. The Astronomical Journal, 139(6):2360, 2010. Szegedy, Christian, Liu, Wei, Jia, Yangqing, Sermanet, Pierre, Reed, Scott, Anguelov, Dragomir, Erhan, Dumitru, Vanhoucke, Vincent, and Rabinovich, Andrew. Going deeper with convolutions. arXiv preprint arXiv:1409.4842, 2014. Zaharia, Matei, Chowdhury, Mosharaf, Das, Tathagata, Dave, Ankur, Ma, Justin, McCauley, Murphy, Franklin, Michael J, Shenker, Scott, and Stoica, Ion. Resilient distributed datasets: A faulttolerant abstraction for in-memory cluster computing. In Proceedings of the 9th USENIX conference on Networked Systems Design and Implementation, pp. 2–2. USENIX Association, 2012. Zhu, Guangtun and Ménard, Brice. The jhu-sdss metal absorption line catalog: redshift evolution and properties of mg ii absorbers. The Astrophysical Journal, 770(2):130, 2013. 11
9cs.NE
1 Adaptive-Robust Control of a Class of Uncertain Nonlinear Systems Utilizing Time-Delayed Input and Position Feedback arXiv:1509.07314v3 [cs.SY] 11 Feb 2016 Spandan Roy and Indra Narayan Kar, Senior Member, IEEE Abstract In this paper, the tracking control problem of a class of Euler-Lagrange systems subjected to unknown uncertainties is addressed and an adaptive-robust control strategy, christened as Time-Delayed Adaptive Robust Control (TARC) is presented. The proposed control strategy approximates the unknown dynamics through time-delayed logic, and the switching logic provides robustness against the approximation error. The novel adaptation law for the switching gain, in contrast to the conventional adaptive-robust control methodologies, does not require either nominal modelling or predefined bounds of the uncertainties. Also, the proposed adaptive law circumvents the overestimation-underestimation problem of switching gain. The state derivatives in the proposed control law is estimated from past data of the state to alleviate the measurement error when state derivatives are not available directly. Moreover, a new stability notion for time-delayed control is proposed which in turn provides a selection criterion for controller gain and sampling interval. Experimental result of the proposed methodology using a nonholonomic wheeled mobile robot (WMR) is presented and improved tracking accuracy of the proposed control law is noted compared to time-delayed control and adaptive sliding mode control. Index Terms Adaptive-robust control, Euler-Lagrange system, time-delayed control, state derivative estimation, wheeled mobile robot. I. I NTRODUCTION A. Background and Motivation ESIGN of an efficient controller for nonlinear systems subjected to parametric and nonparametric uncertainties has always been a challenging task. Among many other approaches, Adaptive control and Robust control are the two popular control strategies that researchers have extensively employed while dealing with uncertain nonlinear systems. In general, adaptive control uses predefined parameter adaptation laws and equivalence principle based control law which adjusts the parameters of the controller on the fly according to the pertaining uncertainties [1]. However, this approach has poor transient performance and online calculation of the unknown system parameters and controller gains for complex systems is computationally intensive [2]. Whereas, robust control aims at tackling the uncertainties of the system within an uncertainty bound defined a priori. It reduces computation complexity to a great extent for complex systems compared to adaptive control as exclusive online estimation of uncertain parameters is not required [3]. However, nominal modelling of the uncertainties is necessary to decide upon their bounds, which is not always possible. Again, to increase the operating region of the controller, often higher uncertainty bounds are assumed. This in turn leads to problems like higher controller gain and consequent possibility of chattering for the switching law based robust controller like Sliding Mode Control (SMC). This in effect reduces controller accuracy [4]. Higher order sliding mode [5] can alleviate the chattering problem but prerequisite of uncertainty bound still exists. Time-Delayed Control (TDC) is utilized in [6] to implement state derivative feedback for enhancing stability margin of SISO linear time invariant (LTI) systems. In [7], [8], [26]-[27], [34], [35], TDC is used to provide robustness against uncertainties. In this process, all the uncertain terms are represented by a single function which is then approximated using control input and state information of the immediate past time instant. The advantage of this robust control approach in uncertain systems is that it reduces the burden of tedious modelling of complex system to a great extent. In spite of this, the unattended approximation error, commonly termed as time-delayed error (TDE) causes detrimental effect to the performance of the closed system and its stability. In this front, a few work have been carried out to tackle TDE which includes internal model [9], gradient estimator [10], ideal velocity feedback [11], nonlinear damping [12] and sliding mode based approach [13]-[14]. The stability of the closed loop system [9]-[11], [26]-[27], depends on the boundedness of TDE as shown in [7]. This method approximates the continuous time closed loop system in a discrete form without considering the effect of discretization error. Again, the stability criterion mentioned in [7] restricts the allowable range of perturbation and thus limits controller working range. Stability of the system in [13] is established in frequency domain, which makes the approach inapplicable to the nonlinear systems. Moreover, the controllers designed in [12], and [14], [35] require nominal modelling and upper bound of the TDE respectively which is not always possible in practical circumstances. Also, to the best knowledge of the authors, controller design issues such as D 2 selection of controller gains and sampling interval to achieve efficient performance is still an open problem. In contrast to TDC, works reported in [28]-[30] use low pass filter to approximate the unknown uncertainties and disturbances. However, frequency range of system dynamics and external disturbances are required to determine the time constant of the filter. Furthermore, the order of the low pass filter needs to be adjusted according to order of the disturbance to maintain stability of the controller. Considering the individual limitations of adaptive and robust control, recently global research is reoriented towards adaptiverobust control (ARC) where switching gain of the controller is adjusted online. The series of publications [2], [15]-[20] regarding ARC, estimates the uncertain terms online based on predefined projection function, but predefined bound on uncertainties is still a requirement. The work reported in [21], [33] attempts to estimate the maximum uncertainty bound but the integral adaptive law makes the controller susceptible to very high switching gain and consequent chattering [34]. The adaptive sliding mode control (ASMC) as presented in [22]-[23] proposed two laws for the switching gain to adapt itself online according to the incurred error. In the first adaptive law, the switching gain decreases or increases depending on a predefined threshold value. However, until the threshold value is achieved, the switching gain may still be increasing (resp. decreasing) even if tracking error decreases (resp. increases) and thus creates overestimation (resp. underestimation) problem of switching gain [24]. Moreover, to decide the threshold value the maximum bound of the uncertainty is required. For the second adaptive law, the threshold value changes online according to switching gain. Yet, nominal model of the uncertainties is needed for defining the control law. This limits the adaptive nature of the control law and applicability of the controller. B. Problem Definitions and Contributions In this paper, three specific related problems on TDC have been dealt with and the corresponding solutions to the same which are also the contributions of this paper are summarized below: • Problem 1: The stability analysis of TDC, as provided in [7], [26]-[27], [34], [35], approximates the continuous time system in discrete time domain without considering the effects of discretization error. Again, choice of the delay time and its relation with the controller gains is still an open problem. In this paper, a new stability analysis for TDC, based on the Lyapunov-Krasvoskii method, is provided in continuous time domain. Furthermore, through the proposed stability approach, a relation between the sampling interval and controller gain is established. • Problem 2: The TDC reported in ([7], [26]-[27], [34], [35]), velocity and acceleration feedback are necessary to compute the control law. While in [6], only velocity feedback is required and acceleration term is approximated numerically using time delay. However, in many applications velocity and acceleration feedback are not available explicitly and numerical approximation of these terms invokes measurement error. As a second contribution of this paper, Filtered Time-Delayed Control (F-TDC) control law is formulated where only position feedback is sufficient while velocity and acceleration terms are estimated using past and present position information to curb the effect measurement error. Stability analysis of the proposed F-TDC is provided which also maintains the relation between controller gains and sampling interval. • Problem 3: Robustness property against TDE is essential to achieve good tracking accuracy. The robust controllers reported in literature, either requires nominal model of the uncertainties ([22]-[23]) or its predefined bound ([2], [12], [14], [15]-[20]). So, it is required to devise a control law which would avoid any prior knowledge of the uncertainties while providing robustness against TDE. Towards the last contribution of this article, an adaptive-robust control strategy, Time-Delayed Adaptive Robust Control (TARC) has been formulated for a class of uncertain Euler-Lagrange systems. The proposed control law approximates uncertainties by time-delayed logic and provides robustness against the TDE, arising from time-delayed logic based estimation, by switching control. The novel adaptive law, presented here, aims at overcoming the overestimation-underestimation problem of the switching gain without any prior knowledge of uncertainties. The proposed adaptive law provides flexibility to the control designer to select any suitable error function according to the application requirement while maintaining similar system stability notion. As a proof of concept, experimental validation of the proposed control methodology is provided using the "PIONEER-3" nonholonomic WMR in comparison to TDC [7] and ASMC [22]-[23]. C. Organization The article is organized as follows: a new stability analysis of TDC along with its design issues is first discussed in Section II. This is followed by the proposed adaptive-robust control methodology and its detail analysis. Section III presents the experimental results of the proposed controller and its comparison with TDC and ASMC. Section IV concludes the entire work. D. Notations The following notations are assumed for the entirety of the paper: any variable µ delayed by an amount h as µ(t − h), is denoted as µh ; λmin (·) and ||·|| represent minimum eigen value and Euclidean norm of the argument respectively; I represents identity matrix. 3 II. C ONTROLLER D ESIGN A. Time-Delayed Control: Revisited In general, an Euler-Lagrange system with second order dynamics, devoid of any delay, can be written as, M (q)q̈ + N (q, q̇) = τ (t), (1) where, q(t) ∈ Rn is the system state, τ (t) ∈ Rn is the control input, M (q) ∈ Rn×n is the mass/inertia matrix and N (q, q̇) ∈ Rn denotes combination of other system dynamics terms based on system properties. In practice, it can be assumed that unmodelled dynamics and disturbances is subsumed by N . The control input is defined to be, τ = M̂ u + N̂ , (2) where, u is the auxiliary control input, M̂ and N̂ are the nominal values of M and N respectively. To reduce the modelling effort of the complex systems, N̂ can be approximated from the input-output data of previous instances using the time-delayed logic ([7], [26]-[27]) and the system definition (1) as, N̂ (q, q̇) ∼ = N (qh , q̇h ) = τh − M̂ (qh )q̈h , (3) where, h > 0 is a fixed small delay time. Substituting (2) and (3) in (1), the system dynamics is converted into an input as well state delayed dynamics as, M̂ (q)q̈ + N̄ (q, q̇, q̈, q̈h ) = τh . (4) where N̄ = (M − M̂ )q̈ + M̂h q̈h − M̂ u + N . Let, q d (t) be the desired trajectory to be tracked and e1 (t) = q(t) − q d (t) is the tracking error. The auxiliary control input u is defined in the following way, u(t) = q̈ d (t) − K2 ė1 (t) − K1 e1 (t), (5) where, K1 and K2 are two positive definite matrices with appropriate dimensions. Putting (5) and (2) in (4), following error dynamics is obtained, ë1 = −K2 ė1h − K1 e1h + σ1 , (6) where, σ1 = (M̂ −1 M̂h − I)uh + M̂ −1 (N̂h − N̄ ) + q̈hd − q̈ d and can be treated as overall uncertainty. Further, (6) can be written in state space form as, ė = A1 e + B1 eh + Bσ1 , (7)         R0 0 e 0 I 0 0 ė(t + θ)dθ, where the ,B = where, e = 1 , A1 = . Noting that, e(t − h) = e(t) − , B1 = I 0 0 −K1 −K2 ė1 −h derivative inside the integral is with respect to θ, the error dynamics (7) is modified as, ė(t) = Ae(t) − B1 Z0 ė(t + θ)dθ + Bσ1 , (8) −h where, A = A1 + B1 . It is assumed that the choice controller gains K1 and K2 makes A Hurwitz which is always possible. Also, it is assumed that the unknown uncertainties are bounded. In this paper, a new stability criterion, based on the Lyapunov-Krasvoskii method, is presented through Theorem 1 which addresses the issues defined in Problem 1. Theorem 1. The system (4) employing the control input (2), having auxiliary control input (5) is UUB if the controller gains and delay time is selected such that the following condition holds: # " 2 0 Q − E − (1 + ξ) hβ D >0 (9) Ψ= 2 0 (ξ − 1) hβ D where, E = βP B1 (A1 D−1 AT1 + B1 D−1 B1T + D−1 )B1T P , ξ > 1 and β > 0 are scalar, and P > 0 is the solution of the Lyapunov equation AT P + P A = −Q for some Q > 0. Proof. Let us consider the following Lyapunov function: V (e) = V1 (e) + V2 (e) + V3 (e) + V4 (e), (10) 4 where, V1 (e) = eT P e Z Z h 0 t T V2 (e) = e (ψ)De(ψ)dψdθ β −h t+θ Z Z h 0 t T V3 (e) = e (ψ − h)De(ψ − h)dψdθ β −h t+θ Z h2 t T e (ψ)De(ψ)dψ V4 (e) = ξ β t−h (11) (12) (13) (14) Using (8), the time derivative of V1 (e) yields, V̇1 (e) = −eT Qe − 2eT P B1 Z 0 ė(t + θ)dθ + 2ŝT σ1 (15) −h where, ŝ = B T P e. Again using (7), Z 0 Z T T −2e P B1 ė(t + θ)dθ = −2e P B1 −h 0 [A1 e(t + θ) + B1 e(t − h + θ) + Bσ1 (t + θ)]dθ, (16) −h For any two non zero vectors z1 and z2 , there exists a scalar β > 0 and matrix D > 0 such that the following inequality holds, ± 2z1T z2 ≤ βz1T D−1 z1 + (1/β)z2T Dz2 . Again, using Jensen’s inequality the following inequality holds [32], Z Z 0 Z 0 1 0 T e (ψ)dψD e(ψ)dψ. eT (ψ)De(ψ)dψ ≥ h −h −h −h (17) (18) Applying (17) and (18) to (16) the following inequalities are obtained, Z 0 Z Z 0 1 0 T e(t + θ)dθ e (t + θ)dθD − 2eT P B1 A1 e(t + θ)dθ ≤ βeT P B1 A1 D−1 AT1 B1T P e + β −h −h −h Z h 0 T ≤ βeT [P B1 A1 D−1 AT1 B1T P ]e + e (t + θ)De(t + θ)dθ (19) β −h Z Z 0 Z 0 1 0 T e (t − h + θ)dθD e(t − h + θ)dθ − 2eT P B1 B1 e(t − h + θ)dθ ≤ βeT P B1 B1 D−1 B1T B1T P e + β −h −h −h Z h 0 T ≤ βeT [P B1 B1 D−1 B1T B1T P ]e + e (t − h + θ)De(t − h + θ)dθ (20) β −h Z 0 Z Z 0 1 0 − 2eT P B1 [Bσ1 (t + θ)]dθ ≤ βeT P B1 D−1 B1T P e + (Bσ1 (t + θ))T dθD Bσ1 (t + θ)]dθ β −h −h −h Z   h 0 −1 T T (Bσ1 (t + θ))T Dσ1 (t + θ)dθ (21) ≤ βe P B1 D B1 P e + β −h Since D > 0, we can write D = D̄T D̄ for some D̄ > 0. Then, assuming the uncertainties to be square integrable within the delay, let there exists a scalar Γ1 > 0 such that the following inequality holds: Z 0   h (Bσ1 (t + θ))T D̄T D̄Bσ1 (t + θ) dθ ≤ Γ1 . (22) β −h Again, Z h 0 T h2 T e De − e (t + θ)De(t + θ)dθ V̇2 (e) = β β −h Z h2 T h 0 T V̇3 (e) = eh Deh − e (t − h + θ)De(t − h + θ)dθ β β −h h2 V̇4 (e) = ξ (eT De − eTh Deh ) β (23) (24) (25) Substituting (19)-(22) into (15) and adding it with (23)-(25) yields, V̇ (e) ≤ −ēT Ψē + Γ1 + 2ŝT σ1 , (26) 5  T where, ē = eT eTh . Let controller gains K1 , K2 and delay time h are selected to make Ψ > 0. One can find a positive scalar ι such that ||ŝ|| ≤ ι||||ē||. Then, V̇ (e) < 0 would be established if λmin (Ψ)||ē||2 > Γ1 + 2ι||σ1 ||||ē||. Thus (4) would be UUB with the ultimate bound, s Γ1 (27) + γ12 = ̟0 . ||ē|| = γ1 + λmin (Ψ) ι||σ1 || where, γ1 = λmin (Ψ) . Let Ξ denote the smallest level surface of V containing the ball B̟0 with radius ̟0 centred at ē = 0. For initial time t0 , if ē(t0 ) ∈ Ξ then the solution remains in Ξ. If ē(t0 ) ∈ / Ξ then V decreases as long as ē(t) ∈ / Ξ. The time required to reach ̟0 is zero when ē(t0 ) ∈ Ξ, otherwise, while ē(t0 ) ∈ / Ξ the finite time tr0 to reach ̟0 , for some c0 > 0, is given by [25], tr0 − t0 ≤ (||ē(t0 )|| − ̟0 )/c0 where V̇ (t) ≤ −c0 Remark 1. : Since E depends on the controller gains, (9) provides a selection criterion for the choice of delay h for given controller gains and Q. This design issue was previously unaddressed in the literature. Moreover, the approximation error (N̂ − N ), as in (3), would reduce for small values of h. However, h cannot be selected smaller than the sampling interval because, the input output data is only available at sampling intervals. So, the lowest possible selection of h is the sampling interval. Again, choice of sampling interval is governed by the corresponding hardware response time, computation time etc. Hence, the proposed stability approach provides a necessary step for the selection of sampling interval for given controller gains or vice-versa. B. Filtered Time-Delayed Control (F-TDC) It can be noticed from (3) and (5) that state derivatives are necessary to compute the control law of TDC. However, in many circumstances, only q is available amongst q, q̇, q̈. Under this scenario, a new control strategy F-TDC is proposed, which estimates the state derivatives from the state information of past instances [31]. Before proposing the control structure of F-TDC, the following two Lemmas are stated which are instrumental for formulation as well as stability analysis of F-TDC. Lemma 1 ([31]). : For time t ≥ ς, the j-th order time derivative of the Λ-th degree polynomial q in (4) can be computed in the following way, Z 0 q̂ (j) (t) = Ωj (ς, ψ)q(t + ψ)dψ (28) −ς where, ς > 0 is a prespecified scalar and Ωj (ς, ψ) = k  Λ −ψ (−1)k (Λ + 1 + k)! (Λ + 1 + j)! X . ς ς (j+1) j!(Λ − j)! k=0 (j + k + 1)(Λ − k)!(k!)2 (29) Lemma 2. For any non zero vector ϑ(ψ), constant matrix F > 0 the following relation holds, Z 0 Z 0  Z 0 Z 0  Z 0 Z 0 1 T T ϑ (ψ)F ϑ(ψ)dψdθ ≥ ϑ (ψ)dψdθ F ϑ(ψ)dψdθ hς −h −ς −h −ς −h −ς (30) The structure of F-TDC is similar to (2), except, the auxiliary control input u and N̂ in (2) selected in the following way, u(t) = q̈ d (t) − K1 e1 (t) − K2 ê˙ 1 (t) ∼ Nh = uh − M̂h q̂¨h , N̂ (t) = (31) (32) where, ê˙ 1 = q̂˙ − q̇ d . q̂˙ and q̂¨ are evaluated from (28) and (29). The stability of the system (4) employing F-TDC is derived in the sense of Uniformly Ultimately Bounded (UUB) notion as stated in Theorem 2. Theorem 2. The system (4) employing the control input (2), having the auxiliary input (31) and (32) is UUB if K1 , K2 , h and ς are selected such that the following condition holds:   2 Q − Ē − (1 + ξ) hβ D P B̆ P B̄   2  0  B̆ T P (ξ − 1) hβ D − F̄ B̄ T P 0 L =Θ>0 where, Ē = βP B1 (A1 D−1 AT1 + B1 D−1 B1T + D−1 + B̄D−1 B̄ T )B1T P , F̄ =     Ω1 (ς, ψ), B̄ = B K2 0 , B̆ = B 0 K2 . Proof. The proof is provided in Appendix B. (33) 2 ( hβ D + L)ς R0 −ς A2d (ψ)dψ, L > 0, Ad (ψ) = 6 C. Adaptive-Robust Control: Related Work It can be observed that TDE degrades tracking performance of both the TDC and F-TDC in the face of uncertainties. The control methods that attempt to counter uncertainties, as reported in [2], [12], [14], [15]-[20], requires predefined bound on the uncertainties which is not always possible in practical circumstances. To circumvent this situation Adaptive Sliding Mode Control (ASMC) was proposed in [22]-[23]. The control input of ASMC is given by, τ = Σ−1 n (−κn + ∆us ), (34) where, Σn and κn is the nominal values of Σ and κ, and ∆us is the switching control input. For a choice of sliding surface s̄, Σ and κ is defined as follows: s̄˙ = Σ + κ∆us , (35) The switching control ∆us is calculated as ∆us = −ĉ ĉ˙ = ( s̄ ||s̄|| c̄||s̄||sgn(||s̄|| − ρ) γ (36) ĉ > γ, ĉ ≤ γ, (37) where, ĉ is the switching gain, c̄ > 0 is a scalar adaptive gain, ρ > 0 is a threshold value, γ > 0 is small scalar to always keep ĉ positive. Evaluation of ρ can be done in two ways [22]: ρ=̺ or, ρ(t) = 4ĉ(t)ts , (38) (39) where, ̺ > 0 is a scalar, ts is the sampling interval. The choice (38) requires predefined bound of uncertainties. It can be noted from (37) that even if ||s̄|| decreases (resp. increases), unless it falls below (resp. goes above) ρ switching gain does not decrease (resp. increase). This causes overestimation (resp. underestimation) of switching gain and controller accuracy is compromised. Again, improper and low choice of ρ may lead to very high switching gain and consequent chattering. On the other hand, method (39) assumes that the nominal value of the uncertainties are always greater than the perturbations. This assumption may not hold due to the effect of unmodelled dynamics and thus, necessitates rigorous nominal modelling of the uncertainties in N to design the control law. Either of the two situations, i.e. bound estimation or uncertainty modelling, is not always feasible in practical circumstances and consequently compromises the adaptive nature of the controller. D. Time-Delayed Adaptive Robust Control Considering the limitations of the existing controllers that aim at negotiating the uncertainties, as discussed earlier, a novel adaptive-robust control law, named Time-Delayed Adaptive Robust Control (TARC) is proposed in this endeavour, which neither requires the nominal model nor any predefined bound of the uncertainties as well as eliminates the overestimationunderestimation problem of switching gain. The structure of the control input of TARC is similar to (2) and N̂ is also evaluated according to (32). However, the auxiliary control input u is selected as below, u = û + ∆u. (40) û is the nominal control input and selected as similar to (31). ∆u is the switching control law which is responsible for negotiating the TDE and it is defined as below, ( s if k s k≥ ǫ, −αĉ(e, t) ksk (41) ∆u = s if k s k< ǫ, −αĉ(e, t) ǫ T  where, s = B T P e1 ê˙ 1 and ǫ > 0 is a small scalar. The following novel adaptive control law for evaluation of ĉ is proposed:   ĉ > γ, f (e) > 0  ||s|| ˙ĉ = −||s|| (42) ĉ > γ, f (e) ≤ 0   γ ĉ ≤ γ, where, α > 0 is a scalar adaptive gain and ǫ > 0 represents a small scalar, f (e) is a suitable function of error defined by the designer. Here, it is selected as f (e) = ||s(t)|| − ||sh ||. According to the adaptive law (42) and present choice of f (e), ĉ increases (resp. decreases) whenever error trajectories move away from (resp. close to ) ||s|| = 0 The advantages of the proposed TARC can be summarized as follows: 7 TARC reduces complex system modelling effort as only the knowledge of M̂ suffices the controller design since N along with the uncertainties is approximated using the time-delayed logic as in (32). This in turn reduces the tedious modelling effort of complex nonlinear systems. • Evaluation of switching gain does not require either of the nominal model or predefined bound of the uncertainties and also removes the overestimation-underestimation problem. • State derivatives are not required to compute the control law explicitly, as they are evaluated from the past state information using (28) and (29). The stability of the system (4) employing TARC is analysed in the sense of UUB as stated in Theorem 3. • Assumption 1. Let, ||σ1 || ≤ c. Here, c is an unknown scalar quantity. Knowledge of c, however, is only required for stability analysis but not to compute control law. Theorem 3. The system (4) employing (2), (40) and having the adaptive law (42) is UUB, provided the selection of K1 , K2 , h and ς holds condition (33). Proof. : Let us define the Lyapunov functional as, Vr (e) = Vf (e) + (ĉ − c)2 , where, Vf (e) is defined in (53). Again, putting (40) in (4) the the error dynamics becomes, Z 0 ė = A1 e + B1 eh − B̄ Ad (ψ)e(t − h + ψ)dψ + Bσ, (43) (44) −ς where, σ = ∆uh + σ1 . Also following similar steps while proving Theorem 2 (provided in Appendix B) we have, V̇f (e) ≤ −eTf Θef + Γ + 2ŝT (∆u + σ1 ) + 2ŝT Υ, (45) R   0 where, ef is defined in Appendix B, Γ ≥ βh −h (Bσ(t + θ))T D̄T D̄Bσ(t + θ) dθ is a positive scalar, Υ = ∆uh − ∆u. Let us define the following,  T ŝ = s + ∆s where ∆s = B T P 0 (ė1 − ê˙ 1 )T . (46) Evaluating the structure of s and ∆s one can find two positive scalars ι2 , ι3 such that ||s|| ≤ ι2 ||ef ||, ||∆s|| ≤ ι3 ||ef ||. Using (43) the stability analysis for (4) employing TARC is carried out for the following various cases. Case (i): f (e) > 0, ĉ > γ, ||s|| ≥ ǫ. Utilizing (41), (42) and (45) we have, s + σ1 ) + 2ŝT Υ + 2(ĉ − c)||s|| V̇r (e) ≤ −eTf Θef + Γ + 2ŝT (−αĉ ||s|| sT s ∆sT s = −eTf Θef + Γ − 2αĉ − 2αĉ + 2ŝT σ1 + 2ŝT Υ + 2(ĉ − c)||s|| ||s|| ||s|| ≤ −λmin (Θ)||ef ||2 − 2(α − 1)ĉ||s|| + Γ + 2||s||||Υ|| + 2(αĉ + c + ||Υ||)||∆s|| (47) So, for α > 1, V̇r (e) < 0 would be established if λmin (Θ)||ef ||2 > Γ + 2||s||||Υ|| + 2(αĉ + c + ||Υ||)||∆s||. Thus, using the relation ||s|| ≤ ι2 ||ef ||, ||∆s|| ≤ ι3 ||ef ||, the system would be UUB with the following ultimate bound s Γ + µ21 = ̟1 . (48) ||ef || = µ1 + λmin (Θ) 3 (αĉ+c+||Υ||) where, µ1 = ι2 ||Υ||+ι . λmin (Θ) Case (ii): f (e) ≤ 0, ĉ > γ, ksk ≥ ǫ. Again, utilizing (42) for Case (ii), s + σ1 ) + 2ŝT Υ − 2(ĉ − c)||s|| ||s|| ≤ −λmin (Θ)||ef ||2 + (4c − 2(α + 1)ĉ + 2||Υ||)||s|| + Γ + 2(αĉ + c + ||Υ||)||∆s||. V̇r (e) ≤ −eTf Θef + Γ + 2ŝT (−αĉ (49) V̇r (e) < 0 would be achieved if λmin (Θ)||ef ||2 > Γ + (4c − 2(α + 1)ĉ + 2||Υ||)||s|| + 2(αĉ + c + ||Υ||)||∆s|| and system would be UUB having following ultimate bound, s Γ + µ22 = ̟2 . (50) ||ef || = µ2 + λmin (Θ) where, µ2 = ι2 (2c−(α+1)ĉ+||Υ||)+ι3 (αĉ+c+||Υ||) . λmin (Θ) 8 Case (iii): ĉ ≤ γ, ksk ≥ ǫ. Since ĉ ≤ γ we have (ĉ − c)γ ≤ γ 2 − cγ ≤ γ 2 . Using the adaptive law (42), for Case (iii) we have, s V̇r (e) ≤ −eTf Θef + Γ + 2ŝT (−αĉ + σ1 ) + 2(ĉ − c)γ + 2ŝT Υ ||s|| ≤ −λmin (Θ)||ef ||2 + Γ + 2(c − αĉ + ||Υ||)||s|| + 2(αĉ + c + ||Υ||)||∆s|| + 2γ 2 . Similarly, as argued earlier the system would be UUB with the following ultimate bound, s (Γ + 2γ 2 ) ||ef || = µ3 + + µ23 = ̟3 . λmin (Θ) where, µ3 = (51) (52) ι2 (c−αĉ+||Υ||)+ι3 (αĉ+c+||Υ||) . λmin (Θ) Remark 2. The performance of TARC can be characterized by the various error bounds under various conditions. It can be noticed that low value of h and high value of α would result in better accuracy. However, too large α may result in high control input. Also, one may choose different values of α for ||s|| > ||sh || and ||s|| ≤ ||sh ||. Moreover, it is to be noticed that the stability notion of TARC is invariant to the choice of f (e) and thus provides the designer the flexibility to select a suitable f (e) according to the application requirement. III. C ONCLUSION Selection of the controller gain and sampling interval is crucial for the performance of TDC and this design issue is addressed in this paper through a new stability approach. A bound on the delay is derived to select a suitable sampling interval. A new control approach, F-TDC is devised where the state derivatives are estimated from the previous state information. Moreover, a novel adaptive-robust control law, TARC has been proposed for a class of uncertain nonlinear systems subjected to unknown uncertainties. The proposed controller approximates unknown dynamics through time-delayed law and negotiates the approximation error, that surfaces due to the time-delayed approximation of uncertainties and state derivatives, by switching logic. The adaptive law eliminates the overestimation-underestimation problem for online evaluation of switching gain without any prior knowledge of uncertainties. Experimentation with a WMR shows improved path tracking performance of TARC compared to TDC and conventional ASMC. The proposed framework can also be extended for other systems such as Autonomous Underwater Vehicle, Unmanned Aerial Vehicle, Robotic manipulator etc. A PPENDIX A P ROOF OF T HEOREM 2 Let us define the Lyapunov functional as, Vf (e) = V (e) + Vf 1 (e) + Vf 2 (e) + Vf 3 (e), Z Z Z hς 0 0 t−h T Vf 1 (e) = e (η + θ)D× β −h −ς t−h+ψ (53) × A2d (ψ)e(η + θ)dηdψdθ Vf 2 (e) = hς β Z 0 Z 0 Z Vf 3 (e) = ς −h −ς Z 0 −ς Z t eT (η − h)D× t+θ × A2d (ψ)e(η − h)dηdψdθ t eT (η − h)(ψ)RA2d (ψ)e(η − h)dηdψ. t+ψ R EFERENCES [1] M. Kristic, I. Kanellakopoulos and P. V. Kokotovic, Nonlinear and Adaptive Control Design, Wiley, New York, 1995. [2] X. Liu, H. Su, B. Yao and J.Chu, Adaptive robust control of a class of uncertain nonlinear systems with unknown sinusoidal disturbances, 47th IEEE Conference on Decision and Control, pp. 2594-2599, 2008. [3] M. J. Corless and G. Leitmann, Continuous state feedback guaranteeing uniform ultimate boundness for uncertain dynamic system, IEEE Transactions on Automatic Control, vol. 26(10), pp. 1139-1144, 1981. [4] H. Lee and V. I. Utkin, Chattering suppression methods in sliding mode control systems, Annual Reviews in Control, vol. 31, pp. 179-188, 2007. [5] A. Levant, Higher-order sliding modes, differentiation and output-feedback control, International Journal of Control, vol. 76(9/10), pp. 924-941, 2003. [6] A. G. Ulsoy, Time-delayed control of siso systems for improved stability margins, ASME Journal of Dynamic Systems, Measurement, and Control, vol. 137(4), pp. 1-12, 2015. [7] T. C. Hsia and L. S. Gao, Robot manipulator control using decentralized linear time-invariant time-delayed joint controllers, IEEE International Conference on Robotics and Automation, pp. 2070-2075, 1990. 9 [8] K. Youcef-Toumi and O. Ito, A time delay controller for systems with unknown dynamics, ASME Journal of Dynamic Systems, Measurement, and Control, vol. 112(1), pp. 133-142, 1990. [9] G. R. Cho, P. H. Chang, S. H. Park and M. Jin, Robust tracking under nonlinear friction using time delay control with internal model, IEEE Transactions on Control System Technology, vol. 17(6), pp. 1406-1414, 2009. [10] D. K.Han and P. H. Chang, Robust tracking of robot manipulator with nonlinear friction using time delay control with gradient estimator, Journal of Mechanical Science and Technology, vol. 24(8), pp. 1743-1752, 2010. [11] M. Jin, S. H. Kang and P. H. Chang, Robust compliant motion control of robot with nonlinear friction using time-delay estimation, IEEE Transactions on Industrial Electronics, vol. 55(1), pp. 258-269, 2008. [12] Y. Jin, P. H. Chang, M. Jin and D. G. Gweon, Stability guaranteed time-delay control of manipulators using nonlinear damping and terminal sliding mode, IEEE Transactions on Industrial Electronics, vol. 60(8), pp. 3304-3318, 2013. [13] P. H. Chang and S. H. Park, On improving time-delay control under certain hard nonlinearities, Mechatronics, vol. 13(4), pp. 393-412, 2003. [14] S. Roy, S. Nandy, R. Ray and S. N. Shome, Time delay sliding mode control nonholonomic wheeled mobile robot: experimental validation, IEEE International Conference on Robotics and Automation, pp. 2886-2892, 2014. [15] X. Zhu, G. Tao, B. Yao and J. Cao, Adaptive robust posture control of parallel manipulator driven by pneumatic muscles with redundancy, IEEE/ASME Transactions on Mechatronics, vol. 13(4), pp. 441-450, 2008. [16] X. Zhu, G. Tao, B. Yao and J. Cao, Integrated direct/indirect adaptive robust posture control of parallel manipulator driven by pneumatic muscles, IEEE Transactions on Control System Technology, vol. 17(3), pp. 576-588, 2009. [17] W. Sun, Z. Zhao and H. Gao, Saturated adaptive robust control for active suspension systems, IEEE Transactions on Industrial Electronics, vol. 60(9), pp. 3889-3896, 2013. [18] S. Islam, P. X. Liu and A. E. Saddik, Robust control of four rotor unmanned aerial vehicle with disturbance uncertainty, IEEE Transactions on Industrial Electronics, vol. 63(3), pp. 1563-1571, 2015. [19] Z. Chen, B. Yao and Q. Wang, µ-synthesis based adaptive robust posture control of linear motor driven stages with high frequency dynamics: a case study, IEEE/ASME Transactions on Mechatronics, vol. 20(3), pp. 1482-1490, 2015. [20] Z. Liu, H. Su and S. Pan, A new adaptive sliding mode control of uncertain nonlinear dynamics, Asian Journal of Control, vol. 16(1), pp. 198-208, 2014. [21] C. Chen, T. S. Li, Y. Yeh and C. Chang, Design and implementation of an adaptive sliding-mode dynamic controller for wheeled mobile robots, Mechatronics, vol. 19, pp. 156-166, 2009. [22] F. Plestan, Y. Shtessel, V. Bregeault and A. Poznyak, New methodologies for adaptive sliding mode control, International Journal of Control, vol. 83(9), pp. 1907-1919, 2010. [23] F. Plestan, Y. Shtessel, V. Bregeault and A. Poznyak, Sliding mode control with gain adaptation - application to an electropneumatic actuator state, Control Engineering Practice, vol. 21, pp. 679-688, 2013. [24] B. Bandyopadhayay, S. Janardhanan and S. K. Spurgeon, Advances in Sliding Mode Control, Springer-Verlag, New York, 2013. [25] G. Leitmann, On the efficiency of nonlinear control in uncertain linear systems, ASME Journal of Dynamic Systems, Measurement and Control, vol. 103, pp. 95-102, 1981. [26] P. H. Chang and J. W. Lee, A model reference observer for time-delay control and its application to robot trajectory control, IEEE Transactions on Control System Technology, vol. 4(1), pp. 2-10, 1996. [27] Y. H. Shin and K. J. Kim, Performance enhancement of pneumatic vibration isolation tables in low frequency range by time delay control, Journal of Sound and Vibration, vol. 321, pp. 537-553, 2009. [28] A. Kuperman and Q. C. Zhong, Robust control of uncertain nonlinear systems based on an uncertainty and disturbance estimator, International Journal of Robust and Nonlinear Control, vol. 21, pp. 79-92, 2011. [29] S. E. Talole and S. B. Phadke, Robust input-output linearization using uncertainty and disturbance estimator, International Journal of Control, vol. 82(10), pp. 1794-1803, 2009. [30] P. V. Suryawanshi, P. D. Shengde, and S. B. Phadke, Robust sliding mode control for a class of nonlinear systems using inertial delay control, Nonlinear Dynamics, vol. 78(3), pp. 1921-1932, 2014. [31] J. Reger and J. Jouffroy, On algebraic time-derivative estimation and deadbeat state reconstruction, Joint 47th IEEE Conference on Decision and Control and 28th Chinese Control Conference, pp. 1740-1745, 2009. [32] K. Gu, V. Khartionov and J. Chen, Stability of time-delay systems, Birkhäuser, Boston (2003). [33] A. Nasiri, S. K. Nguang and A. Swain, Adaptive sliding mode control for a class of MIMO nonlinear systems with uncertainty, Journal of The Franklin Institute, vol. 351, pp. 2048-2061, 2014. [34] S. Roy, S. Nandy, R. Ray and S. N. Shome, Robust path tracking control of nonholonomic wheeled mobile robot, International Journal of Control, Automation and Systems, vol. 13(4), pp. 897-905, 2015. [35] J. Kim, H. Joe, S-C Yu, J. S. Lee and M. Kim, Time delay controller design for position control of autonomous underwater vehicle under disturbances, IEEE Transactions on Industrial Electronics, DOI 10.1109/TIE.2015.2477270, 2015.
3cs.SY
arXiv:cs/0408045v1 [cs.PL] 19 Aug 2004 On computing the fixpoint of a set of boolean equations Viktor Kuncak K. Rustan M. Leino MIT [email protected] Microsoft Research [email protected] 30 December 2003 Technical Report MSR-TR-2003-08 This paper presents a method for computing a least fixpoint of a system of equations over booleans. The resulting computation can be significantly shorter than the result of iteratively evaluating the entire system until a fixpoint is reached. Microsoft Research Microsoft Corporation One Microsoft Way Redmond, WA 98052 http://www.research.microsoft.com KRML 118 / VK0099 / MSR-TR-2003-08, p.1 0 Introduction Many problems in computer science, in particular those arising in the context of program analysis, involve the computation of a least (or, dually, greatest) fixpoint of a system of equations. In this paper, we consider a way to compute a least fixpoint when the equations involved are over the booleans. In some important cases, the resulting computation can be significantly shorter than the computation that iteratively evaluates the entire system until a fixpoint is reached. Let us begin with an overview of our result. We restrict our attention to a finite lattice. A finite lattice is a complete lattice and has no infinite ascending chains, and any monotonic function on such a lattice is also continuous. Hence, the Kleene Fixpoint Theorem [2] states that the least fixpoint of any monotonic function F is the lattice join of the sequence of elements F 0 (⊥), F 1 (⊥), F 2 (⊥), . . . where exponentiation denotes successive function applications and ⊥ denotes the bottom element of the lattice. Because this sequence is ascending and because the lattice is finite, there exists a natural number K such that F K (⊥) is the least fixpoint of F . We call the least such K the fixpoint depth of F . If we are able to evaluate function F and if we are able to determine whether two given lattice elements are equal, then we can compute the least fixpoint of F : starting from the value ⊥ , repeatedly apply F until the application of F leaves the value unchanged. The existence of a fixpoint depth guarantees that this process terminates. In this paper, we consider the problem of computing an expression for the least fixpoint, without computing the value of the expression. By first computing a small expression for the least fixpoint, we can relegate the computation of the value of the expression to an external tool such as a SAT solver [3]. In the sequel we therefore do not assume that we are able to compute the value of an expression into a particular lattice element. The fixpoint depth of a function F on a lattice is bounded by the height of the lattice. Therefore, for the 2-element lattice B of the booleans (which has height 1), the least fixpoint of F is given by F (⊥) , and for the 2n -element lattice Bn that is the Cartesian product space of n booleans (which has height n ), the least fixpoint of F is given by F n (⊥) . KRML 118 / VK0099 / MSR-TR-2003-08, p.2 Any function F : Bn → Bn can be represented isomorphically by n functions fi : Bn → B . We write F = (f1 , . . . , fn ) where the tuple of functions is itself defined to be a function, as follows, for any n -tuple X of booleans: (f1 , . . . , fn )(X ) = (f1 (X ), . . . , fn (X )) For example, let n = 3 and let F = (f , g, h) . Then, the least fixpoint of F equals F 3 (⊥, ⊥, ⊥) , as we have argued above. In terms of the functions f , g, h , this expands to: (f (f (f (⊥, ⊥, ⊥), g(f (⊥, ⊥, ⊥), h(f (⊥, ⊥, ⊥), g(f (f (⊥, ⊥, ⊥), g(f (⊥, ⊥, ⊥), h(f (⊥, ⊥, ⊥), h(f (f (⊥, ⊥, ⊥), g(f (⊥, ⊥, ⊥), h(f (⊥, ⊥, ⊥), g(⊥, ⊥, ⊥), g(⊥, ⊥, ⊥), g(⊥, ⊥, ⊥), g(⊥, ⊥, ⊥), g(⊥, ⊥, ⊥), g(⊥, ⊥, ⊥), g(⊥, ⊥, ⊥), g(⊥, ⊥, ⊥), g(⊥, ⊥, ⊥), h(⊥, ⊥, ⊥)), h(⊥, ⊥, ⊥)), h(⊥, ⊥, ⊥))), h(⊥, ⊥, ⊥)), h(⊥, ⊥, ⊥)), h(⊥, ⊥, ⊥))), h(⊥, ⊥, ⊥)), h(⊥, ⊥, ⊥)), h(⊥, ⊥, ⊥)))) We refer to this closed form of the fixpoint as the Expanded Closed Form. A different way to write down the Expanded Closed Form, which shares common subexpressions, is: let a1 = ⊥, a2 = ⊥, a3 = ⊥ let b1 = f (a1 , a2 , a3 ), b2 = g(a1 , a2 , a3 ), b3 = h(a1 , a2 , a3 ) let c1 = f (b1 , b2 , b3 ), c2 = g(b1 , b2 , b3 ), c3 = h(b1 , b2 , b3 ) let d1 = f (c1 , c2 , c3 ), d2 = g(c1 , c2 , c3 ), d3 = h(c1 , c2 , c3 ) (d1 , d2 , d3 ) in in in in This representation is cubic in n , which means that computing it may take time and space that is cubic in n .∗ If we allow ourselves to write functions of n arguments as functions over n -tuples, then we can obtain a quadratic representation. For example, with n = 3 , we have let a1 = . . . , a2 = . . . , a3 = . . . in let a = (a1 , a2 , a3 ) in let b1 = f (a), b2 = g(a), b3 = h(a) in let b = (b1 , b2 , b3 ) in . . . . ∗ KRML 118 / VK0099 / MSR-TR-2003-08, p.3 Let us consider another closed form, which we call the Pruned Closed Form. In the Pruned Closed Form, an application of a function fi is replaced by ⊥ if it occurs in another application of the same function fi . For the example above, where n = 3 , the Pruned Closed Form is: (f (⊥, g(⊥, h(⊥, g(f (⊥, ⊥, h(⊥, h(f (⊥, g(⊥, ⊥ ⊥, h(⊥, ⊥, ⊥)), g(⊥, ⊥, ⊥), ⊥ )), ⊥, h(⊥, ⊥, ⊥)), ⊥, ⊥ g(⊥, ⊥, ⊥), ⊥ ⊥, ⊥ )), ), ), )) If we do not have any interpretation for the functions fi —in other words, if each fi is just a symbolic name for an uninterpreted function—then the cubicsized Expanded Closed Form may be a reasonably small closed-form representation of the fixpoint. The Pruned Closed Form is generally much larger than cubic in n : for every subset S of f2 , . . . , fn , function f1 appears expanded in a context where the set of enclosing functions is S . (A smaller Pruned Closed Form can be obtained by taking advantage of common subexpressions.) However, there are cases where the Pruned Closed Form can be significantly smaller than the Expanded Closed Form, for example when the fixpoint computation is dominated by the computation of local fixpoints, meaning fixpoints that involve only a small number of the functions. An important situation in program analysis where this case applies is when each function represents a control point in a given program, a function is defined in terms of the functions corresponding to the successor (or predecessor) control points, and the given program contains many local loops. For example, suppose f (x , y, z ) = f(x , y) g(x , y, z ) = g(x ) h(x , y, z ) = h(y, z ) for some functions f , g , and h . Then the Expanded Closed Form is let a1 = ⊥, a2 = ⊥, a3 = ⊥ let b1 = f(a1 , a2 ), b2 = g(a1 ), b3 = h(a2 , a3 ) let c1 = f(b1 , b2 ), c2 = g(b1 ), c3 = h(b2 , b3 ) let d1 = f(c1 , c2 ), d2 = g(c1 ), d3 = h(c2 , c3 ) (d1 , d2 , d3 ) in in in in KRML 118 / VK0099 / MSR-TR-2003-08, p.4 In contrast, the Pruned Closed Form yields the much shorter expression (f( f(⊥, g(⊥)), g(⊥)), g(f(⊥, ⊥)), h(g(f(⊥, ⊥)), ⊥)) More generally, for an even n , suppose fi (x1 , . . . , xn ) is fi (xi , xi+1 ) when i is odd and fi (xi−1 , xi ) when i is even. Then the Expanded Closed Form is still cubic, whereas the Pruned Closed Form is the linear-sized expression ( f1 (⊥, f2 (⊥, ⊥)), f2 (f1 (⊥, ⊥), ⊥), ... fi (⊥, fi+1 (⊥, ⊥)), fi+1 (fi (⊥, ⊥), ⊥), ... fn−1 (⊥, fn (⊥, ⊥)), fn (fn−1 (⊥, ⊥), ⊥) ) In the rest of this paper, we define the Pruned Closed Form more precisely and prove that it yields the same value as the Expanded Closed Form. 1 Using the Bekić-Leszczyłowski Theorem In this section, we sketch how to obtain the Pruned Closed Form by applications of the Bekić-Leszczyłowski Theorem [1, 4]. We write ( ↓ x • R(x ) ) for the lattice meet of all values for x that satisfy the predicate R(x ) . For any monotonic function F , we then write ( ↓ x • x = F (x ) ) (0) to denote the least fixpoint of F , because the Tarski Fixpoint Theorem [5] says that the meet of all fixpoints is itself a fixpoint. Using for a function F : Bn → Bn the isomorphic representation of n functions fi : Bn → B , we can write (0) equivalently as: ( ↓ x1 , . . . , xn • x1 = f1 (x1 , . . . , xn ) .. . xn = fn (x1 , . . . , xn ) ) ∧ ∧ KRML 118 / VK0099 / MSR-TR-2003-08, p.5 We can now state the Bekić-Leszczyłowski Theorem [1, 4], for any monotonic functions F and G (possibly over different lattices): ( ↓ a, b • a = F (a, b) ∧ b = G(a, b) ) = ( ↓ a, b • a = F (a, b) ∧ b = ( ↓ b • b = G(a, b) )) Note that each side of the equality expresses a fixpoint in the lattice Bn if F and G are functions of types Bp × Bq → Bp and Bp × Bq → Bq , respectively, for p and q such that p + q = n . A consequence of the Bekić-Leszczyłowski Theorem and the Kleene Fixpoint Theorem for a known fixpoint depth is the following lemma: Lemma 0 For any lattice domain A and monotonic functions F : A × B → A and G: A × B → B , ( ↓ a, b • a = F (a, b) ∧ b = G(a, b) ) = ( ↓ a, b • a = F (a, b) ∧ b = G(a, ⊥) ) Proof. = = ( ↓ a, b • a = F (a, b) ∧ b = G(a, b) ) { Bekić-Leszczyłowski Theorem } ( ↓ a, b • a = F (a, b) ∧ b = ( ↓ b • b = G(a, b) )) { ( λ b • G(a, b) ) is a function on B , and therefore its fixpoint depth is at most 1, and therefore ( ↓ b • b = G(a, b) ) = G(a, ⊥) } ( ↓ a, b • a = F (a, b) ∧ b = G(a, ⊥) ) Using Lemma 0, we now show that the Pruned Closed Form is indeed the least fixpoint in B2 . For any monotonic boolean functions f and g : = = = ( ↓ a, b • a = f (a, b) ∧ b = g(a, b) ) { Lemma 0 with F , G := f , g } ( ↓ a, b • a = f (a, b) ∧ b = g(a, ⊥) ) { substitute equals for equals } ( ↓ a, b • a = f (a, g(a, ⊥)) ∧ b = g(a, ⊥) ) { Lemma 0 with G, F := ( λ a, b • f (a, g(a, ⊥)) ), ( λ a, b • g(a, ⊥) ) } ( ↓ a, b • a = f (⊥, g(⊥, ⊥)) ∧ b = g(a, ⊥) ) (1) KRML 118 / VK0099 / MSR-TR-2003-08, p.6 This calculation shows that an expression for the least solution of a in equation (1) is f (⊥, g(⊥, ⊥)) By a symmetric argument, an expression for the least solution of b in equation (1) is g(f (⊥, ⊥), ⊥) That is, an expression for (1) is ( f (⊥, g(⊥, ⊥)), g(f (⊥, ⊥), ⊥) ) which is the Pruned Closed Form. Using the result for B2 , we can show that the Pruned Closed Form is also the least fixpoint in B3 . For any monotonic boolean functions f , g , and h : = = = = = = = = ( ↓ a, b, c • a = f (a, b, c) ∧ b = g(a, b, c) ∧ c = h(a, b, c) ) (2) { Lemma 0 with G := h (and with F as the isomorphic representation of functions f and g ) } ( ↓ a, b, c • a = f (a, b, c) ∧ b = g(a, b, c) ∧ c = h(a, b, ⊥) ) { substitute equals for equals } ( ↓ a, b, c • a = f (a, b, c) ∧ b = g(a, b, h(a, b, ⊥)) ∧ c = h(a, b, ⊥) ) { Lemma 0 with G := ( λ a, b, c • g(a, b, h(a, b, ⊥)) ) } ( ↓ a, b, c • a = f (a, b, c) ∧ b = g(a, ⊥, h(a, ⊥, ⊥)) ∧ c = h(a, b, ⊥) ) { substitute equals for equals } ( ↓ a, b, c • a = f (a, g(a, ⊥, h(a, ⊥, ⊥)), c) ∧ b = g(a, ⊥, h(a, ⊥, ⊥)) ∧ c = h(a, b, ⊥) ) { the first 3 steps of this calculation, in reverse order } ( ↓ a, b, c • a = f (a, g(a, ⊥, h(a, ⊥, ⊥)), c) ∧ b = g(a, b, c) ∧ c = h(a, b, c) ) { Lemma 0 with G := g } ( ↓ a, b, c • a = f (a, g(a, ⊥, h(a, ⊥, ⊥)), c) ∧ b = g(a, ⊥, c) ∧ c = h(a, b, c) ) { substitute equals for equals } ( ↓ a, b, c • a = f (a, g(a, ⊥, h(a, ⊥, ⊥)), c) ∧ b = g(a, ⊥, c) ∧ c = h(a, g(a, ⊥, c), c) ) { Lemma 0 with G := ( λ a, b, c • h(a, g(a, ⊥, c), c) ) } KRML 118 / VK0099 / MSR-TR-2003-08, p.7 = = ( ↓ a, b, c • a = f (a, g(a, ⊥, h(a, ⊥, ⊥)), c) ∧ b = g(a, ⊥, c) ∧ c = h(a, g(a, ⊥, ⊥), ⊥) ) { substitute equals for equals } ( ↓ a, b, c • a = f (a, g(a, ⊥, h(a, ⊥, ⊥)), h(a, g(a, ⊥, ⊥), ⊥)) ∧ b = g(a, ⊥, c) ∧ c = h(a, g(a, ⊥, ⊥), ⊥) ) { Lemma 0 with G := ( λ a, b, c • f (a, g(a, ⊥, h(a, ⊥, ⊥)), h(a, g(a, ⊥, ⊥), ⊥)) ) } ( ↓ a, b, c • a = f (⊥, g(⊥, ⊥, h(⊥, ⊥, ⊥)), h(⊥, g(⊥, ⊥, ⊥), ⊥)) ∧ b = g(a, ⊥, c) ∧ c = h(a, g(a, ⊥, ⊥), ⊥) ) This calculation shows that an expression for the least solution of a in (2) is f (⊥, g(⊥, ⊥, h(⊥, ⊥, ⊥)), h(⊥, g(⊥, ⊥, ⊥), ⊥)) and similarly for b and c . Our main result is that the Pruned Closed Form is the least fixpoint in Bn for any n . In the next section, we prove this result directly, not using Lemma 0. 2 The theorem We are given n ≥ 1 monotonic functions f1 , . . . , fn : Bn → B , where B is the boolean domain {0, 1} ordered by ≤ (with 0 ≤ 1 ). To represent an indexed → n -tuple of things, like a list of booleans x1 , . . . , xn , we write − x . The fact that the given functions are monotonic is written as follows, for any index i and any → → tuples of booleans − x and − y : →→ − → − → → x ≤− y ⇒ f i .− x ≤ fi .− y where an infix dot (with the highest operator precedence) denotes function appli→ − cation, and the order ≤ is the component-wise ordering of tuples: →→ − → − x ≤− y ≡ ( ∀ i • xi ≤ yi ) We are interested in viewing the functions as specifying a system of equations, namely: x1 , . . . , xn : x1 = f1 .(x1 , . . . , xn ) ... xn = fn .(x1 , . . . , xn ) (3) KRML 118 / VK0099 / MSR-TR-2003-08, p.8 where the variables to the left of the colon show the unknowns. We take a tuple of → − functions (f1 , . . . , fn ) , which we can also write as f , to itself be a function, one which produces a tuple from the results of applying the given argument to each of → the functions. For example, for the functions given above and an argument − x , we have: → → → (f1 , . . . , fn ).− x = (f1 .− x , . . . , fn .− x) Thus, we can write the system (3) of equations as: →→ − → − → x : − x = f .− x → − → We are interested in the least (in the sense of the ordering ≤ ) solution − x that satisfies this equation. That is, we are interested in the least fixpoint of the function → − → − f . Because the lattice of boolean n -tuples has height n , the least fixpoint of f − → can be reached by applying f n times starting from the bottom element of the → − lattice. That is, the least fixpoint of f is given by: −n − → → f .0 → − where exponentiation denotes successive function applications and 0 is the tuple of n 0’s. To precisely specify the Pruned Closed Form, we introduce a notation that keeps track of which functions have been applied in the enclosing context. In particular, we use a set that contains the indices of the functions already applied. Formally, we define the following family of functions, for any index i and set S of indices:  fi ◦ (gS ∪{i},1 , . . . , gS ∪{i},n ) if i 6∈ S gS ,i = − (λ→ x • 0) if i ∈ S Taking advantage of our previous notation and using 0̇ to denote the function that always returns 0 (that is, the boolean 0 extended pointwise to a boolean function), we can write the definition of g as follows:  −→ fi ◦ − g− S ∪{i} if i 6∈ S gS ,i = 0̇ if i ∈ S Our goal is now to prove the following: Theorem 1 − →n − → − → − → g∅ . 0 = f . 0 KRML 118 / VK0099 / MSR-TR-2003-08, p.9 3 Proof We start by proving some lemmas that we use in the proof of this theorem. Lemma 2 For any index i and for any S $ {1, . . . , n} , →n−|S |−1 − − → − → gS ,i . 0 ≤ (fi ◦ f ). 0 Proof. By induction on n − |S | . Let T denote S ∪ {i } . We consider three cases. C ASE i ∈ S : → − gS ,i . 0 = { definition of g , since i ∈ S } → − 0̇. 0 = { definition of 0̇ } 0 ≤ { 0 is bottom element of ≤ } →n−|S |−1 − − → (fi ◦ f ). 0 C ASE i 6∈ S ∧ |T | < n : → − gS ,i . 0 = { definition of g , since i 6∈ S } → − − → (fi ◦ gT ). 0 = → − (fi ◦ (gT ,1, . . . , gT ,n )). 0 → − = { distribute . 0 } → − → − fi .(gT ,1. 0 , . . . , gT ,n . 0 ) ≤ { for each index j , induction hypothesis with i , S := j , T , since |S | + 1 = |T | < n ; and monotonicity of fi } →n−|S |−2 − − →n−|S |−2 − − → → fi .((f1 ◦ f ). 0 , . . . , (fn ◦ f ). 0 ) → − = { distribute . 0 } →n−|S |−2 − →n−|S |−2 − − → (fi ◦ (f1 ◦ f , . . . , fn ◦ f )). 0 →n−|S |−2 − = { distribute ◦ f } →n−|S |−2 − − → (fi ◦ (f1 , . . . , fn ) ◦ f ). 0 = { exponentiation } →n−|S |−1 − − → (fi ◦ f ). 0 KRML 118 / VK0099 / MSR-TR-2003-08, p.10 C ASE i 6∈ S ∧ |T | = n : → − gS ,i . 0 = { see first 3 steps of previous case } → − → − fi .(gT ,1. 0 , . . . , gT ,n . 0 ) = { for each index j , j ∈ T , so gT ,j = 0̇ } → − fi . 0 = { |S | = n − 1 , so f n−|S |−1 is the identity function } → − (fi ◦ f n−|S |−1 ). 0 The following corollary of Lemma 2 proves one direction of Theorem 1. Corollary 3 →n − →− − → →− − → g∅ . 0 ≤ f . 0 Proof. → − − → g∅ . 0 = − → ≤ = = → − → − (g∅,1 . 0 , . . . , g∅,n . 0 ) { for each index j , Lemma 2 with i , S := j , ∅ } →n−1 − − →n−1 − − → → ((f1 ◦ f ). 0 , . . . , (fn ◦ f ). 0 ) →n−1 − → − { distribute . 0 and ◦ f } →n−1 − − → ((f1 , . . . , fn ) ◦ f ). 0 { exponentiation } →n − − → f .0 To support the remaining lemmas, we define one more family of functions. For any index i and set S of indices,  fi if i 6∈ S hS ,i = 0̇ if i ∈ S Lemma 4 For any index i , monotonic function H : Bn → Bn , and m ≥ 0 ,  → − →  0 ≤ p ≤ m • (fi ◦ H p ).− (fi ◦ H m ). 0 = 0 ⇒ ( ∀ p  0 = 0) Proof. We prove the term of the quantification as follows: KRML 118 / VK0099 / MSR-TR-2003-08, p.11 ≤ = = → − (fi ◦ H p ). 0 − − → → → − { monotonicity of fi and H , since 0 ≤ H m−p . 0 } → − (fi ◦ H p ).(H m−p . 0 ) → − (fi ◦ H m ). 0 { antecedent } 0 Lemma 5 For any index i , set S of indices, m ≥ 0 , and T = S ∪ {i } ,  − →m − − →p → − →p − → →  0 ≤ p ≤ m • hS .− (fi ◦ hS ). 0 = 0 ⇒ ( ∀ p  0 = hT . 0 ) Proof. If i ∈ S , then S = T and the consequent follows trivially. For i 6∈ S , we prove the term of the quantification by induction on p . C ASE p = 0 : Trivial—exponentiation with 0 gives identity function. C ASE p > 0 : − →p − → hS . 0 = { exponentiation, since p > 0 } − → − →p−1 − → hS .(hS . 0 ) − →p−1 − → = { distribute .(hS . 0 ) } − →p−1 − − →p−1 − → → (hS ,1.(hS . 0 ), . . . , hS ,n .(hS . 0 )) − →p−1 − − →p−1 − → → = { for any index j , hS ,j .(hS . 0 ) = hT ,j .(hS . 0 ) , see below } − →p−1 − − →p−1 − → → (hT ,1.(hS . 0 ), . . . , hT ,n .(hS . 0 )) − →p−1 − → = { distribute .(hS . 0 ) } − → − →p−1 − → hT .(hS . 0 ) = { induction hypothesis with p := p − 1 } − → − →p−1 − → hT .(hT . 0 ) = { exponentiation } − →p − → hT . 0 Now for the proof of the third step in the calculation above. If j 6= i , then j ∈ S ≡ j ∈ T , so hS ,j = hT ,j . If j = i , then: = − →p−1 − → hS ,i .(hS . 0 ) { definition of h , since i 6∈ S } KRML 118 / VK0099 / MSR-TR-2003-08, p.12 = = = − →p−1 − → fi .(hS . 0 ) − → { Lemma 4 with H , p := hS , p − 1 , using the antecedent of Lemma 5 to fulfill the antecedent of Lemma 4 } 0 { definition of 0̇ } − →p−1 − → 0̇.(hS . 0 ) { definition of h , since i ∈ T } − →p−1 − → hT ,i .(hS . 0 ) We need one more lemma. Lemma 6 For any index i , set S of indices, and m satisfying 0 ≤ m ≤ n −|S | , − →m − → → − (hS ,i ◦ hS ). 0 ≤ gS ,i . 0 Proof. By induction on m . We consider three cases. C ASE i ∈ S : − →m hS ,i ◦ hS = { definition of h , since i ∈ S } − →m 0̇ ◦ hS = { 0̇ is left zero element of ◦ } 0̇ = { definition of g , since i ∈ S } gS ,i C ASE i 6∈ S ∧ m = 0 : − →m − → (hS ,i ◦ hS ). 0 = { exponentiation, since m = 0 } → − hS ,i . 0 = { definition of h , since i 6∈ S } → − fi . 0 →− − → → →− ≤ { monotonicity of fi , since 0 ≤ − gT . 0 } → − fi .(− g→ T. 0 ) = { definition of g , since i 6∈ S } → − gS ,i . 0 (4) KRML 118 / VK0099 / MSR-TR-2003-08, p.13 C ASE i 6∈ S ∧ m > 0 : It suffices to prove that the left-hand side of (4) is 0 whenever the right-hand side is 0. Therefore, we assume the latter to be 0: → − gS ,i . 0 = 0 (5) and prove the former to be 0: − →m − → (hS ,i ◦ hS ). 0 = { definition of h , since i 6∈ S } − →m − → (fi ◦ hS ). 0 = { exponentiation, since m > 0 } − →m−1 − → (fi ◦ (hS ,1 , . . . , hS ,n ) ◦ hS ). 0 − →m−1 → − = { distribute ◦ hS and . 0 } − →m−1 − − →m−1 − → → fi .((hS ,1 ◦ hS ). 0 , . . . , (hS ,n ◦ hS ). 0 ) ≤ { (6), see below; and monotonicity of fi } → − → − fi .(gT ,1. 0 , . . . , gT ,n . 0 ) = → − (fi ◦ − g→ T ). 0 = { definition of g , since i 6∈ S } → − gS ,i . 0 = { assumption (5) } 0 In this calculation, we used the following fact: for every index j , − →m−1 − → → − (hS ,j ◦ hS ). 0 ≤ gT ,j . 0 (6) which we now prove. We divide the proof of (6) up into two sub-cases. − →m−1 − → S UB - CASE (hS ,j ◦ hS ). 0 = 0 : Formula (6) follows immediately. − →m−1 − → S UB - CASE (hS ,j ◦ hS ). 0 6= 0 : First, we derive some consequences of assumption (5): → − gS ,i . 0 = 0 ⇒ { induction hypothesis with S , i , m := S , i , m − 1 } − →m−1 − → (hS ,i ◦ hS (7) ). 0 = 0 = { definition of h , since i 6∈ S } − →m−1 − → (fi ◦ hS ). 0 = 0 ⇒ { Lemma 5 with m, p := m − 1, m − 1 } − →m−1 − − →m−1 − → → hS (8) . 0 = hT .0 KRML 118 / VK0099 / MSR-TR-2003-08, p.14 Now, calculating from the assumption we made in this sub-case: − →m−1 − → (hS ,j ◦ hS ). 0 6= 0 = { (7) } − →m−1 − → (hS ,j ◦ hS ). 0 6= 0 ∧ i 6= j ⇒ { i 6= j , so j ∈ S ≡ j ∈ T , so hS ,j = hT ,j } − →m−1 − → (hT ,j ◦ hS ). 0 6= 0 = { (8) } − →m−1 − → (hT ,j ◦ hT ). 0 6= 0 ⇒ { induction hypothesis with S , i , m := T , j , m − 1 } → − gT ,j . 0 6= 0 ⇒ (6) This concludes the proof of Lemma 6. And finally, the proof of the theorem: Proof of Theorem 1. The proof is a ping-pong argument. → − → − g∅ . 0 → − ≤ { Corollary 3 } →n − − → f .0 —ping! = { exponentiation, since n ≥ 1 } →n−1 − − → ((f1 , . . . , fn ) ◦ f ). 0 →n−1 − → − = { distribute ◦ f and . 0 } →n−1 − − →n−1 − − → → ((f1 ◦ f ). 0 , . . . , (fn ◦ f ). 0 ) = { by definition of h , h∅,i = fi for each index i ; and → − − → thus also h∅ = f } →n−1 − − →n−1 − − → → ((h∅,1 ◦ h∅ ). 0 , . . . , (h∅,n ◦ h∅ ). 0 ) → − ≤ { Lemma 6 with S , i , m := ∅, i , n − 1 for each i } → − → − (g∅,1 . 0 , . . . , g∅,n . 0 ) → − = { distribute . 0 } → − → − g∅ . 0 —pong! 4 Related Work and Acknowledgments Our theorem has already found a use, namely in the translation of boolean programs into satisfiability formulas [3]. KRML 118 / VK0099 / MSR-TR-2003-08, p.15 Before we knew of the Bekić-Leszczyłowski Theorem, one of us (Kuncak) proved the theorem as detailed in Section 3. Tony Hoare then proposed a way to prove the theorem in a way that would eliminate recursive uses of variables, one by one. In doing this, Hoare also proved what essentially amounts to the BekićLeszczyłowski Theorem, appealing only to the Tarski Fixpoint Theorem [5]. We elaborated this format in Section 1, to whose formulation Carroll Morgan also contributed. We learnt about the Bekić-Leszczyłowski Theorem from Patrick Cousot. The theorem is often called simply the Bekić Theorem, but de Bakker [0] traces an independent proof thereof to Leszczyłowski. Finally, we are grateful for feedback from the Eindhoven Tuesday Afternoon Club and the participants of the IFIP WG 2.3 meeting in Biarritz, France (March 2003). References [0] J. de Bakker. Mathematical Theory of Program Correctness. Prentice-Hall, 1980. [1] Hans Bekić. Definable operation in general algebras, and the theory of automata and flowcharts. In Cliff B. Jones, editor, Programming Languages and Their Definition—Hans Bekić (1936–1982), volume 177 of Lecture Notes in Computer Science, pages 30–55. Springer, 1984. [2] Stephen Cole Kleene. Introduction to Metamathematics. D. Van Nostrand, New York, 1952. [3] K. Rustan M. Leino. A SAT characterization of boolean-program correctness. In Thomas Ball and Sriram K. Rajamani, editors, Model Checking Software, volume 2648 of Lecture Notes in Computer Science, pages 104–120. Springer, May 2003. [4] Jacek Leszczyłowski. A theorem on resolving equations in the space of languages. Bull. Acad. Polon. Sci., 19:967–970, 1971. [5] Alfred Tarski. A lattice-theoretical fixpoint theorem and its applications. Pacific Journal of Mathematics, 5:285–309, 1955.
6cs.PL
A Modular Structural Operational Semantics for Delimited Continuations Neil Sculthorpe Paolo Torrini Peter D. Mosses PL AN C OMP S Project Department of Computer Science Swansea University, UK [email protected] GRAC E FUL Project Department of Computer Science KU Leuven, Belgium [email protected] PL AN C OMP S Project Department of Computer Science Swansea University, UK [email protected] It has been an open question as to whether the Modular Structural Operational Semantics framework can express the dynamic semantics of call/cc. This paper shows that it can, and furthermore, demonstrates that it can express the more general delimited control operators control and shift. 1 Introduction Modular Structural Operational Semantics (MSOS) [25, 26, 27] is a variant of the well-known Structural Operational Semantics (SOS) framework [29]. The principal innovation of MSOS relative to SOS is that it allows the semantics of a programming construct to be specified independently of any semantic entities with which it does not directly interact. For example, function application can be specified by MSOS rules without mentioning stores or exception propagation. While it is known that MSOS can specify the semantics of programming constructs for exception handling [7, 8, 25], it has been unclear whether MSOS can specify more complex control-flow operators, such as call/cc [1, 9]. Indeed, the perceived difficulty of handling control operators has been regarded as one of the main limitations of MSOS relative to other modular semantic frameworks (e.g. [30, Section 2]). This paper demonstrates that the dynamic semantics of call/cc can be specified in MSOS, with no extensions to the MSOS framework required. We approach this by first specifying the more general delimited control operators control [18, 19, 34] and shift [12, 13, 14], and then specifying call/cc in terms of control. In contrast to most other operational specifications of control operators given in direct style (e.g. [18, 22, 24, 33]), ours is based on labelled transitions, rather than on evaluation contexts. We will begin by giving a brief overview of delimited continuations (Section 2) and MSOS (Section 3). The material in these two sections is not novel, and can be skipped by a familiar reader. We will then present our MSOS specification of the dynamic semantics of delimited control operators (Section 4). To ensure that our MSOS specification does indeed define the same control operators as described in the literature, we provide a proof of equivalence between our specification and one based on evaluation contexts (Section 5). 2 Delimited Continuations At any point in the execution of a program, the current continuation represents the rest of the computation. In a meta-language sense, a continuation can be understood as a context in which a program term can be evaluated. Control operators allow the current continuation to be treated as an object in the language, by reifying it as a first-class abstraction that can be applied and manipulated. The classic example of a control operator is call/cc [1, 9]. Olivier Danvy & Ugo de’Liguoro (Eds.): WoC’15 Postproceedings EPTCS 212, 2016, pp. 63–80, doi:10.4204/EPTCS.212.5 c Neil Sculthorpe, Paolo Torrini & Peter D. Mosses This work is licensed under the Creative Commons Attribution License. A Modular Structural Operational Semantics for Delimited Continuations 64 Delimited continuations generalise the notion of a continuation to allow representations of partial contexts, relying on a distinction between inner and outer context. Control operators that manipulate delimited continuations are always associated with control delimiters. The most well-known delimited control operators are control (associated with the prompt delimiter) [18, 19, 34] and shift (associated with the reset delimiter) [12, 13, 14], both of which can be used to simulate call/cc. The general idea of control and shift is to capture the current continuation up to the innermost enclosing delimiter, representing the inner context. We will give an informal description of control in this section. The formal MSOS specification of control is given in Section 4, where we also specify shift and call/cc in terms of control. control is a (call-by-value) unary operator that takes a higher-order function f as its argument, where f expects a reified continuation as its argument. When executed, control reifies the current continuation, up to the innermost enclosing prompt, as a function k. That inner context is then discarded and replaced with the application f k. Other than its interaction with control, prompt is simply a unary operator that evaluates its argument and returns the resulting value. Let us consider some examples. In the following expression, the continuation k is bound to the function (λ x. 2 ∗ x), the result of the prompt application is 14, and the expression evaluates to 15: 1 + prompt(2 ∗ control(λ k. k 7)) ❀ 15 A reified continuation can be applied multiple times, for example: 1 + prompt(2 ∗ control(λ k. k(k 7))) 29 ❀ Furthermore, a continuation need not be applied at all. For example, in the following expression, the multiplication by two is discarded: 1 + prompt(2 ∗ control(λ k. 7)) ❀ 8 In the preceding examples, the continuation k could have been computed statically. However, in general, the current continuation is the context at the point in a program’s execution when control is executed, by which time some of the computation in the source program may already have been performed. For example, the following program will print ABB: prompt( print ′ A′ ; control(λ k. (k () ; k ())) ; print ′ B′ ) ABB The command (print ′ A′ ) is executed before the control operator, so does not form part of the continuation reified by control. In this case, k is bound to (λ x. (x ; print ′ B′ )), and so B is printed once for every application of k. Further examples of control can be found in the online test suite accompanying this paper [32], and in the literature [18, 19]. 3 Modular SOS The rules in this paper will be presented using Implicitly Modular SOS (I-MSOS) [27], a variant of MSOS that has a notational style similar to conventional SOS. I-MSOS can be viewed as syntactic sugar for MSOS. We assume the reader is familiar with SOS (e.g. [3, 29]) and the basics of MSOS [25, 26, 27]. The key notational convenience of I-MSOS is that any semantic entities (e.g. stores or environments) that are not mentioned in a rule are implicitly propagated between the premise(s) and conclusion, allowing entities that do not interact with the programming construct being specified to be omitted from Neil Sculthorpe, Paolo Torrini & Peter D. Mosses 65 the rule. Two types of semantic entities are relevant to this paper: inherited entities (e.g. environments), which, if unmentioned, are implicitly propagated from the conclusion to the premises, and observable entities (emitted signals, e.g. exceptions), which, if unmentioned, are implicitly propagated from a sole premise to the conclusion. Observable entities are required to have a default value, which is implicitly used in the conclusion of rules that lack a premise and do not mention the entity. Note that by premise, we refer specifically to a transition of the → relation, not any side conditions on the rule (which, for notational convenience, we also write above the line). To demonstrate the specification of control operators using I-MSOS rules, this paper will use the funcon framework [8]. This framework contains an open collection of modular fundamental constructs (funcons), each of which has its semantics specified independently by I-MSOS rules. Funcons facilitate formal specification of programming languages by serving as a target language for a specification given by an inductive translation, in the style of denotational semantics. However, this paper is not concerned with the translation of control operators from any specific language: our aim is to give MSOS specifications of control operators, and the funcon framework is a convenient environment for specifying prototypical control operators. Examples of translations into funcons can be found in [8, 28]. We will now present some examples of funcons, and their specifications as small-step I-MSOS rules. No familiarity with the funcon framework is required: for the purposes of understanding this paper the funcons may simply be regarded as abstract syntax. We typeset funcon names in bold, meta-variables in Capitalised Italic, and the names of semantic entities in sans-serif. When we come to funcons for control operators, we will continue to use italic when referring to the control operator in general, and bold when referring to the funcon specifically. Figure 1 presents I-MSOS rules for the exception-handling funcons throw and catch [8]. The idea is that throw emits an exception signal, and catch detects and handles that signal. The first argument of catch is the expression to be evaluated, and the second argument (a function) is the exception handler. Exception signals use an observable entity named exc, which is written as a label on the transition arrow. The exc entity has either the value none, denoting the absence of an exception, or some(V ), denoting the occurrence of an exception with value V . The side condition val(V ) requires the term V to be a value, thereby controlling the order in which the rules can be applied. In the case of throw, first the argument is evaluated to a value (Rule 1), and then an exception carrying that value is emitted (Rule 2). In the case of catch, the first argument E is evaluated while no exception occurs (Rule 3). If an exception does occur, then the handler H is applied to the exception value and the computation E is abandoned (Rule 4). If E evaluates to a value V , then H is discarded and V is returned (Rule 5). Observe that rules 1 and 5 do not mention the exc entity. In Rule 1 it is implicitly propagated from premise to conclusion, and in Rule 5 it implicitly has the default value none. Also observe that none of the rules in Figure 1 mention any other entities such as environments or stores; any such entities are also implicitly propagated. exc none E −−−−−→ E ′ E → E′ throw(E) → throw(E ′ ) val(V ) exc some(V ) throw(V ) −−−−−−−→ stuck exc none (1) catch(E, H) −−−−−→ catch(E ′ , H) (3) exc some(V ) E −−−−−−−→ E ′ (2) exc none catch(E, H) −−−−−→ apply(H,V ) val(V ) catch(V, H) → V Figure 1: I-MSOS rules for exception handling. (4) (5) A Modular Structural Operational Semantics for Delimited Continuations 66 ρ (I) = V env ρ ⊢ bv(I) → V env ρ ⊢ lambda(I, E) → closure(ρ , I, E) val(closure(ρ , I, E)) E1 → E1′ apply(E1 , E2 ) → apply(E1′ , E2 ) (9) val(V ) E → E′ apply(V, E) → apply(V, E ′ ) (10) val(V1 ) val(V2 ) apply(closure(ρ , I,V1 ),V2 ) → V1 (11) (6) (7) (8) val(V ) env ({I 7→ V }/ρ ) ⊢ E → E ′ env ⊢ apply(closure(ρ , I, E),V ) → apply(closure(ρ , I, E ′ ),V ) (12) Figure 2: I-MSOS rules for call-by-value lambda calculus. Figure 2 presents I-MSOS rules for identifier lookup (bv, “bound-value”), abstraction (lambda), and application (apply). Note that the closure funcon is a value constructor [7] (specified by Rule 8), and thus has no transition rules of its own. We present these rules here for completeness, as these funcons will be used when defining the semantics of control operators in Section 4. Again, observe that rules 9–11 do not mention the environment env; it is propagated implicitly. Furthermore, consider that none of the rules in Figure 1 mention the environment env, and none of the rules in Figure 2 mention the exc signal. However, the modular nature of I-MSOS specifications allows the two sets of rules to be combined without modification, with implicit propagation handling the unmentioned entities. For comparison, in Figure 3 we present a conventional SOS specification of this call-by-value lambda calculus combined with exception handling, in which both semantic entities are mentioned explicitly in every rule. ρ (I) = V exc none env ρ ⊢ bv(I) −−−−−→ V exc X env ρ ⊢ E −−−→ E ′ exc X env ρ ⊢ throw(E) −−−→ throw(E ′ ) exc none env ρ ⊢ lambda(I, E) −−−−−→ closure(ρ , I, E) val(V ) exc X env ρ ⊢ E1 −−−→ E1′ exc some(V ) env ρ ⊢ throw(V ) −−−−−−−→ stuck exc X env ρ ⊢ apply(E1 , E2 ) −−−→ apply(E1′ , E2 ) exc none env ρ ⊢ E −−−−−→ E ′ exc none env ρ ⊢ catch(E, H) −−−−−→ catch(E ′ , H) exc some(V ) env ρ ⊢ E −−−−−−−→ E ′ exc none env ρ ⊢ catch(E, H) −−−−−→ apply(H,V ) val(V ) exc none env ρ ⊢ catch(V, H) −−−−−→ V exc X env ρ ⊢ E −−−→ E ′ val(V ) exc X env ρ ⊢ apply(V, E) −−−→ apply(V, E ′ ) val(V ) exc X env ({I 7→ V }/ρ ) ⊢ E −−−→ E ′ exc X env ⊢ apply(closure(ρ , I, E),V ) −−−→ apply(closure(ρ , I, E ′ ),V ) val(V1 ) val(V2 ) exc none env ρ ⊢ apply(closure(ρ , I,V1 ),V2 ) −−−−−→ V1 Figure 3: SOS rules for lambda calculus with exception handling. Neil Sculthorpe, Paolo Torrini & Peter D. Mosses 4 67 I-MSOS Specifications of Control Operators We now present a dynamic semantics for control operators in the MSOS framework. We specify control and prompt directly, and then specify shift, reset and call/cc in terms of control and prompt. Our approach is signal-based in a similar manner to the I-MSOS specifications of exceptions (Figure 1): a control operator emits a signal when executed, and a delimiter catches that signal and handles it. Note that there is no implicit top-level delimiter around a funcon program—a translation to funcons from a language that does have an implicit top-level delimiter should insert an explicit top-level delimiter. 4.1 Overview of our Approach Whether the semantics of control operators can be specified using MSOS has been considered an open problem ([30, Section 2]). We suspect that this is because there is no explicit representation of a term’s context in the MSOS framework—any given rule only has access to the current subterm and the contents of any semantic entities—so it is not immediately obvious how to capture the context as an abstraction. Our approach is to construct the current continuation of a control operator in the rule for its enclosing delimiter. We achieve this by exploiting the way that a small-step semantics, for each step of computation, builds a derivation tree from the root of the program term to the current operation. Thus, for any step at which a control operator is executed, not only will a rule for the control operator be part of the derivation, but so too will a rule for the enclosing delimiter. At each such step, the current continuation corresponds to an abstraction of the control operator (and its argument) from the subterm of the enclosing delimiter, and thus can be constructed from that subterm. We represent reified continuations as first-class abstractions, using the lambda funcon from Section 3. Constructing the abstraction is achieved in two stages: the rule for control replaces the occurrence of control (and its argument) with a fresh identifier, and the rule for prompt constructs the abstraction from the updated subterm. At a first approximation, this suggests the following rules: fresh-id(I) ctrl some(F,I) (13) control(F) −−−−−−−−→ bv(I) ctrl some(F,I) E −−−−−−−−→ E ′ ctrl none K = lambda(I, E ′ ) (14) prompt(E) −−−−−→ prompt(apply(F, K)) The side condition fresh-id(I) requires that the identifier I introduced by this rule does not already occur in the program. Rule 13 replaces the term control(F) with bv(I), and emits a signal (ctrl) containing the function F and the identifier I. The signal is then caught and handled by prompt in Rule 14. The abstraction K representing the continuation of the executed control operator is constructed by combining I with the updated subterm E ′ (which will now contain bv(I) in place of control(F)). 4.2 The Auxiliary Environment There is one problem with the approach we have just outlined, which is that the identifier I is introduced dynamically when the control operator executes, by which time closures may have already formed. In particular, if control occurs inside the body of a lambda, and the enclosing prompt is outside that lambda, then the bv(I) funcon would be introduced inside a closure that has already formed, and hence A Modular Structural Operational Semantics for Delimited Continuations 68 does not contain a binding for I. For example, consider the evaluation of the following term: prompt(lambda(x, control(lambda(k, bv(k))))) → { by (7) } prompt(closure(0, / x, control(lambda(k, bv(k))))) → { by (14) } prompt(apply(lambda(k, bv(k)), lambda(i, closure(0, / x, bv(i))))) The occurrence of bv(i) is now inside a closure containing an empty environment. Were that closure to be applied (say if this was a subterm of a larger program), then the body of the closure would get stuck, as Rule 12 would provide an environment containing only x, which Rule 6 could not match. This problem arises as a consequence of our choice to specify the semantics of lambda calculus using environments and closures. If we had instead given a semantics using substitution, then this problem would not have arisen. However, we prefer to use environments because they enable a more modular specification: a substitution-based semantics requires substitution to be defined over every construct in the language. Moreover, environments allow straightforward semantics for dynamic scope. Our solution is to introduce an auxiliary environment that is not captured in closures. Figure 4 specifies aux-bv(I), which looks up the identifier I in this auxiliary environment, and aux-let-in(I,V, E), which binds the identifier I to the value V in the auxiliary environment and scopes that binding over the expression E. We make use of these funcons in the next subsection, where we give our complete specification of control and prompt. µ (I) = V aux-env µ ⊢ aux-bv(I) → V (15) E1 → E1′ aux-let-in(I, E1 , E2 ) → aux-let-in(I, E1′ , E2 ) (16) val(V ) aux-env ({I 7→ V }/µ ) ⊢ E → E ′ aux-env µ ⊢ aux-let-in(I,V, E) → aux-let-in(I,V, E ′ ) (17) val(V1 ) val(V2 ) aux-let-in(I,V1 ,V2 ) → V2 (18) Figure 4: I-MSOS rules for bindings in the auxiliary environment. 4.3 Dynamic Semantics of control and prompt We specify control as follows: E → E′ control(E) → control(E ′ ) val(F) fresh-id(I) ctrl some(F,I) control(F) −−−−−−−−→ aux-bv(I) (19) (20) Neil Sculthorpe, Paolo Torrini & Peter D. Mosses 69 Rule 19, in combination with the val(F) premise on Rule 20, ensures that the argument function is evaluated to a closure before Rule 20 can be applied. Notice that Rule 20 uses aux-bv, in contrast to the preliminary Rule 13 which used bv. We then specify prompt as follows: val(V ) prompt(V ) → V (21) ctrl none E −−−−−→ E ′ ctrl none (22) prompt(E) −−−−−→ prompt(E ′ ) ctrl some(F,I) E −−−−−−−−→ E ′ K = lambda(I, aux-let-in(I, bv(I), E ′ )) ctrl none (23) prompt(E) −−−−−→ prompt(apply(F, K)) Rule 21 is the case when the argument is a value; the prompt is then discarded. Rule 22 evaluates the argument expression while no ctrl signal is being emitted by that evaluation. Rule 23 handles the case when a ctrl signal is detected, reifying the current continuation and passing it as an argument to the function F. Notice that, unlike in the preliminary Rule 14, I is rebound using aux-let-in. Rules 19–23 are our complete I-MSOS specification of the dynamic semantics of control and prompt, relying only on the existence of the lambda-calculus and auxiliary-environment funcons from figures 2 and 4. These rules are modular: they are valid independently of whether the control operators coexist with a mutable store, exceptions, input/output signals, or other semantic entities. Except for the use of an auxiliary environment, our rules correspond closely to those in specifications of control and prompt based on evaluation contexts [18, 24]. However, our rules communicate between control and prompt by emitting signals, and thus do not require evaluation contexts. In Section 5, we present a proof of equivalence between our specification and a conventional one based on evaluation contexts. 4.4 Dynamic Semantics of shift and reset The shift operator differs from control in that every application of a reified continuation is implicitly wrapped in a delimiter, which has the effect of separating the context of that application from its inner context [5]. This difference between control and shift is analogous to that between dynamic and static scoping, insofar as with shift, the application of a reified continuation cannot access its context, in the same way that a statically scoped function cannot access the environment in which it is applied. A shift funcon can be specified in terms of control as follows: E → E′ shift(E) → shift(E ′ ) val(F) fresh-id(K) fresh-id(X ) shift(F) → control(lambda(K, apply(F, lambda(X , reset(apply(bv(K), bv(X ))))))) (24) (25) The key point is the insertion of the reset delimiter; the rest of the lambda-term is merely an η -expansion that exposes the application of the continuation K so that the delimiter can be inserted (following [5]). Given this definition of shift, the reset delimiter coincides exactly with prompt: reset(E) → prompt(E) (26) A Modular Structural Operational Semantics for Delimited Continuations 70 Alternatively, the insertion of the extra delimiter could be handled by the semantics of reset rather than that of shift: val(V ) (27) reset(V ) → V ctrl none E −−−−−→ E ′ (28) ctrl none reset(E) −−−−−→ reset(E ′ ) ctrl some(F,I) E −−−−−−−−→ E ′ K = lambda(I, reset(aux-let-in(I, bv(I), E ′ ))) ctrl none (29) reset(E) −−−−−→ reset(apply(F, K)) The only difference between rules 21–23 and rules 27–29 (other than the funcon names) is the definition of K in Rule 29, which here has a delimiter wrapped around the body of the continuation. Given this definition of reset, the shift operator now coincides exactly with control: shift(E) → control(E) (30) This I-MSOS specification in Rules 27–30 is similar to the evaluation-context based specification of shift and reset in [24, Section 2]. 4.5 Dynamic Semantics of abort and call/cc The call/cc operator is traditionally undelimited: it considers the current continuation to be the entirety of the rest of the program. In a setting with delimited continuations, this can be simulated by requiring there to be a single delimiter, and for it to appear at the top-level of the program. Otherwise, the two distinguishing features of call/cc relative to control and shift are first that an applied continuation never returns, and second that if the body of call/cc does not invoke a continuation, then the current continuation is applied to the result of the call/cc application when it returns. To specify call/cc, we follow Sitaram and Felleisen [34, Section 3] and first introduce an auxiliary operator abort, and then specify call/cc in terms of control, prompt and abort. The purpose of abort is to terminate a computation (up to the innermost enclosing prompt) with a given value: E → E′ abort(E) → abort(E ′ ) (31) val(V ) fresh-id(I) abort(V ) → control(lambda(I,V )) (32) We achieve the first distinguishing feature of call/cc by placing an abort around any application of a continuation (preventing it from returning a value), and we achieve the second by applying the continuation to the result of the F application (which resumes the current continuation if F returns a value): E → E′ callcc(E) → callcc(E ′ ) val(F) fresh-id(K) fresh-id(X ) callcc(F) → control(lambda(K, apply(bv(K), apply(F, lambda(X , abort(apply(bv(K), bv(X )))))))) (33) (34) Neil Sculthorpe, Paolo Torrini & Peter D. Mosses 71 4.6 Other Control Effects In Section 3 we presented a direct specification of exception handling using a dedicated semantic entity. If throw and catch (Figure 1) were used in a program together with the control operators from this section, this would give rise to two sets of independent control effects, each with independent delimiters. An alternative would be to specify exception handling indirectly in terms of the control operators (e.g. following Sitaram and Felleisen [34]), in which case the delimiters and semantic entity would be shared. MSOS can specify either approach, as required by the language being specified. Beyond the control operators discussed in this section, further and more general operators for manipulating delimited continuations exist, such as those of the CPS hierarchy [13]. These are beyond the scope of this paper, and remain an avenue for future work. 5 Adequacy Our SOS model of call-by-value lambda calculus extended with delimited control, which we have presented using I-MSOS rules, is provably equivalent to one based on the reduction semantics (RS) of lambda terms where the evaluation strategy is specified using evaluation contexts. Reduction models for delimited control based on evaluation contexts were originally introduced in [18] and refined in [24]. The adequacy proof in this section (Prop. 8) is carried out with respect to our version of those models in a formalism that we call RC. Our SOS model differs from reduction models in the framework it relies on. In particular, our SOS model uses environments and signals, whereas RC uses substitution and evaluation contexts. Moreover, there is a difference in the notion of value: in our SOS model function application is computed using closures, whereas RS uses β -reduction and substitution. In order to focus on the operational content of the models, it is convenient to get above these differences. We achieve this by embedding SOS in RS with explicit congruence rules (an embedding that we call LS), and by lifting RC to an environment-based formalism (called LR). We define a notion of adequacy between two systems, as an input-output relation, parametric in a translation. We show adequacy of two systems by proving that they are derivationally equivalent (in the sense of a step-wise relation), reasoning by induction on the structure of derivations. Our adequacy proof for SOS and RC is split into three main parts: the equivalence of SOS and LS, of LS and LR, and of LR and RC. A more challenging approach would involve giving a formal derivation of an RC model from SOS along the lines of [11], but that goes beyond the scope of this paper. Here we intend to focus on equivalence with respect to delimited control. Given the equivalence between SOS and RC with respect to call-by-value lambda calculus (λV), we show that SOS and RC are equivalent with respect to the extension of λV with delimited control (λDC). More specifically, we define a syntactic representation of environments (standard and auxiliary ones) using contexts and lambda terms. We use this representation to define LS as a lambda-term encoding of SOS. Adequacy between SOS and LS is provable with respect to a simple translation relation. We define LR as an environment-based version of RC obtained by lambda-lifting. We consider two distinct extensions of the LR model of λV with delimited control. The first one, which we call LRDC, uses the lifted control rules of the original RC model, and thus equivalence with the RC model is straightforward. The second one, which we call LX-DC, uses the LS version of the SOS control rules. The difference between the LS model of λDC and LX-DC, which are provably equivalent, boils down to that between SOS transitions, based on congruence rules and also using closures, and RC transitions, based on evaluation contexts and using only lambda expressions. The adequacy of LX-DC and LR-DC, proved with respect to the identity translation (Prop. 7), gives us the result of primary interest. 72 A Modular Structural Operational Semantics for Delimited Continuations 5.1 Reduction Semantics Our presentation of reduction semantics with evaluation contexts (RC) follows the main lines of the λDC model in [24]. Under the assumption that we only evaluate closed expressions, values and terms can be defined as follows: V = lambda(I, E) (35) E = V | bv(I) | apply(E, E) | control(E) | prompt(E) (36) A general notion of a context as a term with a hole can be defined by the following grammar: C = [] | lambda(I,C) | apply(C, E) | apply(E,C) | prompt(C) | control(C) (37) The call-by-value (CBV) evaluation strategy can be specified using the more restrictive notion of a CBV context (Q): Q = [] | apply(Q, E) | apply(V, Q) | prompt(Q) | control(Q) (38) In order to represent delimited continuations, an even more restrictive notion is needed: a pure context (P-context), which is a CBV-context that does not include control delimiters [24]: P = [] | apply(P, E) | apply(V, P) | control(P) (39) The meta-linguistic notation C[E] (Q[E], P[E]) is used to represent a term factored into a context and the subterm that fills the hole—we can think of this as a form of term annotation. This factorisation is unique for the cases that we are considering. The only reduction rules needed to specify λV are β -reduction and context propagation. These can be presented as follows (giving us the RC-V model), using { 7→ } as meta-level notation for captureavoiding uniform substitution: apply(lambda(I, E),V ) −→ E{bv(I) 7→ V } (40) E −→ E ′ Q[E] −→ Q[E ′ ] (41) The reduction rules for prompt and control can be formulated as follows (giving us the RC-DC model), making use of P-contexts: prompt(V ) −→ V (42) val(F) K = lambda(I, P[bv(I)]) fresh-id(I) prompt(P[control(F)]) −→ prompt(apply(F, K)) (43) In a system based on reduction semantics, observational equivalence can be defined as the smallest congruence relation ≡ on terms that extends reduction equivalence with functional extensionality, i.e. such that ∀ V. apply(F,V ) ≡ apply(F ′ ,V ) F ≡ F′ In presenting models based on RS, we typeset all construct names in sans-serif. We refer to SOS values as ValSOS and to RC ones as ValRC . When needed, we subscript −→ and ≡ accordingly. We define derivational equivalence and adequacy with respect to a translation relation (not mentioned in the case that it is an identity), as follows. Neil Sculthorpe, Paolo Torrini & Peter D. Mosses 73 Def. 1 Given two systems A and B, respectively defined on languages LA and LB with values ValA and ValB , and a one-to-one relation R ⊆ (LA , LB ), we say that 1. A and B are adequate with respect to R (A ∼R B) whenever the following hold: A) If E −→∗A V , with V ∈ ValA , then there exist Ea′ , Ea′′ ∈ LA , Eb′ , Eb′′ ∈ LB , V ′ ∈ ValB s.t. E ≡A Ea′ , V ≡A Ea′′ , R(Ea′ , Eb′ ), R(Ea′′ , Eb′′ ), Eb′′ ≡B V ′ and Eb′ −→∗B V ′ B) If E −→∗B V , with V ∈ ValB , then there exist Ea′ , Ea′′ ∈ LA , Eb′ , Eb′′ ∈ LB , V ′ ∈ ValA s.t. E ≡B Eb′ , V ≡B Eb′′ , R(Ea′ , Eb′ ), R(Ea′′ , Eb′′ ), Ea′′ ≡A V ′ and Ea′ −→∗B V ′ 2. A and B are derivationally equivalent with respect to R whenever the following hold: A) E1 −→A E2 whenever there exist E3 , E4 , E1′ , E2′ , E3′ , E4′ s.t. E1 ≡A E3 , E2 ≡A E4 , R(E3 , E3′ ), R(E4 , E4′ ), E3′ ≡B E1′ , E4′ ≡B E2′ and E1′ −→∗B E2′ B) E1 −→B E2 whenever there exist E3 , E4 , E1′ , E2′ , E3′ , E4′ s.t. E1 ≡B E3 , E2 ≡B E4 , R(E3′ , E3 ), R(E4′ , E4 ), E3′ ≡A E1′ , E4′ ≡A E2′ and E1′ −→∗A E2′ We define relational composition as R1 ◦ R2 = λ xy. ∃z. R1 (x, z) ∧ R2 (z, y). 5.2 Representing SOS as LS In this section we define LS, as an encoding of SOS in lambda terms. Unlike reduction semantics, our SOS models rely internally on a linguistic extension to account for closures and the auxiliary environment notation. For this reason, we need an extended internal language, including the following additional constructs: closure(ρ , I, E) for closures, aux-bv(I) for auxiliary identifier lookup, and aux-let-in(I, E, E) for auxiliary let bindings; these constructs are not meant to be included in the source language definition. In each expression aux-let-in(I, E, E ′ ), we require I to be used at most once in E ′ . In order to represent environments, we introduce a notion of R-context: R = [] | apply(lambda(I, R),V ) (44) We tacitly assume that all bound variables in R are distinct. Each SOS transition specified by env ρ ⊢ E −→ E ′ can be embedded as Rρ [E] −→ Rρ [E ′ ] where, for ρ = {I1 7→ V1 , . . . , In 7→ Vn }, Rρ = apply(lambda(In , (. . . , apply(lambda(I1 , []),V1 ), . . .)),Vn ). We silently assume permutation in R-contexts. We introduce M-contexts to represent the auxiliary environment, in a similar manner to R-contexts, though using aux-let-in. In order to represent signals, we extend this notion to one of S-context, introducing a new ternary value constructor ctrl, which is not part of the expression definition but only of the RS representation of SOS. M = [] | aux-let-in(I,V, M) (45) S = M | ctrl(V, I, M) (46) SOS transitions specified by ctrl none A) aux-env µ , env ρ ⊢ E −−−−−→ E ′ ctrl some(F,I) B) aux-env µ , env ρ ⊢ E −−−−−−−−→ E ′ can be represented, respectively, as A) Mµ [Rρ [E]] −→ Mµ [Rρ [E ′ ]] B) Mµ [Rρ [E]] −→ ctrl(F, I, Mµ [Rρ [E ′ ]]) A Modular Structural Operational Semantics for Delimited Continuations 74 where, for µ = {I1 7→ V1 , . . . , In 7→ Vn }, Mµ = aux-let-in(In ,Vn , . . . aux-let-in(I1 ,V1 , [])). We assume that S-bound variables are distinct from each other and from all the R-bound ones. As with R-contexts, we silently assume permutation for M-contexts. In this way, we define a one-to-one translation relation T( , ) between SOS configurations and LS expressions. Applying the translation to the SOS rules gives us the LS models for λV and λDC (resp. LS-V and LS-DC). In particular, the rule for bv, which uses the environment, can be expressed as follows: S[apply(lambda(I, R[bv(I)]),V )] −→ S[apply(lambda(I, R[V ]),V )] (47) The aux-bv rule, which uses the auxiliary environment, takes the following form: aux-let-in(I,V, M[R[aux-bv(I)]]) −→ aux-let-in(I,V, M[R[V ]]) (48) The LS model for λDC extends LS-V with three more rules: the SOS rule for control, val(F) fresh-id(I) M[R[control(F)]] −→ ctrl(F, I, M[R[aux-bv(I)]]) (49) an additional congruence rule (which can only match Rule 49), M[R[E]] −→ ctrl(F, I, M[R[E ′ ]]) M[R[P[E]]] −→ ctrl(F, I, M[R[P[E ′ ]]]) (50) and an encoding of the SOS rule for control-in-prompt (Rule 23). M[R[E]] −→ ctrl(F, I ′ , M[R[E ′ ]]) K = lambda(I, aux-let-in(I ′ , bv(I), E ′ )) M[R[prompt(E)]] −→ M[R[prompt(apply(F, K)]] fresh-id(I) (51) Since there is a one-to-one correspondence between LS and SOS transitions (treating R- and Mpermutations as silent transitions), and taking for simplicity the identity relation modulo reordering of the environments as observational equivalence in SOS, the following is straightforward. Prop. 1 The LS model of λV and the corresponding SOS one are derivationally equivalent and adequate with respect to the translation T , and similarly for the LS and SOS models of λDC. Proof: First we prove derivational equivalence, which is straightforward for λV. The LS control rules correspond to the SOS ones, given the representation of the auxiliary environments and signals. Adequacy follows as the definition of value is the same in all these systems. 5.3 Lifting RC to LR To facilitate comparison with LS, we define LR as an environment-based version of RC, using R- and M-contexts to represent environments as in LS, and also extend the language with aux-let-in and closure. In the LR models, the reduction rules can be specified as in RC, relying on evaluation contexts. For the way aux-let-in and closure are used, no change is needed in the definition of context. However, since reduction steps now have to be lifted by R- and M-contexts, we replace the single context propagation rule that sufficed in RC with the four following rules: lifting, lifted congruence and R- and M-lowering. Neil Sculthorpe, Paolo Torrini & Peter D. Mosses 75 E −→ E ′ M[R[E]] −→ M[R[E ′ ]] (52) M[R[E]] −→ M[R[E ′ ]] M[R[Q[E]]] −→ M[R[Q[E ′ ]]] (53) M[apply(lambda(I, R[E]),V )] −→ M[apply(lambda(I, R[E ′ ]),V )] M[R[apply(lambda(I, E),V )]] −→ M[R[apply(lambda(I, E ′ ),V )]] (54) aux-let-in(I,V, M[R[E]]) −→ aux-let-in(I,V, M[R[E ′ ]]) M[R[aux-let-in(I,V, E)]] −→ M[R[aux-let-in(I,V, E ′ )]] (55) We assume that LR models include R- and M-permutations, as well as the bv and aux-bv rules, and Rule 50. Notice that evaluation can also apply to open terms, however we do not need to change our definition of value, as substitution of free variables is dealt with as in LS, by the bv rule. We also need the following rule to deal with closures: ρ = {I1 7→ V1 , . . . In 7→ Vn } free-vars(E) ⊆ {I1 , . . . , In } closure(ρ , I, E) −→ apply(lambda(In , (. . . , apply(lambda(I1 , lambda(I, E)),V1 ), . . .)),Vn ) (56) This gives us the LR model of λV (LR-V). We can extend this model with rules for delimited control in two ways: to simulate RC (LR-DC), or to simulate SOS (LX-DC). The LR-DC rules for prompt and control are those based on the RC one (i.e. they are the lifted version of Rules 42 and 43), and they do not involve any use of the auxiliary notation. LR-DC is the extension of LR-V with these rules. On the other hand, the LX-DC model is obtained by extending LR-V with the LS control rules (Rules 49 and 51, which rely on the auxiliary notation). The following can be proved for all the systems we are considering, i.e. with respect to ≡X where X ∈ {LS-V, LR-V, LS-DC, LX-DC, LR-DC}. Prop. 2 A) V ∈ ValSOS whenever there exists V ′ ∈ ValRC such that V ≡X V ′ . B) S[Rρ [apply(lambda(I, E),V1 )]] −→LS V2 with V1 ,V2 ∈ ValSOS whenever there exist V3 ,V4 ∈ ValRC such that S[[apply(closure(ρ , I, E),V3 )]] −→LR V4 , with V1 ≡X V3 and V2 ≡X V4 . The following provable equivalences correspond respectively to the bv rule, to β -reduction, and to aux-let-in elimination, for ≡X as before: apply(lambda(I, bv(I)),V ) ≡X apply(lambda(I,V ),V ) (57) apply(lambda(I, E),V ) ≡X E{bv(I) 7→ V } (58) aux-let-in(I,V, E) ≡X E{aux-bv(I) 7→ V } (59) The following can now be proved: Prop. 3 apply(lambda(I, aux-let-in(I ′ , bv(I), P[aux-bv(I ′ )])),V ) ≡X apply(lambda(I, P[bv(I)]),V ) Proof: apply(lambda(I, aux-let-in(I ′ , bv(I), P[aux-bv(I ′ )])),V ) ≡X aux-let-in(I ′ ,V, P[aux-bv(I ′ )]), by Equiv. 58. aux-let-in(I ′ ,V, P[aux-bv(I ′ )]) ≡X P[V ], by Equiv. 59, observing that aux-bv(I ′ ) cannot occur free in P, as it must be used at most once in P[aux-bv(I ′ )]. P[V ] ≡X apply(lambda(I, P[bv(I)]),V ), by Equiv. 58. The following is an immediate consequence of Prop. 3, applying functional extensionality. lambda(I, aux-let-in(I ′ , bv(I), P[aux-bv(I ′ )])) ≡X lambda(I, P[bv(I)]) (60) 76 A Modular Structural Operational Semantics for Delimited Continuations 5.4 Adequacy of SOS and RC We first show that the LR models and the RC ones are equivalent. Prop. 4 LR-V and RC-V are adequate, and so too are LR-DC and RC-DC. Proof: The language of RC is included in that of LR, hence we can take the identity on RC (denoted by IdRC ) as the translation. The LR models can be obtained by a lambda-lifting refactoring of the RC models, and this gives equivalent systems, under a change of the evaluation strategy that affects only the top level. We prove derivational equivalence by induction on the structure of derivations, relying on Equiv. 59 and Rule 56 to eliminate the additional LR syntax, observing that aux-let-in and closure are inessential in LR-DC (they can only be eliminated without leading to any new values). Adequacy follows immediately as values are defined in the same way in the two systems. We consider the relationship between the different representations of λV. Prop. 5 The LS model of λV and the corresponding LR one are adequate. Proof: The two models use the same language, hence we can take the identity translation. They differ on congruence rules and reduction of function application. Congruence rules in LR are expressed using CBV-contexts, unlike in LS, but both are equivalent specifications of CBV. For equivalence with respect to values and function application, we rely on Prop. 2. We extend this result to SOS-style delimited control. Prop. 6 LS-DC and LX-DC are adequate. Proof: We first prove derivational equivalence with respect to identity using Prop. 5 and the fact that the two extensions are obtained by adding the same rules. We finally compare SOS-style and RC-style delimited control. Prop. 7 LX-DC and LR-DC are derivationally equivalent and adequate. Proof: We prove derivational equivalence by induction on the structure of derivations, with respect to the identity translation. The two systems are equivalent up to λV by Prop. 4, so the only interesting case is delimited control, in which respect LX-DC stepwise behaves as LS-DC. The lifted version of the RC prompt rule (Rule 42) is in both systems. Rules 49 and 50 can be added to LR-DC without expanding the set of derivable values. Thus the only possible difference between the two systems is between the natural LR control rule (the lifted version of Rule 43) of LR-DC, and the LS control-in-prompt rule (Rule 51) of LX-DC. We now show that the two rules are interderivable (i.e. given the system with one rule, the other one is derivable). First we observe that, by Eq. 60, the specification of the continuation K in either rule is equivalent to that in the other, and therefore interchangeable. From S to R: in order to derive the LR-DC rule from the LX-DC one, we observe that a lifted expression M[R[P[control(F)]]], where F is a value, can be reduced to ctrl(F, I, M[R[P[aux-bv(I)]]]) in LX-DC, using the control rule (Rule 49), and the applicable congruence rule (Rule 50). This gives us the premise for the application of the LX-DC control-in-prompt rule to M[R[prompt(P[control(F)])]] in a way that simulates the LR-DC control rule. From R to S: in LX-DC (as in LS-DC) a one-step transition from M[R[E]] to ctrl(F, I, M[R[E ′ ]]) is only possible provided E ≡ P[control(F)] and E ′ ≡ P[aux-bv(I)] for some P (possibly relying on the conversion of closures to function applications). Therefore, the LR-DC control rule can be applied to M[R[prompt(E)]] to simulate Rule 51. Neil Sculthorpe, Paolo Torrini & Peter D. Mosses 77 Diagramatically, the overall proof can be presented as follows (where vertical arrows denote model inclusion). SOS-DC ∼T LS-DC ∼Id LX-DC ∼Id LR-DC ∼IdRC RC-DC ↑ ↑ ↑ ↑ ↑ SOS-V ∼T LS-V ∼Id LR-V = LR-V ∼IdRC RC-V Prop. 8 SOS-DC and RC-DC are derivationally equivalent and adequate with respect to T ◦ IdRC Proof: based on Props. 1, 4, 6, 7, using the fact that adequacy is transitive, by composition of the translation relations, and by transitivity of observational equivalence. 6 Related Work A direct way to specify control operators is by giving an operational semantics based on transition rules and first-class continuations. We have taken this direct approach, though in contrast to most direct specifications of control operators (e.g. [18, 22, 23, 24, 30, 33]) our approach is based on emitting signals via labelled transitions rather than on evaluation contexts. Control operators can also be given a denotational semantics by transformation to continuation-passing style (CPS) [12, 16, 31, 33], or a lower-level operational specification by translation to abstract-machine code [6, 19]. At a higher level, algebraic characterisations of control operators have been given in terms of equational theories [18, 23]. Denotationally, any function can be rewritten to CPS by taking the continuation (itself represented as a function) as an additional argument, and applying that continuation to the value the function would have returned. A straightforward extension of this transformation [13] suffices to express call/cc, shift and reset; however, more sophisticated CPS transformations are needed to express control and prompt [33]. Felleisen’s [19] initial specification of control and prompt used a small-step operational semantics without evaluation contexts. However, this specification otherwise differs quite significantly from ours, being based on exchange rules that push control outwards through the term until it encounters a prompt. As an exchange rule has to be defined for every other construct in the language, this approach is inherently not modular. Later specifications of control and prompt used evaluation contexts and algebraic characterisations based on the notion of abstract continuations [18], where continuations are represented as evaluation contexts and exchange rules are not needed. Felleisen [19] also gave a lower-level operational specification based on the CEK abstract machine, where continuations are treated as frame stacks. The shift and reset operators were originally specified denotationally, in terms of CPS semantics [12, 13]. Continuations were treated as functions, relying on the meta-continuation approach [12] which distinguishes between outer and inner continuations. Correspondingly, the meta-continuation transformation produces abstractions that take two continuation parameters, which can be further translated to standard CPS. A big-step style operational semantics for shift has been given by Danvy and Yang [15], and a specification based on evaluation contexts has been given by Kameyama and Hasegawa [23], together with an algebraic characterisation. Giving a CPS semantics to control is significantly more complex than for shift [33]. This is because the continuations reified by shift are always delimited when applied, and so can be treated as functions, which is not the case for control. Different approaches to this problem have been developed, including abstract continuations [18], the monadic framework in [16], and the operational framework in [6]. Relying on the introduction of recursive continuations, Shan [33] provides an alternative approach based on a refined CPS transform. Conversely, the difference between control and shift can manifest itself A Modular Structural Operational Semantics for Delimited Continuations 78 quite intuitively in the direct specification of these operators—whether in our I-MSOS specifications (Section 4.4), or in specifications using evaluation contexts [18, 23, 24, 33]. As shown by Filinski [20], shift can be implemented in terms of call/cc and mutable state, and from the point of view of expressiveness, any monad that is functionally expressible can be represented in lambda calculus with shift and reset. Moreover, control and shift are equally expressive in the untyped lambda calculus [33]. A direct implementation of control and shift has been given by Gasbichler and Sperber [21]. A CPS-based implementation of control operators in a monadic framework has been given by Dyvbig et al [16]. A semantics of call/cc based on an efficient implementation of evaluation contexts is provided in the K Framework [30]. 7 Conclusion We have presented a dynamic semantics for control operators in the MSOS framework, settling the question of whether MSOS is expressive enough for control operators. Our definitions are concise and modular, and do not require the use of evaluation contexts. Definitions based on evaluation contexts are often even more concise than the corresponding MSOS definitions, since a single alternative in a contextfree grammar for evaluation contexts subsumes an entire MSOS rule allowing evaluation of a particular subexpression. However, such grammars are significantly less modular than MSOS rules: adding a new control operator to a specified language may require duplication of a (potentially large) grammar [17, e.g. pages 141–142]. (This inherent lack of modularity of evaluation context grammars is addressed in the PLT Redex tools by the use of ellipsis.) We initially validated our specifications through a suite of 70 test programs, which we accumulated from examples in the literature on control operators ([1, 2, 4, 6, 9, 10, 12, 18, 19, 22, 33]). The language we used for testing was Caml Light, a pedagogical sublanguage of a precursor to OCaml, for which we have an existing translation to funcons from a previous case study [8]. We extended Caml Light with control operators, and specified the semantics of those operators as direct translations into the corresponding funcons presented in this paper. The generated funcon programs were then tested by our prototype funcon interpreter, which directly interprets their I-MSOS specifications. The suite of test programs, and our accompanying translator and interpreter, are available online [32]. While the test programs demonstrated that we had successfully specified a control operator that behaves very similarly to the operator control described in the literature, they did not prove that we had specified exactly the same operator. We addressed this in Section 5, where we proved that our MSOS specification is equivalent to a conventional specification using a reduction semantics based on evaluation contexts (e.g. [18, 24]). Acknowledgments: We thank Casper Bach Poulsen, Ferdinand Vesely and the anonymous reviewers for feedback on earlier versions of this paper. We also thank Martin Churchill for his exploratory notes on adding evaluation contexts to MSOS, and Olivier Danvy for suggesting additional test programs. The reported work was supported by EPSRC grant (EP/I032495/1) to Swansea University for the PL AN C OMP S project and by EU funding (Horizon 2020, grant 640954) to KU Leuven for the GRAC E FUL project. Neil Sculthorpe, Paolo Torrini & Peter D. Mosses 79 References [1] H. Abelson, R. K. Dybvig, C. T. Haynes, G. J. Rozas, N. I. Adams IV, D. P. Friedman, E. Kohlbecker, G. L. Steele Jr., D. H. Bartley, R. Halstead, D. Oxley, G. J. Sussman, G. Brooks, C. Hanson, K. M. Pitman & M. Wand (1998): Revised5 Report on the Algorithmic Language Scheme. Higher-Order and Symbolic Computation 11(1), pp. 7–105, doi:10.1023/A:1010051815785. [2] Kenichi Asai & Yukiyoshi Kameyama (2007): Polymorphic Delimited Continuations. In: Asian Symposium on Programming Languages and Systems, Lecture Notes in Computer Science 4807, Springer, pp. 239–254, doi:10.1007/978-3-540-76637-7 16. [3] Egidio Astesiano (1991): Inductive and Operational Semantics. In: Formal Description of Programming Concepts, IFIP State-of-the-Art Reports, Springer, pp. 51–136. ISBN 978-3-540-53961-2. [4] Malgorzata Biernacka, Dariusz Biernacki & Olivier Danvy (2005): An Operational Foundation for Delimited Continuations in the CPS Hierarchy. Logical Methods in Computer Science 1(2), pp. 1–39, doi:10.2168/LMCS-1(2:5)2005. [5] Dariusz Biernacki & Olivier Danvy (2006): A Simple Proof of a Folklore Theorem about Delimited Control. Journal of Functional Programming 16(3), pp. 269–280, doi:10.1017/S0956796805005782. [6] Dariusz Biernacki, Olivier Danvy & Chung-chieh Shan (2006): On the Static and Dynamic Extents of Delimited Continuations. Science of Computer Programming 60(3), pp. 274–297, doi:10.1016/j.scico.2006.01.002. [7] Martin Churchill & Peter D. Mosses (2013): Modular Bisimulation Theory for Computations and Values. In: International Conference on Foundations of Software Science and Computation Structures, Lecture Notes in Computer Science 7794, Springer, pp. 97–112, doi:10.1007/978-3-642-37075-5 7. [8] Martin Churchill, Peter D. Mosses, Neil Sculthorpe & Paolo Torrini (2015): Reusable Components of Semantic Specifications. In: Transactions on Aspect-Oriented Software Development XII, Lecture Notes in Computer Science 8989, Springer, pp. 132–179, doi:10.1007/978-3-662-46734-3 4. [9] William Clinger (1987): The Scheme Environment: Continuations. SIGPLAN Lisp Pointers 1(2), pp. 22–28, doi:10.1145/1317193.1317197. [10] Olivier Danvy (2006): An Analytical Approach to Programs as Data Objects. DSc thesis, Department of Computer Science, Aarhus University. Available at http://cs.au.dk/~danvy/DSc/. [11] Olivier Danvy (2008): Defunctionalized Interpreters for Programming Languages. In: International Conference on Functional Programming, ACM, pp. 131–142, doi:10.1145/1411204.1411206. [12] Olivier Danvy & Andrzej Filinski (1989): A Functional Abstraction texts. Technical Report 89/12, DIKU, University of Copenhagen. http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.43.4822. of Typed ConAvailable at [13] Olivier Danvy & Andrzej Filinski (1990): Abstracting Control. In: Conference on LISP and Functional Programming, ACM, pp. 151–160, doi:10.1145/91556.91622. [14] Olivier Danvy & Andrzej Filinski (1992): Representing Control: A Study of the CPS Transformation. Mathematical Structures in Computer Science 2(4), pp. 361–391, doi:10.1017/S0960129500001535. [15] Olivier Danvy & Zhe Yang (1999): An Operational Investigation of the CPS Hierarchy. In: European Symposium on Programming Languages and Systems, Lecture Notes in Computer Science 1576, Springer, pp. 224–242, doi:10.1007/3-540-49099-X 15. [16] R. Kent Dyvbig, Simon Peyton Jones & Amr Sabry (2007): A Monadic Framework for Delimited Continuations. Journal of Functional Programming 17(6), pp. 687–730, doi:10.1017/S0956796807006259. [17] Matthias Felleisen, Robert Bruce Findler & Matthew Flatt (2009): Semantics Engineering with PLT Redex. MIT Press. ISBN 9780262062756. [18] Matthias Felleisen, Mitch Wand, Daniel Friedman & Bruce Duba (1988): Abstract Continuations: A Mathematical Semantics for Handling Full Jumps. In: Conference on LISP and Functional Programming, ACM, pp. 52–62, doi:10.1145/62678.62684. 80 A Modular Structural Operational Semantics for Delimited Continuations [19] Mattias Felleisen (1988): The Theory and Practice of First-Class Prompts. In: Symposium on Principles of Programming Languages, ACM, pp. 180–190, doi:10.1145/73560.73576. [20] Andrzej Filinski (1994): Representing Monads. In: Symposium on Principles of Programming Languages, ACM, pp. 446–457, doi:10.1145/174675.178047. [21] Martin Gasbichler & Michael Sperber (2002): Final Shift for Call/cc: Direct Implementation of Shift and Reset. In: International Conference on Functional Programming, ACM, pp. 271–282, doi:10.1145/581478.581504. [22] Carl A. Gunter, Didier Rémy & Jon G. Riecke (1995): A Generalization of Exceptions and Control in ML-like Languages. In: International Conference on Functional Programming Languages and Computer Architecture, ACM, pp. 12–23, doi:10.1145/224164.224173. [23] Yukiyoshi Kameyama & Masahito Hasegawa (2003): A Sound and Complete Axiomatization of Delimited Continuations. In: International Conference on Functional Programming, ACM, pp. 177–188, doi:10.1145/944705.944722. [24] Yukiyoshi Kameyama & Takuo Yonezawa (2008): Typed Dynamic Control Operators for Delimited Continuations. In: International Symposium on Functional and Logic Programming, Lecture Notes in Computer Science 4989, Springer, pp. 239–254, doi:10.1007/978-3-540-78969-7 18. [25] Peter D. Mosses (2002): Pragmatics of Modular SOS. In: International Conference on Algebraic Methodology and Software Technology, Lecture Notes in Computer Science 2422, Springer, pp. 21–40, doi:10.1007/3-540-45719-4 3. [26] Peter D. Mosses (2004): Modular Structural Operational Semantics. Journal of Logic and Algebraic Programming 60–61, pp. 195–228, doi:10.1016/j.jlap.2004.03.008. [27] Peter D. Mosses & Mark J. New (2009): Implicit Propagation in Structural Operational Semantics. In: Workshop on Structural Operational Semantics, Electronic Notes in Theoretical Computer Science 229(4), Elsevier, pp. 49–66, doi:10.1016/j.entcs.2009.07.073. [28] Peter D. Mosses & Ferdinand Vesely (2014): FunKons: Component-Based Semantics in K. In: International Workshop on Rewriting Logic and Its Applications, Lecture Notes in Computer Science 8663, Springer, pp. 213–229, doi:10.1007/978-3-319-12904-4 12. [29] Gordon D. Plotkin (2004): A Structural Approach to Operational Semantics. Journal of Logic and Algebraic Programming 60–61, pp. 17–139, doi:10.1016/j.jlap.2004.05.001. Reprint of Technical Report FN-19, DAIMI, Aarhus University, 1981. [30] Grigore Roşu & Traian Florin Şerbănuţă (2010): An Overview of the K Semantic Framework. Journal of Logic and Algebraic Programming 79(6), pp. 397–434, doi:10.1016/j.jlap.2010.03.012. [31] Amr Sabry & Matthias Felleisen (1993): Reasoning About Programs in Continuation-passing Style. LISP and Symbolic Computation 6(3–4), pp. 289–360, doi:10.1007/BF01019462. [32] Neil Sculthorpe, Paolo Torrini & Peter D. Mosses (2016): A Modular Structural Operational Semantics for Delimited Continuations: Additional Material. Available at http://www.plancomps.org/woc2016. [33] Chung-chieh Shan (2007): A Static Simulation of Dynamic Delimited Control. Higher-Order and Symbolic Computation 20(4), pp. 371–401, doi:10.1007/s10990-007-9010-4. [34] Dorai Sitaram & Matthias Felleisen (1990): Control Delimiters and their Hierarchies. LISP and Symbolic Computation 3(1), pp. 67–99, doi:10.1007/BF01806126.
6cs.PL
arXiv:1605.00781v2 [math.GR] 27 May 2017 CONFIGURATION EQUIVALENCE IS NOT EQUIVALENT TO ISOMORPHISM ALI REJALI AND MEISAM SOLEIMANI MALEKAN Abstract. Giving a condition for the the amenability of groups, Rosenblatt and Willis, first introduced the concept of configuration. From the beginning of the theory, the question whether the concept of configuration equivalence coincides with the concept of group isomorphism was posed. We negatively answer this question by introducing two non-isomorphic, solvable and hence amenable groups which are configuration equivalent. Also, we will prove this conjecture, due to Rosenblatt and Willis, that configuration equivalent groups, both include the free non-Abelian group of same rank or not. We show that two-sided equivalent groups have same class numbers. 1. Introduction and Definitions In this paper, all groups were assumed to be finitely generated and discrete. Let G be a group, we denote the identity of the group G by eG . Given any finite (ordered) subset g = (g1 , . . . , gn ) of G, there is a Cayley graph denoted by Γ := Γ(G, g), with vertices being the elements of G and the directed edges being from g to gi g for g ∈ G and i ∈ {1, . . . , n}. let G be a group, g = (g1 , . . . , gn ) be an ordered generating set and Γ = Γ(G, g) be its corresponded Cayley graph. Assume that E = {E1 , . . . , Em } is a finite partition of G, which can be considered as a coloring of Γ by m colors. A configuration C is an (n + 1)-tuple of colors (c0 , . . . , cn ) with each ck being one of the m colors, and there are x0 , x1 , . . . , xn ∈ G such that xi is the color ci , i = 0, 1, . . . , n, and for each i, xi = gi x0 . In this case, we may say that (x0 , x1 , . . . , xn ) has the configuration C. Date: February 26, 2018. 2010 Mathematics Subject Classification. 20F05, 20F16, 20F24, 43A07. Key words and phrases. Configuration, Two-sided Configuration, Group Isomorphism, Conjugacy Class, Class Number, Paradoxical Decomposition . The first authors would like to express their gratitude toward Banach Algebra Center of Excellence for Mathematics, University of Isfahan. We also thank Yves de Cornulier for the ideas in the proof of Theorem 4.3. 1 CONFIGURATION EQUIVALENCE IS NOT EQUIVALENT TO ISOMORPHISM 2 Simultaneously considering the right multiplication, the concept of twosided configuration is reached; A two-sided configuration is a (2n + 1)tuple C = (c0 , c1 , . . . , c2n ) satisfying ci ∈ {1, . . . , m}, i = 0, 1, . . . , 2n, and there exists x ∈ Ec0 such that gi x ∈ Eci and xgi ∈ Eci+n for each i ∈ {1, . . . , n}. First, the concept of configuration was introduced by Rosenblatt and Willis to give a characterization for the amenability of groups and then, to characterize normal sets, the concept of two-sided configuration was suggested. For g and E as above, we called (g, E) a configuration pair. The set of configurations (two-sided configurations, resp.) corresponding to the configuration pair (g, E) will be denoted by Con(g, E) (Cont (g, E), resp.). The set of all configuration and two-sided configuration sets of G, denoted by Con(G) and Cont (G), respectively. The origin of the theory of configuration, is the conjecture raised in [8], that the combinatorial properties of configurations can be used to characterize various kinds of behavior of groups (like the group being Abelian or the group containing a non-Abelian free subgroup). This conjecture leads to the notion of (two-sided) configuration equivalence; A group G is configuration contained in a group H, written G - H, if Con(G) ⊆ Con(H), and two groups G and H are configuration equivalent, written G ≈ H, if Con(G) = Con(H). The concepts of being two-sided configuration contained, and two-sided configuration equivalent are similarly defined, the notations used denoting these concepts are “-t ” and “≈t ”. In [1], the first steps of the theory were taken. It was shown there that finiteness and periodicity are the properties which can be characterized by configuration. In that paper, the authors proved that for two configuration equivalent groups, the isomorphism classes of their finite quotients were the same. The finite index property can be extended to Abelian quotient property (see [2]). Also, it was shown in [1] that two configuration equivalent groups, should satisfy in the same semi-group laws, and in [4], this result was generalized by proving that same group laws should be established in configuration equivalent groups. Hence, in particular, being Abelian and the group property of being nilpotent of class c are, in particular, another properties which can be characterized by configuration (see [1] and [2]). In [2], it was shown that if G ≈ H, and G is a torsion free nilpotent group of Hirsch length h, then so is H. It was interesting to know the answer to the question whether being FC-group is conserved by equivalence of configuration. In [2], this question was answered under the assumption of being-nilpotent. In [4], this question was affirmatively answered without any extra hypothesis. CONFIGURATION EQUIVALENCE IS NOT EQUIVALENT TO ISOMORPHISM 3 In addition, it was shown in that paper that the solubility of a group G can be recovered from Con G. In our recent paper, [5], we showed that the notion of normality can be obtained from two-sided configuration equivalence. Also, in the presence of normality, we showed that if G and H are two-sided equivalent, and if G has a normal subgroup N, which the quotient G/N is finitely presented and G has a “recognizable” configuration pair w.r.t. N, then H contains a normal subgroup N, such that G/N ∼ = H/N. It was shown, that the class of “polynomial type” groups – involving finite, Abelian, free and polycyclic groups – satisfied the “recognizability” condition. We also interested in investigating the question: For which subclasses of the class G of all groups, does configuration equivalence coincide with isomorphism? In [1], this question was answered positively for the class of finite, free and Abelian groups. In [2], it was shown that those groups with the form of Zn ×F , where Z is the group of integers, n ∈ N and F is an arbitrary finite group, are determined up to isomorphism by their configurations. In [2], it was proved that if G ≈ D∞ , where D∞ is the infinite dihedral group, then G ∼ = D∞ . In [4], we pointed out that it was the existence of “golden” configuration pairs which implied isomorphism. Indeed, we showed that, in the class of finitely presented Hopfian groups with golden configuration pair, configuration equivalence coincided with isomorphism. In the light of two-sided configuration, it was proved in [5] that, for “polynomial type” groups, and for groups with finite commutator subgroup, the “≈t ” and “∼ =” are equivalent. Specially, for polycyclic or FC–groups, these two notation are equivalent. We will prove that if G and H are two configuration equivalent groups, and if G contains Fn , the non-Abelian free group of rank n, then H, also, contains Fn . In the present paper, we define configuration sets for a finite sigma algebras of a group, and with the help of them, we will show that twosided equivalence groups, have the same number of normal subgroups of finite index n, n ∈ N. Also, if G ≈t H, then the cardinality of normal subgroups which their quotient are polycyclic is the same in both G and H. The class number- the number of different conjugacy classeswill be shown to be equal for two-sided equivalent groups. In the class of two-sided equivalent groups which have a finite class number, we will study some type of subgroups, and will show that in this class the set of finite, and polycyclic subgroups should be the same. CONFIGURATION EQUIVALENCE IS NOT EQUIVALENT TO ISOMORPHISM 4 The question whether (two-sided) configuration equivalence implies isomorphism has been seen to be open since the beginning of the theory of configuration. We negatively answer this open question by presenting two non-isomorphic solvable and hence amenable groups, both having the same (two-sided) configuration sets. Like our two recent papers ([4] and [5]), we will use the following notation: Notation. Let G be a group with g = (g1 , . . . , gn ) as its ordered subset. Let p ∈ N, J ∈ {1, 2, . . . , n}p and ρ ∈ {±1}p . We denote the product Qp ρ(i) i=1 gJ(i) by W (J, ρ; g). We call the pair (J, ρ) a representative pair in g and W (J, ρ; g) a word corresponding to (J, ρ) in g. When we speak of a representative pair, (J, ρ), we assume the same number of components for J and ρ. The number of components of J, denotes by n(J). 2. Configuration and Finite Sigma Algebras What is really important in configuration is the image of subsets of a group G, under left translations by finite subsets of G. So, it seems that for sets Con(g, E), or Cont (g, E) of a group G, we can replace E by a sigma algebra A, and indeed we can. we involve sigma algebras in the theory of configuration as follows: Let G be a group. There is a correspondence between the finite sigma algebras of G, and finite partitions of G. Indeed, for a finite sigma algebra A, the set of atoms of A, E := {E1 , . . . , Em } is a partition of G. We denote the atomic sets of a sigma algebra A by atom(A). Also, if C is a finite collection of subsets of G, we use σ(C) to denote the sigma algebra generated by C. In the following, we always consider sigma algebras to be finite. Now, we try to rewrite our symbols in configuration for sigma algebras; For a sigma algebra A, we define Con(g, A) to be Con(g, atom(A)). Similarly, we can define Cont (g, A). Remember following efficient symbol from [5]: Notation. Let G and H be two groups with g and h as their generating set, respectively. Coloring Cayley graph Γ1 := Γ(G, g) and Γ2 := Γ(H, h) with same colors, we get partitions E and F of G and H, respectively. For two sets E ∈ E and F ∈ F , we write EsF to show that we have two sets of the same color. In particular, If we have Con(g, E) = Con(h, F) or Cont (g, E) = Cont (h, F), for configuration pairs (g, E) and (h, F ) for groups G and H, respectively; This implies that, their corresponded Cayley graphs Γ1 := Γ(G, g) and Γ2 := Γ(H, h), colored with same colors. CONFIGURATION EQUIVALENCE IS NOT EQUIVALENT TO ISOMORPHISM 5 We can also use s for sigma algebras; Let E := {E1 , . . . , Em } and F := {F1 , . . . , Fm } be partitions of G and H resp. such that Ei sFi , i = 1, . . . , m. For A ∈ σ(E) and B ∈ σ(F ), say AsB, when {k : Ek ∩ A 6= ∅} = {k : Fk ∩ B 6= ∅} In other words, if AsB, and A = Ei1 ∪· · ·∪Eij , then B = Fi1 ∪· · ·∪Fij . The following technical lemma will be used in the following: Lemma 2.1. Let G and H be two groups with sigma algebras A and B, resp. and Con(g, A) = Con(h, B). Suppose A1 , A2 ∈ A and B1 , B2 ∈ B, are such that Ai sBi , i = 1, 2, and g ∈ g corresponded to h ∈ h. we have (1) If gA1 ⊆ A2 , then hB1 ⊆ B2 , (2) If gA1 = A2 , then hB1 = B2 Proof. Set g = (g1 , . . . , gn ), atom(A) = {E1 , . . . , Em } h = (h1 , . . . , hn ), atom(B) = {F1 , . . . , Fm } Without loss of generality, let g and h match g1 and h1 . Also, set Ik := {i : Ei ∩ Ak 6= ∅}, k = 1, 2 So, by assumptions, Ak = [ Ei , Bk = i∈Ik [ Fi (k = 1, 2) i∈Ik Now, for C = (c0 , c1 , . . . , cn ) in Con(g, A), c1 ∈ I2 if c0 ∈ I1 , this proves (1). For proving (2), note that if C = (c0 , c1 , . . . , cn ) in Con(g, A), then c0 ∈ I1 , if and only if c1 ∈ I2 .  If Cont (g, E) = Cont (h, F ), one can easily get an analog of the above lemma for left multiplication replaced with right multiplication. Let G and H be two groups. Consider partitions R and S of G and H respectively, and their refinements, R′ and S ′ . Assume that R = {R1 , . . . , Rl }, R′ = {R1′ , . . . , Rk′ } S = {S1 , . . . , Sl }, S ′ = {S1′ , . . . , Sk′ } We may say that these two pairs (R′ , R) and (S ′ , S) are similar and may write (R′ , R) ∼ (S ′ , S), if {i : Rj′ ∩ Ri 6= ∅} = {i : Sj′ ∩ Si 6= ∅} CONFIGURATION EQUIVALENCE IS NOT EQUIVALENT TO ISOMORPHISM 6 for each j = 1, . . . , k. Also, for sigma algebras A and B, resp., and their sigma subalgebras, A′ and B′ , resp. we say (A, A′) and (B, B′ ) are similar, written (A, A′ ) ∼ (B, B′ ), if (atom(A), atom(A′ )) ∼ (atom(B), atom(B)′ ) Now, we can rewrite [4, Lemma 3.2] in sigma algebras: Lemma 2.2. Let A and B be sigma algebras of groups G and H, resp. Suppose g and h are generating sets of G and H such that Con(g, A) = Con(h, B). If A′ and B′ are sigma sub-algebras of A and B, such that (A, A′) ∼ (B, B′ ), then Con(g, A′ ) = Con(h, B′ ). The sigma algebraic version of [5, Lemma 3.2] is similarly obtained. By use of sigma algebras, equality of Tarski numbers of configuration equivalent groups, is easily obtained. Recall the following definition of paradoxical decomposition and Tarski number: Definition 2.3. A group G admits a paradoxical decomposition if there exist positive integers m and n, disjoint subsets P1 , . . . , Pm , Q1 , . . . , Qn of G and elements x1 , . . . , xm , y1 , . . . , yn of G such that m n [ [ G= xi Pi = yj Qi i=1 j=1 The minimal possible value of m + n in a paradoxical decomposition of G is the Tarski number of G and denoted by τ (G). If a group G doesn’t have a paradoxical decomposition, it means that G is amenable; In this case we will define τ (G) to be ∞. Theorem 2.4. Let groups G and H be configuration equivalent. Then τ (G) = τ (H). Proof. If G is amenable, so is H, and we have done. Hence without loss of generality, suppose that τ (G) is finite. Fix a generating set of G, say g0 . Let m and n, (P1 , . . . , Pm ), (Q1 , . . . , Qn ) and elements x := (x1 , . . . , xm ), y := (y1 , . . . , yn ) be as in Definition 2.3. Consider the sigma algebra A, generated by sets Pi , xr Pi , Qj , ys Qj , i, r = 1, . . . , m, j, s = 1, . . . , n Set g := g0 ⊕ x ⊕ y. Since G ≈ H, there exists a generating set h = h0 ⊕ u ⊕ v and sigma algebra B of G, such that Con(g, A) = Con(h, B) where h0 , u := (u1 , . . . , um ), v := (v1 , . . . , vn ) are corresponded to g0 , x and y, resp. Suppose that Ci , Dj in B are such that Ci sPi and Dj sQj , i = 1, . . . , m, j = 1, . . . , m. Therefore, Lemma 2.1 leads CONFIGURATION EQUIVALENCE IS NOT EQUIVALENT TO ISOMORPHISM 7 to ur Ci sxr Pi and vs Dj sys Qj . So, u, v, Ci ’s and Dj ’s satisfy the conditions of Definition 2.3, and hence, τ (H) ≤ τ (G). By the symetry, we have also τ (G) ≤ τ (H), which completes the proof.  We say that a group G admits a G = nG decomposition, n ∈ N, if there exists disjoint sets {Pi,j : i = 1, . . . , n, j = 1, . . . , k(i)} along with elements x(i) = (xi,1 , . . . , xi,k(i) ), i = 1, . . . , n, of G, such that k(i) [ xi,j Pi,j (i = 1, . . . , n) G= j=1 So, paradoxical decomposition of a group G, is a G = 2G decomposition. If a group G, P admits a G = nG decomposition, we denote the minimal amount of ni=1 k(i) by τn (G). Using the method of proof of the above theorem, we can easily show that Theorem 2.5. Let G and H be two configuration equivalent group. If G admits a G = nG decomposition, n ∈ N, then H also admits a H = nH decomposition, and τn (G) = τn (H). Subgroups of (two-sided) configuration equivalent groups have not been studied yet. However, By the use of Tarski number, some pieces of information about non-Abelian free subgroups can be obtained. By a theorem of Jónsson and Dekker (see, for example, [16, Theorem 5.8.38]), τ (G) = 4 if and only if G contains a non-Abelian free subgroup. This and [7, Theorem 1], implies that if groups G and H are configuration equivalent, then they both have non-Abelian free subgroups or not. In fact, we have more, and before stating the result, some reminders are needed; The power function for a polynomial type group G is a function ς on G with following properties: (1) ς(G) is a finite set, and (2) ς −1 (ς(eG )) = {eG }. We associate a (finite) partition with a power function, called ς–partition of G consisting of disjoint subsets, E(ς(g)) := ς −1 (ς(g)), g ∈ G. (3) There is a generating set g of G which, for each g ∈ G, we can find a representative pair (Jg , σg ) in g such that if Con(g, E) = Con(h, F ), then W (Jg , σg ; h)F (ς(eG )) ⊆ F (ς(W (Jg , σg ; g)) where F (ς(g)) considered to be the same as E(ς(g)) in color. CONFIGURATION EQUIVALENCE IS NOT EQUIVALENT TO ISOMORPHISM 8 By use of the power function, we can speak about some subgroups of configuration equivalent groups; Theorem 2.6. Let two groups G and H be configuration equivalent. Suppose that G contains a non-Abelian free subgroup of rank n, n ∈ N. Then H contains a non-Abelian free subgroup of rank n. Proof. Fix a generating set of G, say g. Let g0 be a generating set of a subgroup G0 of G, which is free of rank n. Assume that ς is the power function, and E0 is a ς-partition of G0 . Assume A is the sigma algebra generated by set E(ς(g)), g ∈ G0 . Now, if Con(g0 ⊕ g, A) = Con(h0 ⊕ h, B), and if we denote the set F in F , where F sE(ς(g)), by F (ς(g)), then one can easily check that, for an arbitrary representative pair in g0 , say (J, ρ), we have W (J, ρ; h0 )F (ς(eG )) ⊆ F (ς(W (J, ρ; g0 )) Hence, W (J, ρ; h0 ) = eH if and only if W (J, ρ; g0 ) = eG , and this means H0 := hh0 i, is a subgroup of H, which is free of rank n.  In the following conjugacy classes are involved; For an element g in a group G, we denote the conjugacy class of g by Cl(g). It is obvious that a normal subset (see [5, Definition 2.1.]) of G is nothing but a disjoint union of conjugacy classes of G. We will show in the following theorem that, if two groups G and H are two-sided configuration equivalent, then their class numbers will be the same: Theorem 2.7. Let finitely generated groups G and H be two-sided configuration equivalent. Then their class numbers are the same. Proof. Let g = (g1 , . . . , gn ) be a generating set of G. Suppose the class number of G is at least N, N ∈ N. So, there are elements xi , i = 1, . . . , N in G, such that Cl(xi ), i = 1, . . . , N, are pairwise disjoint. Consider a finite sigma algebra A of G, containing the following sets, Cl(xi ), Cl(xi )gj−1 , i = 1, . . . , N, j = 1, . . . , n Assume B is a sigma algebra of G along with a generating set h, such that Cont (g, A) = Cont (h, B). If elements Bi in B, i = 1, . . . , N are such that Bi sCl(xi ), then we get by Lemma 2.1 that Bi , i = 1, . . . , N, are normal sets, so the class number of H is at least N. This completes the proof.  It is obvious that Cl(x) = {x} if and only if x is a central element. Suppose that the class number of G is finite, this implies that Z(G) is a finite subgroup of G, where Z(G) stands for the center of G. In the below lemma, by using of the finiteness of the class number, we present CONFIGURATION EQUIVALENCE IS NOT EQUIVALENT TO ISOMORPHISM 9 a certain type of configuration pair, which make it possible to study subgroups more efficiently: Lemma 2.8. Let G be a finitely generated group with finite class number. Fix a generating set g of G. Then there is a partition E of G, containing {eG }, such that if Cont (g, E) = Cont (h, F ) for a configuration pair (h, F ) of a group H, and if {eG }sF ∈ F , then F will be singleton, and without loss of generality, we can assume that F = {eH }. Proof. Suppose that g = (g1 , . . . , gn ), and Z(G) = {z0 = eG , z1 , . . . , zr }, Let elements x1 , . . . , xs ∈ G be such that Cl(zi ), Cl(xj ), i = 0, 1, . . . , r, j = 1, . . . , s are all of the conjugacy classes. Now, consider the sigma algebra A generated by the following subsets of G, {zi }, {zi gk−1 }, {xj }, Cl(xj ) \ {xj }, Cl(xj )gk−1 for i = 0, 1, . . . , r, j = 1, . . . , s, and k = 1, . . . , n. If Cont (g, A) = Cont (h, B) for a sigma algebra B and a generating set h of a group H, and if Ki and Lj in B are such that Ki s{zi }, Lj sCl(xj ) i = 0, 1, . . . , r, j = 1, . . . , s These sets are all normal (see Lemma 2.1), so by Theorem 2.7, there are elements wi , and yj , in H such that Ki = Cl(wi ), Lj = Cl(yj ), i = 0, 1, . . . , r, j = 1, . . . , s Since sets Cl(yj ) can be written as a union of at least two atoms, so wi are all central, and without loss of generality we can assume w0 = eH . Therefore F = atom(B) works well.  By the power function of polynomial type groups, we can say that in two-sided configuration equivalent groups with finite class number, the polynomial type subgroups are isomorphic: Theorem 2.9. Let two groups G and H be two-sided configuration equivalent. Assume that these groups have finite class number. Then for each polynomial type subgroup, G0 of G, H contains a subgroup H0 , which is isomorphic to G0 . Furthermore G and H have isomorphic centers. Proof. Fix a generating set g for G. Let ς, E0 and g0 be such that the properties (1) to (3) on page in page 7, are established for G0 . Applying Lemma 2.8, we get a partition E of G. Now. if Cont (g0 ⊕ g, σ(E1 ∪ E)) = Cont (h0 ⊕ h, B) CONFIGURATION EQUIVALENCE IS NOT EQUIVALENT TO ISOMORPHISM10 by Lemma 2.8, property (3), one can easily see that G0 ∼ = H0 , where H0 := hh0 i. Since Z(G) becomes a finite subgroup, for G has a finite class number, by adding it to g, repeating the proof of 2.8, one can easily obtain  that Z(G) ∼ = Z(H). It is of interest to study finitely generated groups with finite class numbers. For each large prime number p, there exists a 2-generated infinite group of exponent p which has exactly p conjugacy classes (that’s [12, Theorem 41.2]). Osin [3] has recently constructed a finitely generated example (that was a major breakthrough since the problem was open for more than 60 years). All of these groups are infinitely presented and it is still an open problem, i.e., the question whether there is an infinite finitely presented group with a finite class number. If such a group exists, the following theorem will make sense: Theorem 2.10. Let finitely presented group G has finite class number. Suppose that G ≈ H, which H is a finitely generated group. Then H is a quotient of G. Proof. Fix a generating set of G, say g. Apply Lemma 2.8 to get a partition E of G. Consider a set of defining relators {W (Ji , ρi ; g) : i = 1, . . . , m} Let A be a sigma algebra of G, generated by sets in E and {W (J, ρ; g)} n(J) ≤ max{n(Ji ) : i = 1, . . . , m} But G ≈ H, so there is a sigma algebra B in H, such that Cont (g, A) = Cont (h, B). Lemma 2.2, Lemma 2.8, imply that we can assume {eH } ∈ B, {eG }s{eH }, and {W (J, ρ; g)}s{W (J, ρ; h)}, for (J, ρ) with n(J) ≤ max{n(Ji ) : i = 1, . . . , m} so, in particular, W (Ji , ρi ; h) = eH , i = 1, . . . , m, and hence the map G → H, W (I, δ; g) 7→ W (I, δ; h) where (I, δ) ranges over arbitrary representative pairs, introduced an epimorphism.  3. Two-sided Configuration and Quotients In [5], some results about quotients of two-sided configuration equivalent groups were obtained. In this section, we study the number of quotients. CONFIGURATION EQUIVALENCE IS NOT EQUIVALENT TO ISOMORPHISM11 Let N be a normal subgroup of G; We denote the quotient map, G → G/N by qN , and in the cases where there is no ambiguity, we may drop N. Recall that if E is a partition of G/N, then q −1 (E) := {q −1 (E) : E ∈ E} becomes a partition of G. We refer to such a partition, when we say an N–partition of G. One can easily check that the intersection of two N–partitions is itself an N–partition. An N–refinement of an N–partition Ê, is a refinement, Eˆ′ , which is itself an N–partition. Let g = (g1 , . . . , gk ) be an ordered subset of G, such that q(g) := (q(g1), . . . , q(gk )) is a generating set of G/N, then by [1, Lemma 6.2.], there is an ordered subset n of N, such that ĝ = g ⊕ n becomes a generating set of G, called N-extension of g. By an N–configuration pair we mean a configuration pair (ĝ, Ê) such that g is an N–extension generating set, and Ê is an N–partition of G. The notions of “preserving presentation” and “recognizability” of a configuration pair are defined in [5]. Lets first consider the concept of recognizable configuration pair: Definition 3.1. Let G be a group with a normal subgroup N and an N–configuration pair (ĝ, Ê). We may say that (ĝ, Ê) is recognizable w.r.t. N, if whenever Cont (ĝ, E) = Cont (ĥ, F̂), for a configuration pair (ĥ, F̂ ) of a groups H, then for every g ∈ G \ N, there is a representative pair, (Jg , ρg ) such that g = W (Jg , ρg ; ĝ) and W (Jg , ρg ; ĥ)F ∩ F = ∅ where F ∈ F is in the same color as an element of E which contains N. As a consequence of Lemma 2.2, one can easily show that (see [4, Lemma 3.3.]): Lemma 3.2. Let G be a group with a normal subgroup N. Assume (ĝ, Ê) is a recognizable configuration pair w.r.t. N. Then for each N– refinement Eˆ′ of Ê, the configuration pair (ĝ, Eˆ′ ) is recognizable w.r.t. N. What really makes working with recognizable configuration pair useful, is accompaniment of this notion to the following one: Definition 3.3. Let G, N, g, ĝ be regarded as above. We say that a configuration pair (ĝ, E) preserves presentation w.r.t. N, if the following are held: (I) N ∈ E, CONFIGURATION EQUIVALENCE IS NOT EQUIVALENT TO ISOMORPHISM12 (II) if Cont (ĝ, Ê) = Cont (ĥ, F̂), for a configuration pair (ĥ, F̂) of a groups H, and NsF ∈ F̂ , then F is normal and the function bellow, defined on cosets of N, W (J, ρ; ĝ)N 7→ W (J, ρ; ĥ)F is considered to be well-defined, where (J, ρ) is an arbitrary representative pair. Remark 1. By [5, Theorem 2.5], we know that if G/N is finitely presented, then for each N–configuration pair (ĝ, Ê), there exists an N–refinement Eˆ′ of Ê, such that (ĝ, Eˆ′ ) preserves presentation w.r.t. N. Let R and S be two partitions of a group G. Define the partition R ∩ S as follows: atom(σ(R ∪ S)) regarding this notation and Lemma 2.2 as well, we can see that it does not matter, if we work with one or more than one partition of G, more precisely: Lemma 3.4. Let G be a group with a generating set g. Assume that {R1 , . . . , Rr }, be a collection of partitions of G and G ≈t H for a group H. Then, there are, a generating set h, and a collection {S1 , . . . , Sr } of partitions of H, such that Cont (g, Ri ) = Cont (h, Si ) i = 1, . . . , r T Proof. Set R = ri=1 Ri . Let (h, S) be a configuration pair of H such that Cont (g, R) = Cont (h, S). If Si is a partition of H, such that (R, Ri ) ∼ (S, Si ), i = 1, . . . , r. Then, Lemma 2.2, implies that Cont (g, Ri ) = Cont (h, Si ), i = 1, . . . , r.  With the concept of two-sided configuration, we can study the number of finite index subgroups; To this end, we provide the following definition: Definition 3.5. Let G be a group, and C be a finite collection of normal subgroups of G. We may say G is recognizable w.r.t C, if the following are held: (1) C is closed under intersection, (2) G/N is finitely presented, for all N ∈ C, and (3) There exists a generating set g of G, and a collection {E(N) : N ∈ C} of partition of G such that (g, E(N)) is a recognizable configuration pair w.r.t. N. CONFIGURATION EQUIVALENCE IS NOT EQUIVALENT TO ISOMORPHISM13 In the case which there is a collection C, with properties in the above definition, the next theorem is worthy of attention: Theorem 3.6. Suppose a group G is recognizable w.r.t. a collection C of its normal subgroups. Let a group H be two-sided configuration equivalent with G. Then there is a collection {NN : N ∈ C} of normal subgroups of H such that (1) G ∼ = H , N NN (2) NN ∩M = NN ∩ NM , for N and M in C. Proof. Let g and {E(N) : N ∈ C} be regarded as in Definition 3.5. By Lemma 3.4, there are a generating set h and partitions {F (N) : N ∈ C}, such that Cont (g, E(N)) = Cont (h, F (N)) (N ∈ C) Hence, by [5, Lemma 3.4.], we obtain normal subgroups {NN : N ∈ C}, along with following isomorphisms H G → , N NN W (J, ρ; g)N 7→ W (J, ρ; h)NN With the above isomorphisms, the equation in (2) are easily proved.  We know by [10, Theorem 21.4] that, the number of subgroups of finite index n in a finitely generated group G is finite. Since the intersection of finite index subgroups is again a finite index subgroup, by the above theorem, we obtain: Corollary 3.7. Let G and H be finitely generated groups with the same two-sided configuration sets, and let n ∈ N. Then G and H contain exactly the same number of normal subgroups of index n. Moreover, we have Y Y {H/N : |H : N| < ∞} {G/N : |G : N| < ∞} ∼ = Proof. Suppose {N1 , . . . , Nr } is the collection of all normal subgroups of index n. Let C be a collection of normal subgroups of G obtained from intersection of Nk ’s. For N ∈ C, assume that the power function of G/N yields a configuration pair (qN (gN ), qN (E(N))), for an ordered set Tr r gN and partition E(N) of G. Let g = ⊕\ k=1 gNk be a k=1 Nk –extension generating set of G. Hence, one can see, by g and C as above, the conditions of Definition 3.5 are satisfied, and therefore, Theorem 3.6, shows the existence of at least r normal subgroups of index n in H. The symmetry in the concept of configuration completes the proof.  CONFIGURATION EQUIVALENCE IS NOT EQUIVALENT TO ISOMORPHISM14 We denote by P(G), the collection of normal subgroups of G, which their quotient in G are polycyclic. Since every polycyclic group has a recognizable configuration pair, and since P(G) is closed under intersection, an argument like the one in proof of the previous corollary leads to: Corollary 3.8. Let G and H be finitely generated groups with G ≈t H. Then P(G) and P(H) have the same cardinality. Furthermore if P(G) is finite, then there is a bijection Ψ : P(G) → P(H) such that (1) For every N and M in P(G), Ψ(N ∩ M) = Ψ(N) ∩ Ψ(M), (2) For each N ∈ P(G), we have G/N ∼ = H/Ψ(N). 4. The Concept of Configuration Equivalence is not Equivalent to Isomorphism The question whether the concepts of the configuration equivalence and isomorphism of groups are the same has been open since the beginning of configuration theory. Indeed, the answer is “No”, there are non-isomorphic groups with the same two-sided configuration sets. It is worth noting that, the groups in our example are solvable, thus this natural conjecture that these two concepts may be equivalent for amenable groups will be rejected. To provide our example, we may need to provide the following two technical lemmas: Lemma 4.1. Let φ : G → H be an epimorphism of groups. Suppose that g is a generating set of G, and F is a partition of H, then Cont (g, φ−1 (F )) = Cont (φ(g), F ) Proof. Assume that C ∈ Cont (g, φ−1(F )). So, there exists (x0 , x1 , . . . , x2n ) having configuration C, that means, xk ∈ φ−1 (Fck ), k = 0, 1, . . . , 2n and, xk = gk x0 , xk+n = x0 gk (k = 1, . . . , n) Therefore φ(xk ) ∈ Fck , and φ(xk ) = φ(gk )φ(x0 ), φ(xk+n ) = φ(x0 )φ(gk ) Hence, (φ(x0 ), φ(x1 ), . . . , φ(x2n )) has configuration C in Cont (φ(g), F ). Conversely, let a tuple (y0 , y1 , . . . , y2n ) have configuration C ∈ Cont (φ(g), F). That means, yk ∈ Fck , k = 0, 1, . . . , 2n and yk = φ(gk )y0 , yk+n = y0 φ(gk ) (k = 1, . . . , n) Choose x0 ∈ φ−1 (y0). Then (x0 , g1 x0 , . . . , gn x0 , x0 g1 , . . . , x0 gn ) in G has configuration C, belonging to Cont (g, φ−1 (F )).  CONFIGURATION EQUIVALENCE IS NOT EQUIVALENT TO ISOMORPHISM15 We may call an homomorphism φ : G → H, generating-surjection, if every ordered generating set of H is an image of an ordered generating set of G. It is clear that each generating-surjection, becomes an epimorphism. We call two groups G and H generating-bijective, if there are generating-surjections φ : G → H, and ψ : H → G. From the following lemma, it will be understood that generating-bijective groups have same two-sided configuration sets: Lemma 4.2. Let G and H be two finitely generated groups. Suppose there is a generating-surjection φ : G → H. Then Cont (H) ⊆ Cont (G). Proof. Consider a configuration pair (h, F ) of H. There exists a generating set g of G such that h = φ(g). Thus, by previous lemma, Cont (h, F ) = Cont (φ(g), F ) = Cont (g, φ−1 (F )) This completes the proof.  It is obvious that isomorphic groups are generating-bijective, but the converse is not always true, as the following theorem will show this: Theorem 4.3. There exist non-isomorphic finitely generating groups with the same two-sided configuration sets. Proof. Put R := Z[t, t−1 ], the ring of Laurent polynomials. Let K be a group of matrices   1 B D 0 A C  0 0 1 where B, C and D belongs to R, and A ∈ hti. The group B is easily checked to be finitely generated; Indeed, if we denote the above matrix by (A, B, C, D), then (k1 , k2 , k3 ), in which k1 = (t, 0, 0, 0) k2 = (1, 1, 0, 0) k3 = (1, 0, 1, 0) becomes a generating set of K, because of the following equations: k km 1 = (t , 0, 0, 0), −m km = (1, 0, tm , 0), 1 k3 k1 k m k−m 1 k2 k1 = (1, t , 0, 0) m m [k3 , k−m 1 k2 k1 ] = (1, 0, 0, t ) where m is an integer. The center of this group, Z(K), consists of unipotent matrices with a single possibly non-trivial element in the upper right corner Z(K) = {(1, 0, 0, D) : D ∈ R} It is clearly isomorphic to R. We can rewrite the product of the group as bellow: (A, B, C, D)(X, Y, Z, W ) = (AX, BX + Y, C + AW, D + BW + Z) CONFIGURATION EQUIVALENCE IS NOT EQUIVALENT TO ISOMORPHISM16 By the above equality, one can see that the map Φ : K → K, (A, B, C, D) 7→ (A, B, tC, tD) introduced an automorphism of K. Set Nm := tm Z[t], m ∈ Z. The automorphism Φ, implies that K/Nm ∼ = K/Φ(Nm ) = K/Nm+1 , m ∈ Z. Now, let G := K/N0 and H := K/(2Z ⊕ N1 ). These groups are not isomorphic, for G is torsion free and H is not. Note that if k is an ordered set of K, such that its image under the natural quotient map forms a generating set of K/Nm, then, also, the image of Φ(k) will form a generating set of K/Nm . Thus, G and H are generating-bijective. This and Lemma 4.2, complete the proof.  Remark 2. The groups G and H in the above theorem are solvable. this shows that the two concepts, configuration equivalence and isomorphism, are not equivalent for solvable and hence amenable groups. these groups are not finitely presented and they are not residually finite, for they are not Hopfian. References [1] A. Abdollahi, A. Rejali and G. A. Willis, Group Properties Characterized by Configurations. Illinois J. Math. 2004. 48(3): 861-873. [2] A. Abdollahi, A. Rejali and A. Yousofzadeh, Configuration of Nilpotent Groups and Isomorphism. J. Algebra Appl. 2009. 8(3): 339-350. [3] Denis Osin, Small cancellations over relatively hyperbolic groups and embedding theorems. Ann. of Math. (2) 172 (2010), no. 1, 139. [4] A. Rejali and M. Soleimani Malekan, Strong Configuration Equivalence and Isomorphism, http://arxiv.org/abs/1510.07209. [5] A. Rejali and M. Soleimani Malekan, Two-sided Configuration of Polycyclic Groups and Isomorphism,http://arxiv.org/abs/1512.03021. [6] A. Rejali and A. Yousofzadeh, Group Properties Characterized by Two-sided Configurations, Algebra Colloq. 17:4 (2010) 583-594. [7] A. Tavakoli, A. Rejali, A. Yousofzadeh, A. Abdollahi, A Note About Configuration of A Group, Matematika, 2014, Volume 30, Number 2, 117-121. [8] J. M. Rosenblatt and G. A. Willis, Weak Convergence Is Not Strong Convergence for Amenable Groups, Canad. Math. Bull. 44 (2001), 231-241. MR 2002d:43001. [9] E. A. Walker, Cancellation in Direct Sums of Groups, Proc. Amer. Math. Soc., Vol. 7, No. 5 (Oct., 1956), pp. 898-902. [10] O. Bogopolski, Introduction to Group Theory, European Mathematical Society, 2008. [11] W. Magnus, A. Karrass, D. Solitar, Combinatorial Group Theory: Presentations of Groups in Terms of Generators and Relations, Dover Publications, INC, New York, 2004. [12] A. Yu. Oĺshanskii, Geometry of Defining Relations in Groups, Kluwer, 1991. CONFIGURATION EQUIVALENCE IS NOT EQUIVALENT TO ISOMORPHISM17 [13] D. J. S. Robinson, A Course in the Theory of Groups, 2nd edition, Springer, New York, 1983. [14] D. Segal, Polycyclic groups, Cambridge University Press, London, 1983. [15] C. C. Sims, Computation with Finitely Presented Groups. Cambridge: Cambridge University Press, 1994. [16] M. Sapir, Combinatorial algebra: syntax and semantics, http://www.math.vanderbilt.edu/msapir/book/b2.pdf. [17] M. J. Tomkinsin, FC-groups, 2nd edition, Pitman publishing limited, London, 1984. University of Isfahan Current address: Department of Mathematics, Faculty of Sciences , University of Isfahan, Isfahan, 81746-73441, Iran E-mail address: [email protected] Department of Mathematics, Ph. D student, University of Isfahan, Isfahan, 81746-73441, Iran E-mail address: [email protected]
4math.GR
arXiv:1705.10957v2 [math.AC] 14 Dec 2017 NEARLY COMMUTING MATRICES ZHIBEK KADYRSIZOVA Abstract. We prove that the algebraic set of pairs of matrices with a diagonal commutator over a field of positive prime characteristic, its irreducible components, and their intersection are F -pure when the size of matrices is equal to 3. Furthermore, we show that this algebraic set is reduced and the intersection of its irreducible components is irreducible in any characteristic for pairs of matrices of any size. In addition, we discuss various conjectures on the singularities of these algebraic sets and the system of parameters on the corresponding coordinate rings. Keywords: Frobenius, singularities, F -purity, commuting matrices 1. Introduction and preliminaries In this paper we study algebraic sets of pairs of matrices such that their commutator is either nonzero diagonal or zero. We also consider some other related algebraic sets. First let us define relevant notions. Let X = (xij )1≤i,j≤n and Y = (yij )1≤i,j≤n be n×n matrices of indeterminates over a field K. Let R = K[X, Y ] be the polynomial ring in {xij , yij }1≤i,j≤n and let I denote the ideal generated by the off-diagonal entries of the commutator matrix XY − Y X and J denote the ideal generated by the entries of XY − Y X. The ideal I defines the algebraic set of pairs of matrices with a diagonal commutator and is called the algebraic set of nearly commuting matrices. The ideal J defines the algebraic set of pairs of commuting matrices. 1 2 ZHIBEK KADYRSIZOVA Let uij denote the (i, j)th entry of the matrix XY −Y X. Then I = (uij | 1 ≤ i 6= j ≤ n) and J = (uij | 1 ≤ i, j ≤ n). Theorem 1 ([Ger61]). The algebraic set of commuting matrices is irreducible, i.e., it is a variety. Equivalently, Rad(J) is prime. The following results are due to A. Knutson [Knu05], when the characteristic of the field is 0, and to H.Young [You11] in all characteristics. Theorem 2 ([Knu05], [You11]). The algebraic set of nearly commuting matrices is a complete intersection, with the variety of commuting matrices as one of its irreducible components. In particular, the set {uij |1 ≤ i 6= j ≤ n} is a regular sequence and the dimension of R/I is n2 + n. Theorem 3 ([Knu05], [You11]). When K has characteristic zero, I is a radical ideal. A. Knutson in his paper [Knu05] conjectured that V(I) has only two irreducible components and it was proved in all characteristics by H.Young in his thesis, [You11]. Theorem 4 ([You11]). If n ≥ 2, the algebraic set of nearly commuting matrices has two irreducible components, one of which is the variety of commuting matrices and the other is the so-called skew component. That is, I has two minimal primes, one of which is Rad(J). Let P = Rad(J) and let Q denote the other minimal prime of I, i.e., T Rad(I) = P Q. The following conjecture was made in 1982 by M. Artin and M. Hochster. NEARLY COMMUTING MATRICES 3 Conjecture 1. J is reduced, i.e., J = P . It was answered positively by Mary Thompson in her thesis in the case of 3 × 3 matrices. Theorem 5 ([Tho85]). R/J is a Cohen-Macaulay domain when n = 3. Now let us go back to algebraic sets of nearly commuting matrices and their irreducible components. First, we take a look at what we have when n = 1, 2. When n = 1, everything is trivial. More precisely, I = P = Q = K[x11 , y11 ]. When n = 2, without loss of generality we may replace X and Y by X −x22 In and Y − y22 In respectively. Here In is the identity matrix of size n. Denote ′ x′11 = x11 − x22 , y11 = y11 − y22 . Then the generators of I are 2 by 2 minors u12 = x′11 x12 , ′ y11 y12 u21 = − x′11 x21 . ′ y11 y21 The diagonal entries of XY − Y X are u11 = x12 x21 y12 y21 , u22 = − x12 x21 . y12 y21  Then J is the ideal generated by size 2 minors of  x′11 x12 x21 ′ y11 y12 ′ ′ (x11 , y11 ). ′ p−1 ′ ′ p−1 (u12 u21 )p−1 = (x′11 y12 − x12 y11 ) (x11 y21 − x21 y11 ) =  and y21 Moreover, therefore, J = P is prime. We also have that Q = T ′ I = P Q is radical and P + Q = (x12 y21 − x21 y12 , x′11 , y11 ) is prime. We have that  4 ZHIBEK KADYRSIZOVA p−1 p−1 X X α=0 β=0 (−1) α+β    p−1 p−1 ′ 2(p−1)−α−β p−1−α α p−1−β β (x′11 )α+β (y11 ) x12 y12 x21 y21 . β α ′ Therefore, (u12 u21 )p−1 has a monomial term (x′11 y11 x12 y21 )p−1 with coefficient (−1)p−1 . Since I [p] : I = (u12 u21 )p−1 +I [p] , R/I is F -pure, see Fedder’s criterion Lemma 2. Furthermore, determinantal rings R/P , R/Q, R/(P + Q) are F regular, see [HH94]. Therefore, for the rest of the paper we shall use the following notations. Notation 1. Let n ≥ 3 be an integer. Let X = (xij )1≤i,j≤n and Y = (yij )1≤i,j≤n be n × n matrices of indeterminates over a field K. Let R = K[X, Y ] be the polynomial ring in {xij , yij }1≤i,j≤n and let I denote the ideal generated by the off-diagonal entries of the commutator matrix XY − Y X and J denote the ideal generated by the entries of XY − Y X. Let P denote the radical of J and Q be the other minimal prime of Rad(I). We prove the following results in this paper. Theorem 6. Let R be a ring as in Notation 1. Assume also that the field K has positive prime characteristic. Then R/I, R/P , R/Q and R/(P +Q) are F pure rings when n = 3. In other words, the algebraic set of nearly commuting matrices of size 3, its irreducible components and their intersection are F -pure. In particular, the skew component is reduced in this case. Theorem 7. Let R be a ring as in Notation 1. Then R/I is reduced. In other words, the algebraic set of nearly commuting matrices is reduced for matrices of all sizes and in all characteristics. Theorem 8. The intersection of the variety of commuting matrices and the skew component is irreducible, that is, Rad(P + Q) is prime. NEARLY COMMUTING MATRICES 5 2. F -purity In this section we show that the coordinate ring of the algebraic set of pairs of matrices with a diagonal commutator is F -pure in the case of 3 by 3 matrices. Moreover, we also show that it implies the corresponding fact for its irreducible components, the variety of commuting matrices and the skew-component, and their intersection. First we state two lemmas due to R. Fedder and they include a criterion for F -purity for finitely generated K-algebras and which has a particularly convenient form for complete intersections. Lemma 1 (Fedder [Fed87]). Let S be a regular local ring or a polynomial ring over a field. If S has characteristic p > 0 and I is an unmixed proper ideal (homogeneous in the polynomial case) with the primary decomposition T T I = ni=1 Ai , then I [p] : I = ni=1 (A[p] : A). Lemma 2 (Fedder’s criterion [Fed87]). Let (S, m) be a regular local ring or a polynomial ring over a field with its (homogeneous) maximal ideal. If S has characteristic p > 0 and I is a proper ideal (homogeneous in the polynomial case), then S/I is F -pure if and only if I [p] : I 6⊂ m[p] . The next result is a straightforward consequence of the above two lemmas. It will prove to be quite useful for us. Lemma 3. Let S be a regular local ring or a polynomial ring over a field. Suppose that S has characteristic p > 0 and I is an ideal of S (homogeneous T in the polynomial case). Suppose also that S/I is F -pure and I = ni=1 Ai is the primary decomposition. Then S/(Ai1 + . . . Aim ) is F -pure for all 1 ≤ i1 < ... < im ≤ n and for all 1 ≤ m ≤ n. 6 ZHIBEK KADYRSIZOVA T [p] Proof. Observe first that (Ai1 + . . . Aim )[p] :S (Ai1 + . . . Aim ) ⊇ m j=1 (Aij : T [p] Aij ) ⊇ ni=1 (Ai : Ai ) = (I [p] : I). The rest is immediate from Lemma 1 and Lemma 2.  The above lemma is closely related to results on compatibly split ideals, cf. [ST12]. Immediately we get the corresponding result for our algebraic set. Corollary 1. Suppose that the coordinate ring of the algebraic set of nearly commuting matrices R/I is F -pure. Then R/P , R/Q and R/(P + Q) are F -pure. Next, we use Fedder’s criterion to show F -purity of R/I in case when n = 3. Theorem 9. Let K be a field of characteristic p > 0 and let n = 3. Let R be a ring as in Notation 1. Then R/I is F -pure. Proof. Recall that I is generated by a regular sequence {uij |1 ≤ i 6= j ≤ n}. Q  p−1 [p] Therefore, I : I = R + I [p] . Thus by Fedder’s criterion it 1≤i6=j≤n uij Q is sufficient to prove that 1≤i6=j≤n up−1 ∈ / m[p] , where m is the homogeneous ij maximal ideal in R. We show this by proving the following claim. Claim. If µ = x12 x13 x21 x23 x31 x33 y11 y12 y23 y31 y32 y33 , then µp−1 is a monomial Q term of 1≤i6=j≤3 up−1 with a nonzero coefficient modulo p. ij Proof. We compute the coefficient of µp−1. It can be obtained by choosing a monomial from every uij in the following way: u12 : (−x12 y11 )α1 (x13 y32 )β1 u13 : (−x23 y12 )α2 (x12 y23 )β2 (−x13 y11 )γ2 (x13 y33 )δ2 NEARLY COMMUTING MATRICES u21 : (−x31 y23 )α3 (x21 y11 )β3 (x23 y31 )γ3 u23 : (x23 y33 )α4 (−x33 y23 )β4 u31 : (−x21 y32 )α5 (x33 y31 )β5 (−x31 y33 )γ5 (x31 y11 )δ5 u32 : (x31 y12 )α6 (−x12 y31 )β6 (x33 y32 )γ6 7 Then the exponents Ast and Bst of each xst and yst respectively are A12 = α1 + β2 + β6 A23 = α2 + γ3 + α4 A13 = β1 + γ2 + δ2 A31 = α3 + γ5 + δ5 + α6 A21 = β3 + α5 A33 = β4 + β5 + γ6 B11 = α1 + γ2 + β3 + δ5 B31 = γ3 + β5 + β6 B12 = α2 + α6 B32 = β1 + α5 + γ6 B23 = β2 + α3 + β4 B33 = δ2 + α4 + γ5 In addition, denote C12 = α1 + β1 , C23 = α4 + β4 , C13 = α2 + β2 + γ2 + δ2 , C31 = α5 + β5 + γ5 + δ5 , C21 = α3 + β3 + γ3 , C32 = α6 + β6 + γ6 . Our goal is to find all nonnegative integer tuples α = (α1 , . . . , α6 ), β = (β1 , . . . , β6 ), γ = (γ2 , γ3 , γ5 , γ6 ), δ = (δ5 , δ6 ) such that Ast = p − 1, Bst = p − 1 for all 1 ≤ s, t ≤ 3 and Cij = p − 1 for all 1 ≤ i 6= j ≤ 3. Notice that the linear system does not have a nonzero determinant: the sum of the first 12 equations is twice the sum of the rest 6 equations. Therefore, there is not a unique solution. The above linear system can be solved using standard methods from linear algebra and has the following solution: 8 ZHIBEK KADYRSIZOVA     α     β     =  γ      δ a b d    p−1−a p−1−a−b p−1−a    − a−c a−d   − c − p−1−b−a+d a+b−d − −  p−1−b    p−1−a−b+d b    b+a−d−c 0   c−a − a where the column vector [α, β, γ, δ] represents the matrix of solutions and a, b, c, d are arbitrary non-negative integers. Since we look for non-negative integer solutions we must have that a = c and a, b ≥ d and a + b ≤ p − 1. Hence we have that     α     β     =  γ      δ a b d p−1−b−a+d a p−1−b    p−1−a p−1−a−b p−1−a a+b−d p−1−a−b+d b    − 0 a−d − b−d 0   − a − − 0 − Therefore, the coefficient of µp−1 is the sum of expressions of the form (−1)α1 +α2 +γ2 +α3 +β4 +α5 +γ5 +β6 ((p − 1)!)6 /(α1 ! . . . α6 !β1 ! . . . β6 !γ2 !γ3 !γ5 !γ6 !δ5 !δ6 !)          NEARLY COMMUTING MATRICES 9 where α = (α1 , . . . , α6 ), β = (β1 , . . . , β6 ), γ = (γ2 , γ3 , γ5, γ6 ), δ = (δ5 , δ6 ) run over all solutions of the linear system above. That is, (p−1)/2 X d=0 X (−1) a−d a,b≥d, a+b≤p−1    2  2  2   b p−1−b a+b−d p−1 p−1 p−1 d b a a+b−d b a which modulo p is equivalent to (p−1)/2 X d=0 X (−1) a−d a,b≥d, a+b≤p−1  p−1−b a    b a+b−d d b It also can be written as (p−1)/2 X d=0 or X (−1) a−d a,b≥d, a+b≤p−1    a+b−d p−1−b a−d b−d d a     p−1 b p−1−b X X X b a+b−d a−d p − 1 − b (−1) d b a b=0 d=0 a=d The following lemma shows that the above expression is equal to 1 for all values of p. In fact, for this purpose p does not have to be prime. Lemma 4. Let Cm = 1 for all m ≥ 1. Pm Pb b=0 d=0 Pm−b a=d (−1)a−d  m−b a  b a+b−d b d . Then Cm = Proof. We prove a stronger statement. Claim. Let Bm,b = Pb d=0 Pm−b Bm,b a=d (−1)a−d m−b a  a+b−d b  b . Then for all m ≥ 1 d   0 if 0 ≤ b ≤ m − 1; =  1 if b = m.    P P0 a−d m−b a+b−d b (−1) = 1 and Proof. First observe that Bm,m = m a=d d=0 a b d  Pm Bm,0 = a=0 (−1)a ma = 0. Hence we may assume that 0 < b < m. 10 ZHIBEK KADYRSIZOVA Let Am,b,d = Pm−b a=d  m−b a (−1)a Consider the difference  a+b−d b , then Bm,b = Pb d=0 (−1)  Am,b,d . d b d Am,b,d − Am,b,d+1 =       m−b m−b X X a+b−d−1 a+b−d a m−b a m−b = − (−1) (−1) b a b a a=d+1 a=d        m−b X a+b−d−1 a+b−d m−b a m−b )= − ( + (−1) (−1) b b a d a=d+1 d Using Pascal’s identity, we get      m−b X a+b−d−1 m−b a m−b = (−1) + (−1) b−1 a d d a=d+1    m−b a+b−d−1 = (−1) b − 1 a a=d m−b X a m−1−(b−1) X (−1) a=d a    m − 1 − (b − 1) a + (b − 1) − d . b−1 a Thus we have that Am,b,d − Am,b,d+1 = Am−1,b−1,d for all m − 1 ≥ b ≥ d + 1 and d ≥ 0. Therefore, Bm−1,b−1     b−1 X b−1 d b−1 (Am,b,d −Am,b,d+1 ) = (−1) Am−1,b−1,d = (−1) = d d d=0 d=0 b−1 X b−1 X d (−1) d=0 d     b−1 X b−1 d b−1 Am,b,d+1 = (−1) Am,b,d − d d d=0     b X b b−d d−1 b − 1 (−1) Am,b,d = (−1) Am,b,d − d d − 1 b d=0 d=1 b−1 X d NEARLY COMMUTING MATRICES 11     b X b b−d d b d (−1) Am,b,d + (−1) Am,b,d = d d b b d=0 d=1 b−1 X d   b Am,b,d + Am,b,0 + (−1)b Am,b,b = (−1) d d=1 b−1 X d   b Am,b,d = Bm,b . (−1) d d=0 b X d Thus we have that Bm−1,b−1 = Bm,b for all m ≥ 1 and m − 1 ≥ b ≥ 1. In case m = 1, we only have B1,0 = 0. Finally, use induction on m to conclude that Bm,b = 0 for all m ≥ 1 and m − 1 ≥ b. P Thus, Cm = m b=0 Bm,b = 1. Finally, we complete the proof of Theorem 9. We have that m[p] and R/I is F -pure when n = 3.  Q 1≤i6=j≤n up−1 ∈ / ij  Corollary 2. Let R be a ring as in Notation 1. When n = 3, R/P, R/Q and R/(P + Q) are F -pure Cohen-Macaulay rings and R/(P + Q) is Gorenstein. Proof. By [Tho85], R/P is a Cohen-Macaulay ring when n = 3. Since the ideals P and Q are linked via I, that is I : P = Q and I : Q = P , we have that R/Q is also Cohen-Macaulay, see [PS74]. Moreover, the theory of linkage also implies that (P + Q)/P and (P + Q)/Q are isomorphic to the canonical modules of R/P and R/Q, respectively. Hence R/(P + Q) is Gorenstein of dimension n2 + n − 1.  Corollary 3. Let R be a ring as in Notation 1. Then P + Q is radical when n = 3. 12 ZHIBEK KADYRSIZOVA Remark. We prove in the next section that for all n, the radical of P + Q is prime, which implies that P + Q is prime when n = 3. In particular, we have that R/(P + Q) is a domain when n = 3. 3. Irreducibility of P + Q In this section we prove that the intersection of the variety of commuting matrices and the skew-component is irreducible. But first we define some notions. Definition. Let X be an n by n matrix of indeterminates. Then D(X) is an n by n matrix whose ith column is defined by the diagonal entries of X i−1 numbered from upper left corner to lower right corner. Let P(X) denote the determinant of D(X). Theorem 10 ([You11]). P(X) is an irreducible polynomial. Remark. P(X) = P(X − aI), where a ∈ K and I ∈ Mn (K) is the identity matrix. The next two lemmas are due to H. Young. They give us the connection between the variety defined by P(X) and the algebraic set of nearly commuting matrices. Lemma 5 ([You11]). Given an n × n matrix A, if there exists a matrix B such that [A, B] is a non-zero diagonal matrix, then P(A) = 0. Lemma 6 ([You11]). There is a dense open set U in the variety defined by P(X) where for every point A in U, there exists a matrix B such that [A, B] is a nonzero diagonal matrix.  NEARLY COMMUTING MATRICES 13 The following notion of a discriminant is of significant importance in matrix theory. We use it in this section in order to reduce our study to the case when commuting matrices have a particularly simple characterization. Definition. Let A ∈ Mn (K). Then the discriminant ∆(A) of A is the discriminant of its characteristic polynomial. That is, if K contains all the eigenvalues Q λ1 , . . . , λn of A, then ∆(A) = 1≤i<j≤n (λi − λj )2 . Fact. Let A ∈ Mn (K) be a matrix such that ∆(A) 6= 0, or equivalently, A has distinct eigenvalues. Then a matrix B commutes with A if and only if B is a polynomial in A of degree at most n − 1, see Theorem 3.2.4.2 [HJ85]. Remark. P(X) is an irreducible polynomial of degree n(n − 1)/2 and ∆(X) is a polynomial of degree n(n − 1). Moreover, when n ≥ 3, P(X) does not divide ∆(X). This can be proved by showing that there exists a matrix A with the property that P(A) = 0 while ∆(A) 6= 0. For example, for this purpose one can use the following matrices.    0 1 0 ... 0 0     0 0 1 ... 0 0      0   0 en =   if p ∤ n, and E , otherwise. En =  ... ...     0 En−1    0 0 0 ... 0 1    1 0 0 ... 0 0 en . The characteristic polynomials are xn − 1 for En and x(xn−1 − 1) for E Here is the outline for how we prove the main result of this section, that is, Rad(P + Q) is prime. (1) dim V(P + Q) = n2 + n − 1 and V(P + Q) is equidimensional. 14 ZHIBEK KADYRSIZOVA (2) dim V(P + Q, ∆(X)) ≤ n2 + n − 2, that is, ∆(X) is not in any of the minimal primes of P + Q. (3) Rad(P + Q)R∆(X) is a prime ideal. We observe that P + Q has no minimal primes of height larger than one over P and Q. First we need the following theorem due to R. Hartshorne. Theorem 11 ([Har62] Proposition 2.1). Let A be a Noetherian local ring with the maximal ideal m. If Spec(A) − {m} is disconnected, then the depth of A is at most 1. Lemma 7. Let P and Q be ideals as in Notation 1. Then every minimal prime of P + Q has height n2 − n + 1. Proof. Suppose that there exists a minimal prime ideal T of P + Q of height at least ht(I)+2. Localize at T . Then (P +Q)(R/I)T is T (R/I)T -primary. Moreover, V(P ) and V(Q) are disjoint on the punctured spectrum Spec((R/I)T ) − {T (R/I)T }. However, the above theorem shows that this is not possible.  Now let us define the set-up which we need to state and prove our next result. Let m be a positive integer such that m ≤ n. Fix a partition (h1 , . . . , hm ) of n, that is, choose positive integers h1 , . . . , hm such that h1 + . . . + hm = n. Let Ji be an upper triangular Jordan form of a nilpotent matrix of size hi . For each hi there are finitely many choices of Ji . Let J = (J1 , . . . , Jm ) and let Ii denote the identity matrix of size hi . For any m-tuple λ = λ1 , . . . , λm of distinct elements of K, let J(λ) = J(λ1 , . . . , λm ) be a matrix such that for all 1 ≤ i ≤ m, the blocks λi Ii + Ji are on the main diagonal. That is, J(λ) is the direct sum of matrices λi Ii + Ji . NEARLY COMMUTING MATRICES 15 Let Λ = {(λ1 , . . . , λm ) ∈ Am | λi 6= λj for all 1 ≤ i 6= j ≤ m}. It is an open subset of Am and therefore is irreducible and has dimension m. Let WJ = {A ∈ Mn (K) | A is similar to some J(λ1 , . . . , λm ) with λ1 , . . . , λm ∈ K distinct}. Let cJ denote the dimension of the set of matrices that commute with J(λ), for some λ. This number is independent of the choice of λ, since J(λ) commutes with a matrix A if and only if A is a direct sum of matrices Ai such that each Ai has size hi and Ai commutes with Ji . Moreover, cJ is the dimension of the set of invertible matrices that commute with J(λ), for some λ. Lemma 8. The dimension of WJ is n2 − cJ + m. Proof. Define a surjective map of algebraic sets θ : GLn (K) × Λ → WJ such that (U, λ1 , . . . , λm ) → U −1 J(λ1 , . . . , λm )U. Fix λ = (λ1 , . . . , λm ). Then θ−1 (J(λ)) = {(U, µ) ∈ GLn (K) × Λ | U −1 J(µ)U = J(λ)} and it has the dimension of the set {U ∈ GLn (K) | J(λ)U = UJ(λ)}, that is, it is the set of all invertible matrices commuting with J(λ). 16 ZHIBEK KADYRSIZOVA Let M = U −1 J(λ)U ∈ WJ and let (V, µ) ∈ θ−1 (M). Then U −1 J(λ)U = V −1 J(µ)V for some µ and J(µ) = (UV −1 )−1 J(λ)(UV −1 ). Hence, (V, µ) ∈ θ−1 (J(λ))U. Therefore, θ−1 (J(λ)) and θ−1 (M) have the same dimension. Since the dimension of WJ is the dimension of GLn (K) × Λ minus the dimension of a generic fiber θ−1 (J(λ)), we have that the dimension of WJ is n2 − cJ + m. Moreover, the set of pairs of matrices (A, B) ∈ Mn (K) × Mn (K) such that A and B commute has dimension (n2 − cJ + m) + cJ = n2 + m ≤ n2 + n.  Claim. Let W = {(A, B) ∈ Mn (K)×Mn (K)| [A, B] = 0, ∆(A) = 0, P(A) = 0, P(B) = 0}, then there is an injective map Ψ : V(P + Q, ∆(X)) → W so that (A, B) → (A, B). Proof. Let (A, B) ∈ V(Q, ∆(X)) − V(P + Q, ∆(X)). Then by Lemma 5, P(A) = P(B) = 0. Therefore, (A, B) ∈ W . Since V(Q) is the closure of V(Q)−V(P +Q) we have that P(A) = P(B) = 0 for all (A, B) ∈ V(Q, ∆(X)). Hence, V(P + Q, ∆(X)) ⊆ W .  Claim. The dimension of the set W = {(A, B) ∈ Mn (K) × Mn (K)| [A, B] = 0, ∆(A) = 0, P(A) = 0, P(B) = 0} is at most n2 + n − 2. Proof. Let V = {(A, B) ∈ Mn (K) × Mn (K)| [A, B] = 0, ∆(A) = 0} and Vm = {(A, B) ∈ V | A has m distinct eigenvalues }. Then we have that dim Vm = NEARLY COMMUTING MATRICES n2 + m and V = Sn−1 m=1 17 Vm . Therefore, dim V ≤ n2 + n − 1. Notice that since ∆(A) = 0, m ≤ n − 1. Similarly, let Wm = {(A, B) ∈ W | A has m distinct eigenvalues }. Then Sn−1 Wm . For each value of m, Wm ⊆ Vm . Therefore, the dimension W = m=1 of W is at most n2 + n − 1. Moreover, W is a closed subset of V defined by the vanishing of P(X) and P(Y ). To prove the claim we need to show that dim W cannot be n2 + n − 1. We do this by showing that W does not contain any component of V of dimension n2 + n − 1. In other words, we show that there are pairs of matrices (A, B) ∈ V but not in W , i.e., either P(A) 6= 0 or P(B) 6= 0. Let A ∈ Mn (K) be a matrix with distinct eigenvalues λ = λ1 = λ2 , λ3 , . . . , λn . Then A is similar to a Jordan matrix   λ   0   Case 1. A is similar to J =   0    ...  0 in two possible forms.  0 0 0 ... 0   λ 0 0 ... 0    0 λ3 0 . . . 0     ... ...   0 0 0 . . . λn Take B = diag(a1 , . . . , an ) be a diagonal matrix with distinct entries on the Q diagonal. Then [A, B] = 0 and P(B) = 1≤i<j≤n (aj − ai ) 6= 0.       Case 2. A is similar to J =       λ 1 0 0 ... 0 λ 0 0 ... 0 0 λ3 0 . . . ... 0 ... 0 0 ... 0 ...  0   0    0       λn 18 ZHIBEK KADYRSIZOVA  Write J =  J0 0    0 , where J0 =    J1  λ4 0   0 λ5    0 λ 0  and J1 =      0 0 λ3 0 0 λ 1 0     Take an n by n block-diagonal matrix U =   U0 0 0 U1 ... 0 ... 0 ... . . . λn   such that U0 = 0 0 1      1 1 0  and U1 ∈ Mn−3 (K) is the identity matrix.   0 1 1     −1 −1 U 0 0 U J U 0  and U −1 JU =  0 0 0 . Then U −1 =  −1 0 U1 0 J1 Our goal is to show that P(U −1 JU) 6= 0. First, we prove it for the case of 3 by 3 matrices, i.e., for U0−1 J0 U0 . Observe that P(U0−1 J0 U0 ) = P(U0−1 J0 U0 − λI) = P(U0−1 (J0 − λI)U0 ). Denote M = U −1 (J − λI)U and M0 = U0−1 (J0 − λI)U0 . We have that U0−1   1 1 −1     =  −1 0 1    1 0 0 and  1 1 − (λ3 − λ) −(λ3 − λ)   M0 = U0−1 (J0 − λI)U0 =  −1 −1 + (λ3 − λ) (λ3 − λ)  1 1 0    .       .    NEARLY COMMUTING MATRICES Moreover,  0 −(λ3 − λ)2 −(λ3 − λ)2   M02 =  0  0 (λ3 − λ) 2 (λ3 − λ) 0 2 0 19    .  In particular, the diagonal diag(M0i ) = (0, (λ3 − λ)i , 0) for all i ≥ 2. Then  1 1 0   P(M0 ) = det  1 −1 + (λ3 − λ) (λ3 − λ)2  1 0 0     = (λ3 − λ)2 6= 0.  Finally,         P(M) = det        1 1 1 0 −1 + λ3 − λ (λ3 − λ) 1 0 1 λ4 − λ 2 0 (λ3 − λ) ... 3 0 ... λn − λ . . . (λ3 − λ) ... n−1 0 ... (λn − λ)2 (λn − λ)3 . . . (λn − λ)n−1 n Y = (λi − λ)2 i=3 0 (λ4 − λ)2 (λ4 − λ)3 . . . (λ4 − λ)n−1 ... 1 0 Y         =       (λj − λi ) 6= 0. 3≤i<j≤n The final expression for the determinant is nonzero. Hence dim W ≤ n2 +n−2. Thus we have that ∆(X) is not in any of the minimal primes of P + Q.  Now we prove that P + Q has only one minimal prime. 20 ZHIBEK KADYRSIZOVA Theorem 12. Let P and Q be as in Notation 1. Then V(P +Q) is irreducible, i.e., Rad(P + Q) is prime. Proof. Let U be a dense open subset in the algebraic set defined by P(X) as in Lemma 6. Let A ∈ Mn (K) be such that P(A) = 0. Suppose that A ∈ U. Then by Lemma 6 there exists a matrix B such that (A, B) is in the skew-component of the algebraic set of nearly commuting matrices, that is (A, B) ∈ V(Q). Let K[t] be a polynomial ring in one independent variable t. Fix any f ∈ K[t]. Then (A, cB + f (A)) ∈ V(Q) for all c ∈ K − {0}. Since Q defines a closed set, we must have that (A, f (A)) ∈ V(Q), i.e., when c = 0 as well. Since U is a dense subset in V(P(X)), (A, f (A)) ∈ V(Q) for all A ∈ V(P(X)). Recall that f was an arbitrary element of K[t]. Now assume also that ∆(A) 6= 0. Then every matrix B that commutes with A is a polynomial in A of degree at most n − 1. Thus V(P )∆(X) = {(A, f (A)) | ∆(A) 6= 0 and f is a polynomial of degree at most n−1}. Moreover, since V(P + Q) ⊂ V(P ), every element of V(P + Q)∆(X) is of the form (A, f (A)), where P(A) = 0 and f is a polynomial of degree at most n−1. Identify polynomials f ∈ K[t] of degree at most n − 1 with An . Then we can consider a map V(P(X))∆(X) × An → V(P + Q)∆(X) such that (A, f ) → (A, f (A)). Moreover, this map is a bijective morphism. Therefore, V(P + Q)∆(X) is irreducible. If V(P + Q) is not irreducible, then its nontrivial irreducible NEARLY COMMUTING MATRICES 21 decomposition will give us a nontrivial irreducible decomposition of V(P + Q)∆(X) , since ∆(X) is not in any of the minimal primes of P + Q. Thus the result.  Corollary 4. Let P and Q be as in Notation 1. Then, when n = 3, P + Q is prime.  4. The ideal of nearly commuting matrices is a radical ideal In this section we prove that I is a radical ideal in all characteristics. We T know that Rad(I) = P Q and I is unmixed as the heights of P and Q are equal to n2 − n. To prove the result it is sufficient to show that I becomes prime or radical once we localize at P or Q. Theorem 13. The defining ideal of the algebraic set of nearly commuting matrices is radical. Proof. For simplicity of notation, let P denote P(X). T T We have that K[X] P = (0), since every f ∈ K[X] P must vanish when we set X = Y . Therefore, W = K[X] − {0} is disjoint from P and hence from I. Localize at P . Then we have an injective homomorphism of K[X, Y ]/I-modules (K[X, Y ]/I)P ֒→ (K(X)[Y ]/I)P ∼ = (L[Y ]/I)P , where L = K(X) and now I is an ideal generated by n2 − n linear equations in the entries of Y with coefficients in L. We can always choose at least n variables yij , (i, j) ∈ Λ, and write the rest of them as L-linear combinations of the chosen ones. Thus (K[X, Y ]/I)P ֒→ L[yij ](i,j)∈Λ and IK[X, Y ]P is prime. 22 ZHIBEK KADYRSIZOVA T Next observe that K[X] Q = (P). Clearly, (P) ⊆ Q. To prove the other T direction, let f ∈ K[X] Q be nonzero. Then by Lemma 5, f ∈ (P). In other words, for all A ∈ Mn (K) such that A ∈ V(Q) and such that there exists a matrix B with the property that [A, B] is nonzero diagonal, then P(A) = 0. Therefore, we have an injective homomorphism of K[X, Y ]/I-modules (K[X, Y ]/I)Q ֒→ (V [Y ]/I)Q , where V = K[X](P) is a discrete valuation domain. Then generators of I become linear polynomials in the entries of Y with coefficients in V . Let B be the matrix of coefficients of this linear system such that its rows are indexed by (i, j) for 1 ≤ i 6= j ≤ n and columns are indexed by (h, k) for all 1 ≤ h, k ≤ n. Then for i 6= h and k 6= j B has an entry xih in the (i, k), (h, k) spot, has an entry −xkj in the (i, j), (i, k) spot, and xii − xjj in the (i, j)(i, j) spot and zero everywhere else. Let y1 , . . . , yn2 denote the entries of Y such that y(i−1)n+j = yij . In V [Y ], I is generated by the entries of the matrix    y1     y2    B .  ...      y n2 By doing elementary row operations over V , we can transform B into a diagonal matrix C. This gives new generators of I. To prove that IV [Y ] is radical, it is sufficient to show that the diagonal entries in C have order at most one in V . To this end it reduces to show that C has rank n2 − n and the ideal generated by the minors of C of size n2 − n cannot be contained in NEARLY COMMUTING MATRICES 23 P 2 V . But then it is sufficient to prove this for the original matrix B. Hence it suffices to show: Claim. (1) The submatrix B0 of B obtained from the first n2 − n columns has nonzero determinant in V . (2) The determinant of B0 is in (P) − (P 2 ). Proof. (1) It is sufficient to prove the first part of the claim over K(X) = frac(V ), i.e., after we invert P. In this case, since X and Y nearly commute, they must commute, see Lemma 5. Moreover, X is a generic matrix, hence its discriminant is nonzero and is not divisible by P. Thus X has distinct eigenvalues and Y is a polynomial in X of degree at most n − 1. Write B = [B0 |B1 ], then our equations become   y1   y2  B0   ...   yn2 −n    yn2 −n+1     yn2 −n+2     + B1   ...      y n2       = 0.    Notice that B0 is invertible if and only if for every choice of the values for [yn2 −n+1 , . . . , yn2 ] there is a unique solution for the above equation. Furthermore, the bottom rows of X 0 , X, . . . , X n−1 are linearly independent for a generic matrix X. This is true because it even holds for the permutation 24 ZHIBEK KADYRSIZOVA matrix   0 1   0 0   E= ...     0 0  1 0  0 ... 0 0   1 ... 0 0     ...    0 ... 0 1   0 ... 0 0 for which the bottom rows of E 0 , E, . . . , E n−1 are the standard basis vectors ei for 1 ≤ i ≤ n. Thus, given any bottom row ρ of Y , there exist α0 , . . . , αn−1 ∈ K(X) such that ρ equals the bottom row of α0 + α1 X + . . . + αn−1 X n−1 . That is, such a Y is uniquely determined by the entries of its bottom row. Therefore, B0 is invertible in K(X). (2) First, let us show that det B0 ∈ (P). For any matrix A in an open dense subset of the closed set defined by P, there exists a matrix A′ such that the commutator [A, A′ ] is a nonzero diagonal matrix, see Lemma 6 . Hence, for all c ∈ K − {0} and for all f ∈ K[X] polynomials of degree at most n − 1, (A, cA′ + f (A)) ∈ V(I). Therefore, the space of solutions of    y1     y2    B· =0  ...      y n2 has dimension n + 1, but we showed in (1) that it must be n. Therefore, the minors of B must vanish whenever P vanishes. NEARLY COMMUTING MATRICES 25 Notice that the degree of the polynomial P is n(n − 1)/2, while the degree of det B0 is n(n − 1). Therefore, to prove part (2) it is sufficient to show that det B0 is not a K-scalar multiple of P 2 . Now let us put grading on the entries of X and Y . Let deg xij = deg yij = i − j. Then their products XY and Y X and sums have this property as well: deg (XY )ij = i − j and deg (X + Y )ij = i − j. Therefore, so does the commutator matrix XY − Y X. In fact, any polynomial in X and Y has this property. Notice that the diagonal entries have degree 0, thus P has degree 0. However, this is not the case for the determinant of the matrix B0 . The nonzero entry corresponding to (i, j), (k, h) has degree i − j + h − k. Therefore, if a product of the entries is a nonzero term of the determinant of B0 , then its P P P degree is 1≤i6=j≤n 1≤h≤n 1≤k<n (i − j + h − k) = n2 (n − 1)2 /2 6= 0 for all n ≥ 2. Hence det B0 cannot be a K-scalar multiple of P 2 . That is, when we factor out P from the minors of B, the remaining expression is not divisible by P.  Now we are ready to finish our discussion. Let C = [C0 |C1 ] be a matrix that is obtained from B by elementary row transformations so that C0 = diag(cii )1≤i≤n2 −n is a diagonal matrix. We proved that there exists 1 ≤ k ≤ n2 −n with the property that cii is a unit in V for all i 6= k and ckk ∈ (P)−(P 2 ). Denote ckk = αP, where α is a unit in V . 26             ZHIBEK KADYRSIZOVA The ideal I is generated by the following equations   c11 0 0 . . . 0    y1  0 c22 0 . . . 0    y2  ... ...   ...  2 2 0 0 0 . . . cn −n−1,n −n−1 0   yn2 −n 0 0 0 ... 0 cn2 −n,n2 −n    yn2 −n+1     yn2 −n+2    +C1   ...      y n2      .    Pn Then V [Y ]/I ∼ = V [yn2 −n+1 , yn2 −n+2 , . . . , yn2 ][ykk ]/(αP − j=1 (C1 )kj yn2 −n+j ) is reduced. To show this we consider two cases. If all (C1 )kj ∈ P, then the last factor ring is isomorphic to V [yn2 −n+1 , yn2 −n+2 , . . . , yn2 ][z]/(zP). If there is j so that (C1 )kj is a unit, then the factor ring is isomorphic to V [yi ]n2 −n+1≤i6=j≤n2 [ykk ]. In either case, it is reduced. Therefore, since we have an injective map (R/I)Q ֒→ (V [Y ]/I)Q , IRQ is radical.  5. Conjectures In this section we state conjectures that we have made while doing the research. Many of them appeared as a result of computations performed on a computer algebra program Macaulay2, [GS]. Conjecture 2. Let R be as in Notation 1. Then R/P , R/Q and R/(P + Q) are F -regular. Remark. In the case when n = 2 the conjecture is true. The following lemma allows us to reduce the above conjecture to the F regularity of R/(P + Q). NEARLY COMMUTING MATRICES 27 Lemma 9. Let R be a Noetherian local or N-graded ring of prime characteristic p > 0 and let I be an ideal (homogeneous in the graded case) generated by a regular sequence. Let P and Q be ideals of R of the same height such that P T and Q are linked via I = P Q. Let R/P be Cohen-Macaulay. Suppose that R/(P + Q) is F -regular (or equivalently, F -rational). Then R/P and R/Q are F -regular. Proof. By [PS74], R/Q is Cohen-Macaulay and has the canonical module isomorphic to (P + Q)/Q. Similarly, the canonical module of R/P is (P + Q)/P . Then R/(P + Q) is Gorenstein, hence it is F -rational if and only if it is F regular. Recall that a graded ring R is F -regular if and only if Rm is F -regular, [LS99]. Then R/(P + Q) is F -rational if and only if its localization at the homogeneous maximal ideal is F -rational. Then by applying Corollary 2.9 in [Ene03] we have that F -rationality of R/(P + Q) implies F -regularity of R/P and R/Q.  Thus if we want to prove that the variety of commuting matrices and the skew component are F -regular, it is sufficient to prove the statement for their intersection. Of course we need to know whether R/P is Cohen-Macaulay. Conjecture 3. R/I is F -pure for all n. The above conjecture can be solved by proving the following one. Conjecture 4. Let µ = Qn−1 i=1 Qn i=1,j=1 Then µp−1 is a monomial term of modulo p. xij yij xii yi,n−i+1 ·xn,n−1 ·yn−1,1 Q 1≤i6=j≤n . upij with coefficient equal to 1 28 ZHIBEK KADYRSIZOVA Remark. The above monomial can be obtained taking the product of all the variables and dividing by the variables according to the following pattern: denote by ⋆ the variable to be divided out. ⋆ x12 ... x1,n−2 x1,n−1 x1n x21 ⋆ ... x2,n−2 x2,n−1 x2n ... X= ... xn−2,1 xn−2,2 . . . ⋆ xn−1,1 xn−1,2 . . . xn−1,n−2 xn,1 xn,2 ... xn,n−2 , xn−2,n−1 xn−1,n ⋆ xn−1,n ⋆ xn,n y11 y12 y1,3 ... y1,n−1 ⋆ y21 y22 y2,3 ... ⋆ y2n ... Y = yn−2,1 yn−2,2 ⋆ ⋆ yn,1 yn,2 ... ⋆ . . . yn−2,n−1 yn−2,n yn−1,3 . . . yn−1,n−1 yn−1,n yn,3 ... yn,n−1 yn,n Conjecture 5. Let X be a matrix of indeterminates of size n over a field K. Let P(X) be the irreducible polynomial as in Definition 3. Then K[X]/P(X) is F -regular. Conjecture 6. The following is a regular sequence on R/I and hence a part of a system of parameters on R/J and R/Q. xst − yt,θ(s,t) , x1n , xnn , x11 − y2n NEARLY COMMUTING MATRICES   (s + t)mod n, for all 1 ≤ s, t, ≤ n and where θ(s, t) =  n, 29 if s + t 6= n; if s + t = n. Remark. The conjecture was verified by using Macaulay2 software when n = 3, 4 over K = Q and in some small prime characteristics. In the case when n = 3, this is equivalent to the following identifications of variables in matrices X and Y x11 x12 X= x21 x22 x22 , x31 x32 x31 x11 x21 0 0 Y = x22 x32 x12 . 0 x22 0 Conjecture 7. Let Z ⊆ {uij | 1 ≤ i 6= j ≤ n} be any subset of cardinality at most n2 − n − 1. Let IZ be the ideal of R generated by the elements of Z. Then R/IZ is F -regular. In particular, IZ is a prime ideal. 6. Acknowledgement This paper is the part of the thesis written by the author during her doctorate study at the University of Michigan. The author would like to express an enormous gratitude to Mel Hochster for the support and guidance received while working on the paper. This work was supported in part by NSF grant DMS-1401384 and the Barbour Scholarship at the University of Michigan. 30 ZHIBEK KADYRSIZOVA References [Ene03] F. Enescu, Applications of pseudocanonical covers to tight closure problems, J. Pure Appl. Algebra 178(2) (2003), 159–167. [Fed87] R. Fedder, F-purity and rational singularity in graded complete intersection rings, Transactions of the American Mathematical Society 301 (1987), no. 1, 47–62. [Ger61] M. Gerstenhaber, On dominance and varieties of commuting matrices, Ann. Math. 73 (1961), 324–348. [GS] D. Grayson and M. Stillman, tem for algebraic geometry Macaulay 2: and commutative a computer algebra sysalgebra, available at http://www.math.uiuc.edu/Macaulay2. [Har62] R. Hartshorne, Complete intersections and connectedness, American Journal of Mathematics 84 (1962), no. 3, 497–508. [HH94] M. Hochster and C. Huneke, Tight closure of parameter ideals and splitting in module-finite extensions, J. Algebraic Geom. 3 (1994), no. 4, 599–670. [HJ85] R. Horn and C. Johnson, Matrix analysis, Cambridge Univ. Press, Cambridge, UK, 1985. [Knu05] A. Knutson, Some schemes related to the commuting variety, Journal of Algebraic Geometry 14 (2005), 283–294. [LS99] G. Lyubeznik and K. Smith, Strong and weak F-regularity are equivalent for graded rings, American Journal of Mathematics 121 (1999), no. 6, 1279–1290. [PS74] C. Peskine and L. Szpiro, Liaison des variétés algébriques, i, Invent. Math. 26 (1974), 271–302. [ST12] K. Schwede and K. Tucker, A survey of test ideals, Progress in Commutative Algebra 2, Closures, Finiteness and Factorization, Walter de Gruyter GmbH and Co. KG Berlin (2012), 39–99. [Tho85] M. Thompson, Topics in the ideal theory of commutative Noetherian rings, Ph.D. thesis, University of Michigan, 1985. [You11] H. Young, Components of algebraic sets of commuting and nearly commuting matrices, Ph.D. thesis, University of Michigan, 2011. NEARLY COMMUTING MATRICES Email address: [email protected] Department of Mathematics, School of Science and Technology, Nazarbayev University 53 Kabanbay Batyr Ave, Astana 010000, Kazakhstan 31
0math.AC
Learning and Real-time Classification of Hand-written Digits With Spiking Neural Networks Shruti R. Kulkarni, John M. Alexiades, Bipin Rajendran arXiv:1711.03637v1 [stat.ML] 9 Nov 2017 Department of Electrical and Computer Engineering, New Jersey Institute of Technology, Newark, NJ, 07102, USA Email: {srk68, jma59, bipin}@njit.edu Abstract—We describe a novel spiking neural network (SNN) for automated, real-time handwritten digit classification and its implementation on a GP-GPU platform. Information processing within the network, from feature extraction to classification is implemented by mimicking the basic aspects of neuronal spike initiation and propagation in the brain. The feature extraction layer of the SNN uses fixed synaptic weight maps to extract the key features of the image and the classifier layer uses the recently developed NormAD approximate gradient descent based supervised learning algorithm for spiking neural networks to adjust the synaptic weights. On the standard MNIST database images of handwritten digits, our network achieves an accuracy of 99.80% on the training set and 98.06% on the test set, with nearly 7× fewer parameters compared to the state-of-the-art spiking networks. We further use this network in a GPU based user-interface system demonstrating real-time SNN simulation to infer digits written by different users. On a test set of 500 such images, this real-time platform achieves an accuracy exceeding 97% while making a prediction within an SNN emulation time of less than 100 ms. Index Terms—Spiking neural networks, classification, supervised learning, GPU based acceleration, real-time processing I. I NTRODUCTION The human brain is a computational marvel compared to man-made systems, both in its ability to learn to execute highly complex cognitive tasks, as well as in its energy efficiency. The computational efficiency of the brain stems from its use of sparsely issued binary signals or spikes to encode and process information. Inspired by this, spiking neural networks (SNNs) have been proposed as a computational framework for learning and inference [1]. General purpose graphical processing units (GP-GPUs) have become an ideal platform for accelerated implementation of large scale machine learning algorithms [2]. There have been multiple GPU based implementations for simulating large SNNs [3]–[8], with most of these targeting the forward communication of spikes through large networks of spiking neurons and/or local weight update based on spike timing difference. In contrast, we demonstrate a highly optimized real time implementation scheme for spike based supervised learning on GPU platforms and use the framework for real time inference on digits captured from different users through a touch-screen interface. Previous efforts to develop deep convolutional spiking networks started by using second generation artificial neural This research was supported in part by grants from National Science Foundation Award 1710009, CISCO, and the McNair Fellowship Program. networks (ANNs) with back-propagation of errors to train the network and thereafter converting it into spiking versions [9]– [12]. There have been several supervised learning algorithms proposed to train the SNNs, by explicitly using the time of spikes of neurons to encode information, and to derive the appropriate weight update rules to minimize the distance between desired spike times and observed spike times in a network [13]–[17]. We use the Normalized Approximate Descent (NormAD) algorithm to design a system to identify handwritten digits. The NormAD algorithm has shown superior convergence speed compared to other methods such as the Remote Supervised Method (ReSuMe) [13]. Our SNN is trained on the MNIST database consisting of 60, 000 training images and 10, 000 test images [18]. The highest accuracy SNN for the MNIST was reported in [16], where a two-stage convolution neural network achieved an accuracy of 99.31% on the test set. Our network, in contrast, has just three layers, with about 82, 000 learning synapses (7× fewer parameters compared to [16]) and achieves an accuracy of 98.06% on the MNIST test dataset. The paper is organized as follows. The computational units of the SNN and the network architecture are described in section II. Section III details how the network simulation is divided among different CUDA kernels. The user-interface system and the image pre-processing steps are explained in Section IV. We present the results of our network simulation and speed related optimizations in Section V. Section VI concludes our GPU based system implementation study. II. S PIKING N EURAL N ETWORK The basic units of an SNN are spiking neurons and synapses interconnecting them. For computational tractability, we use the leaky integrate and fire (LIF) model of neurons, where the evolution of the membrane potential, Vm (t) is described by: dVm (t) = −gL (Vm (t) − EL ) + I(t) (1) C dt Here I(t) is the total input current, EL is the resting potential, and C (300 pF) and gL (30 nS) model the membrane capacitance and leak conductance, respectively [13]. Once the membrane potential crosses a threshold (Vm (t) ≥ VT ), it is reset to its resting value EL and remains at that value till the neuron comes out of its refractory period (tref = 3 ms). The synapse, with weight wk,l connecting input neuron k to output neuron l, transforms the incoming spikes (arriving at ©2017 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. times t1k , t2k , . . .) into a post-synaptic current (Ik,l ), based on the following transformation,   X (2) ck (t) = δ(t − tik ) ∗ e−t/τ1 − e−t/τ2 i Ik,l (t) = wk,l × ck (t) (3) Here, the summed δ function represents the incoming spike train and the double decaying exponentials with τ1 = 5 ms and τ2 = 1.25 ms represent the synaptic kernel. These values closely match the biological time constants [19]. in the output layer generates a spike train with a frequency close to 285 Hz and the other output neurons issue no spikes during the presentation duration, T (set to 100 ms in baseline experiments). T is also a hyper-parameter of our network, and its effect on the network’s classification ability will be discussed in section V. This layer also has lateral inhibitory connections that helps to prevent the non-label neurons from spiking for a given input. The output neuron with the highest number of spikes is declared the winner of the classification. B. Learning layer A. Network architecture & spike encoding We use a three-layered network where hidden layer performs feature extraction and the output layer performs classification (see Fig. 1). The network is designed to take input from 28×28 pixel MNIST digit image. We translate this pixel value into a set of spike streams, by passing the pixels as currents to a layer of 28 × 28 neurons (first layer). The current i(k) applied to a neuron corresponding to pixel value k, in the range [0, 255] is obtained by the following linear relation: i(k) = I0 + k × Ip (4) where Ip = 101.2 pA is a scaling factor, and I0 = 2700 pA is the minimum current above which an LIF neuron can generate a spike (for the parameters chosen in equation 1). These spike streams are then weighted with twelve 3 × 3 synaptic weight maps (or filters), with a priori chosen values to generate equivalent current streams using equations 2 and 3. These 12 spatial filter maps are chosen to detect various edges and corners in the image. Convolution layer Input currents 28 x 28 neurons 28x28 pixel Input Image Input Layer Spike Trains Twelve spatial filters of size 3x3 Learning Synapses (Fully Connected Layer) 10 neurons 26x26x12 neurons Output Layer All-to-all lateral inhibitory connections The 8112×10 synapses connecting the hidden layer neurons to the 10 output layer neurons are modified during the course of training using the NormAD rule [13]. The strength of the weights are adjusted based on the error between the observed and desired spike streams (e(t) = S d (t) − S o (t)) and the ˆ term d(t), denoting the effect of incoming spike kernels on the neuron’s membrane potential, according to the relation: Z T d̂(t) dt, d̂(t) = c(t) ∗ ĥ(t) (5) ∆w = r e(t) k d̂(t)k 0 where ĥ(t) = (1/C) exp(−t/τL ) represents the neuron’s impulse response with τL = 1 ms, and r is the learning rate. III. CUDA IMPLEMENTATION The SNN is implemented on a GPU platform using the CUDA-C programming framework. A GPU is divided into streaming multiprocessors (SM), each of which consists of stream processors (SP) that are optimized to execute math operations. The CUDA-C programming framework exploits the hardware parallelism of GPUs and launches jobs on the GPU in a grid of blocks each mapped to an SM. The blocks are further divided into multiple threads, each of which is scheduled to run on an SP, also called a CUDA core. Since memory transfer between CPU and GPU local memory is one of the main bottlenecks, all network variables (i.e., neuron membrane potentials and synaptic currents) are declared in the global GPU memory in our implementation. The simulation equations (1), (2) and (3) are evaluated numerically in an iterative manner at each time step. Next epoch Next time step The output layer consists of 10 neurons, one for each of the ten digits. We train the network so that the correct neuron Read in all images from MNIST Generate spike trains GPU device memory LIF Layer -1 784 neurons Image (28x28) Fig. 1: The 28×28 pixel images from the MNIST database are converted to spike trains, which are presented for a duration T , weighted with twelve 3 × 3 synaptic weight maps (below) resulting in twelve 26 × 26 current streams and then feed to the corresponding feature map neurons. There are 10 output neurons corresponding to each digit. The weights of the fullyconnected feed-forward synapses to the output layer neurons (8112 × 10) are adjusted using the NormAD learning rule [13]. Additionally, the output layer neurons also have lateral inhibitory connections. LIF Layer-2 (8112 neurons) Synaptic current Current summation (10 currents) Spike Trains Synaptic currents LIF Layer-3 12 Convolution kernels (10 neurons) (26x26 synapses per map) (8112x10 synapses) Spike errors Weight Update (8112x10 synapses) Netowork Output Compute del_w Compute d_hat (8112x10 synapses) (8112 Spike Trains) Fig. 2: Diagram showing the different variables of the network being computed each time step and how the signals flow across different layers. The dimensions within the brackets are the sizes of those variables and their respective CUDA kernels. Fig. 2 shows the forward pass and backward pass for weight update during the training phase. Image pixels read into the GPU memory are passed as currents to layer one neurons (grid size of 28 × 28) for the presentation duration, T . The filtering process involves 2D convolution of the incoming spike kernels and the weight matrix (3 × 3). The computation is parallelized across 12 CUDA kernels, each with a grid size of 26 × 26 threads. Each thread computes the current to the hidden layer neurons, indexed as a 2D-array i, j, {0 ≤ i, j, ≤ 25} at a timestep n, based on the following spatial convolution relation: 2 X 2 X Iin (i, j, n) = wconv (a, b) × c(i + a, j + b, n) (6) a=0 b=0 where c represents the synaptic kernel (equation 2) calculated from the spike trains of the 28 × 28 pixels and wconv (a, b) represents each of the weights from the 3 × 3 filter matrix. The membrane potential of an array of k LIF neurons, for applied current I(n) (as described in equation 1) is evaluated using the second order Runge-Kutta method as: k1 = [−gL (Vm (n) − EL ) + I(n)]/C (7) k2 = [−gL (Vm (n) + k1 ∆t − EL ) + I(n)]/C (8) Vm (n + 1) = Vm (n) + [(k1 + k2 )∆t/2] (9) Each thread k independently checks if the membrane potential has exceeded the threshold to artificially reset it. If Vmk (n + 1) ≥ VT ⇒ Vmk (n + 1) = EL IV. R EAL - TIME INFERENCE ON USER DATA We used the CUDA based SNN described in the previous section, to design a user interface that can capture and identify the images of digits written by users in real-time from a touchscreen interface. The drawing application to capture the digit drawn by the user is built using OpenCV, an image processing library [21]. The captured image from the touch screen is pre-processed using standard methods similar to that used to generate the MNIST dataset images [18]. We convert the user drawn images to the required format which is a grayscale image of size 28 × 28 pixels. The network is implemented on the NVIDIA GTX 860M GPU which has 640 CUDA cores. The preprocessing phase takes about 15 ms and this image is then passed to the trained SNN for inference. The CUDA process takes about 300 ms to initialize the network in the GPU memory, after which the network simulation time depends on the presentation time T and the time step interval ∆t. (a). (b). (10) Refractory period is implemented by storing the latest spike issue time, nlast of each neuron in a vector R; the membrane k potential of a neuron is updated only when the current time step n > nlast + (tref /∆t). k The synaptic current from neuron k in hidden layer to neuron l in output layer as given in equation 3 can be re-written to be evaluated in an iterative manner, thereby avoiding the evaluation of expensive exponential of the difference between the current time n and previous spike times nik . The synaptic current computation, at time step n, for each of the (k, l) synapse is spawned in CUDA across 8112 × 10 kernels as: ak (n) = ak (n − 1) × exp(−∆t/τ1 ) + δ(n − nik ) (11) nik ) (12) bk (n) = bk (n − 1) × exp(−∆t/τ2 ) + δ(n − update the synaptic weights in parallel. The evaluation of the total synaptic current and the norm is performed using parallel reduction in CUDA [20]. During the inference or testing phase, we calculate the synaptic currents and membrane potentials of neurons in both layers to determine spike times, but do not evaluate the d̂ term and the weight update. ck (n) = ak (n) − bk (n) (13) Ik,l = wk,l × ck (n) (14) where ak (n) and bk (n) represent the rising and falling regions of the double exponential synaptic kernel. The strength of the synapses between the hidden and output layers is initialized to zero during training. At every time step, the error function for each output neuron is calculated, based on the difference between the observed and desired spikes. Next, dˆk (equation 5) for the spikes originating from neuron k is computed as: dˆk (n) = dˆk (n − 1)e−∆t/τL + (ck (n)∆t)/C (15) Once dˆk (n) is evaluated, we compute its norm across all k neurons and determine the instantaneous ∆wk,l (n) for all the 81, 120 synapses in parallel, if there is a spike error. At the end of presentation, the accumulated ∆wk,l is used to Drawn Image Inverted Image Bounding boxed Image Normalized and center-massed 28x28 Image Fig. 3: (a) Outline of the preprocessing steps used to convert the user input to a 28×28 image that is fed to the network, (b) Examples of user input (left) and the pre-processed 28 × 28 pixel images fed to the SNN (right). A. Image Preprocessing Fig. 3(a) shows the preprocessing steps used to create the input signal to the SNN from the captured image and Fig. 3(b) shows some sample pre-processed images. The image captured from the user is first binarized by thresholding and cropped to remove excess background. The image is resized to 20 pixels along its longer dimension, while maintaining its aspect ratio. Thereafter, the resized image is placed in a 28 × 28 bounding box such that the image’s center of mass coincides with the center of the bounding box. Finally, the image is passed through a blurring filter to create gray-scale images similar to the ones in the MNIST dataset. V. R ESULTS We trained the network on the MNIST training data-set consisting of 60, 000 images, for 20 epochs. Our network achieves an error of 0.2% on the training set and 1.94% on the test set with a time step of ∆t = 0.1 ms when the network is simulated for T = 100 ms. Table I lists the state-of-theart networks (ANN and SNN) for the MNIST classification problem. It can be seen that though these networks have classification accuracies exceeding 99%, they use more than 7× the number of parameters compared to our network, which is designed to simplify the computational load in developing real-time system. TABLE I: Comparison of our SNN with state-of-the-art Network and learning algorithm Deep Learning [22] ANN converted to SNN [9] 4-layer convolution SNN [16] SNN, with NormAD (this work) Learning synapses 2, 508, 470 1, 422, 848 581, 520 81, 120 Accuracy 99.79% 99.12% 99.31% 98.06% Test accuracy (%) If the integration time step interval used during inference is 1 ms (i.e., approximating the neuronal integration) instead of 0.1 ms, the MNIST test error increases only by about 0.4% (see Fig. 4(a)), but there is a 10× reduction in the processing time. Hence, for our touch screen based interface system we simulate the SNN with ∆t of 1 ms to infer the users’ digits. When each digit is presented for T = 75 ms, the network can be simulated in an average wall clock time of 65 ms, making real-time processing possible (Fig. 4(b)). We tested (a). 0 28 x 28 Image 98.0 4 9 97.8 dt=0.1 ms dt=1.0 ms 97.6 97.4 50 100 150 Presentation time [ms] Image Capture t=0 Preprocessing complete t=15 (b). Output Spikes SNN prediction and result display t=80 Time [ms] Fig. 4: (a). MNIST test-set accuracy as a function of presentation time and the integration time step ∆t. (b) Various stages of classifying a user’s input: the image pre-processing takes 15 ms and the 75 ms SNN emulation is completed in real-time. the network’s accuracy with ∆t = 1 ms on a set of 500 handwritten digits collected from various users through our user-interface system. At T = 75 ms, we measure an accuracy of 97.4% on our set of 500 captured images, while on the MNIST test-set it was 97.68%. The slight loss in performance compared to the MNIST dataset is attributed to the deviations from the statistical characteristics of the captured images compared to the MNIST dataset. VI. C ONCLUSION We developed a simple three-layer spiking neural network that performs spike encoding, feature extraction, and classification. All information processing and learning within the network is performed entirely in the spike domain. With approximately 7 times lesser number of synaptic weight parameters compared to the state of the art spiking networks, we show that our approach achieves classification accuracy exceeding 99% on the training set of the MNIST database and 98.06% on its test set. The trained network implemented on the CUDA parallel computing platform is also able to successfully identify digits written by users in real-time, demonstrating its true generalization capability. We have also demonstrated a general framework for implementing spike based neural networks and supervised learning with non-local weight update rules on a GPU platform. At each time step, the neuronal spike transmission, synaptic current computation and weight update calculation for the network are all executed in parallel in this framework. Using this GPU implementation, we demonstrated a touch-screen based platform for real-time classification of user-generated images. R EFERENCES [1] W. Maass, “Networks of spiking neurons: The third generation of neural network models,” Neural networks, vol. 10, no. 9, pp. 1659–1671, 1997. [2] A. Coates et al., “Deep learning with COTS HPC systems,” in 30th International Conference on Machine Learning, 2013. [3] A. K. Fidjeland and M. P. Shanahan, “Accelerated simulation of spiking neural networks using GPUs,” in The 2010 International Joint Conference on Neural Networks (IJCNN). IEEE, 2010, pp. 1–8. [4] J. M. Nageswaran et al., “A configurable simulation environment for the efficient simulation of large-scale spiking neural networks on graphics processors,” Neural networks, vol. 22, no. 5, pp. 791–800, 2009. [5] E. Yavuz, J. Turner, and T. Nowotny, “GeNN: a code generation framework for accelerated brain simulations,” Nature Scientific Reports, vol. 6, no. 18854, 2016. [6] D. Yudanov et al., “GPU-based simulation of spiking neural networks with real-time performance and high accuracy,” in International Joint Conference on Neural Networks, July 2010. [7] F. Naveros et al., “Event-and time-driven techniques using parallel CPUGPU co-processing for Spiking Neural Networks,” Front. in Neuroinformatics, vol. 11, 2017. [8] J. L. Krichmar, P. Coussy, and N. Dutt, “Large-scale spiking neural networks using neuromorphic hardware compatible models,” ACM Journal on Emerging Technologies in Computing Systems (JETC), vol. 11, no. 4, p. 36, 2015. [9] P. U. Diehl et al., “Fast-classifying, high-accuracy spiking deep networks through weight and threshold balancing,” in 2015 International Joint Conference on Neural Networks (IJCNN), July 2015, pp. 1–8. [10] Y. Cao, Y. Chen, and D. Khosla, “Spiking deep convolutional neural networks for energy-efficient object recognition,” International Journal of Computer Vision, vol. 113, no. 1, pp. 54–66, 2015. [11] B. Rueckauer et al., “Theory and tools for the conversion of analog to spiking convolutional neural networks,” arXiv preprint arXiv:1612.04052, 2016. [12] E. Hunsberger and C. Eliasmith, “Training Spiking Deep Networks for Neuromorphic Hardware,” arXiv preprint arXiv:1611.05141, 2016. [13] N. Anwani and B. Rajendran, “NormAD -Normalized Approximate Descent based supervised learning rule for spiking neurons,” in International Joint Conference on Neural Networks, July 2015, pp. 1–8. [14] F. Ponulak and A. Kasinski, “Supervised learning in spiking neural networks with ReSuMe: sequence learning, classification, and spike shifting,” Neural Computation, vol. 22, no. 2, pp. 467–510, 2010. [15] A. Mohemmed et al., “SPAN: Spike Pattern Association Neuron for Learning Spatio-Temporal Spike Patterns,” International Journal of Neural Systems, vol. 22, no. 04, 2012. [16] J. H. Lee, T. Delbruck, and M. Pfeiffer, “Training Deep Spiking Neural Networks using Backpropagation,” Frontiers in Neuroscience, vol. 10, p. 508, 2016. [17] W. W. Lee, S. L. Kukreja, and N. V. Thakor, “CONE: ConvexOptimized-Synaptic Efficacies for Temporally Precise Spike Mapping,” IEEE Transactions on Neural Networks and Learning Systems, vol. 28, no. 4, pp. 849–861, April 2017. [18] “The MNIST database of handwritten digits,” available at http://yann.lecun.com/exdb/mnist/. [19] P. Dayan, L. Abbott et al., “Theoretical neuroscience: computational and mathematical modeling of neural systems,” Journal of Cognitive Neuroscience, vol. 15, no. 1, pp. 154–155, 2003. [20] M. Harris, “Optimizing parallel reduction in CUDA,” available at http://bit.ly/2gd7fSb. [21] I. Culjak, D. Abram, T. Pribanic, H. Dzapo, and M. Cifrek, “A brief introduction to OpenCV,” in 2012 Proceedings of the 35th International Convention MIPRO, May 2012, pp. 1725–1730. [22] L. Wan et al., “Regularization of Neural Networks using DropConnect,” in Proceedings of the 30th International Conference on Machine Learning, 2013, pp. 1058–1066.
9cs.NE
arXiv:1608.01654v2 [cs.PL] 7 Nov 2016 Hypercollecting Semantics and its Application to Static Analysis of Information Flow Mounir Assaf David A. Naumann Julien Signoles Stevens Institute of Technology, Hoboken, US [email protected] Stevens Institute of Technology, Hoboken, US [email protected] Software Reliability and Security Lab, CEA LIST, Saclay, FR [email protected] Éric Totel Frédéric Tronel CIDRE, CentraleSupélec, Rennes, FR [email protected] CIDRE, CentraleSupélec, Rennes, FR [email protected] Abstract We show how static analysis for secure information flow can be expressed and proved correct entirely within the framework of abstract interpretation. The key idea is to define a Galois connection that directly approximates the hyperproperty of interest. To enable use of such Galois connections, we introduce a fixpoint characterisation of hypercollecting semantics, i.e. a “set of sets” transformer. This makes it possible to systematically derive static analyses for hyperproperties entirely within the calculational framework of abstract interpretation. We evaluate this technique by deriving example static analyses. For qualitative information flow, we derive a dependence analysis similar to the logic of Amtoft and Banerjee (SAS’04) and the type system of Hunt and Sands (POPL’06). For quantitative information flow, we derive a novel cardinality analysis that bounds the leakage conveyed by a program instead of simply deciding whether it exists. This encompasses problems that are hypersafety but not k-safety. We put the framework to use and introduce variations that achieve precision rivalling the most recent and precise static analyses for information flow. Categories and Subject Descriptors D.2.4 [Software Engineering]: Software/Program Verification–Assertion checkers; D.3 [Programming Languages]; F.3.1 [Logics and meanings of programs]: Semantics of Programming Language Keywords static analysis, abstract interpretation, information flow, hyperproperties 1. Introduction Most static analyses tell something about all executions of a program. This is needed, for example, to validate compiler optimizations. Functional correctness is also formulated in terms of a predicate on observable behaviours, i.e. more or less abstract execution traces: A Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, to republish, to post on servers, or to redistribute to lists, contact the Owner/Author(s). Request permissions from [email protected] or Publications Dept., ACM, Inc., fax +1 (212) 869-0481. POPL ’17, January 18 - 20, 2017, Paris, France Copyright c 2017 held by owner/author(s). Publication rights licensed to ACM. ACM 978-1-4503-4660-3/17/01. . .$15.00 DOI: http://dx.doi.org/10.1145/http://dx.doi.org/10.1145/3009837.3009889 program is correct if all its traces satisfy the predicate. By contrast with such trace properties, extensional definitions of dependences involve more than one trace. To express that the final value of a variable x may depend only on the initial value of a variable y, the requirement—known as noninterference in the security literature (Sabelfeld and Myers 2003)—is that any two traces with the same initial value for y result in the same final value for x. Sophisticated information flow policies allow dependences subject to quantitative bounds—and their formalisations involve more than two traces, sometimes unboundedly many. For secure information flow formulated as decision problems, the theory of hyperproperties classifies the simplest form of noninterference as 2-safety and some quantitative flow properties as hypersafety properties (Clarkson and Schneider 2010). A number of approaches have been explored for analysis of dependences, including type systems, program logics, and dependence graphs. Several works have used abstract interpretation in some way. One approach to 2-safety is by forming a product program that encodes execution pairs (Barthe et al. 2004; Terauchi and Aiken 2005; Darvas et al. 2005), thereby reducing the problem to ordinary safety which can be checked by abstract interpretation (Kovács et al. 2013) or other means. Alternatively, a 2-safety property can be checked by dedicated analyses which may rely in part on ordinary abstract interpretations for trace properties (Amtoft et al. 2006). The theory of abstract interpretation serves to specify and guide the design of static analyses. It is well known that effective application of the theory requires choosing an appropriate notion of observable behaviour for the property of interest (Cousot 2002; Bertrane et al. 2012, 2015). Once a notion of “trace” is chosen, one has a program semantics and “all executions” can be formalized in terms of collecting semantics, which can be used to define a trace property of interest, and thus to specify an abstract interpretation (Cousot and Cousot 1977, 1979; Cousot 1999). The foundation of abstract interpretation is quite general, based on Galois connections between semantic domains on which collecting semantics is defined. Clarkson and Schneider (2010) formalize the notion of hyperproperty in a very general way, as a set of sets of traces. Remarkably, prior works using abstract interpretation for secure information flow do not directly address the set-of-sets dimension and instead involve various ad hoc formulations. This paper presents a new approach of deriving information flow static analyses within the calculational framework of abstract interpretation. First contribution. We lift collecting semantics to sets of trace sets, dubbed hypercollecting semantics, in a fixpoint formulation which is not simply the lifted direct image. This can be composed with Galois connections that specify hyperproperties beyond 2safety, without recourse to ad hoc additional notions. On the basis of this foundational advance, it becomes possible to derive static analyses entirely within the calculational framework of abstract interpretation (Cousot and Cousot 1977, 1979; Cousot 1999). Second contribution. We use hypercollecting semantics to derive an analysis for ordinary dependences. This can be seen as a rational reconstruction of both the type system of Hunt and Sands (2006, 2011) and the logic of Amtoft and Banerjee (2004). They determine, for each variable x, a conservative approximation of the variables y whose initial values influence the final value of x. Third contribution. We derive a novel analysis for quantitative information flow. This shows the benefit of taking hyperproperties seriously by means of abstract interpretation. For noninterference, once the variables y on which x depends have fixed values, there can be only one final value for x. For quantitative information flow, one is interested in measuring the extent to which other variables influence x: for a given range of variation for the “high inputs”, what is the range of variation for the final values of x? We directly address this question as a hyperproperty: given a set of traces that agree only on the low inputs, what is the cardinality of the possible final values for x? Using the hypercollecting semantics, we derive a novel cardinality abstraction. We show how it can be used for analysis of quantitative information problems including a bounding problem which is not k-safety for any k. The calculational approach disentangles key design decisions and it enabled us to identify opportunities for improving precision. We assess the precision of our analyses and provide a formal characterisation of precision for a quantitative information flow analysis vis a vis qualitative. Versions of our analyses rival state of the art analyses for qualitative and quantitative information flow. Our technical development uses the simplest programming language and semantic model in which the ideas can be exposed. One benefit of working entirely within the framework of abstract interpretation is that a wide range of semantics and analyses are already available for rich programming languages. Outline. Following the background (Section 2), we introduce domains and Galois connections for hyperproperties (Section 3) and hypercollecting semantics (Section 4). Hyperproperties for information flow are defined in Section 5. We use the framework to derive the static analyses in Section 6 and Section 7. Section 8 uses examples to evaluate the precision of the analyses, and shows how existing analyses can be leveraged to improve precision. We discuss related work (Section 9) and conclude. Appendices provide detailed proofs for all results, as well as a table of symbols. 2. Background: Collecting Semantics, Galois Connections The formal development uses deterministic imperative programs over integer variables. Let n range over literal integers Z, x over variables, and ⊕ (resp. cmp) over some arithmetic (resp. comparison) operators. c ::= skip | x := e | c1 ; c2 | if b then c1 else c2 | while b do c e ::= n | x | e1 ⊕ e2 | b b ::= e1 cmp e2 Different program analyses may consider different semantic domains as needed to express a given class of program properties. For imperative programs, the usual domains are based on states σ ∈ States that map each variable to a value (Winskel 1993). Some P(States∗ ) P(Trc) P(States) Figure 1. Fragment of the hierarchy of semantic domains abstraction (−−−−−→) program properties require the use of traces that include intermediate states; others can use more abstract domains. For information flow properties involving intermediate outputs, or restricted to explicit data flow (Schoepe et al. 2016), details about intermediate steps are needed. By contrast, bounding the range of variables can be expressed in terms of final states. As another example, consider determining which variables are left unchanged: To express this, we need both initial and final states. In this paper we use the succinct term trace for elements of Trc defined by Trc , States × States, interpreting t ∈ Trc as an initial and final state. In the literature, these are known as relational traces, by contrast with maximal trace semantics using the set States∗ of finite sequences. A uniform framework describes the relationships and correspondences between these and many other semantic domains using Galois connections (Cousot 2002). Three of these domains are depicted in Figure 1. Given partially ordered sets C, A, the monotone functions α ∈ C → A and γ ∈ A → C comprise a Galois connection, γ − − (A, v), provided they satisfy a proposition we write (C, ≤) ← −− α→ α(c) v a iff c ≤ γ(a) for all c ∈ C, a ∈ A. For example, to specify an analysis that determines which variables are never changed, let A be sets of variables. Define α ∈ P(Trc) → P(Vars) by α(T ) = {x | ∀(σ, σ 0 ) ∈ T, σ(x) = σ 0 (x)} and γ(X) = {(σ, σ 0 ) | ∀x ∈ X, σ(x) = σ 0 (x)}. Then γ − − (P(V ar), ⊇). (P(Trc), ⊆) ← −− α→ For the hierarchy of usual domains, depicted in Figure 1, the connections are defined by an “element-wise abstraction”. Define elt ∈ States∗ → Trc by elt(σ0 σ1 . . . σn ) , (σ0 , σn ). This lifts to an abstraction P(States∗ ) → P(Trc). Lemma 1 Element-wise abstraction. Let elt ∈ C → A be a function between sets. Let αelt (C) , {elt(c) | c ∈ C} and γelt −− −− − (P(A), ⊆). γelt (A) , {c | elt(c) ∈ A}. Then (P(C), ⊆) ← −− → α− elt The domain P(States), which suffices to describe the final reachable states of a program, is an abstraction of the relational domain P(Trc), by elt(σ, τ ) , τ . In this paper we focus on the domain Trc because it is the simplest that can express dependences. Program semantics. We define both the denotational semantics JcK ∈ Trc⊥ → Trc⊥ of commands and the denotational semantics JeK ∈ Trc → Val of expressions. Here Val , Z and Trc⊥ adds bottom element ⊥ using the flat ordering. JcK ∈ Trc⊥ → Trc⊥ Standard semantics of commands JcK⊥ , ⊥ Jx := eK(σ, τ ) , (σ, τ [x 7→ JeK(σ, τ )]) Jc1 ; c2 Kt , Jc2 K ◦ Jc1 Kt JskipKt , t ( Jc1 Kt Jif b then c1 else c2 Kt , Jc2 Kt if JbKt = 1 if JbKt = 0 Jwhile b do cKt , (lfp4̇ (λt.⊥) F)(t) ( t where F(w)(t) , w ◦ JcKt if JbKt = 0 otherwise Let t be a trace (σ, τ ). The denotation JeKt evaluates e in the “current state”, τ . (In Sect. 5 we also use JeKpre t which evaluates e in the initial state, σ.) The denotation JcKt is (σ, τ 0 ) where execution of c in τ leads to τ 0 . The denotation is ⊥ in case c diverges from τ . Boolean expressions evaluate to either 0 or 1. We assume programs do not go wrong. We denote by 4̇ the point-wise lifting to Trc⊥ → Trc⊥ of the approximation order 4 on Trc⊥ . The terminating computations of c can be written as its image on the initial traces: {JcKt | t ∈ IniTrc and JcKt 6= ⊥} where IniTrc , {(σ, σ) | σ ∈ States} To specify properties that hold for all executions we use collecting semantics which lifts the denotational semantics to arbitrary sets T ∈ P(Trc) of traces. The idea is that ⦃c⦄T is the direct image of JcK on T . To be precise, in this paper we focus on terminationinsensitive properties, and thus ⦃c⦄T is the set of non-⊥ traces t0 such that JcKt = t0 for some t ∈ T . Later we also use the collecting semantics of expressions: ⦃e⦄T , {JeKt | t ∈ T }. Importantly, the collecting semantics ⦃c⦄ ∈ P(Trc) → P(Trc) can be defined compositionally using fixpoints (Cousot 2002, Sec. 7). For conditional guard b, write ⦃ grdb ⦄ for the filter defined by ⦃ grdb ⦄T , {t ∈ T | JbKt = 1}. ⦃c⦄ ∈ P(Trc) → P(Trc) Collecting semantics ⦃x := e⦄T , {Jx := eKt | t ∈ T } ⦃c1 ; c2 ⦄T , ⦃c2 ⦄ ◦ ⦃c1 ⦄T ⦃skip⦄T , T ⦃if b then c1 else c2 ⦄T , ⦃c1 ⦄ ◦ ⦃ grdb ⦄T ∪ ⦃c2 ⦄ ◦ ⦃ grd¬b ⦄T   ⦃while b do c⦄T , ⦃ grd¬b ⦄ lfp⊆ T ⦃if b then c else skip⦄ The clause for while loops uses the denotation of a constructed conditional command as a definitional shorthand—its denotation is compositional. γ − − (A, v), such as Given a Galois connection (P(Trc), ⊆) ← −− α→ the one for unmodified variables, the desired analysis is specified as α ◦ ⦃c⦄ ◦ γ. Since it is not computable in general, we only require an approximation f ] ∈ A → A that is sound in this sense: α ◦ ⦃c⦄ ◦ γ v̇ f ] (1) where v̇ denotes the point-wise lifting of the partial order v. To explain the significance of this specification, suppose one wishes to prove program c satisfies a trace property T ∈ P(Trc), i.e. to prove that ⦃c⦄(IniTrc) ⊆ T . Given eq. (1) it suffices to find an abstract value a that approximates IniTrc, i.e. IniTrc ⊆ γ(a), and show that γ(f ] (a)) ⊆ T (2) ] ˙ eq. (1) is equivalent to ⦃c⦄ ◦ γ ⊆ γ ◦ f by a property of Galois connections. So eq. (2) implies ⦃c⦄(γ(a)) ⊆ T which (by monotonicity of ⦃c⦄) implies ⦃c⦄(IniTrc) ⊆ ⦃c⦄(γ(a)) ⊆ T . The beauty of specification eq. (1) is that f ] can be obtained as an abstract interpretation ⦃c⦄] , derived systematically for all c by calculating from the left side of eq. (1) as shown by Cousot (1999). 3. Domains and Galois Connections for Hyperproperties To express hyperproperties, we need Galois connections for domains that involve sets of sets of observable behaviours. This section spells out how such powerset domains form a hierarchy as illustrated along the top of Figure 2. We describe how dependences and P(P(States∗ )) P(P(Trc)) P(P(States)) P(States∗ ) P(Trc) P(States) abstraction Figure 2. Extended hierarchy of semantic domains (−−−−−→) cardinalities for quantitative information flow can be formulated as Galois connections. We spell out a methodology whereby the standard notions and techniques of abstract interpretation can be applied to specify and derive—in the same form as Equation (1)— static analyses for hyperproperties. As a first example, consider the condition: the final value of x depends only on the initial value of y. Its expression needs, at least, two traces: If two traces, denoted by (σ, σ 0 ) and (τ, τ 0 ), agree on the initial value of y then they agree on the final value of x. That is, σ(y) = τ (y) implies σ 0 (x) = τ 0 (x). This must hold for any two traces of the program. This is equivalent to the following: For all sets T of traces, if traces in T all agree on the initial value of y then they all agree on the final value of x. Later we extend this example to an analysis that infers which dependences hold. Consider the problem of quantifying information flow with mincapacity (Smith 2009). For a program on two integer variables h, l, the problem is to infer how much information is conveyed via l about h: considering some traces that agree on the initial value of l, how many final values are possible for l. For example, the program l := (h mod 2) + l has two final values for l, for each initial l, though there are many possible initial values for h. This cardinality problem generalizes prior work on quantitative flow analysis, where typically low inputs are not considered. Whereas the simple dependence problem can be formulated in terms of 2 traces, the cardinality problem involves trace sets of unbounded size. In the terminology of hyperproperties, it is not a k-safety hyperproperty for any k (Yasuoka and Terauchi 2011, Sec. 3), although it is hypersafety (Clarkson and Schneider 2010). For a fixed k, the problem “variable l has at most k − 1 final values” is k-safety, which means it can be formulated in terms of sets with at most k traces. It turns out that by using Galois connections on sets of sets, we can develop a general theory that encompasses many hyperproperties and which enables derivation of interesting abstract interpreters. For our applications, we use relational traces as the notion of observable behavior, and thus P(P(Trc)). The approach works as well for other notions, so there is a hierarchy of domains as shown at the top of Figure 2, in parallel with the ordinary hierarchy shown along the bottom. The abstractions of this hierarchy are obtained by lifting each abstraction between two standard collecting semantics (Cousot 2002) to their hypercollecting versions, by element-wise abstraction (Lemma 1). For instance, Lemma 1 justifies the abstraction between P(P(Trc)) and P(P(States)), by lifting the abstraction between P(Trc) and P(States) (Cousot 2002, Sec. 8). Additionally, the diagonal lines in Figure 2 represent abstractions between hypercollecting semantics defined over some form of observations and the corresponding collecting semantics defined over the same observations. Lemma 2 . Let C be a set. Define αhpp (C) , ∪C∈C C and γhpp (C) , P(C). These form a Galois connection: γhpp −− −−− − (P(C), ⊆) (P(P(C)), ⊆) ← −− → α −− hpp It is noted by Clarkson and Schneider (2010) that any trace property can be lifted to a unique hyperproperty; this lifting is exactly the concretisation γhpp of Lemma 2. Although the model of Clarkson and Schneider (2010) is quite general, it does focus on infinite traces. But hyperproperties can be formulated in terms of other notions of observation, as illustrated in Figure 2. Cardinality abstraction. To lay the groundwork for our quantitative information flow analysis, we consider abstracting a set of values by its cardinality. Cardinality is one ingredient in many quantitative information flow analyses estimating the amount of sensitive information a program may leak (Smith 2009; Backes et al. 2009; Braun et al. 2009; Köpf and Rybalchenko 2013; Mardziel et al. 2013; Doychev et al. 2013). The lattice of abstract representations we consider is the set [0, ∞] , N ∪ {∞} where ∞ denotes an infinite cardinal number. We use the natural order ≤, and max as a join. Consider the abstraction operator crdval ∈ P(Val) → [0, ∞] computing cardinality and given by crdval(V ) , |V |. This operator crdval is not additive, i.e. it does not preserve joins; e.g. crdval({1, 2} ∪ {2, 3}) 6= max(crdval({1, 2}), crdval({2, 3})). Thus, there exists no associated concretisation f for which crdval is the lower adjoint in a Galois connection. Yet, we can lift the abstraction operator crdval to a Galois connection over P(P(Val)) through what is called a supremus abstraction (Cousot 2002, p.52). Lemma 3 Supremus abstraction. Let elt ∈ C → A be a function from a set C, with codomain forming a complete lattice (A, v). Let αelt (C) , tc∈C elt(c) and γelt (a) , {c ∈ C | elt(c) v a}. Then γelt −− −− − (A, v) (P(C), ⊆) ← −− → α− elt For example, define αcrdval (V) , maxV ∈V crdval(V ) and γcrdval (n) , {V | crdval(V ) ≤ n}. Thus we obtain a Galois γcrdval ← −− −− −− −− − − ([0, ∞] , ≤). connection (P(P(Val)), ⊆) − − → αcrdval As another example let us consider, in simplified form, an ingredient in dependency or noninterference analysis. For program variable x, agreex ∈ P(States) → {tt, ff} determines whether a set of states contains only states that all agree on x’s value: agreex (Σ) , (∀σ, σ 0 ∈ Σ, JxKσ = JxKσ 0 ) Function agreex is not additive, so it is not part of a Galois connection from P(States) to {tt, ff}. The same problem arises with agreements on multiple variables, and with more concrete domains like the finite maximal trace semantics P(States∗ ). We lift the operator agreex to a Galois connection over P(P(States)). A supremus abstraction yields αagreex (S) , (∀Σ ∈ S, agreex (Σ)) γagreex (bv) , {Σ | agreex (Σ) ⇐= bv} abstract concretisation/denotation of a security requirement yields a set of sets of traces, namely a hyperproperty. Hints of this intuition appear in the literature (McLean 1994; Volpano 1999; Rushby 2001; Zakinthinos and Lerner 1997); e.g. security policies “are predicates on sets of traces (i.e. they are higher order)” (Rushby 2001, p.2). However, only recently has a comprehensive framework proposed a sharp characterisation of security policies as hyperproperties (Clarkson and Schneider 2008, 2010). Abstract interpretation of hyperproperties. The basic methodology for the verification of a hyperproperty HP, may be described as follows: Step 1. Design approximate representations forming a complete lattice A, choose a collecting semantics C among the extended hierarchy (set of sets domains, e.g. P(P(Trc))), and define α, γ γ − − (A, v). for a Galois connection (C, ≤) ← −− α→ Step 2. Compute an approximation a ∈ A of the semantics C ∈ C of the program P of interest. Step 3. Prove that the inferred approximation a implies that P satisfies HP. The concretisation γ(a) is a set of trace sets, of which the program’s trace set is a member—by contrast to approximations of trace properties, which infer a single trace set of which the program trace set is a subset. Then, it suffices to prove γ(a) ⊆ HP. Step 1 is guided by the need to have γ(a) ⊆ HP, i.e. a describes a hyperproperty that implies HP. The calculational design (Cousot 1999) of abstract domains greatly systematises Step 2, by relying on the Galois connection defined in Step 1. Collecting semantics can be adapted to the additional structure of sets, as we show in Section 4. 4. Hypercollecting Semantics In the following, we introduce a hypercollecting semantics defined over sets T ∈ P(P(Trc)) of sets of traces. This is used in subsequent sections to derive static analyses. Here is Step 2 of the methodology, spelled out in detail. Given γ − − (A, v] ) built by the a Galois connection (P(P(Trc)), ⊆) ← −− α→ supremus abstraction, and an approximation a of the initial traces (i.e. IniTrc is in γ(a)), find an approximation a0 ∈ A of the analysed program c, i.e. ⦃c⦄ IniTrc is in γ(a0 ). Then prove that the program satisfies the hyperproperty HP of interest, i.e. γ(a0 ) ⊆ HP. In order to compute a0 , we define a hypercollecting semantics LcM ∈ P(P(Trc)) → P(P(Trc)). That will serve to derive—in the manner of Equation (1)—a static analysis that is correct by construction. Hypercollecting semantics γagreex −− −− −− −− − − ({tt, ff}, ⇐=). so that (P(P(States)), ⊆) ← −− → αagree x These examples are consistent with the many formulations of noninterference (e.g. (Goguen and Meseguer 1982; Volpano and Smith 1997; Giacobazzi and Mastroeni 2004; Amtoft and Banerjee 2004; Hunt and Sands 2006)) that motivated the characterisation of information-flow security requirements as hyperproperties (Clarkson and Schneider 2010). Concretising an abstract value a can be seen as defining the denotation of a type expression (as in, for instance, Benton (2004, Sec. 3.3.1) and Hunt and Sands (1991)), i.e. defining the set of objects that satisfy the description a. Thus, concretising tt, when tt is interpreted as “satisfies a property requirement”, naturally yields a set of traces. Concretising tt, where tt is interpreted as “satisfies a security requirement”, yields a set of sets of traces. Intuitively, the most abstract denotation/concretisation of a property requirement is defined in terms of a set of traces. The most L c M ∈ P(P(Trc)) → P(P(Trc)) Lx := eMT , {⦃x := e⦄T | T ∈ T} Lc1 ; c2 MT , Lc2 M ◦ Lc1 MT LskipMT , T Lif b then c1 else c2 MT , {⦃c1 ⦄ ◦ ⦃ grdb ⦄T ∪ ⦃c2 ⦄ ◦ ⦃ grd¬b ⦄T | T ∈ T}   Lwhile b do c MT , Lgrd¬b M lfp⊆ T Lif b then c else skipM Lgrdb MT , {⦃ grdb ⦄T | T ∈ T} Recall from Section 2 that standard collecting semantics is a fixpoint-based formulation that captures the direct image on sets of the underlying program semantics – this is proved, for example, by Cachera and Pichardie (2010); Assaf and Naumann (2016). The fixpoint formulation at the level of sets-of-sets we use is not simply the direct image of the standard collecting semantics. The direct image of the standard collecting semantics would yield a set of (inner) fixpoints over sets of traces, whereas an outer fixpoint over sets of sets of traces enables straightforward application of the fixpoint transfer theorem. Theorem 1 . For all c and all T ∈ P(Trc), ⦃c⦄T is in L c M{T }. For a singleton {T }, the set LcM{T } ∈ P(P(Trc)) is not necessarily a singleton set containing only the element ⦃c⦄T . If c is a loop, LcM{T } yields a set of sets R of traces, where each set R of traces contains only traces that exit the loop after less than k iterations, for k ∈ N. We prove this theorem as corollary of the following: ∀T ∈ P(P(Trc)), {⦃c⦄T | T ∈ T} ⊆ LcMT This is proved by structural induction on commands. For loops, there is a secondary induction on iterations of the loop body. In summary, suppose one wishes to prove program c satisfies hyperproperty HP ∈ P(P(Trc)), i.e. one wishes to prove that ⦃c⦄(IniTrc) ∈ HP. Suppose we have an approximation f ] of the hypercollecting semantics, similarly to eq. (1), i.e. ] α ◦ LcM ◦ γ v̇ f ] (3) Given eq. (3) it suffices to find an abstract value a that approximates IniTrc, i.e. IniTrc ∈ γ(a), and show that: γ(f ] (a)) ⊆ HP (4) ˙ γ ◦ f ] by a property Why? Equation (3) is equivalent to LcM γ ⊆ of Galois connections. So we have ⦃c⦄(IniTrc) ∈ LcM(γ(a)) ⊆ γ(f ] (a)) ⊆ HP using IniTrc ∈ γ(a), the Theorem, and eq. (4). ◦ 5. Information Flow This section gives a number of technical definitions which build up to the definition of Galois connections with which we specify information flow policies explicitly as hyperproperties. When a fixed main program is considered, we refer to it as P and its variables as VarP . Our analyses are parametrised by the program P to analyse, and an initial typing context Γ ∈ VarP → L mapping each variable to a security level l ∈ L for its initial value. We assume (L, v, t, u) is a finite lattice. In the most concrete case, L may be defined as the universal flow lattice, i.e. the powerset of variables P(VarP ), from which all other information flow types can be inferred through a suitable abstraction (Hunt and Sands 2006, Sec. 6.2); the initial typing context is then defined as λx.{x}. Initial l-equivalence and variety. A key notion in information flow is l-equivalence. Two states are l-equivalent iff they agree on the values of variables having security level at most l. We introduce the same notion over a set of traces, requiring that the initial states are l-equivalent. Let us first denote by JeKpre ∈ Trc → Val the evaluation of expression e in the initial state σ of a trace (σ, τ ) ∈ Trc—unlike JeK ∈ Trc → Val which evaluates expression e in the final state τ . Then, we denote by T |=Γ l the judgement that all traces in a set T ⊆ Trc are initially l-equivalent, i.e. they all initially agree on the value of variables up to a security level l ∈ L. For example, in the case that L is the universal flow lattice, T |=Γ {x, y} means ∀t1 , t2 ∈ T, JxKpre t1 = JxKpre t2 ∧ JyKpre t1 = JyKpre t2 . Initial l-equivalence T |=Γ l iff. ∀t1 , t2 ∈ T, ∀x ∈ VarP , Γ(x) v l =⇒ JxKpre t1 = JxKpre t2 T |=Γ l The notion of variety (Cohen 1977) underlies most definitions of qualitative and quantitative information flow security. Information is transmitted from a to b over execution of program P if by “varying the initial value of a (exploring the variety in a), the resulting value in b after P’s execution will also vary (showing that variety is conveyed to b)” (Cohen 1977). We define the l-variety of expression e, as the set of sets of values e may take, when considering only initially l-equivalent traces. The variety is defined first as a function Ol ⦃e⦄ ∈ P(Trc) → P(P(Val)) on trace sets, from which we obtain a function Ol LeM ∈ P(P(Trc)) → P(P(Val)), on sets of trace sets. Intuitively, l-variety of expression e is the variety that is conveyed to e by varying only the input values of variables having a security level l0 such that ¬(l0 v l). Ol ⦃e⦄ l-variety Ol LeM Ol ⦃e⦄ ∈ P(Trc) → P(P(Val)) Ol ⦃e⦄T , {⦃e⦄R | R ⊆ T and R |=Γ l} Ol LeM ∈ P(P(Trc)) → P(P(Val)) Ol LeMT , ∪T ∈T Ol ⦃e⦄T Each set V ∈ Ol ⦃e⦄T of values results from initially lequivalent traces (R |=Γ l for R ⊆ T ). Thus, expression e does not leak sensitive information to attackers having a security clearance l ∈ L if Ol ⦃e⦄T is a set of singleton sets. Indeed, sensitive data for attackers with security clearance l ∈ L is all data having a security level l0 for which attackers do not have access (i.e. ¬(l0 v l) (Denning and Denning 1977)). Thus, if Ol ⦃e⦄T is a set of singleton sets, this means that no matter how sensitive information varies, this variety is not conveyed to expression e. Besides a pedagogical purpose, we define l-variety Ol ⦃e⦄ (resp. Ol LeM) instead of simply lifting the denotational semantics JeK of expressions to sets of traces (resp. sets of sets of traces) since we want to build modular abstractions of traces by relying on underlying abstractions of values. Thus, l-variety enables us to pass information about initially l-equivalent traces to the underlying domain of values by keeping disjoint values that originate from traces that are not initially l-equivalent. Specifying information flow. We now have the ingredients needed to describe information flow for command c, with respect to typing context Γ ∈ VarP → L. A quantitative security metric, introduced by Smith (2009, 2011), relies on min-entropy and mincapacity (Rényi 1961) in order to estimate the leakage of a program. Let us assume a program P that is characterized by a set TP ∈ P(Trc) of traces, i.e. TP , ⦃ P ⦄ IniTrc. For simplicity, assume attackers only observe the value of a single variable x ∈ VarP . (The generalization to multiple variables is straightforward.) The leakage of P, as measured by min-capacity, to attackers having security clearance l ∈ L is defined by MLl , log2 ◦ αcrdval ◦ Ol ⦃x⦄TP (The definition of αcrdval follows Lemma 3.) For our purposes, it suffices to know that this quantity aims to measure, in bits, the remaining uncertainty about sensitive data for attackers with security clearance l. Refer to the original work (Smith 2009) for more details. Leaving aside the logarithm in the definition of MLl , a quantitative security requirement may enforce a limit on the amount of information leaked to attackers with security clearance l ∈ L, by requiring that the l-cardinality of variable x is less than or equal to some non-negative integer k. We denote by SR(l, k, x) the hyperproperty that characterises this security requirement, i.e. the set of program denotations satisfying it: SR(l, k, x) , {T ∈ P(Trc) | αcrdval ◦ Ol ⦃x⦄T ≤ k} Note that SR implicitly depends on the choice of initial typing Γ, as does Ol ⦃x⦄T . The termination-insensitive noninterference policy “the final value of x depends only on the initial values of variables labelled at most l” corresponds to the hyperproperty SR(l, 1, x). Therefore, the program P satisfies SR(l, 1, x) if αcrdval ◦ Ol ⦃x⦄TP ≤ 1. Let T = LPM{IniTrc}. Since TP is in T (Theorem 1), then P satisfies SR(l, 1, x) if αcrdval ◦ Ol LxMT ≤ 1, by monotony of αcrdval and by Ol ⦃x⦄TP ⊆ Ol LxMT from the definition of Ol L−M. 6. Dependences We rely on abstract interpretation to derive a static analysis similar to existing ones inferring dependences (Amtoft and Banerjee 2004; Hunt and Sands 2006; Amtoft et al. 2006; Hunt and Sands 2011). Recall that our analyses are parametrised on a security lattice L and program P. We denote by l ; x an atomic dependence constraint, with l ∈ L and x ∈ VarP , read as “agreement up to security level l leads to agreement on x”. It is an atomic pre-post contract expressing that the final value of x must only depend on initial values having at most security level l. Said otherwise, l ; x states the noninterference of variable x from data that is sensitive for attackers with security clearance l, i.e. all inputs having security level l0 such that ¬(l0 v l). Dependences are similar to information flow types (Hunt and Sands 2006) and are the dual of independences assertions (Amtoft and Banerjee 2004). Both interpretations are equivalent (Hunt and Sands 2006, Sec. 5). D ∈ Dep Dep Lattice of dependence constraints Given a lattice L and program P, define Dep , P({l ; x | l ∈ L, x ∈ VarP }) D 1 v\ D 2 , D 1 ⊇ D 2 agree agree(V ) ∈ , αagree αagree (V) ∈ , γagree γagree (bv) ∈ , αagree deptr deptr(T ) ∈ , αdeptr αdeptr (T) ∈ , γdeptr γdeptr (D) ∈ , γagree P(Val) → {tt, ff} (∀v1 , v2 ∈ V, v1 = v2 ) P(P(Val)) → {tt, ff} ∧V ∈V agree(V ) {tt, ff} → P(P(Val)) {V ∈ P(Val) | agree(V ) ⇐= bv} αdeptr γdeptr P(Trc) → Dep {l ; x | l ∈ L, x ∈ VarP , αagree (Ol ⦃x⦄T )} P(P(Trc)) → Dep t\ T ∈T deptr(T ) Dep → P(P(Trc)) {T | deptr(T ) v\ D} γdeptr −− −−−− − (Dep, v\ ) (P(P(Trc)), ⊆) ← − − → α −−− deptr Note that deptr(T ) is the set of dependences l ; x for which αagree (Ol ⦃x⦄T ) holds. For instance, the initial typing context Γ ∈ VarP → L determines the initial dependences of a program: αdeptr ({IniTrc}) = {l ; x | l ∈ L, x ∈ VarP and αagree (Ol ⦃x⦄ IniTrc)} = {l ; x | l ∈ L, x ∈ VarP and Γ(x) v l} l We derive an approximation OD LeM\ of l-variety Ol LeM. This l \ approximation OD LeM ∈ Dep → {tt, ff}, called l-agreement of expression e, determines whether a set D of dependence constraints guarantees that no variety is conveyed to expression e when the inputs up to security level l are fixed. Notice that we use symbol \ and subscript D here, for contrast with similar notation using ] and subscript C in later sections. l OD LeM\ ∈ Dep → {tt, ff} l OD LnM\ D , tt In the rest of this section, L and P are fixed, together with a typing context Γ ∈ VarP → L. The semantic characterisation of dependences is tightly linked to variety. An atomic constraint l ; x holds if no variety is conveyed to x when the inputs up to security level l are fixed. We use this intuition to define the Galois connections linking the hypercollecting semantics and the lattice Dep, by instantiating the supremus abstraction in Lemma 3. The agreement abstraction approximates a set V ∈ P(P(Val)) by determining whether it contains variety. agree deptr Dependence abstraction l-agreement of expressions D1 t\ D2 , D1 ∩ D2 Agreements abstraction of level at most l. So αagree (Ol ⦃x⦄T ) holds just if there is at most one final value. l OD LxM\ D , (l ; x ∈ D) l l l OD Le1 ⊕ e2 M\ D , OD Le1 M\ D ∧ OD Le2 M\ D l l l OD Le1 cmp e2 M\ D , OD Le1 M\ D ∧ OD Le2 M\ D l Deriving the clauses defining OD L−M\ amounts to a constructive proof of the following. l Lemma 4 . OD LeM\ is sound: ∀e, ∀l, ∀D, αagree ◦ l Ol LeM ◦ γdeptr (D) ⇐= OD LeM\ D . Dependence abstract semantics. We derive a dependence abstract semantics LcM\ by approximating the hypercollecting semantics LcM. This abstract semantics LcM\ ∈ Dep → Dep over-approximates the dependence constraints that hold after execution of a command c, on inputs satisfying initial dependence constraints. We assume a static analysis approximating the variables that a command modifies. Mod ∈ Com → P(V ar) Modifiable variables −−−−− ({tt, ff}, ⇐=) (P(P(Val)), ⊆) ← −− α−−−→ For all c, x, if there exists t, t ∈ Trc such that JcKt = t0 and JxKpre t0 6= JxKt0 , then x ∈ Mod(c). Note that γagree (tt) is {V ∈ P(Val) | agree(V )} and γagree (ff) is P(Val). Also, agree(V ) iff |V | ≤ 1. The dependence abstraction approximates a set T ∈ P(P(Trc)) by a dependence constraint D ∈ Dep. Recall that Ol ⦃x⦄T is the set of final values for variable x in traces t ∈ T that agree on inputs The abstract semantics of assignments x := e discards all atomic constraints related to variable x in the input set D of constraints, and adds atomic constraints l ; x if D guarantees l-agreement for expression e. For conditionals, for each security level l, if the input set D guarantees l-agreement of the conditional guard, γagree agree 0 the abstract semantics computes the join over the dependences of both conditional branches, after projecting to only those atomic constraints related to l (notation π l (−)). If D does not guarantee l-agreement of the conditional guard, atomic constraints related to both l and variables possibly modified are discarded. Intuitively, if D guarantees l-agreement of the conditional guard, then l-agreement over some variable x in both branches guarantees l-agreement over x after the conditional command. Otherwise, the only l-agreements that are guaranteed after the conditional are those that hold before the conditional for variables that are not modified. LcM\ ∈ Dep → Dep Dependence abstract semantics LskipM\ D , D Comparison with previous analyses. Our dependence analysis is similar to the logic of Amtoft and Banerjee (2004) as well as the flowsensitive type system of Hunt and Sands (2006). The relationship between our sets D ∈ Dep of dependence constraints and the type environments ∆ ∈ VarP → L of Hunt and Sands can be formalised by the abstraction: Lc1 ; c2 M\ D , Lc2 M\ ◦ Lc1 M\ D Lx := eM\ D , l {l ; y ∈ D | y 6= x} ∪ {l ; x | l ∈ L, OD LeM\ D} Lif b then c1 else c2 M\ D , let D1 = Lc1 M\ D in let D2 = Lc2 M\ D in let W ( = Mod(if b then c1 else c2 ) in l S π l (D1 ) t\ π l (D2 ) LbM\ D if OD l / W } otherwise l∈L {l ; x ∈ π (D) | x ∈ αhs αhs (D) ∈ , γhs γhs (∆) ∈ , Dep → VarP → L λx. u {l | l ; x ∈ D} (VarP → L) → Dep {l ; x | x ∈ VarP , l ∈ L, ∆(x) v l} This is in fact an isomorphism because of the way we interpret dependences. Indeed, if l ; x holds, then also l0 ; x for all l0 ∈ L such that l v l0 (cf. Corollary 4 in Appendix G.2). This observation suggests reformulating the sets D ∈ Dep of dependence constraints to contain only elements with minimal level, but we refrain from doing so for simplicity of presentation. Our dependence analysis is at least as precise as the type system of Hunt and Sands. To state this result, we denote by ⊥L the bottom element of the lattice L. We also assume that the modified variables is precise enough to simulate the same effect as the program counter used in the type system: Mod(c) is a subset of the variables that are targets of assignments in c. Theorem 3 . For all c, D0 , D ∈ Dep, ∆0 , ∆ ∈ VarP → L, where ⊥L ` ∆0 {c}∆, and D = LcM\ D0 , it holds that: ] \ Lwhile b do cM\ D , lfpv D Lif b then c1 else c2 M π l (D) , {l ; x ∈ D | x ∈ VarP } αhs (D0 ) v̇ ∆0 =⇒ αhs (D) v̇ ∆ . Theorem 2 . The dependence semantics is sound: αdeptr \ ◦ \ LcM ◦ γdeptr v̇ LcM\ . 7. We denote by v̇ the point-wise lifting of the partial order v\ . We can derive this abstract semantics by directly approximating the relational hypercollecting semantics LcM through the dependence Galois connection (αdeptr , γdeptr ). The derivation is by structural induction on commands. It leverages mathematical properties of Galois connections. We start with the specification of the best abstract transformer αdeptr ◦ LcM ◦ γdeptr ∈ Dep → Dep, and successively approximate it to finally obtain the definition of the dependence abstract semantics for each form of command. The derivation is the proof, and the obtained definition of the abstract semantics is correct by construction. Let us showcase the simplest derivation for a sequence of commands in order to illustrate this process: αdeptr ◦ Lc1 ; c2 M ◦ γdeptr = HBy definition of the hypercollecting semanticsI αdeptr ◦ \ Lc2 M ◦ Lc1 M ◦ γdeptr v̇ HBy γdeptr αdeptr ◦ \ ◦ αdeptr is extensive I Lc2 M ◦ γdeptr ◦ αdeptr ◦ Lc1 M ◦ γdeptr v̇ HBy induction hypothesis αdeptr Lc2 M\ ◦ Lc1 M\ ◦ Lattice of cardinality constraints Card C ∈ Card For a program P and lattice L, we say C is a valid set of constraints iff ∀x ∈ VarP , ∀l ∈ L, ∃!n ∈ [0, ∞] , l ; x#n ∈ C . Let Card be the set of valid sets of constraints. It is a complete lattice: C1 v] C2 iff ∀l ; x#n1 ∈ C1 , ∃n2 , l ; x#n2 ∈ C2 ∧ n1 ≤ n2 C1 t] C2 , {l ; x# max(n1 , n2 ) | l ; x#n1 ∈ C1 , l ; x#n2 ∈ C2 } \ LcM ◦ γdeptr v̇ LcM\ I , HTake this last approximation as the definition.I Lc1 ; c2 M\ Cardinality Abstraction Dependence analysis is only concerned with whether variety is conveyed. We refine this analysis by deriving a cardinality abstraction that enumerates variety. We denote by l ; x#n an atomic cardinality constraint where l ∈ L, x ∈ VarP and n ∈ [0, ∞], read as “agreement up to security level l leads to a variety of at most n values in variable x”. Alternatively, we can leverage Galois connections to give the analysis as an approximation of the cardinality analysis. We work this out by Lemmas 6 and 7, introduced in Section 7. In the rest of this section, L and P are fixed, together with a typing context Γ ∈ VarP → L. A valid constraint set is essentially a function from l and x to n. So v] is essentially a pointwise order on functions, and we ensure that v] is antisymmetric. The cardinality abstraction relies on the abstraction αcrdval , introduced in Section 3, in order to approximate l-variety of a variable into a cardinality n ∈ [0, ∞]. crdtr Cardinality abstraction crdtr crdtr(T ) ∈ , αcrdtr αcrdtr (T) ∈ , γcrdtr γcrdtr (C ) ∈ , αcrdtr γcrdtr P(Trc) → Card {l ; x#n | l ∈ L, x ∈ VarP , n = αcrdval (Ol ⦃x⦄T ) } P(P(Trc)) → Card t] T ∈T crdtr(T ) Card → P(P(Trc)) {T | crdtr(T ) v] C } Theorem 4 . The cardinality abstract semantics is sound: γcrdtr −− −−−− (Card, v ) (P(P(Trc)), ⊆) ← −− α −−→ ] crdtr The cardinality abstraction enables us to derive an approximation l l OC LeM] of l-variety Ol LeM. This approximation OC LeM] ∈ Card → [0, ∞], called l-cardinality of expression e, enumerates the l-variety conveyed to expression e assuming a set C ∈ Card of cardinality constraints holds. Note that the infinite cardinal ∞ is absorbing, i.e. ∀n, ∞ × n , ∞. l OC LeM] ∈ Card → [0, ∞] l-cardinality of expressions l OC LnM] C , 1 l OC LxM] C , n where l ; x#n ∈ C l l l OC Le1 ⊕ e2 M] C , OC Le1 M] C × OC Le2 M] C   l l l OC Le1 cmp e2 M] C , min 2, OC Le1 M] C × OC Le2 M] C l LeM] is sound: Lemma 5 . OC ∀e, ∀l, αcrdval ◦ l ˙ OC Ol LeM ◦ γcrdtr ≤ LeM] . We now derive a cardinality abstract semantics by approximating the relational hypercollecting semantics of Section 4. It uses definitions to follow. Cardinality abstract semantics LskipM] C , C abstract semantics of conditionals is also similar to dependences: if the conditional guard does not convey l-variety, then all initially l-equivalent traces follow the same execution path and the join operator (defined as max over cardinality) over both conditional branches over-approximates the l-cardinality after the conditional. Otherwise, the l-cardinality over both conditional branches have to be summed—for the variables that may be modified in the conditional branches—to soundly approximate the l-cardinality after the conditional. LcM] ∈ Card → Card Lc1 ; c2 M] C , Lc2 M] ◦ Lc1 M] C Lx := eM] C , {l ; y#n ∈ C | y 6= x} l ∪{l ; x#n | l ∈ L, x ∈ VarP , n = OC LeM] C } Lif b then c1 else c2 M] C , let C1 = Lc1 M] C in let C2 = Lc2 M] C in let W ( = Mod(if b then c1 else c2 ) in l S π l (C1 ) t] π l (C2 ) if OC LbM] C = 1 l ] l l∈L π (C1 ) t add(W,π l (C )) π (C2 ) otherwise ] ] Lwhile b do cM] C , lfpv C Lif b then c1 else c2 M π l (C ) , {l ; x#n ∈ CS | x ∈ VarP , n ∈ [0, ∞]} C1 t] add(W,C0 ) C2 , x∈Var S P \W {l ; x#n ∈ C0 } ∪ x∈W {l ; x#(n1 +n2 ) | l ; x#nj ∈ Cj , j = 1, 2} The abstract semantics of assignments x := e is similar in spirit to the one for dependences: discard atomic constraints related to x, and add new ones by computing l-cardinality of expression e. The αcrdtr ◦ ] LcM ◦ γcrdtr v̇ LcM] . The lattice Card is complete, although not finite. We may define a widening operator ∇ ∈ Card × Card → Card to ensure convergence of the analysis (Cousot and Cousot 1992)(Nielson et al. 1999)(Cortesi and Zanioli 2011, Sec. 4). C1 ∇C2 , {l ; x#n | l ; x#n1 ∈ C1 , l ; x#n2 ∈ C2 , n = n1 ∇n2 } n1 ∇n2 , if (n2 ≤ n1 ) then n1 else ∞ The occurrence of widening depends on the iteration strategy employed by the static analyser. Widening accelerates or forces the convergence of fixpoint computations. In the simplest setting, the analyser passes as arguments to the widening operator the old set C1 of cardinality as well as the new set C2 that is computed. For each atomic cardinality constraint, the widening operator then compares the old cardinality n1 to the new cardinality n2 . If the cardinality is still strictly increasing (n2 > n1 ), the widening forces the convergence by setting it to ∞. If the cardinality is decreasing, the widening operator sets it to the maximum cardinality n1 in order to force convergence and ensure the sequence of computed cardinalities is stationary. Min-capacity leakage. So far, we showed how one can derive static analyses of hyperproperties—the abstract representations themselves are interpreted as hyperproperties—by approximating hypercollecting semantics. Let us now recall the security requirement SR(l, k, x) introduced in Section 4 in order to illustrate how these analyses may prove that a program satisfies a hyperproperty, i.e. Step 3 of the methodology in Section 3 (see also Equation (4)). Consider a program P characterised by a set TP ∈ P(Trc) of traces, i.e. TP is ⦃ P ⦄ IniTrc. How do we prove that P satisfies the hyperproperty SR(l, k, x)? We can use the cardinality analysis to prove that variable x has a l-cardinality that is at most k. Indeed, if C approximates TP (i.e. αcrdtr ({TP }) v] C ) then αcrdval ◦ l Ol ⦃x⦄TP ≤ OC LxM] C . Thus, if the inferred l-cardinality of C is at most k then program P is guaranteed to satisfy the hyperproperty SR(l, k, x). We have {TP } ⊆ γcrdtr (C ) since C approximates TP (i.e. αcrdtr ({TP }) v] C ). And we have γcrdtr (C ) ⊆ SR(l, k, x) l by assumption OC LxM] C ≤ k. Hence TP ∈ SR(l, k, x). The hyperproperty SR(l, k, x) is a (k + 1)-safety hyperproperty (Clarkson and Schneider 2010), i.e. it requires exhibiting at most k + 1 traces in order to prove that a program does not satisfy SR(l, k, x). For example, termination-insensitive noninterference for security level l, which corresponds to the hyperproperty SR(l, 1, x), is 2-safety. A k-safety hyperproperty of a program can be reduced to a safety property of a k-fold product program (Barthe et al. 2004; Terauchi and Aiken 2005; Darvas et al. 2005; Clarkson and Schneider 2010). Various quantitative information flow properties are not k-safety. For example, the bounding problem that the cardinality analysis targets, namely min-capacity leakage is not a k-safety hyperproperty for any k (Yasuoka and Terauchi 2011, Sec. 3). Instead, this bounding problem is hypersafety (Clarkson and Schneider 2010). Cardinalities vs. dependences. Just as quantitative security metrics are the natural generalisations of qualitative metrics such as noninterference, the cardinality abstraction is a natural generalisation of dependence analysis. Instead of deciding if variety is conveyed, the cardinality analysis enumerates this variety. In other words, dependences are abstractions of cardinalities. We can factor the Galois connections, e.g. (αagree , γagree ) is (αlqone ◦ αcrdval , γcrdval ◦ γlqone ) for suitable (αlqone , γlqone ). improve precision. For simplicity, we consider a two point lattice {L, H} and an initial typing context where variables yi are the only low variables (Γ(yi ) = L). As is usual, low may flow to high (L v H). Consider the following program. 1 2 3 Lemma 6 . (αagree , γagree ) is the composition of two Galois connections (αcrdval , γcrdval ) and (αlqone , γlqone ) : 4 γlqone γ Listing 1. Leaking 1 bit of secret crdval −− − −−− − ([0, ∞] , ≤) ← −−−−− ({tt, ff}, ⇐=) (P(P(Val)), ⊆) ← −− → −− α −−− α−−−→ crdval lqone The cardinality abstraction determines that x has at most 2 values after the execution of the program in Listing 1, for initially L-equivalent traces. For fixed low inputs, x has one value in the then branch and one value in the else branch, and these cardinalities get summed after the conditional since the conditional guard may evaluate to 2 different values. Thus, the cardinality abstraction proves that this example program satisfies the hyperproperty SR(L, 2, x). with: ( tt ff ( 1 γlqone (bv) , ∞ αlqone (n) , if n ≤ 1 , and otherwise. if bv = tt otherwise. Stronger trace properties. Another way of proving a hyperproperty is by proving a stronger trace property. If a program is proven to satisfy a trace property T ∈ P(Trc), then proving that T is stronger than hyperproperty H ∈ P(P(Trc))—in the sense that γhpp (T ) ⊆ H—guarantees the program satisfies the hyperproperty H. For instance, by proving for some program that an output variable x ranges over an interval of integer values whose size is k, we can prove that program satisfies SR(L, k, x). However, approximating a hyperproperty by a trace property may be too coarse for some programs, as we can illustrate with an interval analysis (Cousot and Cousot 1977) on the example program in Listing 1. Such an interval analysis loses too much precision in the initial state of this program, since it maps all low input variables y1 , y2 and y3 to [−∞, +∞]. After the conditional, it determines that x belongs to the interval [−∞, +∞], which is a coarse overapproximation. Also, a polyhedron (Cousot and Halbwachs 1978) does not capture the disjunction that is needed for this example program (x = y2 or x = y3 ). Both abstract domains and many more existing ones are not suitable for the task of inferring cardinalities or dependences because they are convex. Using them as a basis to extract counting information delivers an over-approximation of the leakage, but a coarse one, especially in the presence of low inputs. A disjunction of two polyhedra —through powerset domains, disjunctive postconditions, or partitioning (Bourdoncle 1992)— is as precise as the cardinality analysis for this example. However, disjunctions are not tractable in general. As soon as one fixes a maximum number of disjunctive elements (as in the quantitative information flow analysis of Mardziel et al. (2011, 2013)) or defines a widening operator to guarantee convergence, one loses the relative precision wrt. classical dependence analyses (Amtoft and Banerjee 2004; Hunt and Sands 2006) that the cardinality analysis guarantees (Cf. Corollary 1). Future work will investigate relying on cardinality analysis as a strategy guiding trace partitioning (Rival and Mauborgne 2007). Combining our analyses with existing domains will also deliver better precision. Consider the following program. Lemma 7 . (αdeptr , γdeptr ) is the composition of two Galois connections (αcrdtr , γcrdtr ) and (αlqonecc , γlqonecc ) : γlqonecc γ crdtr −− −−−− (Card, v] ) ← −− −−−−− − (Dep, v\ ) (P(P(Trc)), ⊆) ← −− −− → α −−→ α −−−− crdtr lqonecc with: αlqonecc (C ) , {l ;Sx | l ; x#n ∈ C and αlqone (n)} γlqonecc (D) , {l ; x#n | n = γlqone (l ; x ∈ D)} l∈L,x∈VarP We use Lemmas 6 and 7 to abstract further the cardinality abstract semantics and derive the correct by construction dependence analysis of Section 6. This derivation, which can be found in Appendix G, proves Lemma 4 and Theorem 2 stated earlier. As a corollary and by Theorem 3, this also proves the precision of the cardinality analysis relative to Amtoft and Banerjee’s logic (Amtoft and Banerjee 2004) as well as Hunt and Sands’ type system (Hunt and Sands 2006, 2011). Corollary 1 No leakage for well-typed programs. For all c, C0 , C ∈ Card, ∆0 , ∆ ∈ VarP → L, where ⊥L ` ∆0 {c}∆, and C = LcM] C0 , it holds that: αhs αlqonecc (C0 ) v̇ ∆0 =⇒   l ∀x ∈ VarP , l ∈ L, ∆(x) v l =⇒ OC LxM] ≤ 1 ◦ The cardinality analysis determines that there is no leakage for programs that are “well-typed” by the flow-sensitive type system of Hunt and Sands. By “well-typed”, we mean that the final typing environment that is computed by the type system allows attackers with security clearance l ∈ L to observe a variable x ∈ VarP . To the best of our knowledge, the cardinality abstraction is the first approximation-based analysis for quantitative information flow that provides a formal precision guarantee wrt. traditional analyses for qualitative information flow. This advantage makes the cardinality analysis appealing even when interested in proving a qualitative security policy such as non-interference, since the cardinality abstraction provides quantitative information that may assist in making better informed decisions if declassification is necessary. Nonetheless, we need further experimentation to compare to other quantitative analyses —see Section 9. 8. Towards More Precision This section introduces examples to evaluate the precision of the analyses, and shows how existing analyses can be leveraged to if (y1 ≥ secret ) then x := y2 else x := y3 1 2 if (y1 ≥ secret ) then x := y2 else x := y3 ; o := x * y4 Listing 2. Leaking x The cardinal abstraction determines that variable o leaks the two possible values of x: for fixed low inputs, x has two possible values whereas y4 has one possible value. Relational abstract domains such as polyhedra (Cousot and Halbwachs 1978) or octogons (Miné 2006a) do not support non-linear expressions, and therefore are unable to compute a precise bound of the leakage for variable o. Consider an analysis with a disjunction {x = y2 ∨ x = y3 } of polyhedra and linearisation over intervals (Miné 2006b). Linearisation of expressions y2 ∗y4 and y3 ∗y4 will compute the following constraints for variable o: {(o = y2 ∗ [−∞, +∞]) ∨ (o = y3 ∗ [−∞, +∞])} if linearisation happens for the right side of expressions, or constraint {(o = [−∞, +∞] ∗ y4 ) ∨ (o = [−∞, +∞] ∗ y4 )} if linearisation happens for the left side expressions. Two more combinations of constraints are possible, but none will deduce that variable o has at most 2 values, because the underlying domain of intervals lacks the required precision. Linearisation over both intervals and cardinalities delivers better precision. We can now also improve the dependence abstraction: αlqonecc αcrdval ◦ l Ol Lx2 M ◦ Lgrdx1 ==x2 M ◦ γcrdtr (C ) ≤ OC Lx1 M] C Therefore, we can deduce that: αcrdtr ◦ Lgrdx1 ==x2 M ◦ γcrdtr (C ) v {l ; x#n ∈ C | x 6= x1 , x 6= x2 } ] ∪ {l ; x1 # min(n1 , n2 ), l ; x2 # min(n1 , n2 ) | l ; x1 #n1 ∈ C , l ; x2 #n2 ∈ C } , Lgrdx1 ==x2 M] C For other comparison operators, we use as before Lgrdb M] C , C . l ; x1 #n1 ∈ γlqonecc (D), l ; x2 #n2 ∈ γlqonecc (D)}) For other comparison operators, we also use Lgrdb M\ D , D. With these new definitions, we can update the abstract semantics of conditionals and loops, for both dependences and cardinalities, to leverage the transfer functions Lgrd− M\ and Lgrd− M] . Improved dependences abstract semantics LcM\ ∈ Dep → Dep Lif b then c1 else c2 M\ D , let D1 = Lgrdb M\ ◦ Lc1 M\ D in let D2 = Lgrd¬b M\ ◦ Lc2 M\ D in let W ( = Mod(if b then c1 else c2 ) in l S π l (D1 ) t\ π l (D2 ) LbM\ D if OD l / W } otherwise l∈L {l ; x ∈ π (D) | x ∈ The cardinality abstraction determines that initially L-equivalent memories lead to a variety of at most 2 in the pointer p after the conditional, whereas both y2 and y3 have a variety of 1. Assuming an aliasing analysis determines that p may point to y2 or y3 , the cardinality analysis determines that variable o has a variety of at most 2, for initially L-equivalent memories. l Ol Lx1 M ◦ Lgrdx1 ==x2 M ◦ γcrdtr (C ) ≤ OC Lx2 M] C γlqonecc (D) , Lgrdx1 ==x2 M\ D Listing 3. Leaking 1 bit of secret ◦ ◦ v {l ; x ∈ D | x 6= x1 , x 6= x2 } ∪ {l ; x1 , l ; x2 | l ; x1 ∈ D or l ; x2 ∈ D} \ if (y1 ≥ secret ) then p := &y2 else p := &y3 o := * p αcrdval Lgrdx1 ==x2 M] v αlqonecc ({l ; x#n ∈ γlqonecc (D) | x 6= x1 , x 6= x2 }) ∪ αlqonecc ({l ; x1 # min(n1 , n2 ), l ; x2 # min(n1 , n2 ) | \ Scaling to richer languages. We can rely on existing abstract domains to support richer language constructs, e.g. pointers and aliasing. Consider the following variation of Listing 1. Improving precision. To improve precision of the cardinality abstraction, we can augment it with existing abstract domains. One shortcoming of the cardinality analysis is the fact that it is not relational. Assuming attackers with security clearance L observe both variables x and o after execution of the program in Listing 2, the cardinality abstraction leads us to compute a leakage of two bits: four different possible values, instead of only 2 possible values for initially L-equivalent memories. Relying on a relational domain with linearisation (Miné 2006b) over cardinalities captures the required constraints {L ; x#2, L ; o#1 ∗ x} to compute a leakage of only one bit; these constraints are to be interpreted as “initially L-equivalent memories result in o being equal to one fixed integer times x, and x having at most 2 values”. We leave these extensions of cardinality analysis —and its abstraction as dependence analysis— for future work. In the following, we focus on one particular improvement to both previous analyses in order to gain more precision. We uncovered this case while deriving the analyses, by relying on the calculational framework of abstract interpretation. Indeed, notice that the following holds: ◦ Lwhile b do cM\ D , Lgrd¬b M\ ] ◦ \ lfpv D Lif b then c1 else c2 M Improved cardinality abs. semantics LcM] ∈ Card → Card Lif b then c1 else c2 M] C , let C1 = Lgrdb M] ◦ Lc1 M] C in let C2 = Lgrd¬b M] ◦ Lc2 M] C in let W ( = Mod(if b then c1 else c2 ) in l S π l (C1 ) t] π l (C2 ) LbM] C = 1 if OC l ] l l∈L π (C1 ) t add(W,π l (C )) π (C2 ) otherwise Lwhile b do cM] C , Lgrd¬b M\ ] ◦ ] lfpv C Lif b then c1 else c2 M To illustrate the benefits of this improvement, consider the following example. 1 2 3 4 5 while ( secret != y3 ) do { x := x +1; secret := secret - 1; } o := secret ; Listing 4. Improved precision The cardinality analysis determines that initially L-equivalent memories result in x having an infinity of values: the L-cardinality of x grows until it is widened to ∞. In contrast, cardinalities also determine that variables o and secret have only 1 value, assuming Lequivalent memories. This is because of the reduction that concerns variable secret after the while loop, specifically Lgrdsecret==y3 M\ . Similarly, the improved dependence analysis also determines that both variables secret and o are low. These are sound precision gains for termination-insensitive noninterference; Askarov et al. (2008) discusses the guarantees provided by this security requirement. Remarkably, this has been overlooked by many previous analyses. In fact, this simple improvement makes our dependence analysis strictly more precise than Amtoft and Banerjee (2004)’s and Hunt and Sands (2006, 2011)’s analyses and incomparable to the more recent dependence analysis of Müller et al. (2015). Combination with intervals. Consider now the following example inspired from Müller et al. (2015). 0 1 2 3 4 1 2 3 4 5 6 7 if ( secret == 0) then { x := 0; y := y + 1; } else { x := 0; } 5 6 7 8 9 10 11 Listing 5. Example program from Müller et al. (2015) The analysis of Müller et al. (2015) determines that x is low, whereas the cardinality abstraction determines that L-equivalent memories result in at most 2 values for variable x, because it does not track the actual values of variables. We can combine cardinality with an interval analysis to be more precise in such cases, through a reduced product (Cousot and Cousot 1979; Granger 1992; Cortesi et al. 2013). Assume a set StInt of interval environments provided with ˙ ],Int . Assume also the usual partial order that we denote by ≤ Int Int a Galois connection (α , γ ) enabling the derivation of an interval analysis as an approximation of a standard collecting semantics defined over P(Trc). We can lift this Galois connection to P(P(Trc)) to obtain a Galois connection by compositing with (αhpp , γhpp ), to obtain (α0 , γ 0 ) , (αInt ◦ αhpp , γ Int ◦ γhpp ) with: γhpp γ Int hpp αInt ˙ ],Int ) −− −−− − (P(Trc), ⊆) ← −− −− − − (StInt, ≤ (P(P(Trc)), ⊆) ← −− → −− → α −− A Granger’s reduced product Granger (1992) for the cardinality abstraction and an interval analysis may be defined as a pair of functions toint ∈ Card × StInt → StInt and tocard ∈ Card × StInt → Card verifying the following conditions: 1. soundness: γ 0 (toint(C , ı)) ∩ γcrdtr (C ) γ 0 (ı) ∩ γcrdtr (tocard(C , ı)) 2. reduction: toint(C , ı) tocard(C , ı) = γ 0 (ı) ∩ γcrdtr (C ) = γ 0 (ı) ∩ γcrdtr (C ) ˙ ],Int ı ≤ v] C Let us denote by size the function that returns the size of an interval. One such Granger’s reduced product can be defined as: tocard tocard(C , ı) ∈ , toint toint(C , ı) ∈ , Card × StInt → Card {l ; x#n0 | l ; x#n ∈ C and n0 = min (n, size ı(x))} Card × StInt → Card ı Once enhanced with this reduced product, the cardinality analysis determines for the program in Listing 5, that L-equivalent memories result in at most one possible value for variable x. The dependence analysis can be improved similarly, with a reduction function defined as follows: todep ∈ Dep × StInt → Dep todep(D, ı) , D ∪ {l ; x | l ∈ L and size ı(x) = 1} Once extended with a reduced product with intervals, the dependence analysis is also able to determine that variable x is low for the program in Listing 5. 12 13 //L ; h#∞, L ; y1 #1, L ; y2 #1, L ; y3 #1 y1 := 1; //L ; y1 #1 if ( h == y1 ) then { skip ; //L ; h#1, L ; y1 #1, L ; y2 #1 } else { y2 := 5; //L ; y1 #1, L ; y2 #1 while (y2 != 1) do { y2 := y2 -1; //L ; y2 #1 y1 := y2 ; //L ; y1 #1 } //L ; y1 #1, L ; y2 #1 } //L ; h#∞, L ; y1 #2, L ; y2 #2, L ; y3 #1 o := y1 * y3 ; //L ; o#2 Listing 6. No leakage for variable o More reduced products. As a final example, let us consider Listing 6, inspired by Besson et al. (2016, program 7), that we annotate with the result of the improved cardinality abstraction. To the best of our knowledge, no existing automated static analysis determines that variable o is low at the end of this program. Also, no prior monitor but the one recently presented by Besson et al. (2016) accepts all executions of this program, assuming attackers with clearance L can observe variable o. For initially L-equivalent memories, the cardinality abstraction determines that variables y1 , y2 and o have at most two values. This result is precise for y2 , but not precise for y1 and o. As a challenge, let us see what is required to gain more precision to determine that both variables y1 and o have at most 1 possible value – they are low. To tackle this challenge, we need to consider cardinality combined with an interval analysis and a simple relational domain tracking equalities. With the equality y1 = y2 at the exit of the loop, both y1 and y2 will be reduced to the singleton interval [1, 1]. After the conditional, we still deduce that y2 has at most 2 different values thanks to the cardinality abstraction. Using intervals, we deduce that variable y1 has only one value (singleton interval [1, 1]). And finally, at the last assignment the cardinalities abstraction determines that variable o has only one possible value. Similarly, this same combination of analyses can be put to use to let the dependence analysis reach the desired precision. 9. Related Work Although noninterference has important applications, for many security requirements it is too strong. That is one motivation for research in quantitative information flow analysis. In addition, a number of works investigate weakenings of noninterference and downgrading policies that are conditioned on events or data values (Askarov and Sabelfeld 2007; Banerjee et al. 2008; Sabelfeld and Sands 2009; Mastroeni and Banerjee 2011). Assaf (2015, Chapter 4) proposes to take the guarantees provided by termination-insensitive noninterference (Askarov et al. 2008) as an explicit definition for security; this Relative Secrecy requirement is inspired by Volpano and Smith (2000) who propose a type-system preventing batch-job programs from leaking secrets in polynomial time. Giacobazzi and Mastroeni (2004) introduce abstract noninterference, which generalizes noninterference by means of abstract interpretations that specify, for example, limits on the attacker’s power and the extent of partial releases (declassification). The survey by Mastroeni (2013) further generalizes the notion and highlights, among other things, its applicability to a range of underlying semantics. The Galois connections in this work are at the level of trace sets, not sets of sets. Abstract noninterference retains the explicit 2-run formulation (Volpano et al. 1996; Sabelfeld and Myers 2003): from two related initial states, two executions lead to related final states. The relations are defined in terms of abstract interpretations of the individual states/executions. Mastroeni and Banerjee (2011) show how to infer indistinguishability relations—modelling attackers’ observations—to find the best abstract noninterference policy that holds. The inference algorithm iteratively refines the relation by using counter-examples and abstract domain completion (Cousot and Cousot 1979). Set-of-sets structures occur in work on abstraction for nondeterministic programs, but in those works one level of sets are powerdomains for nondeterminacy; the properties considered are trace properties (Schmidt 2009, 2012). Hunt and Sands (1991) develop a binding time analysis and a strictness analysis (Hunt 1990) based on partial equivalence relations: Their concretisations are sets of equivalence classes. Cousot and Cousot (1994) point out that this analysis could be achieved by a collecting semantics over sets-of-sets, defined simply as a direct image. To the best of our knowledge this has not been explored further in the literature, except in unpublished work on which this paper builds (Assaf 2015; Assaf et al. 2016b). Clarkson et al. (2014); Finkbeiner et al. (2015) extend temporal logic with means to quantify over multiple traces in order to express hyperproperties, and provide model checking algorithms for finite space systems. Agrawal and Bonakdarpour (2016) introduce a technique for runtime verification of k-safety properties. The dependences analysis we derive is similar to the information flow logic of Amtoft and Banerjee (2004) and the equivalent flow-sensitive type system of Hunt and Sands (2006). Amtoft and Banerjee use the domain P(Trc) and on the basis of a relational logic they validate a forward analysis. In effect their interpretation of “independences” is a Galois connection with sets of sets, but the analysis is not formulated or proved correct as an abstract interpretation. To deal with dynamically allocated state, Amtoft et al. (2006) augment the relational assertions of information flow logic with region assertions, which can be computed by abstract interpretation. This is used both to express agreement relations between the two executions and to approximate modifiable locations. This approach is generalized in Banerjee et al. (2016) to a relational Hoare logic for object-based programs that encompasses information flow properties with conditional downgrading (Banerjee et al. 2008). Müller et al. (2015) give a backwards analysis that infers dependencies and is proved strictly more precise than (Hunt and Sands 2006; Amtoft and Banerjee 2004). This is achieved by product construction that facilitates inferring relations between variables in executions that follow different control paths. Correctness of the analysis is proved by way of a relational Hoare logic. The variations of our proposed analyses, in Section 8, rivals theirs in terms of precision—they are incomparable. Our dependence analysis relies on an approximation of the modifiable variables, to soundly track implicit flows due to control flow, instead of labelling a program counter variable pc to account for implicit flows (Sabelfeld and Myers 2003). Zanioli and Cortesi (2011) also derive a similar analysis through a syntactic Galois connection— a syntactic assignment z := x ∗ y is abstracted into a propositional formula x → z∧y → z denoting an information flow from variables x and y to variable z. The soundness of this analysis wrt. a semantic property such as noninterference requires more justification, though it is remarkable that the concretisation of propositional formula yields, roughly speaking, a set of program texts. Zanotti (2002) also provides an abstract interpretation account of a flow-insensitive type system (Volpano et al. 1996) enforcing noninterference by guaranteeing a stronger safety property, namely that sensitive locations should not influence public locations (Boudol 2008). Kovács et al. (2013) explicitly formulate termination-insensitive noninterference as an abstract interpretation, namely the “merge over all twin computations” that makes explicit both the 2-safety aspect and the need for an analysis to relate some aligned intermediate states. Their analysis, like many others, is based on reducing the problem to a safety property of product programs. Sousa and Dillig (2016) implement an algorithm that automates reasoning in a Hoare logic for k-safety, implicitly constructing product programs; the performance compares favorably with explicit construction of product programs. Program dependency graphs are another approach to dependency, shown to be correct for noninterference by Wasserrab et al. (2009) using slicing and a simulation argument. Denning (1982, Chap. 5) proposes the first quantitative measure of a program’s leakage in terms of Shannon entropy (Shannon 1948). Other quantitative metrics emerge in the literature (Braun et al. 2009; Clarkson et al. 2009; Smith 2009; Dwork 2011; Smith 2011; Alvim et al. 2012). These quantitative security metrics model different scenarios suitable for different policies. Most existing static analyses for quantitative information flow leverage existing model checking tools and abstract domains for safety; they prove that a program satisfies a quantitative security requirement by proving a stronger safety property. In contrast, the cardinal abstraction proves a hyperproperty by inferring a stronger hyperproperty satisfied by the analysed program. This is key to target quantitative information flow in mutlilevel security lattices, beyond the 2-point lattice {L, H}. Backes et al. (2009) synthesize equivalence classes induced by outputs over low equivalent memories by relying on software model checkers, in order to bound various quantitative metrics. Heusser and Malacaria (2009) also rely on a similar technique to quantify information flow for database queries. Köpf and Rybalchenko (2010) note that the exact computation of information-theoretic characteristics is prohibitively hard, and propose to rely on approximation-based analyses, among which are randomisation techniques and abstract interpretation ones. They also propose to rely on a self-composed product program to model a scenario where attackers may refine their knowledge by influencing the low inputs. Klebanov (2014) relies on similar techniques to handle programs with low inputs, and uses polyhedra to synthesize linear constraints (Cousot and Halbwachs 1978) over variables. Mardziel et al. (2013) decide whether answering a query on sensitive data augments attackers’ knowledge beyond a certain threshold, by using probabilistic polyhedra. 10. Conclusion Galois connection-based semantic characterisations of program analyses provide new perspectives and insights that lead to improved techniques. We have extended the framework to fully encompass hyperproperties, through a remarkable form of hypercollecting semantics that enables calculational derivation of analyses. This new foundation raises questions too numerous to list here. One promising direction is to combine dependence and cardinality analysis with existing abstract domains, e.g. through advanced symbolic methods (Miné 2006b), and partitioning (Handjieva and Tzolovski 1998; Rival and Mauborgne 2007). Static analysis of secure information flow has yet to catch up with recent advances in dynamic information flow monitoring (Besson et al. 2013; Bello et al. 2015; Hedin et al. 2015; Assaf and Naumann 2016; Besson et al. 2016). We discussed, in Section 8, how existing static analyses may be of use to statically secure information flow. It seems likely that hypercollecting semantics will also be of use for dynamic analyses. Acknowledgments Thanks to Anindya Banerjee and the anonymous reviewers for thoughtful comments and helpful feedback. This work was partially supported by NSF awards CNS-1228930 and CCF-1649884, ANR project AnaStaSec ANR-14-CE28-0014 and a CFR CEA Phd Fellowship. References S. Agrawal and B. Bonakdarpour. Runtime verification of k-safety hyperproperties in HyperLTL. In IEEE Computer Security Foundations Symposium, pages 239–252, 2016. M. S. Alvim, K. Chatzikokolakis, C. Palamidessi, and G. Smith. Measuring information leakage using generalized gain functions. In IEEE Computer Security Foundations Symposium, pages 265–279, 2012. T. Amtoft and A. Banerjee. Information flow analysis in logical form. In Static Analysis Symposium, pages 100–115, 2004. T. Amtoft, S. Bandhakavi, and A. Banerjee. A logic for information flow in object-oriented programs. In ACM Symposium on Principles of Programming Languages, pages 91–102, 2006. A. Askarov and A. Sabelfeld. Gradual release: Unifying declassification, encryption and key release policies. In IEEE Symposium on Security and Privacy, 2007. A. Askarov, S. Hunt, A. Sabelfeld, and D. Sands. Termination-insensitive noninterference leaks more than just a bit. In European Symposium on Research in Computer Security, volume 5283 of LNCS, 2008. M. Assaf. From Qualitative to Quantitative Program Analysis : Permissive Enforcement of Secure Information Flow. PhD thesis, Université de Rennes 1, May 2015. https://hal.inria.fr/tel-01184857. M. Assaf and D. Naumann. Calculational design of information flow monitors. In IEEE Computer Security Foundations Symposium, pages 210–224, 2016. M. Assaf, D. Naumann, J. Signoles, É. Totel, and F. Tronel. Hypercollecting semantics and its application to static analysis of information flow. Technical report, Apr. 2016a. URL https://arxiv.org/abs/1608. 01654. M. Assaf, J. Signoles, É. Totel, and F. Tronel. The cardinal abstraction for quantitative information flow. In Workshop on Foundations of Computer Security (FCS), June 2016b. https://hal.inria.fr/hal01334604. M. Backes, B. Köpf, and A. Rybalchenko. Automatic discovery and quantification of information leaks. In IEEE Symposium on Security and Privacy, pages 141–153. IEEE, 2009. A. Banerjee, D. A. Naumann, and S. Rosenberg. Expressive declassification policies and modular static enforcement. In IEEE Symposium on Security and Privacy, pages 339–353, 2008. A. Banerjee, D. A. Naumann, and M. Nikouei. Relational logic with framing and hypotheses. In 36th IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science, 2016. To appear. G. Barthe, P. R. D’Argenio, and T. Rezk. Secure information flow by selfcomposition. In IEEE Computer Security Foundations Workshop, pages 100–114, 2004. L. Bello, D. Hedin, and A. Sabelfeld. Value sensitivity and observable abstract values for information flow control. In Logic for Programming, Artificial Intelligence, and Reasoning (LPAR), pages 63–78, 2015. N. Benton. Simple relational correctness proofs for static analyses and program transformations. In ACM Symposium on Principles of Programming Languages, pages 14–25, 2004. J. Bertrane, P. Cousot, R. Cousot, J. Feret, L. Mauborgne, A. Miné, and X. Rival. Static analysis and verification of aerospace software by abstract interpretation. In AIAA Infotech@Aerospace 2010, 2012. J. Bertrane, P. Cousot, R. Cousot, J. Feret, L. Mauborgne, A. Miné, and X. Rival. Static analysis and verification of aerospace software by abstract interpretation. Foundations and Trends in Programming Languages, 2 (2-3):71–190, 2015. F. Besson, N. Bielova, and T. Jensen. Hybrid information flow monitoring against web tracking. In IEEE Computer Security Foundations Symposium, pages 240–254. IEEE, 2013. F. Besson, N. Bielova, and T. Jensen. Hybrid monitoring of attacker knowledge. In IEEE Computer Security Foundations Symposium, pages 225–238, 2016. G. Boudol. Secure information flow as a safety property. In Formal Aspects in Security and Trust, pages 20–34, 2008. F. Bourdoncle. Abstract interpretation by dynamic partitioning. Journal of Functional Programming, 2(04):407–435, 1992. C. Braun, K. Chatzikokolakis, and C. Palamidessi. Quantitative notions of leakage for one-try attacks. In Mathematical Foundations of Programming Semantics (MFPS), volume 249, pages 75–91, 2009. D. Cachera and D. Pichardie. A certified denotational abstract interpreter. In Interactive Theorem Proving (ITP), pages 9–24, 2010. M. R. Clarkson and F. B. Schneider. Hyperproperties. In IEEE Computer Security Foundations Symposium, pages 51–65, 2008. M. R. Clarkson and F. B. Schneider. Hyperproperties. Journal of Computer Security, 18(6):1157–1210, 2010. M. R. Clarkson, A. C. Myers, and F. B. Schneider. Quantifying information flow with beliefs. Journal of Computer Security, 17:655–701, 2009. M. R. Clarkson, B. Finkbeiner, M. Koleini, K. K. Micinski, M. N. Rabe, and C. Sánchez. Temporal logics for hyperproperties. In Principles of Security and Trust, volume 8414 of LNCS, pages 265–284, 2014. E. Cohen. Information transmission in computational systems. In Proceedings of the sixth ACM Symposium on Operating Systems Principles, pages 133–139, 1977. A. Cortesi and M. Zanioli. Widening and narrowing operators for abstract interpretation. Computer Languages, Systems & Structures, pages 24–42, 2011. A. Cortesi, G. Costantini, and P. Ferrara. A survey on product operators in abstract interpretation. In Semantics, Abstract Interpretation, and Reasoning about Programs: Essays Dedicated to David A. Schmidt on the Occasion of his Sixtieth Birthday, volume 129 of EPTCS, pages 325–336, 2013. P. Cousot. The calculational design of a generic abstract interpreter. In M. Broy and R. Steinbrüggen, editors, Calculational System Design, volume 173, pages 421–506. NATO ASI Series F. IOS Press, Amsterdam, 1999. P. Cousot. Constructive design of a hierarchy of semantics of a transition system by abstract interpretation. Theoretical Computer Science, 277 (1-2):47–103, 2002. P. Cousot and R. Cousot. Abstract interpretation: a unified lattice model for static analysis of programs by construction or approximation of fixpoints. In ACM Symposium on Principles of Programming Languages, pages 238–252, 1977. P. Cousot and R. Cousot. Systematic design of program analysis frameworks. In ACM Symposium on Principles of Programming Languages, pages 269–282, 1979. P. Cousot and R. Cousot. Comparing the galois connection and widening/narrowing approaches to abstract interpretation. In Programming Language Implementation and Logic Programming (PLILP), pages 269–295, 1992. P. Cousot and R. Cousot. Higher-order abstract interpretation (and application to comportment analysis generalizing strictness, termination, projection and per analysis of functional languages). In International Conference on Computer Languages (ICCL), pages 95–112, 1994. P. Cousot and N. Halbwachs. Automatic discovery of linear restraints among variables of a program. In ACM Symposium on Principles of Programming Languages, pages 84–96, 1978. Á. Darvas, R. Hähnle, and D. Sands. A theorem proving approach to analysis of secure information flow. In Security in Pervasive Computing, pages 193–209, 2005. D. E. R. Denning. Cryptography and Data Security. Addison-Wesley Longman Publishing Co., Inc., 1982. D. E. R. Denning and P. J. Denning. Certification of programs for secure information flow. Communications of ACM, 20(7):504–513, 1977. G. Doychev, D. Feld, B. Köpf, L. Mauborgne, and J. Reineke. Cacheaudit: A tool for the static analysis of cache side channels. In USENIX Security Symposium, pages 431–446, 2013. C. Dwork. A firm foundation for private data analysis. Communications of ACM, pages 86–95, 2011. B. Finkbeiner, M. N. Rabe, and C. Sánchez. Algorithms for model checking HyperLTL and HyperCTL ˆ*. In Computer Aided Verification, volume 9206 of LNCS, pages 30–48, 2015. R. Giacobazzi and I. Mastroeni. Abstract non-interference: parameterizing non-interference by abstract interpretation. In ACM Symposium on Principles of Programming Languages, pages 186–197, 2004. J. A. Goguen and J. Meseguer. Security policies and security models. In IEEE Symposium on Security and Privacy, pages 11–20, 1982. P. Granger. Improving the results of static analyses programs by local decreasing iteration. In Foundations of Software Technology and Theoretical Computer Science, volume 652, pages 68–79, 1992. M. Handjieva and S. Tzolovski. Refining dtatic analyses by trace-based partitioning using control flow. In International Static Analysis Symposium, 1998. D. Hedin, L. Bello, and A. Sabelfeld. Value-sensitive hybrid information flow control for a JavaScript-Like language. In IEEE Computer Security Foundations Symposium, pages 351–365, 2015. J. Heusser and P. Malacaria. Applied quantitative information flow and statistical databases. In Formal Aspects in Security and Trust, pages 96–110, 2009. S. Hunt. PERs generalize projections for strictness analysis (extended abstract). In Proceedings of the Third Annual Glasgow Workshop on Functional Programming, 1990. S. Hunt and D. Sands. Binding time analysis: A new PERspective. In Proceedings of the Symposium on Partial Evaluation and SemanticsBased Program Manipulation, PEPM’91, Yale University, New Haven, Connecticut, USA, June 17-19, 1991, pages 154–165, 1991. S. Hunt and D. Sands. On flow-sensitive security types. In ACM Symposium on Principles of Programming Languages, pages 79–90, 2006. S. Hunt and D. Sands. From exponential to polynomial-time security typing via principal types. In ACM Workshop on Programming Languages and Analysis for Security, pages 297–316, 2011. V. Klebanov. Precise quantitative information flow analysis - a symbolic approach. Theoretical Computer Science, 538:124–139, 2014. B. Köpf and A. Rybalchenko. Approximation and randomization for quantitative information-flow analysis. In IEEE Computer Security Foundations Symposium, pages 3–14, 2010. B. Köpf and A. Rybalchenko. Automation of quantitative information-flow analysis. In Formal Methods for Dynamical Systems - 13th International School on Formal Methods for the Design of Computer, Communication, and Software Systems, volume 7938 of LNCS, pages 1–28, 2013. M. Kovács, H. Seidl, and B. Finkbeiner. Relational abstract interpretation for the verification of 2-hypersafety properties. In ACM SIGSAC conference on Computer and Communications Security, pages 211–222, 2013. P. Mardziel, S. Magill, M. Hicks, and M. Srivatsa. Dynamic enforcement of knowledge-based security policies. In IEEE Computer Security Foundations Symposium, pages 114–128. IEEE, 2011. P. Mardziel, S. Magill, M. Hicks, and M. Srivatsa. Dynamic enforcement of knowledge-based security policies using probabilistic abstract interpretation. Journal of Computer Security, 21(4):463–532, 2013. I. Mastroeni. Abstract interpretation-based approaches to security - A survey on abstract non-interference and its challenging applications. In Semantics, Abstract Interpretation, and Reasoning about Programs: Essays Dedicated to David A. Schmidt on the Occasion of his Sixtieth Birthday, volume 129 of EPTCS, pages 41–65, 2013. I. Mastroeni and A. Banerjee. Modelling declassification policies using abstract domain completeness. Mathematical Structures in Computer Science, 21(06):1253–1299, 2011. J. McLean. A general theory of composition for trace sets closed under selective interleaving functions. In IEEE Symposium on Security and Privacy, pages 79–93, 1994. A. Miné. The octagon abstract domain. Higher-order and symbolic computation, 19(1):31–100, 2006a. A. Miné. Symbolic methods to enhance the precision of numerical abstract domains. In Verification, Model Checking, and Abstract Interpretation, pages 348–363, 2006b. C. Müller, M. Kovács, and H. Seidl. An analysis of universal information flow based on self-composition. In IEEE Computer Security Foundations Symposium, pages 380–393, 2015. F. Nielson, H. R. Nielson, and C. Hankin. Principles of Program Analysis. Springer, 1999. A. Rényi. On measures of entropy and information. In the Fourth Berkeley Symposium on Mathematical Statistics and Probability, 1961. X. Rival and L. Mauborgne. The trace partitioning abstract domain. ACM Transactions on Programming Languages and Systems, 29(5):26, 2007. J. Rushby. Security requirements specifications: How and what. In Symposium on Requirements Engineering for Information Security (SREIS), 2001. A. Sabelfeld and A. C. Myers. Language-based information-flow security. IEEE Journal on Selected Areas in Communications, 21(1):5–19, 2003. A. Sabelfeld and D. Sands. Declassification: Dimensions and principles. Journal of Computer Security, 17(5), 2009. D. A. Schmidt. Abstract interpretation from a topological perspective. In Static Analysis, 16th International Symposium, volume 5673 of LNCS, pages 293–308, 2009. D. A. Schmidt. Inverse-limit and topological aspects of abstract interpretation. Theoretical Computer Science, 430:23–42, 2012. D. Schoepe, M. Balliu, B. C. Pierce, and A. Sabelfeld. Explicit secrecy: A policy for taint tracking. In IEEE European Symposium on Security and Privacy, pages 15–30, 2016. C. E. Shannon. A mathematical theory of communication. The Bell System Technical Journal, 27:379–423, 1948. G. Smith. On the foundations of quantitative information flow. In International Conference on Foundations of Software Science and Computational Structures, pages 288–302, 2009. G. Smith. Quantifying information flow using min-entropy. In Quantitative Evaluation of Systems (QEST), 2011 Eighth International Conference on, pages 159–167. IEEE, 2011. M. Sousa and I. Dillig. Cartesian Hoare logic for verifying k-safety properties. In ACM Conference on Programming Language Design and Implementation, pages 57–69, 2016. T. Terauchi and A. Aiken. Secure information flow as a safety problem. In Static Analysis Symposium, pages 352–367, 2005. D. Volpano and G. Smith. Eliminating covert flows with minimum typings. In IEEE Computer Security Foundations Workshop, pages 156–168, 1997. D. Volpano and G. Smith. Verifying secrets and relative secrecy. In ACM Symposium on Principles of Programming Languages, pages 268–276, 2000. D. Volpano, C. Irvine, and G. Smith. A sound type system for secure flow analysis. Journal of Computer Security, 4(2-3):167–187, 1996. D. M. Volpano. Safety versus secrecy. In Static Analysis Symposium, pages 303–311, 1999. D. Wasserrab, D. Lohner, and G. Snelting. On PDG-based noninterference and its modular proof. In ACM Workshop on Programming Languages and Analysis for Security, pages 31–44, 2009. G. Winskel. The Formal Semantics of Programming Languages: an Introduction. Cambridge, 1993. H. Yasuoka and T. Terauchi. On bounding problems of quantitative information flow. Journal of Computer Security, 19(6):1029–1082, 2011. A. Zakinthinos and S. Lerner. A general theory of security properties. In IEEE Symposium on Security and Privacy, pages 94–102, 1997. M. Zanioli and A. Cortesi. Information leakage analysis by abstract interpretation. In SOFSEM 2011: Theory and Practice of Computer Science, pages 545–557, 2011. M. Zanotti. Security typings by abstract interpretation. In Static Analysis Symposium, volume 2477, pages 360–375, 2002. Appendix A. Symbols Val ∞ v ∈ Val V ∈ P(Val) V ∈ P(P(Val)) Trc t ∈ Trc T ∈ P(Trc) T ∈ P(P(Trc)) States σ ∈ States Σ ∈ P(States) S ∈ P(P(States)) States∗ , ∪n∈N Statesn a set of integers an infinite cardinal number an integer a set of values a set of sets of values the set of (relational) traces a trace a set of traces a set of sets of traces the set of states a state a set of states a set of sets of states the set of finite sequence of states VarP L l∈L Γ ∈ VarP → L the set of variables of a program P a multilevel security lattice a security level an initial typing context γ − −A C← −− α→ a Galois connection JcK ∈ Trc → Trc JeK ∈ Trc → Val JeKpre ∈ Trc → Val ⦃c⦄ ∈ P(Trc) → P(Trc) LcM ∈ P(P(Trc)) → P(P(Trc)) denotational semantics of commands value of e in final state value of e in initial state collecting semantics hypercollecting semantics l;x atomic dependence: “agreement up to security level l leads to agreement on x” A set of atomic dependency constraints atomic cardinality: “agreement up to security level l leads to an l-cardinality of n values for x” A valid set of atomic cardinality constraints D ∈ Dep l ; x#n C ∈ Card Appendix B. Background: Collecting Semantics, Galois Connections Lemma 1 Element-wise abstraction. Let elt ∈ C → A be a function between sets. Let αelt (C) , {elt(c) | c ∈ C} and γelt −− −− − (P(A), ⊆). γelt (A) , {c | elt(c) ∈ A}. Then (P(C), ⊆) ← −− → α− elt Proof. Let C ∈ P(C) and A ∈ P(A). αelt (C) ⊆ A ⇐⇒ {elt(c) | c ∈ C} ⊆ A ⇐⇒ ∀c ∈ C, elt(c) ∈ A ⇐⇒ C ⊆ {c | elt(c) ∈ A} ⇐⇒ C ⊆ γelt (A) Appendix C. Domains and Galois Connections for Hyperproperties Lemma 2 . Let C be a set. Define αhpp (C) , ∪C∈C C and γhpp (C) , P(C). These form a Galois connection: γhpp −− −−− − (P(C), ⊆) (P(P(C)), ⊆) ← −− → α −− hpp Proof. This is a special case of the supremus abstraction (Cousot 2002, p.52), that is defined in Lemma 3. Indeed, we can instantiate a supremus γhpp −− −−− − P(C), with αhpp (C) = ∪C∈C C abstraction by taking hpp , id (∈ P(C) → P(C)). We thus obtain a Galois connection P(P(C)) ← −− → α −− hpp and γhpp (C) = {C 0 ∈ P(C) | C 0 ⊆ C} (= P(C)). Notice here that the powerset of a set C, provided with set inclusion as a partial order, is a complete lattice as required by the supremus abstraction. Lemma 3 Supremus abstraction. Let elt ∈ C → A be a function from a set C, with codomain forming a complete lattice (A, v). Let αelt (C) , tc∈C elt(c) and γelt (a) , {c ∈ C | elt(c) v a}. Then γ elt −− − − − (A, v) (P(C), ⊆) ← −− → α− elt Proof. Notice that the assumption that the lattice (A, v, t) is complete guarantees that αelt (C) is well-defined: the set {elt(c) | c ∈ C} does have a supremum. Let C ∈ P(C) and a ∈ A. The proof goes by definitions. αelt (C) v a ⇐⇒ tc∈C elt(c) v a ⇐⇒ ∀c ∈ C, elt(c) v a ⇐⇒ C ⊆ {c ∈ C | elt(c) v a} ⇐⇒ C ⊆ γelt (a) Appendix D. Hypercollecting Semantics Before proving the main result of this section in Theorem 1, we will first prove Lemma 8. Both proofs of Lemma 8 and Theorem 1 are by structural induction. Most cases follow from definitions. The important cases are for while loops and the proof technique is a classical one when using a denotational semantics. E.g., in order to prove equality of two denotations characterised as a fixpoint, it suffices to introduce two sequences that converge towards the fixpoint characterisations and prove equality of these sequences. This ensures that their limits – the denotations characterised as a fixpoint – are equal. Let us now prove Lemma 8 – this lemma is used later in the proof case of while loops for Theorem 1. Lemma 8 . For all commands c, for all sets of traces T ∈ P(Trc), the standard collecting semantics (Section 2) can be expressed as the direct image of the denotational semantics : ⦃c⦄T = {JcKt ∈ Trc | t ∈ T } Proof. The proof proceeds by structural induction on commands. The most important case is the case of while loops. 1 – Case skip: ⦃skip⦄T = T = {JskipKt | t ∈ T } 2 – Case x := e: ⦃x := e⦄T = {Jx := eKt | t ∈ T } 3 – Case c1 ; c2 : ⦃c1 ; c2 ⦄T = ⦃c2 ⦄ ◦ ⦃c1 ⦄T = HBy induction on c1 I ⦃c2 ⦄({Jc1 Kt ∈ Trc | t ∈ T }) = HBy induction on c2 I {Jc2 K ◦ Jc1 Kt ∈ Trc | t ∈ T } = {Jc1 ; c2 Kt ∈ Trc | t ∈ T } 4 – Case if (b) then c1 else c2 : ⦃if (b) then c1 else c2 ⦄T = ⦃c1 ⦄ ◦ ⦃ grdb ⦄T ∪ ⦃c2 ⦄ ◦ ⦃ grd¬b ⦄T = HBy induction hypothesis on both c1 and c2 I {Jc1 Kt ∈ Trc | t ∈ ⦃ grdb ⦄T } ∪ {Jc2 Kt ∈ Trc | t ∈ ⦃ grd¬b ⦄T } = {Jif (b) then c1 else c2 Kt ∈ Trc | t ∈ T } 5 – Case while (b) do c: 5.1 – Let us first prove the following intermediate result: ∀T ∈ P(Trc),   b ◦ ⦃ grd ⦄X . λX. T ∪ ⦃c⦄ {Jwhile (b) do cKt ∈ Trc | t ∈ T } = ⦃ grd¬b ⦄ lfp⊆ ∅ Indeed, let the sequence (xTn )n≥0 be defined as: with F defined as xTn , {F (n) (⊥)(t) ∈ Trc | t ∈ T } ( t F(w)(t) , w ◦ JcKt if JbKt = 0 otherwise Notice that for all t ∈ T , the sequence (F (n) (⊥)(t))n≥0 converges and is equal to the evaluation of the while loop in the state t (i.e. Jwhile b do cKt = F (∞) (⊥)(t)), by definition of the denotational semantics of loops; thus, the sequence xTn converges to {Jwhile b do cKt ∈ Trc | t ∈ T }. Let also the sequences (ynT )n≥0 and (gnT )n≥0 be defined as: ynT , ⦃ grd¬b ⦄gnT T gn+1 , T ∪ ⦃c⦄ ◦ ⦃ grdb ⦄gnT g0T , ∅ ⊆ b b ◦ ◦ Notice that for all T ∈ P(Trc), the sequence gnT converges to lfp⊆ ∅ λX. T ∪ ⦃c⦄ ⦃ grd ⦄X (or written otherwise: lfpT λX. ⦃c⦄ ⦃ grd ⦄X). ⊆ T ¬b b ◦ This also means that the sequence yn converges to ⦃ grd ⦄( lfp∅ λX. T ∪ ⦃c⦄ ⦃ grd ⦄X ). Thus, it suffices to prove that: ∀T ∈ P(Trc), ∀n ∈ N, xTn = ynT . The proof proceeds by induction on n. - xT0 = ∅ = y0T - Let n ∈ N such that: ∀T ∈ P(Trc), xTn = ynT . Then: xTn+1 = {F (n+1) (⊥)(t) ∈ Trc | t ∈ T } = ⦃ grd¬b ⦄T ∪ {F (n) (⊥)(JcKt) ∈ Trc | σ ∈ ⦃ grdb ⦄T } = ⦃ grd¬b ⦄T ∪ {F (n) (⊥)(t) ∈ Trc | t ∈ ⦃c⦄ ◦ ⦃ grdb ⦄T } ◦⦃ grdb = ⦃ grd¬b ⦄T ∪ x⦃c⦄ n ⦄T = HBy induction hypothesisI ◦⦃ grdb ⦄T b ⦄T ⦃ grd¬b ⦄T ∪ yn⦃c⦄ = HBy definition of yn⦃c⦄ ¬b ◦⦃ grd ¬b ⦄T ∪ ⦃ grd   b ◦ = ⦃ grd ⦄ T ∪ gn⦃c⦄ ⦃ grd ⦄T [ = HBecause for all T , gnT = ⦃ grd I b ◦ ⦄gn⦃c⦄ ⦃ grd ⦄T ¬b 0≤k≤n−1 (⦃c⦄ ◦ ⦃ grdb ⦄)(k) (T ) I T ⦃ grd¬b ⦄gn+1 T = yn+1 5.2 – Let us now prove that : b ⊆ ◦ lfp⊆ ∅ λX. T ∪ ⦃c⦄ ⦃ grd ⦄X = lfp∅ λX.T ∪ ⦃if b then c else skip⦄X Indeed, let the sequence (fnT )n≥0 be defined as: f0T , ∅ T fn+1 , T ∪ ⦃if b then c else skip⦄fnT Therefore, by induction on n ∈ N, it holds that fn = gn : - f0T = g0T = ∅. - let n ∈ N, such that fnT = gnT . Then: T gn+1 = Σ ∪ ⦃c⦄ ◦ ⦃ grdb ⦄gnT T = HSince ⦃ grd¬b ⦄gnT ⊆ gnT ⊆ gn+1 I T ∪ ⦃c⦄ ◦ ⦃ grdb ⦄gnT ∪ ⦃ grd¬b ⦄gnT = T ∪ ⦃if b then c else skip⦄gnT = HBy induction hypothesisI T ∪ ⦃if b then c else skip⦄fnT T = fn+1 This concludes our induction on n. Thus, by passing to the limit of both sequences, we obtain the desired result. 5.3 – Finally, we can conclude:   ⦃while b do c⦄T =⦃ grd¬b ⦄ lfp⊆ T ⦃if b then c else skip⦄ = H by intermediate result 5.2 I   b ⦃ grd¬b ⦄ lfp⊆ T ⦃c⦄⦃ grd ⦄ = H by intermediate result 5.1I {⦃while (b) do c⦄t ∈ Trc | t ∈ T } We conclude this proof by structural induction, and Cases 1 to 5. Theorem 1 . For all c and all T ∈ P(Trc), ⦃c⦄T is in L c M{T }. Proof. We prove the theorem as a corollary of this more general result: ∀T ∈ P(P(Trc)), {⦃c⦄T | T ∈ T} ⊆ LcMT This proof proceeds by structural induction on commands. The most important case is the one for while loops; the other ones follow from definition. 1 – Case skip : 2 – Case x := e: LskipMT = {⦃skip⦄T | T ∈ T} ⊇ {⦃skip⦄T | T ∈ T} 3 – Case c1 ; c2 : Lx := eMT = {⦃x := e⦄T | T ∈ T} ⊇ {⦃x := e⦄T | T ∈ T} Lc1 ; c2 MT = Lc2 M ◦ Lc1 MT ⊇ Hby structural induction on c1 , and monotonicity of the hypercollecting semantics LcMI Lc2 M({⦃c1 ⦄T | T ∈ T}) ⊇ Hby structural induction on c2 I {⦃c2 ⦄T 0 | T 0 ∈ {⦃c1 ⦄T | T ∈ T}} = {⦃c2 ⦄ ◦ ⦃c1 ⦄T | T ∈ T} = {⦃c1 ; c2 ⦄T | T ∈ T} 4 – Case if (b) then c1 else c2 : Lif (b) then c1 else c2 MT = {⦃if (b) then c1 else c2 ⦄T | T ∈ T} ⊇ {⦃if (b) then c1 else c2 ⦄T | T ∈ T} 5 – Case while (b) do c: Let (XTn )n∈N be the sequence defined as n o XTn , {F (n) (⊥)(t) ∈ Trc | t ∈ T } | T ∈ T for n ≥ 1, XT0 = ∅ where: F(w)(t) , ( t w ◦ JcKt if JbKt = 0 otherwise Notice that the limit of the sequence xTn , {F (n) (⊥)(t) ∈ Trc | t ∈ T } is the ordinary collecting semantics ⦃while (b) do c⦄T of the while loop, as proved in Lemma 8. Thus, the sequence XTn converges to {⦃while (b) do c⦄T | T ∈ T}. Let also (YTn )n∈N and (GTn )n∈N be the sequences defined as GTn+1 , T ∪ Lif (b) then c else skipMGTn for n ≥ 0, GT0 , ∅ YTn , Lgrd¬b MGTn is the hypercollecting semantics of the while loop (Lwhile (b) do cMT). Notice that the limit of Thus, it suffices to prove that the sequences XTn and YTn verify the following result ∀T ∈ P(P(Trc)), ∀n ∈ N, XTn+1 ⊆ YTn+1 ; passing to the limit in this inequality leads to the required result ∀T ∈ P(P(Trc)), {⦃while (b) do c⦄T | T ∈ T} ⊆ Lwhile (b) do cMT. We prove the following more precise characterisation of the sequences XTn and YTn (this implies XTn+1 ⊆ YTn+1 ): YTn ∀n ∈ N, ∀T ∈ P(P(Trc)), YTn+1 = YTn ∪ XTn+1 The remaining of this proof proceeds by induction on n ∈ N. - case n = 0: YT1 = Lgrd¬b MGT1 = Lgrd¬b MT = {⦃ grd¬b ⦄T | T ∈ T} = {{F (1) (⊥)(t) ∈ Trc | t ∈ T } | T ∈ T} = Hsince YT0 = ∅ and by definition of XT1 I YT0 ∪ XT1 - Let n ∈ N such that YTn+1 = YTn ∪ XTn+1 . Then: YTn+2 = Lgrd¬b MGTn+2   = Lgrd¬b M T ∪ Lif (b) then c1 else skipMGTn+1 = Lgrd¬b MT ∪ Lgrd¬b M ◦ Lif (b) then c1 else skipMGTn+1 = H ∀n ∈ N, GTn+1 = ∪0≤k≤n Lif (b) then c1 else c2 M(k) TI   Lgrd¬b MT ∪ Lgrd¬b M ∪1≤k≤n+1 Lif (b) then c else skipM(k) T = ∪0≤k≤n+1 Lgrd¬b M ◦ Lif (b) then c else skipM(k) T   = ∪0≤k≤n Lgrd¬b M ◦ Lif (b) then c else skipM(k) T ∪ Lgrd¬b M ◦ Lif (b) then c else skipM(n+1) T   = Lgrd¬b M ◦ ∪0≤k≤n Lif (b) then c else skipM(k) T ∪ Lgrd¬b M ◦ Lif (b) then c else skipM(n+1) T = Lgrd¬b MGTn+1 ∪ Lgrd¬b M ◦ Lif (b) then c else skipM(n+1) T = YTn+1 ∪ Lgrd¬b M ◦ Lif (b) then c else skipM(n+1) T = YTn+1 ∪ {⦃ grd¬b ⦄ ◦ ⦃if (b) then c1 else skip⦄(n+1) T | T ∈ T} = Hthe set ⦃ grd¬b ⦄ ◦ ⦃if (b) then c1 else c2 ⦄(n+1) T is the set of traces exiting the loop body after n+1 or less iterations:I H it is equal to {F (n+2) (⊥)(t) | t ∈ T } by definition of FI n o YTn+1 ∪ {F (n+2) (⊥)(t) | t ∈ T } | T ∈ T = YTn+1 ∪ XTn+2 This concludes our induction on n. We conclude this proof by structural induction, and Cases 1 to 5. Appendix E. Dependences γdeptr −− −−−− − Dep. Lemma 9 . (αdeptr , γdeptr ) yields a Galois connection: P(P(Trc)) ← − − → α −−− deptr Proof. The lattice Dep is finite, therefore complete. Thus, this is a Galois connection since it is an instance of the supremus abstraction presented in Lemma 3. γagree −−−−− {tt, ff}. The same reasoning applies for P(P(Val)) ← −− α−−−→ agree The proofs of of both Lemma 4 and Theorem 2 are deferred to Appendix G: as we explain after Lemmas 6 and 7, we derive the dependence abstract semantics as an approximation of the cardinality semantics. Appendix F. Cardinality Abstraction γ crdtr −− −−−− Card. Lemma 10 . (αcrdtr , γcrdtr ) yields a Galois connection: P(P(Trc)) ← −− α −−→ crdtr Proof. The lattice Card is complete, since all subsets of Card have an infimum and a supremum wrt. partial order v] , notably because the closed interval [0, ∞] is complete wrt. partial order ≤. Thus, this is an instance of the supremus abstraction Lemma 3. l Lemma 5 . OC LeM] is sound: ∀e, ∀l, αcrdval ◦ l ˙ OC Ol LeM ◦ γcrdtr ≤ LeM] . Proof. The derivation proof is by structural induction on expressions. In each case we start from the left side and derive the definition on the right side. The interesting case is for binary arithmetic operations. 1 – Case : integer literal n Let l ∈ L, and C ∈ Card. Ol LnM ◦ γcrdtr (C )   = αcrdval ◦ Ol LnM {T | crdtr(T ) v] C } αcrdval ◦ = αcrdval ∪T ∈γcrdtr (C ) {⦃n⦄R | R ⊆ T and R |=Γ l}  = αcrdval ({⦃n⦄R | R ⊆ T, R |=Γ l and T ∈ γcrdtr (C )}) ≤ HNB: precision loss for simplicity of presentation, when C is bottomI αcrdval ({{n}}) = max crdval(V ) V ∈{{n}} =1 l , OC LnM] C l LnM] C is being defined. Here we use , to indicate that OC 2 – Case : variable id Let l ∈ L, and C ∈ Card. Ol LidM ◦ γcrdtr (C )   = αcrdval ∪T ∈γcrdtr (C ) Ol ⦃id⦄T αcrdval ◦ = Hαcrdval preserves joinsI   max αcrdval Ol ⦃id⦄T T ∈γcrdtr (C ) = n H where id ; l#n ∈ αcrdtr ≤ Hαcrdtr ◦ γcrdtr (C )I γcrdtr is reductive : αcrdtr n H where id ; l#n ∈ C I 3 – Case : e1 ⊕ e2 Let l ∈ L, and C ∈ Card. ◦ ◦ γcrdtr (C ) v] C I l , OC LidM] C αcrdval ◦ Ol Le1 ⊕ e2 M ◦ γcrdtr (C ) = αcrdval ({⦃e1 ⊕ e2 ⦄R | R ⊆ T, R |=Γ l and T ∈ γcrdtr (C )}) ≤ αcrdval ({⦃e1 ⦄R | R ⊆ T, R |=Γ l and T ∈ γcrdtr (C )}) × αcrdval ({⦃e2 ⦄R | R ⊆ T, R |=Γ l and T ∈ γcrdtr (C )}) = αcrdval ◦ Ol Le1 M ◦ γcrdtr (C ) × αcrdval ◦ ≤ HBy induction hypothesisI Ol Le2 M ◦ γcrdtr (C ) l l OC Le1 M] C × OC Le2 M] C l , OC Le1 ⊕ e2 M] C 4 – Case : e1 cmp e2 This derivation is similar to case e1 ⊕ e2 , with the difference that booleans evaluate to at most 2 different values, 1 or 0. Ol Le1 cmp e2 M ◦ γcrdtr (C )   l l ≤ min 2, OC Le1 M] C × OC Le2 M] C αcrdval ◦ l , OC Le1 cmp e2 M] C 5 – Case : conclusion We conclude by structural induction on expressions, and cases 1 to 4. Theorem 4 . The cardinality abstract semantics is sound: αcrdtr ◦ ] LcM ◦ γcrdtr v̇ LcM] . Proof. The derivation proof is by structural induction on commands. The interesting case is for conditionals. 1 – Case : skip Let C ∈ Card. αcrdtr LskipM ◦ γcrdtr (C ) ◦ = αcrdtr ◦ ] v Hαcrdtr C γcrdtr (C ) ◦ γcrdtr is reductive: αcrdtr ◦ γcrdtr (C ) v] C I , LskipM] C 2 – Case : c1 ; c2 αcrdtr ◦ Lc1 ; c2 M ◦ γcrdtr (C ) = αcrdtr ] v αcrdtr ◦ Lc2 M ◦ Lc1 M ◦ γcrdtr (C ) αcrdtr is extensive, Lc2 M and αcrdtr are monotoneI Lc2 M ◦ γcrdtr ◦ αcrdtr ◦ Lc1 M ◦ γcrdtr (C ) Hγcrdtr ◦ ◦ v] HBy induction hypothesisI Lc2 M] ◦ Lc1 M] C , Lc1 ; c2 M] C 3 – Case : id := e 3.1 – We first proceed towards an intermediate derivation: αcrdtr = ◦ Lid := eM ◦ γcrdtr (C ) G] crdtr(T ) T ∈Lid:=eM◦γcrdtr (C )   G] = [  T ∈Lid:=eM◦γcrdtr (C ) {l ; x#n | n = αcrdval (O ⦃x⦄T ) } l l∈L,x∈VarP  = [ l∈L,x∈VarP T ∈Lid:=eM◦γcrdtr (C )  l ; x#n | n = {l ; x#n | n = αcrdval (O ⦃x⦄T ) } l  l∈L,x∈VarP =  G] [ max T ∈Lid:=eM◦γcrdtr (C ) αcrdval (Ol ⦃x⦄T ) We now consider two cases: variables that are not modified by the assignment, and variable that are. 3.2 – Case x 6= id:  Notice that ∀l ∈ L, ∀x ∈ VarP , such that x 6= id, ∀T ∈ γcrdtr (C ): Ol ⦃x⦄T = Ol ⦃x⦄ ⦃id := e⦄T  Thus: max αcrdval (Ol ⦃x⦄T ) T ∈Lid:=eM◦γcrdtr (C ) = max T ∈γcrdtr (C ) αcrdval (Ol ⦃x⦄T ) = Hαcrdval preserves joinsI   [ l αcrdval  O ⦃x⦄T  T ∈γcrdtr (C ) = HBy definition of Ol LxMI   αcrdval Ol LxM (γcrdtr (C )) = αcrdval ◦ Ol LxM ◦ γcrdtr (C ) l ≤ HBy soundness of OC LxM] C , Lemma 5I l OC LxM] C = n where l ; x#n ∈ C 3.3 – Case x is id : ∀l ∈ L, we have : max αcrdval (Ol ⦃id⦄T ) T ∈Lid:=eM◦γcrdtr (C ) = max T ∈γcrdtr (C ) = αcrdval ◦ αcrdval (Ol ⦃e⦄T ) Ol LeM ◦ γcrdtr (C ) l ≤ HBy soundness of OC LxM] C , Lemma 5I l OC LeM] C 3.4 – Final derivation: αcrdtr ◦ Lid := eM ◦ γcrdtr (C ) = HRecall the intermediate derivation in Case 3.1I  [ l ; x#n | n = max T ∈Lid:=eM◦γcrdtr (C ) l∈L,x∈VarP αcrdval (Ol ⦃x⦄T )  v] HBy Cases 3.2 and 3.3I   n o [ [  l ]  l ; x#n ∈ C } ∪ {l ; id#OC LeM C  x∈VarP \{id} l∈L HNB: this set of constraints remains valid, owing to exclusion of id on the leftI n o l = l ; x#n ∈ C | x 6= id} ∪ {l ; id#OC LeM] C | l ∈ L , Lid := eM] C 4 – Case if b then c1 else c0 : 4.1 – Intermediate derivation: αcrdtr = ◦ Lif b then c1 else c0 M ◦ γcrdtr (C ) G] crdtr(T ) T ∈Lif b c1 else c0 M◦γcrdtr (C ) =  G] [  T ∈Lif b c1 else c0 M◦γcrdtr (C ) l∈L,x∈VarP n  o l ; x#αcrdval (O ⦃x⦄T )  l  = G] [  l∈L,x∈VarP = n T ∈Lif b c1 else c0 M◦γcrdtr (C )  l ; x# [  o l ; x#αcrdval (O ⦃x⦄T )  l l∈L,x∈VarP max T ∈Lif b c1 else c0 M◦γcrdtr (C ) αcrdval (Ol ⦃x⦄T )  l 4.2 – Case OC LbM] C = 1 : l Let l ∈ L, and assume OC LbM] C = 1. Let x ∈ VarP . 0 ◦ ∀T ∈ Lif b c1 else c0 M γcrdtr (C ), exists T ∈ γcrdtr (C ) such that T 0 = ⦃if b c1 else c0 ⦄T . (Since LcM is not just the lifting of ⦃c⦄ to a set of sets (semantics of loops is not), in general if T 0 ∈ LcMT, we only have the existence of T ∈ T such that T 0 ⊆ ⦃c⦄T . Here, we also rely on the fact that γcrdtr (C ) is a subset-closed. This is merely a convenient shortcut to avoid lengthy details; it should be possible to use only the fact that T 0 ⊆ ⦃c⦄T to perform the same derivation. ) Let T 0 ∈ Lif b c1 else c0 M ◦ γcrdtr (C ), and T ∈ γcrdtr (C ) such that T 0 = ⦃if b c1 else c0 ⦄T . l ˙ OC Since αcrdval ◦ Ol LbM ◦ γcrdtr (C ) ≤ LbM] C (= 1), ∀R ⊆ T such that R |=Γ l, the traces r ∈ R all evaluate b to 1 or (exclusively) to 0; i.e. the sets R ⊆ T such that R |=Γ l are partitioned into the sets evaluating b to 1, and those evaluating b to 0. Therefore, ∀R0 ⊆ T 0 such that R0 |=Γ l, exists R ∈ T and j ∈ {0, 1} such that ⦃b⦄R = {j} and ⦃cj ⦄R = R0 . Thus, αcrdval (Ol ⦃x⦄T 0 ) = αcrdval ({⦃x⦄R0 | R0 ⊆ T 0 and R0 |=Γ l})   [ = αcrdval  {⦃x⦄(⦃if b c1 else c0 ⦄R)} R⊆T and R|=Γ l   = αcrdval  [ [ j∈{0,1} R⊆T and R|=Γ l and ⦃b⦄R={j}   = max αcrdval  j∈{0,1} {⦃x⦄(⦃cj ⦄R)}  [ R⊆T and R|=Γ l and ⦃b⦄R={j} {⦃x⦄(⦃cj ⦄R)} ≤ Hαcrdval is monotoneI   max αcrdval ◦ Ol LxM ◦ Lcj M ◦ γcrdtr (C ) j∈{0,1} ≤ Hαcrdval ◦ Ol LxM is monotone, γcrdtr ◦ αcrdtr extensive I   max αcrdval ◦ Ol LxM ◦ γcrdtr ◦ αcrdtr Lcj M ◦ γcrdtr (C ) j∈{0,1} ≤ HBy induction hypothesisI  max αcrdval ◦ Ol LxM ◦ γcrdtr j∈{0,1} ◦ Lcj M] C  ≤ HBy soundness of abstract variety, Lemma 5I   l max OC LxM] ◦ Lcj M] C j∈{0,1}   = max nj where l ; x#nj ∈ Lcj M] C j∈{0,1} l 4.3 – Case OC LbM] C > 1, x ∈ / Mod(if b c1 else c0 ) : l Let l ∈ L, and assume OC LbM] C > 1. Let x ∈ VarP . Let T 0 ∈ Lif b c1 else c0 M ◦ γcrdtr (C ), and T ∈ γcrdtr (C ) such that T 0 = ⦃if b c1 else c0 ⦄T . Notice first that if x ∈ / Mod(if b c1 else c0 ), then: αcrdval (Ol ⦃x⦄T 0 ) = αcrdval (Ol ⦃x⦄T ) ≤ Hαcrdval is monotoneI αcrdval l 4.4 – Case OC LbM] C > 1, x ∈ Mod(if b c1 else c0 ) : l Let l ∈ L, and assume OC LbM] C > 1. Let x ∈ VarP . ◦ Ol LxM ◦ γcrdtr (C ) l ≤ OC LxM] C = n s.t l ; x#n ∈ C Let T 0 ∈ Lif b c1 else c0 M ◦ γcrdtr (C ), and T ∈ γcrdtr (C ) such that T 0 = ⦃if b c1 else c0 ⦄T . αcrdval (Ol ⦃x⦄T 0 ) = αcrdval (Ol ⦃x⦄ ◦ ⦃if b c1 else c0 ⦄T )   ≤ αcrdval (Ol ⦃x⦄ ⦃c1 ⦄ ◦ ⦃ grdb ⦄T ∪ ⦃c0 ⦄ ◦ ⦃ grd¬b ⦄T     ≤ αcrdval Ol ⦃x⦄ ◦ ⦃c1 ⦄ ◦ ⦃ grdb ⦄T + αcrdval Ol ⦃x⦄ ◦ ⦃c0 ⦄ ◦ ⦃ grd¬b ⦄T ≤ HBy monotonicity, T ∈ γcrdtr (C ) and Theorem 1I αcrdval ◦ l ≤ OC LxM] Ol LxM ◦ Lc1 M ◦ Lgrd¬b M ◦ γcrdtr (C ) + αcrdval Lc1 M] ◦ ◦ l Lgrd¬b M] C + OC LxM] ◦ Lc0 M] ◦ ◦ Ol LxM ◦ Lc0 M ◦ Lgrd¬b M ◦ γcrdtr (C ) Lgrd¬b M] C ≤ HAs a first approximation, we simply use Lgrdb M] C v] C . We refine this in Section 8I l OC LxM] ◦ l Lc1 M] C + OC LxM] ◦ Lc2 M] C = n1 + n2 s.t l ; x#n1 ∈ Lc1 M] C and l ; x#n2 ∈ Lc2 M] C 4.4 – Final derivation: αcrdtr ◦ Lif b then c1 else c0 M ◦ γcrdtr (C ) = HBy the intermediate derivation in case 4.1I   [ l ; x# max αcrdval (Ol ⦃x⦄T ) T ∈Lif b c1 else c0 M◦γcrdtr (C ) l∈L,x∈VarP ( ≤ π l (Lc1 M] C ) t] π l (Lc2 M] C ) π l (Lc1 M] C ) t] add(if b c1 else c0 ,πl (C )) π l (Lc1 M] C ) [ l∈L l LbM] = 1 if OC otherwise with π l (C ) , {l ; x#n ∈ C | x ∈ VarP , n ∈ [0, ∞]} and C1 t] add(com,C0 ) C2 , [ {l ; x#n | n , n1 + n2 s.t l ; x#nj ∈ Cj , j = 1, 2} x∈Mod(com) [ {l ; x#n ∈ C0 } x∈VarP \ Mod(com) 5 – Case while b do c: αcrdtr ◦ Lwhile b do cM] = αcrdtr ◦ γcrdtr (C )   ¬b ⊆ ◦ Lgrd M lfp γcrdtr (C ) Lif b then c else skipM v] Hαcrdtr ,Lgrd¬b M are monotone, γcrdtr ◦ αcrdtr is extensiveI   αcrdtr ◦ Lgrd¬b M ◦ γcrdtr ◦ αcrdtr lfp⊆ γcrdtr (C ) Lif b then c else skipM v] HBy assuming Lgrdb M] is soundI   Lgrd¬b M] ◦ αcrdtr lfp⊆ γcrdtr (C ) Lif b then c else skipM v] HBy the fixpoint transfer theoremI Lgrd¬b M] ] ◦ ] lfpv C Lif b then c1 else c2 M ] v] Hprecision loss for simplicity as a first approximation, Lgrd¬b M] v̇ idI ] ] lfpv C Lif b then c1 else c2 M , Lwhile b do cM] C 6 – Case : conclusion We conclude by structural induction on commands and cases 1 to 5. Appendix G. Appendix G.1 Dependencies reloaded Soundness proof for dependences semantics As noted in the text, we can derive the dependency analysis by calculation from its specification. The derivation looks similar to the one in Appendix F for the cardinality abstraction. So here we choose a different way of proving soundness for dependency analysis. We formulate it as an abstraction of the cardinality abstraction. This is another illustration of the benefit gained from working with hyperproperties entirely within the framework of abstract interpretation. This proof of soundness also implies that the cardinality abstraction is at least as precise as the type system of Hunt and Sands (Hunt and Sands 2006) and the logic of Amtoft and Banerjee (Amtoft and Banerjee 2004), as a corollary of Theorem 3. Lemma 6 . (αagree , γagree ) is the composition of two Galois connections (αcrdval , γcrdval ) and (αlqone , γlqone ) : γcrdval γlqone crdval lqone −− −−−− − ([0, ∞] , ≤) ← −−−−− ({tt, ff}, ⇐=) (P(P(Val)), ⊆) ← −− → −− α −−− α−−−→ with: ( if n ≤ 1 , and otherwise. tt ff ( 1 γlqone (bv) , ∞ αlqone (n) , if bv = tt otherwise. Proof. Notice that: agree(V ) , (∀v1 , v2 ∈ V, v1 = v2 ) = (crdval(V ) ≤ 1) Also, αagree (V) , ∧V ∈V agree(V ) = ∧V ∈V (crdval(V ) ≤ 1)   = max crdval(V ) ≤ 1 V ∈V = αcrdval (V) ≤ 1 = αlqone ◦ αcrdval (V) ( where αlqone (n) , tt if n ≤ 1 ff otherwise And, γagree (bv) , {V ∈ P(Val) | agree(V ) ⇐= bv} = {V ∈ P(Val) | crdval(V ) ≤ γlqone (bv)} where ( 1 if bv = tt γlqone (bv) , ∞ otherwise = γcrdval ◦ γlqone (bv) γlqone −−−−− {tt, ff}: Notice that [0, ∞] ← −− α−−−→ lqone ∀n ∈ [0, ∞] , ∀ bv ∈ {tt, ff}, Thus, we obtain αagree = αlqone ◦ αlqone (n) ⇐= bv iff. n ≤ γlqone (bv) αcrdval , as well as γagree = γcrdval ◦ γlqone : γcrdval γlqone crdval lqone −−−−− ({tt, ff}, ⇐=) −− −−−− − ([0, ∞] , ≤) ← (P(P(Val)), ⊆) ← −− → −− α −−− α−−−→ Lemma 7 . (αdeptr , γdeptr ) is the composition of two Galois connections (αcrdtr , γcrdtr ) and (αlqonecc , γlqonecc ) : γcrdtr γlqonecc crdtr lqonecc −− −−−− (Card, v] ) ← −− −−−−− − (Dep, v\ ) (P(P(Trc)), ⊆) ← −− −− → α −−→ α −−−− with: αlqonecc (C ) , {l ;Sx | l ; x#n ∈ C and αlqone (n)} γlqonecc (D) , {l ; x#n | n = γlqone (l ; x ∈ D)} l∈L,x∈VarP Proof. First, αdeptr (T) = G\ deptr(T ) T ∈T = G\ [ T ∈T l∈L,x∈VarP {l ; x | αagree (Ol ⦃x⦄T )} = HBy the decomposition in Case 1I G\ [ {l ; x | αlqone ◦ αcrdval (Ol ⦃x⦄T )} T ∈T l∈L,x∈VarP   = G\ αlqonecc  T ∈T = G\ [ {l ; x#n | n = αcrdval (O ⦃x⦄T )} l l∈L,x∈VarP Hwith αlqonecc (C ) , {l ; x | l ; x#n ∈ C and αlqone (n)}I αlqonecc ◦ crdtr(T ) T ∈T = Hαlqonecc preserves unionsI ! G] αlqonecc crdtr(T ) T ∈T = αlqonecc ◦ αcrdtr (T) Also, γdeptr (D) = {T | deptr(T ) v\ D} = {T | αlqonecc ◦ = {T | αlqonecc ◦ crdtr(T ) v\ D} crdtr(T ) ⊇ D} = {T | ∀l ; x ∈ D, l ; x ∈ αlqonecc  = T | ∀l ; x ∈ D, ◦ crdtr(T )}   l ; x ∈ αlqonecc ∪l∈L,x∈VarP {l ; x#n | n = αcrdval (Ol ⦃x⦄T ) } = {T | ∀l ; x ∈ D, αlqone (αcrdval (Ol ⦃x⦄T ))} = {T | ∀l ; x ∈ D, αcrdval (Ol ⦃x⦄T ) ≤ 1} = γcrdtr ◦ γlqonecc (D) Hγlqonecc (D) , Therefore, we have αdeptr = αlqonecc ◦ [ l∈L,x∈VarP {l ; x#n | n = γlqone (l ; x ∈ D)}I αcrdtr , and γdeptr = γcrdtr ◦ γlqonecc , with: γcrdtr γlqonecc crdtr lqonecc −− −−−− (Card, v] ) ← −− −−−−− − (Dep, v\ ) (P(P(Trc)), ⊆) ← −− −− → α −−→ α −−−− l Lemma 4 . OD LeM\ is sound: ∀e, ∀l, ∀D, αagree ◦ l Ol LeM ◦ γdeptr (D) ⇐= OD LeM\ D . Proof. l 1 – Derivation of Agreements OD LeM\ up to l as an abstraction of cardinalities up to security level l. αagree ◦ Ol LnM ◦ γdeptr (D) = αlqone Henceforth, we will derive 1.1 – Case : n Let l ∈ L, D ∈ Dep. l OD LeM\ ⇐= ◦ αcrdval ◦ Ol LnM ◦ γdeptr l αlqone ◦ OC LeM] ◦ ◦ γlqonecc (D) γlqonecc (D) l as an abstraction of cardinalities OC LeM] . This derivation goes by structural induction on expressions. αlqone ◦ l OC LnM] ◦ γlqonecc (D) = αlqone (1) = tt l H, OD LnM\ I 1.2 – Case : id Let l ∈ L, D ∈ Dep. αlqone ◦ l OC LidM] ◦ γlqonecc (D) = αlqone (n) where l ; id#n ∈ γlqonecc (D) = (l ; id ∈ D) 1.3 – Case : e1 ⊕ e2 Let l ∈ L, D ∈ Dep. l H, OD LidM\ I l OC Le1 ⊕ e2 M] ◦ γlqonecc (D)  l l = αlqone (OC Le1 M] ◦ γlqonecc (D)) × (OC Le2 M] αlqone ◦ ⇐= αlqone = ◦ l OC Le1 M] l OD Le1 M\ D ∧ γlqonecc (D) ∧ αlqone ◦ l OD Le2 M\ D H, 1.4 – Case : e1 cmp e2 This case is similar to case 1.3. 1.5 – Case: conclusion We conclude by structural induction on expressions. l OD Le1 ◦ ◦ γlqonecc (D)) l OC Le2 M] ◦  γlqonecc (D) ⊕ e2 M DI \ Theorem 2 . The dependence semantics is sound: αdeptr Proof. Recall that we have αdeptr = αlqonecc ◦ ◦ \ LcM ◦ γdeptr v̇ LcM\ . αcrdtr , and γdeptr = γcrdtr ◦ γlqonecc , with: γcrdtr γlqonecc crdtr lqonecc −− −−−−− − Dep −− −−−− Card ← P(P(Trc)) ← −− → −− α −−−− α −−→ Since, αdeptr ◦ LcM ◦ γdeptr (D) = αlqonecc v\ αlqonecc ◦ αcrdtr ◦ LcM] ◦ ◦ LcM ◦ γcrdtr ◦ γlqonecc (D) γlqonecc (D) We will continue the derivation of dependences abstract semantics LcM\ as an abstraction of LcM] . We make explicit 2 derivations, for assignments and conditionals. The other cases are similar to the derivation of the cardinalities abstract semantics. 1 – Case : id := e Lid := eM] ◦ γlqonecc (D)  l = αlqonecc {l ; x#n ∈ γlqonecc (D) | x 6= id} ∪ {l ; id#n | n , OC LeM] αlqonecc ◦ ◦  γlqonecc (D), l ∈ L} l = {l ; x ∈ D | x 6= id} ∪ {l ; id | OD LeM\ } 2 – Case if b then c1 else c2 : αlqonecc = ⇐= ◦ Lif b then c1 else c2 M] γlqonecc (D) ◦ l if OC LbM] ◦ γlqonecc (D) = 1      otherwise let D1 = Lc1 M D in let D2 = Lc2 M\ D in let W ( = Mod(if b c1 else c0 ) in l S π l (D1 ) t\ π l (D2 ) if OD LbM\ D l l∈L π (D) \ {l ; x | x ∈ W } otherwise We conclude by structural induction on commands Appendix G.2 ◦ let C1 = Lc1 M γlqonecc (D) in let C2 = Lc2 M] ◦ γlqonecc (D) in let W =  Mod(if  b c1 else c0 ) in l ] l  π (C1 ) t π (C2 ) π l (C ) S   1 αlqonecc  t] add(W,πl (C )) l∈L     π l (C2 ) ] Precision proof Lemma 11 . For all l, l0 ∈ L, for all T ∈ P(Trc): \ . 0 l v l0 =⇒ Ol ⦃e⦄T ⊆ Ol ⦃e⦄T Proof. Assume l v l0 . Then, for all R ⊆ T , R |=Γ l0 =⇒ R |=Γ l Thus, Therefore, it holds that: {R | R ⊆ T and R |=Γ l0 } ⊆ {R | R ⊆ T and R |=Γ l} 0 Ol ⦃e⦄T ⊆ Ol ⦃e⦄T Corollary 2 . For all l, l0 ∈ L, for all T ∈ P(P(Trc)): 0 l v l0 =⇒ Ol LeMT ⊆ Ol LeMT Proof. This is a direct result from Lemma 11 and definition of Ol LeM. Corollary 3 . For all l, l0 ∈ L, for all id, for all T ∈ P(P(Trc)): l v l0 =⇒ l ; id ∈ αdeptr (T) =⇒ l0 ; id ∈ αdeptr (T)  Proof. 0 Let us assume l v l0 . By Corollary 2, we have Ol LidMT ⊆ Ol LidMT. 0 And by monotonicity of αagree , we have αagree (Ol LidMT) ⇐= αagree (Ol LidMT). l Thus, if l ; id ∈ αdeptr (T), then αagree (O LidMT) = tt and also 0 αagree (Ol LidMT) = tt, thus l0 ; D ∈ αdeptr (T). Corollary 4 . For all l, l0 ∈ L, for all id, for all D ∈ Dep: l v l0 =⇒ γdeptr (D ∪ {l ; id}) = γdeptr (D ∪ {l ; id, l0 ; id}) Proof. 1 – Note that D ∪ {l ; id, l0 ; id} ⊇ D ∪ {l ; id}, thus D ∪ {l ; id, l0 ; id} v\ D ∪ {l ; id} Therefore, by monotony of γdeptr : γdeptr (D ∪ {l ; id, l0 ; id}) ⊆ γdeptr (D ∪ {l ; id}) 2 – Also, let T ∈ γdeptr (D ∪ {l ; id}). We have deptr(T ) v\ D ∪ {l ; id} by definition of γdeptr . Thus, l ; id ∈ αdeptr (T ) and also l0 ; id ∈ αdeptr (T ) by Corollary 3. This also means that deptr(T ) v\ D ∪ {l ; id, l0 ; id}. Finally, T ∈ γdeptr (D ∪ {l ; id, l0 ; id}) and γdeptr (D ∪ {l ; id, l0 ; id}) ⊇ γdeptr (D ∪ {l ; id}) This concludes our proof by Case 1 and 2. Henceforth, we will assume that all D ∈ Dep are well formed, meaning that ∀l, l0 ∈ Dep, l ; id ∈ D =⇒ l0 ; id ∈ D. We conjecture that this can be proven for the dependence analysis we have derived: given a well formed initial set of dependence constraints, the analysis always yields a well formed set of dependence constraints. For simplicity, we will use Corollary 4 to argue that we can still augment any set of dependence constraints to ensure it is well formed by adding the appropriate atomic constraints. An alternative approach would reduce the set of dependence constraints, and change slightly the abstract semantics in order to leverage Corollary 4 and guarantee the same precision, but we refrain from doing so for simplicity. We consider the constructive version of Hunt and Sands’ flow sensitive type system, proposed in (Hunt and Sands 2011). Lemma 12 . For all e, D ∈ Dep, ∆ ∈ VarP → L, l ∈ L such that ∆ ` e : l, it holds that: l αhs (D) v̇ ∆ =⇒ OD LeM\ D = tt Proof. The proof proceeds by structural induction on expressions. 1 – Case n: l By definition of OD LnM\ , we have: l ∀D, ∀l ∈ L, OD LnM\ D = tt 2 – Case id: By definition of the type system, we have ∆(id) = l. Thus: αhs (D) v̇ ∆ =⇒ u{l0 | l0 ; id ∈ D} v l =⇒ Hsince D is assumed well-formedI l ; id ∈ D l =⇒ OD LidM\ D = tt 3 – Case e1 ⊕ e2 : By definition of the type system, there is l1 , l2 such that ∆ ` e1 : l1 and ∆ ` e2 : l2 , with l1 t l2 = l. Thus, by induction on e1 and e2 , and assuming αhs (D) v̇ ∆, we have: l1 l2 OD Le1 M\ D = tt ∧ OD Le2 M\ D = tt Thus, since D is well formed and l1 v l and l2 v l, it holds that: Therefore, also: l l OD Le1 M\ D = tt ∧ OD Le2 M\ D = tt l OD Le1 ⊕ e2 M\ D = tt 4 – Case e1 cmp e2 : This case is similar to Case 3. 5 – We conclude by structural induction and Cases 1 to 4. Let us denote by ⊥L ∈ L the bottom element of the lattice L. Theorem 3 . For all c, D0 , D ∈ Dep, ∆0 , ∆ ∈ VarP → L, where ⊥L ` ∆0 {c}∆, and D = LcM\ D0 , it holds that: αhs (D0 ) v̇ ∆0 =⇒ αhs (D) v̇ ∆ . Proof. The proof goes by structural induction on commands. The conditional case explicitly assumes that the modified variables analysis is precise enough, to enable the simulation of the program counter. This can be achieved by collecting variable names in a while language. 1 – Case skip : this case stems from the premice. 2 – Case id := e : Assume αhs (D0 ) v̇ ∆0 . 2.1 – Case : x 6= id Then, for all x 6= id, ∆(x) = ∆0 (x). Also, αhs (D)(x) = αhs (D0 )(x) v ∆0 (x) = ∆(x). 2.2 – Case : x = id Otherwise, ∆ = ∆0 [id 7→ l], where ∆0 ` e : l. l By Lemma 12, since αhs (D0 ) v̇ ∆0 , we have OD LeM\ D0 = tt. Thus, l ; id ∈ D and : αhs (D)(id) v ∆(id) 2.3 – Finally, by Cases 2.2 and 2.3, we have : αhs (D) v̇ ∆ 3 – Case c1 ; c2 : This case proceeds by induction on both c1 and c2 by remarking that the type system types both command c1 and c2 in ⊥L . 4 – Case if (b) then c1 else c2 : Assume αhs (D0 ) v̇ ∆0 . Let lb , ∆1 , ∆2 such that: lb ` ∆0 {c1 }∆1 and lb ` ∆0 {c2 }∆2 , with ∆ = ∆1 ṫ ∆2 . Also, let ∆01 and ∆02 such that: ⊥L ` ∆0 {c1 }∆01 and ⊥L ` ∆0 {c2 }∆02 , with: ∆1 = ∆01 [id 7→ ∆01 (id) t lb , ∀id ∈ Mod(c1 )], ∆2 = ∆02 [id 7→ ∆02 (id) t lb , ∀id ∈ Mod(c2 )]. Intuitively, the program counter pc can be simulated by a modified variables analysis that is precise enough. For a while language, this can be achieved simply by collecting variable names. Let D1 , D2 ∈ Dep such that: Lc1 M\ D0 = D1 and Lc2 M\ D0 = D2 . Then, assuming W = M od(if (b) then c1 else c2 ), we have:  l \ l l \  π (D 1 ) t π (D2 ) if OD LbM D S  l D= {l ; x ∈ π (D) | l∈L   x∈ / W} otherwise 4.1 – By induction on c1 , we have αhs (D1 ) v̇ ∆01 . 4.2 – By induction on c2 , we have αhs (D2 ) v̇ ∆02 . 4.3 – Assume x 6∈ W , and prove αhs (D)(x) v ∆(x). Since x 6∈ W , we have ∆(x) = ∆0 (x). Therefore, αhs (D0 ) v̇ ∆0 implies ∆(x) ; x ∈ D0 . Thus, since x 6∈ W , we have ∆(x) ; x ∈ D1 , and ∆(x) ; x ∈ D2 (atomic constraints related to variables not explicitly written in c1 are not discarded from D0 , and likewise for those that are not explicitly written in c2 ). Thus, ∆(x) ; x ∈ D, meaning that αhs (D)(x) v ∆(x). 4.4 – Assume x ∈ W amd prove αhs (D)(x) v ∆(x): We have lb v ∆(x) since x is explicitly written in one of the branches at least. Also, by 4.1 and 4.2, we have αhs (D1 )(x) v ∆01 (x), and αhs (D2 )(x) v ∆02 (x). Meaning that αhs (D1 t\ D2 )(x) = αhs (D1 )(x) t αhs (D2 )(x) v ∆01 (x) t ∆02 (x) v ∆(x) Notice that ∆01 and ∆02 are well formed. Thus, exists lx such that lb v lx , such that lx ; x ∈ D1 t\ D2 , and lx v ∆(x). l And since ∀l ∈ L, such that lb v l, we also have OD LbM\ D0 = tt by using Lemma 12 and D0 is well formed. l l \ l Thus, ∀l ∈ L, such that lb v l, π (D) = π (D1 ) t π (D2 ) = π l (D1 t\ D2 ), i.e. lx ; x ∈ D Thus, αhs (D)(x) v ∆(x). 5 – Case : while (b) then c Assume αhs (D0 ) v̇ ∆0 . The output type environment ∆ is defined by: ∆ = lfp λ∆v .let ∆0 s.t. ⊥L t ∆v (a) ` ∆v {c}∆0 in ∆0 ṫ ∆0 Or written differently, ∆ is given by: ∆ = lfp λ∆v .let ∆0 s.t. ⊥L ` ∆v {if (b) then c else skip}∆0 in ∆0 ṫ ∆0 Let (∆n ) be the sequence defined as ∆n+1 = let ∆0 s.t. ⊥L ` ∆n {if (b) then c else skip}∆0 in ∆0 ṫ ∆0 Also, let (Dn ) be the sequence defined as Dn+1 = D0 t\ Lif (b) then c else skipM\ Dn Then, we prove by induction on n that αhs (Dn ) v ∆n . 5.1 – Case n = 0. This case holds by assumption αhs (D0 ) v̇ ∆0 . 5.2 – Case: Assume αhs (Dn ) v ∆n , and prove αhs (Dn+1 ) v ∆n+1 . Let ∆0 such that ⊥L ` ∆n {if (b) then c else skip}∆0 By assumption, we have αhs (Dn ) v ∆n . Thus, by using the same proof in Case 4, we have αhs (Lif (b) then c else skipM\ Dn ) v̇ ∆0 Therefore,   αhs (Lif (b) then c else skipM\ Dn ) ṫ αhs (D0 ) v̇ (∆0 ṫ ∆0 ) Therefore, αhs (Dn+1 ) v ∆n+1 . which proves that both least fixpoints are equal. 6 – Finally, we conclude by Cases 1–5, and structural induction on commands.
6cs.PL
1 Dynamic Topology Adaptation Based on Adaptive Link Selection Algorithms for Distributed Estimation arXiv:1510.05324v1 [cs.SY] 18 Oct 2015 Songcen Xu*, Rodrigo C. de Lamare, Senior Member, IEEE, and H. Vincent Poor, Fellow, IEEE Abstract—This paper presents adaptive link selection algorithms for distributed estimation and considers their application to wireless sensor networks and smart grids. In particular, exhaustive search–based least–mean–squares(LMS)/recursive least squares(RLS) link selection algorithms and sparsity–inspired LMS/RLS link selection algorithms that can exploit the topology of networks with poor–quality links are considered. The proposed link selection algorithms are then analyzed in terms of their stability, steady–state and tracking performance, and computational complexity. In comparison with existing centralized or distributed estimation strategies, key features of the proposed algorithms are: 1) more accurate estimates and faster convergence speed can be obtained; and 2) the network is equipped with the ability of link selection that can circumvent link failures and improve the estimation performance. The performance of the proposed algorithms for distributed estimation is illustrated via simulations in applications of wireless sensor networks and smart grids. Index Terms—Adaptive link selection, distributed estimation, wireless sensor networks, smart grids. I. I NTRODUCTION ISTRIBUTED signal processing algorithms have become a key approach for statistical inference in wireless networks and applications such as wireless sensor networks and smart grids [1], [2], [3], [4]. It is well known that distributed processing techniques deal with the extraction of information from data collected at nodes that are distributed over a geographic area [1]. In this context, for each specific node, a set of neighbor nodes collect their local information and transmit the estimates to a specific node. Then, each specific node combines the collected information together with its local estimate to generate an improved estimate. D A. Prior and Related Work Several works in the literature have proposed strategies for distributed processing which include incremental [1], [5], [6], [7], diffusion [2], [8], sparsity–aware [3], [9], [10], [11] and consensus–based strategies [4]. With the incremental strategy, the processing follows a Hamiltonian cycle, i.e., the information flows through these nodes in one direction, which means each node passes the information to its adjacent node in a uniform direction. However, in order to determine a cyclic path that covers all nodes, this method needs to solve an NP–hard problem. In addition, when any of the nodes fails, S. Xu* is with the Communications Research Group, Department of Electronics, University of York, YO10 5DD York, U.K. (e-mail: [email protected]). R. C. de Lamare is with CETUC / PUC-Rio, Brazil and Department of Electronics, University of York, U.K. (e-mail: [email protected]). H. V. Poor is with the Department of Electrical Engineering, Princeton University, Princeton NJ 08544 USA (e-mail: [email protected]). Part of this work has been presented at the 2013 IEEE International Conference on Acoustics, Speech, and Signal Processing, Vancouver, Canada and 2013 IEEE International Workshop on Computational Advances in MultiSensor Adaptive Processing, Saint Martin. EDICS: NET-DISP, NET-ADEG, NET-GRPH, NET-SPRS data communication through the cycle is interrupted and the distributed processing breaks down [1]. In distributed diffusion strategies [2], [9], the neighbors for each node are fixed and the combining coefficients are calculated after the network topology is deployed and starts its operation. One disadvantage of this approach is that the estimation procedure may be affected by poorly performing links. More specifically, the fixed neighbors and the pre– calculated combining coefficients may not provide an optimized estimation performance for each specified node because there are links that are more severely affected by noise or fading. Moreover, when the number of neighbor nodes is large, each node requires a large bandwidth and transmit power. Prior work on topology design and adjustment techniques includes the studies in [12], [13] and [14], which are not dynamic in the sense that they cannot track changes in the network and mitigate the effects of poor links. B. Contributions This paper proposes and studies adaptive link selection algorithms for distributed estimation problems. Specifically, we develop adaptive link selection algorithms that can exploit the knowledge of poor links by selecting a subset of data from neighbor nodes. The first approach consists of exhaustive search–based least–mean–squares(LMS)/recursive least squares(RLS) link selection (ES–LMS/ES–RLS) algorithms, whereas the second technique is based on sparsity–inspired LMS/RLS link selection (SI–LMS/SI–RLS) algorithms. With both approaches, distributed processing can be divided into two steps. The first step is called the adaptation step, in which each node employs LMS or RLS to perform the adaptation through its local information. Following the adaptation step, each node will combine its collected estimates from its neighbors and local estimate, through the proposed adaptive link selection algorithms. The proposed algorithms result in improved estimation performance in terms of the mean–square error (MSE) associated with the estimates. In contrast to previously reported techniques, a key feature of the proposed algorithms is that the combination step involves only a subset of the data associated with the best performing links. In the ES–LMS and ES–RLS algorithms, we consider all possible combinations for each node with its neighbors and choose the combination associated with the smallest MSE value. In the SI–LMS and SI–RLS algorithms, we incorporate a reweighted zero attraction (RZA) strategy into the adaptive link selection algorithms. The RZA approach is often employed in applications dealing with sparse systems in such a way that it shrinks the small values in the parameter vector to zero, which results in better convergence and steady–state performance. Unlike prior work with sparsity– aware algorithms [3], [15], [16], [17], the proposed SI–LMS 2 and SI–RLS algorithms exploit the possible sparsity of the MSE values associated with each of the links in a different way. In contrast to existing methods that shrink the signal samples to zero, SI–LMS and SI–RLS shrink to zero the links that have poor performance or high MSE values. By using the SI–LMS and SI–RLS algorithms, data associated with unsatisfactory performance will be discarded, which means the effective network topology used in the estimation procedure will change as well. Although the physical topology is not changed by the proposed algorithms, the choice of the data coming from the neighbor nodes for each node is dynamic, leads to the change of combination weights and results in improved performance. We also remark that the topology could be altered with the aid of the proposed algorithms and a feedback channel which could inform the nodes whether they should be switched off or not. The proposed algorithms are considered for wireless sensor networks and also as a tool for distributed state estimation that could be used in smart grids. In summary, the main contributions of this paper are: • We present adaptive link selection algorithms for distributed estimation that are able to achieve significantly better performance than existing algorithms. • We devise distributed LMS and RLS algorithms with link selection capabilities to perform distributed estimation. • We analyze the MSE convergence and tracking performance of the proposed algorithms and their computational complexities and we derive analytical formulas to predict their MSE performance. • A simulation study of the proposed and existing distributed estimation algorithms is conducted along with applications in wireless sensor networks and smart grids. This paper is organized as follows. Section II describes the system model and the problem statement. In Section III, the proposed link selection algorithms are introduced. We analyze the proposed algorithms in terms of their stability, steady–state and tracking performance, and computational complexity in Section IV. The numerical simulation results are provided in Section V. Finally, we conclude the paper in Section VI. Notation: We use boldface upper case letters to denote matrices and boldface lower case letters to denote vectors. We use (·)T and (·)−1 denote the transpose and inverse operators respectively, (·)H for conjugate transposition and (·)∗ for complex conjugate. II. S YSTEM M ODEL AND P ROBLEM S TATEMENT k Nk Fig. 1. Network topology with N nodes We consider a set of N nodes, which have limited processing capabilities, distributed over a given geographical area as depicted in Fig. 1. The nodes are connected and form a network, which is assumed to be partially connected because nodes can exchange information only with neighbors determined by the connectivity topology. We call a network with this property a partially connected network whereas a fully connected network means that data broadcast by a node can be captured by all other nodes in the network in one hop [18]. We can think of this network as a wireless network, but our analysis also applies to wired networks such as power grids. In our work, in order to perform link selection strategies, we assume that each node has at least two neighbors. The aim of the network is to estimate an unknown parameter vector ω 0 , which has length M . At every time instant i, each node k takes a scalar measurement dk (i) according to dk (i) = ω H 0 xk (i) + nk (i), i = 1, 2, . . . , I, (1) where xk (i) is the M ×1 random regression input signal vector and nk (i) denotes the Gaussian noise at each node with zero 2 mean and variance σn,k . This linear model is able to capture or approximate well many input-output relations for estimation purposes [19] and we assume I > M . To compute an estimate of ω in a distributed fashion, we need each node to minimize the MSE cost function [2]  2 Jωk (i) ω k (i) = E dk (i) − ω H (2) k (i)xk (i) , where E denotes expectation and ωk (i) is the estimated vector generated by node k at time instant i. Equation (2) is also the definition of the MSE. To solve this problem, diffusion strategies have been proposed in [2], [8] and [20]. In these strategies, the estimate for each node is generated through a fixed combination strategy given by X ω k (i) = ckl ψ l (i), (3) l∈Nk where Nk denotes the set of neighbors of node k including node k itself, ckl ≥ 0 is the combining coefficient and ψ l (i) is the local estimate generated by node l through its local information. There are many ways to calculate the combining coefficient ckl which include the Hastings [21], the Metropolis [22], the Laplacian [23] and the nearest neighbor [24] rules. In this work, due to its simplicity and good performance we adopt the Metropolis rule [22] given by   max{|N1 |,|N |} , if k 6= l are linked k l P (4) ckl = ckl , for k = l.  1− l∈Nk /k where |Nk | denotes the cardinality of Nk . The set of coefficients ckl should satisfy [2] X ckl = 1. (5) l∈Nk ∀k For the combination strategy mentioned in (3), the choice of neighbors for each node is fixed, which results in some problems and limitations, namely: • Some nodes may face high levels of noise or interference, which may lead to inaccurate estimates. • When the number of neighbors for each node is high, large communication bandwidth and high transmit power are required. 3 Some nodes may shut down or collapse due to network problems. As a result, local estimates to their neighbors may be affected. Under such circumstances, a performance degradation is likely to occur when the network cannot discard the contribution of poorly performing links and their associated data in the estimation procedure. In the next section, the proposed adaptive link selection algorithms are presented, which equip a network with the ability to improve the estimation procedure. In the proposed scheme, each node is able to dynamically select the data coming from its neighbors in order to optimize the performance of distributed estimation techniques. TABLE I T HE ES-LMS A LGORITHM • III. P ROPOSED A DAPTIVE L INK S ELECTION A LGORITHMS In this section, we present the proposed adaptive link selection algorithms. The goal of the proposed algorithms is to optimize the distributed estimation and improve the performance of the network by dynamically changing the topology. These algorithmic strategies give the nodes the ability to choose their neighbors based on their MSE performance. We develop two categories of adaptive link selection algorithms; the first one is based on an exhaustive search, while the second is based on a sparsity–inspired relaxation. The details will be illustrated in the following subsections. A. Exhaustive Search–Based LMS/RLS Link Selection The proposed ES–LMS and ES–RLS algorithms employ an exhaustive search to select the links that yield the best performance in terms of MSE. First, we describe how we define the adaptation step for these two strategies. In the ES– LMS algorithm, we employ the adaptation strategy given by  ∗ ψ k (i) = ω k (i − 1) + µk xk (i) dk (i) − ωH k (i − 1)xk (i) , (6) where µk is the step size for each node. In the ES–RLS algorithm, we employ the following steps for the adaptation: φ−1 (i) = λ−1 φ−1 (i − 1) λ−2 φ−1 (i − 1)x(i)xH (i)φ−1 (i − 1) − , (7) 1 + λ−1 xH (i)φ−1 (i − 1)x(i) where λ is the forgetting factor. Then, we let P (i) = φ−1 (i) (8) and λ−1 P (i)x(i) . (9) 1 + λ−1 xH (i)P (i)x(i)  ∗ ψ k (i) = ω k (i − 1) + k(i) dk (i) − ωH k (i − 1)xk (i) , (10) k(i) = P (i + 1) = λ−1 P (i) − λ−1 k(i)xH (i)P (i). (11) Following the adaptation step, we introduce the combination step for both ES–LMS and ES–RLS algorithms, based on an exhaustive search strategy. At first, we introduce a tentative set Ωk using a combinatorial approach described by Ωk ∈ 2Nk \∅, (12) where the set Ωk is a nonempty set with 2Nk elements. After the tentative set Ωk is defined, we write the cost function (2) for each node as  2 Jψ(i) ψ(i) , E dk (i) − ψ H (i)xk (i) , (13) Initialize: ω k (0)=0 For each time instant i=1,2, . . . , I For each node k=1,2, . . . , N ∗ ψ k (i) = ω k (i − 1) + µk xk (i)[dk (i) − ω H k (i − 1)xk (i)] end For each node k=1,2, . . . , N find all possible sets of Ωk P ckl (i)ψ l (i)]H xk (i) eΩk (i) = dk (i) − [ l∈Ωk b k (i) = arg min |eΩ (i)| Ω k PΩk ω k (i) = ckl (i)ψ l (i) end end b (i) l∈Ω k where ψ(i) , X ckl (i)ψ l (i) (14) l∈Ωk is the local estimator and ψ l (i) is calculated through (6) or (10), depending on the algorithm, i.e., ES–LMS or ES–RLS. With different choices of the set Ωk , the combining coefficients ckl will be re–calculated through (4), to ensure condition (5) is satisfied. Then, we introduce the error pattern for each node, which is defined as X H eΩk (i) , dk (i) − ckl (i)ψ l (i) xk (i). (15) l∈Ωk For each node k, the strategy that finds the best set Ωk (i) must solve the following optimization problem: Ω̂k (i) = arg min Ωk ∈2Nk \∅ |eΩk (i)|. (16) After all steps have been completed, the combination step in (3) is performed as described by X ω k (i) = ckl (i)ψ l (i). (17) b k (i) l∈Ω At this stage, the main steps of the ES–LMS and ES–RLS algorithms have been completed. The proposed ES–LMS and b k (i) that minimizes the error ES–RLS algorithms find the set Ω pattern in (15) and (16) and then use this set of nodes to obtain ωk (i) through (17). The ES–LMS/ES–RLS algorithms are briefly summarized as follows: Step 1 Each node performs the adaptation through its local information based on the LMS or RLS algorithm. Step 2 Each node finds the best set Ωk (i), which satisfies (16). Step 3 Each node combines the information obtained from its best set of neighbors through (17). The details of the proposed ES–LMS and ES–RLS algorithms are shown in Tables I and II. When the ES–LMS and ES–RLS algorithms are implemented in networks with a large number of small and low–power sensors, the computational complexity cost may become high, as the algorithm in (16) requires an exhaustive search and needs more computations to examine all the possible sets Ωk (i) at each time instant. 4 TABLE II T HE ES-RLS A LGORITHM Initialize: ω k (0)=0 phi−1 (0) = δ −1 I, δ = small positive constant For each time instant i=1,2, . . . , I For each node k=1,2, . . . , N φ−1 (i) = λ−1 φ−1 (i − 1) −1 λ−2 φ−1 (i − 1)xk (i)xH (i − 1) k (i)φ − H −1 −1 1 + λ xk (i)φ (i − 1)xk (i) P (i) = φ−1 (i) λ−1 P (i)xk (i) k(i) = 1 + λ−1 xH k (i)P (i)xk (i) ∗ ψ k (i) = ω k (i − 1) + k(i)[dk (i) − ω H k (i − 1)xk (i)] −1 P (i + 1) = λ P (i) − λ−1 k(i)xH (i)P (i) k end For each node k=1,2, . . . , N find all possible sets ofP Ωk ckl (i)ψ l (i)]H xk (i) eΩk (i) = dk (i) − [ l∈Ωk end end b k (i) = arg min |eΩ (i)| Ω k PΩk ω k (i) = ckl (i)ψ l (i) l∈Nk b (i) l∈Ω k B. Sparsity–Inspired LMS/RLS Link Selection The ES–LMS/ES–RLS algorithms previously outlined need to examine all possible sets to find a solution at each time instant, which might result in high computational complexity for large networks operating in time–varying scenarios. To solve the combinatorial problem with reduced complexity, we propose sparsity-inspired based SI–LMS and SI–RLS algorithms, which are as simple as standard diffusion LMS or RLS algorithms and are suitable for adaptive implementations and scenarios where the parameters to be estimated are slowly time–varying. The zero–attracting strategy (ZA), reweighted zero–attracting strategy (RZA) and zero–forcing (ZF) are reported in [25], [3], [26], [27], [28], [29], [30], [31], [32], [33], [34], [35], [36], [37], [38], [39], [40] as for sparsity aware techniques. These approaches are usually employed in applications dealing with sparse systems in scenarios where they shrink the small values in the parameter vector to zero, which results in better convergence rate and steady–state performance. Unlike existing methods that shrink the signal samples to zero, the proposed SI–LMS and SI–RLS algorithms shrink to zero the links that have poor performance or high MSE values. To detail the novelty of the proposed sparsity– inspired LMS/RLS link selection algorithms, we illustrate the processing in Fig.2. MSE Value MSE Value Sparsity Aware Technique Nodes a ) Sparsity Aware Technique MSE Value Nodes MSE Value SILMS/SIRLS Algorithms Nodes b ) SILLS and SIRLS Algorithms Fig. 2. in Fig. 2 (b). In the following, we will show how the proposed SI–LMS/SI–RLS algorithms are employed to realize the link selection strategy automatically. In the adaptation step, we follow the same procedure in (6)–(10) as that of the ES–LMS and ES–RLS algorithms for the SI–LMS and SI–RLS algorithms, respectively. Then we reformulate the combination step. First, we introduce the log– sum penalty into the combination step in (3). Different penalty terms have been considered for this task. We have adopted a heuristic approach [3], [41] known as reweighted zero– attracting strategy into the combination step in (3) because this strategy has shown an excellent performance and is simple to implement. The regularization function with the log–sum penalty is defined as: X  f1 (ek (i)) = log 1 + ε|ekl (i)| , (18) Nodes Sparsity aware signal processing strategies Fig. 2 (a) shows a standard type of sparsity–aware processing. We can see that, after being processed by a sparsity– aware algorithm, the nodes with small MSE values will be shrunk to zero. In contrast, the proposed SI–LMS and SI–RLS algorithms will keep the nodes with lower MSE values and shrink the nodes with large MSE values to zero as illustrated where the error pattern ekl (i)(l ∈ Nk ), which stands for the neighbor node l of node k including node k itself, is defined as ekl (i) , dk (i) − ψ H (19) l (i)xk (i) and ε is the shrinkage magnitude. Then, we introduce the vector and matrix quantities required to describe the combination step. We first define a vector ck that contains the combining coefficients for each neighbor of node k including node k itself as described by ck , [ckl ], l ∈ Nk . (20) Then, we define a matrix Ψk that includes all the estimated vectors, which are generated after the adaptation step of SI– LMS and of SI–RLS for each neighbor of node k including node k itself as given by Ψk , [ψ l (i)], l ∈ Nk . (21) Note that the adaptation steps of SI–LMS and SI–RLS are identical to (6) and (10), respectively. An error vector êk that contains all error values calculated through (19) for each neighbor of node k including node k itself is expressed by êk , [ekl (i)], l ∈ Nk . (22) Here, we use a hat to distinguish êk defined above from the original error ek . To devise the sparsity–inspired approach, we have modified the vector êk in the following way: 1) The element with largest absolute value |ekl (i)| in êk will be employed as |ekl (i)|. 2) The element with smallest absolute value will be set to −|ekl (i)|. This process will ensure the node with smallest error pattern has a reward on its combining coefficient. 3) The remaining entries will be set to zero. At this point, the combination step can be defined as [41] ωk (i) = |Nk |  X j=1  ∂f1 (êk [j]) Ψk [j], ck [j] − ρ ∂êk [j] (23) where ck [j], êk [j] and Ψk [j] stand for the jth element in the ck , êk and Ψk . The parameter ρ is used to control the 5 algorithm’s shrinkage intensity. We then calculate the partial derivative of êk [j]:  ∂ log(1 + ε|ekl (i)|) ∂f1 (êk [j])  = ∂êk [j] ∂ ekl (i) sign(ekl (i)) l ∈ Nk =ε 1 + ε|ekl (i)| sign(êk [j]) =ε . (24) 1 + ε|êk [j]|   |N Pk | ∂f1 (êk [j]) ck [j] − ρ ∂êk [j] To ensure that = 1, we replace j=1 êk [j] with ξmin in the denominator, where the parameter ξmin stands for the minimum absolute value of ekl (i) in êk . Then, (24) can be rewritten as TABLE III T HE SI-LMS AND SI-RLS A LGORITHMS Initialize: ω k (−1)=0 P (0) = δ −1 I, δ = small positive constant For each time instant i=1,2, . . . , I For each node k=1,2, . . . , N The adaptation step for computing ψ k (i) is exactly the same as the ES-LMS and ES-RLS for the SI-LMS and SI-RLS algorithms respectively end For each node k=1,2, . . . , N ekl (i) = dk (i) − xH l ∈ Nk k (i)ψ l (i) ck = [ckl ] l ∈ Nk Ψk = [ψ l (i)] l ∈ Nk ek = [ekl (i)] l ∈ Nk Find the maximum and minimum absolute terms in ek Modified ek as ek =[0· · ·0,|ekl (i)|,0· · ·0,−|ekl (i)|,0· · ·0] | {z } | {z } max min  ξmin = min |ekl (i)|  |Nk |  P sign(e [j]) ck [j] − ρε 1+ε|ξk | Ψk [j] ω k (i) = j=1 ∂f1 (êk [j]) sign(êk [j]) =ε . ∂êk [j] 1 + ε|ξmin | (25) At this stage, the MSE cost function governs the adaptation step, while the combination step employs the combining coefficients with the derivative of the log-sum penalty which performs shrinkage and selects the set of estimates from the neighbor nodes with the best performance. The function sign(a) is defined as  a/|a| a 6= 0 sign(a) = (26) 0 a = 0. Then, by inserting (25) into (23), the proposed combination step is given by  |Nk |  X sign(êk [j]) ω k (i) = ck [j] − ρε Ψk [j]. (27) 1 + ε|ξmin | j=1 k [j]) Note that the condition ck [j] − ρε sign(ê 1+ε|ξmin | ≥ 0 is enforced k [j]) in (27). When ck [j] − ρε sign(ê 1+ε|ξmin | = 0, it means that the corresponding node has been discarded from the combination step. In the following time instant, if this node still has the largest MSE, there will be no changes in the combining coefficients for this set of nodes. To guarantee the stability, the parameter ρ is assumed to be sufficiently small and the penalty takes effect only on the element in êk for which the magnitude is comparable to 1/ε [3]. Moreover, there is little shrinkage exerted on the element in êk whose |êk [j]| ≪ 1/ε. The SI–LMS and SI– RLS algorithms perform link selection by the adjustment of the combining coefficients through (27). At this point, it should be emphasized that: • The process in (27) satisfies condition (5), as the penalty and reward amounts are the same for the nodes with maximum and minimum error pattern, respectively. • When computing (27), there are no matrix–vector multiplications. Therefore, no additional complexity is introduced. As described in (23), only the jth element in ck , êk and Ψk are used for calculation. For the neighbor node with the largest MSE value, after the modifications of êk , its ekl (i) value in ek will be a positive k [j]) number which will lead to the term ρε sign(ê 1+ε|ξmin | in (27) being positive too. This means that the combining coefficient for this min end end node will be shrunk and the weight for this node to build ω k (i) will be shrunk too. In other words, when a node encounters high noise or interference levels, the corresponding MSE value might be large. As a result, we need to reduce the contribution of this group of nodes. In contrast, for the neighbor node with the smallest MSE, as its ekl (i) value in ek will be a negative number, the term k [j]) ρε sign(ê 1+ε|ξmin | in (27) will be negative too. As a result, the weight for this node associated with the smallest MSE to build ωk (i) will be increased. For the remaining neighbor nodes, the k [j]) entry ekl (i) in ek is zero, which means the term ρε sign(ê 1+ε|ξmin | in (27) is zero and there is no change for the weights to build ωk (i). The main steps for the proposed SI–LMS and SI–RLS algorithms are listed as follows: Step 1 Each node carries out the adaptation through its local information based on the LMS or RLS algorithm. Step 2 Each node calculates the error pattern through (19). Step 3 Each node modifies the error vector ek . Step 4 Each node combines the information obtained from its selected neighbors through (27). The SI–LMS and SI–RLS algorithms are detailed in Table III. For the ES–LMS/ES–RLS and SI–LMS/SI–RLS algorithms, we design different combination steps and employ the same adaptation procedure, which means the proposed algorithms have the ability to equip any diffusion–type wireless networks operating with other than the LMS and RLS algorithms. This includes, for example, the diffusion conjugate gradient strategy [42]. IV. A NALYSIS OF THE PROPOSED ALGORITHMS In this section, a statistical analysis of the proposed algorithms is developed, including a stability analysis and an MSE analysis of the steady–state and tracking performance. In addition, the computational complexity of the proposed algorithms is also detailed. Before we start the analysis, we make some assumptions that are common in the literature [19]. Assumption I: The weight-error vector εk (i) and the input signal vector xk (i) are statistically independent, and the weight–error vector for node k is defined as εk (i) , ωk (i) − ω0 , (28) 6 where ω 0 denotes the optimum Wiener solution of the actual parameter vector to be estimated, and ωk (i) is the estimate produced by the proposed algorithms at time instant i. Assumption II: The input signal vector xl (i) is drawn from a stochastic process, which is ergodic in the autocorrelation function [19]. Assumption III: The M × 1 vector q(i) represents a stationary sequence of independent zero–mean vectors and positive definite autocorrelation matrix Q = E[q(i)q H (i)], which is independent of xk (i), nk (i) and εl (i). Assumption IV (Independence): All regressor input signals xk (i) are spatially and temporally independent. A. Stability Analysis In general, to ensure that a partially-connected network can converge to the global network performance, information should be propagated across the network [43]. The work in [12] shows that it is central to the performance that each node should be able to reach the other nodes through one or multiple hops [43]. In this section, we discuss the stability analysis of the proposed ES–LMS and SI–LMS algorithms. First, we substitute (6) into (17) and obtain X ω k (i + 1) = ckl (i)ψ l (i + 1) We also define an N × N matrix C where the combining coefficients {ckl } correspond to the {l, k} entries of the matrix C and the N M ×N M matrix C G with a Kronecker structure: CG = C ⊗ IM (35) where ⊗ denotes the Kronecker product. By inserting el (i + 1) = e0−l − εH l (i)xl (i + 1) into (33), the global version of (30) can then be written as   ε(i + 1) = C TG I − M D(i + 1) ε(i) + C TG M g(i + 1), (36) where e0−l is the estimation error produced by the Wiener filter for node l as described by e0−l = dl (i) − ω H 0 xl (i). (37) D , E[D(i + 1)] = diag{R1 , ..., RN } (38) If we define and take the expectation of (36), we arrive at   E{ε(i + 1)} = C TG I − M D E{ε(i)}. (39) Before we proceed, let us define X = I − M D and introduce Lemma 1: Lemma 1: Let C G and X denote arbitrary N M × N M mab l∈Ωk (i) X trices, where C G has real, non-negative entries, with columns = [ωl (i) + µl xl (i + 1)e∗l (i + 1)]ckl (i) adding up to one. Then, the matrix Y = C TG X is stable for b k (i) l∈Ω any choice of C G if and only if X is stable. X ∗ Proof : Assume that X is stable, it is true that for every = [ω0 + εl (i) + µl xl (i + 1)el (i + 1)]ckl (i) square matrix X and every α > 0, there exists a submultib k (i) l∈Ω plicative matrix norm || · ||τ that satisfies ||X||τ ≤ τ (X) + α, X X = ω 0 ckl + [εl (i) + µl xl (i + 1)e∗l (i + 1)]c where kl (i)the submultiplicative matrix norm ||AB|| ≤ ||A||·||B|| b k (i) b k (i) holds and τ (X) is the spectral radius of X [44], [45]. Since l∈Ω l∈Ω X X is stable, τ (X) < 1, and we can choose α > 0 such that subject to ckl (i) = 1 τ (X) + α = v < 1 and ||X||τ ≤ v < 1. Then we obtain [8] l X ||Y i ||τ = ||(C TG X)i ||τ = ω0 + [εl (i) + µl xl (i + 1)e∗l (i + 1)]ckl (i). b k (i) l∈Ω (29) ≤ ||(C TG )i ||τ · ||X i ||τ ≤v i (40) ||(C TG )i ||τ . Then, we have Since C TG has non–negative entries with columns that add up to one, it is element–wise bounded by unity. This means its εk (i + 1) = ω0 − ω 0 + [εl (i) + µl xl (i + 1)e∗l (i + 1)]ckl (i) Frobenius norm is bounded as well and by the equivalence of b k (i) l∈Ω X norms, so is any norm, in particular ||(C TG )i ||τ . As a result, = [εl (i) + µl xl (i + 1)e∗l (i + 1)]ckl (i). we have b k (i) l∈Ω lim ||Y i ||τ = 0, (41) i→∞ (30) where Y i converges to the zero matrix for large i. This By employing Assumption IV, we start with (30) for the ES– establishes the stability of (C TG X)i . LMS algorithm and define the global vectors and matrices: A square matrix X is stable if it satisfies X i → 0 as i → T ε(i + 1) , [ε1 (i + 1), · · · , εN (i + 1)] (31) ∞. In view of Lemma 1 and (82), we need the matrix I −M D to be stable. As a result, it requires I − µk Rk to be stable for M , diag{µ1 I M , ..., µN I M } (32) all k, which holds if the following condition is satisfied: X H D(i + 1) , diag{x1 (i + 1)xH 1 (i + 1), ..., xN (i + 1)xN (i + 1)} (33) and the N M × 1 vector g(i + 1) = [x1 (i + 1)n1 (i + 1), · · · , xN (i + 1)nN (i + 1)]T . (34) 0 < µk < 2 λmax Rk  (42)  where λmax Rk is the largest eigenvalue of the correlation matrix Rk . The difference between the ES–LMS and SI– LMS algorithms is the strategy to calculate the matrix C. 7 Lemma 1 indicates that for any choice of C, only X needs to be stable. As a result, SI–LMS has the same convergence condition as in (42). Given the convergence conditions, the proposed ES–LMS/ES–RLS and SI–LMS/SI–RLS algorithms will adapt according to the network connectivity by choosing the group of nodes with the best available performance to construct their estimates. Comparing the results in (42) with the existing algorithms, it can be seen that the proposed link selection techniques change the set of combining coefficients, which are indicated in C G , as the matrix C employs the b k (i). chosen set Ω = ek (i) = dk (i) − ωH k (i)xk (i) = dk (i) − [ω 0 − εk (i)]H xk (i) H = dk (i) − ωH 0 xk (i) + εk (i)xk (i) = e0−k + εH k (i)xk (i). With Assumption I, the MSE expression can be derived as 2 Jmse−k (i) = E[|ek (i)| ]    ∗  H = E e0−k + εH (i)x (i) e + x (i)ε (i) k k k 0 k H = Jmin−k + E[εH k (i)xk (i)xk (i)εk (i)] = Jmin−k + H tr{E[εk (i)εH k (i)xk (i)xk (i)]} H tr{E[xk (i)xk (i)]E[εk (i)εH k (i)]} = Jmin−k + = Jmin−k + tr{Rk (i)K k (i)}, (44) where tr(·) denotes the trace of a matrix and Jmin−k is the minimum mean–square error (MMSE) for node k [19]: −1 2 Jmin−k = σd,k − pH k (i)Rk (i)pk (i), (45) Rk (i) = E[xk (i)xH k (i)] is the correlation matrix of the inputs for node k, pk (i) = E[xk (i)d∗k (i)] is the cross–correlation vector between the inputs and the measurement dk (i), and K k (i) = E[εk (i)εH k (i)] is the weight–error correlation matrix. From [19], the EMSE is defined as the difference between the mean–square error at time instant i and the minimum mean– square error. Then, we can write Jex−k (i) = Jmse−k (i) − Jmin−k = tr{Rk (i)K k (i)}. (46) For the proposed adaptive link selection algorithms, we will derive the EMSE formulas separately based on (46) and we assume that the input signal is modeled as a stationary process. 1) ES–LMS: To update the estimate ω k (i), we employ X ω k (i + 1) = ckl (i)ψ l (i + 1) = b k (i) l∈Ω X b k (i) l∈Ω ckl (i)[ω l (i) + µl xl (i + 1)e∗l (i + 1)] − xH l (i + 1)ω l (i))]. (47) Then, subtracting ω 0 from both sides of (47), we arrive at X εk (i + 1) = ckl (i)[ωl (i) + µl xl (i + 1)(dl (i + 1) b k (i) l∈Ω = X b k (i) l∈Ω = X b k (i) l∈Ω (43) ckl (i)[ωl (i) + µl xl (i + 1)(dl (i + 1) b k (i) l∈Ω B. MSE Steady–State Analysis In this part of the analysis, we devise formulas to predict the excess MSE (EMSE) of the proposed algorithms. The error signal at node k can be expressed as X − xH l (i + 1)ω l (i))] − X ckl (i)ω 0 b k (i) l∈Ω  ckl (i) εl (i) + µl xl (i + 1) dl (i + 1) − xH l (i   + 1)(εl (i) + ω 0 )  ckl (i) εl (i) + µl xl (i + 1) dl (i + 1) − xH l (i xH l (i   + 1)εl (i) − + 1)ω0  X = ckl (i) εl (i) − µl xl (i + 1)xH l (i + 1)εl (i) b k (i) l∈Ω  + µl xl (i + 1)e∗0−l (i + 1)  X  = ckl (i) I − µl xl (i + 1)xH l (i + 1) εl (i) b k (i) l∈Ω  + µl xl (i + 1)e∗0−l (i + 1) . Let us introduce the random variables αkl (i):  b k (i) 1, if l ∈ Ω αkl (i) = 0, otherwise. (48) (49) At each time instant, each node will generate data associated with network covariance matrices Ak with size N × N which reflect the network topology, according to the exhaustive search strategy. In the network covariance matrices Ak , a value equal to 1 means nodes k and l are linked and a value 0 means nodes k and l are not linked. For example, suppose a network has 5 nodes. For node 3, there are two neighbor nodes, namely, nodes 2 and 5. Through Eq. (12), the possible configurations of set Ω3 are {3, 2}, {3, 5} and {3, 2, 5}. Evaluating all the possible sets for Ω3 , the relevant covariance matrices A3 with size 5 × 5 at time instant i are described in Table IV. Then, the coefficients αkl are obtained according to the covariance matrices Ak . In this example, the three sets of αkl are respectively shown in Table V. The parameters ckl will then be calculated through Eq. (4) for different choices of matrices Ak and coefficients αkl . After αkl and ckl are calculated, the error pattern for each possible Ωk will be calculated through (15) and the set with the smallest error will be selected according to (16). With the newly defined αkl , (48) can be rewritten as  X  εk (i + 1) = αkl (i)ckl (i) I − µl xl (i + 1)xH l (i + 1) εl (i) l∈Nk 8 TABLE IV C OVARIANCE MATRICES A3 FOR DIFFERENT SETS OF Ω3 (a) {3, 2} 2 3 4 0 1 0 1 1 0 0 0 1 1 2 3 4 5 (c) {3, 2, 5} 2 3 4 0 1 0 1 1 0 0 1 1 1 2 3 4 5 5 (b) {3, 5} 2 3 4 0 0 0 0 1 0 0 1 1 1 2 3 4 5 0 5 1 where Rl,q (i + 1) = E[xl (i + 1)xH q (i + 1)] and K l,q (i) = E[εl (i)εH q (i)]. To further simplify the analysis, we assume that the samples of the input signal xk (i) are uncorrelated, i.e., 2 2 Rk = σx,k I with σx,k being the variance. Using the diagonal 2 matrices Rk = Λk = σx,k I and Rl,q = Λl,q = σx,l σx,q I we can write  X    K k (i + 1) = E α2kl (i)c2kl (i) I − µl Λl K l (i) I − µl Λl l∈Nk  + µ2l e0−l (i + 1)e∗0−l (i + 1)Λl  X  + E αkl (i)αkq (i)ckl (i)ckq (i) 5 1 l,q∈Nk l6=q TABLE V C OEFFICIENTS αkl (a) {3, 2}  α31 = 0     α32 = 1 α33 = 1     α34 = 0 α35 = 0 FOR DIFFERENT SETS OF (b) {3, 5}  α31 = 0     α32 = 0 α33 = 1     α34 = 0 α35 = 1 × Ω3 l,q∈Nk l6=q  × I − µl Λl + µl µq e0−q (i + (50) Starting from (46), we then focus on K k (i + 1). K k (i + 1) = E[εk (i + 1)εH k (i + 1)]. (51) In (50), the term αkl (i) is determined through the network topology for each subset, while the term ckl (i) is calculated through the Metropolis rule. We assume that αkl (i) and ckl (i) are statistically independent from the other terms in (50). Upon convergence, the parameters αkl (i) and ckl (i) do not vary b k (i) for because at steady state the choice of the subset Ω each node k will be fixed. Then, under these assumptions, substituting (50) into (51) we arrive at:  X   K k (i + 1) = E α2kl (i)c2kl (i) I − µl Rl (i + 1) K l (i) l∈Nk l,q∈Nk l6=q   × I − µl Rl (i + 1) K l,q (i) I − µq Rl (i + 1)  + µl µq e0−l (i + 1)e∗0−q (i + 1)Rl,q (i + 1)  X  + E αkl (i)αkq (i)ckl (i)ckq (i) l,q∈Nk l6=q    I − µq Rq (i + 1) K H l,q (i) I − µl Rl (i + 1)  H ∗ + µl µq e0−q (i + 1)e0−l (i + 1)Rl,q (i + 1) (52) × 1)e∗0−l (i + 1)ΛH l,q  . (53) Due to the structure of the above equations, the approximations and the quantities involved, we can decouple (53) into  X    1 − µl λnl Kln (i) 1 − µl λnl Kkn (i + 1) = E α2kl (i)c2kl (i) l∈Nk  + µ2l e0−l (i + 1)e∗0−l (i + 1)λnl  X   n + (i) E αkl (i)αkq (i)ckl (i)ckq (i) 1 − µl λnl Kl,q l,q∈Nk l6=q × 1−  × I − µl Rl (i + 1) + µ2l e0−l (i + 1)e∗0−l (i + 1)   X  × Rl (i + 1) + E αkl (i)αkq (i)ckl (i)ckq (i)   I − µl Λl K l,q (i)   × I − µq Λq + µl µq e0−l (i + 1)e∗0−q (i + 1)Λl,q  X   + E αkl (i)αkq (i)ckl (i)ckq (i) I − µq Λq K H l,q (i) (c) {3, 2, 5}    α31 = 0   α32 = 1 α33 = 1     α34 = 0 α35 = 1  ∗ + µl xl (i + 1)e0−l (i + 1) .   1)e∗0−q (i 1)λnl,q  1)e∗0−l (i 1)λnl,q µq λnq  + µl µq e0−l (i + +   X  n H + ) (i) E αkl (i)αkq (i)ckl (i)ckq (i) 1 − µq λnq (Kl,q l,q∈Nk l6=q × 1− µl λnl + µl µq e0−q (i + +  , (54) where Kkn (i + 1) is the nth element of the main diagonal of K k (i + 1). With the assumption that αkl (i) and ckl (i) are statistically independent from the other terms in (50), we can rewrite (54) as    X  2 E α2kl (i) E c2kl (i) Kkn (i + 1) = 1 − µl λnl Kln (i) l∈Nk  + µ2l e0−l (i + 1)e∗0−l (i + 1)λnl    X   +2× E αkl (i)αkq (i) E ckl (i)ckq (i) 1 − µl λnl l,q∈Nk l6=q 9 TABLE VI C OVARIANCE MATRIX A3 UPON CONVERGENCE From [41], we employ the relation E[sign(ekl )] ≈ sign(e0−k ). According to Eqs. (1) and (37), when the proposed 1 2 3 4 5 algorithm converges at node k or the time instant i goes to 1 0 infinity, we assume that the error e0−k will be equal to the 2 1 noise variance at node k. Then, the asymptotic value hkl can 3 0 1 1 0 1 4 0 be divided into three situations due to the rule of the SI–LMS 5 1 algorithm:  sign(|e0−k |)   for the node with the largest MSE  ρε 1+ε|e0−k |  n ∗ n n sign(−|e |) 0−k . × 1 − µq λq Kl,q (i) + µl µq e0−l (i + 1)e0−q (i + 1)λh ρε 1+ε|e0−k | for the node with the smallest MSE l,qkl =   0 for all the remaining nodes. (55) (60) By taking i → ∞, we can obtain (56). It should be noticed Under this situation, after the time instant i goes to infinity, the that with the assumption that upon convergence the choice of parameters hkl for each neighbor node of node k can be obcovariance matrix Ak for node k is fixed, which means it is tained through (60) and the quantity hkl will be deterministic deterministic and does not vary. In the above example, we and can be taken out from the expectation. assume the choice of A3 is fixed as show in Table VI. At last, removing the random variables αkl (i) and inserting Then the coefficients αkl will also be fixed and given by (58), (59) into (56), the asymptotic values Kkn for the SI-LMS  algorithm are obtained as in (61). At this point, the theoretical α31 = 0    results are deterministic.  α32 = 1 Then, the MSE for SI–LMS algorithm is given by α33 = 1   α = 0  34 M  X 2 α35 = 1 Jmse−k = Jmin−k + M σx,k (62) Kkn (SI-LMS). n=1 as well as the parameters ckl that are computed using the Metropolis combining rule. As a result, the coefficients αkl 3) ES–RLS: For the proposed ES–RLS algorithm, we start and the coefficients ckl are deterministic and can be taken out from (10), after inserting (10) into (17), we have from the expectation. X ω k (i + 1) = ckl (i)ψ l (i + 1) The MSE is then given by Jmse−k = Jmin−k + 2 M σx,k M X Kkn (ES-LMS). (57) = n=1 2) SI–LMS: For the SI–LMS algorithm, we do not need to consider all possible combinations. This algorithm simply adjusts the combining coefficients for each node with its neighbors in order to select the neighbor nodes that yield the smallest MSE values. Thus, we redefine the combining coefficients through (27) ckl−new = ckl − ρε sign(|ekl |) (l ∈ Nk ). 1 + ε|ξmin | (58) For each node k, at time instant i, after it received the estimates from all its neighbors, it calculates the error pattern ekl (i) for every estimate received through Eq. (19) and find the nodes with the largest and smallest error. An error vector êk is then defined through (22), which contains all error pattern ekl (i) for node k. Then a procedure which is detailed after Eq. (22) is carried out and modifies the error vector êk . For example, suppose node 5 has three neighbor nodes, which are nodes 3, 6 and 8. The error vector ê5 has the form described by ê5 = [e53 , e55 , e56 , e58 ] = [0.023, 0.052, −0.0004, −0.012]. After the modification, the error vector ê5 will be edited as ê5 = [0, 0.052, −0.0004, 0]. The quantity hkl is then defined as sign(|ekl |) (l ∈ Nk ), (59) hkl = ρε 1 + ε|ξmin | and the term ’error pattern’ ekl in (59) is from the modified error vector êk . = b k (i) l∈Ω X b k (i) l∈Ω X ckl (i)[ω l (i) + kl (i + 1)e∗l (i + 1)] ckl (i)[ω l (i) + kl (i + 1)(dl (i + 1) b k (i) l∈Ω − xH l (i + 1)ω l (i))]. (63) Then, subtracting the ω 0 from both sides of (47), we arrive at X εk (i + 1) = ckl (i)[ω l (i) + kl (i + 1)(dl (i + 1) b k (i) l∈Ω = X b k (i) l∈Ω = X b k (i) l∈Ω − xH l (i + 1)ω l (i))] − X ckl (i)ω 0 b k (i) l∈Ω  ckl (i) εl (i) + kl (i + 1) dl (i + 1) − xH l (i  + 1)(εl (i) + ω0 )    ckl (i) I − kl (i + 1)xH l (i + 1) εl (i) + kl (i + 1)e∗0−l (i  + 1) . (64) Then, with the random variables αkl (i), (64) can be rewritten as  X  εk (i + 1) = αkl (i)ckl (i) I − kl (i + 1)xH l (i + 1) εl (i) l∈Nk 10 P l∈Nk Kkn (ES-LMS) = 1− P l∈Nk P l∈Nk Kkn (SI-LMS) = 1− P 2 α2kl c2kl (1 − µl λn l ) −2 (ckl − hkl )2 µ2l Jmin−l λn l +2 l∈Nk + kl (i + α2kl c2kl µ2l Jmin−l λn l +2 2 (ckl − hkl )2 (1 − µl λn l ) −2 1)e∗0−l (i  + 1) . (65) P l,q∈Nk l6=q P l,q∈Nk l6=q P l,q∈Nk l6=q P l,q∈Nk l6=q n αkl αkq ckl ckq µl µq e0−l e∗ 0−q λl,q n αkl αkq ckl ckq (1 − µl λn l )(1 − µq λq ) . (56) n (ckl − hkl )(ckq − hkq )µl µq e0−l e∗ 0−q λl,q n (ckl − hkl )(ckq − hkq )(1 − µl λn l )(1 − µq λq ) + X l,q∈Nk l6=q .   1− E αkl (i)αkq (i)ckl (i)ckq (i) (61) 1 2 i−M Since kl (i + 1) = Φ−1  l (i + 1)xl (i + 1) [19], we can modify λnl,q e0−q (i + 1)e∗0−l (i + 1) n H the (65) as × (Kl,q (i)) +  (i − M )2 λnq λnl X  −1 H (69) εk (i + 1) = αkl (i)ckl (i) I − Φl (i + 1)xl (i + 1)xl (i + 1) εl (i) n l∈Nk where Kk (i + 1) is the nth elements of the main diagonals  of K k (i + 1). With the assumption that, upon convergence, −1 ∗ + Φl (i + 1)xl (i + 1)e0−l (i + 1) . αkl and ckl do not vary, because at steady state, the choice b k (i) for each node k will be fixed, we can rewrite (66) of subset Ω (69) as (70). Then, the MSE is given by At this point, if we compare (66) with (50), we can find that the difference between (66) and (50) is, the Φ−1 l (i+1) in (66) has replaced the µl in (50). From [19], we also have 1 R−1 (i + 1) for i > M + 1. (67) i−M l As a result, we can arrive  X  Λ−1 Λl  K l (i) K k (i + 1) = E α2kl (i)c2kl (i) I− l i−M 2 Jmse−k (i + 1) = Jmin−k + M σx,k M X n=1 Kkn (i + 1)(ES-RLS). (71) On the basis of (70), we have that when i tends to infinity, the MSE approaches the MMSE in theory [19]. 4) SI–RLS: For the proposed SI–RLS algorithm, we insert (58) into (70), remove the random variables αkl (i), and following the same procedure as for the SI–LMS algorithm, l∈Nk wecan obtain (72), where hkl and hkq satisfy the rule in (60).  Λ−1 Λl Λ−1 Λl Λ−1 ∗ l l Then, the MSE is given by × I− + l e (i + 1)e (i + 1) 0−l 0−l i−M (i − M )2 M  X X  2  Λ−1 Kkn (i + 1)(SI-RLS). l Λl Jmse−k (i + 1) = Jmin−k + M σx,k + E αkl (i)αkq (i)ckl (i)ckq (i) I− i−M n=1 l,q∈Nk (73) l6=q In conclusion, according to (61) and (72), with the help of −1 Λ−1 Λq Λ−1 q  l Λl,q Λq modified combining coefficients, for the proposed SI–type + × K l,q (i) I − e0−l (i + 1) i−M (i − M )2   algorithms, the neighbor node with lowest MSE contributes X the most to the combination, while the neighbor node with ∗ × e0−q (i + 1) + E αkl (i)αkq (i)ckl (i)ckq (i) the highest MSE contributes the least. Therefore, the proposed l,q∈Nk SI–type algorithms perform better than the standard diffusion l6=q  algorithms with fixed combining coefficients. −1 −1 Λq Λq  H Λ Λl  K l,q (i) I − l × I− i−M i−M C. Tracking Analysis  −1 H −1 Λq Λl,q Λl In this section, we assess the proposed ES–LMS/RLS and e0−q (i + 1)e∗0−l (i + 1) . (68) + SI–LMS/RLS algorithms in a non–stationary environment, in (i − M )2 Due to the structure of the above equations, the approximations which the algorithms have to track the minimum point of the error–performance surface [46], [47]. In the time–varying and the quantities involved, we can decouple (68) into scenarios of interest, the optimum estimate is assumed to vary   X  1 2 according to the model ω 0 (i + 1) = βω 0 (i) + q(i), where Kln (i) Kkn (i + 1) = E α2kl (i)c2kl (i) 1− i−M q(i) denotes a random perturbation [44] and β = 1 in order to l∈Nk  facilitate the analysis. This is typical in the context of tracking e0−l (i + 1)e∗0−l (i + 1) analysis of adaptive algorithms [19], [48], [49]. + λnl (i − M )2 1) ES–LMS: For the tracking analysis of the ES–LMS  X  1 2algorithm, we employ Assumption III and start from (47). + E αkl (i)αkq (i)ckl (i)ckq (i) 1− i − M After subtracting the ω0 (i + 1) from both sides of (47), we l,q∈Nk obtain l6=q X  n ∗ λ e (i + 1)e (i + 1) εk (i + 1) = ckl (i)[ω l (i) + µl xl (i + 1)(dl (i + 1) 0−q l,q 0−l n × Kl,q (i) + b k (i) (i − M )2 λnl λnq l∈Ω E[Φ−1 l (i + 1)] = 11 + 1)(ES-RLS) = 1− 1−  2 P (ckl − hkl )2 1 − X 1 i−M − xH l (i + 1)ω l (i))] − b k (i) l∈Ω X b k (i) l∈Ω l,q∈Nk l6=q P −2 n (i − M)2 λn l λq  αkl αkq ckl ckq 1 − l,q∈Nk l6=q P ∗ λn l,q e0−l e0−q (ckl − hkl )(ckq − hkq ) l,q∈Nk l6=q −2 P 1 i−M (70) ∗ λn l,q e0−l e0−q n (i − M)2 λn l λq  (ckl − hkl )(ckq − hkq ) 1 − l,q∈Nk l6=q 2 . 1 i−M 2 . (72) INSTANT Adaptation Method LMS RLS Multiplications 8M + 2 4M 2 + 16M + 1 Additions 8M 4M 2 + 12M − 1 Divisions 1   TABLE VIII C OMPUTATIONAL COMPLEXITY FOR COMBINATION STEP PER NODE PER TIME ckl (i) ω 0 (i) + q(i) INSTANT  ckl (i) εl (i) + µl xl (i + 1) dl (i + 1) Algorithms ES–LMS/RLS   − q(i) − xH (i + 1)(ε (i) + ω ) l 0 l  X  = ckl (i) I − µl xl (i + 1)xH l (i + 1) εl (i) b k (i) l∈Ω αkl αkq ckl ckq TABLE VII ckl (i)[ω l (i) + µl xl (i + 1)(dl (i + 1) X P ckl (i)ω 0 (i + 1)COMPUTATIONAL COMPLEXITY FOR THE ADAPTATION STEP PER NODE PER TIME b k (i) l∈Ω X b k (i) l∈Ω = +2 (ckl − hkl )2 − xH l (i + 1)ω l (i))] − 1 i−M Jmin−l 2 λn l (i − M) P l∈Nk = 2 α2kl c2kl 1 − l∈Nk + 1)(SI-RLS) =  P l∈Nk Kkn (i +2 α2kl c2kl l∈Nk Kkn (i Jmin−l 2 λn l (i − M) P  + µl xl (i + 1)e∗0−l (i + 1) − q(i). SI–LMS/RLS Multiplications T! t!(T − t)! (2M + 3)|Nk | M(t + 1) Additions T! t!(T − t)! (M + 2)|Nk | Divisions Mt |Nk | 4) SI–RLS: We start from (73), and after a similar procedure to that of the SI–LMS algorithm, we have 2 Jmse−k (i + 1) = Jmin−k + M σx,k M X Kkn (i + 1)(SI-RLS) n=1 (74) Using Assumption III, we can arrive at 2 + M σx,k tr{Q}. (80) In conclusion, for time-varying scenarios there is only one 2 additional term M σx,k tr{Q} in the MSE expression for all algorithms, and this additional term has the same value for all algorithms. As a result, the proposed SI–type algorithms still perform better than the standard diffusion algorithms with fixed combining coefficients, according to the conclusion obtained in the previous subsection. Jex−k (i + 1) = tr{Rk (i + 1)K k (i + 1)} + tr{Rk (i + 1)Q}. (75) The first part on the right side of (75), has already been obtained in the MSE steady–state analysis part in Section IV B. The second part can be decomposed as       H D. Computational Complexity tr{Rk (i + 1)Q} = tr E xk (i + 1)xH (i + 1) E q(i)q (i) k In the analysis of the computational cost of the algorithms 2 = M σx,k tr{Q}. (76) studied, we assume complex-valued data and first analyze the adaptation step. For both ES–LMS/RLS and SI–LMS/RLS The MSE is then obtained as algorithms, the adaptation cost depends on the type of reM cursions (LMS or RLS) that each strategy employs. The X 2 2 Jmse−k = Jmin−k +M σx,k Kkn (ES-LMS)+M σx,k tr{Q}. details are shown in Table VII. For the combination step, n=1 we analyze the computational complexity in Table VIII. The (77) overall complexity for each algorithm is summarized in Table 2) SI–LMS: For the SI–LMS recursions, we follow the IX. In the above three tables, T is the total number of nodes same procedure as for the ES-LMS algorithm, and obtain linked to node k including node k itself and t is the number of M nodes chosen from T . The proposed algorithms require extra X 2 2 Jmse−k = Jmin−k +M σx,k Kkn (SI-LMS)+M σx,k tr{Q}. computations as compared to the existing distributed LMS and n=1 RLS algorithms. This extra cost ranges from a small additional (78) number of operations for the SI-LMS/RLS algorithms to a 3) ES–RLS: For the SI–RLS algorithm, we follow the same more significant extra cost that depends on T for the ESprocedure as for the ES–LMS algorithm and arrive at LMS/RLS algorithms. 2 Jmse−k (i + 1) = Jmin−k + M σx,k M X Kkn (i + 1)(ES-RLS) n=1 2 + M σx,k tr{Q}. (79) V. S IMULATIONS In this section, we investigate the performance of the proposed link selection strategies for distributed estimation 12 TABLE IX C OMPUTATIONAL Algorithm COMPLEXITY PER NODE PER TIME INSTANT Multiplications  (t + 1)T ! +8 M +2 t!(T − t)!   (t + 1)T ! + 16 M + 1 4M 2 + t!(T − t)! (8 + 2Nk )M + 3|Nk | + 2 2 4M + (16 + 2|Nk |)M + 3|Nk | + 1  ES–LMS ES–RLS SI–LMS SI–RLS Additions  T! +8 M (t − 1)!(T − t)!   T! 4M 2 + + 12 M − 1 (t − 1)!(T − t)! (8 + |Nk |)M + 2|Nk | 2 4M + (12 + |Nk |)M + 2|Nk | − 1 Divisions  20 1 |Nk | |Nk | + 1 −5 14 Diffusion LMS [2] Single−−Link Strategy [29] ES−−LMS SI−−LMS Diffusion RLS [28] ES−−RLS SI−−RLS MMSE Bound 12 11 18 −10 16 10 −15 4 14 18 20 12 MSE (dB) −20 10 9 15 7 8 19 −25 8 6 −30 13 4 3 6 17 −35 2 16 0 0 2 4 6 2 1 8 10 12 5 14 16 18 20 −40 0 Fig. 3. 80 160 240 320 400 480 560 640 720 800 Time, i Diffusion wireless sensor networks topology with 20 nodes Fig. 4. Network MSE curves in a static scenario in two scenarios: wireless sensor networks and smart grids. In these applications, we simulate the proposed link selection strategies in both static and time–varying scenarios. We also show the analytical results for the MSE steady–state and tracking performances that we obtained in Section IV. 0 Diffusion LMS [2] Single−−Link Strategy [29] ES−−LMS SI−−LMS Diffusion RLS [28] ES−−RLS SI−−RLS MMSE Bound −5 MSE (dB) −10 A. Diffusion Wireless Sensor Networks −15 −20 In this subsection, we compare the proposed ES–LMS/ES– RLS and SI–LMS/SI–RLS algorithms with the diffusion LMS algorithm [2], the diffusion RLS algorithm [50] and the single– link strategy [51] in terms of their MSE performance. The network topology is illustrated in Fig. 3 and we employ N = 20 nodes in the simulations. The length of the unknown parameter vector ω 0 is M = 10 and it is generated randomly. The input signal is generated as xk (i) = [xk (i) xk (i − 1) ... xk (i − M + 1)] and xk (i) = uk (i) + αk xk (i − 1), where αk is a correlation coefficient and uk (i) is a white noise process with 2 variance σu,k = 1 − |αk |2 , to ensure the variance of xk (i) is 2 σx,k = 1. The noise samples are modeled as circular Gaussian 2 noise with zero mean and variance σn,k = 0.001. The step size for the diffusion LMS ES–LMS and SI–LMS algorithms is µ = 0.045. For the diffusion RLS algorithm, both ES–RLS and SI–RLS, the forgetting factor λ is set to 0.97 and δ is equal to 0.81. In the static scenario, the sparsity parameters of the SI–LMS/SI–RLS algorithms are set to ρ = 4 × 10−3 and ε = 10. The Metropolis rule is used to calculate the combining coefficients ckl . The MSE and MMSE are defined as in (2) and (45), respectively. The results are averaged over 100 independent runs. In Fig. 4, we can see that ES–RLS has the best performance for both steady-state MSE and convergence rate, and obtains a gain of about 8 dB over the standard diffusion RLS algorithm. SI–RLS is a bit worse than the ES–RLS, but is still significantly better than the standard diffusion RLS algorithm by about 5 dB. Regarding the complexity and processing time, SI–RLS is as simple as the standard diffusion RLS algorithm, −25 −30 0 80 160 240 320 400 480 560 640 720 800 Time, i Fig. 5. Network MSE curves in a time-varying scenario while ES–RLS is more complex. The proposed ES–LMS and SI–LMS algorithms are superior to the standard diffusion LMS algorithm. In the time–varying scenario, the sparsity parameters of the SI–LMS and SI–RLS algorithms are set to ρ = 6 × 10−3 and ε = 10. The unknown parameter vector ω 0 varies according to the first–order Markov vector process: ω0 (i + 1) = βω 0 (i) + z(i), (81) where z(i) is an independent zero–mean Gaussian vector process with variance σz2 = 0.01 and β = 0.98. Fig. 5 shows that, similarly to the static scenario, ES–RLS has the best performance, and obtains a 5 dB gain over the standard diffusion RLS algorithm. SI–RLS is slightly worse than the ES–RLS, but is still better than the standard diffusion RLS algorithm by about 3 dB. The proposed ES–LMS and SI– LMS algorithms have the same advantage over the standard diffusion LMS algorithm in the time-varying scenario. Notice that in the scenario with large |Nk |, the proposed SI-type algorithms still have a better performance when compared with the standard techniques. To illustrate the link selection for the ES–type algorithms, we provide Figs. 6 and 7. From these two figures, we can see that upon convergence the proposed 13 Link selection state for Node 16 with ES−−LMS algorithm static scenarios {11, 15, 18, 20} −10 b) SI−LMS, N=20 nodes, µ=0.045, ρ=4*10e−3, ε=10 0 Simulation Theory a) ES−LMS, N=20 nodes, µ=0.045 −5 Simulation Theory −5 −5 −10 −15 −10 −15 {12,15,17,18} {11,12,14,15,18,20} −30 {11,12,14,15,18,20} −20 MSE (dB) −25 MSE (dB) MSE (dB) −15 −20 −25 −20 −25 −35 −30 −40 0 Fig. 6. 80 160 240 320 400 Time, i 480 560 640 −30 720 −35 Set of selected links for node 16 with ES–LMS in a static scenario −35 Link selection state for Node 16 with ES−LMS algorithm time−−varying scenarios 0 −40 0 {12,14,17} 10 20 SNR (dB) −40 0 30 10 20 SNR (dB) 30 −5 Fig. 8. MSE (dB) −10 MSE performance against SNR for ES–LMS and SI–LMS a) ES−RLS, N=20 nodes, λ=0.97, δ=0.811 0 Simulation Theory −15 {11,12,17,18} b) SI−RLS, N=20 nodes, λ=0.97, δ=0.811, ρ=4*10e−3, ε=10 −5 −5 Simulation Theory −10 −20 {11,12,14,17,18,20} {11,12,14,17,18,20} −10 −15 −25 160 240 320 400 Time, i 480 560 640 720 Fig. 7. Link selection state for node 16 with ES–LMS in a time-varying scenario bk. algorithms converge to a fixed selected set of links Ω B. MSE Analytical Results The aim of this section is to validate the analytical results obtained in Section IV. First, we verify the MSE steady–state performance. Specifically, we compare the analytical results in (57), (62), (71) and (73) to the results obtained by simulations under different SNR values. The SNR indicates the signal variance to noise variance ratio. We assess the MSE against the SNR, as show in Figs. 8 and 9. For ES–RLS and SI– RLS algorithms, we use (71) and (73) to compute the MSE after convergence. The results show that the analytical curves coincide with those obtained by simulations and are within 0.01 dB of each other, which indicates the validity of the analysis. We have assessed the proposed algorithms with SNR equal to 0dB, 10dB, 20dB and 30dB, respectively, with 20 nodes in the network. For the other parameters, we follow the same definitions used to obtain the network MSE curves in a static scenario. The details have been shown on the top of each sub figure in Figs. 8 and 9. The theoretical curves for ES–LMS/RLS and SI–LMS/RLS are all close to the simulation curves and remain within 0.01 dB of one another. The tracking analysis of the proposed algorithms in a time– varying scenario is discussed as follows. Here, we verify that the results (77), (78), (79) and (80) of the subsection on the tracking analysis can provide a means of estimating the MSE (dB) 80 MSE (dB) −15 −30 0 −20 −20 −25 −25 −30 −30 −35 −35 −40 0 Fig. 9. 10 20 SNR (dB) 30 −40 0 10 20 SNR (dB) 30 MSE performance against SNR for ES–RLS and SI–RLS MSE. We consider the same model as in (81). In the next examples, we employ N = 20 nodes in the network and the same parameters used to obtain the network MSE curves in a time–varying scenario. A comparison of the curves obtained by simulations and by the analytical formulas is shown in Figs. 10 and 11. From these curves, we can verify that the gap between the simulation and analysis results are within 0.02dB under different SNR values. The details of the parameters are shown on the top of each sub figure in Figs. 10 and 11. C. Smart Grids The proposed algorithms provide a cost–effective tool that could be used for distributed state estimation in smart grid applications. In order to test the proposed algorithms in a possible smart grid scenario, we consider the IEEE 14–bus system [52], where 14 is the number of substations. At every 14 a) ES−LMS, N=20 nodes, µ=0.045 0 Simulation Theory b) SI−LMS, N=20 nodes, µ=0.045, ρ=6*10e−3, ε=10 0 Simulation Theory −5 −5 where xk (i) is the measurement Jacobian vector for bus k. Then, the aim of the distributed estimation algorithm is to compute an estimate of ω 0 , which can minimize the cost function given by 2 Jω k (i) (ωk (i)) = E|dk (i) − xH k (i)ω k (i)| . We compare the proposed algorithms with the M–CSE algorithm [4], the single link strategy [51], the standard diffusion RLS algorithm [50] and the standard diffusion LMS algorithm [2] in terms of MSE performance and the Phase Angle Gap. The MSE comparison is used to determine the accuracy of the algorithms, and the Phase Angle Gap is used to compare the rate of convergence. In our scenario, ’Phase Angle Gap’ refers to the phase angle difference between the actual parameter vector or target ω 0 and the estimate ωk (i) for all buses. We define the IEEE–14 bus system as in Fig. 12. −10 MSE (dB) MSE (dB) −10 −15 −15 −20 −20 −25 −25 (84) 13 −30 0 10 20 SNR (dB) −30 0 30 14 12 10 20 SNR (dB) 30 10 Fig. 10. MSE performance against SNR for ES–LMS and SI–LMS in a time-varying scenario 11 6 9 a) ES−RLS, N=20 nodes, λ=0.97, δ=0.811 −5 Simulation Theory 8 b) SI−RLS, N=20 nodes, λ=0.97, δ=0.811, ρ=6*10e−3, ε=10 0 Simulation Theory 7 1 5 4 3 2 −10 −5 Fig. 12. −20 −15 −25 −20 −30 −25 −35 0 All buses are corrupted by additive white Gaussian noise with equal variance σ 2 = 0.001. The step size for the standard diffusion LMS [2], the proposed ES–LMS and SI– LMS algorithms is 0.018. The parameter vector ω0 is set to an all–one vector. For the diffusion RLS, ES–RLS and SI– RLS algorithms the forgetting factor λ is set to 0.945 and δ is equal to 0.001. The sparsity parameters of the SI–LMS/RLS algorithms are set to ρ = 0.07 and ε = 10. The results are averaged over 100 independent runs. We simulate the proposed algorithms for smart grids under a static scenario. −10 MSE (dB) MSE (dB) −15 10 20 SNR (dB) 30 −30 0 IEEE 14–bus system for simulation 0 10 20 SNR (dB) Diffusion RLS[28] SI−−RLS Diffusion LMS[2] SI−−LMS M−CSE[4] ES−−LMS Single−−Link Strategy[29] ES−−RLS MMSE Bound 30 −5 Fig. 11. MSE performance against SNR for ES–RLS and SI–RLS in a time-varying scenario −10 time instant i, each bus k, k = 1, 2, . . . , 14, takes a scalar measurement dk (i) according to  dk (i) = Xk ω 0 (i) + nk (i), k = 1, 2, . . . , 14, (82) where ω0 (i) is the state vector of the entire interconnected system, Xk (ω 0 (i)) is a nonlinear measurement function of bus k. The quantity nk (i) is the measurement error with mean equal to zero and which corresponds to bus k. Initially, we focus on the linearized DC state estimation problem. The system is built with 1.0 per unit (p.u) voltage magnitudes at all buses and j1.0 p.u. branch impedance. Then, the state vector ω 0 (i) is taken as the voltage phase angle vector ω 0 for all buses. Therefore, the nonlinear measurement model for state estimation (82) is approximated by dk (i) = xH k (i)ω 0 + nk (i), k = 1, 2, . . . , 14, (83) MSE(dB) −15 −20 −25 −30 −35 −40 0 100 200 300 400 500 600 700 800 900 Time, i Fig. 13. MSE performance curves for smart grids. From Fig. 13, it can be seen that ES–RLS has the best performance, and significantly outperforms the standard diffusion LMS [2] and the M–CSE [4] algorithms. The ES–LMS is slightly worse than ES–RLS, which outperforms the remaining techniques. SI–RLS is worse than ES–LMS but is still better 15 than SI–LMS, while SI–LMS remains better than the diffusion RLS, LMS, M–CSE algorithms and the single link strategy. Phase Angle Gap Comparision For Bus 5 0 −0.1 Phase Angle Gap −0.2 −0.3 Diffusion RLS[28] SI−−RLS Diffusion LMS[2] SI−−LMS M−−CSE[4] ES−−LMS Single Link Strategy[29] ES−−RLS −0.4 −0.5 0 10 20 30 40 50 60 70 80 90 Time,i Fig. 14. Phase Angle Gap comparison for Bus 5. In order to compare the convergence rate, we employ the ’Phase Angle Gap’ to describe the results. We choose bus 5 and the first 90 iterations as an example to illustrate our results. In Fig. 14, ES–RLS has the fastest convergence rate, while SI– LMS is the second fastest, followed by the standard diffusion RLS, ES–LMS, SI–LMS, and the standard diffusion LMS algorithms. The M–CSE algorithm and the single link strategy have the worst performance. The estimates ω k (i) obtained by the proposed algorithms quickly reach the target ω 0 , which means the Phase Angle Gap will converge to zero. VI. C ONCLUSIONS In this paper, we have proposed ES–LMS/RLS and SI– LMS/RLS algorithms for distributed estimation in applications such as wireless sensor networks and smart grids. We have compared the proposed algorithms with existing methods. We have also devised analytical expressions to predict their MSE steady–state performance and tracking behavior. Simulation experiments have been conducted to verify the analytical results and illustrate that the proposed algorithms significantly outperform the existing strategies, in both static and time– varying scenarios, in examples of wireless sensor networks and smart grids. VII. ACKNOWLEDGEMENTS The authors wish to thank the anonymous reviewers, whose comments and suggestions have greatly improved the presentation of these results. R EFERENCES [1] C. G. Lopes and A. H. Sayed, “Incremental adaptive strategies over distributed networks,” IEEE Trans. Signal Process., vol. 48, no. 8, pp. 223–229, Aug 2007. [2] ——, “Diffusion least-mean squares over adaptive networks: Formulation and performance analysis,” IEEE Trans. Signal Process., vol. 56, no. 7, pp. 3122–3136, July 2008. [3] Y. Chen, Y. Gu, and A. Hero, “Sparse LMS for system identification,” Proc. IEEE ICASSP, pp. 3125–3128, Taipei, Taiwan, May 2009. [4] L. Xie, D.-H. Choi, S. Kar, and H. V. Poor, “Fully distributed state estimation for wide-area monitoring systems,” IEEE Trans. Smart Grid, vol. 3, no. 3, pp. 1154–1169, September 2012. [5] D. Bertsekas, “A new class of incremental gradient methods for least squares problems,” SIAM J. Optim, vol. 7, no. 4, p. 913926, 1997. [6] A. Nedic and D. Bertsekas, “Incremental subgradient methods for nondifferentiable optimization,” SIAM J. Optim, vol. 12, no. 1, p. 109138, 2001. [7] M. G. Rabbat and R. D. Nowak, “Quantized incremental algorithms for distributed optimization,” IEEE J. Sel. Areas Commun, vol. 23, no. 4, p. 798808, Apr 2005. [8] F. S. Cattivelli and A. H. Sayed, “Diffusion lms strategies for distributed estimation,” IEEE Trans. Signal Process., vol. 58, p. 10351048, March 2010. [9] P. D. Lorenzo, S. Barbarossa, and A. H. Sayed, “Sparse diffusion LMS for distributed adaptive estimation,” Proc. IEEE International Conference on Acoustics, Speech, and Signal Processing, pp. 3281– 3284, Kyoto, Japan, March 2012. [10] S. Xu, R. C. de Lamare, and H. V. Poor, “Distributed compressed estimation based on compressive sensing,” IEEE Signal Processing Letters, vol. 22, no. 9, pp. 1311–1315, Sept 2015. [11] ——, “Adaptive link selection algorithms for distributed estimation,” EURASIP Journal on Advances in Signal Processing, vol. 2015, no. 1, pp. 1–22, October 2015. [12] C. Lopes and A. Sayed, “Diffusion adaptive networks with changing topologies,” in Proc. IEEE International Conference on Acoustics, Speech and Signal Processing, Las Vegas, 2008, pp. 3285–3288. [13] B. Fadlallah and J. Principe, “Diffusion least-mean squares over adaptive networks with dynamic topologies,” in Proc. IEEE International Joint Conference on Neural Networks, Dallas, TX, USA 2013. [14] T. Wimalajeewa and S. Jayaweera, “Distributed node selection for sequential estimation over noisy communication channels,” IEEE Trans. Wirel. Commun., vol. 9, no. 7, pp. 2290–2301, July 2010. [15] R. C. de Lamare and R. Sampaio-Neto, “Adaptive reduced-rank processing based on joint and iterative interpolation, decimation and filtering,” IEEE Trans. Signal Process., vol. 57, no. 7, pp. 2503–2514, July 2009. [16] R. C. de Lamare and P. S. R. Diniz, “Set-membership adaptive algorithms based on time-varying error bounds for CDMA interference suppression,” IEEE Trans. Vehi. Techn., vol. 58, no. 2, pp. 644–654, February 2009. [17] L. Guo and Y. F. Huang, “Frequency-domain set-membership filtering and its applications,” IEEE Trans. Signal Process., vol. 55, no. 4, pp. 1326–1338, April 2007. [18] A. Bertrand and M. Moonen, “Distributed adaptive node–specific signal estimation in fully connected sensor networks–part II: Simultaneous and asynchronous node updating,” IEEE Trans. Signal Process., vol. 58, no. 10, pp. 5292–5306, 2010. [19] S. Haykin, Adaptive Filter Theory, 4th ed. Upper Saddle River, NJ, USA: Prentice Hall, 2002. [20] L. Li and J. A. Chambers, “Distributed adaptive estimation based on the APA algorithm over diffusion networks with changing topology,” in Proc. IEEE Statist. Signal Process. Workshop, pp. 757–760, Cardiff, Wales, September 2009. [21] X. Zhao and A. H. Sayed, “Performance limits for distributed estimation over lms adaptive networks,” IEEE Trans. Signal Process., vol. 60, no. 10, pp. 5107–5124, October 2012. [22] L. Xiao and S. Boyd, “Fast linear iterations for distributed averaging,” Syst. Control Lett., vol. 53, no. 1, pp. 65–78, September 2004. [23] R. Olfati-Saber and R. M. Murray, “Consensus problems in networks of agents with switching topology and time-delays,” IEEE Trans. Autom. Control., vol. 49, pp. 1520–1533, September 2004. [24] A. Jadbabaie, J. Lin, and A. S. Morse, “Coordination of groups of mobile autonomous agents using nearest neighbor rules,” IEEE Trans. Autom. Control, vol. 48, no. 6, pp. 988–1001, June 2003. [25] R. C. de Lamare and R. C. de Lamare, “Adaptive reduced-rank mmse filtering with interpolated fir filters and adaptive interpolators,” IEEE Signal Processing Letters, vol. 12, no. 3, March 2005. [26] R. Meng, R. C. de Lamare, and V. H. Nascimento, “Sparsity-aware affine projection adaptive algorithms for system identification,” in Proc. Sensor Signal Processing for Defence Conference, London, UK, 2011. [27] Z. Yang, R. de Lamare, and X. Li, “Sparsity-aware space-time adaptive processing algorithms with l1-norm regularisation for airborne radar,” Signal Processing, IET, vol. 6, no. 5, pp. 413–423, July 2012. [28] ——, “L1-regularized stap algorithms with a generalized sidelobe canceler architecture for airborne radar,” Signal Processing, IEEE Transactions on, vol. 60, no. 2, pp. 674–686, Feb 2012. [29] R. C. de Lamare and R. C. de Lamare, “Sparsity-aware adaptive algorithms based on alternating optimization and shrinkage,” IEEE Signal Processing Letters, vol. 21, no. 2, pp. 225–229, January 2014. 16 [30] R. C. de Lamare and R. Sampaio-Neto, “Reduced–rank adaptive filtering based on joint iterative optimization of adaptive filters,” IEEE Signal Process. Lett., vol. 14, no. 12, pp. 980–983, December 2007. [31] ——, “Reduced-rank space–time adaptive interference suppression with joint iterative least squares algorithms for spread-spectrum systems,” IEEE Transactions Vehicular Technology, vol. 59, no. 3, pp. 1217–1228, March 2010. [32] ——, “Adaptive reduced-rank equalization algorithms based on alternating optimization design techniques for MIMO systems,” IEEE Transactions on Vehicular Technology, vol. 60, no. 6, pp. 2482–2494, July 2011. [33] ——, “Adaptive reduced-rank processing based on joint and iterative interpolation, decimation, and filtering,” IEEE Transactions on Signal Processing, vol. 57, no. 7, pp. 2503–2514, July 2009. [34] R. Fa, R. C. de Lamare, and L. Wang, “Reduced-rank stap schemes for airborne radar based on switched joint interpolation, decimation and filtering algorithm,” IEEE Transactions on Signal Processing, vol. 58, no. 8, pp. 4182–4194, August 2010. [35] S. Li, R. C. de Lamare, and R. Fa, “Reduced-rank linear interference suppression for ds-uwb systems based on switched approximations of adaptive basis functions,” IEEE Transactions on Vehicular Technology, vol. 60, no. 2, pp. 485–497, Feb 2011. [36] R. C. de Lamare, R. Sampaio-Neto, and M. Haardt, “Blind adaptive constrained constant-modulus reduced-rank interference suppression algorithms based on interpolation and switched decimation,” IEEE Transactions on Signal Processing, vol. 59, no. 2, pp. 681–695, Feb 2011. [37] M. L. Honig and J. S. Goldstein, “Adaptive reduced-rank interference suppression based on the multistage wiener filter,” IEEE Transactions on Communications, vol. 50, no. 6, June 2002. [38] R. C. de Lamare, M. Haardt, and R. Sampaio-Neto, “Blind adaptive constrained reduced-rank parameter estimation based on constant modulus design for cdma interference suppression,” IEEE Transactions on Signal Processing, vol. 56, no. 6, June 2008. [39] N. Song, R. C. de Lamare, M. Haardt, and M. Wolf, “Adaptive widely linear reduced-rank interference suppression based on the multi-stage wiener filter,” IEEE Transactions on Signal Processing, vol. 60, no. 8, August 2012. [40] H. Ruan and R. de Lamare, “Robust adaptive beamforming using a low-complexity shrinkage-based mismatch estimation algorithm,” Signal Processing Letters, IEEE, vol. 21, no. 1, pp. 60–64, Jan 2014. [41] Y. Chen, Y. Gu, and A. Hero, “Regularized least-mean-square algorithms,” Technical Report for AFOSR, December 2010. [42] S. Xu and R. C. de Lamare, “Distributed conjugate gradient strategies for distributed estimation over sensor networks,” in Proc. Sensor Signal Processing for Defence 2012, London, UK, 2012. [43] F. Cattivelli and A. H. Sayed, “Diffusion strategies for distributed kalman filtering and smoothing,” IEEE Trans. Autom. Control, vol. 55, no. 9, pp. 2069–2084, September 2010. [44] A. H. Sayed, Fundamentals of Adaptive Filtering. Hoboken, NJ, USA: John Wiley&Sons, 2003. [45] T. Kailath, A. H. Sayed, and B. Hassibi, Linear Estimation. Englewood Cliffs, NJ, USA: Prentice-Hall, 2000. [46] R. C. de Lamare and P. S. R. Diniz, “Blind adaptive interference suppression based on set-membership constrained constant-modulus algorithms with dynamic bounds,” IEEE Trans. Signal Process., vol. 61, no. 5, pp. 1288–1301, March 2013. [47] Y. Cai and R. C. de Lamare, “Low–complexity variable step-size mechanism for code-constrained constant modulus stochastic gradient algorithms applied to cdma interference suppression,” IEEE Trans. Signal Process., vol. 57, no. 1, pp. 313–323, January 2009. [48] B. Widrow and S. D. Stearns, Adaptive Signal Processing. Englewood Cliffs, NJ, USA: Prentice-Hall, 1985. [49] E. Eweda, “Comparison of RLS, LMS, and sign algorithms for tracking randomly time-varying channels,” IEEE Trans. Signal Process., vol. 42, p. 29372944, November 1994. [50] F. Cattivelli, C. Lopes, and A. Sayed, “Diffusion recursive least-squares for distributed estimation over adaptive networks,” IEEE Trans. Signal Process., vol. 56, no. 5, pp. 1865–1877, May 2008. [51] X. Zhao and A. H. Sayed, “Single-link diffusion strategies over adaptive networks,” in Proc. IEEE International Conference on Acoustics, Speech and Signal Processing, pp. 3749–3752, Kyoto, Japan, March 2012. [52] A. Bose, “Smart transmission grid applications and their supporting infrastructure,” IEEE Trans. Smart Grid, vol. 1, no. 1, pp. 11–19, Jun 2010.
3cs.SY
arXiv:1704.07106v4 [math.AC] 18 Dec 2017 COHEN–MACAULAY BINOMIAL EDGE IDEALS OF CACTUS GRAPHS GIANCARLO RINALDO Abstract. We classify the Cohen-Macaulay binomial edge ideals of cactus and bicyclic graphs. Introduction In 2010, binomial edge ideals were introduced in [6] and appeared independently also in [8]. Let S = K[x1 , . . . , xn , y1 , . . . , yn ] be the polynomial ring in 2n variables with coefficients in a field K. Let G be a graph on vertex set [n] and edges E(G). For each {i, j} ∈ E(G) with i < j, we associate a binomial fij = xi yj − xj yi . The ideal J(G) of S generated by fij = xi yj − xj yi such that i < j , is called the binomial edge ideal of G. Any ideal generated by a set of 2-minors of a 2 × n-matrix of indeterminates may be viewed as the binomial edge ideal of a graph. Algebraic properties of binomial edge ideals in terms of properties of the underlying graph were studied in [6], [4] and [9]. In [4] and [9] the authors considered the Cohen-Macaulay property of these graphs. Recently nice results on Cohen-Macaulay bipartite graphs and blocks have been obtained (see [7], [2] and [1]). However, the classification of Cohen-Macaulay binomial edge ideals in terms of the underlying graphs is still widely open and, as in the case of monomial edge ideals introduced in [11], it seems rather hopeless to give a full classification. The aim of this paper is to extend the results of [10] where we classify Cohen-Macaulay and unmixed binomial edge ideals J(G) with deviation, namely the difference between the minimum number of the generators and the height of J(G), less than or equal to 1. This invariant has an interesting combinatorial interpretation: if J(G) is unmixed than its deviation is |E(G)| − n + c where c is the number of connected components of G (see Remark 2.1 of [10]). Hence deviation represents the minimum number of edges that must be removed from the graph to break all its cycles making it into a forest (see Chapter 4 of [5]). In section 2 we give a classification Cohen-Macaulay and unmixed binomial edge ideals J(G) when G is a cactus graph, a graph whose blocks are cycles. This is a natural extension to the result obtained in [10] and useful to study binomial edge ideals by the deviation invariant. 1 2 GIANCARLO RINALDO In section 3 as an application of the results obtained in section 2 we classify the Cohen-Macaulay and unmixed binomial edge ideals J(G) when G is a bicyclic graph, that is the case of deviation 2. 1. Preliminaries In this section we recall some concepts and notation on graphs and on simplicial complexes that we will use in the article. Let G be a simple graph with vertex set V (G) and edge set E(G). A subset C of V (G) is called a clique of G if for all i and j belonging to C with i 6= j one has {i, j} ∈ E(G). A vertex of a graph is called a cutpoint if the removal of the vertex increases the number of connected components. A connected subgraph of G that has no cutpoint and is maximal with respect to this property is a block. A block graph B(G) is a graph whose vertices are the blocks of G and two vertices are adjacent whenever the corresponding blocks contain a common cutpoint of G. A connected graph is a cactus if its blocks are cycles or edges. Set V = {x1 , . . . , xn }. A simplicial complex ∆ on the vertex set V is a collection of subsets of V such that: (i) {xi } ∈ ∆ for all xi ∈ V ; (ii) F ∈ ∆ and G ⊆ F imply G ∈ ∆. An element F ∈ ∆ is called a face of ∆. A maximal face of ∆ with respect to inclusion is called a facet of ∆. A vertex i of ∆ is called a free vertex of ∆ if i belongs to exactly one facet. The clique complex ∆(G) of G is the simplicial complex whose faces are the cliques of G. Hence a vertex v of a graph G is called free vertex if it belongs to only one clique of ∆(G). We need notation and results from [6] (section 3) that we recall for the sake of completeness. Let T ⊆ [n], and let T = [n] \ T . Let G1 , . . . , Gc(T ) be the connected components of the induced subgraph on T , namely GT . For ei the complete graph on the vertex set V (Gi ). We set each Gi , denote by G [ e1 ), . . . , J(G ec(T ) )), (1) PT (G) = ( {xi , yi }, J(G i∈T PT (G) is a prime ideal. Then J(G) is a radical ideal and \ J(G) = PT (G) T ⊂[n] is its primary decomposition (see Corollary 2.2 and Theorem 3.2 of [6]). If there is no possible confusion, we write simply PT instead of PT (G). Moreover, height PT = n + |T | − c(T ) (see [6, Lemma 3.1]). We denote by M(G) the set of minimal prime ideals of J(G). If each i ∈ T is a cutpoint of the graph GT ∪{i} , then we say that T is a cutset for G. We denote by C(G) the set of all cutsets for G. Lemma 1.1. [6] PT (G) ∈ M(G) if and only if T ∈ C(G). Lemma 1.2. [9] Let G be a connected graph. Then J(G) is unmixed if and only if for all T ∈ C(G) we have c(T ) = |T | + 1. COHEN–MACAULAY BINOMIAL EDGE IDEALS OF CACTUS GRAPHS 3 The following observation gives motivation to consider the block graphs in this context. Proposition 1.3. Let J(G) be unmixed. Then the block graph B(G) is a tree. Proof. By Theorem 3.5 of [5] each block of the block graph is a complete graph. We recall that two vertices in B(G) are adjacent when the corresponding blocks contain a common cutpoint of G. Moreover for each cutpoint v, {v} ∈ C(G). By Lemma 1.2 the assertion follows.  We observe the following (see also Remark 3.1.(i) of [2]) Proposition 1.4. Let v be a vertex of G with neighbor set N (v) = {u ∈ V (G) | {u, v} ∈ E(G)} and let Gv the graph such that V (Gv ) = V (G) and E(Gv ) = E(G) ∪ {{u1 , u2 } | u1 6= u2 , u1 , u2 ∈ N (v)}. Then C(Gv ) = {T ∈ C(G) | v 6∈ T }. Proof. If v is a free vertex then E(G) = E(Gv ). In fact by definition there is only one clique containing v, that is all vertices adjacent to v are adjacent to each other. Hence we assume v is not a free vertex in G. By definition of the graph Gv v is a free vertex of Gv . This implies by Proposition 1.1 of [9] that there are no cutsets of Gv containing v. Let S ⊂ V (G) such that v ∈ / S, and let G1 , . . . , Gc1 be the connected components of the graph GS , with v ∈ V (G1 ). Each {v, u} ∈ E(G) either intersects S, hence is not in E(GS ), or is an edge of G1 since it is connected through v in G1 . In the same way, let H = Gv and let H1 , . . . , Hc2 be the connected components of the graph HS , with v ∈ V (H1 ). Each {v, u} ∈ E(H) and each {u1 , u2 } ∈ E(H) with u1 , u2 ∈ N (v) either intersects S or is an edge of H1 . This implies that Hi = Gi for i = 2, . . . , c1 and c1 = c2 . Moreover (2) V (Gi ) = V (Hi ), ∀i = 1, . . . , c1 . In particular this is true for all the cutsets. That is for all T ∈ C(G) then i ∈ T is a cutpoint of the graph GT ∪{i} , and the number of connected components decreases when S = T \ {i}. The same happens for H, hence T ∈ C(H). The same argument works in the other direction.  Corollary 1.5. Let v be a vertex of G that is not free vertex and let Gv 6 the graph such that V (Gv ) = V (G) and E(Gv ) = E(G) ∪ {{u1 , u2 } | u1 = u2 , u1 , u2 ∈ N (v)}. Then with Qv = T J(G) = J(Gv ) ∩ Qv T ∈C(G),v∈T PT (G). 4 GIANCARLO RINALDO Proof. Let v ∈ V (G) then J(G) = Qv ∩ Qv with \ Qv = PT (G), Qv = T ∈C(G),v∈T \ PT (G). T ∈C(G),v∈T / Applying Proposition 1.4, we have that the cutsets in C(Gv ) are exactly the cutsets in C(G) not containing v. Moreover the connected components induced by any T in G and in Gv have the same set of vertices as stated in the proof of Proposition 1.4 (see (2)). Using the notation introduced in the ei = G ei for each connected component, that is mentioned proof H J(Gv ) = Qv .  Example 1.6. Sometime the ideal Qv in Corollary 1.5 has a natural interpretation. For example let G = C4 with vertices V (C4 ) = {1, . . . , 4} and edges {{1, 2}, {2, 3}, {3, 4}, {1, 4}}. Then we obtain (3) J(G) = J(G1̄ ) ∩ Q1 = J(D) ∩ (x1 , y1 , x3 , y3 ) where D, known as diamond graph, has V (D) = V (C4 ) and E(D) = E(C4 )∪ {{2, 4}} and the ring S/Qv is related to the isolated vertex 2 and 4. By similar argument we obtain (4) J(D) = J(D2̄ ) ∩ Q2 = J(K4 ) ∩ (x2 , y2 , x4 , y4 ) where K4 is the complete graph with 4 vertices. If G = C5 such an interpretation fails. Let V (C5 ) = {1, . . . , 5} and edges {{1, 2}, {2, 3}, {3, 4}, {4, 5}, {1, 5}}. If we consider J(G) = J(G1̄ ) ∩ Q1 , then G1̄ is the graph obtained adding the edge {2, 5} to the cycle C5 , as expected by Corollary 1.5, but Q1 = (x1 , y1 , f2,3 , f4,5 , x3 x4 , x3 y4 , y3 x4 , y3 y4 ). Passing from a block that is not complete to a complete one (see (3),(4) in Example 1.6 and Figure 2), is useful for our aim thanks to the following nice result (see Theorem 1.1 of [4]) that we state using our notation Theorem 1.7. Let G be a graph whose blocks are complete graphs. The following conditions are equivalent: (1) J(G) is Cohen-Macaulay; (2) J(G) is unmixed; (3) B(G) is a tree. 2. Classification of Cohen-Macaulay cactus graphs In this section we provide a classification of Cohen-Macaulay binomial edge ideal J(G) when G is a cactus graphs. Since a binomial edge ideal J(G) is Cohen–Macaulay (resp. unmixed) if and only if J(H) is Cohen–Macaulay (resp. unmixed) for each connected component H of G, we assume from now on that the graph G is connected unless otherwise stated. We start by the following COHEN–MACAULAY BINOMIAL EDGE IDEALS OF CACTUS GRAPHS 5 Proposition 2.1. Let J(G) be an unmixed binomial edge ideal. If a cycle Cl is a block of G then l ∈ {3, 4}. Proof. We begin observing by [4] and [10] that unmixed binomial edge ideals containing blocks that are cycles of length 3 and 4 exist. We assume that exists a cycle Cl in G with l ≥ 5 and J(G) unmixed. Since Cl is a block we represent G as ! r [ Gi (5) G = Cl ∪ i=1 where r ≥ 0, Gi are subgraphs of G for all i, |V (Gi ) ∩ V (Cl )| = 1. Since Cl is a block we have that {v} = V (Gi ) ∩ V (Cl ) is a cutpoint and all the paths between u ∈ V (Gi ) and w ∈ V (Gj ) with i 6= j pass through v (see Theorem 3.1 of [5]). Let V (Cl ) = {i1 , i2 , . . . , il } such that {ij , ij+1 } is an edge of G with j = 1, . . . , l − 1 and {i1 , il } is an edge of G, too. We observe that if T is {ij , ik } such that {ij , ik } ∈ / E(Cl ) then T ∈ C(G). Moreover GT has at least two connected components induced by the remaining l − 2 vertices of Cl . Assuming G is unmixed there are exactly 3 connected components in GT and this implies that one of the vertices in T is a cutpoint and the other is not a cutpoint. Thanks to this observation we easily obtain a contradiction. We give the proof for the sake of completeness. We observe that in the cutset {i1 , i3 } we may assume without loss of generality that i1 is the cutpoint and i3 is not a cutpoint. By the same argument focusing on {i1 , il−1 }, il−1 is not a cutpoint. If we consider {i2 , il−1 } and {i3 , il } we obtain that i2 and il are cutpoints. Let T1 = {i2 , il } since GT 1 has 4 connected components we obtain a contradiction.  Proposition 2.2. Let J(G) be an unmixed binomial edge ideal. If a cycle C4 is a block of G then it satisfies the following (C4)-condition • there are exactly two cutpoints in C4 and they are adjacent. Proof. By Proposition 2 of [10] we know that a graph satisfying the thesis exists. We prove that all the other cases are not unmixed. Let V (C4 ) = {1, 2, 3, 4} and let E(C4 ) = {{1, 2}, {2, 3}, {3, 4}, {1, 4}}. We assume the same representation of G given in (5). Suppose that either r = 0 or r = 1 with cutpoint 1. Then c({2, 4}) = 2. Hence it is not unmixed. Let r ≥ 2 and assume that 1 and 3 are cutpoints then c({1, 3}) = 4. Hence J(G) is not unmixed.  Definition 2.3. A graph G is decomposable (resp. indecomposable) if exists (resp. does not exist) a decomposition (6) G = G1 ∪ G2 with {v} = V (G1 ) ∩ V (G2 ) such that v is a free vertex of ∆(G1 ) and ∆(G2 ). By a recursive decomposition (6) applied to each G1 and G2 , after a finite 6 GIANCARLO RINALDO B1 B2 rv2 B3 w2r v3 w1 ... r w3 Bl r vl Figure 1. B(G) is a path. number of steps we obtain (7) G = G1 ∪ · · · ∪ Gr where G1 , . . . , Gr are indecomposable and for 1 ≤ i < j ≤ r either V (Gi ) ∩ V (Gj ) = ∅ or V (Gi ) ∩ V (Gj ) = {v} and v is a free vertex of ∆(Gi ) and ∆(Gj ). The decomposition (7) is unique up to ordering and we say that G is decomposable into indecomposable graphs G1 , . . . , Gr . Lemma 2.4 (See [9]). Let G be a decomposable graph with decomposition G = G1 ∪ G2 and V (G1 ) ∩ V (G2 ) = {v}. Then J(G) is Cohen-Macaulay (resp. unmixed) if and only if J(G1 ) and J(G2 ) are Cohen-Macaulay (resp. unmixed). Our aim is to prove that every Cohen-Macaulay cactus graph G is decomposable into indecomposable graphs G1 , . . . , Gr such that the block graph B(Gi ) is a path for 1 ≤ i ≤ r. Hence it is necessary as a first step to classify the indecomposable Cohen-Macaulay cactus graphs whose block graph is a path. To reach this goal we use from now on the following notation. Let G be a graph such that B(G) is a path defined on the following sets (see Figure 1) (8) vertices of B(G) {B1 , . . . , Bl } edges of B(G) {{Bi , Bi+1 } | i = 1, . . . , l − 1} cutpoints of G {wi = vi+1 | i = 1, . . . , l − 1} and such that wi = vi+1 ∈ V (Bi ) ∩ V (Bi+1 ), with i = 1, . . . , l − 1. Lemma 2.5. Let G be a graph such that B(G) is a path. We use notation (8). If |V (Bi )| ≥ 3 for all 1 < i < l then the power set of {w1 , . . . , wl−1 } is a subset of C(G). Proof. We use induction on t the cardinality of T ∈ C(G). If t = 1 since each wi is a cutpoint of G the claim follows. Let 2 ≤ t < l − 1 and T = {wi1 , wi2 , . . . wit } with 1 ≤ i1 < i2 < · · · < it ≤ l − 1. Let wj ∈ {w1 , . . . , wl−1 }\T and assume without loss of generality that j < i1 and i1 ≥ 2. We observe that the graph GT has the connected component H = B1 ∪ . . . ∪ Bi1 −1 ∪ Bi′1 where Bi′1 is obtained removing the vertex wi1 from the block Bi1 . Since by hypothesis Bi1 has more than two vertices, Bi′1 COHEN–MACAULAY BINOMIAL EDGE IDEALS OF CACTUS GRAPHS 7 contains at least one vertex, vi′1 , that is not a cutpoint in G. Hence H{wj } has two connected components: one containing a vertex in V (B1 ) \ {w1 } and one containing the vertex vi′1 . That is wj is a cutpoint of GT and T ∪ {wj } ∈ C(G).  By Proposition 2.1, Example 1.6 and Theorem 1.7 is useful for our aim to compute the primary decompositions of J(G) whose blocks are complete graphs, cycles C4 and diamond graphs D (see also Figure 2). Proposition 2.6. Let G be a graph such that B(G) is a path. We use notation (8). Let B1 = Km1 , Bl = Kml with m1 , ml ≥ 2 and Bi ∈ {C4 , D, Kmi | mi ≥ 3} for 2 ≤ i ≤ l − 1 with the following labelling on the vertices of the blocks Bi ∈ {C4 , D}: • V (C4 ) = {vi , vi′ , wi , wi′ }, E(C4 ) = {{vi , wi }, {vi , vi′ }, {vi′ , wi′ }, {wi , wi′ }}; • V (D) = {vi , vi′ , wi , fi }, E(D) = {{vi , wi }, {vi , vi′ }, {vi′ , fi }, {wi , fi }, {vi′ , wi }}. Then T ∈ C(G) if and only if T ⊆ V ⊔ V ′ where V = {w1 , . . . , wl−1 },     [ [ {vi′ } {vi′ , wi′ } ∪  V′ = Bi =C4 Bi =D and satisfying the following conditions: (1) if vi′ ∈ T then wi ∈ T and vi ∈ / T; (2) if wi′ ∈ T then vi ∈ T and wi ∈ / T. Proof. For the sake of completeness we give the equivalent conditions to (1) and (2) that are: (1’) if vi ∈ T or wi ∈ / T then vi′ ∈ / T; (2’) if wi ∈ T or vi ∈ / T then wi′ ∈ / T. Suppose T is a cutset. Then v ∈ T is not a free vertex. Hence it follows T ⊆ V ⊔ V ′ . In fact a vertex fi in a diamond graph is a free vertex in the clique {vi′ , wi , fi } and the same holds for all the vertices that are not cutpoints in a block that is a complete graph. Moreover, if T ⊆ V then it satisfies condition 1. and 2. in a trivial way. Hence we assume v ′ ∈ T with v ′ ∈ V ′ . That is either v ′ = vi′ ∈ V (Bi ) with Bi ∈ {C4 , D} or v ′ = wi′ ∈ V (Bi ) with Bi = C4 . We consider only the case v ′ = vi′ ∈ V (Bi ) with Bi = C4 since the other cases follow by similar argument. Since T is a cutset, the graph GS with S = T ∪ {vi′ } has a cutpoint in vi′ . Hence the two vertices vi and wi′ that are adjacent to vi′ in G must belong to GS , that is vi and wi′ are not in T . By the same reason since vi′ is a cutpoint in GS and since wi is adjacent to vi and wi′ in G, too, then wi ∈ / S and wi ∈ T . That is condition (1) is satisfied. Now suppose T ⊆ V ⊔V ′ satisfying conditions (1) and (2) and let n′ = |V ′ |. We prove that T is a cutset by induction on n′ . If n′ = 0 that is T ⊆ V , then it is a cutset by Lemma 2.5. 8 GIANCARLO RINALDO Let n′ ≥ 1 and let v2′ ∈ V ′ then B2 ∈ {C4 , D} (see Figure 2). We assume B2 = C4 since the other case is similar. By conditions (1) and (2’). w2 ∈ T and neither v2 nor w2′ belongs to T . That is the graph GT contains 2 connected components, B1 and the isolated vertex w2′ , and a subgraph of H = B3′ ∪ B4 ∪ · · · ∪ Bl , where B3′ is obtained removing the vertex w2 = v3 from B3 . We claim that T ′ = T \ {v2′ , w2 } is a cutset of H. Moreover HT ′ has a connected component containing a vertex in B3 that is adjacent to w2 . By the claim it easily follows that T is a cutset of G and GT contains the following connected components: B1 , the isolated vertex w2′ , and the connected components of HT ′ . If B3 is a complete graph then B3′ is a complete graph, too. Hence H satisfies the hypothesis of our Proposition and T ′ is a cutset by induction /T hypothesis. If B3 = D then B3′ is the complete graph K3 . Moreover v3′ ∈ by condition (1’) applied to w2 = v3 ∈ T . Hence the set T ′ contains at most the cutpoint w3 . Also in this case the graph H satisfies the hypothesis of our Proposition and T ′ is a cutset by induction hypothesis. If B3 = C4 then B3′ is a path of length 2 whose edges are {v3′ , w3′ }, {w3′ , w3 }. We note that also in this case v3′ ∈ / T by condition (1’), and T contains at most one of the vertices w3 and w3′ . In fact v3′ is the free vertex of the path and only one of the cutpoints w3 , w3′ can appear in T ′ . Moreover we can apply induction hypothesis on the subgraph H ′ obtained removing v3′ from H. By similar argument to the previous case we obtain the assertion under the assumption w2′ ∈ V ′ . In this case B2 = C4 , v2 ∈ T and GT contains the following connected components: the isolated vertex v2′ , B1′ , obtained removing the vertex v2 = w1 from B1 , and the connected components of  HT ′ with H = B3 ∪ · · · ∪ Bl and T ′ = T \ {w2′ , v2 }. Corollary 2.7. Let G be a graph that satisfies the hypothesis of Proposition 2.6. Then J(G) is unmixed. Proof. By Lemma 1.2 it is sufficient to show that c(T ) = |T | + 1 for all T ∈ C(G). Thanks to Lemma 2.5, T = {wi1 , wi2 , . . . wit } ⊆ {w1 , . . . , wl−1 } with 1 ≤ i1 < i2 < · · · < it ≤ l − 1 is a cutset of G. We note that (9) GT = G1 ⊔ G2 ⊔ · · · ⊔ Gt+1 where G1 = B1 ∪ · · · ∪ Bi1 −1 ∪ Bi′′1 , Gt+1 = Bi′t +1 ∪ Bit +2 ∪ · · · ∪ Bl and Gj = Bi′j +1 ∪ Bij +2 ∪ · · · ∪ Bij+1 −1 ∪ Bi′′j+1 with j = 2, . . . , t and Bi′′ is the block obtained removing wi from Bi , Bi′ is the block obtained removing wi−1 = vi from Bi . We easily observe that Gi is connected for 1 ≤ i ≤ t + 1. Hence c(T ) = t + 1. Now let T ⊔ T ′ ∈ C(G) with T = {wi1 , wi2 , . . . wit } ⊆ {w1 , . . . , wl−1 } and T ′ ∩ {w1 , . . . , wl−1 } = ∅ with t′ = COHEN–MACAULAY BINOMIAL EDGE IDEALS OF CACTUS GRAPHS q q ❅ ❅ ❅sq q q q ❅ ❅ q ❅q B3 · · · Bl q v2 w2 Gw 2 v2′ q qsw2′ ′ =⇒ 9 q q ❅ B3 · · · Bl B3 · · · Bl ❅ q ❅q qs q w2 v2❅ w2 Gv ′ 2 ❅ =⇒ qf2 q ❅q v2 v2′ qs Figure 2. Cases B2 ∈ {C4 , D, K4 } of Theorem 2.8 |T ′ | > 0. This implies that v ′ ∈ T ′ is either vi′ or wi′ of Bi ∈ {C4 , D}. If we focus on T the representation of GT in (9) holds in this case, too. Without loss of generality let v ′ ∈ V (G1 ). Since the only cutpoint that induces the connected component G1 is wi1 , by condition (1) of Proposition 2.6, v ′ = vi′1 . Hence (10) GT ∪{v′ i1 } where (G1 ){v′ i1 } = (G1 ){v′ i1 } ⊔ G2 ⊔ · · · ⊔ Gt+1 = B1 ∪ · · · ∪ Bi1 −1 ⊔ {v} where v = fi1 if Bi1 = D or v = wi′ 1 if Bi1 = C4 and c(T ∪ {vi′1 }) = (t + 1) + 1 where the last summand is induced by the isolated vertex v. The same argument holds for all v ′ ∈ T ′ .  Theorem 2.8. Let G be a graph that satisfies the hypothesis of Proposition 2.6. Then J(G) is Cohen-Macaulay. Proof. We start observing that dim S/J(G) = n + 1. This follows by Corollary 2.7 and the formula (see [6]) (11) dim S/J(G) = max{n − |T | + c(T )}. Hence it is sufficient to prove that depth S/J(G) ≥ n + 1 using induction on l, the number of blocks of G. Our strategy is to focus on the block B2 . In particular when B2 ∈ {D, C4 } (see Figure 2) we consider the vertex v ′ ∈ {v2′ , w2′ } and the following exact sequence (12) 0 −→ S/J(G) −→ S/Qv′ ⊕ S/J(G′ ) −→ S/(Qv′ + J(G′ )) −→ 0 with G′ = Gv′ . By Corollary 2.5, J(G′ ) is a binomial edge ideal and the graph G′ satisfies the hypothesis of our Theorem but with a second block that has less cutsets than B2 (see Figure (2)). Moreover S/Qv′ (respectively S/Qv′ + J(G′ )) is a tensor product of 3 (respectively 2) quotient rings whose definining ideals are binomial edge ideals, and it is Cohen-Macaulay using induction. To obtain this goal we have three cases to study: B2 = Km2 , B2 = D and B2 = C4 . We start induction with l = 3. Case B2 = Km2 . S/J(G) is Cohen-Macaulay by Theorem 1.1 of [4]. Case B2 = D. We set G′ = Gv2 ′ . By Proposition 1.4 we have E(G′ ) = E(G) ∪ {{v2 , f2 }}, that is the second block in G′ is the complete graph on the vertices {v2 , v2′ , w2 , f2 }. By Corollary 1.5, J(G) = J(G′ ) ∩ Qv2′ , where Qv2′ = P{v2′ ,w2 } = (xv2′ , yv2′ ) + (xw2 , yw2 ) + J(B1 ) + J(B3′ ) and B3′ is obtained by removing the vertex w2 = v3 from the complete graph B3 . By Depth 10 GIANCARLO RINALDO Lemma applied on the sequence (12) with v ′ = v2′ we obtain the assertion. In fact G′ is Cohen-Macaulay by the case B2 = Km2 and its depth is n + 1. Let S ′ = S/(xv2′ , yv2′ , xw2 , yw2 ), we obtain (13) S/Qv2′ ∼ = S ′ /J(B1 ) + J(B3′ ) ∼ = K[{xi , yi } : i ∈ V (B3′ )] K[{xi , yi } : i ∈ V (B1 )] ∼ ⊗ K[xf2 , yf2 ] ⊗ = J(B1 ) J(B3′ ) where the 3 quotient rings associated to the complete graphs B1 , B3′ and the isolated vertex f2 are Cohen-Macaulay. Using the formula (11) for each ring, and adding the results thanks to (13), we obtain depth S/Qv2′ = |(V (B1 ) + 1) + (1 + 1) + (|V (B3′ )| + 1) = n + 1. By the same argument depth S/(Qv2′ + J(G′ )) = n. In fact (14) S/Qv2′ + J(G′ ) ∼ = S ′ /J(B1 ∪ E ′ ) + J(B3′ ) ∼ = K[{xi , yi } : i ∈ V (B1 ) ∪ {f2 }] K[{xi , yi } : i ∈ V (B3′ )] ∼ ⊗ = J(B1 ∪ E) J(B3′ ) where E is the edge {w1 = v2 , f2 }. Hence J(B1 ∪ E) is Cohen-Macaulay by Theorem 1.1 of [4]. By Depth Lemma the assertion follows. Case B2 = C4 . We set v ′ = w2′ and G′ = Gw2 ′ . By Proposition 1.4 we have E(G′ ) = E(G) ∪ {{v2′ , w2 }}, that is the second block in G′ is a diamond, hence J(G′ ) is Cohen-Macaualy by the case B2 = D. Moreover depth S/Qv′ = n + 1 and depth S/Qv′ + J(G′ ) = n. In fact Qv′ = P{v2 ,w2′ } = (xw2′ , yw2′ ) + (xv2 , yv2 ) + J(B1′ ) + J(B3 ), where B1′ is the complete graph obtained removing the vertex v2 = w1 from the graph B1 . Using a representation of S/Qv′ similar to (13) we easily obtain the assertion. Moreover Qv′ +J(G′ ) = (xw2′ , yw2′ )+(xv2 , yv2 )+J(B1′ )+J(B3 ∪E) where E is the edge {v2′ , w2 }. Also in this case we obtain the assertion using a representation of S/Qv′ + J(G′ ) equivalent to the one used in (14). Let l > 3. Case B2 = Km2 . By Lemma 2.4 applied on the graphs G1 = B1 and G2 = B2 ∪ · · · ∪ Bl , since G1 is a complete graph and G2 is Cohen-Macaulay by induction hypothesis, we obtain that G is CohenMacaulay. Case B2 = D. As in the case B2 = D with l = 3, setting G′ = Gv2 ′ , the second block in G′ , namely B2′ , is the complete graph on the vertices {v2 , v2′ , w2 , w2′ }, hence G′ = B1 ∪ B2′ ∪ B3 ∪ · · · ∪ Bl . Therefore J(G′ ) is Cohen-Macaulay using induction hypothesis Tand Lemma 2.4 applied on B1 and B2′ ∪B3 ∪· · ·∪Bl . By Corollary 1.5 Qv2′ = T ∈C(G),v′ ∈T PT (G). 2 Thanks to condition (1) of Proposition 2.6 for each T ∈ C(G) with v2′ ∈ T then w2 ∈ T and v2 ∈ / T . Hence Qv2′ = J(B1 ) + (xv2′ , yv2′ , xw2 , yw2 ) + J. We claim that J = J(H), where H = B3′ ∪ B4 ∪ · · · ∪ Bl , with B3′ obtained removing the vertex w2 = v3 from B3 . By the claim, and defining COHEN–MACAULAY BINOMIAL EDGE IDEALS OF CACTUS GRAPHS 11 S ′ = S/(xv2′ , yv2′ , xw2 , yw2 ), we obtain a representation of S/Qv2′ by tensor product similar to (13), that is K[{xi , yi } : i ∈ V (B1 )] K[{xi , yi } : i ∈ V (H)] ⊗ K[xf2 , yf2 ] ⊗ , J(B1 ) J(H) and using induction hypothesis on H we obtain the assertion. The claim follows proving the condition (15) T ∈ C(H) if and only if T ∪ {v2′ , w2 } ∈ C(G). Proof of (15). Case B3 = D. Let B3′ = K3 on the vertices {v3′ , f3 , w3 }, then H satisfies Proposition 2.6. Let T ∈ C(H). To prove that T ∪{v2′ , w2 } ∈ C(G) it is enough to check conditions (1) and (2) for all the vertices v ′ ∈ T ′ = (T ∪{v2′ , w2 })\{w1 , . . . , wl−1 }. If v ′ ∈ V (B2 )∩T ′ then v ′ = v2′ and it satisfies condition (1). If v ′ ∈ V (Bi ) ∩ T ′ with 4 ≤ i ≤ l then it satisfies condition 1. and 2. with respect to G since it satisfies the same conditions with respect to H. We end this implication observing that V (B3 ) ∩ T ′ = ∅. If T ⊆ V (H) with T ∈ / C(H) either there exists a block in {B4 , . . . , Bl } such that either (1) or (2) is not satisfied or there exists v ∈ V (B3′ ) with v 6= w3 . In both cases T ∪ {v2′ , w2 } does not satisfy (1) and (2) with respect to G. The cases B3 ∈ {Km3 , C4 } follow by similar argument. We only point out some facts when B3 = C4 . B3′ is a path defined on the vertex set {v3′ , w3′ , w3 } and edges {v3′ , w3′ }, {w3′ , w3 }. In this case is useful to consider H = E ∪ H ′ where E is the edge {v3′ , w3′ } and H ′ is obtained removing the vertex v3′ from H. Then H ′ satisfies the hypothesis of the Proposition and it is Cohen-Macaulay by induction. By Lemma 2.4 applied to H ′ and E we obtain that J(H) is Cohen-Macaulay, too. Moreover by Lemma 2.3 of [9] we have C(H) = C(H ′ ) ∪ {T ∪ {w3′ } : T ∈ C(H ′ ) with w3 ∈ / T }. Observe that the graph studied in this case is decomposable with respect to the vertex v2 . Hence also the graphs (16) B2 ∪ · · · ∪ Bl with B2 = D is Cohen-Macaulay. Case B2 = C4 . Let G′ = Gw2 ′ . As in the case B2 = C4 and l = 3, the second block of G′ is D. Then J(G′ ) is Cohen-Macaulay by the case B2 = D with T l > 3, and J(G) = J(G′ ) ∩ Qw2′ with Qw2′ = T ∈C(G),w′ ∈T PT (G). We claim 2 that Qw2′ = J(B1′ ) + (xw2′ , yw2′ ) + (xv2 , yv2 ) + J(H) where B1′ is the complete graph obtained removing v2 = w1 from B1 . Moreover, using the notation introduced in Proposition 1.4, H = (B3 ∪ B4 ∪ · · · ∪ Bl )v3 = (B3 )v3 ∪ B4 ∪ · · · ∪ Bl . By the claim it follows, defining S ′ = S/(xv2 , yv2 , xw2′ , yw2′ ), the following representation of S/Qw2′ K[{xi , yi } : i ∈ V (B1′ )] K[{xi , yi } : i ∈ V (H)] . ⊗ K[xv2′ , yv2′ ] ⊗ ′ J(B1 ) J(H) 12 GIANCARLO RINALDO q❝ q❝ ❝q ✡❏ ✡ ❏ ✡ ❝q ❏❝q q❝ ❏ ❏ ❏q q ✡ ✡ q✡ q❝ q Figure 3. Tree and unicyclic Cohen-Macaulay indecomposable graphs. We focus on the last factor since the other ones are exactly equivalent to the ones already studied. The block (B3 )v3 is either a complete graph or a diamond graph with v3 a free vertex. In both cases it is Cohen-Macaulay by induction hypothesis and (16). The claim follows by the condition (17) T ∈ C(H) if and only if T ∪ {v2 , w2′ } ∈ C(G). To prove (17) we use Proposition 2.6 and similar arguments to the ones used to prove (15).  Lemma 2.9. Let G be an indecomposable cactus graph such that B(G) is a path. We use notation (8). The following conditions are equivalent: (1) J(G) is Cohen-Macaulay; (2) J(G) is unmixed; (3) One of the following 2 cases occurs (a) G ∈ {K2 , C3 }. (b) G has C4 subgraphs that satisfy the (C4)-condition, l ≥ 3 and (i) B1 , Bl ∈ {C3 , K2 }, (ii) B2 and Bl−1 are C4 , (iii) Bi ∈ {C3 , C4 } for 3 ≤ i ≤ l − 2 and if Bi = C3 then Bi+1 = C4 . Proof. (1) ⇒ (2). It is a known fact. (2) ⇒ (3). By Proposition 2.1 only K2 , C3 and C4 are admissible blocks. Since every vertex of a complete graph is a free vertex, we observe that every cactus graph whose blocks are K2 and C3 and not C4 is Cohen-Macaulay and is decomposable in single blocks. Now suppose that the block graph is a path containing one or more blocks that are C4 . By Proposition 2.2 a block C4 has two cutpoints, thus neither B1 nor Bl is C4 . Since by hypothesis G is indecomposable, two complete graphs cannot be adjacent in B(G). We end observing that if a K2 is between two cycles C4 it is not unmixed (see also Remark 4.7 of [2]). (3) ⇒ (1). The implication follows applying Theorem 2.8.  Example 2.10. Thanks to Lemma 2.9 we obtain the Cohen-Macaulay indecomposable graph of trees and unicyclic graphs shown in Figure 3. The bicyclic with the same properties are in Figure 4. From now on we underline the free vertices by a circle around them. COHEN–MACAULAY BINOMIAL EDGE IDEALS OF CACTUS GRAPHS q❝ q q❝ ✡❏ ✡ ❏ q ❏❝q ✡ q q q q ❝q ❏ ❏ ❏q q q ❏ q q 13 ❏ ❏q❝ Figure 4. Bicyclic Cohen-Macaulay indecomposable cactus graphs. G3 q G1 q s s s ✡❏ ✡ ❏ ❏s ✡ s q q q q G2 s Figure 5. A non unmixed cactus graphs with B(G) that is a tree. Theorem 2.11. Let G be a cactus graph. We use notation (8). The following conditions are equivalent (1) J(G) is Cohen-Macaulay; (2) J(G) is unmixed; (3) B(G) is a tree, G is decomposable into indecomposable graphs G1 , . . . , Gr , and such that B(Gi ) is a path and Gi satisfies one of the equivalent conditions of Lemma 2.9 for 1 ≤ i ≤ r. Proof. (1) ⇒ (2). It is a known fact. (3) ⇒ (1). It follows by Lemma 2.4. (2) ⇒ (3). By Proposition 1.3 the block graph of G is a tree. Let t be the number of vertices of B(G) having degree greater than two. We make induction on t. If t = 0 then the block graph B(G) is a path and the assertion follows by Lemma 2.4 and Lemma 2.9. Let t > 0 and let B be a a vertex of B(G) whose degree is greater than 2. By Proposition 2.1 and Proposition 2.2, B = C3 . Suppose that C3 has a vertex v such that {v} = V (G1 ) ∩ V (G2 ), G = G1 ∪ G2 and v is a free vertex of ∆(G1 ) and ∆(G2 ). Since G1 and G2 are cactus with number of blocks of degree greater than 2 less than t, by induction hypothesis we are done. Suppose by contradiction that in each of the 3 vertices of C3 the graph G is not decomposable. Then C3 is adjacent to 3 blocks C4 as in figure 5, where G1 , G2 and G3 are intended as cactus subgraphs of G. We observe that the set T containing the 6 vertices, indicated as filled dots in figure, is a cutset. But  GT has 6 components. Hence J(G) is not unmixed. Contradiction. 14 GIANCARLO RINALDO q❝ q q ❝q q❝ ❏ ✡ ✡ ❏ ❝q ❏✡ ❏ ❏ ❏q ❝q q ❏ ✡ ✡ ❏ ❏✡ ❝q ✡❏ ✡ ❏ ❏q ✡ q q q❝ q q q q ❏ ❏ ❏q❝ q q q q Figure 6. A Cohen-Macaulay cactus graphs. Example 2.12. In figure 6 we have that G is the union of 4 indecomposable Cohen-Macaulay cactus graphs joined by free vertices (surrounded by a circle). That are : a K2 ; a C3 ; one containing a K2 , a C3 and a C4 ; one containing 2 K2 , one C3 and 3 C4 . 3. Classification of Cohen–Macaulay bicyclic graphs In this section thanks to the classification of Cohen-Macaulay binomial edge ideals of cactus graphs we classify the ones that are bicyclic, namely the ideals of deviation 2. In fact a cactus graph having 2 cycles as blocks is in particular a bicyclic graph. Hence we focus our attention on bicyclic graphs G that are not cactus. In this case there exists one block B1 in G such that 3 [ Pi (18) B1 = i=1 where P1 , P2 and P3 are paths, V (Pi ) ∩ V (Pj ) = {a, b} for 1 ≤ i < j ≤ 3 and if B is a block of G with B 6= B1 then B is an edge. Remark 3.1. The set T = {a, b}, where a and b are defined in (18), is a cutset. Assume from now on that the ideal J(G) is unmixed. Let li be the length of the path Pi in (18) such that 1 ≤ l1 ≤ l2 ≤ l3 . If l1 = 1, that is {a, b} ∈ E(G), then a is a cutpoint and b is not a cutpoint. In fact by Lemma 1.2, c(T ) = 3. But we have exactly two connected components induced by the paths P2 and P3 . Hence there exists another connected component in GT that is not a subgraph of B1 and the assertion follows. By a similar argument if l1 > 1 then neither a nor b is a cutpoint. All over the section we use the notation defined in (18) and Remark 3.1. We call these graphs non-cactus bicyclic graphs. Lemma 3.2. Let G be a non-cactus bicyclic graph such that J(G) is unmixed. We use notation (18). Then COHEN–MACAULAY BINOMIAL EDGE IDEALS OF CACTUS GRAPHS 15 (1) each path Pi has length less than 4; (2) at most one path Pi has length 3. Proof. (1). Suppose by contradiction that exists a path P ∈ {P1 , P2 , P3 } of length l ≥ 4. Let a, a1 , c, b1 and b, 5 distinct vertices of V (P ), with {a, a1 }, {b, b1 } ∈ E(P ). Let T = {a, b} and suppose that neither a nor b is a cutpoint. We observe that T1 = {a, b1 } is a cutset. Hence c(T1 ) = 3. But in GT 1 there are two connected components that are subgraphs of B1 , one containing the vertex c and one containing the vertex b. Hence there exists another block B2 different from B1 that contains the vertex b1 . Let E(B2 ) = {{b1 , b′1 }}. By the same argument there exists a block B3 such that E(B3 ) = {{a1 , a′1 }}. The set T2 = {a1 , b1 } is a cutset and induces 4 components in GT 2 : The first containing a and b, the second containing a′1 , the third containing b′1 , and the fourth containing c. Contradiction. By similar argument is left to the reader to check that if a cutpoint and b is not a cutpoint, then T1 = {b, c} is a cutset with c a cutpoint. Hence we have a contradiction focusing on the cutset {a, c}. (2). Suppose by contradiction that exist 2 paths P1 and P2 of length 3 such that V (Pi ) = {a, ai , bi , b}, E(Pi ) = {{a, ai }, {ai , bi }, {bi , b}} for i = 1, 2. By Remark 3.1 we assume the vertex b is not a cutpoint and we focus on the cutset T = {b, a1 }. GT has two connected components that are subgraphs of B1 , one containing the vertex a and one containing the isolated vertex b1 . Hence there exists another block B2 different from B1 that contains the vertex a1 . Let E(B2 ) = {{a1 , a′1 }}. By the same argument there exists a block B3 such that E(B3 ) = {{a2 , a′2 }}. The set T1 = {b, a1 , a2 } is a cutset with 5 components in GT 1 : the first containing a, the second (respectively the third) containing a′1 (respectively a′2 ) and the 2 isolated vertices b1 and b2 . Contradiction.  Lemma 3.3. Let G be a non-cactus bicyclic graph. Then J(G) is CohenMacaulay (respectively unmixed but not Cohen-Macaulay) if and only if B(G) is a tree and G is decomposable into indecomposable graphs G1 , . . . , Gr , and such that G1 is one of the graphs in Figure 7 (respectively Figure 8). Proof. Let (l1 , l2 , l3 ) ∈ N3 where li is the length of the paths Pi . By Remark 3.1 and Lemma 3.2 we have to study the following 4 cases: (1, 2, 2), (1, 2, 3), (2, 2, 2), (2, 2, 3). Case (1, 2, 2). Since l1 = 1 we obtain the graph on the left in Figure 7 that is Cohen-Macaulay. In fact, if we consider the cone from the vertex a to the two connected components given by the isolated vertex f3 and the path whose edges are {f1 , b} and {b, f2 }, by Theorem 3.8 of [9], we have the assertion. 16 GIANCARLO RINALDO f3 q❝ aq q❝f2 ❅ ❅ ❅qb f1 q❝ ❅ fq❝1 ✡❏ ✡ ❏ q b✡ ❏qa b1 q qa1 ❝qf2 ❝qf3 Figure 7. Bicyclic Cohen-Macaulay non-cactus graphs. Case (1, 2, 3). Since l1 = 1 we obtain the graph on the right in figure 7 removing the vertex f3 . Using similar argument to the one used in Proposition 2.2, we obtain that the only candidate is exactly the graph in figure 7 and C(G) = {∅, {a}, {a1 }, {a, a1 }, {a, b}, {a, b1 }, {a1 , b}, {a, a1 , b}}. We focus on the cutpoint a. By Corollary 1.5 we obtain J(G) = J(Ga ) ∩ Qa , moreover Qa = (xa , ya ) + J(P ) where J(P ) is the binomial edge ideal of the path with E(P ) = {{f1 , b}, {b, b1 }, {b1 , a1 }, {a1 , f3 }}, C(P ) = {∅, {a1 }, {b}, {b1 }, {a1 , b}}. The ring S/Qa is Cohen-Macaulay of dimension 8 and it has two components: The path P on 5 vertices and the isolated vertex f2 . We also observe that J(Ga ) is the cone from the vertex a1 to the vertex f3 and the graph obtained attaching the edge {b1 , b} to the complete graph whose vertices are {a, b, f1 , f2 }. Hence J(Ga ) is Cohen-Macaulay of dimension 8, too. Moreover Qa + J(Ga ) is a binomial edge ideal that is equal to the previous cone removing the vertex a, hence it is Cohen-Macaulay of depth 7. By the Depth Lemma applied on the following exact sequence the assertion follows 0 −→ S/J(G) −→ S/Qa ⊕ S/J(Ga ) −→ S/(Qa + J(Ga )) −→ 0. Cases (2, 2, 2) and (2, 2, 3). These two cases are unmixed if and only if we add the edges as in figure 8. Moreover we already found them in [10], Example 3.2 and 3.3. In that paper by symbolic computation we observed that they are not Cohen-Macaulay. In [2] there is an argument for the non Cohen-Macaualyness of the bipartite one, the one on the right of figure 8.  Now we are ready to give the main result of the section. Corollary 3.4. Let G be a bicyclic graph. Then J(G) is Cohen-Macaulay if and only if B(G) is a tree, G is decomposable into indecomposable graphs G1 , . . . , Gr , and such that one of the following cases occurs: (1) G1 and G2 are in the set of unicyclic graphs in Figure 3; (2) G1 is one of the bicyclic cactus graphs in Figure 4; (3) G1 is one of the bicyclic non-cactus graphs in Figure 7. COHEN–MACAULAY BINOMIAL EDGE IDEALS OF CACTUS GRAPHS f1q❝ q ❅ ❅ q ❅q q ❅ ❅ ❅q fq❝2 f1q❝ q q f❝q3 q q ❅ ❅ ❅q q f❝q2 17 Figure 8. Bicyclic unmixed but non Cohen-Macaulay noncactus graphs. Acknowledgements The author was partially supported by GNSAGA of INdAM (Italy). References [1] A. Banerjee, L. Nunez-Betancourt, Graph Connectivity and Binomial edge ideals, Proc. Amer. Math. Soc., Vol. 145 (2), 2017, pp. 487–499. [2] D. Bolognini, A. Macchia, F. Strazzanti, Binomial edge ideals of bipartite graphs, arXiv:1704.00152v1, 2017, pp. 1–29. [3] CoCoATeam, CoCoA: a system for doing Computations in Commutative Algebra, Available at http://cocoa.dima.unige.it [4] V. Ene, J. Herzog, T. Hibi, Cohen-Macaulay binomial edge ideals, Nagoya Math. J., Vol. 204, 2011, pp. 57–68. [5] F. Harary, Graph theory, Addison-Wesley series in Mathematics, 1972. [6] J. Herzog, T. Hibi, F. Hreinsdottir, T. Kahle, J. Rauh, Binomial edge ideals and conditional independence statements, Adv. in Appl. Math., Vol. 45, 2010, pp. 317– 333. [7] D. Kiani, S. Saeedi Madani, Some Cohen-Macaulay and Unmixed Binomial Edge Ideals, Comm. Algebra, Vol. 43, 2015, pp. 5434–5453. [8] M. Ohtani, Graphs and ideals generated by some 2-minors, Comm. Algebra, Vol. 39, 2011, pp. 905–917. [9] A. Rauf, G. Rinaldo, Construction of Cohen-Macaulay binomial edge ideals, Comm. Algebra., Vol. 42, 2014, pp. 238–252. [10] G. Rinaldo, Cohen-Macaulay binomial edge ideals of small deviation, Bull. Math. Soc. Sci. Math. Roumanie, Tome 56(104) No. 4, 2013, 497–503. [11] R.H. Villarreal, Cohen-Macaulay graphs, Manuscripta Math., Vol. 66, 1990, pp. 277– 293. Department of Mathematics, University of Trento, via Sommarive, 14, 38123 Povo (Trento), Italy
0math.AC
arXiv:0711.4444v2 [cs.MS] 29 Nov 2007 INSTITUT NATIONAL DE RECHERCHE EN INFORMATIQUE ET EN AUTOMATIQUE Building the Tangent and Adjoint codes of the Ocean General Circulation Model OPA with the Automatic Differentiation tool TAPENADE M.H. Tber — L. Hascoët — A. Vidard — B. Dauvergne N° 6372 Novembre 2007 Thème NUM apport de recherche Building the Tangent and Adjoint odes of the O ean General Cir ulation Model OPA with the Automati Dierentiation tool TAPENADE ∗ M.H. Tber , L. Has oët ∗ † , A. Vidard , B. Dauvergne ∗ Thème NUM  Systèmes numériques Projet Tropi s Rapport de re her he Abstra t: n° 6372  Novembre 2007  28 pages The o ean general ir ulation model OPA is developed by the LODYC team at Paris VI university. OPA has re ently undergone a major rewriting, migrating to FORTRAN95, and its adjoint ode needs to be re- built. For earlier versions, the adjoint of OPA was written by hand at a high development ost. We use the Automati Dierentiation tool TAPENADE to build me hani aly the tangent and adjoint dierentiated odes by odes of OPA. We validate the omparison with divided dieren es, and also with an identi al twin experiment. We apply state-of-the-art methods to improve the performan e of the adjoint and Walther's binomial ode. In parti ular we implement the Griewank he kpointing algorithm whi h gives us an optimal trade-o between time and memory onsumption. We apply a spe i egy to dierentiate the iterative linear solver that strat- omes from the impli it time stepping s heme. Key-words: OPA, general ir ulation model, TAPENADE, Automati ferentiation, reverse mode, Adjoint Code, Che kpointing ∗ † INRIA Sophia Antipolis, Fran e INRIA Grenoble, Fran e Unité de recherche INRIA Sophia Antipolis Dif- Constru tion des odes Tangent et Adjoint du modèle de ir ulation générale o éanique OPA par l'outil de Diérentiation Automatique TAPENADE Résumé : Le modèle de ir ulation générale o éanique OPA est développé par l'équipe LODYC de l'université Paris VI. La nouvelle version 9 d'OPA onstitue une évolution majeure, ave TRAN95. Les en parti ulier une migration vers FOR- odes Linéaire Tangent et Adjoint d'OPA, qui auparavant étaient é rits à la main, doivent don être redéveloppés. Nous utilisons l'outil de Diérentiation Automatique TAPENADE pour gent et Adjoint d'OPA 9. raison ave onstruire les odes Tan- Nous validons les dérivées obtenues par ompa- les Diéren es Divisées et sur deux appli ations test in luant des expérien es jumelles. Nous utilisons le s héma de he kpointing ré ursif bino- mial de Griewank et Walther pour améliorer les performan es du ode adjoint. Nous utilisons une stratégie spé ique pour diérentier le solveur linéaire itératif provenant du s héma impli ite d'avan ement en temps. montrent un oût raisonnable, tant en Nos résultats onsommation mémoire que pour le temps d'exé ution de l'adjoint. Mots- lés : OPA, Cir ulation O éanique, TAPENADE, Diérentiation Au- tomatique, mode inverse, Code Adjoint, Che kpointing Tangent and Adjoint dierentiation of OPA 3 1 Introdu tion The development of tangent and adjoint models is an important step in addressing sensitivity analysis and variational data assimilation problems in O eanography. Sensitivity analysis is the study of how model output varies with hanges in model inputs. The sensitivity information given by the adjoint model is used dire tly to gain an understanding of the physi al pro esses. In data assimilation, one onsiders a ost fun tion whi h is a measure of the model-data mist. The adjoint sensitivities are used to build the gradient for des ent algorithms. Similarly the tangent model is used in the in remental algorithms [3℄ to linearize the ontext of the ost fun tion around a ba kground ontrol. For the previous version 8 of the O ean General Cir ulation Model OPA [17℄, Weaver et al [22℄ developed the numeri al tangent and adjoint by hand using odes lassi al te hniques [5, 19℄. Sin e then, the OPA model has un- dergone a major update. Parti ularly the new versions are fully rewritten in FORTRAN95. adjoint In this paper, we report on the development of tangent and odes of OPA using the Automati Dierentiation (AD) tool TAPE- NADE [12℄. A brief des ription of the OPA model and the onguration used in this work is given in the next se tion. In se tion 3 we present the prin iples of AD and how they are ree ted into the fun tionalities of the AD tool TAPENADE. In se tion 4 we fo us on the most interesting di ulties that we en ountered in the appli ation of AD to su h a large ode. Se tion 5 shows some experiments that validate our derivatives and presents two illustrative appli ations, fo using on omputational aspe ts rather than impli ations for o eanography. An outlook of further work is given in the on lusion. 2 The O ean General Cir ulation Model OPA Developed by the LODYC team at Paris VI university, OPA is a exible o ean ir ulation model that onguration. an be used either in a regional or in a global o ean OPA is the o ean model omponent of NEMO (Nu leus For European Modelling of the O ean) and is widely used in the s ienti om- munity. Moreover it is be oming a major a tor in operational o eanography (Mer ator, ECMWF, UK-Met o e) Its formulation is based on the so- alled primitive equations for the temporal evolution of o ean velo ity RR n° 6372 urrents, tem- Tber et al. 4 perature and salinity in its three horizontal and verti al dimensions. equations are derived from Navier-Stokes equations These oupled with a state equa- tion for water density and heat equation, under Boussinesq and hydrostati approximations. U Let us introdu e the following variables: Uh + wk (the subs ript tial temperature, S h the velo ity ve tor, denotes the lo al horizontal ve tor), the salinity, p the pressure and ρ T U = the poten- the in-situ density. The ve tor invariant form of the primitive equations in an orthogonal set of unit ve tors linked to the earth are written as follows                                ∂Uh ∂t ∂p ∂z ∇·U ∂T ∂t ∂S ∂t ρ  1 = − (∇ × U) × U + ∇ (U) 2 2  h − f k × Uh − 1 ∇h p + D U ρ0 = −ρg = 0 = −∇ · (T U) + D T = −∇ · (SU) + D S = ρ (T, S, p) ∇ is the generalized derivative ve tor operator, t the time, z the verti al oordinate, ρ0 a referen e density, f the Coriolis a eleration, and g the gravity U T S a eleration. D , D and D are the parametrization of small s ale physi s for where momentum, temperature and salinity, in luding surfa e for ing terms. A full des ription of the model basi s, dis retization, physi al and numeri al details an be found in [17℄. Through this paper, OPA is used in its global free surfa e ORCA-2. In this onguration onguration the model uses a rotated grid with poles on North Ameri a and Asia in order to avoid the singularity problem on the North Pole. The spa e resolution is roughly equivalent to a geographi al mesh of 2° by 1.3° with a meridional resolution of 0.5° near the Equator (see gure 1). The Verti al domain, spreading from the surfa e to a depth of 5000m, is meshed using 31 levels with levels 1 to 10 in the top 100 meters. The time step is 96 minutes so that there are 15 time steps per day. The model is for ed by heat, freshwater, and momentum uxes from the atmosphere and/or the sea-i e. INRIA Tangent and Adjoint dierentiation of OPA 5 Figure 1: ORCA 2 Mesh The solar radiation penetrates the upper layers of the o ean. Zero uxes of heat and salt are applied through the bottom. On the lateral solid boundaries a no-slip ondition is also applied. Initialization of the model for temperature and salinity is based on the Levitus et al. (1998) limatology with a null initial velo ity eld. For more details about the spa e time-domain and the o ean physi s of ORCA-2, we refer to the page dedi ated to this 1 onguration in the o ial website of NEMO-OPA . The to onguration ORCA-2 is routinely used by MERCATOR/Meteo-Fran e ompute the o eani omponent of their seasonal fore asting system. The size of OPA-9, 200 modules dening 800 pro edures with over 100 000 lines of FORTRAN95, makes it the largest appli ation dierentiated by TAPENADE to date. The omputational kernel whi h is a tually dierentiated a for 330 pro edures. 1 http://www.lody RR n° 6372 .jussieu.fr/NEMO/general/des ription/ORCA_ ong.html ounts Tber et al. 6 3 Prin iples of AD and the tool TAPENADE 2 TAPENADE [12℄ is an AD tool developed by the Tropi s team at INRIA. Given the sour e of an original program that evaluates a mathemati al fun tion, and given a sele tion of input and output variables to be dierentiated, TAPENADE produ es a new sour e program that omputes the partial deriva- tives of the sele ted outputs with respe t to the sele ted inputs. Basi ally, TAPENADE does that by inserting additional statements into a opy of the original program. Like other AD tools, TAPENADE is based on the fundamental observation that the original program P, whatever its size and m n run time, omputes a fun tion F, X∈IR 7→ Y ∈IR whi h is the omposition of the elementary fun tions words if P omputed by ea h run-time instru tion. In other exe utes a sequen e of elementary statements Ik , k ∈ [1..p], then P a tually evaluates F = fp ◦ fp−1 ◦ · · · ◦ f1 , where ea h fk is the fun tion implemented by hain rule of derivative derivatives of ea h Calling X0 = X Y Xk = fk (Xk−1 ) omponent of and variables, i.e. the su Ik . Therefore one an apply the F ′ , i.e. the partial al ulus to get the Ja obian matrix essive with respe t to ea h the su omponent of X. essive values of all intermediate states of the memory throughout exe ution of P, we get ′ F ′ (X) = fp′ (Xp−1 ) × fp−1 (Xp−2 ) × · · · × f1′ (X0 ) . The derivatives fk′ (1) of ea h elementary instru tion are easily built, and must be inserted in the dierentiated program so that ea h of them has the values Xk−1 dire tly available for use. This pro ess yields analyti are exa t up to numeri al a derivatives, that ura y. In pra ti e, two sorts of derivatives are of parti ular importan e in s ienti omputing: the tangent (or dire tional) derivatives, and the adjoint (or reverse) derivatives. In parti ular, tangent and adjoint are the two sorts of derivative programs required for OPA, and TAPENADE provides both. The ′ tangent derivative is the produ t Ẏ = F (X) × Ẋ of the full Ja obian times a dire tion Ẋ in the input spa e. From equation (1), we nd ′ Ẏ = F ′ (X) × Ẋ = fp′ (Xp−1) × fp−1 (Xp−2 ) × · · · × f1′ (X0 ) × Ẋ 2 (2) http://www-sop.inria.fr/tropi s/ INRIA Tangent and Adjoint dierentiation of OPA whi h is most u ts are mu h 7 heaply exe uted from right to left be ause matrix×ve tor prodheaper than matrix×matrix produ ts. This is also the most onvenient exe ution order be ause it uses the intermediate values P builds them. X = F ′∗ (X) × Y of Xk in the same order as the program On the other hand the adjoint derivative is the produ t the transposed Ja Y in the output spa e. The resulting X (Y · Y ). From equation (1), we nd weight ve tor dot produ t obian times a is the gradient of the ′∗ X = F ′∗ (X) × Y = f1′∗ (X0 ) × · · · × fp−1 (Xp−2 ) × fp′∗ (Xp−1 ) × Y (3) whi h is also most heaply exe uted from right to left. However, this uses the intermediate values Xk in the inverse of their building order in Regarding the runtime Ẏ and adjoint X ost only a small multiple of the original program slowdown fa tor is less than 4 in theory. In pra ti e it the tangent, whereas it below. Despite its higher m runs m The an be less than 2 for ost, the adjoint ode is still by large the heapest To get the gradient with the tangent mode would of the tangent is independent from P. an rea h up to 10 for the adjoint for a reason dis ussed way to obtain gradients. require P. ost for obtaining the derivatives, both tangent ode, one per dimension of X, whereas this ost with the adjoint mode. The di ulty of the adjoint mode lies in the fa t that it needs the intermediate values Xk in reverse order. To this end, TAPENADE basi ally uses a two-sweeps strategy, a alled Store-All. In the rst sweep (the forward sweep), opy of the original program P is run, together with Push statements that store intermediate values on a sta k just before they get overwritten. In the se ond sweep (the ba kward sweep), the derivative statements ompute the ′∗ elementary derivatives fk (Xk−1 ) for k = p down to 1, using Pop statements to restore the intermediate values as they are required. This in urs a ost in memory spa e as the maximum sta k size needed is attained at the end of the forward sweep, and is thus proportional to the length of the program P. There is also a runtime penalty for these sta k manipulations. TAPENADE implements a number of strategies [11℄ to mitigate this data-ow analysis of the program's values Xk that need to be stored. ontrol ow graph, redu ing the number of However for very long programs su h as OPA, involving unsteady simulations, Store-All an not work alone. ombines it with a storage/re omputation trade-o RR n° 6372 ost, based on stati TAPENADE alled  he kpointing. Tber et al. 8 Che kpointing redu es the maximum sta k size at the exe utions. Consider a pie e C of the original program P. ost of dupli ated Che kpointing illustrated on gure 2 means that during the main forward sweep, C C as pushes no value on the sta k. When the ba kward sweep rea hes ba k to the pla e where intermediate values are now missing on the sta k, it runs C a se ond time, this time with the Store-All strategy i.e. pushing values on the sta k. The ba kward sweep an then resume safely. To run C twi e requires that enough of its input values, a snapshot, are stored but the size of a snapshot is generally mu h less than the sta k size used by down the adjoint program. When C is well C. hosen, Obviously, this also slows he kpointing the peak size of the sta k by a fa tor of two. Che kpoints whi h an divide an be nested, in ase both the sta k's peak size and the adjoint runtime slowdown grow as little as the logarithm of the size of applies he kpointing to ea h pro edure an P. In its default mode, TAPENADE all. { C successive sweeps Figure 2: Che kpointing applied to the program pie e C. Rightwards arrows represent forward sweeps, thi k when they store intermediate values on the sta k, thin otherwise. Leftwards arrows represent ba kward sweeps. Bla k dots are stores, white dots are retrieves. Small dots are Push and Pops, big dots are snapshots. TAPENADE apa ity to generate robust and e ient tangent and adjoint odes has been demonstrated on several real-world test appli ations [15, 7, 1, 13, 16℄. Regarding the appli ation language, it in FORTRAN. Taking into a an handle programs written ount the new programming onstru ts provided by FORTRAN95 has required an important programming eort in the past few years, mostly to handle modules, stru tured data types, array notation, pointers, and dynami memory allo ation. Sin e the new OPA 9 is now written in FORTRAN95, dierentiation of OPA is a very realisti test for the new TAPENADE 2.2. INRIA Tangent and Adjoint dierentiation of OPA There exist several other AD tools. 9 Restri ting to the tools whi h, like TAPENADE, operate by sour e transformation, provide tangent and adjoint modes, use global program analysis to optimize the dierentiated have demonstrated their appli ability on large industrial odes, we ode, and an men- tion TAF [4℄ a pioneer of AD for meteorology, now the standard AD tool for the popular MIT Global Cir ulation Model. Unlike TAPENADE's, the adjoint mode of TAF regenerates the intermediate values an given initial point. This is Xk with Store-All strategy is getting blurred by nested joint su by re omputation from alled a Re ompute-All strategy. Comparison odes grow more alike as more he kpointing, as the ad- he kpoints are inserted. OpenAD [20℄, essor of ADIFOR and ADIC, uses the Store-All strategy. There are ex- periments to also apply OpenAD to the MIT GCM. The tool Adol-C [10℄, although using operator overloading instead of sour e transformation, is very popular and has been applied su adjoint mode essfully to many industrial appli ations. Its an be seen as an extension of the Store-All strategy: not only the intermediate values are stored on the sta k, but also the omputation graph to be dierentiated. This allows the AD tool to perform further optimizations on this graph, at the ost of a higher memory onsumption. 4 Applying TAPENADE to OPA We generated working tangent and adjoint odes for the omputational kernel of OPA, using TAPENADE. Depending on the nal appli ation ( f se tion 5), the a tual fun tion to dierentiate as well as the input and output variables may be dierent, but the te hni al di ulties that we en ountered are essentially the same. This se tion des ribes these points. 4.1 FORTRAN95 onstru ts The new OPA 9 uses extensively the modular had to extend the all-graph internal representation of TAPENADE to handle the nesting of modules and pro edures. into the dierentiated Be ause a module Essentially this nesting is mirrored ode. an dene private ferentiated modules do not have a RR n° 6372 onstru ts of FORTRAN95. We omponents, subroutines in the dif- ess to all variables of the original module. Tber et al. 10 Therefore the dierentiated module must ontain its own opy of all the original module's variables, types, and pro edures. This is a dierentiation model: the dierentiated the original ode; it must dierentiated ode ontain its own hange in TAPENADE's annot just all or use parts of opies of those. In other words, the ode need not be linked with the original. The interfa e me hanism of FORTRAN95 is a way to implement overloaded pro edures. This is stati overloading, whi h is resolved at ompile time. Therefore we had to extend TAPENADE type- he king phase to pletely solve the alls to interfa ed pro edures. om- Conversely, TAPENADE is now able to generate interfa es on the dierentiated pro edures, so that the general stru ture of the ode is preserved. The array notation of FORTRAN95 is used systemati ally in OPA. At the same time, dierentiation requires that many alls to intrinsi fun tions be split to propagate the derivatives. When these fun tions are used on arrays ("elemental" intrinsi s) TAPENADE must generate a ode whi h is far from trivial. For instan e the single statement from OPA: zws(:,:,:) = SQRT(ABS(psal(:,:,:))) generates in the adjoint mode abs1 = ABS(psal(:,:,:)) mask = (psal(:,:,:) .GT. 0.0) ... WHERE (abs1 .EQ. 0.0) abs1b = 0.0 ELSEWHERE abs1b = zwsb(:, :, :)/(2.0*SQRT(abs1)) END WHERE WHERE (.NOT.mask(:, :, :)) psalb(:, :, :) = psalb(:, :, :) - abs1b ELSEWHERE psalb(:, :, :) = psalb(:, :, :) + abs1b END WHERE Without going in too mu h detail into the adjoint dierentiation model, we observe that the test that is needed to prote t the dierentiated ode against INRIA Tangent and Adjoint dierentiation of OPA the non-dierentiability of dierentiation of ABS, SQRT 11 at 0, as well as the test that have been turned into WHERE ontrols the onstru ts to keep the runtime benets of array notation. Some temporary variables are introdu ed automati ally to store ontrol-ow de isions (e.g. abs1 and mask), although TAPENADE still doesn't do this in an optimal way on the example. OPA uses pointers and dynami DEALLOCATE). memory allo ation ( alls to ALLOCATE and This is an appli ation for the pointer analysis now available in TAPENADE, nding whether a variable has a derivative, even when this variable is a essed through a pointer. Unfortunately, dynami allo ation is handled partly, i.e. only in the tangent mode of TAPENADE. In the adjoint mode, we have no general strategy for memory allo ation and TAPENADE sometimes annot produ e a working an allo ate should be a ode. We understand that the adjoint of DEALLOCATE, and vi e-versa, but some be made by hand on the dierentiated 4.2 hanges must ode to make it work. Che kpointing and hidden variables OPA reads and writes several data les, not only during the pre- and postpro essing stages, but also during the omputational kernel itself. Sour e terms su h as the wind stress are being read at intermediate time steps. Also, some modules and pro edures dene private but annot be a SAVE variables, whose value is preserved essed from outside. are just examples of a Although unrelated, these two points ommon problem: they reentrant". If a alled pro edure modies an internal sible from the outside alling ontext to an identi al result. Similarly if the SAVE an make a pro edure non variable, it be omes impos- all the pro edure a se ond time with alled pro edure reads from a previously opened le, and just moves the read pointer further in the le, then it be omes impossible to all the pro edure twi e and obtain the same values read. Non reentrant pro edures are a problem for the the adjoint mode. We saw in se tion 3 that he kpointing strategy of he kpointing relies on alling the he kpointed pie e twi e, in su h a way that the se ond all is equivalent to the rst. To this end, a su ient subset of the exe ution ontext, the snapshot, must be saved and restored. Hidden variables like an internal the read pointer inside an opened le RR n° 6372 SAVE variable or annot be saved nor restored in general. Tber et al. 12 When then he kpointing would require hidden variables to be put in the snapshot, he kpointing should be forbidden. Similarly, when a pro edure only allo ates some memory, the allo ation must not be done twi e. If this pro edure is he kpointed, then one must deallo ate the memory when restoring the snapshot before the dupli ate all. TAPENADE is not yet able to do this automati ally. TAPENADE has some fun tionalities to problem, but in all ope with this hidden variables ases intera tion with the user is ne essary. First, TAPE- NADE issues a warning message when a subroutine be ause of a private SAVE annot be he kpointed variable. The message is issued only when this vari- able would be part of the snapshot for this pro edure. When this happened for OPA, we just turned by hand the variables in question into publi variables in the original ode. In prin iple this global ould also be done automati- ally. However there are only a handful su h variables, thus developing this is not our priority. When a subroutine is not reentrant be ause of I/O le pointers or be ause of isolated memory allo ation or deallo ation, then TAPENADE lets the user label the subroutine so that it must not be he kpointed. For OPA, we took another strategy: we modied the main I/O subroutines so that they always rst make sure that the le is opened and then only use dire t read into the le without using a read I/O pointer. Thus all I/O subroutines are reentrant. 4.3 Binomial Che kpointing Automati Dierentiation of OPA is one of the most ambitious appli ations of TAPENADE so far. It means building the adjoint of a pie e of ode that performs an unsteady nonlinear simulation over a very large number of time steps. Ea h time step omputes a new state whose size ranges in the hundreds of megabytes. In adjoint mode if no he kpointing was applied, whi h means that all intermediate values were to be stored on a sta k, we ould exe ute only a handful of time steps before we run out of memory even on our largest workstation. Che kpointing is ompulsory to ompute the adjoint over several thousands of time steps, whi h is our goal. We saw in se tion 3 that TAPENADE applies of subroutine alls, i.e. ea h all is he kpointing at the level he kpointed. This easy strategy is often INRIA Tangent and Adjoint dierentiation of OPA far from optimal. On one hand several 13 alls are better not TAPENADE now oers the option to mark sele ted On the other hand, he kpointed, and alls for not he kpointing. he kpointing should be applied at other lo ations. For example at the top level of the simulation program is a loop over many time steps. We denitely need an e ient he kpointing s heme applied at this level of time iterations. One lassi al solution used by TAF on the MIT GCM multi level re ursive he kpointing. Basi ally, it splits the ode [14℄, is alled omplete time inter- val into a small number of equidistant intervals, then apply the same strategy to ea h of the sub-intervals. For instan e 64 time steps an be split into 4 large intervals of 4 small intervals of 4 time steps, as sket hed on gure 3. This onsumes a maximum of 9 simultaneous snapshots, and the average number of dupli ate exe utions for a time step is 1000 time steps 2.25. In a more realisti situation, an be split into 10 large intervals of 10 small intervals of 10 time steps, and one an gure out that this onsumes a maximum of 27 simultaneous snapshots, and the average number of dupli ate exe utions for a time step is 2.7. 0 16 32 48 52 56 60 61 62 57 58 53 54 49 50 36 40 44 45 46 41 42 37 38 33 34 20 24 28 29 30 25 26 21 22 17 18 4 8 12 13 14 9 10 5 1 6 2 Figure 3: Three-levels ward he kpointing with 64 time steps and 9 snapshots. For- omputations go right, adjoint omputations go left. Bla k resent writing/taking a snapshot, white snapshot. RR n° 6372 ir les rep- ir les represent reading an available Tber et al. 14 However, it was shown in [21℄ that this strategy is not optimal. Under the reasonable assumptions that all time steps ost the same run time, and that the snapshot needed to run again from time step from step n to any later step n + x, the optimal distribution of nested n to n+1 is the same as to run Griewank and Walther have hara terized he kpoints, whi h follows a binomial law. With this optimal strategy, both spatial and temporal omplexity of the adjoint ode grow logarithmi ally with respe t to the number of time steps of the original simulation. In other words, both the slowdown fa tor whi h grows like the number of times ea h time step is exe uted, and the memory whi h grows like the number of simultaneous snapshots, grow logarithmi ally with the total number of time steps. In real appli ations, run-time and memory spa e do not behave symmetrially. One an always wait a little longer for the result, whereas the memory spa e is bounded. Therefore the maximum number of snapshots d that an be stored simultaneously is xed. Then [8℄ shows that the optimal strategy th gives a slowdown fa tor that grows only like the d root of the total number of time steps, whi h is still very good. Figure 4 shows the optimal he kpointing strategy for the same problem as gure 3 i.e. 64 time steps with memory for 9 snapshots. only 2. The average number of dupli ate exe utions for a time step is For the more realisti situation (1000 time steps and memory for 27 2.57. snapshots) the average number of dupli ate exe utions is only We implemented this optimal strategy in the adjoint ode of OPA. We made our rst experiments by hand modi ation of the adjoint ode produ ed by TAPENADE. Still, TAPENADE produ ed automati ally the pro edures that store and retrieve the snapshot, and therefore the hand modi ation was benign: given the number of time steps, a general pro edure 3 s hedules the optimal sequen e of a tions (store snapshot, retrieve snapshot, run time step, run adjoint time step) to dierentiate the omplete simulation. Further ver- sions of TAPENADE will fully automate this pro ess. Figure 5 shows the performan es on OPA. They are in good agreement with the theory. Noti e in parti ular the two small ine tion points on the and 800 iterations. urve around 150 iterations Going ba k to the optimality proof in [8℄, we see that the optimal strategy is parti ularly e ient when the number of time steps is 3A FORTRAN95 implementation of this s heduling pro edure an be found in www.inriasop/tropi s/ftp/Hi ham_Tber/ INRIA Tangent and Adjoint dierentiation of OPA 0 16 30 15 38 45 51 56 60 62 57 58 52 53 54 46 47 48 49 39 40 41 42 43 31 32 33 34 35 36 19 22 24 25 26 27 28 20 17 3 6 9 10 11 12 13 14 7 4 1 Figure 4: Optimal binomial he kpointing with 64 time steps and 9 snapshots 7.5 Slowdown factor 7 6.5 6 5.5 5 4.5 200 400 600 800 1000 1200 Total number of time steps Figure 5: Optimal binomial he kpointing with 15 snapshots: slowdown fa tor as a fun tion of the total length of the initial simulation. The slowdown fa tor is the run-time ratio of the adjoint RR n° 6372 ode ompared to the original ode. Tber et al. 16 exa tly (d + t)! d!t! where d is the number of snapshots and t is the number of dupli ate exe utions allowed per time step. For our target ma hine d = 15 and we nd η(15, 2) = 136 and η(15, 3) = 816, whi h orresponds to the ine tion points of gure 5. η(d, t) = For the previous version OPA 8, the adjoint was written by hand. Nevertheless, even a hand-written adjoint must implement strategies to retrieve intermediate states in reverse order that is, something very lose to Looking at this hand-written adjoint, we rst observe that the he kpointing. he kpointing strategy is neither multi level nor optimal binomial. It is more like a single level strategy, with one snapshot stored every xed number of time steps. During the reverse sweep, states between two stored snapshots are rebuilt approximately using linear interpolation. The advantage is that few time steps are evaluated twi e, and therefore the slowdown fa tor remains well below 4. We an see at least two drawba ks. First, this hand manipulation requires deep knowledge of the original program and of the underlying equations. This method does not blend easily with Automati Dierentiation. It is not yet automated in any AD tool and therefore tedious and error-prone ode manipulations would still be ne essary. Se ond, this introdu es approximation errors into the omputed derivatives, whose mathemati al behavior is un lear. The gradient obtained in the end is used in omplex optimizations or data-assimilation loops, and small errors may result in poor onvergen e. In any ase, for very large numbers of time steps, we believe a trade-o between exa t binomial he kpointing and approximate interpolation is worth experimenting. Interpolation is probably good enough for many variables that vary very slowly, and whi h ould be designated by the end-user, and only the other variables would need to be stored. 4.4 Iterative linear solver The OPA model solves an ellipti equation at the end of ea h time step, using an iterative method that generates a sequen e of approximations of the exa t solution. The me hani al appli ation of AD on this kind of methods gives a sequen e of derivatives of the approximate solutions with the same number INRIA Tangent and Adjoint dierentiation of OPA 17 of iterations as the original solver. The reason is that AD keeps the ow of ontrol of the original program in the dierentiated program. In parti ular the onvergen e tests are still based only on the non-dierentiated variables. Naturally, one may ask whether and how AD-produ ed derivatives are reasonable approximations to the desired derivative of the exa t solution. The issues of derivative onvergen e for iterative solvers in relation to AD are dis ussed in [6, 9, 2℄. OPA provides two alternative algorithms to solve the ellipti PCG for Pre onditioned Conjugate Gradient, and SOR for Su Relaxation method. Both algorithms give equation: essive Over- orre t results for the original ode, but PCG is generally preferred thanks to its e ien y and ve torization properties. However, the AD-dierentiated algorithms. Figure 6 tives obtained by divided dieren es. with the SOR algorithm remain reases. be ome On the ode gives dierent results using the two ompares the AD-derivatives with approximate derivaWe see that the derivatives obtained orre t when the number of time steps in- ontrary, the derivatives obtained with the PCG algorithm ompletely wrong after 80 time steps. Noti e that this o urs in tan- gent mode as well as in adjoint mode: the derivatives obtained with PCG, although wrong, remain identi al in tangent and adjoint. Our explanation is that ea h iteration of PCG involves the omputation of s alar produ ts of vari- ables that depend on the state ve tor, thus making the numeri al algorithm nonlinear even though the ellipti equation is linear. In [6℄, Gilbert has shown that the appli ation of AD to a xed point iteration gives a derivative xed point iteration that in the onverges R-linearly to the desired derivative in parti ular ase of a large this is not the ontra tive iterate or se ant updating. Unfortunately ase for quasi-Newton iterative solvers su h as PCG, for whi h there is no similar onvergen e result to our knowledge. To solve this problem for the tangent-dierentiated OPA we exploit the linearity of the ellipti system, and for the adjoint-dierentiated OPA we ex- ploit the self adjointness property of the ellipti operator [22℄. We an thus use the original PCG routine itself to solve for the dierentiated linear systems. Pra ti ally, we do this using the so- alled bla k-box feature provided in TAPENADE. Figure 6 shows that (here for the tangent mode) the PCG gives the same a RR n° 6372 ura y as the SOR solver. 18 Tber et al. Figure 6: evolution of the relative error between tangent derivative and divided dieren es, for the three strategies: SOR and straightforward AD, PCG and straightforward AD, PCG with the bla k box strategy INRIA Tangent and Adjoint dierentiation of OPA 19 In another experiment, we tried to use straightforward AD with the PCG solver, but this time xing the number of PCG iterations to some very high value. We observed that the derivatives be ome dieren es. This expensive and the oherent again with divided ould be another way to solve our problem, but it is ertainly hoi e of the high iteration number is deli ate. This prob- lem denitely deserves further study, and onrms the general re ommendation not to dierentiate solvers of a nonlinear kind, and use a bla k-box strategy instead. 5 Validation Experiments 5.1 The Corre tness test lassi al way to gent and adjoint he k for orre tness of the automati ally generated tan- odes is as follows: 1. Choose an arbitrary input X and and arbitrary dire tion Ẋ . Compute the Divided Dieren e DD = for a good enough small F (X + εẊ) − F (X) ε ε. 2. Using the tangent dierentiated program, 3. Using the adjoint dierentiated program, and nally test for the derivative he k that Ẏ = F ′ (X) × Ẋ . ompute ompute X = F ′∗ (X) × Ẏ (DD · DD) = (Ẏ · Ẏ ) = (X · Ẋ). We performed this omplete global ORCA-2 simulation on 1000 time steps and its odes. The results are shown in table 1. The values mat h, and Table 1: Dot produ t test for 1000 time steps (DD · DD) (ε = 10−7 ) (Ẏ · Ẏ ) (X · Ẋ) RR n° 6372 4.405352760987440e+08 4.405346876439977e+08 4.405346876439867e+08 Tber et al. 20 (Ẏ · Ẏ ) and (X · Ẋ) mat h very well, up to the last few digits, whi h shows that the tangent and adjoint in a dierent of odes really ompute the same derivatives, only omputation order as shown by equations (2) and (3). The values (DD · DD) and (Ẏ · Ẏ ) don't mat h so well, be ause of the weakness of the Divided Dieren es approximation. Figure 7 shows this weakness: For a small 0 10 −2 10 −4 10 −6 10 −12 10 −10 −8 10 10 −6 ε 10 −4 −2 10 10 Figure 7: Relative error of Divided Dieren es with respe t to AD-generated derivatives, value of of ε, ε, omputed for various values of of the step size the dominant error is due to ma hine a ura y. For a large value the dominant error is due to the se ond derivatives of minimizes both errors, but 5.2 ε annot eliminate them F. The best ε ompletely. Sensitivity analysis on a long simulation One of the main appli ation of adjoint models is the sensitivity analysis i.e. the study of how model output varies with hanges in model inputs. Using dire t or statisti al methods would require many integration of the non linear model while one adjoint model integration is enough to ompute this sensitivity. As an example, gure 8 shows the output map of the sensitivity of the North Atlanti meridional heat ux at 29°N to hanges in the initial sea surfa e temperature (SSTt0 ) over one year integration period, starting January 1, 1998. This is INRIA Tangent and Adjoint dierentiation of OPA done by omputing the gradient respe t to J= Z tN t0 where Ω v SSTt0 of T.v dxdzdt Ω ross se tion at 29°N in the North Atlanti , is the zonal temperature and ZZ 21 is the meridional T is the urrent velo ity. Contours in gure 8 show where variation of initial SST would ee t the most upon heat transport at 29°N. It shows large s ale patterns mainly lo ated north of the 29°N parallel and in the Caribbean sea with a strong spot o Moro o. These results are onsistent with those obtained by Marotzke et al. ([18℄) This map was omputed by the TAPENADE-generated adjoint of OPA on the global ORCA2 grid, over 5475 time steps (1 year). This experiment was done with the SOR algorithm as the iterative linear solver. The TAPENADEgenerated adjoint omputed this sensitivity map in a time that is only 8.03 times that of the original simulation. 5.3 Data Assimilation For further validation of the automati ally generated derivatives, we out a data assimilation experiment. arried This was done in a so- alled twin ex- periment framework whereby the dire t model traje tory is used to generate syntheti observations. The initial sea surfa e temperature is perturbed by a white noise and it has to be re overed using variational data assimilation te hniques. Syntheti observation are given by the sea surfa e height (SSH) and the sea surfa e salinity (SSS) generated from the model's original outputs starting from the unperturbed SST. The ost fun tion to be minimised is J(SST (t0 )) = Z tN k SSH(t) − SSH o(t) k2 + k SSS(t) − SSS o (t) k2 dt (4) t0 Where the supers ript SSS(t) For o stands for syntheti observation and SSH(t) and are model output. omputing ost issues, only the Antar ti zoom of ORCA2 is onsid- ered, the minimisation is done an iterative gradient sear h algorithm where RR n° 6372 Tber et al. 22 Figure 8: Sensitivity map of the North Atlanti line), with respe t to heat transport at 29°N (dotted hanges in the initial surfa e temperature INRIA Tangent and Adjoint dierentiation of OPA the gradient of J is 23 umputed using adjoint te hniques. Figure 9 illustrates the performan e of the optimization loop for an integration period of 1 month i.e. 450 time steps. The ost fun tion de reases by two orders of magnitude. Figure 10 indi ates that the true solution (top panel) is re overed with a good approximation (bottom panel) from the randomly perturbed one(middle panel), showing the quality of the derivatives obtained. 6 Cost function 10 5 10 4 10 0 10 1 2 10 10 Iterations Figure 9: Twin experiment: Convergen e of the ost fun tion 6 Con lusion and Outlook The eort to build the tangent and adjoint odes for the previous version 8 of the OPA o ean General Cir ulation Model has ost several months devel- opment from an experien ed resear her. For the new version OPA 9 written in FORTRAN95, the use of the AD tool TAPENADE signi antly redu es this eort. Our rst numeri al appli ations show the quality of the derivatives obtained. This works validates the hoi e of AD as the strategy to obtain the tangent and adjoint for OPA 9, and for the versions to ome. At the same time, OPA is the largest FORTRAN95 appli ation dierentiated with TAPENADE. This work has pointed at a number of limitations of RR n° 6372 24 Tber et al. Figure 10: Twin experiment: True eld (top), Initial perturbed eld (middle) and identied optimal sea surfa e temperatures (bottom) INRIA Tangent and Adjoint dierentiation of OPA 25 TAPENADE that have been lifted. Other limitations remain, su h as the nonreentrant pro edures, whi h need to be addressed in future work. Su dierentiation of OPA denitely in reases our essful onden e in TAPENADE. This works is also an additional illustration of the superiority of the binomial he kpointing strategy, ompared to multi level he kpointing. By the standards of other appli ation elds, e.g. CFD, a slowdown of the adjoint of only 7 for a nonsteady simulation on 1000 time steps would be ode onsidered very good. By the standards of weather simulation or o ean modeling however, s ientists expe t yet faster adjoints, at the tion. Even if we ost of a radi al approxima- onsider that these approximations hange the mathemati al nature of the optimization pro ess, we understand they are ne essary and we shall study how they an be proposed as an option by the AD tool. This work has underlined several dire tions for further resear h in AD and AD tools. Some of them are already being studied by resear hers in our groups. Considering the appli ation language, two onstru ts need to be dierentiated better: ˆ The next experiment to be made very soon is to apply TAPENADE to the parallelized version of OPA. This is ne essary before the generated tangent and adjoint ˆ odes an be used in produ tion ontext. The OPA sour e makes extensive use of the prepro essor dire tives su h as #IFDEF. TAPENADE does not deal with these dire tives be ause they do not respe t the synta ti stru ture of a ode. Handling these dire tives in the AD tool is in our opinion hopeless. What might be done though, is to generate dierentiated odes for ea h possible prepro essed and devise a tool to put the dire tives ba k into the dierentiated This is made easier if the dierentiated of the original, as is the ode ode, odes. losely follows the stru ture ase with TAPENADE. Considering spe i ally adjoint dierentiation, we hope to obtain more e ient ode through a more systemati ellipti operator. exploitation of self-adjointness, e.g. We also hope to optimize the its present version, TAPENADE applies Using proling information, we believe we whi h he kpointing is useless or he kpointing strategy. he kpointing to ea h pro edure an dete t several pro edure In all. alls for ounter-produ tive. TAPENADE is already able to use this information to produ e a better adjoint. RR n° 6372 of the Tber et al. 26 Referen es [1℄ W. Castaings, D. Dartus, M. Honnorat, F.-X. Le Dimet, Y. Loukili, and J. Monnier. Automati dierentiation: A tool for variational data assimi- lation and adjoint sensitivity analysis for ood modeling. In Bü ker et al, editor, Automati Dierentiation: Appli ations, Theory, and Implemen- tations, LNCSE, pages 249262. Springer, 2005. [2℄ B. Christianson. Reverse a Opti- umulation and attra tive xed points. mization Methods and Software, 3:311326, 1994. [3℄ P. Courtier, J.-N. Thépaut, and A. Hollingsworth. A strategy for operational implementation of 4d-var, using an in remental approa h. Meteorol. So ., 120:13671387, 1994. [4℄ R. Giering. Q. J. R. Tangent linear and Adjoint Model Compiler, Users manual, 1997. http://www.autodi. om/tam . [5℄ R. Giering and T. Kaminski. Re ipes for adjoint ode ACM onstru tion. Transa tions on Mathemati al Software, 24(4):437474, 1998. [6℄ J.C. Gilbert. Automati dierentiation and iterative pro esses. tion Methods and Software, 1:1321, 1992. [7℄ M.B. Giles, D. Ghate, and M.C. Duta. Using automati adjoint CFD ode development. In Uthup et al, editor, Aerospa e Design and Optimization, Optimiza- dierentiation for Re ent Trends in pages 363373. Tata-M Graw Hill, New Delhi, 2005. Post-SAROD-2005, Bangalore, India. [8℄ A. Griewank. A hieving logarithmi plexity in reverse automati Software, 1:3554, 1992. growth of temporal and spatial dierentiation. om- Optimization Methods and [9℄ A. Griewank, C. Bis hof, G. Corliss, A. Carle, and K. Williamson. Derivative onvergen e for iterative equation solvers. Software, 2:321355, 1993. Optimization Methods and INRIA Tangent and Adjoint dierentiation of OPA 27 [10℄ A. Griewank, D. Juedes, J. Srinivasan, and C. Tyner. ADOL-C, a pa kage for the automati dierentiation of algorithms written in C/C++. Trans. Math. Software, 22(2):131167, 1996. [11℄ L. Has oët and M. Araya-Polo. The adjoint data-ow analyses: malization, properties, and appli ations. Appli ations, Theory, and Tools, Le In ACM For- Automati Dierentiation: ture Notes in Computational S ien e and Engineering. Springer, 2005. Sele ted papers from AD2004 Chi ago. [12℄ L. Has oët and V. Pas ual. Tapenade 2.1 user's guide. Te hni al Report 0300, INRIA, 2004. [13℄ L. Has oët, M. Vázquez, and A. Dervieux. Automati optimum design, applied to soni dierentiation for boom redu tion. In Kumar et al., editor, Pro eedings of ICCSA'03, Montreal, Canada, pages 8594. LNCS 2668, Springer, 2003. [14℄ Heimba h, P. and Hill, C. and Giering, R. of the parallel MIT general dierentiation. An e ient exa t adjoint ir ulation model, generated via automati Future Generation Computer Systems, 21(8):13561371, 2005. [15℄ J. Kim, E. Hunke, and W. Lips omb. Sensitivity analysis and parameter tuning s heme for global sea-i e modeling. O ean Modeling Journal, 14(1 2):6180, 2006. [16℄ C. Lauvernet, F. Baret, L. Has oët, and F.-X. LeDimet. Improved estimates of vegetation biophysi al variables from meris toa images by using spatial and temporal Beijing, China, 2005. onstraints. In pro eedings of the 9th ISPMSRS, [17℄ G. Made , P. Dele luse, M. Imbard, and C. Levy. Opa8.1 o ean general ir ulation model referen e manual. Te hni al report, Pole de Modelisation, IPSL, 1998. [18℄ J. Marotzke, R. Giering, K.Q. Zhang, D. Stammer, C. Hill, and T. Lee. Constru tion of the adjoint MIT o ean General Cir ulation Model and RR n° 6372 Tber et al. 28 appli ation to atlanti heat transport sensitivity. J. Geophys. Res., (104(C12)):29,52929,548, 1999. [19℄ O. Talagrand. The use of adjoint equations in numeri al modeling of the Automati Dierentiation of Algorithms: Theory, Implementation and Appliation, pages 169180, 1991. Philadelphia, Penn: SIAM. atmospheri ir ulation. In A. Griewank and G. Corliss, editors, [20℄ J. Utke, U. Naumann, M. Fagan, N. Tallent, Strout M., P. Heimba h, C. Hill, and C. Wuns h. Automati OpenAD/F: A modular, open-sour e tool for Dierentiation of Fortran odes. Te hni al report ANL/MCS- P1230-0205, Argonne National Laboratory, 2006. Submitted to ACM TOMS. [21℄ A. Walther and A. Griewank. Advantages of binomial he kpointing for Numeri al Mathemati s and Advan ed Appli ations, pages 834843. Springer, Berlin, memory-redu ed adjoint al ulations. In Feistauer et al, editor, 2003. Pro eeding of ENUMATH 2003. [22℄ A. Weaver, J. Vialard, and D. Anderson. Three- and four-dimensional variational assimilation with an o ean general tropi al pa i he ks. ir ulation model of the o ean: I. formulation, internal diagnosti s and Monthly Weather Review, 131(7):13601378, 2003. onsisten y INRIA Unité de recherche INRIA Sophia Antipolis 2004, route des Lucioles - BP 93 - 06902 Sophia Antipolis Cedex (France) Unité de recherche INRIA Futurs : Parc Club Orsay Université - ZAC des Vignes 4, rue Jacques Monod - 91893 ORSAY Cedex (France) Unité de recherche INRIA Lorraine : LORIA, Technopôle de Nancy-Brabois - Campus scientifique 615, rue du Jardin Botanique - BP 101 - 54602 Villers-lès-Nancy Cedex (France) Unité de recherche INRIA Rennes : IRISA, Campus universitaire de Beaulieu - 35042 Rennes Cedex (France) Unité de recherche INRIA Rhône-Alpes : 655, avenue de l’Europe - 38334 Montbonnot Saint-Ismier (France) Unité de recherche INRIA Rocquencourt : Domaine de Voluceau - Rocquencourt - BP 105 - 78153 Le Chesnay Cedex (France) Éditeur INRIA - Domaine de Voluceau - Rocquencourt, BP 105 - 78153 Le Chesnay Cedex (France) http://www.inria.fr ISSN 0249-6399
5cs.CE
arXiv:1606.04074v2 [cs.AR] 18 Jun 2016 ENTRA: Whole-Systems Energy Transparency Kerstin Edera , John P. Gallagherb,c,∗, Pedro López-Garcı́ac,e , Henk Mullerd , Zorana Bankovićc , Kyriakos Georgioua , Rémy Haemmerléc , Manuel V. Hermenegildoc,f , Bishoksan Kafleb , Steve Kerrisona , Maja Kirkebyb , Maximiliano Klemenc , Xueliang Lib , Umer Liqatc , Jeremy Morsea , Morten Rhigerb , Mads Rosendahlb a University of Bristol, UK University, Denmark c IMDEA Software Institute, Spain d XMOS Ltd., Bristol, UK e Spanish Council for Scientific Research, Spain f Technical University of Madrid, Spain b Roskilde Abstract Promoting energy efficiency to a first class system design goal is an important research challenge. Although more energy-efficient hardware can be designed, it is software that controls the hardware; for a given system the potential for energy savings is likely to be much greater at the higher levels of abstraction in the system stack. Thus the greatest savings are expected from energy-aware software development, which is the vision of the EU ENTRA project. This article presents the concept of energy transparency as a foundation for energyaware software development. We show how energy modelling of hardware is combined with static analysis to allow the programmer to understand the energy consumption of a program without executing it, thus enabling exploration of the design space taking energy into consideration. The paper concludes by summarising the current and future challenges identified in the ENTRA project. 1. Introduction Energy efficiency is a major concern in systems engineering. The EU’s Future and Emerging Technologies MINECC programme aims to “lay the foundations for radically new technologies for computation that strive for the theoretical limits in energy consumption.” The research objectives range from physics to software; they include, among others, new elementary devices, as well as “software models and programming methods supporting the strive for the energetic limit.” The ENTRA project, entraproject.eu, addresses the latter objective; ∗ Corresponding author Email address: [email protected] (John P. Gallagher) Preprint submitted to MICPRO June 21, 2016 WP7 Dissemination WP1 WP4 Energy-aware software engineering tested on Energy optimization enables enables Energy Transparency Case Studies measured against Benchmarks WP6 WP5 relies on relies on Energy Modelling Program Analysis WP2 WP3 Project Management WP8 Figure 1: Overview of the ENTRA project work plan we focus on energy transparency, which we regard as a key prerequisite for new energy-aware system development methods and tools. The ENTRA project ran from October 2012 to December 2015 (39 months) and was funded by the European Commission under the 7th Framework Programme. The consortium contained three research institutions and one industrial partner specialising in the design of advanced multicore microcontrollers (XMOS xCORE). The overview of the project structure is shown in Figure 1. The foundations for the central concept of energy transparency were developed in two work packages (WP2 and WP3) on energy modelling and energy analysis respectively. Energy transparency enables energy optimisations, studied in WP4. WP1 concerned the development of tools and techniques applicable in energy-aware software development. Finally there were work packages dealing with benchmarking, evaluation, dissemination and project management. This paper summarises mainly the outcomes of work packages WP1, WP2, WP3, WP4 and WP6. The public deliverables of the project are all available on the project website http://entraproject.eu. After this introduction, we discuss the two main areas of research supporting energy transparency. Section 2 presents approaches for building models of software energy consumption at different levels of abstraction. Section 3 contains an overview of static resource analysis techniques, showing how an energy model 2 can be used in analysis of a program’s energy consumption. Section 4 summarises the role of energy transparency in energy-aware software development, discusses the achievements in the project so far, and outlines current challenges and directions for future research. 1.1. Energy-Aware Computing Energy-aware computing is a research challenge that requires investigating the entire system stack from application software and algorithms, via programming languages, compilers, instruction sets and micro architectures, to the design and manufacture of the hardware. This is because energy is consumed by the hardware performing computations, but the control over the computation ultimately lies within the applications running on the hardware. While hardware can be designed to save a modest amount of energy, the potential for savings is far greater at the higher levels of abstraction in the system stack. An estimate from Intel [1] is that energy-efficient software can realize savings of a factor of three to five beyond what can be achieved through energy efficient hardware. Roy and Johnson [2] list five objectives that “help make software design decisions consistent with the objectives of power minimization”: match the algorithm to the hardware; minimize memory size and expensive memory accesses; optimise the performance, making maximum use of available parallelism; take advantage of hardware support for power management; and select instructions, sequence them, and order operations in a way that minimizes switching in the CPU and datapath. To achieve these objectives requires the programmer and/or the tools to understand the relationship between code and energy usage. Energy Transparency aims to enable exactly this. 1.2. Energy Transparency The concept of energy transparency is at odds with the trend in modern software engineering - the desire to abstract away machine-level details using high-level languages, abstract data types and classes, libraries and layers of interpretation or compilation, in the interests of portability, programmer productivity, understandability and software reuse. By contrast, energy transparency requires making visible how software impacts on energy consumption when executed on hardware. Availability of this information enables system designers to find the optimal trade-off between performance, accuracy, and energy usage of a computation. To achieve energy transparency, models of how energy is consumed during a computation are required. As will be discussed in Section 2, such models can be established at different levels of abstraction, ranging from models that characterize individual functional hardware blocks [3], via Instruction Set Architecture (ISA) characterization models [4, 5, 6], to models based on intermediate representations used by the compiler [7, 8]. The final energy models provide information that feeds into static resource usage analysis algorithms [9, 10, 11, 12, 13, 14, 15, 16], where they represent the energy usage of elementary parts of the computation. This is discussed in Section 3. 3 2. Energy Modelling Energy models can rely on information at several possible abstraction levels, from gate-level hardware description, through functional block and Instruction Set Architecture (ISA), up to performance counter or transaction based abstractions. Energy models at higher levels tend to be faster to use, but have lower accuracy than models at lower levels of abstraction. In ENTRA, the aim was to provide accurate modelling that can be exploited through analysis that is applied in order to estimate the energy consumed by software. 2.1. Defining and constructing an energy model The ISA is a practical level of abstraction for energy modelling, because it expresses underlying hardware operations and their relationship with the intent of the software. Constructing a model at this level gives us the following benefits: energy costs can be attributed directly to individual machine instructions as output by the back end of the compiler; instruction properties and energy consumption are strongly correlated, e.g. energy consumption typically increases with increasing numbers of operands; and machine instructions can be traced back to the original source code statements written by the software developer, as well as to various intermediate representations. However, energy modelling at the ISA level requires additional effort in order to produce useful models: instruction costs must be captured through a profiling suite and measurement of device power; in addition, indirect or statistical approaches are required to characterise instructions that cannot be profiled through direct measurements. Furthermore, for multi-threaded architectures other properties such as the cost of running multiple threads and the cost of idle periods must be determined. Our target architecture for energy modelling and analysis is the XMOS xCORE embedded microcontroller [17]. Beyond offering timing-deterministic instruction execution, the xCORE is hardware multi-threaded and comes in a variety of multi-core configurations. The xCORE architecture is simple by design and, thus, ideal to investigate the advanced energy modelling and static analysis techniques required to achieve energy transparency. The techniques we developed are readily transferable to other deeply embedded, cache-less, IoTtype processors such as those in the ARM Cortex M series or the Atmel AVR. The fact that the xCORE offers multi-threading made it a particularly interesting target for the ENTRA project. We have shown that in the xCORE the number of active threads has an impact upon energy consumption [6]. As such, the model must take this into account. Traditional ISA-level models, such as that of [18], can attribute energy costs simply to instructions, the transitions between instructions, and any additional effects that impact on energy consumption, such as cache hits and misses. Although we build on this principle, parallelism has to be considered, yielding 4 a more complex model equation for Ep , the energy consumed by a program p: Ep = Pb Nidl Tclk + Nt X X ((Mt Pi O + Pb ) Ni,t Tclk ) (1) t=1 i∈ISA In Eq. (1) the energy consumption is split into two parts, capturing idle and active processor behaviour, respectively. For the former, we consider the base processor idle power, Pb , that is present even when the device is waiting on external events, multiplied by the the number of cycles with no active threads, Nidl , and the clock period, Tclk . For the latter, individual instruction costs are accounted for based on their costs Pi , as well as an aggregated inter-instruction overhead, O, and a parallelism scaling factor, Mt , determined by the number of active threads t. This is calculated for each ISA instruction i, and multiplied by the number of occurrences in the target program at that particular level of parallelism, Ni,t , as well as the clock period, Tclk . Model parameters are separated into two groups. Values for the first group of constants are obtained by profiling the processor for a fixed clock period Tclk , yielding the base power Pb , inter-instruction overheads O, per-instruction costs Pi and parallelism scaling Mt ; all measured in mW . The second group must be determined through analysis of the target program. These include the number of idle cycles, Nidl , the number of threads, Nt , in the program, and the instruction counts, Ni,t , for each instruction i and number of active threads t. If the analysis can produce these values, Eq. (1) can be used to estimate program energy. We have demonstrated various simulation- and static analysis-based methods that follow this principle. To illustrate instruction profiling, an example heat map representing the device power from interleaving a selected subset of data manipulation instructions is shown in Fig. 2. The profiling framework executes tightly coupled threads through the xCORE pipeline, with random, valid operand values to produce an average power estimate for each instruction. Random input data is shown to cause higher power dissipation than more constrained data that would be found in real-world programs [19], e.g. due to data dependencies, thus creating a modest over-estimate in most cases. Instruction profiling can only be used to determine the costs of instructions that can be executed repeatedly and in succession. The cost of other instructions can be estimated with a generic average or grouped by operand count [6], or more accurately through a regression tree approach that identifies the most significant of a set of features, including instruction length, whether memory is accessed and others, to find the most similar directly profiled instruction [20]. The latter is the most accurate of the three approaches and adds no significant modelling overhead. This form of model can be used by various analysis methods. An Instruction Set Simulation (ISS) can produce an instruction trace from which the instruction counts and thread activity can be determined. A cycle-accurate ISS will achieve the best model accuracy. Alternatively, per-thread instruction execution statistics can be used instead to extrapolate the model terms. This is faster 5 195 165 150 Power (mW) 180 135 120 105 buf u6 bu u6 zext rus sext rus ldc ru6 ldapf u10 ldapb u10 zext 2r sext 2r andnot 2r mkmsk rus mkmsk 2r clz l2r ldapf lu10 ldapb lu10 ldc lru6 neg 2r not 2r byterev l2r bitrev l2r eq 2rus ldw 3rX ldw 3r ld16s 3rX ld16s 3r ld8u 3r stw 3r st16 3r ld8u 3rX st8 3r ldaw u6 shl 3r shr 3r shl 2rus eq 3r shr 2rus lsu 3r lss 3r add 2rus sub 2rus ldaw lru6 and 3r or 3r sub 3r add 3r ashr l2rus ldawb l2rus ldawf l2rus ashr l3r ldawb l3r crc32 l3r xor l3r ldawf l3r lda16f l3r lda16b l3r mul l3r crc8 l4r maccu l4r maccs l4r ladd l5r lsub l5r lmul l6r Even threads instruction (name & encoding) 210 lmul l6r lsub l5r ladd l5r maccs l4r maccu l4r crc8 l4r mul l3r lda16b l3r lda16f l3r ldawf l3r xor l3r crc32 l3r ldawb l3r ashr l3r ldawf l2rus ldawb l2rus ashr l2rus add 3r sub 3r or 3r and 3r ldaw lru6 sub 2rus add 2rus lss 3r lsu 3r shr 2rus eq 3r shl 2rus shr 3r shl 3r ldaw u6 st8 3r ld8u 3rX st16 3r stw 3r ld8u 3r ld16s 3r ld16s 3rX ldw 3r ldw 3rX eq 2rus bitrev l2r byterev l2r not 2r neg 2r ldc lru6 ldapb lu10 ldapf lu10 clz l2r mkmsk 2r mkmsk rus andnot 2r sext 2r zext 2r ldapb u10 ldapf u10 ldc ru6 sext rus zext rus bu u6 buf u6 Odd threads instruction (name & encoding) Figure 2: Power dissipation of multi-threaded instruction interleaving in the XMOS xCORE processor. Dashed lines denote a change in operand count, axis label colour indicates 16-bit (green) and 32-bit (red) instruction encoding. 6 than producing a full trace, but can increase estimation error. It has been shown to yield an acceptable ±10 % margin in benchmarks [6]. As we will see in Section 3, the program-dependent terms in the model can be calculated by static analysis, removing the simulation step and allowing rapid design-space exploration, as well as parameterised, bounded energy estimations. The values of Ni,t and Nidl can be analysed as functions of the input state. This allows the derivation of energy functions characterising the energy consumption of all possible runs of a program, rather than a specific run or set of runs. In our experiments, tracing was up to two orders of magnitude slower than statistics-only simulation, the latter typically taking less than one minute. However, this can be mitigated by analysing single functions or blocks, ignoring other parts of the trace, and terminating as soon as the blocks of interest have been executed, making trace simulations take less than a minute in most of the cases we observed. Static analysis can, of course, achieve faster results, by analysing the same code blocks without simulation. A key prerequisite for achieving high accuracy in energy modelling at the ISA level is a predictable, time-deterministic architecture, where the instruction set gives an accurate view of how the processor will behave. The xCORE’s thread scheduling and cache-less SRAM memory subsystem, together with the absence of performance enhancing complexity in the micro-architecture, enabled us to achieve a very accurate model, which is essential to obtaining accurate energy predictions. Thus, as for worst case execution time (WCET) analysis, the results of energy modelling and energy consumption analysis are influenced by processor architecture, and predictability determines the accuracy achievable as well as the complexity of the modelling and analysis techniques [21]. 2.2. Multi-core energy modelling For a multi-core system the ISS must accurately simulate the network behaviour in order to capture the timing and link-traversal of data. This allows accurate estimation of communicating multi-core processes [20]. Static analysis must provide similar characterisation, therefore instruction execution, network behaviour and the flow of communication between processes, must be predictable in order to enable energy transparency. The single-core, multi-threaded processor model achieves an average error of 2.7 % over a suite of single- and multi-threaded benchmarks, with a standard deviation of 4.4 %. The multicore model demonstrates an average energy estimation error of −4.9 % with a standard deviation of 3.9 %. Models with less than 10 % error provide suitable accuracy for energy estimations. 2.3. Energy modelling at higher levels of software abstraction Performing static analysis at the ISA level can benefit from good accuracy due to its closeness to the hardware, but it can suffer from a loss of useful information such as program structure and types [22]. A good compromise is found by modelling at the Intermediate Representation (IR) used by compilers, where program information is preserved. Since the compiler is the natural place 7 for optimisations, modelling and predicting the energy consumption at IR level could therefore enable energy specific optimisations. Using a mapping technique, we lifted the energy model in Eq. (1) to the IR level of the compiler [8], implemented within the LLVM tool chain [23]. ISA level energy models can thus be propagated up to LLVM IR level, allowing energy consumption estimation of programs at that level. This enables static analysis to be performed at a higher level than ISA, thus making energy consumption information accessible directly to the compiler and optimiser. The mapping technique determines the energy characteristics of LLVM IR instructions. It provides on-the-fly energy characterization that takes into consideration the compiler behavior, control flow graph (CFG) structure, types and other aspects of instructions. Taking into account such information improved the accuracy of the LLVM IR characterization significantly. The experimental evaluation demonstrated that the mapping technique allowed for energy consumption transparency at the LLVM IR level, with accuracy keeping within 1% of ISA-level estimations in most cases [8]. In principle, the same mapping technique may be used to map the energy consumption of programs to even higher levels, such as the source code. However, a fine grained characterization for each line of source code using this method is impractical due to the numerous transformations and optimisations introduced by the compiler and the loss of accuracy resulting from the difficulty of associating energy consumption costs obtained at lower levels to source code lines. An alternative approach to building a source-level energy model was investigated in [24]. The target language here was Java on the Android platform; any attempt to map a lower-level energy model up to the source code would need to deal explicitly with the Java virtual machine as well as operating system layers, a highly impractical strategy. Instead, the basic energy-consuming operations from the source code are identified and the correlations to energy costs are found by measuring energy consumption in a large number of execution cases and analyzing the results using techniques based on regression analysis. The resulting energy model of the basic operations implicitly includes the effect of all the layers of the software stack down to the hardware. The approach is inherently approximate; nevertheless such an approach may be the only feasible one in complex software stacks, when source-level energy models are needed, for instance to give the source-code programmer an energy profile of the code under development. 3. Static Analysis of Energy Consumption Static analysis is the other key component of energy transparency. It infers information about energy consumed by programs without actually running them. As with energy models, analysis can be performed on program representations at different levels in the software stack, ranging from source code (in different programming languages) to intermediate compiler representations (such as LLVM IR [23]) or ISA. 8 Static analysis at a given level consists of reasoning about the execution traces of a program at that level, in order to infer information (among other things) about how many times certain basic elements of the program will be executed. The role of the energy model is to provide information about the energy consumption of such basic elements; it is used by the analysis to infer information about energy consumption of higher-level entities such as procedures, functions, loops, blocks and the whole program. Analysis can also be performed at a given software level using energy models for a lower level. Such a model needs to be mapped upwards to the higher level, as described in Section 2.3. The information inferred by static analysis at a lower level can also be reflected upwards to a higher level using suitable mapping information. In the ENTRA project, this approach has been applied to the static analysis of XC programs running on xCORE architectures. However, our framework is language- and architecture-neutral. We will return to this in Section 4. 3.1. Analysis/modelling trade-off Our hypothesis was that the choice of level affects the accuracy of the energy models and the precision of the analysis in opposite ways: energy models at lower levels will be more precise than at higher levels while at lower levels more program structure and data structure information is lost, which often implies a corresponding loss of accuracy in the analysis. This hypothesis about the analysis/modelling level trade-off (and potential choices) is illustrated in Figure 3. In ENTRA we have explored different points in this space of combinations of analysis and modelling. Our experimental results [25] confirm that the expected trade-off exists, but also suggest that performing the static analysis at the LLVM IR level is a good compromise. LLVM IR is close enough to the source code level to preserve most of the program information needed by the static analysis, whilst close enough to the ISA level to allow the propagation of the ISA energy model up to the LLVM IR level without significant loss of accuracy. 3.2. Information inferred by analysis The information inferred by the analyzers is guided by its final use: program optimisation, verification, helping energy-aware software developers to make design decisions, and so on. For example, they can infer safe approximations, namely upper and lower bounds, on the energy consumed by the program or parts of it. These approximations can be functions parametrised by the sizes of the input data and other hardware features such as clock frequency and voltage. The analyzers can then infer concrete values of the parameters that yield the worst-case energy consumption of the program or its parts. Static energy profiling [26] determines the distribution of energy usage over the parts of the code. This can be very useful to the developer, showing which parts of the program are the most energy-critical. Some functions or blocks in the program are perhaps not particularly expensive in energy in themselves but 9 Internal  representa>on   Transforma>on   (including  asser>ons)   Energy  Model  +     Program  (including  asser>ons)   Layer  1   Analysis  Informa>on  loss   Energy  Modelling  Precision  Loss   Energy     Model   Transforma>on   Source  code   Analysis   HC  IR   Compiler   LLVM  IR   Energy     Model   Layer  2   Energy     Model   Op>miza>ons   Transforma>on   Op>mized  LLVM  IR   HC  IR   Analyser   LLVM  Code  Generator   Transforma>on   ISA   HC  IR   Energy  consump>on                  es>ma>ons   Layer  3   Hardware   Figure 3: Analysis/modelling level trade-off and potential choices [25] are called many times. Such parts are natural targets for optimisation, since there a small improvement can yield considerable savings. Note that the safety of bounds depends on energy models giving safe bounds for each instruction. This is a challenging problem which is discussed in Section 4. Safe bounds are vital for applying energy analysis to verifying or certifying energy consumption. 3.3. A generic resource analysis framework The resource analysis framework that we have developed is parametric with respect to resources and programming languages. Regarding resources, the common assertion language allows the definition of different resources and how basic components of a program affect the use of such resources. More concretely, it allows the encoding of different energy models for specific hardware architectures, and, in particular, the energy models developed for the xCORE architecture at the LLVM IR and ISA levels, described in Section 2. Regarding programming languages, we differentiate between the input language (which in ENTRA can currently be XC source, LLVM IR, or ISA) and the intermediate semantic program representation, which is what the resource analysis actually operates on. We use Horn Clauses as the intermediate program representation, referred to as the “HC IR.” A transformation is performed from each supported input language into HC IR, which is then passed to the 10 resource analysis. We have explored different approaches for this transformation. One approach is to perform a direct transformation into HC IR, and this has been applied both to ISA and LLVM IR code [22, 25]. Another approach consists in producing the HC IR by applying partial evaluation techniques to instrumented interpreters that directly implement the semantics of the language to be analysed [27]. In both cases, the resulting HC IR programs are analysed by the CiaoPP tool (see Section 3.5). Horn Clauses offer several features that make them convenient for analysis [28]. For instance, this representation inherently supports Static Single Assignment (SSA) and recursive forms. There is a current trend favouring the use of Horn Clause programs as intermediate representations in analysis and verification tools [29, 30, 31, 32]. Using the generic HC IR representation, the assertion language and the CiaoPP analysis tools, we have instantiated the general framework to produce a series of concrete energy analyzers which have allowed us to study the advantages and limitations of different techniques as well as the trade-offs implied by different choices of analysis and energy modelling levels. 3.4. A common assertion language We have defined a common assertion language as a vehicle for propagating energy-related information throughout the system levels, and for communication among the different analysis, verification, and optimisation tools, and the actors involved in software development. This assertion language allows expressing energy models for different architectures, writing energy consumption specifications, describing energy consumption of components that are not available at analysis time, expressing analysis results, and ensuring interoperability. We refer the reader to [33] and its references for a full description of the Ciao assertion language that is the basis for the assertions used in the HC IR, and the (internal) common assertion language of ENTRA [34]. The ENTRA common assertion language also includes a front end to express energy specifications and other energy related information in the XC source code. 3.5. Energy analysis using CiaoPP The input to the CiaoPP parametric static resource usage analyzer [13, 14, 15] is the HC IR, along with assertions in the common assertion language expressing the energy model for LLVM IR blocks and/or individual ISA instructions, and possibly some additional (trusted) information. The analyzer is based on an approach in which recursive equations (cost relations), representing the cost of running the program, are extracted from the program and solved, obtaining upper- and lower-bound cost functions (which may be polynomial, exponential or logarithmic) in terms of the program’s inputs [9, 10, 11, 12, 16]. These output cost functions express the energy consumption for each block in the HC IR, which can be mapped directly back to the language represented by the HC IR. The generic resource analysis engine is fully based on abstract interpretation [15], and defines the resource analysis itself as an abstract domain that 11 is integrated into the PLAI abstract interpretation framework [35] of CiaoPP. This brings in features such as multivariance, efficient fixpoints, and assertionbased verification and user interaction. The setting up and solving of recurrence relations for inferring closed-form functions representing bounds on the sizes of output arguments and the resource usage of the predicates in the program are integrated into the PLAI framework as an abstract operation. 3.6. Direct energy analysis of LLVM IR As mentioned, LLVM IR offers a good trade-off between analyzability and accuracy. In addition to using a generic approach based on CiaoPP and a translation to HC IR, the ENTRA project has experimented with an approach that uses similar analysis techniques but operates directly on the LLVM IR representation [36]. The advantage is that this approach can be integrated more directly in the LLVM toolchain; in principle it is applicable to any languages targeting LLVM. The energy model used is exactly the same as the one applied in [25] and described in Section 2.1. 3.7. WCET-inspired energy consumption static analysis Since the underlying challenges of analysing the timing and energy consumption behaviour of a program appear to be quite similar, in [8], we have applied well known WCET analysis techniques to retrieve energy consumption estimations. One of the most popular WCET techniques is implicit path enumeration (IPET) [37], which retrieves the worst case control flow path of programs based on a cost model that assigns a timing cost to each CFG basic block. We have replaced the timing cost model by the ISA energy model given in Equation (1). In the absence of architectural performance enhancing features, such as caches, this technique can provide safe upper bounds for timing. Through our experimental evaluation we have demonstrated that this is not the case for energy, as energy consumption, in contrast to time, is data sensitive (see Section 4). In order to explore the value and limits of applying IPET for energy consumption estimations, we have also extended the analysis to the LLVM IR level, using the LLVM IR energy characterization given by the mapping technique referred to in Section 2.3. Furthermore, we have extended the energy consumption analysis to multi-threaded embedded programs from two commonly used concurrency patterns: task farms and pipelines. The experimental evaluation on a set of mainly industrial programs demonstrates that, although the energy bounds retrieved cannot be considered safe, they can still provide valuable information for energy aware development, delivering energy transparency to software developers in the absence of widely accessible software energy monitoring. 3.8. Probabilistic resource analysis Bounds on energy consumption are useful, but information about the distribution of consumption within those bounds is even more so. For example, it may be that most execution cases of a program result in consumption close to the lower bound, while the upper bound is reached only in a few outlying 12 cases, or vice versa. From the distribution, estimates of average energy consumption can be derived. One approach to obtaining this kind of information is to perform probabilistic static analysis of a program with respect to its energy consumption. This is a special case of probabilistic output analysis, whose aim is to derive a probability distribution of possible output values for a program from a probability distribution of its input. The output in this case is energy consumption [38, 39]. 4. Discussion Energy-aware software development needs energy transparency; designers and programmers have to understand energy consumption at an early stage in the development lifecycle in order to explore the design space taking energy consumption into consideration. Many decisions taken early in the process, such as the hardware platform, the degree of parallelism, fundamental algorithms and data structures, can determine the overall energy efficiency of the final application. The energy-aware software development lifecycle includes activities such as: • Providing an energy specification or energy budget. • Making initial rough estimates of energy consumption based on high-level models of the application, allowing exploration of design space with respect to energy consumption. • Choosing and configuring a hardware platform which suits the application, for example reducing the energy cost of frequent communications or memory accesses. • Developing code with constant reference to the energy consumption of program parts, allowing energy “bugs” to be identified early. • Performing energy optimisation of critical code sections using more precise energy models and taking into account the compiler generated machine instructions. • For energy critical applications, providing guarantees in the form of tight upper and lower bounds on energy consumption. It is important to note that the development platform is seldom the same as the final deployment platform, emphasising the importance of energy modelling of the final target hardware. The alternative to energy transparency is to wait until the application is run on the final intended platform and then measure its energy usage. At this stage it is likely to be too late to do much about excessive energy consumption. 13 4.1. Software energy modelling challenges Verification of worst-case energy consumption requires the development of a worst-case energy model. This is difficult, since the energy cost of executing an instruction depends on the operands. To obtain the worst-case consumption for an instruction we must therefore measure its execution with the operands that induce it. The energy models built in ENTRA are based on averages obtained from measuring the energy consumed when random, valid data is being processed. We demonstrated that the variation due to data can range from 5 to 25% [8]. In [19] we examine the impact of operand values on instruction level energy consumption and propose a probabilistic approach to developing worstcase energy models suitable for safe worst-case energy consumption analysis. Data-sensitive energy modelling is a serious challenge. Determining the maximum amount of circuit switching between instruction data tends to take an exponential amount of time to evaluate, making it difficult to determine or guarantee the worst case data for an instruction sequence [40]. Even if a model is built where the energy consumed by an instruction is given as a function of its operands, there would still be further challenges in encoding these functions in a suitable way to be exploited effectively by static analysis algorithms. In [41] we have explored a technique that models both, upper and lower bounds on the energy of “branchless” blocks of instructions, in order to take into account the inter-instruction switching costs within a block. It uses an Evolutionary Algorithm for a faster exploration of the search space, which is also reduced by the fact that the algorithm does not have to deal with the control-flow of the program. Then, such block-level model is fed into a static analysis, which takes into account the program control-flow, and infers energy information for the whole program and its procedures. 4.2. Software energy analysis challenges Static analysis always involves a trade-off of precision against complexity of the analysis. Obtaining tight bounds of energy usage depends on several factors, including accurate propagation of data size measures and extraction and solution of the relations expressing energy consumption in terms of data sizes. Both of these problems are solvable for a large class of useful programs, but if program structure departs from standard patterns, precision may be rapidly lost. For instance, our realisation of the general framework described in Section 3.3 using the CiaoPP resource analyser described in Section 3.5 (which uses the HC IR) can deal with recursive programs, including multiple and mutual recursion (e.g., divide-and-conquer programs), iterative programs with nested loops, numeric/arithmetic programs, or programs operation on complex data structures such as nested lists and arrays. The analysis produces parametrised energy bounds (which depend on input data sizes) expressed by a large class of functions (e.g., polynomial, factorial, exponential, logarithmic, and summations), in contrast to other approaches that are limited to polynomial functions, or to non-parametric (i.e., absolute) bounds. The experiments reported in [25] with this realisation of the analysis framework perform the analysis at the ISA and LLVM IR levels, and compare the 14 energy values obtained by evaluating the inferred energy functions for different input data sizes, with actual hardware measurements (on the xCORE platform). The results show that our LLVM IR level analysis is reasonably accurate (less than 6.4% average deviation vs. hardware measurements) and more powerful than the analysis at the ISA level, in the sense that it can deal with a larger class of programs (e.g., programs involving structured types). The average deviation for the smaller set of benchmarks for which the ISA-level analysis produced non-trivial results was 3.9%. Although we have tested our prototype tools with relatively small programs, they exhibit features that are also present in bigger real programs, and could be analysed at a bigger scale too, since we have designed our analysis tools to enable scalability. Thus, we interpret our experimental results as very promising, and encourage us to continue our research following an incremental approach. Making our prototype tools more robust, powerful and scalable, as well as evaluating them with bigger real programs, is an implementation (and research) challenge in itself. As already said, our approach to developing energy analysers is architecture neutral, a claim that is supported by the experimental results in [36], performed with the direct energy analysis of LLVM IR described in Section 3.6, for both the ARM Cortex-M and XMOS xCORE platforms. The benchmarks also contain nested loops (some of them with complex control flow predicates) and perform bitwise operations, as well as operations on arrays and matrices. Overall, the final deviation vs. hardware measurements is typically less than 10% and 20% on the XMOS and ARM platforms respectively, showing that the general trend of the static analysis results can be relied upon to give an estimate of the energy consumption. Instantiating our general approach to more platforms (which include the hardware and operating system) and assessing it in different application domains is another challenge that we intend to address in future work. Static analysis of multi-threaded code is difficult since precision is easily lost due to thread interleaving. Accurate analysis of the timing and synchronisation behaviour of threads is a pre-requisite for energy analysis using the model given in Eq. (1), in which the energy of an instruction depends on how many threads are active simultaneously. 4.3. Extending results to less predictable architectures The ENTRA approach is generic and architecture-neutral; that is, it consists of a framework parametrised by an energy model and generic static analysis tools. Front-ends that translate code into a common, analysable form such as HC IR or LLVM IR can in principle be constructed for any programming language. However, much experimentation and investigation remains to be done to apply the approach effectively to architectures that contain sources of unpredictability such as caches, complex pipelines and interrupts that are not present in the xCORE architecture. A likely path of research is to follow the approach in WCET analysis of such unpredictable architectures, employing supporting analyses to permit more accurate energy analyses. An example is approximation of cache contents at specific program points, leading to more accurate models when 15 it can be guaranteed that a memory access will definitely hit or definitely miss the cache. 4.4. Energy optimisations enabled by energy transparency. Different types of optimisations at different levels of the software stack can be performed by taking advantage of the information provided by the multilevel and multi-language ENTRA tools. Both static and dynamic energy optimisations are enabled by energy transparency, which have been investigated in ENTRA. For dynamic optimisations, a framework for energy-aware stochastic scheduling based on evolutionary algorithms (EAs) has been developed, for the cases where tasks are independent [42] and dependent [43]. In the latter case, dependence has been modelled by using copula theory [44], in particular Archimedean copulas [45]. EAs have also been used to improve energy-aware allocation and scheduling for DVFS-enabled multicore environments. For example, the algorithms described in [46, 47] are able to deal with task migration and preemption; and the ones in [48] allow decreasing program accuracy (by performing loop perforation) in order to save energy. Other optimisations include the use of energy analysis to choose software parameters in order to transform programs to ensure that an energy target is met while minimizing the loss in quality of service. Energy performance has also been improved by optimisation techniques for task placement on an xCORE network after identifying communication patterns among tasks. Using Swallow, an experimental open platform of many xCOREs [49] as a source of model data, it has been demonstrated that incorporating network-level energy consumption and timing into the energy modelling process can aid in identifying the impact of sub-optimal task placement in communicating multi-core applications [50]. Some energy optimisations have already been incorporated into the recently released XC compiler by XMOS Ltd. These optimisations in the object code are obtained by aggressively applying global dataflow analyses inspired by ENTRA project research. Results on case studies, showing a power reduction of approximately 25% by using the global optimiser, can be found in an ENTRA project report [51]. An experiment on energy optimisation of Android code was carried out using the source code energy modelling mentioned in Section 2.3. The energy consumption of battery-driven mobile devices such as smartphones is of increasing concern to developers of software for such devices. The study concerned the optimisation of code for interactive games. The energy model combined with execution profiling, enabled the developer to discover that 10 code blocks (out of several hundred blocks in the considered code) consumed over 50% of the overall energy. Aggressive source code optimisation and refactoring of these blocks enabled energy savings of 6% to 50% in various use-case scenarios [52]. 5. Conclusions The goal of the ENTRA project was to provide techniques and tools supporting energy transparency at the software level. The results obtained include 16 energy models for the xCORE processor at different levels of abstraction, from ISA level to LLVM IR, as well as preliminary energy models for less predictable architectures. A model incorporating multi-core execution on the xCORE has also been developed. These models are incorporated in static analyses at the corresponding level of code. Experiments have compared predictions of energy consumption for single-threaded programs with actual measured consumption, and encouraging results with only a few percentage of error were obtained. In addition, the trade-offs between accuracy and analysability at different levels were explored, leading to a preliminary conclusion that analysis at LLVM level provides a good compromise. The project identified challenging problems for future research, extending the analyses to multi-threaded code, and building data-sensitive energy models. Acknowledgements This research has received funding from the European Union 7th Framework Programme under grant agreement no. 318337, ENTRA - Whole Systems Energy Transparency, grant agreement no. 611004, the ICT-Energy Coordination and Support Action, Spanish MINECO TIN’12-39391 StrongSoft project, and the Madrid M141047003 N-GREENS program. References [1] C. Edwards., Lack of software support marks the low power scorecard at DAC, in: Electronics Weekly., 2011. [2] K. Roy, M. C. Johnson, Software Design for Low Power, in: W. Nebel, J. P. Mermet (Eds.), Low Power Design in Deep Submicron Electronics, Vol. 337, Kluwer Academic, 1997, pp. 433–460. URL http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1. 44.4398 [3] D. Brooks, V. Tiwari, M. Martonosi, Wattch: a framework for architectural-level power analysis and optimizations, in: Proceedings of the 27th annual international symposium on Computer architecture, ISCA ’00, ACM, New York, NY, USA, 2000, pp. 83–94. doi:http://doi.acm. org/10.1145/339647.339657. URL http://doi.acm.org/10.1145/339647.339657 [4] V. Tiwari, S. Malik, A. Wolfe, M. Tien-Chien Lee, Instruction level power analysis and optimization of software, The Journal of VLSI Signal Processing 13 (1996) 223–238, 10.1007/BF01130407. URL http://dx.doi.org/10.1007/BF01130407 [5] S. Steinke, M. Knauer, L. Wehmeyer, P. Marwedel, An Accurate and Fine Grain Instruction-level Energy Model Supporting Software Optimizations, in: Proceedings of PATMOS, 2001. 17 [6] S. Kerrison, K. Eder, Energy modeling of software for a hardware multithreaded embedded microprocessor, ACM Trans. Embedded Comput. Syst. 14 (3) (2015) 56. doi:10.1145/2700104. URL http://doi.acm.org/10.1145/2700104 [7] C. Brandolese, S. Corbetta, W. Fornaciari, Software energy estimation based on statistical characterization of intermediate compilation code, in: Low Power Electronics and Design (ISLPED) 2011 International Symposium on, 2011, pp. 333–338. doi:10.1109/ISLPED.2011.5993659. [8] K. Georgiou, S. Kerrison, K. Eder, On the Value and Limits of Multilevel Energy Consumption Static Analysis for Deeply Embedded Single and Multi-threaded Programs, Tech. rep. (Oct. 2015). arXiv:1510.07095. URL http://arxiv.org/abs/1510.07095 [9] B. Wegbreit, Mechanical program analysis, Commun. ACM 18 (9) (1975) 528–539. [10] M. Rosendahl, Automatic Complexity Analysis, in: 4th ACM Conference on Functional Programming Languages and Computer Architecture (FPCA’89), ACM Press, 1989, pp. 144–156. [11] S. K. Debray, N.-W. Lin, M. Hermenegildo, Task Granularity Analysis in Logic Programs, in: Proc. of the 1990 ACM Conf. on Programming Language Design and Implementation, ACM Press, 1990, pp. 174–188. [12] S. K. Debray, P. López-Garcı́a, M. Hermenegildo, N.-W. Lin, Lower Bound Cost Estimation for Logic Programs, in: 1997 International Logic Programming Symposium, MIT Press, Cambridge, MA, 1997, pp. 291–305. [13] J. Navas, E. Mera, P. López-Garcı́a, M. Hermenegildo, User-Definable Resource Bounds Analysis for Logic Programs, in: International Conference on Logic Programming (ICLP’07), Lecture Notes in Computer Science, Springer, 2007, pp. 348–363. [14] J. Navas, M. Méndez-Lojo, M. Hermenegildo, Safe Upper-bounds Inference of Energy Consumption for Java Bytecode Applications, in: The Sixth NASA Langley Formal Methods Workshop (LFM 08), 2008, pp. 29–32, extended Abstract. [15] A. Serrano, P. Lopez-Garcia, M. Hermenegildo, Resource Usage Analysis of Logic Programs via Abstract Interpretation Using Sized Types, Theory and Practice of Logic Programming, 30th Int’l. Conference on Logic Programming (ICLP’14) Special Issue 14 (4-5) (2014) 739–754. doi:10.1017/S147106841400057X. URL http://arxiv.org/abs/1405.4256 [16] E. Albert, P. Arenas, S. Genaim, G. Puebla, Closed-Form Upper Bounds in Static Cost Analysis, Journal of Automated Reasoning 46 (2) (2011) 161–203. 18 [17] D. May, The XMOS XS1 architecture. available http://www.xmos.com/published/xmos-xs1-architecture (2013). online: [18] V. Tiwari, S. Malik, A. Wolfe, Compilation Techniques for Low Energy: An Overview, in: Low Power Electronics, 1994. Digest of Technical Papers., IEEE Symposium, IEEE, 1994, pp. 38–39. [19] J. Pallister, S. Kerrison, J. Morse, K. Eder, Data dependent energy modeling for worst case energy consumption analysis, Tech. rep. (May 2015). arXiv:1505.03374. URL http://arxiv.org/abs/1505.03374 [20] S. Kerrison, K. Eder, Modeling and visualizing networked multi-core embedded software energy consumption, Tech. rep. (Sep. 2015). arXiv: 1509.02830. URL http://arxiv.org/abs/1509.02830 [21] R. Heckmann, M. Langenbach, S. Thesing, R. Wilhelm, The influence of processor architecture on the design and the results of WCET tools, Proceedings of the IEEE 91 (7) (2003) 1038–1054. doi:10.1109/JPROC.2003. 814618. [22] U. Liqat, S. Kerrison, A. Serrano, K. Georgiou, P. Lopez-Garcia, N. Grech, M. Hermenegildo, K. Eder, Energy Consumption Analysis of Programs based on XMOS ISA-level Models, in: G. Gupta, R. Pea (Eds.), LogicBased Program Synthesis and Transformation, 23rd International Symposium, LOPSTR 2013, Revised Selected Papers, Vol. 8901 of Lecture Notes in Computer Science, Springer, 2014, pp. 72–90. doi:10.1007/ 978-3-319-14125-1_5. URL http://dx.doi.org/10.1007/978-3-319-14125-1_5 [23] C. Lattner, V. Adve, LLVM: A compilation framework for lifelong program analysis and transformation, in: Proc. of the 2004 International Symposium on Code Generation and Optimization (CGO), IEEE Computer Society, 2004, pp. 75–88. URL http://dl.acm.org/citation.cfm?id=977395.977673 [24] X. Li, J. P. Gallagher, A top-to-bottom view: Energy analysis for mobile application source code, Tech. rep., submitted to a conference (October 2015). arXiv:1510.04165. URL http://arxiv.org/pdf/1510.04165v1.pdf [25] U. Liqat, K. Georgiou, S. Kerrison, P. Lopez-Garcia, M. V. Hermenegildo, J. P. Gallagher, K. Eder, Inferring Parametric Energy Consumption Functions at Different Software Levels: ISA vs. LLVM IR, in: M. V. Eekelen, U. D. Lago (Eds.), Foundational and Practical Aspects of Resource Analysis. Fourth International Workshop FOPARA 2015, Revised Selected Papers, Lecture Notes in Computer Science, Springer, 2016, in press. 19 arXiv:1511.01413. URL http://arxiv.org/abs/1511.01413 [26] R. Haemmerlé, P. Lopez-Garcia, U. Liqat, M. Klemen, J. P. Gallagher, M. V. Hermenegildo, A Transformational Approach to Parametric Accumulated-cost Static Profiling, in: O. Kiselyov, A. King (Eds.), 13th International Symposium on Functional and Logic Programming (FLOPS 2016), Vol. 9613 of LNCS, Springer, 2016, pp. 163–180. doi: 10.1007/978-3-319-29604-3_11. URL http://dx.doi.org/10.1007/978-3-319-29604-3_11 [27] K. S. Henriksen, J. P. Gallagher, Abstract interpretation of PIC programs through logic programming, in: Sixth IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2006), IEEE Computer Society, 2006, pp. 184–196. [28] M. Méndez-Lojo, J. Navas, M. Hermenegildo, A Flexible (C)LP-Based Approach to the Analysis of Object-Oriented Programs, in: 17th International Symposium on Logic-based Program Synthesis and Transformation (LOPSTR 2007), no. 4915 in LNCS, Springer-Verlag, 2007, pp. 154–168. [29] S. Grebenshchikov, A. Gupta, N. P. Lopes, C. Popeea, A. Rybalchenko, HSF(C): A Software Verifier Based on Horn Clauses - (Competition Contribution), in: C. Flanagan, B. König (Eds.), TACAS, Vol. 7214 of LNCS, Springer, 2012, pp. 549–551. [30] H. Hojjat, F. Konecný, F. Garnier, R. Iosif, V. Kuncak, P. Rümmer, A Verification Toolkit for Numerical Transition Systems - Tool Paper, in: D. Giannakopoulou, D. Méry (Eds.), FM 2012: Formal Methods - 18th International Symposium, Paris, France, August 27-31, 2012. Proceedings, Vol. 7436 of Lecture Notes in Computer Science, Springer, 2012, pp. 247– 251. doi:10.1007/978-3-642-32759-9_21. URL http://dx.doi.org/10.1007/978-3-642-32759-9_21 [31] L. M. de Moura, N. Bjørner, Z3: An Efficient SMT Solver, in: C. R. Ramakrishnan, J. Rehof (Eds.), Tools and Algorithms for the Construction and Analysis of Systems, 14th International Conference, TACAS 2008, Vol. 4963 of Lecture Notes in Computer Science, Springer, 2008, pp. 337–340. [32] N. Bjørner, F. Fioravanti, A. Rybalchenko, V. Senni (Eds.), Proceedings of First Workshop on Horn Clauses for Verification and Synthesis, Vol. 169 of EPTCS, 2014. doi:10.4204/EPTCS.169. URL http://dx.doi.org/10.4204/EPTCS.169 [33] M. V. Hermenegildo, F. Bueno, M. Carro, P. López, E. Mera, J. Morales, G. Puebla, An Overview of Ciao and its Design Philosophy, Theory and Practice of Logic Programming 12 (1–2) (2012) 219–252. doi:doi:10. 1017/S1471068411000457. URL http://arxiv.org/abs/1102.5497 20 [34] K. Eder, N. Grech (Eds.), Common Assertion Language, ENTRA Project: Whole-Systems Energy Transparency (FET project 318337), 2013, deliverable 2.1, http://entraproject.eu. [35] K. Muthukumar, M. Hermenegildo, Compile-time Derivation of Variable Dependency Using Abstract Interpretation, Journal of Logic Programming 13 (2/3) (1992) 315–347. [36] N. Grech, K. Georgiou, J. Pallister, S. Kerrison, J. Morse, K. Eder, Static analysis of energy consumption for LLVM IR programs, in: Proceedings of the 18th International Workshop on Software and Compilers for Embedded Systems, SCOPES 2015, ACM, New York, NY, USA, 2015, pp. 12–21. doi:10.1145/2764967.2764974. URL http://dl.acm.org/citation.cfm?doid=2764967.2764974 [37] Y.-S. Li, S. Malik, Performance analysis of embedded software using implicit path enumeration, Computer-Aided Design of Integrated Circuits and Systems, IEEE Transactions on 16 (12) (1997) 1477–1487. doi: 10.1109/43.664229. [38] M. Rosendahl, M. H. Kirkeby, Probabilistic output analysis by program manipulation, in: N. Bertrand, M. Tribastone (Eds.), Proceedings Thirteenth Workshop on Quantitative Aspects of Programming Languages and Systems, QAPL 2015, London, UK, 11th-12th April 2015., Vol. 194 of EPTCS, 2015, pp. 110–124, qAPL, London. doi:10.4204/EPTCS.194.8. URL http://dx.doi.org/10.4204/EPTCS.194.8 [39] M. Kirkeby, M. Rosendahl, Probabilistic Resource Analysis by Program Transformation, in: Proc. of the Foundational and Practical Aspects of Resource Analysis, LNCS, Springer, 2015, in press. URL http://entraproject.eu/wp-content/uploads/2016/02/ prob-res-fopara.pdf [40] J. Morse, S. Kerrison, K. Eder, On the infeasibility of analysing worst-case dynamic energy, Tech. rep. (Mar. 2016). arXiv:1603.02580. URL http://arxiv.org/abs/1603.02580 [41] U. Liqat, Z. Banković, P. Lopez-Garcia, M. V. Hermenegildo, Inferring Energy Bounds Statically by Evolutionary Analysis of Basic Blocks, in: Workshop on High Performance Energy Efficient Embedded Systems (HIP3ES 2016), 2016, arXiv:1601.02800. URL http://arxiv.org/abs/1601.02800 [42] Z. Banković, P. Lopez-Garcia, Stochastic vs. Deterministic Evolutionary Algorithm-based Allocation and Scheduling for XMOS Chips, Neurocomputing 150 (2015) 82–89. doi:http://dx.doi.org/10.1016/j.neucom. 2014.06.077. URL http://www.sciencedirect.com/science/article/pii/ S0925231214012211 21 [43] Z. Banković, P. López-Garcı́a, Improved Energy-aware Stochastic Scheduling based on Evolutionary Algorithms via Copula-based Modeling of Task Dependences, in: A. Herrero, J. Sedano, B. Baruque, H. Quintián, E. Corchado (Eds.), International Conference on Soft Computing Models in Industrial and Environmental Applications (SOCO 2015), Vol. 368 of Advances in Intelligent Systems and Computing, Springer International Publishing, 2015, pp. 153–163. doi:10.1007/978-3-319-19719-7_14. URL http://dx.doi.org/10.1007/978-3-319-19719-7_14 [44] R. B. Nelsen, Properties and applications of copulas: A brief survey, in: First Brazilian Conference on Statistical Modelling in Insurance and Finance, 2003, pp. 10–28. [45] A. J. McNeil, et al., Multivariate archimedean copulas, d-monotone functions and l1 -norm symmetric distributions (2009). [46] Z. Banković, P. López-Garcı́a, Energy Efficient Allocation and Scheduling for DVFS-enabled Multicore Environments using a Multiobjective Evolutionary Algorithm, in: Genetic and Evolutionary Computation Conference, GECCO 2015, Companion Material Proceedings, ACM, 2015, pp. 1353– 1354. doi:10.1145/2739482.2764645. URL http://doi.acm.org/10.1145/2739482.2764645 [47] Z. Banković, U. Liqat, P. López-Garcı́a, A Practical Approach for Energy Efficient Scheduling in Multicore Environments by combining Evolutionary and YDS Algorithms with Faster Energy Estimation, in: The 11th International Conference on Artificial Intelligence Applications and Innovations (AIAI’15), Vol. 458 of IFIP Advances in Information and Communication Technology, Springer International Publishing, 2015, pp. 478–493. doi:10.1007/978-3-319-23868-5_35. URL http://dx.doi.org/10.1007/978-3-319-23868-5_35 [48] Z. Banković, U. Liqat, P. López-Garcı́a, Trading-off Accuracy vs. Energy in Multicore Processors via Evolutionary Algorithms Combining Loop Perforation and Static Analysis-based Scheduling, in: E. Onieva, I. Santos, E. Osaba, H. Quintián, E. Corchado (Eds.), Hybrid Artificial Intelligent Systems (HAIS 2015), Vol. 9121 of Lecture Notes in Computer Science, Springer International Publishing, 2015, pp. 690–701. doi:10.1007/978-3-319-19644-2_57. URL http://link.springer.com/chapter/10.1007/ 978-3-319-19644-2_57 [49] S. J. Hollis, S. Kerrison, Swallow: Building an Energy-Transparent Many-Core Embedded Real-Time System, in: 2016 Design, Automation & Test in Europe, IEEE, 2016. URL http://entraproject.eu/wp-content/uploads/2016/02/ KerrisonSwallow15.pdf 22 [50] S. Kerrison, K. Eder, Modeling and visualizing networked multi-core embedded software energy consumption, CoRR abs/1509.02830. URL http://arxiv.org/abs/1509.02830 [51] H. Muller (Ed.), Evaluation Results, ENTRA Project: Whole-Systems Energy Transparency (FET project 318337), 2016, deliverable 6.2, http://entraproject.eu. URL http://entraproject.eu/wp-content/uploads/2016/03/deliv_ 6.2.pdf [52] X. Li, J. P. Gallagher, An energy-aware programming approach for mobile application development guided by a fine-grained energy model, Tech. rep., Roskilde University, submitted for publication (February 2016). URL http://entraproject.eu/wp-content/uploads/2016/02/ LiGallagher-TSE-2016.pdf 23
6cs.PL
End-to-end 3D shape inverse rendering of different classes of objects from a single input image Shima Kamyab1 and S. Zohreh Azimifar1 arXiv:1711.05858v1 [cs.CV] 11 Nov 2017 1 Computer Science and Engineering and Information Technology, Shiraz university, Shiraz, Iran November 17, 2017 Abstract In this paper a semi-supervised deep framework is proposed for the problem of 3D shape inverse rendering from a single 2D input image. The main structure of proposed framework consists of unsupervised pre-trained components which significantly reduce the need to labeled data for training the whole framework. using labeled data has the advantage of achieving to accurate results without the need to predefined assumptions about image formation process. Three main components are used in the proposed network: an encoder which maps 2D input image to a representation space, a 3D decoder which decodes a representation to a 3D structure and a mapping component in order to map 2D to 3D representation. The only part that needs label for training is the mapping part with not too many parameters. The other components in the network can be pre-trained unsupervised using only 2D images or 3D data in each case. The way of reconstructing 3D shapes in the decoder component, inspired by the model based methods for 3D reconstruction, maps a low dimensional representation to 3D shape space with the advantage of extracting the basis vectors of shape space from training data itself and is not restricted to a small set of examples as used in predefined models. Therefore, the proposed framework deals directly with coordinate values of the point cloud representation which leads to achieve dense 3D shapes in the output. The experimental results on several benchmark datasets of objects and human faces and comparing with recent similar methods shows the power of proposed network in recovering more details from single 2D images. 1 Introduction Inverse rendering stands for a specific class of machine learning techniques aim at recovering the properties of a 3D scene like camera’s extrinsic parameters, scene lighting and the shape of the scene from some existing measurements (e.g. 2D images)[1, 21]. It has attracted high interest in the recent academic research due to wide applications in computer vision [15, 1, 33, 35, 38, 10, 26, 31, 32, 25, 27, 30, 13, 21, 7]. Inverse rendering is not a well posed problem because of existing infinite number of 3D structure which can result the same 2D image [10, 25]. Facing with such problems needs additional assumptions and prior knowledge about the class of 3D structures to be recovered from 2D images. For instance a statistical model can be used to determine which solution is likely and which is not for a specific class of objects [25]. The aim of Inverse rendering problem is actually inverting the image formation process called rendering. in Computer graphics, Rendering is expressed as an equation formulated as in 1 [19]. F = K(h + Gf ) (1) where, F is the reflected radiance (light) from the surface (e.g. intensity of the pixels in the image), K represents the way the object surface reflects the lights in various spatial and angular positions, h describes the lighting of the scene, G is some measurement showing how light is transferred between other existing surfaces in the scene and f is the light which is reflected by other surfaces in scene affecting F. Knowing the quantities K, h, G, f means that the properties of the scene are known and F can be computed using these quantities and this is a direct problem 1 to solve. The inverse rendering problem arises when F or some information about it are available and the aim is to compute some values in the right-hand side of 1. In this paper, our focus is on recovering shape geometry of an object from a single 2D input image having different poses which is implicitly embedded in variable K as spatial properties of the surface in light reflection. Inverse rendering problem as a machine learning task, can be faced through 3 main steps to be solved: • Selection of a model (i.e. assuming a specific class of hypotheses) • Defining a score criterion • Defining a Search strategy Selection of a model: Selection of a model is one of the main necessities for solving machine learning problems due to “no free lunch theorem” [34]. In the case of recovering 3D structures from 2D images, this step is more important because in such problems we deal with an ill-posed problem based on Hadmard definition for well-posed problems: there might be more than one solutions that give the same 2D image and the solution does not depends continuously on the data, which means that small errors in measurements may cause large errors in the solutions [24]. For solving such kinds of problems, some assumptions are usually made about the properties of the solutions to restrict the solution space to feasible regions. Selection of a suitable model for defining the target scene serves as some prior knowledge about the solution space, by which the search can be performed more reliable. Like using any other assumptions, this method may have some costs like losing some promising regions that are not spanned by the selected model. For inverse rendering problems, there are various types of models and prior knowledge for the target scene in the literature that make the existing methods different from each other: some approaches use additional information, like multiple images or video sequence or landmarks, about the scene to find a unique solution [38, 23, 9, 18], some of them work with a certain statistical model to determine the feasibility of the solutions [12] and some other perform some regressing techniques that relates the output measurements to 3D structures [10, 26, 31, 32, 25, 27, 13, 17, 30]. In this paper our focus is on the pose invariant recovering 3D structure of an object from a single 2D image with the help of a model describing the properties of that object. The main structure of our proposed framework is based on finding a relation between measurements, i.e. a single 2D image for each scene, and 3D structure of the scene constrained with the used model. Defining a score criterion:After selection of a suitable model describing the solution space, the optimum solution should be searched in that space. For this aim, first a criterion should be defined which guides the search toward finding the optimum solution satisfying the constraints of the problem at hand. For instance, in the case of inverse rendering of human face from 2D image(s) for face recognition task, first, the main objective is to recover the distinctiveness characteristics of a face in an image and so a good solution should not be too generic so or too over determined and there should be some tradeoff between these two properties in the objective criterion [32]. In this paper, since the objective is to minimize the reconstruction error, we used Root Mean Square Error (RMSE) as loss function for training and evaluation. Defining a search strategy:There exist different types of search mechanisms to search for a solution based on the defined score criterion. In the case of convex criteria, a closed form solution exists and the search can be done in linear time. However, the nature of inverse rendering problem is highly nonlinear and the inference and finding the relation between 2D image and corresponding 3D structure is intractable. If some assumptions can be incorporated to the problem, like deterministic models formulating behavior of all variables in the rendering equation to be defined accurately, so the solution can be computed in closed form [1]. However we cannot have such strong assumptions in all inverse rendering problems. In such cases we can use learning based methods by training some models and then use them for test samples. The most popular learning framework in recent years are deep networks which show their power in solving nonlinear problems. Deep networks like other learning based structures can be trained in 3 ways: Supervised, unsupervised and semi-supervised. Supervised methods use a set of labeled data to guide the training. Their result will be accurate because of availability of ground truth in the training procedure but suffer from the lack of enough labeled training data in some domains. In the case of 3D Inverse rendering applications, providing enough realistic training data for a deep network may be impractical. One Solution for this problem is to use a generative model for generating synthetic training data to trained the network [26, 27]. 2 Figure 1: Main configuration of proposed framework As another solution, There can be found some attempts in the recent literature to Unsupervised training the network for 3D reconstruction[25, 30] in which a 3D structure is generated in a part of the network and some rendering mechanism is used to transform the generated 3D structure to something in the form of input measurement to the network and then try to reduce the difference between input and rendered output. So the network does not need to labeled data for training. In the existing unsupervised methods in the literature, they used an analytical form for rendering the 3D structure with some assumptions about image formation process. This characteristic although is a significant improvement in reducing the need for training data but may affects the quality of solutions due to the existing assumptions about rendering mechanism (such as camera properties, scene illumination, reflectance properties and so on). In the case of 3D Inverse rendering problem, there are well known 3D models that can help us to generate enough data for training the deep networks. In this paper, we propose a mechanism in which some parts of network can be trained using unlabeled data and then the whole network will be fine-tuned using labeled training data for aggregation of the components. We believe this properties reduces the nedd of deep network for large set of training data. Therefore it is a semi-supervised framework for inverse rendering problem. The paper is organized as follows: we first briefly describe our framework in section 2. In section 3 we review and analyze some recent related works. The proposed framework and network structure will be define in more details in section 4. Some experimental results to verify the performance of our proposed structure on several benchmarks will be demonstrated in section 5 and finally some discussions and conclusions will be found in sections 6 and 7. 2 Overview Our proposed framework is composed of 3 main components based on the fact that in inverse rendering problem we look for a way of transforming the 2D input image to its corresponding 3D structure. We do this by mapping the 2D input image and corresponding 3D structure to suitable representations and then finding a transformation between obtained representations. We will show experimentally that nonlinear mapping of suitable representations results more accurate solutions. finding suitable representations can be done using autoencoders as unsupervised tools for finding representations or by pre-trained convolutional networks for finding suitable representations. We did this either by different types of autoencoder or by some existing well known networks from literature. In the case of using autoencoders for finding representations, inspired by 3D Morphable Models (3DMMs) [3] the network extracts the basis vectors from training data of each size and uses these basis functions to reconstruct more accurate 3D shape of an object rather that using a pre-defined 3DMM. Figure 1 shows the overall structure of the proposed framework. More details about the proposed idea can be found in section 4 3 3 Related works In this section we review and analyze some of the most recent attempts for 3D inverse rendering from single 2D images using deep frameworks as related works to ours concentrating on their search strategies. In [26], Richardson et al. proposed a deep iterative framework for 3D inverse rendering of human faces. In each iteration of this framework, the output of the network will be fed into the input as additional information to fine-tune the previous result. The training process in this method is supervised by using a 3DMM for generating synthetic labeled training data. The final output will be more fine-tuned using some form of Shape From Shading (SFS) method to achieve more details.The authors improve their work in [27] where, the SFS component of their network is implemented as another deep network. The output of this framework is the coefficients of a predefined 3DMM computed using a few hundred 3D samples and so this framework does not directly deal with 3D shape structures. In [32], a supervised framework for 3D reconstruction of human faces from a single 2D image is proposed where they also used a 3DMM for generating training data. For this aim they fitted a 3DMM to 2D images via an optimization method and used that model as ground truth for the training data. This strategy of finding ground truth may cause the found solutions to be dependent on the power of the optimization method so that some powers of new work may be ignored. A loss function is also used for the training the network for human faces which can be tuned to make trade-off between generic face generation and overdetermined one, which is suitable for the purpose of face recognition. In [25] an unsupervised framework for 3D reconstruction of objects from single or multiple input images or volumes is proposed. The authors suggested an inference network for encoding the input data to a low dimensional representation which will be fed into a generative network for generating 3D objects using the encoded data. The obtained 3D object will be rendered as a 2D image using a fixed differentiable rendering method. The objective of training of this network is to minimize the difference between rendered and input images. Using a fixed rendering component may restrict the accuracy of generated 3D shapes if the input image rendering mechanism differs from network rendering mechanism.The authors also suggested using a convolutional network as rendering component. Using another deep network as rendering component may overcome the mentioned limitation. In [30] an autoencoder network is proposed for 3D reconstruction of human faces using an unsupervised training mechanism. In this network the encoder part of the autoencoder is a convolutional network like well-known alexnet [16] or VGG-face [20] networks and the decoder part is an analytical differentiable formula which uses the encoded data and some assumptions about the image formation process to form to a 3D face and then render it to a 2D image. In this paper the objective is also to minimize the difference between input image and rendered 3D shape using fix rendering method. In [8] a Generative Adversarial Network (GAN) is trained for generating 3D shapes of different objects. In this method, in an unsupervised training approach, a random vector from a distribution will be fed to the network and a 3D shape of an object will be generated and then will be rendered in the form of a 2D image as input to a discriminator. In this way, the discriminator does not need to 3D shape to control the process of learning 3D shapes. The rendering method here is fixed and this network can be used to generate training data for inverse rendering frameworks of 3D objects. In [12] a CNN is designed to recover the 3D geometry and texture of human faces from a single 2D image. This framework directly works with 3D coordinates in the form of proposed binary volumes and maps 2D images directly to the coordinates of binary volume. Using binary volume as 3D coordinates for representing human face may result in blur shapes. In this paper, our aim is to design a deep framework for 3D shape inverse rendering of different types of 3D shape representations such as point clouds and volume representations from a single 2D input image. The training process utilizes from both labeled and unlabeled realistic data for improving the quality of resulted 3D shapes. The following section demonstrates the proposed approach in more details. 4 4 Proposed framework The main idea in our work is to end-to-end mapping of some representation of a single 2D input image to some representation of corresponding 3D shape structure. Defining such structure is actually based on the main functionality of deep networks, i. e. using different layers of nonlinear computations in order to feature extraction and transformation [37]. Our proposed framework is also made of components for feature extraction and transformation. As stated in section 2, we used three main components in our framework: the first component is trained to compute some representations for 2D input images. the second component is trained for reconstructing a 3D shape from some other representations and the third components is used to map the representation computed in the first component to one used in second component. The representations in each component should satisfy its objective. for instance, the component for computing representation from 2D image, should computes a representation that is suitable for being mapped to 3D representation. On the other hand, the 3D representation should be suitable for reconstructing the 3D shape in the form of point cloud or binary volume. We observed in our experiments that more complex representations for 2D representation component achieve better performance and decoder part of a linear autoencoder as 3D reconstruction component is suitable for reconstructing the 3D shape in he form of point cloud. The third component is a structure for mapping 2D low-dim representation to corresponding 3D representation. We actually proposed this component because the manifold of 2D images may be different from the manifold of 3D shapes especially in the case of complicated shapes like human faces and therefore a nonlinear mapping function should be found to obtain an accurate 3D representation from 2D image representation. Note that our proposed frameworks deals directly with dense 3D shapes of the objects instead of using predefined 3D models for representing a face. This characteristic has the advantage of not being restricted to a spanning obtained by a few samples by using larger set of training data for extracting suitable basis vectors for 3D and 2D shape spaces. The main contributions of this paper are as follows: • Using deep structures as different components in an interpretable framework for mapping the representations from a manifold to another and directly reconstructing 3D results. Using deep structures in each component improves handling the non-linearity of each stage. • Possibility of unsupervised pre-training of each component using unlabeled data so that the representations can be improved using realistic data in-the-wild and therefore reducing the need for labeled data for training because of suitable initialization for training. In fact the labeled data is needed only for the final aggregation of pre-trained components. • Using the training data itself to extract the bases of each representation space instead of using a predefined analytical models. • Ability of training the framework for inverse rendering of different object classes from a single 2D input image. In the following subsection, the proposed idea in this paper is demonstrated in the simplest case (linear) in terms of Singular Value Decomposition (SVD). 4.1 Describing proposed idea in a simple case (i.e. linear) in terms of Singular Value Decomposition (SVD) In this section we analytically describe the proposed idea in this paper in the simplest case, i.e. the linear case. These calculations gives a mathematical insight into the motivation of proposing this framework. In section 5, we will evaluate our idea using different datasets and compare it with other possible method in the case of solving 3D shape inverse rendering problem. For this aim, assume the linear case for each component, i. e. linear autoencoder for 2D encoder and 3D decoder components and linear feedforward network as the mapping component. In [2] it is proven that, the optimal representation space resulted by a linear autoencoder, using L2-norm as loss function, has the same spanning as the sub-space resulted by performing PCA on the data. Therefore we can consider the use of a linear autoencoder equivalent to performing PCA on training data. It is therefore can be inferred that the weights of hidden to output layer of the 5 trained linear autoencoder are in fact the bases of the resulted representation subspace which are found using the training data of autoencoder. This characteristic means that, by using a linear autoencoder, we can obtain the bases of a representation space for data of any size without the concern of basis vector decomposition of a large data matrix. Let X denotes the matrix which is formed by concatenating n1 samples of 2D input images vectorized as D-dimensional column vectors as 2: X = [x1 , ..., xn1 ]D×n1 (2) By applying SVD on X, after subtracting its mean value, the bases (Eigen vectors) of the PCA subspace can be obtained using SVD as 3: [Ux , σx , Vx ] = SV D(X) (3) where, Ux is the matrix with the columns representing the eigenvectors of XX T , σx is a diagonal matrix with eigenvalues of XX T as diagonal elements and Vx denotes the matrix with the eigenvectors of X T X on its columns. Therefore we can use the columns of Ux as the basis vectors of the resulted representation subspace for 2D images, and the k-dimensional representation of X in the resulting sub-space, spanned by the first k eigenvectors in Ux with largest eigen values in σx , can be expressed as Y in 4: Yk×n1 = UxT XD×n1 (4) Similarly, considering Z as the column matrix containing n2 p-dimensional vectorized training samples of 3D shape structures, represented as 3D point clouds or binary volumes, the resulted k’-dimensional representation of Z using another autoencoder can be expressed as Bk0 ×n2 in 7 : Z = [z1 , ..., zn2 ]p×n2 (5) [Uz , σz , Vz ] = SV D(Z) (6) Bk0 ×n2 = UzT Zk0 ×p (7) To find a transformation between two obtained representations Y and B for the inverse rendering problem, if a linear feedforward net is used, it is equivalent to performing a least square mechanism to find a linear relation between Y and B as 8: Tk×k0 = argminT |B − T Y | (8) and the result can be used for reconstructing the 3D shape, say ẑ , as 9: ẑ = Uz T Y (9) On the other hand, we can also solve a direct optimization problem that linearly tries to find the linear relation between 2D images and corresponding 3D shapes as 10-11. B̂ = argminB |Z − BX| (10) ẑ = B̂X (11) These two approaches look for a subspace that best describes the 3D shape of the objects in 2D image. The first approach first tries to find a low dimensional representation of 2D input image and corresponding 3D structure for a set of training data and then a linear solution is found for transforming the 2D representation to 3D one via least squares. Note that the matrices b̂and Uz T are used as mapping functions for the test data. And the examples used for calculating Ux do not necessarily correspond to those which were used to obtain Uz and Y. Such mechanism shows the possibility of unsupervised training of different components in this method. The second closed form approach in 11 directly finds a linear mapping between 2D input image and corresponding 3D structure. We believe that the first approach significantly improves the process of finding a solution for inverse rendering problem and in Table 2 in the section 5.4, we verified this claim experimentally compared with second approach in 10. 6 4.2 Loss function As we mentioned before, the purpose of our proposed framework in this paper is to recover the shape of an object. So we deal with a regression problem. Therefore, we used Root Mean Squared Error (RMSE) as in 12 as the loss criterion for training the components in the proposed framework. This criterion is the standard deviation of prediction error and is a standard way to regression analysis [6, 14]. s PN i i 2 i=1 |xˆo − xgt | (12) ERM SE = N Where, xˆo i and xigt denote the prediction and ground truth of the ith training sample and N stands for the sample size. Here, the sample size stands for the size of the mini batch. There are different loss functions are proposed to be used for inverse rendering problems in different researches [12, 32] for different applications like reconstruction or recognition. In [12] a binary voxel representation is used for representing the faces and sigmoid cross entropy loss function is used for training the network. In our framework we deal with both mesh representation and voxel representations. So we choose the standard RMSE for training the networks. 5 Experiments In this section we perform some experiments to evaluate the performance of our proposed framework in different 3D inverse rendering scenarios. We used 2 types of datasets, objects and human faces having different 3D shape representations, like point clouds and binary volumes, in order to report and compare the reconstruction results. we also analyse some structures as different components of the framework. 5.1 Datasets We report the results of the performance of proposed framework on two types of datasets: objects and human faces. In each case we trained a separate structure using that type of data representation. we also used some unlabeled 2D and 3D datasets in order to unsupervised pre-training the components. In the case of human faces, we used LFW dataset [11] as 2D unlabeled data for unsupervised pre-training and Besel Face Model [22] for generating synthetic data as labeled training data along with the Bosphorus dataset [28] as realistic labeled data for training and fine-tuning respectively. Note that for aggregating all components using supervised training, we used faces generated by BESEL Face Model (BFM) having natural expression rendered with 3 poses, i.e. -45, 0, 45 degrees about z axis. Therefore the objective of human face shape inverse rendering in our work is to pose invariant identity recovering of faces from a single 2D image. The 3D faces in our framework are represented as 3D point clouds with 54903 vertices in 3D space which are normalized between 0,1 in each dimension. We generated 4000 training and 1000 test samples in natural expression and rendered 2D images of size 32*32 with mentioned poses as 2D input images. In the case of objects, we used some categories of imagenet [5] dataset as unlabeled data for pretraining and ModelNet10 [36] and ShapeNet [4] datasets as labeled training data which are to the best of our knowledge, well-known datasets for 3D object reconstructions. we used 10 categories for training the networks in the form of 30 × 30 × 30 binary voxel grid and rendered each training sample as a 32 × 32 gray scale image from 8 viewpoints (between 0 and 180 about z axis). In the case of linear autoencoders we vectorized the voxel grid as a binary column vector of size 27000. We incorporate well-known alexnet in our experiments for evaluating the use of a deep CNN for computing 2D representations for the face dataset. In this case we rendered and used 2D colored images of the faces in each existing dataset with the size 227 × 227 × 3 which is the standard input size to alexnet framework. 5.2 Parameter setting Table 1 includes the configuration of each structure used for each type of dataset for the type of used structure. Since we applied inverse rendering on different data types, we had to use different structures for the network components in each case. 7 Encoder Mapping Decoder Object (binary Volume) Linear Nonlinear Convolutional 3 × 3 × 1− 3 × 3 × ×32− 1024-60 1024 - 100- 60 3 × 3 × 16 1 × 3 × 1 × 100− 60-100-400 60-100-400 400 3 × 3 × 3 × 32 3 × 3 × 3 × 16 400-27000 400-800-27000 30 × 30 × 30 Human Face (Point cloud) Nonlinear Convolutional 3 × 3 × 1− 3 × 3 × 32 1024 - 60 1024 - 100 - 60 3 × 3 × 16 1 × 3 × 100− 60-100-98 60-100-98 98 Linear 98-160470 98-200-160470 Table 1: Network configuration for each components using different structures Besel face Dataset ModelNet Dataset ShapeNet Dataset LS using low dim representation 0.8727 0.0970 0.0712 Directly finding Ls between 2D and 3D 2.2869 0.1469 0.2455 Table 2: Comparison of average test RMSE obtained by different datasets using closed form linear solutions in section 4.1 Note that in the case of object datasets, since there are 10 classes of objects, there were need to layers with larger sizes for representation units. The learning rate was set for each configuration so that it gives better performance. In most cases we uses 0.001 for 1000 epochs and then reduce it to 0.00001 for another 1000 epochs. In the case of mesh representation the learning was slower and needed smaller learning rate for longer training time. Batch size was set to a constant, in most cases equal to 40 for training. We trained our networks from scratch on waterloo university servers: gpu-pr1-01 and gpu-pt1-01, saspc73, and sharcnet-graham machines which are well-known servers having several gpus suitable for training deep networks. 5.3 Evaluation mechanism We used RMSE as the evaluation criterion on test and validation sets in different parts of our experiments. In the case of face datasets we also showed the RMSE in the form of Heat maps, showing point-wise RMSE of reconstructed face on the ground truth face, as a suitable tool for error visualization in different regions of the reconstructed face. We start the experiments by first reporting the evaluation results of closed form linear solutions described in section 4.1 using different data types. in the next step we will use equivalent deep structure by changing the mapping component to nonlinear structure and show that the results can be significantly improved. As a nonlinear component for encoder part of our framework, we fine-tuned alexnet using our labeled human face dataset and report the results. We then show some reconstruction results on realistic human face dataset and compare our results with some of the most recent methods for 3D reconstruction. 5.4 Results of solving linear closed form formula for inverse rendering Regarding the analytical description of proposed idea in section 4.1, here we show that finding a linear mapping between low dimensional representations of 2D and 3D data achieves significantly better results rather that finding a direct linear mapping between them (2D and 3D data). Table 2 and figures ?? include the numerical and visual results of applying these methods on different datasets, where “LS using low dim representation” stands for finding the mapping between low dimensional representations of 2D and 3D data using least squares and “Directly finding ls between 2D and 3D” stands for finding a least squares solution for direct mapping 2D input images to 3D data. The numerical results in Table 2 indicate the effectiveness of the proposed idea of mapping low dimensional representations instead of direct mapping in terms of RMSE for all existing datasets. Looking at Figure 2, first, it is clear that using linear methods is not powerful enough for addressing 3D shape inverse rendering problem from a single 2d input image and there is need 8 - input image (32 × 32) Ground Truth LS using low dim representation Directly finding Ls between 2D and 3D Figure 2: Visual results of using linear methods for finding a mapping between 2D to 3D spaces for BESE face dataset to use nonlinear tools in this fields especially in the case of human face inverse rendering. And second, we can see that using the low dimensional representation mapping works better that direct mapping visually. input images (32 × 32each) Ground Truth LS using low dim representation Directly finding Ls between 2D and 3D Figure 3: Visual results of comparing linear least squares for finding a mapping between 2D and 3D space for Modelnet10 dataset In the next step of our experiments, we set up a deep structure consist of linear autoencoders for finding representations and a nonlinear feedforward network for mapping the representations as a strat point for using nonlinearity in the proposed framework. 5.5 Using linear encoders and decoders with nonlinear feedforward network as mapping component: As a start point of using nonlinear deep structure in our framework, we only used a nonlinear feedforward network as the mapping component and trained the network using 2000 samples of BESEL face model dataset and training set of Modelnet10 dataset for 1000 epochs. Figures 4,5 show the results on test data for face and object datasets, respectively. It can be observed that using nonlinearity only in the mapping component in our framework results in significant improvement Visually and numerically. For instance, In the case of face datasets, we have face-like reconstructions. this observation also shows that the relation between subspaces of 2D and 3D representations have nonlinear relation. In the next subsection, after fixing the nonlinear feedforward network as mapping component, we consider the use of more complicated representations for 2D and 3D data. To do this, we fine-tuned alexnet as encoder of 2D input image. 5.6 Transfer learning from Alexnet as 2D encoder Figure 6 shows the proposed framework which uses Alexnet pre-trained model as encoder component. This model, trained on more than one million images of about 1000 categories of images from ImageNet database [16] like human, chair, pencil and many other categories, is a well-known model for extracting rich features from images for classification of them into 1000 object categories. By 9 input images (32 × 32) Ground Truth Network Reconstruction Heat Map (RMSE) Average RMSE (test error)= 0.54611 Figure 4: Results of using nonlinear feedforward network as mapping component on BESEL face dataset input images (32 × 32) Ground Truth Network Reconstruction Average RMSE (test error) = 0.0625 Figure 5: Results of using nonlinear feedforward network as mapping component on Modelnet dataset using this model as encoder component, we first verify the possibility of using pre-trained components in our framework and second analyze the use of more complicated representations for solving inverse rendering problem in our proposed framework. We fine-tuned alexnet using a set of colored Figure 6: alexnet as encoder component in the proposed framework 2D input images of about 2000 samples generated by BESEL face dataset, and 10000 samples from Modelnet10 and the results are shown in Figures 7, 8 respectively. in the case of Modelnet10, Since there were no texture associated with the object to be rendered as a color image, we just represent the input images with the size 227 × 227 × 3 to feed to the network. From Figures 7, 8 it is observable that using this configuration and with computing more complex representations for 2D input images, the accuracy of reconstruction will be improved compared with the linear autoencoder. Actually, the objective of encoder component is to compute representations which are more suitable for being mapped to 3D representation and the results show that more complicated representations are appropriate for this aim. In the case of decoder component, the aim is recovering sharp 3D shapes from 3D represen10 input image (227 × 227 × 3) Ground Truth Network Reconstruction Heat Map ( RMSE) Average RMSE = 0.37124 Figure 7: Visual and numerical results of using alexnet as encoder in proposed framework (BESEL face Dataset) input image (227 × 227 × 3 each) Ground Truth Network Reconstruction Average RMSE = 0.0220 Figure 8: Visual and numerical results of using alexnet as encoder in proposed framework (Modelnet10 Dataset) tations. therefore, the representation in this component should be so that the 3D shape can be inferred from. in the case of point cloud 3d shapes, where we directly deal with real 3D coordinate values the linear decoder gives the most promising result compared with nonlinear and convolutional structures with blur results. in the case of binary volume 3D shapes, where the output can be digitized to 0 and 1 using some threshold value, nonlinear structures show promising performances. figure 9 shows the digaram of RMSE vs epoch using different mentioned structures for different types of 3D shapes. 5.7 Pose invariant reconstruction Figure 10 shows the power of proposed framework in reconstruction of a sample face input image captured from 3 different poses. 5.8 Reconstruction results on realistic datasets We evaluated the final configuration of our framework (Alexnet encoder – nonlinear mapping – linear decoder) on Bosphorus Face dataset as a realistic 3D face dataset. Figure 8 shows the results and their heat map in terms of RMSE on Bosphorus dataset.We also compared the visual reconstruction results of proposed framework with [12] and [30] on some realistic images. 11 (a) ModelNet Dataset (b) BESEL Face Dataset Figure 9: Validation error vs Epoch for Different structures used as components in proposed frameworks for (a) ModelNet dataset and (b) Face dataset where Lin: Linear encoder or decoder, FF: Nonlinear FeedForward network, Conv: Convolutional encoder or decoder Input image Network Reconstruction Heat map (RMSE) Figure 10: Result of proposed framework on Bosphorus face dataset In the case of realistic images we first manually cropped the face from input image and then aligned tha intensity of the image with a sample image from training samples of our framework using Procrustes analysis used in [29] and then use them as input image to our framework. Note that in order to compute RMSE for heat map we computed the minimum RMSE from Ground truth to network reconstruction. The results in Figure 11 show that the network could successfully recover the main features in each face. Note that using the linear decoder in the case of face datasets is equivalent to performing PCA on all of training samples (about 2000) and this causes achieving better results compared with a predefined 3DMM using small set of training data. Figure 9 shows some visual reconstruction results, using some realistic images, obtained by proposed framework compared with two similar recent reconstruction methods [30] and [12] which where described in section 3. We can see that the results obtained by proposed framework are comparable with unsupervised raining methods and can detect more shape details compared with the binary volume representation for 3D shapes. We believe this is because of dealing directly with point clouds and extracting basis vectors from a large set of training data. 6 Discussion As we observed in the experiments, using a convolutional network as 2D encoder and mapping component in our framework significantly improves its performance. However in the case of 3D decoder using a non-convolutional network (linear or non-linear) results in better reconstruction results. We believe this is because a in convolutional Autoencoder, reconstruction of the representation 12 Figure 11: Result of proposed framework on Bosphorus face dataset obtained from data may be inaccurate because of the information loss resulted by convolution and pooling units. Another Property of our proposed framework is the use of autoencoder to directly reconstruct the 3D shape structure by learning from large set of examples. this structure Uses the training data itself to extract bases of the shape space. We believe and this characteristic leads to have unbiased reconstructions rather than using a predefined 3D model which is biased toward mean shape of the training samples. On the other hand, working directly with point cloud representation for representing the 3D shape helps the framework to achieve more detailed results. As a disadvantage of regressing process in our framework, we can mention the existing loss functions. in the case of situation which the output of the network should be some exact values for regression, there is need to define a suitable loss function to guide the learning process toward finding desired solution. If we can turn the problem of regression into the form of some classification problem using losses like cross entropy and so on, we will achieve more desirable solutions like the results obtained by Generator Adversarial Netwok (GAN) frameworks. 7 Conclusions and future works In this paper, a semi-supervised interpretable framework is proposed for pose invariant 3D shape inverse rendering from a single 2D input image. Using autoencoder based on mapping suitable low dimensional representations computed from 2D and 3D data components for extracting representations and reconstruction of final 3D shapes in the proposed framework, on one hand, makes it possible to use unlabeled data for unsupervised pre-training and therefore reducing the need to large sets of labeled data for training the framework and on the other hand, helps to achieve more promising and detailed reconstructions because of extraction of bases vector of 3D shape space from the large set of training data compared with predefined 3D models. in this proposed framework two types of 3D shape representations were used for reconstruction: point cloud and binary volumes. The obtained results show that binary volumes are more suitable representations for more complicated deep networks. However they express blur shapes with high dimensional representation and can express less details compared with point cloud representations. on the other hand, working with exact 3D coordinates of point clouds is not too easy for deep networks and linear structures are preferred for such shape reconstructions. In the future attempts one can unify the Inverse rendering framework for working with both point cloud and volume shape structures for different class of objects. 13 Input image Tewari et al. [30] Jackson [12] Ours Figure 12: Comparing viual reconstruction results with [12, 30] References [1] Aldrian, O., and Smith, W. A. Inverse rendering of faces with a 3d morphable model. IEEE transactions on pattern analysis and machine intelligence 35, 5 (2013), 1080–1093. [2] Baldi, P., and Hornik, K. Neural networks and principal component analysis: Learning from examples without local minima. Neural networks 2, 1 (1989), 53–58. [3] Blanz, V., and Vetter, T. A morphable model for the synthesis of 3d faces. In Proceedings of the 26th annual conference on Computer graphics and interactive techniques (1999), ACM Press/Addison-Wesley Publishing Co., pp. 187–194. [4] Chang, A. X., Funkhouser, T., Guibas, L., Hanrahan, P., Huang, Q., Li, Z., Savarese, S., Savva, M., Song, S., Su, H., et al. Shapenet: An information-rich 3d model repository. arXiv preprint arXiv:1512.03012 (2015). [5] Deng, J., Dong, W., Socher, R., Li, L.-J., Li, K., and Fei-Fei, L. Imagenet: A large-scale hierarchical image database. In Computer Vision and Pattern Recognition, 2009. CVPR 2009. IEEE Conference on (2009), IEEE, pp. 248–255. [6] Dou, P., Shah, S. K., and Kakadiaris, I. A. End-to-end 3d face reconstruction with deep neural networks. arXiv preprint arXiv:1704.05020 (2017). [7] Fouhey, D. F., Gupta, A., and Zisserman, A. Understanding higher-order shape via 3d shape attributes. arXiv preprint arXiv:1612.06836 (2016). [8] Gadelha, M., Maji, S., and Wang, R. 3d shape induction from 2d views of multiple objects. arXiv preprint arXiv:1612.05872 (2016). [9] Gao, Y., and Yuille, A. L. Exploiting symmetry and/or manhattan properties for 3d object structure estimation from single and multiple images. arXiv preprint arXiv:1607.07129 (2016). [10] Garrido, P., Zollhöfer, M., Casas, D., Valgaerts, L., Varanasi, K., Pérez, P., and Theobalt, C. Reconstruction of personalized 3d face rigs from monocular video. ACM Transactions on Graphics (TOG) 35, 3 (2016), 28. [11] Huang, G. B., Ramesh, M., Berg, T., and Learned-Miller, E. Labeled faces in the wild: A database for studying face recognition in unconstrained environments. Tech. Rep. 07-49, University of Massachusetts, Amherst, October 2007. 14 [12] Jackson, A. S., Bulat, A., Argyriou, V., and Tzimiropoulos, G. Large pose 3d face reconstruction from a single image via direct volumetric cnn regression. arXiv preprint arXiv:1703.07834 (2017). [13] Jiang, L., Zhang, J., Deng, B., Li, H., and Liu, L. 3d face reconstruction with geometry details from a single image. arXiv preprint arXiv:1702.05619 (2017). [14] Kim, H., Zollhöfer, M., Tewari, A., Thies, J., Richardt, C., and Theobalt, C. Inversefacenet: Deep single-shot inverse face rendering from a single image. arXiv preprint arXiv:1703.10956 (2017). [15] Kim, K., Torii, A., and Okutomi, M. Multi-view inverse rendering under arbitrary illumination and albedo. In European Conference on Computer Vision (2016), Springer, pp. 750–767. [16] Krizhevsky, A., Sutskever, I., and Hinton, G. E. Imagenet classification with deep convolutional neural networks. In Advances in neural information processing systems (2012), pp. 1097–1105. [17] Liu, J., Yu, F., and Funkhouser, T. Interactive 3d modeling with a generative adversarial network. arXiv preprint arXiv:1706.05170 (2017). [18] Lun, Z., Gadelha, M., Kalogerakis, E., Maji, S., and Wang, R. 3d shape reconstruction from sketches via multi-view convolutional networks. arXiv preprint arXiv:1707.06375 (2017). [19] Marschner, S. R., and Greenberg, D. P. Inverse rendering for computer graphics. Cornell University, 1998. [20] Parkhi, O. M., Vedaldi, A., Zisserman, A., et al. Deep face recognition. In BMVC (2015), vol. 1, p. 6. [21] Patow, G., and Pueyo, X. A survey of inverse rendering problems. In Computer graphics forum (2003), vol. 22, Wiley Online Library, pp. 663–687. [22] Paysan, P., Knothe, R., Amberg, B., Romdhani, S., and Vetter, T. A 3d face model for pose and illumination invariant face recognition. In Advanced Video and Signal Based Surveillance, 2009. AVSS’09. Sixth IEEE International Conference on (2009), Ieee, pp. 296–301. [23] Piotraschke, M., and Blanz, V. Automated 3d face reconstruction from multiple images using quality measures. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (2016), pp. 3418–3427. [24] Poggio, T., and Koch, C. Ill-posed problems in early vision: from computational theory to analogue networks. Proceedings of the Royal Society of London B: Biological Sciences 226, 1244 (1985), 303–323. [25] Rezende, D. J., Eslami, S. A., Mohamed, S., Battaglia, P., Jaderberg, M., and Heess, N. Unsupervised learning of 3d structure from images. In Advances in Neural Information Processing Systems (2016), pp. 4996–5004. [26] Richardson, E., Sela, M., and Kimmel, R. 3d face reconstruction by learning from synthetic data. In 3D Vision (3DV), 2016 Fourth International Conference on (2016), IEEE, pp. 460–469. [27] Richardson, E., Sela, M., Or-El, R., and Kimmel, R. Learning detailed face reconstruction from a single image. arXiv preprint arXiv:1611.05053 (2016). [28] Savran, A., Alyüz, N., Dibeklioğlu, H., Çeliktutan, O., Gökberk, B., Sankur, B., and Akarun, L. Bosphorus database for 3d face analysis. Biometrics and identity management (2008), 47–56. [29] Skoglund, K. Three-dimensional face modelling and analysis. Master’s thesis, Technical University of Denmark, DTU, DK-2800 Kgs. Lyngby, Denmark, 2003. 15 [30] Tewari, A., Zollhöfer, M., Kim, H., Garrido, P., Bernard, F., Pérez, P., and Theobalt, C. Mofa: Model-based deep convolutional face autoencoder for unsupervised monocular reconstruction. arXiv preprint arXiv:1703.10580 (2017). [31] Thies, J., Zollhofer, M., Stamminger, M., Theobalt, C., and Nießner, M. Face2face: Real-time face capture and reenactment of rgb videos. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (2016), pp. 2387–2395. [32] Tran, A. T., Hassner, T., Masi, I., and Medioni, G. Regressing robust and discriminative 3d morphable models with a very deep neural network. arXiv preprint arXiv:1612.04904 (2016). [33] Wang, J., Che, C., Galeotti, J., Horvath, S., Gorantla, V., and Stetten, G. Ultrasound tracking using probesight: Camera pose estimation relative to external anatomy by inverse rendering of a prior high-resolution 3d surface map. In Applications of Computer Vision (WACV), 2017 IEEE Winter Conference on (2017), IEEE, pp. 825–833. [34] Wolpert, D. H., and Macready, W. G. No free lunch theorems for optimization. IEEE transactions on evolutionary computation 1, 1 (1997), 67–82. [35] Wood, E., Baltrušaitis, T., Morency, L.-P., Robinson, P., and Bulling, A. A 3d morphable eye region model for gaze estimation. In European Conference on Computer Vision (2016), Springer, pp. 297–313. [36] Wu, Z., Song, S., Khosla, A., Yu, F., Zhang, L., Tang, X., and Xiao, J. 3d shapenets: A deep representation for volumetric shapes. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (2015), pp. 1912–1920. [37] Yu, D., and Deng, L. Automatic speech recognition: A deep learning approach. Springer, 2014. [38] Zhu, X., Lei, Z., Liu, X., Shi, H., and Li, S. Z. Face alignment across large poses: A 3d solution. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (2016), pp. 146–155. 16
2cs.AI
1 Computation of Optimal Control Problems with Terminal Constraint via Variation Evolution Sheng ZHANG, Bo LIAO, and Fei LIAO (2017.12) Abstract: Enlightened from the inverse consideration of the stable continuous-time dynamics evolution, the Variation Evolving Method (VEM) analogizes the optimal solution to the equilibrium point of an infinite-dimensional dynamic system and solves it in an asymptotically evolving way. In this paper, the compact version of the VEM is further developed for the computation of Optimal Control Problems (OCPs) with terminal constraint. The corresponding Evolution Partial Differential Equation (EPDE), which describes the variation motion towards the optimal solution, is derived, and the costate-free optimality conditions are established. The explicit analytic expressions of the costates and the Lagrange multipliers adjoining the terminal constraint, related to the states and the control variables, are presented. With the semi-discrete method in the field of PDE numerical calculation, the EPDE is discretized as finite-dimensional Initial-value Problems (IVPs) to be solved, with common Ordinary Differential Equation (ODE) numerical integration methods. Key words: Optimal control, dynamics stability, variation evolution, initial-value problem, costate-free optimality condition. I. INTRODUCTION Optimal control theory aims to determine the inputs to a dynamic system that optimize a specified performance index while satisfying constraints on the motion of the system. It is closely related to engineering and has been widely studied [1]. Because of the complexity, Optimal Control Problems (OCPs) are usually solved with numerical methods. Various numerical methods are developed and generally they are divided into two classes, namely, the direct methods and the indirect methods [2]. The direct methods discretize the control or/and state variables to obtain the Nonlinear Programming (NLP) problem, for example, the widely-used direct shooting method [3] and the classic collocation method [4]. These methods are easy to apply, whereas the results obtained are usually suboptimal [5], and the optimal may be infinitely approached. The indirect methods transform the OCP to a Boundary-value Problem (BVP) through the optimality conditions. Typical methods of this type include the well-known indirect shooting method [2] and the novel symplectic method [6]. Although be more precise, the indirect methods often suffer from the significant numerical difficulty due to the ill-conditioning of the Hamiltonian dynamics, that is, the stability of costates dynamics is adverse to that of the states dynamics [7]. The recent development, representatively the Pseudo-spectral (PS) method [8], blends the two types of methods, as it unifies the NLP and the BVP in a dualization view [9]. Such methods inherit the advantages of both types and blur their difference. Theories in the control field often enlighten strategies for the optimal control computation, for example, the non-linear variable transformation to reduce the variables [10]. Recently, a new Variation Evolving Method (VEM), which is enlightened by the states evolution within the stable continuous-time dynamic system, is proposed for the optimal control computation [11][12][13]. The The first author is with the Computational Aerodynamics Institution, China Aerodynamics Research and Development Center, Mianyang, 621000, China. (e-mail: [email protected]). 2 VEM also synthesizes the direct and indirect methods, but from a new standpoint. The Evolution Partial Differential Equation (EPDE), which describes the evolution of variables towards the optimal solution, is derived from the viewpoint of variation motion, and the optimality conditions will be asymptotically met under this frame. In Refs. [11] and [12], besides the states and the controls, the costates are also employed in developing the EPDE, and this increases the complexity of the computation. Ref. [13] proposed the compact version of the VEM that uses only the original variables, but it can only handles a class of OCPs with free terminal states. In this paper, the VEM is further developed to accommodate the OCPs with terminal constraint, and the corresponding evolution equations are derived. Throughout the paper, our work is built upon the assumption that the solution for the optimization problem exists. We do not describe the existing conditions for the purpose of brevity. Relevant researches such as the Filippov-Cesari theorem are documented in [14]. In the following, first the principle of the VEM and the results regarding the OCPs without terminal constraint are reviewed. Then the VEM for OCPs with terminal constraint is developed. During this course, the equivalent costate-free optimality conditions are established, and the explicit analytic solution of costates and Lagrange multipliers in the classic treatment are obtained. Later illustrative examples are solved to verify the effectiveness of the method. II. PRELIMINARIES A. Principle of VEM The VEM is a newly developed method for the optimal solutions. It originates from the dynamics stability theory in the control field. Lemma 1 [15] (with small adaptation): For a continuous-time autonomous dynamic system like x = f ( x ) where x ∈ \ n is the state, x = (1) dx is its time derivative, and f : \ n → \ n is a vector function. Let x̂ , contained within the dt domain D , be an equilibrium point that satisfies f ( xˆ ) = 0 and D . If there exists a continuously differentiable function V : D → \ such that i) V ( xˆ ) = c and V ( x ) > c in D / { xˆ } . ii) V ( x ) ≤ 0 in D and V ( x ) < 0 in D / { xˆ } . where c is a constant. Then x = xˆ is an asymptotically stable point in D . Lemma 1 aims to the dynamic system with finite-dimensional states, and it may be directly generalized to the infinite-dimensional case as Lemma 2: For an infinite-dimensional dynamic system described by δ y ( x) = f ( y, x) δt (2) ∂y ( x, t ) = f ( y, x) ∂t (3) or presented equivalently in the PDE form as where “ δ ” denotes the variation operator and “ ∂ ” denotes the partial differential operator. x ∈ \ is the independent variable, y ( x) ∈ \ n ( x) is the function vector of x , and f : \ n ( x) × \ → \ n ( x) is a vector function. Let yˆ ( x) , contained 3 within a certain function set D ( x) , is an equilibrium function that satisfies f ( yˆ ( x), x) = 0 . If there exists a continuously differentiable functional V : D ( x) → \ such that i) V ( yˆ ( x) ) = c and V ( y ( x) ) > c in D ( x) / { yˆ ( x)} . ii) V ( y ( x) ) ≤ 0 in D ( x) and V ( y ( x) ) < 0 in D ( x) / { yˆ ( x)} . where c is a constant. Then y ( x) = yˆ ( x) is an asymptotically stable solution in D ( x ) . In the system dynamics theory, from the stable dynamics, we may construct a monotonously decreasing function (or functional) V , which will achieve its minimum when the equilibrium is reached. Inspired by it, now we consider its inverse problem, that is, from a performance index function to derive the dynamics that minimize this performance index, and optimization problems are just the right platform for practice. Under this thought, the optimal solution is analogized to the equilibrium of a dynamic system and is anticipated to be obtained in an asymptotically evolving way. Accordingly, a virtual dimension, the variation time τ , is introduced to implement the idea that a variable x (t ) evolves to the optimal solution to minimize the performance index within the dynamics governed by the variation dynamic evolution equations. Fig. 1 illustrates the variation evolution process of the VEM in solving the OCP. Through the variation motion, the initial guess of variable will evolve to the optimal solution. Fig. 1. The illustration of the variable evolving along the variation time τ in the VEM. The VEM bred under this idea is demonstrated for the unconstrained calculus-of-variations problems and the OCPs with free terminal states [11][13]. The variation dynamic evolution equations, derived under the frame of the VEM, may be reformulated as the EPDE and the Evolution Differential Equation (EDE), by replacing the variation operator “ δ ” with the partial differential operator “ ∂ ” and differential operator “ d ”. Since the right function of the EPDE only depends on the time t , it is suitable to be solved with the well-known semi-discrete method in the field of PDE numerical calculation [16]. Through the discretization along the normal time dimension, the EPDE is transformed to the finite-dimensional Initial-value Problem (IVP) to be solved, with the mature Ordinary Differential Equation (ODE) integration methods. Note that the resulting IVP is defined with respect to the variation time τ , not the normal time t . B. Results for OCPs with free terminal states To clear the development, first the results for the OCPs with free terminal states, obtained under the frame of the VEM, is recalled. Problem 1:Consider performance index of Bolza form J = ϕ ( x (t f ), t f ) + ∫ L ( x (t ), u(t ), t ) dt tf t0 subject to the dynamic equation (4) 4 x = f ( x,u, t ) (5) where t ∈ \ is the time. x ∈ \ n is the state vector and its elements belong to C 2 [t0 , t f ] . u ∈ \ m is the control vector and its elements belong to C1[t0 , t f ] . The function L : \ n × \ m × \ → \ and its first-order partial derivatives are continuous with respect to x , u and t . The function ϕ : \ m × \ → \ and its first-order and second-order partial derivatives are continuous with respect to x and t . The vector function f : \ n × \ m × \ → \ n and its first-order partial derivatives are continuous and Lipschitz in x , u and t . The initial time t0 is fixed and the terminal time t f is free. The initial boundary conditions are prescribed as x (t0 ) = x0 (6) and the terminal states are free. Find the optimal solution ( xˆ , uˆ ) that minimizes J , i.e. ( xˆ , uˆ ) = arg min( J ) (7) For this class of OCPs, presuming we already have a feasible initial solution of the states and control variables that satisfies Eqs. (5) and (6), the variation dynamic evolution equations derived from the VEM are t δx δu = ∫ Φo (t , s ) f u ( s ) (s) d s t δτ δτ (8) 0 δu = − Kpu (t ) δτ δtf = −kt L + ϕt + ϕ x T f δτ f ( (9) ) (10) tf where pu (t ) = Lu + fu Tϕ x + fu T (∫ tf t ( ) Φo T (σ , t ) Lx (σ ) + ϕtx (σ ) + ϕ xx T (σ ) f (σ ) + f x (σ )T ϕ x (σ ) d σ ) (11) K is the m × m dimensional positive-definite matrix and kt f is a positive constant. Φo (t , s ) is the n × n dimensional state transition matrix from time point s to time point t , which satisfies ∂ Φo (t , s ) = f x (t )Φo (t , s) ∂t (12) Use the partial differential operator “ ∂ ” and the differential operator “ d ”, the variation dynamic evolution equations may be reformulated to get the following EPDE and EDE as ∂ ∂τ ∂u ⎡ t ⎤ ⎡ x ⎤ ⎢ ∫ Φo (t , s ) f u ( s ) ( s ) d s ⎥ t0 = ∂τ ⎢u⎥ ⎢ ⎥ ⎣ ⎦ ⎢ − Kpu ⎣ ⎦⎥ dt f dτ ( = − kt f L + ϕ t + ϕ x T f with the definite conditions including the initial guess of t f , i.e., t f τ =0 ) (13) (14) tf = tf , and, ⎡ x (t ,τ ) ⎤ ⎡ x (t ) ⎤ =⎢ ⎢ u(t ,τ ) ⎥ ⎥ ⎣ ⎦ τ = 0 ⎣ u (t ) ⎦ (15) where x (t ) and u (t ) are the initial feasible solution. The solution at τ = ∞ , determined by Eqs. (13), (14) and (15), will satisfy 5 pu = 0 (16) L(t f ) + φt (t f ) + ϕ x T (t f ) f (t f ) = 0 (17) Eqs. (16) and (17) are the first-order optimality conditions for Problem 1 without the employment of costates. They are proved equivalent to the traditional ones with costates [17]. III. VEM FOR OCPS WITH TERMINAL CONSTRAINT A. Problem definition In this paper, we consider the OCPs with terminal constraint that is defined as Problem 2:Consider performance index of Bolza form J = ϕ ( x (t f ), t f ) + ∫ L ( x (t ), u(t ), t ) dt tf (18) t0 subject to the dynamic equation x = f ( x,u, t ) (19) where t ∈ \ is the time. x ∈ \ n is the state vector and its elements belong to C 2 [t0 , t f ] . u ∈ \ m is the control vector and its elements belong to C1[t0 , t f ] . The function L : \ n × \ m × \ → \ and its first-order partial derivatives are continuous with respect to x , u and t . The function ϕ : \ m × \ → \ and its first-order and second-order partial derivatives are continuous with respect to x and t . The vector function f : \ n × \ m × \ → \ n and its first-order partial derivatives are continuous and Lipschitz in x , u and t . The initial time t0 is fixed and the terminal time t f is free. The initial and terminal boundary conditions are respectively prescribed as x (t0 ) = x0 ( (20) ) g x (t f ), t f = 0 (21) where g : \ n × \ → \ q is a q dimensional vector function with continuous first-order partial derivatives. Find the optimal solution ( xˆ , uˆ ) that minimizes J , i.e. ( xˆ , uˆ ) = arg min( J ) (22) Compared with the OCPs with free terminal states as defined in Problem 1, Problem 2 covers them because Problem 1 may be considered as a special case with g = 0 . B. Derivation of variation dynamic evolution equations Instead of circumventing Problem 2 by constructing an equivalent unconstrained functional problem that has the same extremum [11], we will address Problem 2 in the way similar to Ref. [13]. We also consider the problem within the feasible solution domain D o , in which any solution satisfies Eqs. (19), (20) and (21). First we transform the Bolza performance index to the equivalent Lagrange type, i.e. J =∫ tf t0 (ϕ + ϕ t x T ) f ( x,u, t ) + L( x , u, t ) dt (23) where ϕt and ϕ x are the partial derivatives notated as before. Differentiating Eq. (23) with respect to the variation time τ gives 6 δtf t δJ = (ϕt + ϕ x T f + L) +∫ t t δτ δτ f 0 f δu⎞ ⎛ T T T T δx dt + (ϕ x T fu + Lu T ) ⎜ (ϕtx + f ϕ xx + ϕ x f x + Lx ) δτ δτ ⎟⎠ ⎝ (24) where ϕtx and ϕ xx are second-order partial derivatives in the form of (column) vector and matrix, and f x and f u are the Jacobi matrixes. For the solutions in D o , δx δu and are related because of Eq. (19), and they need to satisfies the following variation δτ δτ equation as δ x δx δu = fx + fu δτ δτ δτ with the initial condition (25) δx = 0 . Note that f x and f u are time-dependent matrixes linearized at the feasible solution x (t ) and δτ t 0 u(t ) . Eq. (25) is a linear time-varying equation and has a zero initial value. Thus according to the linear system theory [18], its solution may be explicitly expressed by Eq. (8). Use Eq. (8) and follow the same derivation as Ref. [13], we again obtain δtf t δJ δu = (ϕt + ϕ x T f + L) + ∫ pu T dt t t δτ δτ δτ f (26) 0 f Different from the OCPs with free terminal states, we cannot use the variation dynamic evolution equations (9) and (10) to achieve δJ ≤ 0 . This is because in that way the terminal constraint (21) is not guaranteed, and we have to find a solution that not only δτ guarantees δJ ≤ 0 but also satisfies the variation equation of Eq. (21) as δτ δtf t δu g x ∫ Φo (t f , t ) f u (t ) (t ) d t + ( g x f + gt ) =0 t δτ δτ f f f 0 (27) f Theorem 1: The following variation dynamic evolution equations guarantees that the solution stays in the feasible domain and the performance index δJ ≤0 δτ δu = − K pu + f uT Φ T (t f , t ) g x T π δτ ( δtf δτ f ( ) = − kt f L + ϕt + ϕ x T f + π T ( g x f f + gt f ) (28) ) (29) tf where K is the m × m dimensional positive-definite matrix and kt f is a positive constant, pu is defined in Eq. (11) and the parameter vector π ∈ \ q is the solution of the linear matrix equation Mπ = − r (30) where the q × q dimensional matrix M and the q dimension vector r are M = gx f (∫ tf t0 ) Φ (t f , t ) f u Kf uT Φ T (t f , t ) d t g x f T + kt f ( g x f f + gt f )( g x f f + gt f )T r = gxf (∫ tf t0 ) Φ (t f , t ) f u Kpu d t + kt f ( g x f f + gt f ) (ϕt + ϕ x T f + L) Moreover, under the evolution equations (28) and (29), δJ = 0 occurs only when δτ tf tf (31) (32) 7 pu + f u T Φ T (t f , t ) g x f T π = 0 (ϕt + ϕ x T f + L + π T ( g x f f + gt f )) (33) tf =0 (34) and the optimal value of π satisfies ⎡ M s1 ⎤ ⎡ rs1 ⎤ ⎢ M ⎥ π = − ⎢r ⎥ ⎣ s2 ⎦ ⎣ s2 ⎦ (35) where the q × q dimensional matrixes M s1 , M s 2 and the q dimension vectors rs1 , rs 2 are M s1 = g x f (∫ tf t0 ) Φ (t f , t ) f u f uT Φ T (t f , t ) d t g x f T M s 2 = ( g x f f + gt f )( g x f f + gt f )T rs1 = g x f tf ∫t tf Φ (t f , t ) f u pu d t (36) (37) (38) 0 rs 2 = ( g x f f + gt f ) (ϕt + ϕ x T f + L) tf (39) Proof: We will derive Eqs. (28) and (29) though the optimization theory. Reformulate Eq. (26) as a constrained optimization problem subject to Eq. (27) as J t1 = (ϕt + ϕ x T f + L) Note that now δtf tf δτ tf + ∫ pu T t0 δu dt δτ (40) δtf δu is the decision variable and is the decision parameter. Since the minimum of this optimization problem δτ δτ may be negative infinity, to penalize too large decision variable (parameter), we introduce another performance index J t 2 to formulate a Multi-objective Optimization Problem (MOP) as min( J t1 , J t 2 ) (41) s.t. gxf tf ∫t Φo (t f , t ) f u (t ) 0 δtf δu (t ) d t + ( g x f + gt ) =0 δτ δτ f f where Jt 2 = tf 1 δ u T δu 1 δtf 2 ( ) +∫ ( ) K −1 dt t0 2 δτ δτ 2kt f δτ (42) We use the weighting method to solve the Pareto optimal solution of this MOP, and the resulting performance index is J t 3 = aJ t1 + bJ t 2 (43) where a ≥ 0 , b ≥ 0 and a + b = 1 . When a = 1, b = 0 , we get a solution that minimizes J t1 . When a = 0, b = 1 , we get a solution that minimize J t 2 . Otherwise, we get a compromising solution. For this MOP, obviously in the case of a = 0, b = 1 , the Pareto optimal solution is that δtf δτ = 0 and δu = 0 , and now the value of performance indexes are J t1 = 0 and J t 2 = 0 . For any other δτ cases, the compromising solution guarantees that J t1 ≤ 0 . 8 Set a = 1 1 , b = and introduce the Lagrange multiplier π ∈ \ q to adjoin the constraint, we may get the unconstrained 2 2 optimization problem as Jt 4 = 1 1 1 ⎛ J t1 + J t 2 + π T ⎜ g x f 2 2 2 ⎝ Use the fist-order optimality conditions, i.e., tf ∫t Φo (t f , t ) f u (t ) 0 δtf δtf ⎞ δu + gt (t ) d t + g x f ⎟ δτ ⎠ δτ δτ f (44) f ∂J t 4 ∂J t 4 = 0 and = 0 , we may get Eqs. (28) and (29). Substitute Eqs. (28) ⎛δu⎞ ⎛δtf ⎞ ∂⎜ ∂⎜ ⎟ ⎟ ⎝ δτ ⎠ ⎝ δτ ⎠ and (29) into Eq. (27), we have gxf tf ∫t 0 ( ) ( ) Φ (t f , t ) f u K pu + f uT Φ T (t f , t ) g x f T π d t + kt f g x f f + gt f (ϕt + ϕ x T f + L + πq×1T g x f f ) tf =0 (45) Further deduction gives ⎛ ⎜ gxf ⎝ = − gxf ( ∫ Φ(t , t) f Kf Φ (t , t) d t ) g + k ( g f + g )( g ( ∫ Φ(t , t) f Kp d t ) − k ( g f + g ) (ϕ + ϕ f + L) tf t0 u f u T T xf f T xf tf tf tf u f t0 u xf tf tf t x xf f + gt f )T tf ⎞ ⎟π ⎠ (46) T tf Thus, with the definition of M in Eq. (31) and r in Eq. (32), Eq. (30) that determines π is obtained. Furthermore, Eq. (26) may be reformulated as δtf t δJ δu = (ϕt + ϕ x T f + L) + ∫ pu T dt t t δτ δτ δτ δtf t = ϕt + ϕ x T f + L + π T ( g x f + gt ) + ∫ pu + f u T Φ T (t f , t ) g x T π t t δτ f 0 f ( f f ) f 0 f ⎛ − πT ⎜ gx f ⎜ ⎝ tf ∫t Φ (t f , t ) f u 0 ( f ) T δu dt δτ (47) δtf ⎞ δu ⎟ d t + ( g x f + gt ) ⎟ δτ t δτ f f f ⎠ With Eqs. (28) and (29), and because now Eq. (27) holds, then δJ = −kt ϕt + ϕ x T f + L + π T ( g x f + gt ) δτ f This means ( f f ) 2 tf −∫ tf t0 (p u ) ( T ) + f u T Φ T (t f , t ) g x f T π K pu + f u T Φ T (t f , t ) g x f T π d t (48) δJ δJ ≤ 0 and = 0 occurs only when Eqs. (33) and (34) hold. δτ δτ For the optimal value of π , since K may be arbitrary right-dimensional positive-definite matrix and kt f may be arbitrary positive constant, we consider three case i) K = 1 , kt f = 1 , ii) K = 21 , kt f = 1 , and iii) K = 1 , kt f = 2 , where 1 is the m × m dimensional identity matrix. By comparing the three cases of substituting the specific values into Eq. (30), we may obtain Eq. (35), which is irrelevant to the specific value of K and kt f . ■ Regarding the linear equation (30), assuming that the control satisfies the controllability requirement [19], then the solution is guaranteed. When M is invertible, the parameter π may be calculated as π = − M −1r (49) 9 C. Equivalence to the classic optimality conditions Actually, Eqs. (33) and (34) are the first-order costate-free optimality conditions for Problem 2. We will show that they are equivalent to the traditional ones with costates [17]. By the adjoining method [14], we may constructed the functional as ( ) J = ϕ ( x (t f ), t f ) + π T g x (t f ), t + ∫ tf t0 (L + λ T ) ( f − x ) dt (50) where λ ∈ \ n is the costate variable vector and π ∈ \ q is the Lagrange multiplier parameter. Then the first-order variation may be derived as ( δ J = ϕt + π T gt + H f f ) tf ( ) δ t f + λ(t f ) − ϕ x (t f ) − g x T π δ x (t f ) + ∫ f tf t0 ( (H λ ) − x )T δ λ + ( H x + λ)T δ x + H uTδ u dt (51) where H = L + λT f is the Hamiltonian. Through δ J = 0 , we have λ + H x = λ + Lx + f x T λ = 0 (52) H u = Lu + f u T λ = 0 (53) and the transversality conditions H (t f ) + ϕt f + π T gt f = 0 (54) λ(t f ) − ϕ x (t f ) − g x f T π = 0 (55) Theorem 2: For Problem 2, the optimality conditions given by Eqs. (33) and (34) are equivalent to the optimality conditions given by (52)-(54). Proof: Define a quantity γ (t ) as ( tf ) γ (t ) = ϕ x (t ) + Φo T (t f , t ) g x f T π + ∫ Φo T (σ , t ) Lx (σ ) + ϕtx (σ ) + ϕ xx T (σ ) f (σ ) + f x (σ )T ϕ x (σ ) d σ t (56) Obviously, when t = t f , there is γ (t f ) = ϕ x (t f ) + g x f T π (57) Lu + fu T γ = 0 (58) Then Eq. (33) is simplified as Differentiate γ (t ) with respect to t . In the process, we will use the Leibniz rule [20] d dt (∫ a (t ) b (t ) ) h(σ , t ) d σ = h ( a (t ), t ) a (t ) d d a (t ) − h ( b(t ), t ) b(t ) + ∫ ht (σ , t ) d σ (t ) b dt dt (59) and the property of Φo (σ , t ) [18] ∂Φo (σ , t ) = −Φo (σ , t ) f x (t ) ∂t (60) Φo (t , t ) = 1 (61) where 1 is the n × n dimensional identity matrix. Then we have ( ) ( ) tf d γ (t ) = ϕtx + ϕxxT f − f xTΦoT (t f , t ) gx f T π − Lx + ϕtx + ϕxxT f + f xTϕx − f xT ∫ ΦoT (σ , t ) Lx (σ ) + ϕtx (σ ) + ϕxxT (σ ) f (σ ) + f x (σ )T ϕx (σ ) dσ t dt ( tf ( ) = −Lx − f xT ϕx (t ) + ΦoT (t f , t ) gx f T π + ∫ ΦoT (σ , t ) Lx (σ ) + ϕtx (σ ) + ϕxxT (σ ) f (σ ) + f x (σ )T ϕx (σ ) dσ t ) (62) = −Lx − f xTγ (t ) This means γ (t ) conforms to the same dynamics as the costates λ(t ) in Eq. (52). Furthermore, use Eqs. (47) and (57), we have 10 ( δ J = L + ϕt + π T gt + γ T f f ) tf δtf + ∫ tf t0 (p u ) T + f uT Φ T (t f , t ) g x f T π δ u d t (63) which hold in the feasible solution domain D o . Compare Eq. (63) with Eq. (51), because δ t f may be arbitrary small, to achieve the extremal condition, Eqs. (34) and (54) should be same, i.e. (L +ϕ tf + π T gt f + λT f ) = (L +ϕ + π tf t T gt f + γ T f ) (64) tf Since Eq. (64) is generally hold for arbitrary g and f , we can conclude that π=π (65) γ (t f ) = λ(t f ) (66) which implies the sameness of Eq. (57) and Eq. (55). With Eq. (62), and because γ (t ) also conforms to the same boundary conditions as the costates λ(t ) , the relation that γ (t ) = λ(t ) is established. Therefore Eqs. (58) and (53) are identical. ■ Again, by investigating the optimality condition (33), it is found that the optimal control are related to the future state, and thus the optimal feedback control law in the analytic form does not exists for the OCPs. From Theorem 2, we actually have got the explicit analytic expression of the costates λ and the Lagrange multipliers π for the classic treatment in Eq. (50), which formerly can only be obtained numerically by solving the BVP. After the proof of Theorem 2, now the variables evolving direction using the VEM is easy to determine. Theorem 3: Solving the IVP with respect to τ , defined by the variation dynamic evolution equations (8), (28) and (29) from a feasible initial solution, when τ → +∞ , ( x , u) will satisfy the optimality conditions of Problem 2. Proof: By Lemma 2 and with Eq. (18) as the Lyapunov functional, we may claim that the minimum solution of Peoblem 2 is an asymptotically stable solution within the feasibility domain D o for the infinite-dimensional dynamics governed by Eqs. (8), (28) and (29). From a feasible initial solution, any evolution under these dynamics maintains the feasibility of the variables, and they also guarantee δJ δJ ≤ 0 . The functional J will decrease until = 0 , which occurs when τ → +∞ due to the asymptotical δτ δτ approach. When δJ =0, this determines the optimal conditions, namely, Eqs. (33) and (34). δτ ■ Presume that we already have a feasible initial solution x (t ) , u (t ) and tf that satisfy Eqs. (19), (20) and (21), Theorem 3 guarantees the infinite-dimensional variation dynamic evolution equations (8), (28) and (29) may be used to obtain the optimal solution that minimizes Eq. (18). D. Formulation of EPDE Use the partial differential operator “ ∂ ” and the differential operator “ d ” to reformulate the variation dynamic evolution equations, we may get the EPDE and EDE as t ∂u ⎡ ∂ ⎡ x ⎤ ⎢ ∫t0 Φo (t , s ) f u ( s ) ∂τ ( s ) d s =⎢ ∂τ ⎢⎣ u ⎥⎦ ⎢ − K pu + f u T Φ T (t f , t ) g x f T π ⎣ ( ) ⎤ ⎥ ⎥ ⎥ ⎦ (67) 11 dt f dτ ( = − kt f L + ϕt + ϕ x T f + π T ( g x f f + gt f ) Put into this perspective, the definite conditions are t f τ =0 ) (68) tf ⎡ x (t ,τ ) ⎤ ⎡ x (t ) ⎤ = tf and ⎢ =⎢ ⎥ ⎥ , where x (t ) and u (t ) are the initial ⎣ u(t ,τ ) ⎦ τ = 0 ⎣ u (t ) ⎦ feasible solution. Eqs. (67) and (68) realize the anticipated variable evolving along the variation time τ as depicted in Fig. 1. The initial conditions of x (t ,τ ) and u(t ,τ ) at τ = 0 belong to the feasible solution domain and their value at τ = +∞ represents the optimal solution of the OCP. The right part of the EPDE (67) is also only a vector function of time t . Thus we may apply the semi-discrete method to discretize it along the normal time dimension and further use ODE integration methods to get the numerical solution. As already pointed out previously that Problem 2 contains Problem 1, thus the results developed in this paper are of more general meaning. See the evolution equations, when the terminal states are free, i.e., g = 0 , they are degraded to the case in Ref. [13]. Moreover, this paper considers the OCPs defined with free terminal time, yet the results obtained are also applicable to the simpler case with fixed terminal time. For those OCPs, the equation regarding the terminal time t f is not necessary anymore, while the evolution equations regarding state variable x and control variable u are still similar with M , r in Eq. (30) simplified as M = gxf (∫ tf t0 ) Φ (t f , t ) f u Kf u T Φ T (t f , t ) d t g x f T r = gxf (∫ tf t0 Φ (t f , t ) f u Kpu d t ) IV. ILLUSTRATIVE EXAMPLES First a linear example taken from Xie [21] is considered. Example 1: Consider the following dynamic system x = Ax + bu ⎡x ⎤ ⎡0 1 ⎤ ⎡0⎤ , b = ⎢ ⎥ . Find the solution that minimizes the performance index where x = ⎢ 1 ⎥ , A = ⎢ ⎥ ⎣0 0⎦ ⎣1 ⎦ ⎣ x2 ⎦ J= 1 tf 2 u dt 2 ∫t0 with the boundary conditions ⎡1⎤ ⎡0⎤ x (t0 ) = ⎢ ⎥ , x (t f ) = ⎢ ⎥ 1 ⎣⎦ ⎣0⎦ where the initial time t0 = 0 and the terminal time t f = 2 are fixed. In solving this example using the VEM, the EPDE derived is t A( t − s ) ∂u ⎡ ⎤ e b ( s) d s ⎥ ∂τ ∂ ⎡ x ⎤ ⎢ ∫t0 ⎥ =⎢ T ⎫ ∂τ ⎢⎣ u ⎥⎦ ⎢ ⎧ A(t f −t ) ⎥ T − + K u e b π ⎨ ⎬⎥ ⎢ ⎩ ⎭ ⎣ ⎦ ( In particular, for this problem, π is a constant that may be calculated as ) (69) (70) 12 ⎡ 3.0 ⎤ π = − M −1r = ⎢ ⎥ ⎣ −2.5 ⎦ tf where M = K ∫ e t0 A(t f −t ) ( bb T e ) A(t f −t ) T tf d t and r = K ∫ e A(t f −t ) t0 bu d t = − Ke A ( t f − t0 ) x0 . The one-dimensional matrix K was set as K = 0.1 . The definite conditions of the EPDE, i.e., the initial guess of the states x (t ) and the control u (t ) , were obtained by numerical integration. To achieve the feasibility, we designed the following control law as u (t ) = −ωn 2 x1 (t ) − 2ωnξ x2 (t ) where the damp parameter is ξ =0.707 and the frequency parameter is set to be time-varying as ωn = 5t . Using the semi-discrete method, the time horizon [t0 , t f ] was discretized uniformly with 41 points. Thus, a dynamic system with 123 states was obtained and the OCP was transformed to a finite-dimensional IVP. The ODE integrator “ode45” in Matlab, with default relative error tolerance 1×10-3 and default absolute error tolerance 1×10-6, was employed to solve the IVP. For comparison, the analytic solution by solving the BVP is presented. xˆ1 = 0.5t 3 − 1.75t 2 + t + 1 xˆ2 = 1.5t 2 − 3.5t + 1 λˆ1 = 3 λˆ = −3t + 3.5 2 uˆ = 3t − 3.5 Figs. 2, 3 and 4 show the evolving process of x1 (t ) , x2 (t ) and u (t ) solutions to the optimal, respectively. At τ = 300s, the numerical solutions are indistinguishable from the optimal, and this shows the effectiveness of the VEM. Fig. 5 plots the profile of performance index value against the variation time. It declines rapidly at first and almost reaches the minimum when τ = 40s. Then it keeps approaching the analytic minimum of 3.25 monotonously. In addition, from Eq. (56), we may compute that ( γ (t ) = Φo T (t f , t )π = e ) A(t f −t ) T 0 ⎤ ⎡ 3.0 ⎤ ⎡ ⎡ 1 3 ⎤ =⎢ π=⎢ ⎥ ⎢ ⎥ ⎥ 1 t t − 2.5 3 3.5 − − + t f ⎦ ⎣ ⎦ ⎣ ⎦⎣ ⎡ λˆ ⎤ It is exactly identical to ⎢ 1 ⎥ , as proved in Theorem 2. ˆ ⎣⎢ λ2 ⎦⎥ 1.4 The analytic solution Numerical solutions with VEM 1.2 1 x1(t) 0.8 τ = 300s 0.6 0.4 τ = 20.1s τ = 10.4s 0.2 τ = 6.0s τ = 2.2s τ = 0s 0 -0.2 0 0.5 1 1.5 2 t Fig. 2 The evolution of numerical solutions of x1 to the optimal solution. 13 1 The optimal solution Numerical solutions with VEM 0.5 0 x2(t) τ = 300s -0.5 -1 -1.5 τ = 20.1s -2 τ = 6.0s τ = 10.4s τ = 2.2s τ = 0s -2.5 0 0.5 1 1.5 2 t Fig. 3 The evolution of numerical solutions of 6 x2 to the optimal solution. The optimal solution Numerical solutions with VEM 4 u (t) 2 0 τ = 300s τ = 20.1s -2 τ = 10.4s τ = 6.0s -4 τ = 2.2s τ = 0s -6 0 0.5 1 1.5 2 t Fig. 4 The evolution of numerical solutions of u to the optimal solution. 12 Minimum of J Funcitonal value of numerical solution 10 J 8 6 4 2 0 50 100 150 τ (s) 200 250 300 Fig. 5 The approach to the minimum of performance index. Now we consider a nonlinear example with free terminal time t f , the Brachistochrone problem [22], which describes the motion curve of the fastest descending. Example 2: Consider the following dynamic system 14 x = f ( x, u ) ⎡x⎤ ⎡ V sin(u ) ⎤ ⎢ ⎥ where x = ⎢ y ⎥ , f = ⎢⎢ −V cos(u ) ⎥⎥ , g = 10 is the gravity constant. Find the solution that minimizes the performance index ⎢⎣ g cos(u ) ⎦⎥ ⎣⎢V ⎦⎥ J = tf with the boundary conditions ⎡x⎤ ⎡0⎤ ⎡ x⎤ ⎡2⎤ ⎢ y⎥ = ⎢⎢ 0 ⎥⎥ , ⎢ ⎥ = ⎢ ⎥ ⎢ ⎥ y −2 ⎢⎣V ⎥⎦ ⎢⎣ 0 ⎥⎦ ⎣ ⎦ t f ⎣ ⎦ t0 = 0 This example has fixed terminal position boundary conditions and free terminal velocity V (t f ) . Thus there is ⎡1 0 0 ⎤ gxf = ⎢ ⎥ ⎣0 1 0⎦ In the specific form of the EPDE (67) and the EDE (68), the parameters K and kt f were set to be 0.1 and 0.05, respectively. The ⎡ x (t ,τ ) ⎤ ⎢ ⎥ definite conditions, i.e., ⎢u (t ,τ ) ⎥ ⎢ t f (τ ) ⎥ ⎣ ⎦ , were obtained from a physical motion along a straight line that connects the initial position to τ =0 the terminal position, that is tf = 0.8 x = 2.5t 2 u = π 4 y = −2.5t 2 V = 5 2t We also discretized the time horizon [t0 , t f ] uniformly, with 101 points. Thus, a large IVP with 405 states (including the terminal time) is obtained. We still employed “ode45” in Matlab for the numerical integration. In the integrator setting, the default relative error tolerance and the absolute error tolerance are 1×10-3 and 1×10-6, respectively. For comparison, we computed the optimal solution with GPOPS-II [23], a Radau PS method based OCP solver. Fig. 6 gives the states curve in the x y coordinate plane, showing that the numerical results starting from a straight line approach the optimal solution over time. The control solutions are plotted in Fig. 7, and the asymptotical approach of the numerical results are demonstrated. In Fig. 8, the terminal time profile against the variation time τ is plotted. The result of t f declines rapidly at first and then gradually approaches to the minimum decline time, and it only changes slightly after τ = 40s. At τ = 300s, we compute that t f = 0.8168s from the VEM, very close to the result of 0.8165s from GPOPS-II. Fig. 9 presents the evolution profiles ⎡ −0.1477 ⎤ of the Lagrange multipliers π . They also approach the optimal value of ⎢ ⎥ rapidly. ⎣ 0.0564 ⎦ 15 0 The optimal solution Numerical solutions with VEM -0.5 τ = 0s τ = 2.0s y(t) τ = 6.5s τ = 10.9s τ = 19.6s -1 τ = 300s -1.5 -2 0 0.5 1 1.5 2 2.5 x(t) Fig. 6 The evolution of numerical solutions in the xy coordinate plane to the optimal solution. 1.4 1.2 The optimal solution Numerical solutions with VEM τ = 19.6s u (t) 1 τ = 10.9s τ = 6.5s 0.8 τ = 2.0s τ = 0s 0.6 0.4 τ = 300s 0.2 0 0 0.2 0.4 0.6 0.8 1 t Fig. 7. The evolution of numerical solutions of u to the optimal solution. 0.9 Minimum decline time Evolving profile of tf 0.86 f t (s) 0.88 0.84 0.82 0.8 0 50 100 150 τ (s) 200 250 300 Fig. 8 The evolution profile of t f to the minimum decline time. 16 0.2 π corresponding to x( tf )= 2 0.15 π corresponding to y( tf )= -2 0.1 π 0.05 0 -0.05 -0.1 -0.15 -0.2 0 50 100 150 τ (s) 200 250 Fig. 9 The evolution profiles of the Lagrange multipliers 300 π. V. CONCLUSION This paper further developes the compact Variation Evolving Method (VEM) to address the computation of Optimal Control Problems (OCPs) with terminal constraint. A set of more general evolution equations is derived, and the costate-free optimality conditions are established for OCPs with prescribed terminal boundary conditions. Especially, from the equivalence proof of the optimality conditions, even if the costates are completely not considered during the derivation, its analytic expressions related to the states and the control variables are obtained. The analytic relations between Lagrange multipliers, which adjoin the terminal constraints, and the original variables are also explicitly got. These results may help us to deepen the understanding towards the optimal control theory. However, currently the proposed method requires the initial solution to be feasible. This is inflexible, especially for the problem with terminal constraint, and further studies will be carried out to address this issue. REFERENCES [1] H. J. Pesch and M. Plail, “The maximum principle of optimal control: A history of ingenious ideas and missed opportunities,” Control & Cybernetics, vol. 38, no. 4, pp. 973-995, 2009. [2] J. T. Betts, “Survey of numerical methods for trajectory optimization,” J. Guid. Control Dynam., vol. 21, no. 2, pp. 193-206, 1998. [3] Q. Lin, R. Loxton, and K. L. Teo, "The control parameterization method for nonlinear optimal control: a survey," Journal of Industrial and Management Optimization, vol. 10, no. 1, pp. 275- 309, 2014 [4] C. Hargraves and W. Paris, “Direct trajectory optimization using nonlinear programming and collocation,” J. Guid. Control Dynam., vol. 10, no. 4, pp. 338-342, 1987. [5] O. V. Stryk and R. Bulirsch, “Direct and indirect methods for trajectory optimization,” Ann. Oper. Res., vol. 37, no. 1, pp. 357-373, 1992. [6] H. J. Peng, Q. Gao, Z. G. Wu, and W. X. Zhong, “Symplectic approaches for solving two-point boundary-value problems,” J. Guid. Control Dynam., vol. 35, no. 2, pp. 653-658, 2012. [7] A. V. Rao, “A survey of numerical methods for optimal control,” in Proc. AAS/AIAA Astrodynam. Specialist Conf., Pittsburgh, PA, 2009, AAS Paper 09-334. [8] D. Garg, M. A. Patterson, W. W. Hager, A. V. Rao, et al, A Unified framework for the numerical solution of optimal control problems using pseudospectral methods,” Automatica, vol. 46, no. 11, pp. 1843-1851, 2010. 17 [9] I. M. Ross and F. Fahroo, “A perspective on methods for trajectory optimization,” in Proc. AIAA/AAS Astrodynam. Conf., Monterey, CA, 2002, AIAA Paper No. 2002-4727. [10] I. M. Ross and F. Fahroo, “Pseudospectral methods for optimal motion planning of differentially flat systems,” IEEE Trans. Autom. Control, vol. 49, no. 8, pp. 1410-1413, 2004. [11] S. Zhang, E. M. Yong, W. Q. Qian, and K. F. He, “A Variation Evolving Method for Optimal Control ArXiv,” arXiv: 1703.10263 [cs.SY]. [12] S. Zhang, and W. Q. Qian, “Computation of time-optimal control problem with variation evolution principle,” arXiv:1711.02998 [cs.SY]. [13] S. Zhang, and K. F. He, “Variation evolving for optimal control computation, a compact way,” arXiv:1709.02242 [cs.SY]. [14] R. F. Hartl, S. P. Sethi, and R. G. Vickson, “A survey of the maximum principles for optimal control problems with state constraint,” SIAM Rev., vol. 37, no. 2, pp. 181-218, 1995. [15] H. K. Khalil, Nonlinear Systems. New Jersey, USA: Prentice Hall, 2002, pp. 111-181. [16] H. X. Zhang and M. Y. Shen. Computational Fluid Dynamics — Fundamentals and Applications of Finite Difference Methods. Beijing, China: National Defense Industry Press, 2003, pp. 76-78. [17] A. E. Bryson and Y. C. Ho, Applied Optimal Control: Optimization, Estimation, and Control. Washington, DC, USA: Hemisphere, 1975, pp. 42-125. [18] D.Z. Zhen. Linear System Theory. Beijing, China: Tsinghua University Press, 2002, pp. 85-134. [19] D. G. Hull, Optimal Control Theory for Applications, New York, USA: Springer, 2003, pp. 89-71. [20] H. Wang, J. S. Luo, and J. M. Zhu. Advanced Mathematics. Changsha, China: National University of Defense Technology Press, 2000, pp. 203-210. [21] X. S. Xie, Optimal Control Theory and Application. Beijing, China: Tsinghua Univ. Press, 1986, pp. 167-215. [22] Sussmann, H. J., & Willems, J. C. (2000). The Brachistochrone problem and modern control theory. In Anzaldo-Meneses, A., Bonnard, B., Gauthier, J. P., & Monroy-Perez, F. (Eds.), Contemporary Trends in Nonlinear Geometric Control Theory and its Applications, Singapore: World Scientific. [23] M. A. Patterson and A. V. Rao, “GPOPS-II: AMATLAB software for solving multiple-phase optimal control problems using hp-adaptive Gaussian quadrature collocation methods and sparse nonlinear programming,” ACM Trans. Math. Software, vol. 41, no. 1, pp. 1-37, 2014.
3cs.SY
A Type System Theory for Higher-Order Intensional Logic Support for Variable Bindings in Hybrid Intensional-Imperative Programs in GIPSY Joey Paquet Concordia University, Montreal, Canada [email protected] arXiv:0906.3919v1 [cs.LO] 22 Jun 2009 Serguei A. Mokhov Concordia University, Montreal, Canada [email protected] Abstract We describe a type system for a platform called the General Intensional Programming System (GIPSY), designed to support intensional programming languages built upon intensional logic and their imperative counter-parts for the intensional execution model. In GIPSY, the type system glues the static and dynamic typing between intensional and imperative languages in its compiler and runtime environments to support the intensional evaluation of expressions written in various dialects of the intensional programming language Lucid. The intensionality makes expressions to explicitly take into the account a multidimensional context of evaluation with the context being a first-class value that serves a number of applications that need the notion of context to proceed. We describe and discuss the properties of such a type system and the related type theory as well as particularities of the semantics, design and implementation of the GIPSY type system. Keywords: Intensional Programming, Imperative Programming, Type System, Type Theory, General Intensional Programming System (GIPSY), Context 1 Introduction The GIPSY is an ongoing effort for the development of a flexible and adaptable multi-lingual programming language development framework aimed at the investigation on the Lucid family of intensional programming languages [2, 2, 22, 1, 12, 11, 17, 18]. Using this platform, programs written in many flavors of Lucid can be compiled and executed. The framework approach adopted is aimed at providing the possibility of easily developing compiler components for other languages of intensional nature, and to execute them on a language-independent run-time system. Lucid being a functional “data-flow” language, its programs can be executed in a distributed processing environment. However, the standard Lucid algebra (i.e. types and operators) is extremely fine-grained and can hardly benefit from parallel evaluation of their operands. Adding granularity to the data elements manipulated by Lucid inevitably comes through the addition of coarser-grained data types and their corresponding operators. Lucid semantics being defined as typeless, a solution to this problem consists in adding a hybrid counterpart to Lucid to allow an external language to define an algebra of coarser-grained types and operators. In turn, this solution raises the need for an elaborated type system to bridge the implicit types of Lucid semantics with the explicit types and operators (i.e. functions) defined in the hybrid counterpart language. This paper presents such a type system that is used in the GIPSY at compile time for static type checking, as well as at run-time for dynamic type checking. After our problem statement and short presentation of our proposed solution, this section presents a brief introduction to the GIPSY project [14, 6, 13, 21, 10, 25, 16], and the beginnings of the GIPSY Type System [10] in the GIPSY to support hybrid and object-oriented intensional programming [9, 24], and Lucx’s context type extension known as context calculus [20, 15, 19] for contexts to act as firstclass values. Then, we present the complete GIPSY type system as used by the compiler (General Intensional Programming Compiler – GIPC) and the run-time system (General Eduction Engine – GEE) when producing and executing a binary GIPSY program (called General Eduction Engine Resources – GEER) respectively. 1 A Type System for HOIL Support in GIPSY 1.1 Mokhov and Paquet Problem Statement and Proposed Solution Problem Statement Data types are implicit in Lucid (as well as in its dialects or many functional languages). As such, the type declarations never appear in the Lucid programs at the syntactical level. The data type of a value is inferred from the result of evaluation of an expression. In most imperative languages, like Java, C++ and the like, the types are explicit and the programmers must declare the types of the variables, function parameters and return values before they are used in evaluation. In the GIPSY, we want to allow any Lucid dialect to be able to uniformly invoke functions/methods written in imperative languages and the other way around and perform semantic analysis in the form of type assignment and checking statically at compile time or dynamically at run time, perform any type conversion if needed, and evaluate such hybrid expressions. At the same time, we need to allow a programmer to specify, or declare, the types of variables, parameters, and return values for both intensional and imperative functions as a binding contract between inter-language invocations despite the fact that Lucid is not explicitly typed. Thus, we need a general type system, well designed and implemented to support such scenarios. Proposed Solution The uniqueness of the type system presented here is that it is above a specific programming language model of either the Lucid family of languages or imperative languages. It is designed to bridge programming language paradigms, the two most general of them would be the intensional and imperative paradigms. GIPSY has a framework designed to support a common run-time environment and co-existence of the intensional and imperative languages. Thus, the type system is that of a generic GIPSY program that can include code segments written in a theoretically arbitrary number of intensional and imperative dialects supported by the system vs. being a type system for a specific language. What follows is the details of the proposed solution and the specification of the type system. 1.2 Introduction to the GIPSY Type System The introduction of JLucid, Objective Lucid, and the General Imperative Compiler Framework (GICF) [10, 9, 8, 4] prompted the development of the GIPSY Type System as implicitly understood by the Lucid language and its incarnation within the GIPSY to handle types in a more general manner as a glue between the imperative and intensional languages within the system. Further evolution of different Lucid variants such as Lucx introducing contexts as first-class values and JOOIP (Java Object-Oriented Intensional Programming) highlighted the need of the further development of the type system to accommodate the more general properties of the intensional and hybrid languages. 1.2.1 Matching Lucid and Java Data Types Here we present a case of interaction between Lucid and Java. Allowing Lucid to call Java methods brings a set of issues related to the data types, especially when it comes to type checks between Lucid and Java parts of a hybrid program. This is pertinent when Lucid variables or expressions are used as parameters to Java methods and when a Java method returns a result to be assigned to a Lucid variable or used in an intensional expression. The sets of types in both cases are not exactly the same. The basic set of Lucid data types as defined by Grogono [3] is int, bool, double, string, and dimension. Lucid’s int is of the same size as Java’s long. GIPSY and Java double, boolean, and String are equivalent. Lucid string and Java String are simply mapped internally through StringBuffer; thus, one can think of the Lucid string as a reference when evaluated in the intensional program. Based on this fact, the lengths of a Lucid string and Java String are the same. Java String is also an object in Java; however, at this point, a Lucid program has no direct access to any String’s properties (though internally we do and we may expose it later to the programmers). We also distinguish the float data 2 A Type System for HOIL Support in GIPSY Mokhov and Paquet Table 1: Matching data types between Lucid and Java. Return Types of Java Methods Types of Lucid Expressions Internal GIPSY Types int, byte, long float double boolean char String Method Method [] Object Object void int, dimension float double bool char string, dimension function operator [] class URL bool::true GIPSYInteger GIPSYFloat GIPSYDouble GIPSYBoolean GIPSYCharacter GIPSYString GIPSYFunction GIPSYOperator GIPSYArray GIPSYObject GIPSYEmbed GIPSYVoid Parameter Types Used in Lucid Corresponding Java Types Internal GIPSY Types string float double int dimension bool class URL [] operator function String float double int int, String boolean Object Object [] Method Method GIPSYString GIPSYFloat GIPSYDouble GIPSYInteger Dimension GIPSYBoolean GIPSYObject GIPSYEmbed GIPSYArray GIPSYOperator GIPSYFunction type for single-precision floating point operations. The dimension index type is said to be an integer or string (as far as its dimension tag values are concerned), but might be of other types eventually, as discussed in [20]. Therefore, we perform data type matching as presented in Table 1. Additionally, we allow void Java return type which will always be matched to a Boolean expression true in Lucid as an expression has to always evaluate to something. As for now our types mapping and restrictions are as per Table 1. This is the mapping table for the Java-to-IPL-to-Java type adapter. Such a table would exist for mapping between any imperative-to-intensional language and back, e.g. the C++-to-IPL-to-C++ type adapter. 2 Simple Theory of GIPSY Types Our simple theory of the GIPSY types (STGT) is based on the “Simple theory of types” (STT) by Mendelson [7]. The theoretical and practical considerations are described in the sections that follows. The STT partitions the qualification domain into an ascending hierarchy of types with every individual value assigned a type. The type assignment is dynamic for the intensional dialects as the resulting type of a value in an intensional expression may not be known at compile time. The assignment of the types of constant literals is done at compile-time, however. In the hybrid system, which is mostly statically typed at the code-segment boundaries, the type assignment also occurs at compile-time. On the boundary between the intensional programming languages (IPLs) and imperative languages, prior to 3 A Type System for HOIL Support in GIPSY Mokhov and Paquet an imperative procedure being invoked, the type assignment to the procedure’s parameters from IPL’s expression is computed dynamically and matched against a type mapping table similar to that of Table 1. Subsequently, the when the procedure call returns back to the IPL, the type of the imperative expression is matched back through the table and assigned to the intensional expression that expects it. The same table is used when the call is made by the procedure to the IPL and back, but in the reverse order. Further in STT, all quantified variables range over only one type making the first-order logic applicable as the underlying logic for the theory. This also means the all elements in the domain and all co-domains are of the same type. The STT states there is an atomic type that has no member elements in it, and the members of the second-high from the basic atomic type. Each type has a next higher type similarly to succ in Peano arithmetic and the next operator in Lucid. This is also consistent to describe the composite types, such as arrays and objects as they can be recursively decomposed (or “flattened”, see [10]) into the primitive types to which the STT applies. Symbolically, the STT uses primed and unprimed variables and the infix set notation of ∈. The formulas Φ(x) rely on the fact that the unprimed variables are all of the same type. This is similar to the notion of a Lucid stream with the point-wise elements of the stream having the same type. The primed variables (x0 ) in STT range over the next higher type. There two atomic formulas in STT of the form of identity, x = y, and set membership, y ∈ x0 . The STT defines the four basic axioms for the variables and the types they can range over: Identity, Extensionality, Comprehension, and Infinity. We add the Intensionality on as the fifth axiom. The variables in the definition of the Identity relationship and in the Extensionality and Comprehension axioms typically range over the elements of one of the two nearby types. In the set membership, only the unprimed variables that range over the lower type in the hierarchy can appear on the left of ∈; conversely, the primed ones that range over higher types can only appear on the right of ∈. The axioms are defined as: 1. Identity: x = y ↔ ∀z0 [x ∈ z0 ↔ y ∈ z0 ] 2. Extensionality: ∀x[x ∈ y0 ↔ x ∈ z0 ] → y0 = z0 3. Comprehension: ∃z0 ∀x[x ∈ z0 ↔ Φ(x)]. This covers objects and arrays as any collection of elements here may form an object of the next, higher type. The STT states the comprehension axiom is schematic with respect to Φ(x) and the types. 4. Infinity: ∀x, y[x 6= y → [xRy yRx]]. There exists a non-empty binary relation R over the elements of the atomic type that is transitive, irreflexive, and strongly connected. W 5. Intensionality: the intensional types and operators are based on the intensional logic and context calculus. These are extensively described in the works [15, 20, 23, 12] and related. This present type system accommodates the two in a common hybrid execution environment of the GIPSY. A context c is a finite subset of the relation: c ⊂ {(d, x)|d ∈ DIM ∧ x ∈ T }, where DIM is the set of all possible dimensions, and T is the set of all possible tags. 2.1 Types of Types Types of types are generally referred to as kinds. Kinds provide categorization to the types of similar nature. While some type systems provide kinds as first class entities available to programmers, in GIPSY we do not expose this functionality in our type system at this point. However, at the implementation level there are provisions to do so that we may later decide to expose for the use of programmers. Internally, we define several broad kinds of types, presented the the sections that follow. 4 A Type System for HOIL Support in GIPSY 2.1.1 Mokhov and Paquet Numeric Kind The primitive types under this category are numerical values, which are represented by GIPSYInteger, GIPSYFloat, and GIPSYDouble. They provide implementation of the common arithmetic operators, such as addition, multiplication and so on, as well as logical comparison operators of ordering and equality. Thus, for a numerical type T , the following common operators are provided. The resulting type of any arithmetic operator is the largest of the two operands in terms of length (the range of double of length say k covers the range of int with the length say m and if both appear as arguments to the operator, then the resulting value’s type is that of without loss of information, i.e. largest in length double). The result of the logical comparison operators is always Boolean B regardless the length of the left-hand-side and right-hand-side numerical types. 1. Tmax : T1 ≥ T2 → T1 | T1 < T2 → T2 2. Tmultiply : Tk × Tm → Tmax(k,m) 3. Tdivide : Tk /Tm → Tmax(k,m) 4. Tadd : Tk + Tm → Tmax(k,m) 5. Tsubtract : Tk − Tm → Tmax(k,m) 6. Tmod : Tk %Tm → Tmax(k,m) 7. Tpow : Tk ˆ Tm → Tmax(k,m) 8. T> : T > T → B 9. T< : T < T → B 10. T≥ : T ≥ T → B 11. T≤ : T ≤ T → B 12. T= : T = T → B A generalized implementation of the arithmetic operators is done by realization of the interface called IArithmeticOperatorsProvider and its concrete implementation developed in the general delegate class GenericArithmeticOperatorsDelegate. This design and implementation allow not only further exposure of kinds-as-first-class values later on after several iterations of refinement, but also will allow operator and type overloading or replacement of type handling implementation altogether if some researchers wish to do so. The implementation of the engine, GEE, is thus changed, to only refer to the interface type implementation when dealing with these operators. Equivalently for the logic comparison operators we have the ILogicComparisonOperatorsProvider class and the corresponding GenericLogicComparisonOperatorsDelegate class. The latter relies on the comparator implemented for the numerical kind, such as NumericComparator. Using comparators (i.e. classes that implement the standard Comparator interface) allows Java to use and to optimize buildin sorting and searching algorithms for collections of user-defined types. In our case, the class called GenericLogicComparisonOperatorsDelegate is the implementation of the delegate class that also relies on it. The example for the numeric types for the described design is in Figure 1. It is important to mention, that grouping of the numeric kind of integers and floating-point numbers does not violate the IEEE 754 standard [5], as these kinds implementation-wise wrap the corresponding Java’s types (which are also grouped under numeric kind) and their semantics including the implementation of IEEE 754 by Java in accordance with the Java Language Specification. 5 A Type System for HOIL Support in GIPSY Mokhov and Paquet Figure 1: Example of Provider Interfaces and Comparators 2.1.2 Logic Kind Similarly to numeric types, the primitive type GIPSYBoolean fits the category of the types that can be used in the Boolean expressions. The operations the type provides expect the arguments to be of the same type – Boolean. The following set of operators on the logic type B we provide in the GIPSY type system: 1. Band : B B → B V 2. Bor : B B → B W 3. Bnot : ¬B → B 4. Bxor : B L B→B 5. Bnand : ¬(B B) → B V 6. Bnor : ¬(B B) → B W L Note that the logical XOR operator (denoted as ) is different from the corresponding bitwise operator in Section 2.1.3 similarly to as the bitwise vs. logical are for AND and OR. Again, similarly to the generalized implementation of arithmetic operators, logic operator providers implement the ILogicOperatorsProvider interface, with the most general implementation of it in the delegate class GenericLogicOperatorsDelegate. 2.1.3 Bitwise Kind Bitwise kind of types covers all the types that can support bitwise operations on the the entire bit length of a particular type T . Types in this category include the numerical and logic kinds described earlier in 6 A Type System for HOIL Support in GIPSY Mokhov and Paquet Section 2.1.2 and Section 2.1.1. The parameters on both sides of the operators and the resulting type are always the same. There are no implicit compatible type casts performed unlike for the numeric kind. 1. Tbit−and : T &T → T 2. Tbit−or : T |T → T 3. Tbit−not : !T → T 4. Tbit−xor : T N T →T 5. Tbit−nand : !(T &T ) → T 6. Tbit−nor : !(T |T ) → T The generalized implementation of this kind’s operators is done through the interface that we called IBitwiseOperatorsProvider, which is generically implemented in the corresponding delegate class GenericBitwiseOperatorsDelegate. 2.1.4 Composite Kind As the name suggests, the composite kind types consist of compositions of other types, possibly basic types. The examples of this kind are arrays, structs, and abstract data types and their realization such as objects and collections. In the studied type system these are GIPSYObject, GIPSYArray, and GIPSYEmbed. This kind is characterized by the constructors, dot operator to decide membership as well as to invoke member methods and define equality. The design of of these types, just like the entire type system, adheres to the Composite design pattern. The most prominent examples of this kind are in Figure 2, including GIPSYContext which is composed of Dimensions and indirectly of the TagSets. Figure 2: Composite Types. 2.1.5 Intensional Kind The intentional types kind primarily has to do with encapsulation dimensionality, context information and their operators. These are represented by the types GIPSYContext, Dimension, and TagSet1 types. The 1 Not mentioned here; please refer to [19, 15]. 7 A Type System for HOIL Support in GIPSY Mokhov and Paquet common operators on these types include the context switching and querying operators @ and # as well as context calculus operators. Additional operators can be included depending on the intensional dialect used, but the mentioned operators are said to be the baseline operators that any intensional language can be translated to use. Implementation-wise there is a IContextSetOperatorsProvider interface and its general implementation in GenericContextSetOperatorsDelegate. The context calculus operators on simple contexts include standard set operators, such as union, difference, intersection, and Lucx-specific isSubContext, projection, hiding, and override [19, 15]. 2.1.6 Function Kind The function types represent either “functional” functions, imperative procedures, and binary and unary operators that, themselves, can be passed as parameters or returned as results. In our type system these are represented by GIPSYFunction, GIPSYOperator, and GIPSYEmbed. The common operators on this include equality and evaluation. 3 Describing Some GIPSY Types’ Properties To show the overview of the properties of GIPSY types to get a better and more complete understanding of the spectrum of their behavior we cover them in light of description and comparison to existential, union, intersection, and linear types. 3.1 Existential Types All of the presented GIPSY types are existential types because they represent and encapsulate modules and abstract data types and separate their implementation from the public interface specified by the abstract GIPSYType. These are defined as follows: T = ∃GIPSYType{Object a; Object getEnclosedTypeObject(); Object getValue(); } The above is implemented in the following manner, e.g.: boolT {Boolean a; Object getEnclosedTypeObject(); Boolean getValue(); } intT {Long a; Object getEnclosedTypeObject(); Long getValue(); } doubleT {Double a; Object getEnclosedTypeObject(); Double getValue(); } ... and so on. All these correspond to be subtypes of the the more abstract and general existential type T . Assuming the value t ∈ T , then t.getEnclosedTypeObject() and t.getValue() are well typed regardless the what the GIPSYType may be. 3.2 Union Types A union of two types produces another type with the valid range of values that is valid in either of the two; however, the operators defined on the union types must be those that are valid for both of the types to remain type-safe. A classical example of that is in C or C++ the range for the signed char is −128 . . . 127 and the range of the unsigned char is 0 . . . 255, thus: signed char ∪ unsigned char = −128 . . . 255 In C and C++ there is a union type that roughly corresponds to this notion, but it does not enforce the operations that are possible on the union type that must be possible in both left and right types of the 8 A Type System for HOIL Support in GIPSY Mokhov and Paquet uniting operator. In the class hierarchy, such as in GIPSY, the union type among the type and its parent is the parent class; thus, in our specific type system the following holds: ∀T ∈ G : T ∪ GIPSYType = GIPSYType GIPSYArray ∪ GIPSYObject = GIPSYObject GIPSYVoid ∪ GIPSYBoolean = GIPSYBoolean GIPSYOperator ∪ GIPSYFunction = GIPSYFunction where T is any concrete GIPSY type and G is a collection of types in the GIPSY type system we are describing. Equivalently, the union of the two sibling types is their common parent class in the inheritance hierarchy. Interestingly enough, while we do not explicitly expose kinds of types, we still are able to have the following union type relationships defined based on the kind of operators they provide as siblings under a common interface: ∀T ∀T ∀T ∀T ∀T ∀T ∈ A : T ∪ IArithmeticOperatorProvider = IArithmeticOperatorProvider ∈ L : T ∪ ILogicOperatorProvider = ILogicOperatorProvider ∈ B : T ∪ IBitwiseOperatorProvider = IBitwiseOperatorProvider ∈ C : T ∪ IContextOperatorProvider = IContextOperatorProvider ∈ D : T ∪ ICompositeOperatorProvider = ICompositeOperatorProvider ∈ F : T ∪ IFunctionOperatorProvider = IFunctionOperatorProvider where T is any concrete GIPSY type and A is a collection of types that provide arithmetic operators, L – logic operators providers, B – bitwise operators providers, C – context operators providers, D – composite operator providers, and F – function operator providers. Thus: {GIPSYInteger, GIPSYFloat, GIPSYDouble} ∈ A {GIPSYBoolean} ∈ L {GIPSYInteger, GIPSYFloat, GIPSYDouble, GIPSYBoolean} ∈ B {GIPSYContext, Dimension} ∈ C {GIPSYObject, GIPSYArray, GIPSYEmbed}, GIPSYString} ∈ D {GIPSYFunction, GIPSYOperator, GIPSYEmbed} ∈ F Another particularity of the GIPSY type system is the union of the string and integer types under dimension: GIPSYInteger ∪ GIPSYString = Dimension and this is because in our dimension tag values we allow them to be either integers or strings. While not a very common union in the majority of type system, they do share a common set of tag set operators defined in [20] for ordered finite tag sets (e.g. next(), etc.). 3.3 Intersection Types Intersection type of given two types is a range where the sets of valid values overlap. Such types are safe to pass to methods and functions that expect either of the types as the intersection types are more restrictive and compatible in both original types. A classical example of an intersection type if it were implemented in C or C++ would be: signed char ∩ unsigned char = 0 . . . 127 The intersection types are also useful in describing the overloaded functions. Sometimes the are called as refinement types. In the class hierarchy, the intersection between the parent and child classes is the most derived type, and the intersection of the sibling classes is empty. While the functionality offered 9 A Type System for HOIL Support in GIPSY Mokhov and Paquet by the intersection types is promising, it is not currently explicitly or implicitly considered in the GIPSY type system, but planned for the future work. 3.4 Linear Types Linear (or “uniqueness”) types are based on linear logic. The main idea of these types is that values assigned to them have one and only one reference to them throughout. These types are useful to describe immutable values like strings or hybrid intensional-imperative objects (see [24] for details). These are useful because most operations on such an object “destroys” it and creates a similar object with the new values, and, therefore, can be optimized in the implementation for the in-place mutation. Implicit examples of such types in the GIPSY type system are GIPSYString that internally relies on Java’s StringBuffer that does something very similar as well as the immutable GIPSYObject is in JOOIP [24] and immutable GIPSYFunction. Since we either copy or retain the values in the warehouse, and, therefore, one does not violate referential transparency or create side effects in, and at the same time be more efficient as there is no need to worry about synchronization overhead. 4 Conclusion Through a series of discussions, specification, design, and implementation details we presented a type system used by the GIPSY for static and dynamic type checking and evaluation of intensional and hybrid intensional-imperative languages. We highlighted the particularities of the system that does not attribute to a particular specific language as traditionally most type systems do, but to an entire set of languages and hybrid paradigms that are linked through the type system. We pointed out some of the limitations of the type system and the projected work to remedy those limitations. Overall, this is a necessary contribution to GIPSY-like systems to have a homogeneous environment to statically and dynamically type-check intensional and hybrid programs. 4.1 Future Work The type system described in this paper has been implemented in the GIPSY. However, due to recent changes including the introduction of contexts as first-class values in Generic Lucid, as well as the development of the fully-integrated hybrid language JOOIP [24], our implementation still needs thorough testing using complex program examples testing the limits of the type system. Additional endeavours, noted in the previous sections of this paper, include: • Exposing more operators for composite types to Lucid code segments. • Allowing custom user-defined types and extension of the existing operators and operator overloading. • Expose kinds as first class entities, allowing programs more explicit manipulation of types. • Consider adding intersection types for more flexibility in the future development of the type system, allowing more type casting possibilities at the programming level. 4.2 Acknowledgments This work was funded by NSERC and the Faculty of Computer Science and Engineering, Concordia University. 10 A Type System for HOIL Support in GIPSY Mokhov and Paquet References [1] E. Ashcroft, A. Faustini, R. Jagannathan, and W. Wadge. Multidimensional, Declarative Programming. Oxford University Press, London, 1995. [2] E. A. Ashcroft and W. W. Wadge. Erratum: Lucid - a formal system for writing and proving programs. SIAM J. Comput., 6((1):200), 1977. [3] P. Grogono. GIPC increments. Technical report, Department of Computer Science and Software Engineering, Concordia University, Montreal, Canada, Apr. 2002. [4] P. Grogono, S. Mokhov, and J. Paquet. Towards JLucid, Lucid with embedded Java functions in the GIPSY. In Proceedings of the 2005 International Conference on Programming Languages and Compilers (PLC 2005), Las Vegas, USA, pages 15–21. CSREA Press, June 2005. [5] IEEE. 754-2008: IEEE standard for floating-point arithmetic. [online], Aug. 2008. http://ieeexplore. ieee.org/servlet/opac?punumber=4610933. [6] B. Lu. Developing the Distributed Component of a Framework for Processing Intensional Programming Languages. PhD thesis, Department of Computer Science and Software Engineering, Concordia University, Montreal, Canada, Mar. 2004. [7] E. Mendelson. Introduction to Mathematical Logic. Chapman & Hall, 4 edition, 1997. [8] S. Mokhov and J. Paquet. General imperative compiler framework within the GIPSY. In Proceedings of the 2005 International Conference on Programming Languages and Compilers (PLC 2005), Las Vegas, USA, pages 36–42. CSREA Press, June 2005. [9] S. Mokhov and J. Paquet. Objective Lucid – first step in object-oriented intensional programming in the GIPSY. In Proceedings of the 2005 International Conference on Programming Languages and Compilers (PLC 2005), Las Vegas, USA, pages 22–28. CSREA Press, June 2005. [10] S. A. Mokhov. Towards hybrid intensional programming with JLucid, Objective Lucid, and General Imperative Compiler Framework in the GIPSY. Master’s thesis, Department of Computer Science and Software Engineering, Concordia University, Montreal, Canada, Oct. 2005. ISBN 0494102934. [11] C. B. Ostrum. The Luthid 1.0 Manual. Department of Computer Science, University of Waterloo, Ontario, Canada, 1981. [12] J. Paquet. Scientific Intensional Programming. PhD thesis, Department of Computer Science, Laval University, Sainte-Foy, Canada, 1999. [13] J. Paquet, P. Grogono, and A. H. Wu. Towards a framework for the general intensional programming compiler in the GIPSY. In Proceedings of the 19th Annual ACM Conference on Object-Oriented Programming, Systems, Languages, and Applications (OOPSLA 2004), Vancouver, Canada, Oct. 2004. ACM. [14] J. Paquet and P. Kropf. The GIPSY architecture. In Proceedings of Distributed Computing on the Web, Quebec City, Canada, 2000. [15] J. Paquet, S. A. Mokhov, and X. Tong. Design and implementation of context calculus in the GIPSY environment. In Proceedings of the 32nd Annual IEEE International Computer Software and Applications Conference (COMPSAC), pages 1278–1283, Turku, Finland, July 2008. IEEE Computer Society. [16] J. Paquet and A. H. Wu. GIPSY – a platform for the investigation on intensional programming languages. In Proceedings of the 2005 International Conference on Programming Languages and Compilers (PLC 2005), pages 8–14, Las Vegas, USA, June 2005. CSREA Press. [17] J. Plaice, B. Mancilla, G. Ditu, and W. W. Wadge. Sequential demand-driven evaluation of eager TransLucid. In Proceedings of the 32nd Annual IEEE International Computer Software and Applications Conference (COMPSAC), pages 1266–1271, Turku, Finland, July 2008. IEEE Computer Society. [18] T. Rahilly and J. Plaice. A multithreaded implementation for TransLucid. In Proceedings of the 32nd Annual IEEE International Computer Software and Applications Conference (COMPSAC), pages 1272–1277, Turku, Finland, July 2008. IEEE Computer Society. [19] X. Tong. Design and implementation of context calculus in the GIPSY. Master’s thesis, Department of Computer Science and Software Engineering, Concordia University, Montreal, Canada, Apr. 2008. [20] X. Tong, J. Paquet, and S. A. Mokhov. Context Calculus in the GIPSY. Unpublished, 2007. [21] E. Vassev and J. Paquet. A generic framework for migrating demands in the GIPSY’s demand-driven execu- 11 A Type System for HOIL Support in GIPSY [22] [23] [24] [25] Mokhov and Paquet tion engine. In Proceedings of the 2005 International Conference on Programming Languages and Compilers (PLC 2005), pages 29–35, Las Vegas, USA, June 2005. CSREA Press. W. Wadge and E. Ashcroft. Lucid, the Dataflow Programming Language. Academic Press, London, 1985. K. Wan. Lucx: Lucid Enriched with Context. PhD thesis, Department of Computer Science and Software Engineering, Concordia University, Montreal, Canada, 2006. A. Wu, J. Paquet, and S. A. Mokhov. Object-Oriented Intensional Programming: A New Concept in ObjectOriented and Intensional Programming Domains. Unpublished, 2007. A. H. Wu and J. Paquet. Object-oriented intensional programming in the GIPSY: Preliminary investigations. In Proceedings of the 2005 International Conference on Programming Languages and Compilers (PLC 2005), pages 43–47, Las Vegas, USA, June 2005. CSREA Press. 12
6cs.PL
arXiv:1612.03735v1 [cs.DS] 4 Dec 2016 A Note on Testing Intersection of Convex Sets in Sublinear Time Israela Solomon February 27, 2018 We present a simple sublinear time algorithm for testing the following geometric property. Let P1 , ..., Pn be n convex sets in Rd (n ≫ d), such as polytopes, balls, etc. We assume that the complexity of each set depends only on d (and not on the number of sets n). We test the property that there exists a common point in all sets, i.e. that their intersection is nonempty. Our goal is to distinguish between the case where the intersection is nonempty, and the case where even after removing many of the sets the intersection is empty. In particular, our algorithm returns PASS if all of the n sets intersect, and returns α n sets, for any FAIL with probability at least 1 − ǫ if no point belongs to d+1 given 0 < α, ǫ < 1. We call a collection of q convex sets Pi1 , ..., Piq a ’q-tuple’ (the order of elements in the tuple is not important). The motivation for our algorithm comes from the following well known theorem by Eduard Helly [1][4][3]. Helly’s Theorem. Let X1 , ..., Xn be a finite collection of convex sets in Rd , with n > d. The intersection of every d + 1 of these sets is nonempty, if and only if the whole collection has a nonempty intersection. Helly’s theorem inspires us to consider the following algorithm. Algorithm 1: Tester for nonempty intersection for i = 1, 2, ..., t do Pick (d + 1)-tuple Pi1 , Pi2 , ..., Pid+1 with uniform distribution if ∩d+1 j=1 Pij = ∅ then return FAIL end end return PASS Theorem 1. For t = logα ǫ, the algorithm returns PASS if the intersection of all sets is nonempty, and returns FAIL with probability at least 1 − ǫ if the α n sets is empty. The running time of the algorithm intersection of every d+1 does not depend on n. 1 α In order to prove the theorem, we should show that if any d+1 n sets have an empty intersection, then the probability of picking a (d + 1)-tuple whose intersection is empty and returning FAIL is high. For that purpose, we use the following theorem by Katchalski and Liu [2]. Fractional Helly Theorem. Let  q > d > 0 be integers and let F be a family of n convex sets in Rd with α nq of the q-tuples intersecting. Then there is a 1   q−d α . point in at least βn of the sets, where β = (dq ) Setting q = d + 1, we obtain the following corollary. Corollary 1. If the maximal number  of sets from P1 , ..., Pn that intersect is n α less than d+1 n, then less than α d+1 of the (d + 1)-tuples intersect. Namely,  n at least (1 − α) d+1 of the (d + 1)-tuples have empty intersection. Now we are ready to prove the correctness of the algorithm. Proof of Theorem 1. If the intersection of all of the n sets is nonempty, then the intersection of every d + 1 sets is nonempty, and the algorithm returns PASS. α Assume that the intersection of every d+1 n sets is empty. Then, by Corol n lary 1, there are less than α d+1 choices of d+1 sets such that their intersection is nonempty, which means that the probability to pick such sets (and not returning FAIL) in each round is smaller than α. Therefore, the probability that our algorithm returns FAIL is at least 1 − αt . Setting t = logα ǫ, the probability to return FAIL is at least 1 − ǫ. The running time of the algorithm is logα ǫ times the time it takes to compute the intersection of d + 1 convex sets. Note that in general the complexity of a convex set is not bounded. Since we assume that the complexity of each set depends only on d, then the running time is O(f (d) · logα ǫ), which does not depend on n. Acknowledgments I would like to thank Ronitt Rubinfeld for her interest and for suggesting me to write this note. References [1] E. Helly. ber Mengen konvexer Krper mit gemeinschaftlichen Punkte. Jahresbericht der Deutschen Mathematiker-Vereinigung, 32:175–176, 1923. URL http://eudml.org/doc/145659. [2] M. Katchalski and A. Liu. A problem of geometry in Rn . Proceedings of the American Mathematical Society, 75(2):284–288, 1979. URL http://www.jstor.org/stable/2042758. 2 [3] Wikipedia. Helly’s Theorem. https://en.wikipedia.org/wiki/Helly%27s_theorem. URL [4] T. Zhang. Notes on Helly’s Theorem. URL http://www.math.uchicago.edu/~may/VIGRE/VIGRE2007/REUPapers/FINALAPP/ZhangT.pdf. 3
8cs.DS
JOURNAL OF COMPUTER SCIENCE AND ENGINEERING, VOLUME 1, ISSUE 1, MAY 2010 42 A Metaheuristic Approach for IT Projects Portfolio Optimization Shashank Pushkar, Abhijit Mustafi and Akhileshwar Mishra Abstract— Optimal selection of interdependent IT Projects for implementation in multi periods has been challenging in the framework of real option valuation. This paper presents a mathematical optimization model for multi-stage portfolio of IT projects. The model optimizes the value of the portfolio within a given budgetary and sequencing constraints for each period. These sequencing constraints are due to time wise interdependencies among projects. A Metaheuristic approach is well suited for solving this kind of a problem definition and in this paper a genetic algorithm model has been proposed for the solution. This optimization model and solution approach can help IT managers taking optimal funding decision for projects prioritization in multiple sequential periods. The model also gives flexibility to the managers to generate alternative portfolio by changing the maximum and minimum number of projects to be implemented in each sequential period. .Index Terms— IT Projects portfolio Management, optimization, Financial Evaluation, Genetic Algorithm , Real Option. ——————————  —————————— 1 INTRODUCTION IT Projects investment decisions are crucial for any firm to implement e-Business. Widely used Discounted Cash Flow (DCF) method is not appropriate to evaluate IT investments as it is designed for the projects with no option features ([1],[2]). The inability of Discounted Cash Flow analysis to take care of impact of flexibility underlying IT investment decisions have forced IT managers to rely on their gut instinct.[3]. Real Option analysis has been an alternative approach that incorporates impact of flexibility while evaluating IT projects. This project evaluation method has been used based on quantification of projects benefits and costs [4] as well as the risk and volatility of cash flows ([5],[6]).But very few research has scrutinized the relevance of real option analysis of IT investments for optimizing a portfolio of projects. Dickinson et. al. [7] introduces an optimization model for interdependent technology projects but it is not in the framework of real option valuation. Portfolio of IT projects involve interdependencies which can create multiple options ( [8],[9]).Cobb and channes [10] propose an approach for the Real Option Valuation of the portfolio of real investment projects. Bardhan et.al. [11] proposes an integer programming model to get the optimal sequence for implementation of IT projects.Costa et. al.[12] proposes an approach for evaluating the software project risk.Fang and Chen [13] propose a portfolio selection model for a mixed R&D projects.Liang et. al. (2008)[14] give a framework for Shashank Pushkar is with Birla Institute of Technology, Mesra , Ranchi, India-835215.Phone Number: 91-651-227554(O), 91-9470141130. A Mustafi is with Birla Institute of Technology, Mesra , Ranchi, India835215. .Phone Number: 91-651-227554(O), 91-9431382747. .Akhileshwar Mishra is with National Institute of Technology, Department of Computer Application , Jamshedpur Jharkhand, India-831014. the IT investment on the basis of Real Option and Mean – Variance theory perspective.Peters and Verhoef[15] quantifies the yields of risk of IT portfolio. Shashank et.al. [16] proposes a dynamic programming solution to this class of problem,but it works for the smaller portfolio as with increaded number of projects the variable becomes very large because of curse of dimensionality. This paper gives a simplified mathematical model to optimize an IT projects portfolio where projects can be sequentially interdependent (which is an important characteristic of IT projects. The model dynamically calculates option values for each project due to its dependent projects implemented in the period subsequent to it. Genetic Algorithms have a proven track record in handling such large search field problems. The simple act of crossover and mutation allows the algorithm to search a large search space and converge quickly to an optimal solution. In case of exceptionally large search spaces the algorithm provides the option of being terminated after a fixed number of iterations . This may not provide the best solution in all cases but usually gives a very good approximation of the solution. The proposed solution yields the optimum sequence for implementation of IT projects to have the maximum overall portfolio value (DCF+ROV) across multiple time periods. This can help IT managers taking optimal funding decisions. The rest of the paper is organized as follows. Section 2 specifies the problem The mathematical model is defined in section 3. A Genetic Algorithm solution is given in section 4 and an illustrative numerical example is given in section 5. Finally we conclude in section 6. © 2010 JCSE http://sites.google.com/site/jcseuk/ 43 2 PROBLEM SPECIFICATION The Problem undertaken comes under the category of IT project valuation and investment decisions for project portfolio management. This problem applies to any firm that decides to implement e-Business or wants to invest in multiple IT projects. Here the collection of IT projects is a portfolio of projects to be implemented in sequential periods. The projects are implemented separately but they have two types of dependency. They are as follows: 1. Total dependency 2. Partial dependency 3. No dependency Total dependency of project i on project j indicates that the capabilities developed for project j is also required by project i i.e. j creates an option to implement i and I can be implemented either together with j or after the implementation of j but not before j‖s implementation. If i is implemented after implementation of j, Call Option value of i should be added to the DCF value of project j(according to real option analysis). Partial dependency of project i on j indicates that the capabilities developed for project j supports or enhances the capabilities required by project i, but there is no strict requirement of project i to be implemented together with j or after j‖s implementation. But if i is implemented without implementation of j, the benefit level of i would reduce by some fraction depending on the level of dependency. α1 α5 α2 α3 α8 α4 α7 α6 Fig.1 Possible dependencies among the IT projects In the fig. 1 α1, α2 .etc. .are all investment projects. The solid arrow indicates total dependency (e.g. α2 is totally dependent on α1). Dashed arrow indicates partial dependency (e.g. α6 is partially dependent on α5). The project that has no dependency on any other projects are independent and without arrow. All these IT projects in the portfolio could not be implemented simultaneously due to the constraints of the budget of the firm and uncertainty regarding success of IT projects (customer response, implementation success within the firm etc.).Therefore these projects are generally implemented stage-wise in sequential periods. Each period may have dif- ferent budget. The projects implemented in initial stage or period provides opportunities (option) for remaining unimplemented projects which are dependent on implemented ones. Thus the initial implementation of projects provide flexibility to the managers to decide about whether to implement the remaining projects in the portfolio (seeing the response from the customers and the success of projects implementation within the firm ).Since these projects generally share technology and the firm , they share risk. So, the projects implemented in early stages (periods) relax the uncertainties for the remaining unimplemented projects. According to real option valuation methodologies, projects create option for dependent projects to be implemented in subsequent periods and hence option value of dependent projects must be added as Real Option value to it. So, the total value of a project will be its DCF value plus Real Option values due to its dependent projects to be implemented in subsequent periods. Here it is important to note that the Real Option Value for these dependent projects will not be added to Option generating project which are either implemented before it or together with it. The problem requires to be formulated as a mathematical model for the optimization of such IT projects portfolio across multiple sequential periods so that the overall value of the portfolio is maximized. 3 MATHEMATICAL MODEL 3.1 Notation p np N Bk r Cik Di Set of given projects Number of project. Total number of periods for completing the implementation of the projects Budget for period k (k=1,2,..,N) rate of interest Present Value of cost of project i if i is implemented in period k ( i = 1,2,..,n p ; k = 1,2,..,N). cost of project i funded in period k /(1 r ) k-1 ( here if k =1, it means the project is funded in the beginningof first period) Set of projects directly dependent on project i Di dij P Level of dependence of project i on project j, defined as follows: dij 0 , if j is not directly dependent on i; 0 dij 1 , j is partially dependent on i; dij 1 , , if j is totally dependent on i. Rik Present value of return from project i , if it is implemented in period k. 44 x rit /(1 r ) t Qk min t k where, return from project i at the end of t th period. rit x Xik Xik the expected number of periods up to which the project is going to give the return . k period of implementation of project i Binary value indicating implementation period for project i , where, and , Xik 1 k 1 i.e. each project i is implemented only once. Wik Vij Discounted cash flow(DCF) value of project i if i is implemented in period k . The Net Present Option value for project i attributed to its dependent projects if i is implemented in period k. Option value for project i due to project j , where Yijk Vij 0 if j Di Di. 1 , if i is implemented prior to implementation of j Vik 0 , otherwise. Qk min minimum number of projects to be implemented in period k Qk max =Maximum number of periods to be implemented in period k 3.2 Problem Statement It follows from notation above that np Vik Vij * dij * Xik * (1 j 1 Wik k Xik )(i P, j k 1 ( Rik Cik ) * Xik , (i P) The problem is to maximize N i P ( Number of Here the objective function indicates that the real option value of project i due to project j will only be added if i is implemented prior to the implementation of j. Observe that no additional sequencing constraint is required as maximizing the above objective function will automatically take care of the sequencing. 4 GENETIC ALGORITHM BASED SOLUTION 1, if i is implemented in period k; 0, otherwise. N i X i k ≤ Qk max 2) ≤ projects to be implemented in a period) (Vik Wik ) k 1 Subject to the constraints 1) Σ C i k . X i k - B k ≤ 0 ( Budget Constraint) i Di ) Genetic algorithms[18] are meta-heuristic optimization techniques based on natural theory and survival of the fittest . The operators involved in GA tend to be heavily inspired by natural selection and consequently successive generations of the algorithm continue to propagate the best traits of the population. This leads to rapid convergence of the search[25]. Also the introduction of the mutation operator ensures that diversity is not neglected and the search is not trapped in a local maximum. A flow chart illustrating the basics steps of GA based optimization is given in fig 2. The chromosome structure chosen to represent the problem is a sequence of ―b‖ bits where b =(no of projects*no of periods) A representative bit sequence for a portfolio of seven projects to be completed over three(3) periods would consequently be a 21 bit sequence. It is easy to visualize the above case in terms of integer numbers where any number in the range 0 – 2b-1 would have its binary representation as one of the possible chromosomes. Once defined the chromosome is divided into N equilength sequences where N is the number of periods under consideration. Every set bit in these subsequences would represent a project to be completed in that particular period. The GA is then introduced to search over the search space to optimize the NPV of the portfolio 45 α2 1 0 0 0 0 0 α3 1 0 0 0 0 0 α4 0 0.25 1 0 0 0 α5 0 0 0 0 0 0 α6 0 0 0 0 0.25 α7 0 0 1 0 0 0 0 TABLE 3 – OPTION VALUES DUE TO DEPENDENCY AMONG PROJECTS α1 α2 α3 α4 α5 α6 α7 Fig. 2 Flowchart for GA based Optimization . 5 NUMERICAL EXAMPLE A seven IT projects portfolio is taken as an illustrative example. The interdependencies among projects are shown in Figure 1 in Section 2 of the paper. The results were simulated using MATLAB® genetic algorithm tollbox. Here the project planning horizon is taken as N= 3 periods. i.e. k = 1,2,3 and n p = 7. Other data about the portfolio is listed in the tables below. TABLE 1- COST-RETURN OF PROJECTS Project i Present Value of cost in period k 15 30 70 60 15 50 125 α1 α2 α3 α4 α5 α6 α7 Present Value of return in period k 13 35 65 100 20 150 150 Note: Present value of costs and returns for projects to be implemented in period k is taken same for k= 1, 2, 3 for the shake of simplicity. Table 2 – DEPENDENCY LEVEL AMONG PROJECTS α1 α1 α2 α3 α4 α5 α6 α7 0 0 0 0 0 0 α1 α2 α3 α4 α5 α6 α7 10 0 0 0 0 0 0 0 0 0 0 0 10 0 0 0 0 0 0 5 10 0 0 0 0 0 0 0 0 0 0 0 0 0 5 0 0 10 0 0 0 0 Note: Option values for dependent projects are taken same for simplicity but they can be calculated using nested option model option model( Benaroach et.al. [20]) for each project due to its each dependent project. Budgets for each three periods are as under: B1 = 90 , B2 = 125, B3 = 175. Qkmin = 2 and Qkmax = 3 for each k = 1, 2, 3. TABLE 4-OPTIMIZATION RESULTS Selected Projects for funding Costs of projects Budget PORTFOLIO VALUE K=1 α1, α3 85 90 K=2 α2, α4, α5 105 125 616.75 K=3 α6, α7 175 175 The GA solution given in section IV of the paper is applied to the above example portfolio. The results obtained are tabulated above in Table 4 and the convergence of the algorithm is shown in Fig. below. The results show that those projects that provide infrastructure to many other projects(thus having high option values) are selected in early periods for funding and those having no option value are deferred to the later periods. This also indicates that the maximization of the option component of portfolio value selects the projects ,which have maximum number of dependent projects ,earlier than those projects which are having less dependent projects or no dependent. Since the projects of these types of portfolio shares risk for being successful, early implementation of high op- 46 tion projects would lower the overall risk of success for the portfolio. The model yields the optimum value for the overall portfolio along with the periods for the funding of projects in the portfolio. The method calculates the option values of each project due to its dependent projects dynamically and thus represents a significant improvement over the existing models for prioritization of IT projects in real option valuation framework .This approach can help IT managers taking optimal funding decisions . As a final demonstration the best chromosome for the representative case used in the paper is presented below. The chromosome represents 3 periods of activity and each column has the set bits representing the projects to be completed ideally in that particular period. The solution clearly demonstrates the findings of Table 4. 100 010 100 010 010 001 001 Fig. 3 The best chromosome for the case study Fig.4 The Convergence and best solution for the GA 6 CONCLUDING REMARK We have developed a multi period portfolio optimization model. The model uses GA to calculate option values for each project due to its dependent projects implemented subsequently. This is the improvement over the existing works where the option values are calculated statically for each projects due to its dependent projects. and not dynamically at the time of implementation decision making. The meta heuristic nature of the solution yields the optimal sequence of implementation of IT projects in multiple periods to get the maximum overall portfolio value .The proposed algorithm is very suitable to solve this problem as it is modeled as a multistage optimization problem and it makes possible to calculate option values for each project due to its subsequently implemented dependent projects to maximize the overall portfolio value. The model also gives flexibility to the managers to generate alternative portfolio by changing the maximum and minimum number of projects to be funded in a period. The research work can be further extended by incorporating fuzziness in the model as the terms like dependency level among projects, level of benefits etc. are uncertain and may change with the changing decision time REFERENCES [1] Benaroach, M. , and Kauffman, R.J.A Case for using real options pricing analysis to evaluate information technology project investments.Information system Research, 10,1(1999),70-86. [2] Benaroach, M., and Kauffman, R.J.Justifying electronic network expansion using real option analysis . MIS Quarterly, 24, 2 (2000), 197-225. [3] Fitchman, R. Real options and IT platform adoption : Implications for theory and practice. Info.Sys.Res., 15, 2 (2004), 132-154. [4] Kambil, A. , Henderson, C. J. , and Mohsenzadeh, H. Strategic management of information technology investments . In R. Banker, R. J. Kauffman and M. A. Mahmood (ed.), Strategic Information Technology Management: Perspective on Organizational Growth and Competitive Advantage. Harrisburg, PA, Idea Group Publishing,1993,161-178. [5] Benaroach, M. Managing information technology investment risk: A real options perspective . Journal of Management Information System, 19,2(2002), 43-84. [6] Schwartz, E. S., and Zozaya-Gorostiza, C.Investment under uncertainty in information technology: acquisition and development projects. Mgmt.Sci.,49,1(2003),57-70. [7] Dickinson, M., Thomton, A. , and Graves, S. Technology portfolio management: Optimizing interdependent projects over multiple time periods. IEEE Transactions on Engineering Management 48,4(2001),518-527. [8] Bardhan, I.R., Sougtad, R, and Bagchi, S. Prioritization of a portfolio of information technology projects. Journal of Management Information Systems, 21, 2(2004),33-60. [9] Bardhan, I.R., Sougtad, R, and Bagchi, S., A real option approach for prioritizing a portfolio of information technology projects: A case study of a utility company.2004b.In R Sprague(ed.), Proc. 37th Hawaii Intl. Conf. Sys. Sci., IEEE Comp.Soc.Press, Los Alamitos, CA. [10] Cobb, B. R. And Charnes, J. MSimulations and Optimizations for Real Option Valuation. Proceedings of Winter simulation Conference,2003. [11] Bardhan, I.R., Kauffman,R.J., and Narapanawe,S. Optimizing an IT project portfolio with time wise interdependencies IEEE computing Society Press, Los Alamitos, CA, 2006. [12] Costa. H. R,Barros, M. D., Travassos, G. H. Evaluating Software Project Portfolio Risks. The Journal of Systems and Software 80(2007)16-31. [13] Fang , Y. , Chen, L., Fukusima , M. A mixed R& D Projects and Scurities portfolio selection model. European Journal of Operation research 185(2008) 700-715 .[14] Liang-Chuan Wu, Chorng-Shyong Ong(2008) Management of 47 information technology investment: A framework based on a Real Options and Mean–Variance theory perspective. Technovation ,28(3)122-134. [15] Peters , R. J. , Verhoef, C. Quantifying the yield of risk-bearing IT portfolios. Science of Computer Programming 71(2008) 17-56. [16] Shashank Pushkar, Sharma R.R. and A. Mishra. Dynamic Programming approach to optimize portfolio of Interdependent IT projects.CiiT International Journal of Artificial Intelligent Systems and Machine learning, 1,4(2009)127-131. [17] Trigeorrgis, L. Real Options, Cambridge, MA, MIT Press, 1996. [18] Goldberg, D E, “Genetic Algorithms in Search, Optimization, and Machine Learning”, Addison-Wesley Professional, Ist Edition, 1989 [19] Paulinas M. ,Usinskas A. , “A survey of Genetic Algorithms Applications for Image Enhancement and Segmentation”, Information Technology and Control, Vol. 36 No. 3, 2007. [20] Benaroch, M., Shah, S., and M. Jeffery. On the valuation of multistage investments embeddingnested (compound) real options. 2005. Workingpaper, Syracuse University, Syracuse, NY. Shashank Pushkar is a Lecturer in the Department of Computer Science and Engineering, Birla Institute of Technology , Mesra , Ranchi. His research interest is in the field of Information Technology project Management and Optimization Technique. Abhijit Mustafi is a MCA from the University of North Bengal, India. He is currently a Senior Lecturer in the Department of CSE, BIT mesra, India. His research interests include image processing, meta heuristic algorithms and web mining. Dr. Akhileshwar Mishra is PhD from IIT Kharagpur. He is also a professor of Computer Applications , National Institute of Technology, Jamshedpur. He specializes in computer applications and Optimizations in the field of Industrial Management
5cs.CE
Optimal Design and Optimal Control of Elastic Structures Undergoing Finite Rotations and Elastic Deformations A. Ibrahimbegović1, C. Knopf-Lenoir2 , A. Kučerová1 and P. Villon2 arXiv:0902.1037v2 [cs.NE] 10 Feb 2009 1 Ecole Normale Supérieure - Cachan, LMT, GCE, 61, avenue du président Wilson, 94235 Cachan, France, email: [email protected] 2 Université de Technologie - Compiegne, Lab. Roberval, GSM, 60200 Compiegne, France Abstract In this work we deal with the optimal design and optimal control of structures undergoing large rotations. In other words, we show how to find the corresponding initial configuration and the corresponding set of multiple load parameters in order to recover a desired deformed configuration or some desirable features of the deformed configuration as specified more precisely by the objective or cost function. The model problem chosen to illustrate the proposed optimal design and optimal control methodologies is the one of geometrically exact beam. First, we present a non-standard formulation of the optimal design and optimal control problems, relying on the method of Lagrange multipliers in order to make the mechanics state variables independent from either design or control variables and thus provide the most general basis for developing the best possible solution procedure. Two different solution procedures are then explored, one based on the diffuse approximation of response function and gradient method and the other one based on genetic algorithm. A number of numerical examples are given in order to illustrate both the advantages and potential drawbacks of each of the presented procedures. Keywords: structures, finite rotation, optimization, control 1 Introduction Modern structures should often be designed to withstand very large displacements and rotations and remain fully operational. Moreover, the construction phase has also to be mastered and placed under control, with trying to precisely guide the large motion of a particular component of the total structural assembly. Ever increasing demands to achieve more economical design and construction thus require that the problems of this kind be placed on a sound theoretical and computational basis, such as the one explored in this work. Namely, optimization methods can be called upon to guide the design procedure and achieve desired reduction of mechanical and/or geometric properties. Similarly, the control methods are employed to provide an estimate of the loads and the minimal effort in placing the structure, or its component, directly into an optimal (desired) shape. Either of these tasks, optimal design or optimal control, can formally be presented as the minimization of the chosen cost or objective function 1 specifying precisely the desired goal. The main difference between two procedures concerns the choice of the variables defining the cost function: the design variables are typically related to the mechanical properties (e.g. Young’s modulus) or geometry of the structure (e.g. particular coordinates in the initial configuration), whereas the control variables are related to the actions (e.g. forces) applied on the structure in order to place it into desired position. Rather then insisting upon this difference and treating the optimal design and optimal control in quite different manners (as done in a number of traditional expositions on the subject), we focus in this work on their common features which allow a unified presentation of these two problems and the development of a novel solution procedure applicable to both problems. The latter implies that the nonlinear mechanics model under consideration of geometrically exact beam has to be placed on the central stage and one should show how to fully master the variation in chosen system properties or loads in order to achieve the optimal goal. The main contributions put forward in presenting this unconventional approach can be stated as follows: i) We first present the theoretical framework for treating nonlinear structural mechanics and optimization and/or control as a coupled (nonlinear) problem; In any such problem of optimization or control, the nonlinear mechanics equilibrium equations are reduced to a mere constraint with respect to the admissibility of a given state of the structure, i.e. its displacements and rotations. By using the classical method of Lagrange multipliers (e.g. see [19] or [29] the mechanics equilibrium equations can be promoted from constraint to a one the governing equations to be solved in a coupled problem of this kind, and the intrinsic dependence on state variables (displacements and rotations) with respect to optimal design or control variables can be eliminated turning all variables into the independent variables. For clarity, this idea is also developed within the framework of a discrete, finite-element-based approximation, thus providing the finite element model including the degrees of freedom pertinent not only to displacements and rotations, but also to optimal design and/or control variables. A detailed development is presented for the chosen model problem of 3D geometrically exact beam (e.g. see [27] or [10]). We note in passing that the proposed approach is quite opposite from the traditional ones (e.g. see [17] for a very recent review), where the two fields directly concerned by the coupled problems of this kind, nonlinear mechanics on one side and optimal design or control on the other, are studied and developed separately and resulting solution procedures for one or another are applied in a sequential manner. One typically employs two different computer programs, one for mechanics and another for optimization or control (e.g. the toolbox of MATLAB), so that the communication requirements are reduced to a bear minimum: so-called sensitivity (e.g. [30] or [25]) for optimization code, and design or control variables for the finite element code for mechanics. It is clear that such a traditional approach to analysis and design or control will largely sacrifice the computational efficiency for the cases of practical interest where both the cost function and mechanics problem are nonlinear and require iterative procedures to be solved. ii) The second aspects which is elaborated upon in this work pertains to an alternative method for solving a coupled problem for analysis and either design 2 or control, where two sub-problems, once brought up to the same level by the Lagrange multiplier method, are solved simultaneously. In other words, once the interdependence of the state variables, i.e. the displacements and rotations on one side and the design or control variables or another, is no longer enforced, one can iterate simultaneously to solve for all of them. In particular, the sensitivity analysis needs no longer be performed separately, but it is naturally integrated as a part of the simultaneous iterative procedure. It is important to note that the iterative intermediate values are no longer consistent with the equilibrium equations constraint, except at the convergence, where basically the same solution is obtained as for the standard sequential solution procedure but with a (significantly) reduced number of iterations. In other words the simultaneous and sequential solution procedures will always yield the same result providing the solution is unique. The problems of this kind concern the optimization and/or control of geometrically nonlinear response of structures where no bifurcation phenomena occur. Solving the nonlinear problems in structural mechanics can be quite a demanding task for the structures where the stiffness may differ significantly in different deformation modes (i.e. beam bending versus stretching). Adding the control or optimization problem on top makes such a nonlinear problem so much more challenging. Different modifications of the basic solution procedure are developed and tested, including genetic algorithms [7] to explore the initial phase of the solution procedure, gradient based acceleration near solution points and response surface for a part of the solution constructed by diffuse approximation (e.g. see [2]). The outline of the paper is as follows. In the next section we briefly present the chosen model of geometrically exact 3D beam, capable of representing very large displacements and rotations. The theoretical formulation of the optimal control and optimal design of the chosen mechanical model is presented in Section 3, along with their discrete approximations constructed by the finite element method given in Section 4. The proposed solution procedure is described in detail in Section 5. Several numerical examples are presented in Section 6 in order to illustrate the performance of various algorithms used in computations. Some closing remarks are stated in Section 8. 2 Model problem: geometrically exact 3D beam In this section, we briefly review the governing equations of the chosen model problem of a structure undergoing large rotations, a 3D curved beam. For a more thorough discussion of the chosen model we refer to [27], [26] or [13], among others. We assume that the initial configuration of the beam is internal force free and that it can be described by a 3D position vector ϕ0 (s) identifying the position of each point of the neutral fiber (an inextensible fiber in pure bending) and the corresponding placement of the cross-section of the rod, which is carried out by choosing a local ortho-normal triad of vectors. The vector triad of this kind can be obtained by simply rotating the global triad by an orthogonal tensor.For a usual choice of so-called normal coordinates with the first vector of the triad being orthogonal to the cross-section and the remaining 3 s φ = (ϕ, Λ) φ0 = (ϕ0 , Λ0 ) ✄ ✂ ξ ✁ Figure 1: Initial and deformed configuration of the 3D geometrically exact beam. two placed in the plane of the cross section, this orthogonal tensor becomes a known function of the initial configuration, Λ0 (s). For the case of a curved beam studied here, ’s’ is chosen as the arc length parameter. By applying the external loading f(t), parameterized by pseudo-time ’t’ (where ’pseudo’ implies that the inertia effects are neglected) we obtain the beam deformed configuration defined by the position vector ϕ(s, t) and the orthogonal tensor Λ(s, t). The latter is an accordance with the usual kinematic hypothesis that the cross-section of the beam would not deform, which, along with the hypothesis that the first vector in the triad remains orthogonal to it (with other two within the plane of the cross-section) fully determines Λ(s, t). See Figure 1 where the initial and deformed configuration of the beam are presented. In short, one can state that the configuration space of the described model of 3D beam can be written as C := {φ = (ϕ, Λ) | ϕ ∈ R3 , Λ ∈ SO(3)} (1) where R3 and SO(3) are spaces of 3D vectors and special orthogonal tensors, respectively. The main difficulty in numerical solution of the structural mechanics problems featuring the beams of this kind stems from the presence of SO(3) group in its configuration space (e.g. see [1], [13], [11] for a more thorough discussion of these issues). In short, in performing the standard task of computing the virtual work principle or the consistent linearization, where a small rotation described by a skew-symmetric tensor δΘ ∈ so(3), ought to be superposed on a large rotation described by an orthogonal tensor Λ ∈ SO(3) one must first make use of exponential mapping Λε = Λ exp[ε δΘ] ; exp[δΘ] = cos δθ I + sin δθ 1 − cos δθ δΘ + δθ ⊗ δθ δθ δθ2 (2) where δθ is the axial vector of the skew-symmetric tensor δΘ i.e. δΘ v = δθ × v, ∀v ∈ R3 . The complexity of the last expression is in sharp contrast, with respect to a simple additive update of virtual displacement field δϕ ∈ R3 when superposed on the deformed configuration ϕ ∈ R3 ϕε = ϕ + ε δϕ 4 (3) The results in (2) and (3) can be presented in an equivalent form by stating that the tangent space of the chosen beam model is defined by T C := {δφ := (δϕ, δθ) |δϕ ∈ R3 , δθ ∈ R3 } (4) The strain measures employed in this beam theory (e.g. [10]) can be written in direct tensor notation form as ǫ = Λϕ′ (5) Ωv = ω × v ; ∀v ∈ R3 (6) for the axial and shear strains, and Ω = ΛT Λ′ ; for bending and torsional strains. In (5), (6) and subsequent equations we denote with superposed prime the derivative with respect to arc-length coordinate in the initial configuration, i.e. ∂ (·) = (·)′ (7) ∂s We consider the simplest case of linear elastic material model for the beam which allows us to express the constitutive equations in terms of stress resultants as n = C(ǫ − ǫ0 ) ; m = D(ω − ω 0 ) ; C = diag(EA, GA, GA) (8) D = diag(GJ, EI, EI) (9) For illustration, we also consider the simplest case of a circular cross section, with section diameter ’d’, and A= d2 π ; 4 I= d4 π ; 64 J= d4 π 32 (10) as the section area, moment of inertia and polar moment. In order to complete the description of the chosen beam model we state the equilibrium equations in the weak form as G(φ; δφ) := Z (δǫ · n + δω · m) ds − Gext (δφ) = 0 (11) where Gext (δφ) is the external virtual work and δǫ and δω are the virtual strains. The latter can be obtained as the Gâteaux derivative of the real strains in (5) and (6), by taking the results in (2) and (3) into consideration. In particular, this leads to δb ǫ(φ; δφ) = Dφ [b ǫ(φ)] d T ′ [Λ ϕ ] |ε=0 = dε t,ε t,ε = ΛT δϕ′ + ǫ × δθ 5 (12) and b b t,ε )] δ Ω(φ; δφ) = Dφ [Ω(φ d T ′ = [Λ Λ ] |ε=0 dε t,ε t,ε = δΘ′ + δΘT Ω + ΩδΘ (13) which can also be written in an equivalent form in terms of the corresponding axial vectors δω = δθ ′ + ω × δθ (14) For the external load which derives from a given potential, such that Gext (δφ) := Dφ Πext (φ) (15) one can also define the governing equilibrium equation of the chosen model problem of the geometrically exact elastic beam from the principle of minimum of the total potential energy defined according to Z 1 Π(φ) := {(ǫ − ǫ0 ) · n + (ω − ω 0 ) · m} ds − Πext (φ) → min (16) l 2 which implies that    Dφ [Π(φ)] ≡ G(φ; δφ) = 0 ∗ Dφ [Dφ Π(φ)] ≡ Dφ G(φ; δφ) > 0 Π(φ) = min∗ Π(φ ) =⇒ {z } |  ∀φ  δφ·Kδφ (17) In (17) above we denoted by K the second variation of the total potential energy or the tangent operator, which is obtained by the consistent linearization procedure (e.g. see [20]). For pertinent details of the consistent linearization we refer to [10] for quaternion parameterization of finite rotations or [13] for rotation vector-like parameters for finite rotations. An alternative case of external loading where the potential may not be defined and where the weak form in (11) is rather the starting point of the solution procedure, can also be encountered in applications. For example, in the case of the follower force p0 and follower moment l0 which follow the motion of a particular cross-section of the beam at node ’a’, we can express their contribution to virtual work according to Gext (Λa ; δϕa , δθ a ) := δϕa · Λp0 +δθ a · Λl0 |{z} |{z} p (18) l The follower force and moment will also contribute to the tangent operator according to   ∆ϕa = δϕa · P∆θ a + δθ a · L∆θ a (19) Dφ Gext (Λ; δϕa , δθa ) · ∆θ a where Pv = p × v; Lv = l × v; ∀v ∈ R3 . This contribution should also be taken into account when computing the solution to (11) and trying to ensure the quadratic convergence rate. 6 3 Coupled optimality problem The presented beam model provides an excellent basis to master the optimization problem as well as the control problem of geometrically nonlinear elastic structures. Although the former deals with geometric characteristics of the beam and the latter with the external loading sequence, the two problems can be formulated and solved in quite an equivalent manner, as shown next. 3.1 Optimal design The optimal design problem addressed herein pertains to selecting the desired features of the mechanical model by leaving the free choice of the geometric properties of the beam model, e.g. the thickness variation or the chosen initial shape. This task is often referred to as the shape optimization. From the mathematical standpoint the shape optimization can be formulated as the problem of minimization of so-called objective or cost function J(·), specifying the desired features. The latter is considered as a functional which depends not only on mechanics state variables φ but also on design variables d (e.g. the beam thickness or its shape). The shape optimization procedure is interpreted herein as minimization of so-called ˆ which can be written as cost or objective functional J(·), ˆ φ̂(d), d) = J( min ˆ∗ ˆ φ̂(d∗ ), d∗ ) J( (20) G(φ (d∗ );·)=0 Contrary to the minimization of the total potential energy functional in (17), not all mechanical and design variables are admissible candidates, but only those for which the weak form of the equilibrium equations is satisfied. In other words, we now need to deal with a constrained minimization problem. The classical shape optimization procedure of solving this constrained minimization problem is carried out in a sequential manner, where for each iterative value of design variables d(i) , a new iterative procedure must be completed leading to φ(d(i) ) verifying the equilibrium equations. The considerable computational cost of such a procedure, most of it waisted on iterating to convergence on equilibrium equations even for non-converged values of design variables, can be drastically reduced by formulating the minimization problem in (20) using the method of Lagrange multipliers with max min L(φ∗ , d∗ ; λ) ; ∀λ ∀(φ∗ , d∗ ) L(φ∗ , d∗ ; λ) = J(φ∗ , d∗ ) + G(φ∗ , d∗ ; λ) (21) In (21) above λ are the Lagrange multipliers inserted into the weak form of equilibrium equations instead of virtual displacements and rotations. In accordance to the results presented in the previous section we can write explicitly G(φ, d; λ) = Z {λ′ϕ · Λn + λθ · (ET n + ΩT m) + λ′θ · m}ds − Gext (λ) l 7 (22) The main difference of (21) with respect to constrained minimization problem in (20) pertains to the fact that state variables φ and design variables d are now considered independent and they can be iterated upon (and solved for) simultaneously. The Kuhn-Tucker optimality condition (e.g. [19]) associated with the minimization problem in (18) can be written as 0 = Dφ [L(φ, d; λ)] = Dφ [J(φ, d)] + Dφ [G(φ, d; λ)] (23) with the explicit form of the last term which can be written as R  Dφ [G(φ, d; λ)] · δφ = l λ′ϕ · (ΛCΛT δϕ′ + ΛCEδθ) T +λ CΛT δϕ′ + (ET CE + ΩT DΩ)δθ + ΩT Dδθ ′ ] + λ′θ · (DΩδθ + Dδθ ′ ) ds R θ· [E + l λ′ϕ · (ΛNT δθ) + λθ · [NΛT δϕ′ + [Ξ (ǫ × n) + Ξ (ω × m)] δθ + Mδθ ′ ] ds (24) where we denoted Ξ(a × b) = (a ⊗ b) − (a · b)I, as well as Mv = m × v and Nv = n × v, ∀v ∈ R3 ; Moreover, we have 0 = Dd [L(·)] = Dd J(·) + Dd G(·) (25) where Dd [G(·)] · δd = Z  λ′ϕ l    ∂m ∂n ′ T ∂m T ∂n + λθ · · δdds ·Λ + λθ · E +Ω ∂d ∂d ∂d ∂d (26) Finally, we also have 0 = Dλ [L(·)] · δλ = Z l  ′  δλϕ · Λn + δλθ · ET n + ΩT m + δλ′θ · m ds (27) For illustration we can consider further that the diameter of a circular cross-section is chosen as the design variable, which allows us to express explicitly the result in (23) as ∂n ∂C ∂C ∂A ∂A ∂A d2 π = (ε − ε0 ) ; = diag[E ,G ,G ]; A= ; ∂d ∂d ∂d ∂d ∂d ∂d 4 ∂m ∂D ∂D ∂J ∂I ∂I d4 π = (ω − ω0 ) ; = diag[G , E , E ] ; J = 2I = ∂d ∂d ∂d ∂d ∂d ∂d 32 (28) (29) In order to provide a similar explicit result for directional derivative of the cost function, we consider a simple choice given as the beam mass (or equivalently its volume for a constant density), J(φ, d) ≡ V = Z A ds ; A= d2 π 4 (30) l In such a case the contribution of the cost function to the Kuhn-Tucker optimality conditions can be written as 8 Dφ J(φ, d) · δφ = 0 Z ∂A δd ds ; Dd J(φ, d) · δd = ∂d ∂A dπ = ∂d 2 (31) l Dλ J(φ, d) · δλ = 0 We can also consider a more complex case of practical interest where the shape optimization is carried out with respect to the beam axis form in the initial configuration. A reference configuration is selected in such a case (see Figure 1) and the design variable is given in terms of the position vector describing the beam initial configuration with respect to this reference configuration d ≡ ϕ0 (ξ). The cost function in (25) can now be described as J(φ, d) := Z l A ds = Zξ2 A j(ξ) dξ ; j(ξ) = ∂d(ξ) ∂ξ (32) ξ1 In this case all the integrals in (23) to (27) must be recomputed with the same change of variables like the one presented in (32) above typical of the isoparametric parent element mapping (e.g. see Zienkiewicz and Taylor [31]). We also note in passing that the derivatives with respect to arc-length coordinate ought to be computed by making use of the chain rule 1 ∂ d (·) = (·) ds j(ξ) ∂ξ (33) For example, the contribution of the cost function to the Kuhn-Tucker optimality conditions for such a choice of design variables can be written as Dd [J(φ, d)] · δd = Zξ2 A 1 ∂d(ξ) d(ξ) · dξ j(ξ) ∂ξ (34) ξ1 3.2 Optimal control The optimal control problem studied herein concerns the quasi-static external loading sequence which is chosen to bring the structure directly towards an optimal or desired final state, which may involve large displacements and rotations. More precisely, we study the mechanics problems where introducing the pseudo-time parameter ’t’ to describe a particular loading program is not enough and one also needs to employ the control variables ν. The latter contributes towards the work of external forces, which can be written as Z ext G (ν; δφ) := {δφ · F0 ν}ds (35) l where F0 contains the (fixed) distribution of the external loading to be scaled by the chosen control. 9 Optimal control can be presented in the following form: find the value of the control variables ν, such that the final value of the state variables φ be as close as possible to the desired optimal (fixed) values φd ; This can be formulated in terms of the constrained minimization of the chosen cost function J(φ̂(ν), ν) which can be written as ˆ φ̂(ν), ν) = ˆ φ̂(ν ∗ ), ν ∗ ) J( min (36) J( ˆ ∗ φ̂d G(φ(ν );·)=0 where the role of the constraint, as indicated by the last expression, is to fix the values of the state variables with respect to the chosen value of the control through the given set of equilibrium equations. In other words, for a given control we will finally obtain the configuration φ the same as the desired state φd if the latter verifies equilibrium equations, or, in the opposite case simply the solution closest to φd which also verifies the equilibrium equations. In order to remove this constraint and to be able to consider the state variables independently from the control variables, we resort to the classical method of Lagrange multipliers; Namely, by introducing the Lagrange multipliers λ we can rewrite the optimal control problem by making use of the Lagrangian functional L(·) which allows to obtain the corresponding form of the unconstrained optimization problem. max min L(φ, ν, λ) ∀λ ∀(φ,ν ) ; L(φ, ν, λ) = J(φ, ν) + G(φ, ν; λ) (37) φ̄d One can readily obtain the Kuhn-Tucker optimality conditions for this problem according to ∂L · δλ := G(φ, ν; δλ) ∂λ ∂J(·) ∂G(φ; λ) ∂L · δφ := · δφ + · δφ 0 = ∂φ ∂φ ∂φ 0 = (38) (39) and ∂L ∂J ∂Gext δν := δν + δν (40) ∂ν ∂ν ∂ν The first of these equations is precisely the weak form of equilibrium equation, whereas the second two will provide the basis for computing the control ν and the Lagrange multipliers λ. The explicit form of the equilibrium equation is similar to the one in (11) only with the external load term (35), but with the variation of the Lagrange multiplier δλ replacing the virtual displacement δϕ. For writing the explicit form of other two Kuhn-Tucker equations we choose a particular form of the objective function such that  Z  1 1 2 2 (41) J(φ, ν) = kφ − φ̄d k + αkνk ds 2 2 l 0= where φ̄d is the desired beam shape and α is a scalar parameter specifying the weighted contribution of the chosen control. With such a choice we seek to minimize the ”distance” between the desired shape and the computed admissible shape (the one which satisfies equilibrium) as well as the force or control needed to achieve that state. The explicit form of the first term in (39) and (40) can thus be written as Z   ∂J · δφ = (42) δφ · φ − φ̄d ds ∂φ l 10 and Z ∂J · δν = {δν · (αν)} ds (43) ∂ν l Explicit result for the second term of Kuhn-Tucker equations in (39) is identical to the one in (24) potentially modified according to (19) for the case of the follower load. Finally, the second term of the Kuhn-Tucker equation in (40) can be written as Z  ∂Gext · δν = δν · FT0 λ ds (44) ∂ν l which concludes with the description of all the problem ingredients. 4 Finite element discrete approximations In this section we discuss several important aspects of numerical implementation of the presented theory for analysis and design and related issues which arise in numerical simulations. The analysis part of the problem, i.e. the state variables are represented by using the standard isoparametric finite element approximations (e.g. see [31]). In particular, this implies that the element initial configuration is represented with respect to its parent element placed in the natural coordinate space, corresponding to a fixed interval, −1 = ξ1 ≤ ξ ≤ ξ2 = +1, by using nen X Na (ξ) xa ϕ0 (s) ≡ x (ξ) = (45) a=1 In (45) above x (ξ) is the position vector field with respect to the reference configuration, xa are nodal values of an element with nen nodes and Na (ξ) are the corresponding shape functions. The latter can easily be constructed for beams by using the Lagrange polynomials, which for an element with nen nodes can be written by using the product of monomial expressions nen Y ξ − ξb Na (ξ) = ξa − ξb b=1,b6=a (46) where ξa , a ∈ [1, nen ] are the nodal values of natural coordinates. With isoparametric interpolations one chooses the same shape functions in order to approximate the element displacement field, which allows us to construct the finite element representation of the element deformed configuration as ϕ (ξ) = nen X Na (ξ) ϕa (47) a=1 where ϕa are the nodal values of the position vector in the deformed configuration. The virtual and incremental displacement field are also represented by isoparametric finite element interpolations δϕ (ξ) = nen X Na (ξ) δϕa ; ∆ϕ (ξ) = nen X a=1 a=1 11 Na (ξ) ∆ϕa (48) The latter enables that a new (iterative) guess for the deformed configuration be easily obtained with the corresponding additive updates of the nodal values ϕa ←− ϕa + ∆ϕa The finite element approximation of the incremental displacement field in (48) above, where at each point ξ ∈ [ξ1 , ξ2 ] the corresponding value is a linear combination of the nodal values, are referred to as the continuum consistent (e.g. see [9, 10]), since they allow to commute the finite element interpolation and the consistent linearization of nonlinear problem (e.g. [20]). Therefore, we also choose the isoparametric interpolations for virtual and incremental rotation field with δθ (ξ) = nen X Na (ξ) δθ a ; ∆θ (ξ) = nen X Na (ξ) ∆θ a (49) a=1 a=1 so that the commutativity of the finite element discretization and consistent linearization would also apply to the rotational state variables. The only difference from the displacement field concerns the multiplicative updates of the rotation parameters, which can be written for any nodal point ′ a′ as Λa ← Λa exp [∆θ a ] (50) In the combined analysis and design procedure proposed herein one must also interpolate the Lagrange multipliers, which is also done by using the isoparametric interpolations according to  n en P  Na (ξ) λϕa  λϕ (ξ) = a=1 Na (ξ) λa ⇐⇒ λ (ξ) = n en P   λθ (ξ) = Na (ξ) λθa a=1 nen X (51) a=1 The corresponding integrals appearing in governing Lagrangian functional in (21) or Kuhn-Tucker optimality conditions in (23), (25) and (27) are computed by numerical integration (e.g. Gauss quadrature, see [31]). To illustrate these ideas we further state a single element contribution to the analysis part of the governing Lagrangian functional in (22) given in the discrete approximation setting by G(φa , d, λa ) :=   λ ϕa λ θa Λ(ξl ) E(ξl ) 0 0 Ω(ξl ) I " X nip dNa (ξl ) I ds l=1 T  n(ξl ) m(ξl ) 0  0 Na (ξl )I 0 dNa (ξl ) I ds j(ξ)wl − Gext (λ(ξl )) #T (52) where ξl and wl are the abscissas and weights of the chosen numerical integration rule (e.g. see [31]) and nip is the total number of integration points for a single element. In order to complete the discretization procedure one must also specify the interpolations of the design variables. If the latter is the thickness or the diameter for the chosen case of a circular cross-section, or the element nodal coordinates, it is possible 12 to use again the isoparametric finite element approximations. However, the best results are obtained by reducing the number of design variables as opposed to those chosen at the element level, by using the concept of a design element. This implies increasing the degree of polynomial by employing, for example, Bézier and B-spline curves for representation of beam shape and reducing significantly the number of design parameters (e.g. see [16] for a detailed discussion of these ideas). What is important to note from the standpoint of the simultaneous solution procedure presented further on is that the design variable at any point is given as a linear combination of the design element interpolation parameters d(ξl ) = ndn X Ba (ξl ) da (53) a=1 Consequently, the finite or rather design element discretization and consistent linearization will commute again. This observation was already made earlier for linear analysis problem by Chenais and Knopf-Lenoir [3]. With these results on hand we can write the discrete approximation of equilibrium equations as Dλ L(φ, d; λ) := 0 7→  " #T nel nint  dNa (ξe ) X 1 0 0 ds rλ,e a = dNa (ξe ) e=1  0 Na (ξe )1 1 ds e=1 )   T T  n(ξe ) Λ (ξe ) E(ξe ) 0 j(ξe ) − faext = 0 (54) m(ξe ) 0 Ω(ξe ) I A where ’A’ denotes the finite element assembly operator. By the same token the discrete approximation of the Kuhn-Tucker optimality conditions in (23) can be presented as Dφ L(φ, d; λ) := 0 7→  " #T  nel T nint  dNa (ξe ) T X 1 0 0 Λ (ξ ) E(ξ ) 0 e e φ,e ds  ra = a (ξe ) e=1  0 Ω(ξe ) I 0 Na (ξe )1 dNds 1 e=1  T   C 0 Λ (ξe ) E(ξe ) 0 + 0 D 0 Ω(ξe ) I   0 ΛT (ξe )N T (ξe ) 0 +  N(ξe )ΛT (ξe ) Ξ(ǫ × n) + Ξ(ω × m) M  0 0 0 ) # "   nen dNb (ξe ) X 1 0 0 λ ϕb ds j(ξe )wl = 0 (55) λθb 0 Nb (ξe )1 dNds(ξe ) 1 A b=1 Similarly, for the simple choice of the objective function in (30) the discrete ap13 proximation of the optimality condition in (25) can be written as Dd L(φ, d; λ) := 0 7→  " #T  nel T nint  dNa (ξe ) X 1 0 0 ΛT (ξe ) E(ξe ) 0 d,e ds  ra = a (ξe ) e=1  0 Ω(ξe ) I 1 0 Na (ξe )1 dNds e=1  #T ndn ndn  X X ∂A(ξe ) Bb (ξe )db j(ξe )wl = 0 (56) Bb (ξe )db j(ξe )wl +  ∂d b=1 b=1 A In summary, the discrete approximation of the optimal design problem reduces to the following set of nonlinear algebraic equations where the unknowns are the nodal values of displacements and rotations, the corresponding values of Lagrange multipliers and the chosen values of thickness parameters which support Bézier curve thickness interpolations,  λ  r := f int − f ext φ =0 r(φ, d; λ) :=  r := Kλ (57) T int ∂f ∂V d r := + ∂d ∂d Similar procedure leads to the discrete approximation of the optimal control problem. In fact, the first of the nonlinear algebraic equations in (54) is only slightly modified to include the control variables in accordance with the expression in (35) rλ := f int − F0 ν = 0 (58) where ν are the chosen control parameters. For the particular choice of the objective function of the control problem given in (41), we can further obtain the discrete approximation of the optimality condition in (39) according to Dφ L(φ, ν, λ) = 0 ⇒ rφ := φ − φ̄d + Kλ = 0 (59) The discrete approximation of the last optimality condition in (40) can also be written explicitly as Dν L(φ, ν, λ) = 0 ⇒ rν := αν − FT0 λ = 0 (60) We note in passing that the last two optimality conditions can be combined to eliminate the Lagrange multipliers leading to αν + FT0 K−1 φ = FT0 K−1 φ̄d (61) The last result can be combined with the equilibrium equations in (58) providing a reduced set of equations with nodal displacements, rotations and control variables as the only unknowns. This kind of form is fully equivalent to the arc-length solution procedure, which is used for solving the nonlinear mechanics problems in the presence of the critical points (e.g. see [24], [4] or [23], among others). One can recognize that (58) is only a particular choice of the supplementary condition which is used to stabilize the system. 14 ∂n(ξe ) ∂d ∂m(ξe ) ∂d ! 5 Solution procedure Two novel solution procedures are developed for solving this class of problems of optimal design and optimal control as described next. 5.1 Diffuse approximation based gradient methods The first solution procedure is a sequential one, where one first computes grid values of the cost function and then carry out the optimization procedure by employing the approximate values interpolated from the grid. It is important to note that all the grid values provide the design or control variables along with the corresponding mechanical state variables of displacements and rotations which must satisfy the weak form of equilibrium equation. In other to ensure this requirement, for any grid value of design or control variables one also has to solve associated nonlinear problem in structural mechanics. The main goal of the subsequent procedure is to avoid solving these nonlinear mechanics problems for other but grid values, and simply assume that the interpolated values of the cost function will be ”sufficiently” admissible with respect to satisfying the equilibrium equations. Having relaxed the equilibrium admissibility requirements we can pick any convenient approximation of the cost function, which will simplify the subsequent computation of the optimal value and thus make it much more efficient. These interpolated values of the cost function can be visualized as a surface (yet referred to as the response surface) trying to approximate sufficiently well the true cost function. The particular method which is used to construct the response surface of this kind is the method of diffuse approximations (see [22] or [2]). By employing the diffuse approximations the approximate value of the cost function Jˆappr is constructed as the following quadratic form 1 Jˆappr (x) = c + xT b + xT Hx 2 where c is a constant reference value, b = (bi ) ; bi = ∂ 2 Jˆappr ∂xi ∂xj ∂ Jˆappr ∂xi (62) is the gradient and H = is the Hessian of the approximate cost function. In (62) above [Hij ] ; Hij = variables x should be replaced by either design variables d for the case of an optimal design problem or by control variables ν in the case when we deal with an optimal control problem. We further elaborate on this idea for a simple case where only 2 design or control variables are used, such that x = (x1 , x2 )T . For computational proposes in such a case one uses the polynomial approximation typical of diffuse approximation (see [2]) employing the chosen quadratic polynomial basis p(x) and a particular point dependent coefficient values a(x) Jappr (x) = pT (x)a(x) ; pT (x) = [1, x1 , x2 , x21 , x1 x2 , x22 ] ; a(x) = [a1 (x), a2 (x), . . . , a6 (x)] (63) By comparing the last two expressions one can easily conclude that     a4 a5 a2 (64) ; H= c = a1 ; b = a5 a6 a3 15 The approximation of this kind is further fitted to the known, grid values of the cost function; J(xi ), i = 1, 2, . . . , n, trying to achieve that the point-dependent coefficients remain smooth when passing from one sub-domain to another. This can be stated as the following minimization problem: n   1X T ∗ 2 a(x) = arg min f (a , x) ; f (a , x) := W (x, x ) J(x ) − p (x )a (65) i i i ∀a∗ 2 i=1 ∗ ∗ where W (x, xi ) are the weighting functions associated with a particular data point x, which are constructed by using a window function ρ(·) based on cubic splines according to   k x − xi k W (x, xi ) = ρ ; ρ(s) := 1−3s2 +2s3 ; r(x) = max[dist(x, xk )] (66) k r(x) with xk (x), k = 1, . . . n + 1 (= 7 for the present 2-component case) as the closest grid nodes of the given point x. We can see that the weighting functions W (·) in (65) and (66) above take a unit value at any of the closest grid nodes xi and vanish outside the given domain of influence. While the former assures the continuity of the coefficients a(x), the latter ensures that the approximation remains local in character. Similar construction can be carried out for higher order problems, which requires an increased number of closest neighbors in the list. By keeping the chosen point x fixed and considering the coefficients a of diffuse approximation as constants, the minimization of f (·) amounts to using the pseudoderivative of diffuse approximation (see [22]) in order to compute x yielding the minimum of Japp (x) according to 0= n X p(xi ) W (x, xi )(Ji − pT (xi )a) (67) i=1 which allows us to write a set of linear equations a(x) = (PWPT )−1 PWj P = [p(x1 ), p(x2 ) . . . p(xn )] ; j = (J(x1 ), J(x2 ), . . . , J(xn )) W = diag (W (x1 , x), W (x2 , x), . . . , W (xn , x)) (68) We note in passing that the computed minimum value of Jˆappr does not necessarily provide the minimum of the true cost function, which also has to satisfy the equilibrium equations; however, for a number of applications this solution can be quite acceptable. If the latter is not sufficient, we ought explore an alternative solution procedure capable of providing the rigorously admissible value of any computed minima of the cost function, by carrying out the simultaneous solution of the cost function minimization and the equilibrium equations. The proposed procedure is based on genetic algorithm as described next. 5.2 Genetic algorithm based method Genetic algorithms belong to the most popular optimization methods nowadays. They follow up an analogy of processes that run in nature within the evolution of living 16 organisms over a period of many millions of years. Unlike the classic gradient optimization methods, genetic algorithms operate on so called population which is a set of possible solutions, applying the genetic operators, such as cross-over, mutation and selection. The principles of genetic algorithm was first proposed by Holland [6]. Ever since, the genetic algorithms have reached wide application domain (e.g. see the books of Goldberg [5] and Michalewicz [21] for extensive review). Genetic algorithms in the original form operate on population of so-called chromosomes. These are binary strings which represent possible solutions in a certain way. In engineering problems we are usually working with real variables, which in the kind of applications described further are optimized values of load control or design variables. Adaptation of the genetic algorithm idea to this problem is made possible by Storn [28] by considering the chromosomes as vectors instead of binary strings and using differential operators which can affect the distance between the chromosomes. In this work we employ an improved version of this kind of algorithm referred to as ’Simplified Atavistic Differential Evolution’, or SADE ([18]). It is shown [7, 8] that the algorithm is well suitable for dealing with a fairly large number of variables which is of particular interest for the problem on hands. The SADE algorithm is designed to explore all possible minima and thus find the global minimum, even for the case where the cost function may have very steep gradients and isolated peak values. Only a short description of the corresponding procedure is given subsequently (see [7] for a more elaborate presentation). In the tradition of evolutionary methods, the first step is to generate a starting generation of chromosomes by choosing the random values of all state variables along with those for control or design. Subsequently we repeat until convergence the cycles containing: the creation of a new generation of chromosomes, by mutation, local mutation or cross-over and the evaluation and selection, which reduces the actual number of chromosomes to the initial number. In the computations to follow we will work with the population of ’10×n’ chromosomes, where ’n’ is the total number of unknowns in the problem. This population can evolve through the following operations; Mutation: let xi (g) be the i-th chromosome in a generation g, xi (g) = (xi1 (g), xi2 (g), ..., xin (g)), (69) where n is the number of variables of the cost function. If a certain chromosome xi (g) is chosen to be mutated, a random chromosome RP is generated from function domain and a new one xk (g + 1) is computed using the following relation: xk (g + 1) = xi (g) + MR(RP − xi (g)). (70) Parameter MR is the constant of algorithm equal to 0.5. Number of new chromosomes created by the operator ’mutation’ is defined by ’radioactivity’, which is another parameter of the algorithm, with a constant value set to 0.1 for all our calculations. If a certain chromosome is chosen to be locally mutated, all its coordinates have to be altered by a random value from a given (usually very small) range. Its aim is to utilize the near neighborhood of existing chromosomes and make search for improved solutions faster. It is useful only for cost functions with steep gradients in the case, where near the optimal function value, a small change in value of variable may introduce a large change in function value. The aim of the cross operator is to create 17 as many new chromosomes as there were in the last generation. The operator creates new chromosome xi (g +1) according to the following sequential scheme: choose randomly two chromosomes xq (g) and xr (g), compute their difference vector, multiply it by a coefficient CR and add it to the third, also randomly selected chromosome xp (g), i.e, xi (g + 1) = xp (g) + CR(xq (g) − xr (g)). (71) Every component exceeding the defined interval is changed to the appropriate boundary value of domain. The parameter CR has probably the most important effect on the algorithm’s behavior; it seems that if the speed up of the convergence is needed, this parameter should be set to some lower value (from 0.05 to 0.1). In the opposite case, the higher values of this parameter could improve the ability to solve for any local minimum. In our computations this value was set to 0.3. Selection represents the kernel of the genetics algorithm. The goal is to provide a progressive improvement of the whole population, which is achieved by reducing the number of ”living” chromosomes together with conservation of better ones. Modified tournament strategy is used for this purpose: two chromosomes are chosen randomly from a population, they are compared and the worse of them is cast off. This conserves population diversity thanks to a good chance of survival even for badly performing chromosomes. It was observed that the SADE algorithm can be quite inefficient in the later stage of the analysis, where the solution with all or a large number of components is almost converged. For that reason we have tried to further improve the performance by forcing the algorithm to stick better to these converged values. In particular we have experimented with a modified form of the cross operator, which contrary to the one in (71) will produce the new chromosome by building on top of the best possible previous value according to xi (g + 1) = max(xq (g); xr (g)) + SG.CR(xq (g) − xr (g)). (72) where SG is the sign change parameter which is supposed to get the correct orientation of the increase with respect to the gradient. Moreover, the parameter CR is no more constant, but its values are chosen randomly from interval (0, CL), where CL is new parameter of the algorithm, with a smaller influence at its behavior than CR. Operator local mutation is now switched off and parameter MR in operator mutation is also no more constant, but chosen randomly from interval (0, 1). This algorithm modification is subsequently referred to as GRADE. 6 Numerical examples In this section we present several illustrative examples dealing with the coupled problems of mechanics and either optimal control or optimal design. The computations are carried out by using a mechanics model of 2D geometrically exact beam (see [12] or [14]) developed either within the MATLAB environment for diffuse approximation based solution procedure or within the C ++ SADE computer code for genetic algorithms. 18 6.1 Optimal control of a cantilever structure in the form of letter T 20 15 Final shape 10 EA = 12000 5 cGA = 5000 Initial shape EI = 1000 F M 0 -5 -10 0 -5 5 10 15 20 Figure 2: T letter cantilever: Initial, final and intermediate configurations In this example we study the optimal control problem of deploying initially curved cantilever beam in the final configuration which takes the form of letter T. See Figure 2 for initial and final configurations indicated by thick lines and a number of intermediate deformed configurations indicated by thin lines. The chosen geometric and material properties are as follows: The diameter of the circular curved part and the length of the flat part of the cantilever are both equal to 10; the beam cross-section is a unit square; the chosen values of Young’s and shear moduli are 12000 and 6000, respectively. The deployment is carried out by applying a vertical force F and a moment M at the end of the curved part of the cantilever. In other words the chosen control is represented by a vector ν = (F, M)T . The desired shape of the cantilever which takes the form of letter T corresponds to the values of force F = 40 and moment M = 205. The optimal control problem is then defined as follows. The objective or cost function is defined by imposing the desired shape only on displacement degrees of freedom with Z 1 kφ̂(ν) − φd k2 ds (73) J(ν) = 2 L which is further recast in the discrete approximation setting as n 2 el X T e  1X J (ν) = le uea (ν) − uda ua (ν) − uda 4 e=0 a=1 h (74) where uea (ν) are computed and uda are desired nodal displacements. We note in passing that no condition is imposed through the cost function on either rotational degrees 19 of freedom or control vector, which nevertheless introduces no difficulties in solving this problem. The first solution is obtained by the diffuse approximation based gradient method. The calculation of the cost function is first carried out for all the ’nodes’ of the following grids: 5 × 5; 10 × 10; 15 × 15 and 20 × 20. The gradient type procedure is then started on the grid and, thanks to the smoothness of the diffuse approximation base representation of the approximate value of the cost function, converged with no difficulty in roughly 20-40 iterations. The iterative values obtained in the gradient method computations are for different grids shown in Figure 3. Grid is constructed for the following interval of values of force and moment: F ∈ h10, 60i ; M ∈ h175, 225i. We note that all different choices of the grid can result in different solutions, since none of the solutions of this kind will satisfy the equilibrium equations. Quite large difference between known optimal solution and solutions of response surface could be explained by different influence of each control variable to value of cost function, see Figure 4. All used grids weren’t able to describe small influence of force F . The second solution method used for this problem employs the genetic algorithm based computation. In this computation we have used the same admissible intervals like in the previous case for the control variables, force and moment. The computations are carried out starting from the random values chosen in this interval and stopped when the first value of the cost function J ≤ 10−7 is found. In order to be able to look into statistics, one hundred runs are performed with each one converging to the exact solution. Three types of procedures were tried, with either tuning on or off the parameters controlling local mutation (LM) and the gradient-type acceleration of sign change (SG). The results are presented in Table 1. Computation with SADE LM-on SG-off LM-off SG-off LM-off SG-on Letter T problem Number of fitness calls Minimum Maximum Mean Value 240 2860 648.8 280 1680 625.4 220 1640 591.2 Table 1: T-letter cantilever: SADE algorithm performance We can see that the best performance is achieved with the simple gradient-like modification of SADE genetic algorithm to accelerate convergence in the latest stage. The results obtained with this simple gradient-like modification of SADE algorithm can further be improved by using described GRADE algorithm, with a special role of the radioactivity parameter. See Table 2. The second solution procedure applied to the same example is so-called simultaneous solution of mechanics equilibrium and optimal control equations, written explicitly in (58) to (60) with value α = 0. The total numb er of unknowns in this case 20 F approchée o o 225 o o o X0 220 225 o o o o 220 o o o X0 o 215 X o o o o o o o o o o o X 205 X X X X X X o o o X X X O 205 o 200 o o o o o o o X 210 o X X o o o o X 210 200 o o o X X 215 o F approchée o o o o X o X X o X o X X o X o X X o X X o X O X o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o 195 195 190 190 o o o o o 185 185 o o o o o o o o o o 180 180 o o o o o o o o o o 175 o 10 o 15 o 50 o 55 o 60 175 o 10 15 o 20 25 o 35 30 40 o 45 50 o 60 55 Grid (5 × 5) Solution : F = 60.000 M = 205.26 38 evaluations of AD o o o o o F approchée o o o o o o o o o o o o o o o o o o o o o o X0 220 o o o o o 215 o o o o o o o o 210 o o o o o o o o o o o o o o o o o X o o o o o o o o o X o o o o o o o o o o o o 205 X X o o o o o X X X X X X o o o 25 o 30 o 35 o 40 45 Grid (10 × 10) Solution : F = 59.073 M = 204.91 38 evaluations of AD 225 o o 20 o X o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o 220 o o o o o o X0 o o o o o o o o o o o o o o o 215 o o o o o o oX o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o Xo o o o o o o o o o o o o o o o o o o o o o oX o o o o o o o o o o o o X X O o o o o o o 210 o XO X X 205 o o o o o o o o o o o o o o o 200 o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o 195 F approchée o o o 225 o 200 195 X o o o o o o o o o o o o X o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o X X o X o o o o o o o o o o o o o o o 190 o o o o o o o o o o o o o o o 190 o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o 185 o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o 180 o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o 175 o 10 o o 15 o o 20 o o o o o o o o 40 o 45 o o 50 o o 55 o o 60 185 o o o o o o o o o o o o o o o 180 o o 175 o 10 o o 15 o 20 o o o o o 25 o 30 o o o o o 35 o o 40 o Grid (15 × 15) Solution : F = 51.218 M = 204.95 19 evaluations of AD 45 o o o o o 50 o 55 o o o o 60 25 30 35 Grid (20 × 20) Solution : F = 47.444 M = 204.97 15 evaluations of AD Figure 3: T letter cantilever: Gradient method iterative computation on a grid. is equal to 44, with 2 control variables (the force and the moment), 21 components of nodal displacements and rotations and 21 Lagrange multiplier. For computational convenience, the problem of solving the set of nonlinear algebraic equations in (58) to (60) is recast as the minimization statement which allows direct application of the genetic algorithm with  λ  r  (75) r := rφ  = 0 ⇔ min rT r (ϕ,ν,λ) rν The solution efficiency of the proposed simultaneous procedure depends on the chosen upper and lower bounds of the admissible interval and the initial guess for the 21 0 −5 −0.005 negative control function J netative control function J 0 −10 −15 −20 −25 230 −0.01 −0.015 −0.02 −0.025 230 220 30 180 20 170 50 200 40 190 60 210 50 200 moment M 220 60 210 moment M 40 190 30 180 force F 20 170 10 Whole scale of values. force F 10 More detailed about value of optimum. Figure 4: T letter cantilever: contour of the cost function. Computation with GRADE radioactivity = 0.0 radioactivity = 0.1 radioactivity = 0.2 radioactivity = 0.3 Letter T problem Number of fitness calls Minimum Maximum Mean Value 180 880 410.0 240 1200 440.8 280 1180 512.4 280 1300 588.4 Table 2: T letter cantilever: GRADE algorithm performance solution. For example, the mechanics state variables are chosen as these featuring in the desired beam shape, ϕd , and the bounds are controlled by the chosen parameter EP according to   (76) ϕ ∈ (1 − EP )ϕd , (1 + EP )ϕd The equivalent bounds on control variables are obtained from the precious result obtained by solving the grid minimization problem which results with the minimum of the response surface. Finally, the Lagrange multipliers is solved for from (59) where the adopted values for ϕ and ν are chosen. One hundred computations is performed with the indicated bounds on the unknowns. Value of EP parameter is set to 0.0001. Choice of parameters of GRADE algorithm were: P R = 30, CL = 2 and ’radioactivity’ equal to 0.2. Table 3 summarizes the statistics of this computation. Minimum Maximum Mean Value F 39.957 40.048 40.000 M 204.86 205.15 205.00 number of evaluations of J(·) 100740 298080 172176 Standard deviation 0.0199 0.0548 ——— Table 3: T letter cantilever : solution statistics The last part of the analysis carried out in this examples concerns an attempt to further increase the efficiency of the simultaneous solution procedure. In that sense, 22 we employ the GRADE version of genetic algorithm with the choice of parameters P R = 20, CL = 1 and ’radioactivity’ equal to 0.2. A very small value of bounds is chosen as well with EP = 0.00001. The computations we have performed with a hundred runs of the genetic algorithm can be summarized with the statistics given in Table 4. Minimal Maximal Mean Value F 39.973 40.034 40.000 M 204.96 205.05 205.00 number of evaluations of J(·) 14720 201480 37701 Standard deviation 0.0135 0.0192 ——— Table 4: T Letter cantilever : solution statistics We can see from Table 4 that the proper choice of the bounds can force the algorithm to always converge to the same solution. The latter is the consequence of using the simultaneous solution procedure which assures that the computed solution also satisfies the equilibrium equations. Moreover, the total cost of the simultaneous solution procedure can be reduced beyond the one needed for response-surface-based approximate solution computations, by either reducing the interval as done herein or by making gradient-type modification of this algorithm in order to accelerate the convergence rate. 6.2 Optimal control of a cantilever structure in form of letter I In the second example we deal with a problem which has a multiple solution and its regularized form which should restore the solution uniqueness. To that end, a cantilever beam is used very much similar to the one studied in the previous example, except for a shorter straight bar with length equal 2. The cantilever is controlled by a moment M and a couple of follower forces which follow the rotation of the cross-sections to which they are attached. The initial and final configuration, which is obtained for a zero couple and a moment M = 205.4 are shown in Figure 5, along with a number of intermediate configurations. The first computation is performed with the cost function identical to the one in (74), imposing only the minimum of difference between the desired and the computed deformed shape, with no restriction on control variables. The computation is carried out by using the GRADE genetic algorithm by starting with random values within the selected admissible intervals for the force couple and moment according to F ∈ h0, 20i ; M ∈ h0, 230i The algorithm performance is illustrated in Table 5. A number of different solutions have been obtained with different computer runs which were performed (see Figure 6). However, all these solutions remain in fact clearly related considering that the applied moment and the force couple play an equivalent role in controlling the final deformed shape; It can be shown for this particular problem that any values of force and moment which satisfy a slightly perturbed version (because of the straight bar flexibility) of the force equilibrium F · h + M = M̄ = 205.4 23 20 15 Final shape el.4 Shape after 50% of loading 10 5 F el.3 M F EA = 12000 cGA = 5000 EI = 1000 el.2 Initial shape el.1 F 0 F -5 -10 0 -5 5 M 10 15 20 Figure 5: I letter cantilever: initial, final and intermediate configurations Letter I problem Number of fitness calls Minimum Maximum Mean Value 180 640 359.8 Table 5: I letter cantilever: GRADE algorithm performance will be admissible solution, thus we have infinitely many solutions for the case where only the final shape is controlled by the choice of the cost function. In order to eliminate this kind of problem we can perform a regularization of the cost function, by requiring not only that the difference between computed and final shape be minimized but also that control variables be as small as possible; Namely, with a modified form of the cost function n 2 el X T  1X J (ûa (ν), ν) = le ûa (ν) − uda ûa (ν) − uda + αν T ν 4 e=0 a=1 h (77) where α is a chosen weighting parameter specifying the contribution of the control. We set a very small value α = 10−9 and choose the convergence tolerance to 10−12 and carry out the computation for yet a hundred times. Whereas a more stringent value of the tolerance requires somewhat larger number of cost function evaluation, the result in each of the runs remains always the same, given as F = 68.466 ; M = 68.526 and the found optimal value of the cost function is J = 1.4078631.10−5. 24 results of GRADE algorithm linear regression for results values: F = 102.63 - 0.49989.M force F 100 50 0 0 50 100 moment M 200 150 Figure 6: I letter cantilever: 100 different solutions Letter I problem extended Number of fitness calls Minimum Maximum Mean Value 820 16320 1758.8 Table 6: I letter cantilever: GRADE algorithm performance 6.3 Optimal control of deployment of a multibody system The optimal control procedure of the deployment problem of a multibody system is studied in this example. In its initial configuration the multibody system consists of two flexible component (with EA = 0.1, GA = 0.05 and EI = 103 ) each 5 units long connected by the revolute joints (see [15]) to a single stiff component (with EA = 1, GA = 0.5 and EI = 105 ) of the length equal to 10, which are all placed parallel to horizontal axis. In the final deployed configuration the multibody system should take the form of a letter B with the stiff component being completely vertical and two flexible component considerably bent. The deployment of the system is controlled by five control variables, three moments M1 , M2 and M3 , a vertical V and a horizontal force H. See Figure 7. The cost function in this problem is again chosen as the one in 74, which controls that the system would find the configuration as close as possible to the desired configuration. The desired configuration of the system corresponds to the values of forces H = 0.04, V = −0.05 and moments M1 = 0.782, M2 = −0.792 and M3 = 0.792. The solution is computed by using the SADE and GRADE genetics algorithms and starting with the random choice in the interval of interest defined as H ∈ h0.025; 0.05i, V ∈ h−0.06; −0.035i, 25 M1 ∈ h0.6; 0.9i, 12 EA1 = 1.0 EA2 = 0.1 cGA1 = 1.0 cGA2 = 5.0 EI1 = 1.05 EI2 = 1000.0 10 8 Final shape 6 4 } EA1 cGA1 EI1 { EA2 cGA 2 EI2 Shape after 20% of loading M3 M1 2 M2 H 0 Initial shape V -2 0 5 10 Figure 7: Multibody system deployment: initial, final and intermediate configurations. M2 ∈ h−0.9; −0.65i, M3 ∈ h0.6; 0.85i. The solution of the problem is typically more difficult to obtain with an increase in the number of control variables, one of the reasons being a more irregular form of the cost function. In that sense,we refer to illustrative representation of the cost function contours in different subspaces of control variables as shown in Figures 8 and 9. The convergence tolerance on cost function is chosen equal to 10−6 . The SADE algorithm performance for the simplest choice of algorithm parameters is presented in Table 7 and the GRADE algorithm performance for modified value of radioactivity parameter is presented in Table 8. Computation with SADE LM-on SG-off LM-off SG-off LM-off SG-on Letter B problem Number of fitness calls Minimum Maximum Mean Value 2600 165800 46887.5 2350 177150 42494.0 2400 177850 34612.1 Table 7: Results of SADE algorithm for 5-variable control problem One can notice the order of magnitude of increase in cost function evaluation, which is brought about by a more elaborate form of the cost function (see Figures 8 and 9). However, the latter is not the only reason. In this particular problem the role of moments in the list of control variables is much more important than the role of the horizontal and vertical forces in bringing the system in the desired shape. This affects the conditioning of the equations to be solved and the slow convergence rate of the complete system is in reality only the slow convergence of a single or a couple of control components. The latter is illustrated in Figure 10, where we provide the graphic 26 0 0 −0.001 −0.1 −0.002 −0.003 −0.3 control function J control function J −0.2 −0.4 −0.5 −0.6 −0.004 −0.005 −0.006 −0.007 −0.7 −0.008 −0.8 −0.035 −0.009 0.05 −0.04 −0.01 −0.035 0.05 −0.045 −0.045 0.04 −0.05 force V 0.045 0.04 −0.04 0.045 0.03 −0.06 −0.06 0.025 force H force V H − V subspace H − V subspace 0 0 −5 −0.01 −10 control function J control function J 0.03 −0.055 force H 0.025 0.035 −0.05 0.035 −0.055 −15 −20 −0.02 −0.03 −0.04 −25 −30 1 −0.05 1 0.05 0.05 0.045 0.8 0.045 0.8 0.04 0.04 0.035 moment M1 0.035 0.03 0.6 0.025 0.03 moment M1 0.6 force H H − M1 subspace 0.025 force H H − M1 subspace 0 −0.01 0 −0.02 −0.03 control function J control function J −5 −10 −15 −20 −0.04 −0.05 −0.06 −0.07 −0.08 −25 −0.09 −0.1 1 −30 1 −0.035 −0.04 0.8 −0.035 0.8 −0.04 −0.045 −0.045 −0.05 moment M1 −0.055 moment M1 0.6 −0.06 force V −0.05 0.6 −0.055 −0.06 force V V − M1 subspace V − M1 subspace Figure 8: Multibody system deployment: contours of the cost function in different subspaces. representation of iterative values for computed chromosomes, where every chromosome is represented by a continuous line. We can note that the population of optimal values of moments converges much more quickly than the force values which seek a large number of iteration in order to stabilize. Another point worthy of further ex27 0 0 −0.2 −10 −0.4 negative control function J −20 control function J −30 −40 −50 −60 −0.6 −0.8 −1 −1.2 −1.4 −1.6 −70 −1.8 −80 −2 −90 −0.65 −100 −0.65 −0.7 −0.75 −0.7 −0.75 −0.8 −0.8 −0.85 moment M2 −0.9 0.55 0.6 0.65 0.7 0.8 0.75 0.9 0.85 moment M2 0.95 −0.85 −0.9 0.55 0.65 0.6 0.7 0.8 0.75 0.95 0.9 0.85 moment M1 moment M1 M1 − M2 subspace M1 − M2 subspace 0 −10 −20 0 −0.2 −30 negative control function J control function J −0.4 −40 −50 −60 −70 −0.6 −0.8 −1 −1.2 −1.4 −1.6 −80 0.9 −1.8 −90 −2 0.55 1 −100 0.55 0.6 0.65 0.7 0.8 0.75 0.8 0.85 0.9 moment M1 0.95 0.6 0.8 0.7 0.6 moment M3 0.65 0.7 0.75 0.6 0.8 0.85 moment M1 M1 − M3 subspace 0.9 0.95 0.5 moment M3 M1 − M3 subspace 0 control function J −20 −40 0 −60 −0.2 control function J −80 −100 0.9 0.8 −0.4 −0.6 0.55 −0.8 0.6 0.65 0.7 moment M3 −1 −0.65 0.7 0.75 −0.7 0.6 0.5 −0.9 −0.85 −0.8 −0.75 −0.7 0.8 −0.75 −0.65 −0.8 moment M2 0.85 −0.85 −0.9 0.9 moment M3 moment M2 M2 − M3 subspace M2 − M3 subspace Figure 9: Multibody system deployment: contours of the cost function in different subspaces. ploration is the best way to accelerate the convergence rate in the final computational phase. 28 Computation with GRADE radioactivity = 0.0 radioactivity = 0.1 radioactivity = 0.2 radioactivity = 0.3 Letter B problem Number of fitness calls Minimum Maximum Mean Value —– —– —– 1500 114050 23862.5 1900 117850 20632.0 3050 122550 34520.0 Table 8: Results of GRADE algorithm for 5D task G1:J=0.0091823 G4:J=0.0071823 G26:J=1.3302e-05 G43:J=1.1839e-05 Figure 10: Multibody system deployment: convergence of iterative chromosome populations 6.4 Optimal design of shear deformable cantilever In this last example we study an optimal design problem which considers the thickness optimization of a shear deformable cantilever beam, shown in Figure 11. The beam axis in the initial configuration of the cantilever and the thickness is considered as the variable to be chosen in order to assure the optimal design specified by a cost function. In the setting of discrete approximation, we choose 4 beam elements each with a constant thickness hi , which results with 4 design variables 29 40 F = 1000 20 h1 h2 h4 h3 0 -20 -40 -60 E = 75000 G = 50000 c = 5/6 ρ = 1/30 he b = 30 imposed mass: Mo = 30000 -80 -100 -200 0 200 400 600 800 1000 1200 Figure 11: Shear deformable cantilever beam optimal design : initial and deformed shapes d ≡ h = (h1 , h2 , h3 , h4 ). The beam mechanical and geometric properties are: Young’s modulus E = 75000, shear modulus G = 50000, rectangular cross section b × hi with width b = 30 and mass density ρ = 1/30. The latter is needed for computR ing the total mass of the beam M = L ρbh(s)ds to be used as the corresponding limitation on the computed solution assuring reasonable values of the optimal thickness under the free-end vertical force F = 1000. In order to assure a meaningful result the computations are performed under chosen value of mass limitation is M0 = 30000. Other limitations are also placed on the admissible values of the thickness for each element. The first computation is performed by using the diffuse approximation based response function and the sequential solution procedure. The cost function is selected as the shear energy of the beam and problem is cast as maximization of the shear energy, with Z 1 ∗ ∗ ∗ J(ϕ(d)) = max J(ϕ̂ (d )) ; J(ϕ ) = GAγ 2 ds (78) ∗ ∗ G(ϕ (d ),·)=0 L 2 where γ is the shear strain component. The bounds on thickness values are chosen as shown in Table 9. The diffuse approximation computations on the grid are started Thickness h1 Min 30 Max 60 h2 h3 h4 30 15 15 60 35 35 Table 9: Shear deformable cantilever optimal design : thickness admissible values from an initial guesses for thickness h0 = (55, 50, 30, 20). It took 11 iterations to converge to solution given as h = (45.094, 40.074, 19.832, 15.000) 30 The corresponding value of shear energy for this solution is Jappr = 16.3182; we recall it is only an approximate solution, since the computed value does not correspond to any of the grid nodes. The same solution is next sought by using GRADE algorithm; The chosen values for GRADE parameters are: P R = 10, CL = 1.0 and ’radioactivity’= 0.2. The genetic algorithm is executed 100 times, leading to the computational statistics reported in Table 10. nb. of comput. J(·) Minimum Maximum Mean Value 120 3400 674.8 Table 10: Shear deformable cantilever optimal design : computation statistics The algorithm yielded two different solutions, both essentially imposed by the chosen bounds; Namely, out of 100 runs, 57 converged to h = (60, 30, 15, 15), with the corresponding value of J = 17.974856, whereas 43 settled for h = (30, 60, 15, 15) with a very close value of J = 17.926995. Hence, each of two solutions leads to an improved value of the cost function. The second part of this example is a slightly modified version of the first one, in the sense that the mechanics part of the problem is kept the same and only a new cost function is defined seeking to minimize the Euclidean norm of the computed displacement vector, i.e. Z 1 ∗ ∗ ∗ J(ϕ(d)) = max J(ϕ̂ (d )) ; J(ϕ ) = kϕ − xk2 ds (79) G(ϕ∗ (d∗ ),·)=0 2 L Such a choice of the cost function is made for being well known to result with a well-conditioned system expressing optimality conditions. Indeed, the same type of sequential solution procedure using diffuse approximation of cost function now needs only a few iterations to find the converged solution, starting from a number initial guesses. The final solution value is given as h = (42.579, 35.480, 26.941, 15.000) . In the final stage of this computation we recompute the solution of this problem by using the genetic algorithm. The admissible value of the last element thickness is also slightly modified by reducing the lower bound to 5 (instead of 15) and higher bound to 25 (instead of 35) in order to avoid the optimal value which is restricted by a bound. The first solution to this problem is obtained by using again the sequential procedure, where the GRADE genetic algorithm is employed at the last stage. The computed value of the displacement vector norm for found solution is 623808 and mass M is 30062. The computations are carried out a hundred times starting from random initial values. The statistics of these computations are given in Table 11. The same kind of problem is now repeated by using the simultaneous solution procedure, where all the optimality condition are treated as equal and solved simultaneously resulting with 4 thickness variables, 15 displacement and rotation components and as many Lagrange multipliers as unknowns. The latter, in fact, is eliminated prior 31 h1 h2 h3 h4 nb. of comput. J(·) Minimum Maximum Mean Value Standard deviation 43.772 43.807 43.790 0.0094 35.914 35.949 35.932 0.0088 26.313 26.346 26.328 0.0082 14.184 14.210 14.197 0.0064 1440 9960 3497 ——– Table 11: Shear deformable cantilever optimal design : computation statistics to solution by making use of optimality condition in (57)2 . The chosen upper and lower bounds of the admissible interval are chosen as ϕ ∈ [(1 − EP )ϕp , (1 + EP )ϕp ] (80) where the guess for the displacement ϕp is obtained by solving mechanics problem with the values of thickness parameters given in Table 11. The limitation on total mass is added to the cost function. The choice of GRADE algorithm parameters is given as P R = 20, CL = 2 and ’radioactivity’ equal to 0.1. The computation is stopped with a fairly loose tolerance, which allows to accelerate the algorithm convergence but does not always lead a unique solution. Yet, the results in Table 12 show that standard deviation indeed remains small, or that the solution is practically unique. Minimum Maximum Mean Value Standard deviation h1 43.782 43.794 43.789 0.0026 h2 35.925 35.935 35.930 0.0021 26.315 26.324 26.319 0.0019 h3 h4 14.197 14.202 14.200 0.0010 T nb. of comput. r r 111340 968240 313006 ——– Table 12: Shear deformable cantilever optimal design : simultaneous computation statistics 7 Acknowledgements This work was supported by the French Ministry of Research and the European Student Exchange Program ERASMUS. This support is gratefully acknowledged. 8 Conclusions The approach advocated herein for dealing with a coupled problem of nonlinear structural mechanics and optimal design or optimal control, which implies bringing all the optimality conditions at the same level and treating all variables as independent rather than considering equilibrium equations as a mere constraint and state variables as dependent on design or control variables, is fairly unorthodox and rather unexplored. For a number of applications the proposed approach can have a great potential. In 32 particular, the problems of interest to this work concern the large displacements and rotations of a structural systems. The key ingredient of such an approach pertains to geometrically exact formulation of a nonlinear structural mechanics problem, which makes dealing with nonlinearity description or devising the solution schemes much easier then for any other model of this kind. The model problem of the geometrically exact beam explored in detail herein is not the only one available in this classl; We refer to work in [9] for shells or to [10] for 3D solids, with both models sharing the same configuration space for mechanics variables as 3D beam. The latter also allows to directly exploit the presented formulation and the solution procedures of a coupled problem of nonlinear mechanics, for either shells or 3D solids, and optimal control or optimal design. Two different solution procedures are presented herein; the first one, which exploits the response surface representation of the true cost function followed by a gradient type solution step, leads to only an approximate solution. Although the quality of such a solution can always be improved by further refining the grid which serves to construct the response surface, the exact solution is never computed unless the minimum corresponds to one of the grid points. The second solution procedure, which solves simultaneously the optimality conditions and nonlinear mechanics equilibrium equations, does deliver the exact solution, although often only after the appropriate care is taken to choose the sufficiently close initial guess and to select the admissible intervals of all variables accordingly. Probably the best method in that sense is the combination of sequential and simultaneous procedure, where the first serves to reduce as much as possible the admissible interval and provide the best initial guess, whereas the second furnishes the exact solution. A number of further improvements can be made for the proposed methods of this kind, to help increase both the convergence rates and accuracy of the computed solution. One has to remember that even only mechanics component equilibrium equations for a problem of this kind can be very difficult to solve, since the large difference in stiffness in different modes (e.g. bending versus stretching) can result with a poorly conditioned set of equations. Adding the optimality conditions on top only further increases the difficulty. Finding the best possible way to deal with this problem is certainly worthy of further explorations. References [1] J.H. Argyris. An excursion into large rotations. Comput. Methods Appl. Mech. Eng., 32:85–155, 1982. [2] P. Breitkopf, C. Knopf-Lenoir, A. Rasineux, and P. Villon. Efficient optimization strategy using hermite diffuse approximation. In H. Mang, editor, Proceedings Fifth WCCM, Vienna, 2002. [3] D. Chenais and C. Knopf-Lenoir. From design sensitivity to code structure in arch optimization. In Opti 89, Southampton, U.K. [4] M. A. Crisfield. A fast incremental/iterative solution procedure that handles snap through. Computers & Structures, 13:55–62, 1981. 33 [5] D.E. Goldberg. Genetic algorithms in search, optimization and machine learning. Addison-Wesley, 1989. [6] J. H. Holland. Adaptation in natural and artificial systems. University of Michigan, Ann Arbor, MI, Internal report, 1975. [7] O. Hrstka and A. Kučerová. Improvements of the different types of binary and real coded genetic algorithms preventing the premature convergence. Advances in Engineering Software in press, 2003. [8] O. Hrstka, A. Kučerová, M. Lepš, and J. Zeman. A competitive comparison of different types of evolutionary algorithms. Computers and Structures, 81/1819:1979–1990, 2003. [9] A. Ibrahimbegović. Stress resultant geometrically nonlinear shell theory with drilling rotations - part 1: a consistent formulation. Comput. Methods Appl. Mech.Eng., 118:265–284, 1994. [10] A. Ibrahimbegović. Finite element implementation of reissner’s geometrically nonlinear beam theory: three dimensional curved beam finite elements. Comput. Methods Appl. Eng., 122:10–26, 1995. [11] A. Ibrahimbegović. On the choice of finite rotation parameters. Comput. Methods Appl. Mech. Engng., 149:49–71, 1997. [12] A. Ibrahimbegović and F. Frey. Finite element analysis of linear and non-linear planar deformations of elastic initially curved beams. International Journal for Numerical Methods in Engineering, 36:3239–3258, 1993. [13] A. Ibrahimbegović, F. Frey, and I. Kozar. Computational aspects of vector-like parameterization of three-dimensional finite rotations. International Journal for Numerical Methods in Engineering, 38:3653–3673, 1995. [14] A. Ibrahimbegović and S. Mamouri. Nonlinear dynamics of flexible beams in planar motions formulation and time-stopping scheme for stiff problems. Comp. Struct., 70:1–22, 1999. [15] A. Ibrahimbegović and S. Mamouri. On rigid components and joint constraints in nonlinear dynamics of flexible multibody systems imployin 3d geometrically exact beam model. Comp. Methods Appl. Mech. Eng., 188:805–831, 2000. [16] M. Kegl. Shape optimal design of structures: an efficient shape representation concept. Int. J. Numer. Meth. Engng., 49:1571–1588, 2000. [17] M. Kleiber, H. Antunez, T.D. Hein, and P. Kowalczyk. Parameter sensitivity in nonlinear mechanics; theory and finite element computations. John Wiley & Sons, 1997. [18] A. Kučerová and O. Hrstka. Homepage of SADE. http://klobouk.fsv.cvut.cz/∼ondra/sade/sade.html. 34 [19] D.G. Luenberger. Linear and nonlinear programming. Addison-Wesley Publ., 1984. [20] J.E. Marsden and T.J.R. Hughes. Prentice-Hall, 1983. Mathematical foundations of elasticity. [21] Z. Michalewicz. Genetic Algorithms+Data Structures=Evolution Programs. Springer-Verlag, 1992. [22] B. Nayroles, G. Touzot, and P. Villon. Generalizing the finite element method: diffuse approximation and diffuse elements. Computational Mechanics, 10:307– 318, 2002. [23] E. Ramm. Strategies for tracing the non-linear response near limit points. In W. Wunderlich, editor, Nonlinear Finite Element Analysis in Structural Mechanics, pages 63–89, Berlin, 1988. Springer-Verlag. [24] E. Riks. The application of newtons method to the problem of elastic stability. Journal of Applied Mechanics, 39:1060–1066, 1972. [25] B. Rousselet. A finite strain rod model and its design sensitivity. Mechanics of Structures and Machines, 20:415–432, 1992. [26] J.C. Simo. The (symmetric) hessian for geometrically nonlinear models in solid mechanics: intrinsic definition and geometric interpretation. Comput. Methods Appl. Mech. Engng., 96:183–200, 1992. [27] J.C. Simo and L. Vu-Quoc. Three-dimensional finite strain model - part ii: computational aspects. Comput. Methods Appl. Mech. Eng., 38:79–116, 1986. [28] R. Storn. On the usage of differential evolution for function optimization. In Biennial Conference of the North American Fuzzy Information Processing Society, pages 519–523, 1996. [29] G. Strang. Introduction to applied mathematics. Wellesley-Cambridge Press, 1986. [30] D.A. Tortorelli and P. Michaleris. Design sensitivity analysis: overview and review. Inverse Problems in Engineering, 1:71–105, 1994. [31] O.C. Zienkiewicz and R.L. Taylor. The finite element method, volume vols I, II & III. Butterworth, London, 2000. 35
5cs.CE
arXiv:1709.08666v1 [cs.CV] 25 Sep 2017 Fast Vehicle Detection in Aerial Imagery Jennifer Carlet KeyW Corp. Bernard Abayowa Sensors Directorate, Air Force Research Lab Beavercreek, OH WPAFB, OH Abstract modified is described in Section 4. Section 5 gives the results. The paper is concluded in Section 6. In recent years, several real-time or near real-time object detectors have been developed. However these object detectors are typically designed for first-person view images where the subject is large in the image and do not directly apply well to detecting vehicles in aerial imagery. Though some detectors have been developed for aerial imagery, these are either slow or do not handle multi-scale imagery very well. Here the popular YOLOv2 detector is modified to vastly improve it’s performance on aerial data. The modified detector is compared to Faster RCNN on several aerial imagery datasets. The proposed detector gives near state of the art performance at more than 4x the speed. 2. Deep learning object detection algorithms Since a deep CNN easily won the 2012 ImageNet competition, CNNs have become the state of the art in object detection in images. Whereas before hand crafted features such gradients, color, etc., were used to detect objects; now CNNs can automatically learn which features are relevant for detection. This work focused on version 2 of the you only look once (YOLO) detector[10], however it is compared to Faster RCNN, which is considered by most to be state of the art. For testing, open-source TensorFlow[1] versions of the detectors were used[12, 2]. 2.1. Faster RCNN 1. Introduction Faster RCNN is the follow on to Fast RCNN[4] and RCNN[5]. Faster RCNN starts with a CNN adds a Region Proposal Network (RPN) to create proposals (bounding boxes) from the features given by the CNN. Then ROI pooling and a classifier is used to classify and score each bounding box. A diagram of the net from the original paper is given in Figure 1. Due to its speed and accuracy, Faster RCNN has been heavily used since its inception in 2015. Object detection from ground view is a popular problem with a lot of interest from the academic computer vision community. Detection from aerial views, while there is some interest, is significantly less studied. Consequently recent advancements are primarily large in image object detection and classification, mostly using deep convolutional neural networks (CNNs). Often these neural networks do not work well when directly applied to small in image objects. However the networks can often be modified to improve their performance on this type of data. Of particular interest is detecting vehicles from aerial platforms at near real-time speeds. While Faster RCNN[11] has been proven to be effective at detecting vehicles in aerial imagery, it is unable to reach anywhere near the real time speeds desired for many applications. Other methods use sliding window techniques which can also be slow. Newer detectors that can run on whole images are much faster but have yet to be proven on aerial imagery. In this paper, an open-source fast deep CNN is modified into a near real-time multi-scale detector for aerial imagery. The rest of this paper is organized as follows. Section 2 introduces the deep CNNs used in this paper. Section 3 covers the aerial imagery datasets used. How the net was Figure 1. Faster RCNN 1 2.2. YOLOv2 DLR3k Data from the German Aerospace Center (DLR),there are 20 images taken from a camera on an airplane about 1000 feet over Munich, Germany. YOLOv2 not surprisingly is the improved version YOLO[9], a net that reached near Faster RCNN accuracy at much greater speeds. YOLOv2 also starts with a CNN, and then is followed by two more CNNs that simultaneously produce bounding boxes, object confidence scores, and class scores. Additionally YOLOv2 includes a route and reorg layers that allow the net to use features from earlier in the net similar to SSD[8]. NeoVision2 - Helicopter A set of 32 video clips taken from an HD camera on helicopter flying in Los Angeles, California area. AFVID Video clips taken from a small UAV flying about 1000 feet over Avon Park, Florida or flying about 700 feet over Camp Atterbury, Indiana. 3. Datasets To train a deep neural network object detector requires a vast amount of data; hence the coupling of deep learning with big data. The neural nets in the previous section all provide pretrained network weights, usually started on ImageNet and then on PASCAL VOC[3] or MS COCO[7]. Detailed in Table 1, these datasets provide thousands of images, and the detectors trained on them are good general purpose object detectors. However these datasets largely contain imagery taken from personal cameras at ground level and contain very little to no aerial data. Additionally these images are relatively low resolution compared to aerial imagery. AF Building Camera Handful of images taken from cameras on a tower at Wright Patterson Air Force Base. 3.2. Dataset segmentation Much of aerial imagery is given as video clips, meaning it can not be considered independent and identically distributed(IID), unlike the the large detection image datasets. This means even though there may be thousands of images, some of it may be so close in appearance that effectively there is less data and none of our datasets are anywhere near the size of even PASCAL VOC. Ideally each dataset should be separated into train (60%), validation (20%), and test (20%) sets. Typically this should only be done with datasets that have independent images. Some of the datasets consist of a short video sequences where at least two videos are kept out, one for validation and one for testing. Table 1. Public large scale detection datasets Dataset ImageNet MS COCO PASCAL VOC (2007+2012) Number of Training Images 450000+ 200000+ ~20000 4. Modifying YOLOv2 There are several publicly available aerial/elevated imagery detection datasets. Additionally AFRL has some in house aerial imagery, referred to as Air Force aerial vehicle imagery dataset (AFVID), that has been truthed. YOLO provides models and pretrained weights for the MS COCO and PASCAL VOC datasets, both which are capable of detecting vehicles that are relatively large in the image. To detect objects that are small relative to the size of the image and to detect different numbers of classes the YOLO net needs to be modified and fine-tuned using appropriate data. 3.1. Dataset descriptions Aerial data can be surprisingly diverse. It can be from different view points, have different ground sampling distances (gsd), different image sizes, aspect ratios, color, etc. Vehicles in different data may be significantly different in size and appearance. Figure 2 shows different images from four different datasets. It is obvious how different the VOC data is from any of the elevated data, while the VEDAI and AFVID data are somewhat similarities, and the AF Building Camera data is more similar to the aerial and satellite data. A more detailed look at the aerial datasets is available in Table 2. 4.1. Number of classes In the configuration file that defines the YOLO net model there is a ’classes’ definition that is used to define the number of classes. To change the number of classes used, more the just the classes setting will need to be changed; the number of filters in the last convolutional layer must be altered to reflect the changed number of classes. The number of filters is set by num(classes + coords + 1), where num is number of anchor boxes, and coords is four corresponding to the four coordinates used to define a bounding box. VEDAI Vehicle Detection in Aerial Imagery (VEDAI) dataset consists of satellite imagery taken over Utah in 2012. There are 1,210 orthonormal images in RGB and IR. Only RGB is used here. 4.2. Net resolution and depth The standard YOLOv2 net has input resolution of 416x416 and after pass-through and max-pooling has an 2 (a) PASCAL VOC (b) VEDAI (c) AFVID (d) AF Building Camera Figure 2. Sample imagery Table 2. Aerial imagery datasets Dataset VEDAI DLR3k NeoVision2-Helicopter AFVID 1 AFVID 2 AFVID 3 AFVID 4 AF Building Camera Image Width, Height 1024, 1024 5616, 3744 1920, 1080 1600, 1200 1600, 1200 1600, 1200 1600, 1200 1920, 1080 Mean Vehicle Width,Height 41.2, 40.8 30.4, 30.0 124.6, 85.8 39.4, 34.2 55.6, 63.7 43.5, 38.6 67.7, 63.5 51.7, 35.5 output feature resolution of 26x26 and 13x13. For a 1024x1024 image that would create feature resolutions corresponding to about 40 and 80 pixels, which is approximately the size of and twice the size of the vehicles in the VEDAI imagery, meaning a vehicle may correspond to a single point on a feature map. Ideally there should be multiple points per vehicle. To increase net feature resolution and consequently the number of feature points per vehicle, there are two methods: increase the input resolution or to decrease the net depth. Ratio Target Area/Image Area 0.0016 0.00004 0.0069 0.0008 0.0019 0.0009 0.0026 0.0012 Percent of Targets Overlapping 5 14 20 33 54 40 34 53 ing the width and height of the first layer of the net. In the previous example doubling the width and height leads to output sizes of 52x52 and 26x26 and 20/40 pixels per feature, so that there can be about four feature points for the average vehicle. However, this significantly increases GPU memory usage and decreases the speed of the net. To decrease the net depth, convolutional and max pooling layers are removed so the net is downsampled less, making the net shallower. This goes against the now conventional wisdom that deeper nets are typically better, but has been shown to work well on aerial data[6, 13]. Remov- Increasing the net input resolution simply means increas3 ing one max pooling layer and associated CNN layers gives the same output resolution as doubling the input resolution without having as great as an effect the memory usage or speed of the net. A sample shallower YOLO net is given in Appendix A Table 8b alongside a typical net. large and somewhat diverse they make good general purpose object detectors. The results for these detectors tested on aerial imagery is given in Table 3. While Faster RCNN gives the best precision and recall, it is the slowest of the tested detectors. All of the detectors performed quite poorly without fine-tuning for aerial data. 4.3. Net shape 5.2. YOLO modifications YOLO provide pretrained square shaped nets, however most of our data is not square. In YOLOv2, the shape of the net can be changed to closer match the aspect ratio of the input data. Faster RCNN does this automatically. The biggest increases in performance come from altering the net’s size and depth. Table 4 compares the performance of results of several modified YOLO nets and a shallow Faster RCNN net based on [13]. All the nets were fine-tuned using AFVID and VEDAI data. The YOLO nets were based off of the YOLO-VOC net but Faster RCNN was from COCO. The first YOLO listed is the standard YOLO modified for one class (vehicles). While it is five times faster than Faster RCNN, the performance across the board is much weaker. Doubling the size as described in 4.2, gives a performance boost, particularly on the AFVID dataset, but halves the speed. Removing several convolutional layers and a max pooling layer greatly improves precision, recall, and speed. With the standard input resolution but shallower, YOLO is approximately seven times faster the shallower Faster RCNN, but still has lower recall and lower precision on the AFVID and VEDAI datasets. Increasing the size of the shallower net decreases the speed of the net again, but still boosts precision and recall. Changing the input shape of the shallow YOLO net to better match the aspect ratio of the AFVID data causes a large increase in the precision for that data, but causes a small decrease on the square VEDAI data. On the AF Building Camera data, which none of the nets were trained on, the shallow YOLO nets do better than Faster RCNN. One application is to use this CNN network on live data from the AF Building Cameras, which has a larger variance in vehicle sizes than most aerial datasets. The nets were trained on the AFVID data and a few images from the AF Building Cameras. The results in Table 5, show that rectangular shallow YOLO outperforms Faster RCNN on this data, while the shallow Faster RCNN is still better on AFVID and VEDAI data. 4.4. Anchors In [13], the Faster RCNN anchors were fixed, as the bounding boxes were refined to be of fixed shape and size. For multi-scale detection, it should be better to have multiple anchor box sizes. The five anchor sizes in YOLOv2 were determined from a k-means approach using the bounding boxes in the VOC dataset. Due to the difference in orientation and scale of vehicles, most of the anchors were kept, with only the largest being removed, since it is not expected that there will be large objects in the image. 5. Experiments and results To calculate how the detectors are performing, two metrics are used: precision = tp/(f p + tp) (1) recall = tp/nObjects. (2) and In defense applications, the false alarm rate (FAR) is often used instead of precision but F AR = 1 − precision, (3) and recall is sometimes referred to the detection rate. The another metric used here is frames per second (FPS). To match detections to ground truth, intersection over union (IOU) is used. IOU is ratio between the area in which the two boxes overlap and the total area of each box not including the overlap. A detector was desired for aerial imagery with small vehicles. Only a single class, vehicle, was used in training and testing. Therefore average precision (AP) and average recall (AR) refer to the average over all the test images at an IOU threshold of 0.5. 5.3. Deeper look at results For cases where the input to the net is an entire image, the object size relative the size of image is more important to than the size of the object itself. For example, in the MSCOCO dataset images are typically 640x480 and the benchmark define a small object to be less than 32x32 a medium object between 32x32 and 96x96. While most of the mean object sizes in the aerial imagery fall in the medium category by this definition, the image sizes are larger so when resized to the input resolution of the nets they equivalently fall into the small category. Hence the cat- 5.1. Pretrained object detectors Most open source detectors provide their best trained for PASCAL VOC and/or MS COCO. Since these datasets are 4 Table 3. Pretrained object detectors tested on aerial data Net - trained YOLO - VOC+COCO YOLO - VOC Faster RCNN - COCO AFVID AP: 0.0 AR: 0.03 AP: 0.0 AR: 0.0 AP: 0.04 AR: 0.18 VEDAI AP: 0.0 AR: 0.03 AP: 0.0 AR: 0.01 AP: 0.01 AR: 0.12 AF Building Camera AP: 0.05 AR: 0.07 AP: 0.04 AR: 0.04 AP: 0.13 AR: 0.19 FPS 16 15 3 Table 4. Results fine-tuned on AFVID and VEDAI data Net Shallow Faster RCNN YOLO YOLO Shallow YOLO Shallow YOLO Shallow YOLO Input Size 600xA 416x416 832x832 416x416 832x832 864x480 AFVID AP: 0.88 AR: 0.89 AP: 0.0 AR: 0.03 AP: 0.01 AR: 0.13 AP: 0.1 AR: 0.37 AP: 0.21 AR: 0.79 AP: 0.76 AR: 0.87 VEDAI AP: 0.78 AR: 0.91 AP: 0.0 AR: 0.01 AP: 0.0 AR: 0.05 AP: 0.46 AR: 0.72 AP: 0.66 AR: 0.91 AP: 0.61 AR: 0.81 AF Building Camera AP: 0.05 AR: 0.08 AP: 0.01 AR: 0.02 AP: 0.0 AR: 0.04 AP: 0.14 AR: 0.21 AP: 0.15 AR: 0.3 AP: 0.21 AR: 0.3 FPS 3 15 6 25 8 13 G. Irving, M. Isard, Y. Jia, R. Jozefowicz, L. Kaiser, M. Kudlur, J. Levenberg, D. Mané, R. Monga, S. Moore, D. Murray, C. Olah, M. Schuster, J. Shlens, B. Steiner, I. Sutskever, K. Talwar, P. Tucker, V. Vanhoucke, V. Vasudevan, F. Viégas, O. Vinyals, P. Warden, M. Wattenberg, M. Wicke, Y. Yu, and X. Zheng. TensorFlow: Large-scale machine learning on heterogeneous systems, 2015. Software available from tensorflow.org. egories were redefined in terms of the image size, such that small objects are 0.1% or less, medium objects are between 0.1% and 0.3% and large objects are greater than 0.3% of the original image. Looking at the results in terms of size on AF Building Camera data in Table 6 shows a surprising result for Faster RCNN, the medium size is actually has the worst performance. Shallow YOLO performs as expected. The irregularity in the medium size objects in Faster RCNN may be due to a quirk in the small AF Building Camera dataset. Shown in Figure 3 is a set images taken by the same camera at different times, with the last two sets of images taken only a few minutes apart. Both detectors do well when the cars are sparse and most have visible separation. However when the parking lot is full and the cars are densely packed the Faster RCNN sometimes fails to detect some of the vehicles while YOLO does a much better job, irregardless of illumination. Therefore the poor performance on medium sized objects by this Faster RCNN net may be due to its inability handle heavily overlapping objects in some images. [2] X. Chen and A. Gupta. An implementation of faster RCNN with study for region sampling. CoRR, abs/1702.02138, 2017. [3] M. Everingham, L. Van Gool, C. K. I. Williams, J. Winn, and A. Zisserman. The pascal visual object classes (voc) challenge. International Journal of Computer Vision, 88(2):303–338, June 2010. [4] R. Girshick. Fast r-cnn. In International Conference on Computer Vision (ICCV), 2015. [5] R. Girshick, J. Donahue, T. Darrell, and J. Malik. Rich feature hierarchies for accurate object detection and semantic segmentation. In Computer Vision and Pattern Recognition, 2014. 6. Conclusions While the out of the box YOLO performs poorly on aerial imagery, a few modifications can greatly improve its performance. First making the net shallower to increase its output resolution. Second changing the net shape to more closer match the aspect ratio of the data. While the modified YOLO’s precision and recall is still typically a bit worse than Faster RCNN, it’s increased speed makes a it good option when near real-time vehicle detectors for aerial imagery are required. [6] T. Huster and N. C. Gale. Deep learning for pedestrian detection in aerial imagery. In MSS Passive Sensors, 2016. [7] T. Lin, M. Maire, S. J. Belongie, L. D. Bourdev, R. B. Girshick, J. Hays, P. Perona, D. Ramanan, P. Dollár, and C. L. Zitnick. Microsoft COCO: common objects in context. CoRR, abs/1405.0312, 2014. [8] W. Liu, D. Anguelov, D. Erhan, C. Szegedy, S. E. Reed, C. Fu, and A. C. Berg. SSD: single shot multibox detector. CoRR, abs/1512.02325, 2015. References [9] J. Redmon, S. K. Divvala, R. B. Girshick, and A. Farhadi. You only look once: Unified, real-time object detection. CoRR, abs/1506.02640, 2015. [1] M. Abadi, A. Agarwal, P. Barham, E. Brevdo, Z. Chen, C. Citro, G. S. Corrado, A. Davis, J. Dean, M. Devin, S. Ghemawat, I. Goodfellow, A. Harp, 5 Table 5. Results fine-tuned on AFVID and AF Building Camera data Net Shallow Faster RCNN Shallow YOLO Shallow YOLO Input Size 600xA 416x416 864x480 AFVID AP: 0.88 AR: 0.89 AP: 0.13 AR: 0.47 AP: 0.74 AR: 0.82 VEDAI AP: 0.1 AR: 0.46 AP: 0.03 AR: 0.22 AP: 0.05 AR: 0.27 AF Building Camera AP: 0.42 AR: 0.58 AP: 0.25 AR: 0.39 AP: 0.5 AR: 0.66 Table 6. AF building camera object size Detector Shallow Faster RCNN Shallow YOLO (864x480) mAP 0.080 0.124 mAP Large 0.171 0.404 [10] J. Redmon and A. Farhadi. Yolo9000: Better, faster, stronger. arXiv preprint arXiv:1612.08242, 2016. [11] S. Ren, K. He, R. Girshick, and J. Sun. Faster R-CNN: Towards real-time object detection with region proposal networks. In Advances in Neural Information Processing Systems (NIPS), 2015. [12] T. H. Trieu. Darkflow. https://github.com/ thtrieu/darkflow, 2017. [13] G. K. W. A. Sakla, N. T. Mundhenk. Deep multimodal vehicle detection in aerial isr imagery. In IEEE Winter Conference on Applications of Computer Vision, 2017. Appendix 6 mAP Medium 0.080 0.329 mAP Small 0.117 0.102 FPS 3 25 13 (a) Faster RCNN Low Density (b) YOLO Low Density (c) Faster RCNN High Density, High Illumination (d) YOLO High Density, High Illumination (e) Faster RCNN High Density, Low Illumination (f) YOLO High Density, Low Illumination Figure 3. Object density and illumination 7 Table 7. YOLOv2 nets layer Input Convolutional Max Pooling Convolutional Max Pooling Convolutional Convolutional Convolutional Max Pooling Convolutional Convolutional Convolutional Max Pooling Convolutional Convolutional Convolutional Convolutional Convolutional Max Pooling Convolutional Convolutional Convolutional Convolutional Convolutional Convolutional Convolutional Route Convolutional Reorg Route Convolutional Convolutional filters 32 64 128 64 128 256 128 256 512 256 512 256 512 1024 512 1024 1024 1024 1024 1024 64 1024 125 kernal size 3x3/1 2x2/2 3x3/1 2x2/2 3x3/1 1x1/1 3x3/1 2x2/2 3x3/1 1x1/1 3x3/1 2x2/2 3x3/1 1x1/1 3x3/1 1x1/1 3x3/1 2x2/2 3x3/1 1x1/1 3x3/1 1x1/1 3x3/1 3x3/1 3x3/1 1x1/1 3x3/1 1x1/1 net size 416 x 416 x 3 416 x 416 x 32 208 x 208 x 32 208 x 208 x 64 104 x 104 x 64 104 x 104 x 128 104 x 104 x 64 104 x 104 x 128 52 x 52 x 128 52 x 52 x 256 52 x 52 x 128 52 x 52 x 256 26 x 26 x 256 26 x 26 x 512 26 x 26 x 256 26 x 26 x 512 26 x 26 x 256 26 x 26 x 512 13 x 13 x 512 13 x 13 x 1024 13 x 13 x 512 13 x 13 x 1024 13 x 13 x 1024 13 x 13 x 1024 13 x 13 x 1024 13 x 13 x 1024 26 x 26 x 512 26 x 26 x 64 13 x 13 x 256 13 x 13 x 1280 13 x 13 x 1024 13 x 13 x 125 layer Input Convolutional Max Pooling Convolutional Max Pooling Convolutional Convolutional Convolutional Max Pooling Convolutional Convolutional Convolutional Max Pooling Convolutional Convolutional Convolutional Convolutional Convolutional Route Convolutional Reorg Route Convolutional Convolutional filters 32 64 128 64 128 256 128 256 512 256 512 256 512 64 1024 125 kernal size 3x3/1 2x2/2 3x3/1 2x2/2 3x3/1 1x1/1 3x3/1 2x2/2 3x3/1 1x1/1 3x3/1 2x2/2 3x3/1 1x1/1 3x3/1 1x1/1 3x3/1 1x1/1 3x3/1 1x1/1 (b) Shallow YOLOv2 net (a) Standard YOLOv2 net 8 net size 416 x 416 x 3 416 x 416 x 32 208 x 208 x 32 208 x 208 x 64 104 x 104 x 64 104 x 104 x 128 104 x 104 x 64 104 x 104 x 128 52 x 52 x 128 52 x 52 x 256 52 x 52 x 128 52 x 52 x 256 26 x 26 x 256 26 x 26 x 512 26 x 26 x 256 26 x 26 x 512 26 x 26 x 256 26 x 26 x 512 52 x 52 x 256 52 x 52 x 64 26 x 26 x 256 26 x 26 x 768 26 x 26 x 1024 26 x 26 x 30
1cs.CV
Sparse Coding by Spiking Neural Networks: Convergence Theory and Computational Results arXiv:1705.05475v1 [cs.LG] 15 May 2017 Ping Tak Peter Tang, Tsung-Han Lin, and Mike Davies Intel Corporation {peter.tang, tsung-han.lin, mike.davies}@intel.com Abstract In a spiking neural network (SNN), individual neurons operate autonomously and only communicate with other neurons sparingly and asynchronously via spike signals. These characteristics render a massively parallel hardware implementation of SNN a potentially powerful computer, albeit a non von Neumann one. But can one guarantee that a SNN computer solves some important problems reliably? In this paper, we formulate a mathematical model of one SNN that can be configured for a sparse coding problem for feature extraction. With a moderate but well-defined assumption, we prove that the SNN indeed solves sparse coding. To the best of our knowledge, this is the first rigorous result of this kind. 1 Introduction A central question in computational neuroscience is to understand how complex computations emerge from networks of neurons. For neuroscientists, a key pursuit is to formulate neural network models that resemble the researchers’ understanding of physical neural activities and functionalities. Precise mathematical definitions or analysis of such models is less important in comparison. For computer scientists, on the other hand, a key pursuit is often to devise new solvers for specific computational problems. Understanding of neural activities serves mainly as an inspiration for formulating neural network models; the actual model adopted needs not be so much faithfully reflecting actual neural activities as to be mathematically well defined and possesses provable properties such as stability or convergence to the solution of the computational problem at hand. This paper’s goal is that of a computer scientist. We formulate here two neural network models that can provably solve a mixed `2 -`1 optimization problem (often called a LASSO problem). LASSO is a workhorse for sparse coding, a method applicable across machine learning, signal processing, and statistics. In this work, we provide a framework to rigorously establish the convergence of firing rates in a spiking neural network to solutions corresponding to a LASSO problem. This network model, namely the Spiking LCA, is first proposed in [16] to implement the LCA model [15] using analog integrate-and-fire neuron circuit. We will call the LCA model in [15] the Analog LCA (A-LCA) for clarity. In the next section, we introduce the A-LCA model and its configurations for LASSO and its constrained variant CLASSO. A-LCA is a form of Hopfield network, but the specific (C)LASSO configurations render convergence difficult to establish. We will outline our recent results that use a suitable generalization of the LaSalle principle to show that A-LCA converges to (C)LASSO solutions. In A-LCA, neurons communicate among themselves with real numbers (analog values) during certain time intervals. In Spiking LCA (S-LCA), neurons communicate among themselves via “spike” (digital) signals that can be encoded with a single bit. Moreover, communication occurs only at specific time instances. Consequently, S-LCA is much more communication efficient. Section 3 formulates S-LCA and other auxiliary variables such as average soma currents and instantaneous spike rates. The section subsequently provides a proof that the instantaneous rates converge to CLASSO solutions. This proof is built upon the results we obtained for A-LCA and an assumption that a neuron’s inter-spike duration cannot be arbitrarily long unless it stops spiking altogether after a finite time. Finally, we devise a numerical implementation of S-LCA and empirically demonstrate its convergence to CLASSO solutions. Our implementation also showcases the potential power of problem solving with spiking 1 neurons in practice: when an approximate implementation of S-LCA is ran on a conventional CPU, it is able to converge to a solution with modest accuracy in a short amount of time. The convergence is even faster than FISTA [4], one of the fastest LASSO solvers. This result suggests that a specialized spiking neuron hardware is promising, as parallelism and sparse communications between neurons can be fully leveraged in such an architecture. 2 Sparse Coding by Analog LCA Neural Network We formulate the sparse coding problem as follows. Given N vectors in RM , Φ = [φ1 , φ2 , . . . , φN ], N > M , (Φ is usually called a redundant—due to N > M —dictionary) and a vector s ∈ RM (consider s an input signal), try to code (approximate well) s as Φa where a ∈ RN contains as many zero entries as possible. Solving a sparse coding problem has attracted a tremendous amount of research effort [9]. One effective way is to arrive at a through solving the LASSO problem [19] where one minimizes the `2 distance between s and Φa with a `1 regularization on the a parameters. For reasons to be clear later on, we will consider this problem with the additional requirement that a be non-negative: a ≥ 0. We call this the CLASSO (C for constrained) problem: 1 ks − Φak22 + λkak1 (1) 2 Rozell, et al., presented in [15] the first neural network model aims at solving LASSO. N neurons are used to represent each of the N dictionary atoms φi . Each neuron receives an input signal bi that serves to increase a “potential” value ui (t) that a neuron keeps over time. When this potential is above a certain threshold, neuron-i will send inhibitory signals that aim to reduce the potential values of the list of receiving neurons with which neuron-i “competes.” The authors called this kind of algorithms expressed in this neural network mechanism Locally Competitive Algorithms (LCAs). In this paper, we call this as analog LCA (A-LCA). Mathematically, an A-LCA can be described as a set of ordinary differential equations (a dynamical system) of the form X u̇i (t) = bi − ui (t) − wij T (uj (t)), i = 1, 2, . . . , N. argmina≥0 j6=i The function T is a thresholding (also known as an activation) function that decides when and how an inhibition signal is sent. The coefficients wij further weigh the severity of each inhibition signal. In this general form, A-LCA is an instantiation of the Hopfield network proposed in [10, 11]. Given a LASSO or CLASSO problem, A-LCA is configured by bi = φTi s, wij = φTi φj . For LASSO, the thresholding function T is set to T = T±λ , and for CLASSO it is set to T = Tλ : Tλ (x) is defined as 0 when def x ≤ λ and x − λ when x > λ; and T±λ (x) = Tλ (x) + Tλ (−x). Note that if all the φi s are normalized to φTi φi = 1, then the dynamical system in vector notation is u̇ = b − u − (ΦT Φ − I)a, a = T(u). (2) The vector function T : RN → RN simply applies the same scalar function T to each of the input vector’s component. We say A-LCA solves (C)LASSO if a particular solution of the dynamical system converges to a vector u∗ and that a∗ = T(u∗ ) is the optimal solution for (C)LASSO. This convergence phenomenon was demonstrated in [15]. LCA needs not be realized on a traditional computer via some classical numerical differential equation solver; one can realize it using, for example, an analog circuit which may in fact be able to solve (C)LASSO faster or with less energy. From the point of view of establishing A-LCA as a robust way to solve (C)LASSO, rigorous mathematical results on A-LCA’s convergence is invaluable. Furthermore, any convergence theory here will bound to have bearings on other neural network architectures, as we will see in Section 3. Had the thresholding function T in A-LCA be strictly increasing and unbounded above and below, standard Lyapunov theory can be applied to establish convergence of the dynamical system. This is already pointed out in Hopfield’s early work for both graded neuron model [11] and spiking neuron model [12]. Nevertheless, such an A-LCA does not correspond to (C)LASSO where the thresholding functions are not strictly increasing. Furthermore, the CLASSO thresholding function is bounded below as well. While Rozell, et al., demonstrated some convergence phenomenon [15], it is in two later works [1, 2] that Rozell and other colleagues attempted to complement the original work with convergence analysis and proofs. Among other results, these works 2 stated that for any particular A-LCA solution u(t), T(u(t)) with T = T±λ converges to a LASSO optimal solution. Unfortunately, as detailed in [18], there are major gaps in the related proofs and thus the convergence claims are in doubt. Moreover, the case of T = Tλ for the CLASSO problem was not addressed. In [18], one of our present authors established several convergence results which we now summarize so as to support the development of Section 3. The interested reader can refer to [18] for complete details. A-LCA is a dynamical system of the form u̇ = F(u), F : RN → RN . In this case, the function F is defined as F(x) = b − x − (ΦT Φ − I)T(x). Given any “starting point” u(0) ∈ RN , standard theory of ordinary differential equations shows that there is a unique solution u(t) such that u(0) = u(0) and u̇(t) = F(u(t)) for all t ≥ 0. Solutions are also commonly called flows. The two key questions are (1) given some (or any) starting point u(0) , whether and in what sense the flow u(t) converges, and (2) if so, what relationships exist between the limiting process and the (C)LASSO solutions. The LaSalle invariance principle [14] is a powerful tool to help answer the first question. The gist of the principle is that if one can construct a function V : RN → R such that it is non-increasing along any flow, then one can conclude that all flows must converge to a special set1 M which is the largest positive invariant set2 inside the set of points at which the Lie derivative of V is zero. The crucial technical requirements on V are that V possesses continuous partial derivatives and be radially unbounded3 . Unfortunately, the natural choice of V for A-LCA does not have continuous first partial derivatives everywhere, and not radially unbounded in the case of CLASSO. Both failures are due to the special form of T with V (u) = (1/2)ks − ΦT(u)k22 + λ kT(u)k1 . Based on a generalized version of LaSalle’s principle proved in [18], we establish that any A-LCA flow u(t) (LASSO or CLASSO) converges to M, the largest positive invariant set inside the “stationary” set S = { u | (∂V /∂un )Fn (u) = 0 whenever |T (un )| > 0. }. Having established u(t) → M, we further prove in [18] that M is in fact the inverse image under T of the set C of optimal (C)LASSO solutions. The proof is based on the KKT [6] condition that characterizes C and properties particular to A-LCA. Theorem 1. (A-LCA convergence results from [18]) Given the A-LCA u̇ = F(u), F(u) = b − u − (ΦT Φ − I)T(u). T is based on T±λ if one wants to solve LASSO and Tλ , CLASSO. Let u(0) be an arbitrary starting point and u(t) be the corresponding flow. The following hold: 1. Let C be the set of (C)LASSO optimal solutions and F̂ = T−1 (C) be C’s inverse image under the corresponding thresholding function T. Then any arbitrary flow u(t) always converges to the set F̂. 2. Moreover, limt→∞ E(a(t)) = E ∗ where E ∗ is the optimal objective function value of (C)LASSO, E(a) = (1/2)ks − Φak22 + λkak1 and a(t) = T(u(t)). 3. Finally, when the (C)LASSO optimal solution a∗ is unique, then there is a unique u∗ such that F(u∗ ) = 0. Furthermore u(t) → u∗ and T(u(t)) → T(u∗ ) = a∗ as t → ∞. 3 Sparse Coding by Spiking LCA Neural Network A-LCA is inherently communication efficient: Neuron-i needs to communicate to others only when its internal state ui (t) exceeds a threshold, namely |T (ui (t))| > 0. In a sparse coding problem, it is expected that the internal state will eventually stay perpetually below the threshold for many neurons. Nevertheless, for the entire duration during which a neuron’s internal state is above threshold, constant communication is required. Furthermore, the value to be sent to other neurons are real valued (analog) in nature. In this perspective, a spiking neural network (SNN) model holds the promise of even greater communication efficiency. In a typical SNN, various internal states of a neuron are also continually evolving. In contrast, however, communication in the form of a spike—that is one bit—is sent to other neurons only when a certain internal state reaches a level (a firing threshold). This internal state is reset right after the spiking event, thus cutting off communication 1 u(t) → M if dist(u(t), M) → 0 where dist(x, M) = inf y∈M kx − yk2 . set is positive invariant if any flow originated from the set stays in that set forever. 3 The function V is radially unbounded if |V (u)| → ∞ whenever kuk → ∞ 2 2A 3 immediately until the time when the internal state is “charged up” enough. Thus communication is necessary only once in a certain time span and then a single bit of information carrier suffices. While such a SNN admits mathematical descriptions [16, 3], there is hitherto no rigorous results on the network’s convergence behavior. In particular, it is unclear how a SNN can be configured to solve specific problems with some guarantees. We present now a mathematical formulation of a SNN and a natural definition of instantaneous spiking rate. Our main result is that under a moderate assumption, the spiking rate converges to the CLASSO solution when the SNN is suitably configured. To the best of our knowledge, this is the first time a rigorous result of this kind is established. In a SNN each of the N neurons maintains, over time t, an internal soma current µi (t) configured to receive a Rt constant input bi and an internal potential vi (t). The potential is “charged” up according to vi (t) = 0 (µi − λ) where λ ≥ 0 is a configured bias current. When vi (t) reaches a firing threshold νf at a time ti,k , neuroni resets its potential to νr but simultaneously fires an inhibitory signal to a preconfigured set of receptive neurons, neuron-js, whose soma current will be diminished according to a weighted exponential decay function: µj (t) ← µj (t) − wji α(t − ti,k ), where α(t) = e−t for t P ≥ 0 and zero otherwise. Let {ti,k } be the ordered time sequence of when neuron-i spikes and define σi (t) = k δ(t − ti,k ), then the soma current satisfies both the algebraic and differential equations below (the operator ∗ denotes convolution): X X µi (t) = bi − wij (α ∗ σj )(t), µ̇i (t) = bi − µi (t) − wij σj (t). (3) j6=i j6=i Equation 3 together with the definition of the spike trains σi (t) describe our spiking LCA (S-LCA). An intuitive definition of spike rate of a neuron is clearly the number of spikes per unit time. Hence we define the instantaneous spiking rate ai (t) and average soma current ui (t) for neuron-i as: Z t Z t 1 1 def def σi (s) ds and ui (t) = µi (s) ds, t0 ≥ 0 is a parameter. (4) ai (t) = t − t0 t0 t − t 0 t0 Rt Apply the operator (t − t0 )−1 t0 ds to the differential equation portion in (3), using also the relationship u̇i (t) = (µi (t) − ui (t))/(t − t0 ), and we obtain X u̇i (t) = bi − ui (t) − wij aj (t) − (ui (t) − ui (t0 ))/(t − t0 ). (5) j6=i Consider now a CLASSO problem where the dictionary atoms are non-negative and normalized to unit Euclidean norm. Configure S-LCA with λ and wij = φTi φj from Equation 1, and set νf ← 1, νr ← 0. So configured, it can be shown that the soma currents’ magnitudes (and thus that of the average currents as well) are bounded: there is a B such that |µi (t)|, |ui (t)| ≤ B for all i = 1, 2, . . . , N and all t > t0 . Consequently, lim u̇i (t) = lim (µi (t) − ui (t))/(t − t0 ) = 0, t→∞ t→∞ for i = 1, 2, . . . , N . The following relationship between ui (t) and ai (t) is crucial: Z ti,k Z t 1 1 (µi − λ) + (µi − λ) = ai (t) + vi (t)/(t − t0 ). ui (t) − λ = t − t 0 t0 t − t0 ti,k (6) (7) From this equation and a moderate assumption that inter-spike duration ti,k+1 − ti,k cannot be arbitrarily long unless neuron-i stops spiking altogether, one can prove that Tλ (ui (t)) − ai (t) → 0 as t → ∞. (8) The complete proof for this result is left in the Appendix. We can derive convergence of S-LCA as follows. Since the average soma currents are bounded, Bolzanodef T Weierstrass theorem shows that u(t) = [u1 (t), u2 (t), . . . , uN (t)] has at least one limit point, that is, there is ∗ N a point u ∈ R and a time sequence t1 < t2 < · · · , tk → ∞ such that u(tk ) → u∗ as k → ∞. By Equation 8, def T(u(tk )) → T(u∗ ) = a∗ . By Equations 5 and 6, we must therefore have 0 = b − u∗ − (ΦT Φ − I)a∗ . (9) Since S-LCA is configured for a CLASSO problem, the limit u∗ is in fact a fixed point of A-LCA, which is unique whenever CLASSO’s solution is. In this case, the limit point of the average currents {u(t) | t ≥ 0} is unique and thus indeed we must have u(t) → u∗ and a(t) → a∗ , the CLASSO solution. 4 Potential Neuron 2 Neuron ID Neuron 1 1 Neuron 3 0 0 0 2 4 6 8 10 12 Spike count 1 0 -1 2 4 6 8 10 4 6 8 10 12 8 10 12 15 2 0 2 (c) (a) Current 01 02 03 12 9 6 3 0 12 SNN time 0 2 4 6 SNN time (b) (d) Figure 1: Detail dynamics of a simple 3-neuron spiking network: In the beginning before any neuron fires, the membrane potentials (see 1-a) of the neurons grow linearly with a rate determined by the initial soma currents (see 1-b). This continues until Neuron 3 becomes the first to reach the firing threshold; an inhibitory spike is sent to Neurons 1 and 2, causing immediate drops in their soma currents. Consequently, the growths of Neurons 1 and 2’s membrane potentials slow down, and the neurons’ instantaneous spike rates decrease. The pattern of membrane integration, spike, and mutual inhibition repeats; the network rapidly moves into a steady state where stable firing rates can be observed. The convergent firing rates yield the CLASSO optimal solution of [0.684, 0, 1.217] (this solution is also verified by running the LARS algorithm [8]). The four subfigures: (a) Evolution of membrane potential. (b) Evolution of soma current. (c) Spike raster plot. (d) Solid Rt lines are the cumulative spike count of each neuron, and dashed line depicts the value of 0 Tλ (ui (s))ds in the corresponding A-LCA. The close approximation indicates a strong tie between the two formulations. 4 Numerical Simulations To simulate the dynamics of S-LCA on a conventional CPU, one can precisely solve the continuous-time spiking network formulation by tracking the order of firing neurons. In between consecutive spiking events, the internal variables, vi (t) and µi (t), of each neuron follow simple differential equations and permit closed-form solutions. This method, however, is likely to be slow that it requires a global coordinator that looks ahead into the future to determine the next firing neuron. For efficiency, we instead take an approximate approach that evolves the network state in constant-sized discrete time steps. At every step, the internal variables of each neuron are updated and a firing event is triggered if the potential exceeds the firing threshold. The simplicity of this approach admits parallel implementations and is suitable for specialized hardware designs. Nevertheless, this constant-sized-time-step approach introduces errors in spike timings: the time that a neuron sends out a spike may be delayed by up to a time step. As we will see in this section, the timing error is the major factor that limits the accuracy of the solutions from spiking networks. However, such an efficiency-accuracy trade-off may in fact be desirable for certain applications such as those in machine learning. 4.1 Illustration of SNN dynamics We solve a simple CLASSO problem: mina 12 ks − Φak22 + λ kak1 subject to a ≥ 0, where     0.5 0.3313 0.8148 0.4364 s =  1  , Φ = [φ1 φ2 φ3 ] = 0.8835 0.3621 0.2182 , λ = 0.1. 1.5 0.3313 0.4527 0.8729 We use a 3-neuron network configured with bi = φTi s, wij = φTi φj , the bias current as λ = 0.1 and firing threshold set to 1. Figure 1 details the dynamics of this simple 3-neuron spiking network. It can be seen from this simple example that the network only needs very few spike exchanges for it to converge. In particular, a weak neuron, such as Neuron 2, is quickly rendered inactive by inhibitory spike signals from competing neurons. This raises an important question: how many spikes are in the network? We do not find this question easy to answer theoretically. However, empirically we see the number of spikes in σi (t) in S-LCA can be approximated 5 1e2 1e0 1e-1 1e-2 1e-3 1e-4 1e0 1e-1 1e-2 1e-3 1e-4 1e-5 1e-6 1e-1 Average from t = 0 Average from t = 0.5 Exponential kernel Thresholded average current 1e1 (E(t)-E*) / E* (E(t)-E*) / E* 1e2 step = 0.01 step = 0.001 step = 0.0001 1e1 1e0 1e1 1e2 1e3 1e4 1e-5 1e-1 1e5 SNN time 1e0 1e1 1e2 1e3 1e4 1e5 SNN time (a) (b) Figure 2: (a) The convergence of a 400-neuron spiking network to a CLASSO solution. (b) Comparing the convergence of different formulations to read out solutions from a spiking neural network. Using a positive t0 for Equation 4 gives the fastest initial convergence, while using the thresholded average current reaches the highest accuracy the quickest. Despite a lack of theoretical guarantee, the exponential kernel method yields an acceptable, though less accurate, solution. This kernel is easy to implement in hardware and thus attractive when a SNN “computer” is to be built. from the state variable ui in A-LCA, that is the ui (s) in Equation 10 below are solutions to Equation 2: Z t Z σi (s)ds ≈ 0 t Tλ (ui (s))ds, i = 1, 2, . . . , N. (10) 0 Figure 1(d) shows the close approximation of spike counts using (10) in the example. We observe that such approximation consistently holds in large-scale problems, suggesting a strong tie between S-LCA and A-LCA. Since in an A-LCA configured for a sparse coding problem, we expect Tλ (ui (t)) for most i’s to converge to zero, (10) suggests that the total spike count in S-LCA is small. 4.2 Convergence of spiking neural networks We use a larger 400-neuron spiking network to empirically examine the convergence of spike rates to CLASSO solution. The neural network is configured to perform feature extraction from a 8×8 image patch, using a 400atom dictionary learned from other image datasets.4 With the chosen λ, the optimal solution has 8 non-zeros entries. Figure 2(a) shows the convergence of the objective function value in the spiking network solution, comparing to the true optimal objective value obtained from a conventional CLASSO solver. Indeed, with a small step size, the spiking network converges to a solution very close to the true optimum. The relationships among step size, solution accuracy and total computation cost are noteworthy. Figure 2(a) shows that increasing the step size from 10−3 to 10−2 sacrifices two digits of accuracy in the computed E ∗ . The total computation cost is reduced by a factor of 103 : It takes 102 times fewer time units to converge, and each time unit requires 10 times fewer iterations. This multiplication effect on cost savings is highly desirable in applications such as machine learning where accuracy is not paramount. We note that a large-step-size configuration is also suitable for problems whose solutions are sparse: The total number of spikes are fewer and thus total timing errors are correspondingly fewer. There are several ways to “read out” a SNN solution. Most rigidly, we can adhere to ai (t) in Equation 4 with t0 = 0. In practice, picking some t0 > 0 is better when we expect a sparse solution: The resulting ai (t) will be identically zero for those neurons that only spike before time t0 . Because Tλ (ui (t)) − ai (t) → 0 (Equation 8), another alternative is to use Tλ (ui (t)) as the solution, which is more likely to deliver a truly R t t−s sparse solution. Finally, one can change ai (t)’s definition to τ −1 0 e− τ σi (s)ds, so that the impact of the spikes in the past decays quickly. Figure 2(b) illustrates these different “read out” methods and shows that the exponential kernel is as effective empirically, although we must point out that the previous mathematical convergence analysis is no longer applicable in this case. 6 1e-2 1e-4 0.4 4 2 1672 spikes (avg 0.052 spike/neuron) 1e-3 0 0.05 0.1 0.15 0.2 0.25 Execution time (second) (a) 52×52 image 0.3 0.1 0 0 0.05 0.1 0.15 0.2 1e1 0.25 0.3 S-LCA FISTA 5th iteration 1e0 6 Sparsity (%) 1e-1 L2 error (E(t)-E*) / E* 1e0 8 S-LCA (l2 error) FISTA (l2 error) S-LCA (sparsity) FISTA (sparsity) S-LCA FISTA 5th iteration (E(t)-E*) / E* 0.7 1e1 1e-1 1e-2 10922 spikes (avg 0.019 spike/neuron) 1e-3 1e-4 0 0.5 (b) Breakdown of (a) 1 1.5 2 2.5 3 Execution time (second) Execution time (second) (c) 208×208 image Figure 3: CPU execution time for spiking neural networks, with a step size of 0.01. There are 32,256 unknowns in the 52×52 image case shown in (a), and 582,624 unknowns in the 208×208 image case shown in (c). (b) shows the breakdown of the objective function in the 52×52 image experiment. The `2 error is defined as ks−Φak2 ksk2 , and the sparsity is the percentage of entries with values greater than 0.01. Note that the spiking network finds the optimal solution by gradually increasing the sparsity, rather than decreasing as in FISTA. This results in the spare spiking activities of the neurons. 4.3 CPU benchmark of a spiking network implementation Our earlier discussions suggest that the spiking network can solve CLASSO using very few spikes. This property has important implications to a SNN’s computational efficiency. The computation cost of a N neuron spiking network has two components: neuron states update and spiking events update. Neuron states update includes updating the internal potential and current values of every neuron, and thus incurs an O(N ) cost at every time step. The cost of spiking events update is proportional to N times the average number of inter-neuron connections because a spiking neuron updates the soma currents of those neurons to which it connects. Thus this cost can be as high as O(N 2 ) (for networks with all-to-all connectivity, such as in the two previous examples) or as low as O(N ) (for networks with only local connectivity, such as in the example below). Nevertheless, spiking-event cost is incurred only when there is a spike, which may happen far fewer than once per time step. In practice we observe that computation time is usually dominated by neuron-states update, corroborating the general belief that spiking events are relatively rare, making spiking networks communication efficient. We report the execution time of simulating the spiking neural network on a conventional CPU, and compare the convergence time with FISTA [4], one of the fastest LASSO solvers. We solve a convolutional sparse coding problem [20] on a 52x52 image and a 208x208 image.5 The experiments are ran on 2.3GHz Intel R Xeon R CPU E5-2699 using a single core. SIMD is enabled to exploit the intrinsic parallelism of neural network and matrix operations. As shown in Figure 3, the spiking network delivers much faster early convergence than FISTA, despite its solution accuracy plateauing due to spike timing errors. The convergence trends in both figures are similar, demonstrating that spiking networks can solve problems of various sizes. The fast convergence of spiking networks can be attributed to their ability to fully exploit the sparsity in solutions to reduce the spike counts. The fine-grain asynchronous communication can quickly suppress most neurons from firing. In FISTA or in any other conventional solvers, communications between variables is similarly needed, but is realized through matrix-vector multiplications performed in an iteration-to-iteration basis. The only way to exploit sparsity is to avoid computations involving variables that have gone to zero during one iteration. A comparison of how the sparsity in solutions evolves in S-LCA and FISTA can be found in Figure 3(b). 5 Discussion Our work is closely related to the recent progress on optimality-driven balanced network [7, 3, 5]. The SNN model in [3, 5] differs slightly from ours in that only one internal state is used in the former. Using our 4 The 5 We input has 128 dimensions by splitting the image into positive and negative channels. use 8×8 patches, a stride of 4, and a 128×224 dictionary. 7 language here, neuron-i’s spike is generated by µi (t) reaching a threshold and not by vi (t), whose role is eliminated altogether. Despite the differences in the details of neuron models, spikes in both networks occur from a competitive process between neurons, and serve to minimize a network-level energy function. This work furthers the understanding of the convergence property in such spiking networks. Additionally, it is argued that in a tightly balanced excitatory/inhibitory network, spike codes are highly efficient that each spike is precisely timed to keep the network in optimality. This work provides evidence of the high coding efficiency even before the network settles into steady-state. By utilizing well-timed spikes, the neurons are able to collectively solve optimization problems with minimum communications. We demonstrate that this insight can be translated into practical value through an approximate implementation on conventional CPU. We observe that mathematical rigor was not a focus in [3]: The statement that in a tightly balanced network the potential converges to zero is problematic when taken literally as all spiking events will eventually cease in that case. The stationary points of the loss function (Equation 6 in [3]) are no longer necessarily the stationary points when the firing rates are constrained to be non-negative. The general KKT condition has to be used in this situation. The condition E(no spike) > E(spike) does not affect the behavior of the loss function in between spikes. In essence, there is no guarantee that the trajectory of the r(t) variable generated d E(r(t)) ≤ 0. by the SNN is descending the loss function, that is, dt Our SNN formulation and the established convergence properties can be easily extended to incorporate an additional `2 -penalty term, the so-called elastic-net problem [21] argmina≥0 1 ks − Φak22 + λ1 kak1 + λ2 kak22 2 (11) The elastic-net formulation can be handled by modifying the slope of the activation function T in A-LCA as follows  0 if x ≤ λ1 def def Tλ (x) = , T±λ (x) = Tλ (x) + Tλ (−x). x−λ1 if x > λ 1 2λ2 +1 In S-LCA, this corresponds to setting the bias current to λ1 and modifying the firing thresholds νf of the neurons to 2λ2 + 1. There are several other works studying the computation of sparse representations using spiking neurons. Zylberberg et al. [22] show the emergence of sparse representations through local rules, but do not provide a network-level energy function. Hu et al. [13] derive a spiking network formulation that minimizes a modified time-varying LASSO objective. Shapero et al. [16, 17] are the first to propose the S-LCA formulation, but yet to provide an in-depth analysis. We believe the S-LCA formulation can be a powerful primitive in future spiking network research. The computational power of spikes enables new opportunities in future computer architecture designs. The spike-driven computational paradigm motivates an architecture composed of massively parallel computation units. Unlike the von Neumann architecture, the infrequent but dispersed communication pattern between the units suggests a decentralized design where memory should be placed close to the compute, and communication can be realized through dedicated routing fabrics. Such designs have the potential to accelerate computations without breaking the energy-density limit. 8 Appendices A Governing Algebraic and Differential Equations Consider a neural networking consisting of N neurons. The only independent variables are the N soma currents µi (t) for i = 1, 2, . . . , N . There are another N variables of potentials vi (t) which are depedent on the currents to be described momentarily. Consider the following configurations. Each neron receives a positive constant input current bi . A nonnegative current bias λ and a positive potential threshold ν are set a priori. At any given time t0 such that vi (t0 ) < ν, the potential evolves according to Z t vi (t) = (µi (s) − λ) ds t0 until the time ti,k > t0 when vi (t) = ν. At this time, a spike signal is sent from neuron-i to all the nerons that are connected to it, weighted by a set of pre-configured weights wj,i . The potential vi (t) is reset to zero immediately afterwards. That is, for t > ti,k but before the next spike is generated, Z t vi (t) = (µi (s) − λ) ds. ti,k Moreover, for any consecutive spike times ti,k and ti,k+1 , Z ti,k+1 (µi (s) − λ) ds = ν. ti,k Finally, when neuron-i receives a spike from neuron-j at time tj,k with a weight wi,j , the soma current µi (t) is changed by the additive signal −wi,j α(t − tj,k ) where α(t) = H(t)e−t/τ , H(t) being the Heaviside function that is 1 for t ≥ 0 and 0 otherwise. The sign convention used here means that a positive wi,j means that a spike from neuron-j always tries to inhibit neuron-i. Suppose the initial potentials vi (0) are all set to be below the spiking threshold ν, then the dynamics of the system can be succintly described by the set of algebraic equations X µi (t) = bi − wi,j (α ∗ σj )(t), i = 1, 2, . . . , N (AE) j6=i where ∗ is the convolution operator and σj (t) is the sequence of spikes X σj (t) = δ(t − tj,k ), k δ(t) being the Dirac delta function. The spike times are determined in turn by the evolution of the soma currents that govern the evolutions of the potentials. One can also express the algebraicR equations AE as a set of differential equations. Note that the Heaviside t function can be expressed as H(t) = −∞ δ(s) ds. Hence   Z t d d α(t) = e−t/τ δ(s) ds dt dt −∞ 1 = − α(t) + δ(t). τ Thus, differentiating Equation AE yields X 1 µ̇i (t) = (bi − µi (t)) − wi,j σj (t). (DE) τ j6=i Note that Equations AE and DE are given in terms of the spike trains σj (t) that are governed in turn by the soma currents themselves as well as the configuartions of initial potentials, the spiking threshold ν and bias current λ. 9 B Defining Spike Rates and Average Currents Suppose the system of spiking neurons are initialized with sub-threshold potentials, that is, vi (0) < ν for all i = 1, 2, . . . , N . Thus at least for finite time after 0, all soma currents remain constant at bi and that no neurons will generate any spikes. Furthermore, consider for now that wi,j ≥ 0 for all i, j. That is, only inhibitory signals are present. Let the spike times for each neuron i be 0 < ti,1 < ti,2 < · · · . This sequence could be empty, finite, or infinite. It is empty if the potential vi (t) never reaches the threshold. It is finite if the neuron stop spiking from a certain time onwards. We will define the spike rate, ai (t), and average current, ui (t), for each neuron as follows.  1 Rt def t 0 σi (s) ds t > 0, , ai (t) = 0 t=0 and def  ui (t) = R 1 t t 0 bi µi (s) ds t > 0, . t=0 With these definitions, the section presents the following results. • The inhibition assumption leads to the fact that all the soma currents are bounded above. This in turns shows that none of the neurons can spike arbitrarily rapidly. • The fact that neurons cannot spike arbitrarily rapidly implies the soma currents are bounded from below as well. • The main assumption needed (that is, something cannot be proved at this point) is that if a neron spikes infinitely often, then the duration between consecutive spikes cannot be arbitrarily long. • Using this assumption and previous established properties, one can prove an important relationship between the spike rate and average current in terms of the familiar thresholding function T Proposition 1. There exists bounds B− and B+ such that µi (t) ∈ [B− , B+ ] for all i and t ≥ 0. With the def convention that ti,0 = 0, then there is a positive value R > 0 such that ti,k+1 −ti,k ≥ 1/R for all i = 1, 2, . . . , N and k ≥ 0, whenever these values exist. Proof. Because all spike signals are inhibitory, clearly from Equation AE, we have µi (t) ≤ bi for all t ≥ 0. def Thus, defining B+ = maxi bi leads to µi (t) ≤ B+ for all i and t ≥ 0. Given any two consecutive ti,k and ti,k+1 that exist, Z ti,k+1 + ν = vi (ti,k ) + (µi (s) − λ) ds ti,k ≤ vi (t+ i,k ) + (ti,k+1 − ti,k )(B+ − λ). Note that vi (t+ i,k ) = 0 if k ≥ 1. For the special case when k = 0, this value is vi (0) < ν. Hence n o ti,k+1 − ti,k ≥ min min{ν − vi (0)}, ν (B+ − λ)−1 . i Thus there is a R > 0 so that ti,k+1 − ti,k ≥ 1/R whenever these two spike times exist. Finally, because of duration between spikes cannot be arbitrarily small, it is easy to see that def γ = ∞ X −` e Rτ ≥ (α ∗ σ)(t). `=0 Therefore, def B− = min{−γ X wi,j } ≤ µi (t) j6=i for all i = 1, 2, . . . , N and t ≥ 0. So indeed, there are B− and B+ such that µi (t) ∈ [B− , B+ ] for all i and t ≥ 0.  10 Proposition 1 shows that among other things, there is a lower bound of the duration of consecutive spikes. The following is an assumption. Assumption 1. Assume that there is a positive number r > 0 such that whenever the numbers ti,k and ti,k+1 exist, ti,k+1 − ti,k ≤ 1/r. In simple words, this assumption says that unless a neuron stop spiking althogether after a certain time, the duration between consecutive spike cannot become arbitrarily long. With this assumption and the results in Proposition 1, the following important relationship between u(t) and a(t) can be established. Theorem 2. Let T (x) be the thresholding function where T (x) = 0 for x ≤ λ, and T (x) = x − λ for x > λ. For each neuron i, there is a function ∆i (t) such that T (ui (t)) = ai (t) ν + ∆i (t) and that ∆i (t) → 0 as t → ∞. Proof. Let A = { i | neuron-i spikes infinitely often } (A stands for “active”), and I = { i | neuron-i stop spiking after a finite time } (I stands for “inactive”). First consider i ∈ I. Let ti,k be the time of the final spike. For any t > ti,k , ui (t) − λ = 1 t Z 1 t Z ti,k (µi (s) − λ) ds + 0 1 t Z t (µi (s) − λ) ds ti,k ti,k 1 (µi (s) − λ) ds + vi (t) t 0 1 = ai (t) ν + vi (t), t 1 ui (t) = ai (t) ν + λ + vi (t). t = Note that vi (t) ≤ ν always. If vi (t) ≥ 0, then 0 ≤ T (ui (t)) − ai (t) ≤ ν/t. If vi (t) < 0, −ai (t) ν ≤ T (ui (t)) − ai (t) ν ≤ 0. Since i ∈ I, ai (t) → 0 obviously. Thus T (ui (t)) − ai (t) ν → 0. Consider the case of i ∈ A. For any t > 0, let ti,k be the largest spike time that is no bigger than t. Because i ∈ A, ti,k → ∞ as t → ∞. ui (t) − λ = 1 t Z ti,k (µi (s) − λ) ds + 0 1 = ai (t) ν + t Z 1 t Z t (µi (s) − λ) ds ti,k t (µi (s) − λ) ds. ti,k Furthermore, note that because of the assumption ti,k+1 − ti,k ≤ 1/r always, where r > 0, lim inf ai (t) ≥ r. In otherwords, there is a time T large enough such that ai (t) ≥ r/2 for all i ∈ A and t ≥ T . Moreover, 0 ≤ t − ti,k ≤ ti,k+1 − ti,k ≤ 1/r and µi (t) − λ ∈ [B− − λ, B+ − λ]. Thus 1 t Z t (µi (s) − λ) ds ∈ ti,k 1 [B− − λ, B+ − λ]/r → 0. t 11 When this term is eventually smaller in magnitude than ai (t) ν, Z 1 t T (ui (t) = ai (t) ν + (µi (s) − λ) ds t ti,k and we have T (ui (t)) − ai (t) ν → 0.  C Spiking Neural Nets and LCA This section shows that for a spiking neural net (SNN) that corresponds to a LCA, the limit points of the SNN necessarily are the fixed points of the LCA. In particular, when the LCA corresponds to a constrained LASSO, that is LASSO where the parameters are constrained to be nonnegative, whose solution is unique, then SNN necessarily converges to this solution. The proof for all these is surprisingly straightforward. The following differential equation connecting u̇i (t) to ui (t) and all other spiking rates aj (t) is crucial. u̇i (t) = X 1 1 (bi − ui (t)) − wi,j aj (t) − (ui (t) − bi ) . τ t (rates-DE) j6=i Derivation of this relationship is straightforward. First, apply the operation (1/t) Z X 1 1 t µ̇i (s) ds = (bi − ui (t)) − wi,j aj (t). t 0 τ Rt 0 to Equation DE: j6=i To find an expression for the left hand side above, note that Z d d 1 t ui (t) = µi (s) ds dt dt t 0 Z 1 t 1 µi (t) − 2 = µi (s) ds t t 0 1 (µi (t) − ui (t)) . = t Therefore Z 1 t 1 (µi (t) − bi ) µ̇i (s) ds = t 0 t 1 1 (µi (t) − ui (t)) + (ui (t) − bi ) = t t d 1 = ui (t) + (ui (t) − bi ) . dt t Consequently, Equation rates-DE is established. Observe that because µi (t) is bounded (Proposition 1), so is the average current ui (t). This means that u̇i (t) → 0 as t → ∞ because it was shown just previously that u̇i (t) = (µi (t) − ui (t))/t. Since µi (t) and ai (t) are all bounded, the vectors u(t) must have a limit point (Bolzano-Weierstrass) u∗ . By Theorem 2, there is a correpsonding a∗ such that T(u∗ ) = a∗ ν. Moreover, we must have 1 (b − u∗ ) − W a∗ τ = 0. Hence 0= where the matrix W has entries wi,j and wi,i 1 1 (b − u∗ ) − W T (u∗ ). τ ν ∗ ∗ ∗ Indeed, u , a = T (u ) correspond to a fixed point of LCA. In the case when this LCA corresponds to a LASSO with unique solution, there is only one fixed point, which implies that there is also one possible limit point of SNN, that is, the SNN must converge, and to the LASSO solution. 0= 12 References [1] A. Balavoine, J. Romberg, and C. J. Rozell. Convergence and rate analysis of neural networks for sparse approximation. IEEE Trans. Neural Netw., 23(9):1377–1389, September 2012. [2] A. Balavoine, C. J. Rozell, and J. Romberg. Convergence of a neural network for sparse approximation using nonsmooth Lojasiewicz inequality. In Proceedings of the International Joint Conference on Neural Networks, Dalla, TX, August 2013. [3] D. G. T. Barrett, S. Denève, and C. K. Machens. Firing rate predictions in optimal balanced networks. In NIPS, 2013. [4] A. Beck and M. Teboulle. A fast iterative shrinkage-thresholding algorithm for linear inverse problems. SIAM Journal on Imaging Sciences, 2(1):183–202, 2009. [5] M. Boerlin, C. Machens, and S. Deneve. Predictive coding of dynamical variables in balanced spiking networks. PLoS Comput Biol, 9(11), 2013. [6] S. Boyd and L. Vandenberghe. Convex optimization. Cambridge University Press, Cambridge, 2004. [7] S. Denève and C. K. Machens. Efficient codes and balanced networks. Nature neuroscience, 19(3):375–382, 2016. [8] B. Efron, T. Hastie, I. Johnstone, and R. Tibshirani. Least angle regression. The Annals of Statistics, 32(2):407– 499, 2004. [9] M. Elad. Sparse and Redundant Representations: From Theory to Applications in Signal and Image Processing. Springer, 2010. [10] J. J. Hopfield. Neural networks and physical systems with emergent collective computational abilities. Proc. Natl. Acad. Sci., 79(8):2554–2558, 1982. [11] J. J. Hopfield. Neurons with graded response have collective computational properties like those of two-state neurons. Proc. Natl. Acad. Sci., 1:3088–3092, 1984. [12] J. J. Hopfield and A. V. Herz. Rapid local synchronization of action potentials: Toward computation with coupled integrate-and-fire neurons. Proc. Natl. Acad. Sci., 92(15):6655–6662, 1995. [13] T. Hu, A. Genkin, and D. B. Chklovskii. A network of spiking neurons for computing sparse representations in an energy-efficient way. Neural Comput., 24(11):2852–2872, 2012. [14] J. P. LaSalle. Some extensions of Liapunov’s second method. IRE Trans. Circuit Theory, 7(4):520–527, December 1960. [15] C. J. Rozell, D. H. Johnson, R. G. Baraniuk, and B. A. Olshausen. Sparse coding via thresholding and local competition in neural circuits. Neural Comput., 20(10):2526–2563, 2008. [16] S. Shapero, C. Rozell, and P. Hasler. Configurable hardware integrate and fire neurons for sparse approximation. Neural Netw., 45:134–143, 2013. [17] S. Shapero, M. Zhu, J. Hasler, and C. Rozell. Optimal sparse approximation with integrate and fire neurons. International journal of neural systems, 24(05):1440001, 2014. [18] P. T. P. Tang. Convergence of LCA Flows to (C)LASSO Solutions. ArXiv e-prints, Mar. 2016, 1603.01644. [19] R. Tibshirani. Regression shrinkage and selection via the Lasso. J. Royal Statist. Soc B., 58(1):267–288, 1996. [20] M. D. Zeiler, D. Krishnan, G. W. Taylor, and R. Fergus. Deconvolutional networks. In IEEE CVPR, 2010. [21] H. Zou and T. Hastie. Regularization and variable selection via the elastic net. J. Royal Statist. Soc B., 67:301–320, 2005. [22] J. Zylberberg, J. T. Murphy, and M. R. DeWeese. A sparse coding model with synaptically local plasticity and spiking neurons can account for the diverse shapes of v1 simple cell receptive fields. PLoS Comput Biol, 7(10):e1002250, 2011. 13
9cs.NE
Under consideration for publication in Theory and Practice of Logic Programming 1 arXiv:cs/0505085v1 [cs.PL] 31 May 2005 Improving PARMA trailing TOM SCHRIJVERS∗ and BART DEMOEN Dept. of Computer Science, K.U.Leuven, Belgium (e-mail: {toms,bmd}@cs.kuleuven.ac.be) MARIA GARCIA DE LA BANDA School of Computer Science and S.E, Monash University, Australia (e-mail: [email protected]) PETER J. STUCKEY NICTA Victoria Laboratory Department of Computer Science and S.E. University of Melbourne, Australia (e-mail: [email protected]) submitted 20 November 2003; revised 22 October 2004; accepted 30 May 2005 Abstract Taylor introduced a variable binding scheme for logic variables in his PARMA system, that uses cycles of bindings rather than the linear chains of bindings used in the standard WAM representation. Both the HAL and dProlog languages make use of the PARMA representation in their Herbrand constraint solvers. Unfortunately, PARMA’s trailing scheme is considerably more expensive in both time and space consumption. The aim of this paper is to present several techniques that lower the cost. First, we introduce a trailing analysis for HAL using the classic PARMA trailing scheme that detects and eliminates unnecessary trailings. The analysis, whose accuracy comes from HAL’s determinism and mode declarations, has been integrated in the HAL compiler and is shown to produce space improvements as well as speed improvements. Second, we explain how to modify the classic PARMA trailing scheme to halve its trailing cost. This technique is illustrated and evaluated both in the context of dProlog and HAL. Finally, we explain the modifications needed by the trailing analysis in order to be combined with our modified PARMA trailing scheme. Empirical evidence shows that the combination is more effective than any of the techniques when used in isolation. To appear in Theory and Practice of Logic Programming. KEYWORDS: constraint logic programming, program analysis, trailing 1 Introduction The logic programming language Mercury (Somogyi et al. 1996) is considerably faster than traditional implementations of Prolog due to two main reasons. First, ∗ Research Assistant of the fund for Scientific Research - Flanders (Belgium)(F.W.O. - Vlaanderen) Mercury requires the programmer to provide type, mode and determinism declarations whose information is used to generate efficient target code. And second, variables can only be ground (i.e., bound to a ground term) or new (i.e., first time seen by the compiler and hence unconstrained). Since neither aliased variables nor partially instantiated structures are allowed, Mercury does not need to support full unification; only assignment, construction, deconstruction and equality testing for ground terms are required. Furthermore, it does not need to perform trailing, a technique that allows an execution to resume computation from a previous program state: information about the old state is logged during forward computation and used to restore it during backtracking. This usually means recording the state of unbound variables right before they become aliased or bound. Since Mercury’s new variables have no run-time representation they do not need to be trailed. HAL (Demoen et al. 1999; de la Banda et al. 2002) is a constraint logic language designed to support the construction, extension and use of constraint solvers. HAL also requires type, mode and determinism declarations and compiles to Mercury so as to leverage from its sophisticated compilation techniques. However, unlike Mercury, HAL includes a Herbrand constraint solver which provides full unification. This solver uses Taylor’s PARMA scheme (Taylor 1991; Taylor 1996) rather than the standard WAM representation (Aı̈t-Kaci 1991). This is because, unlike the WAM, the PARMA representation of ground terms does not contain reference chains and, hence, it is equivalent to that of Mercury. Thus, calls to the Herbrand constraint solver can be replaced by calls to Mercury’s more efficient routines whenever ground terms are being manipulated. Unfortunately, the increased expressive power of full unification comes at a cost, which includes the need to perform trailing. Furthermore, trailing in the PARMA scheme is more expensive than in the WAM, both in terms of time and space. We present here two techniques to counter the trailing penalty of the PARMA scheme. The first is a trailing analysis that detects and eliminates at compile-time unnecessary trailings and is suitable for any system based on the classic PARMA trailing scheme. Without other supporting information such analysis is rather inaccurate, since little is known at compile-time about the way predicates are used. However, when mode and determinism information is available at compile-time, as in HAL, significant accuracy improvements can be obtained. The second technique is a modified PARMA trailing scheme which considerably reduces the required trail stack size. This technique can be applied to any PARMA-based system and has been implemented by us in both dProlog (Demoen and Nguyen 2000) and the Mercury back-end of the HAL system. Finally, we detail the modifications required by our trailing analysis in order to be combined with our modified trailing scheme. The empirical evaluation of each technique indicates that the combination of the modified trailing scheme with the trailing analysis results in a significant reduction of trail size at a negligible time cost. The rest of the paper proceeds as follows. The next section provides a quick background on trailing, the classic PARMA scheme, and when trailing can be avoided. Section 3 summarizes the information used by our analyzer to improve its accuracy. Section 4 presents the notrail analysis domain. Section 5 shows how to analyze 2 HAL’s body constructs. Section 6 shows how to use the analysis information to avoid trailing. Section 7 presents the modified trailing scheme. Section 8 shows the changes required by the analysis to deal with this modified scheme. Section 9 presents the results from the experimental evaluation of each technique. Finally, future work is discussed in Section 10. 2 Background We begin by setting some terminology. A bound variable is a variable that is bound to some nonvariable term. An aliased variable is unbound and equated with some other variable. A free variable is unbound and unaliased. We will also refer to a new variable, which is a variable in HAL (and Mercury) which has no run-time representation, since it is yet to be constrained. In the WAM, an unbound variable is represented by a linear chain. If the variable is free the chain has length one (a cell containing a self-reference). When two free variables are unified, the younger cell is made to point to the older cell (see Section 2.2 for a discussion of relative cell age). These two variables are now aliased. A series of unifications of free variables thus results in a linear chain of references of which the last one is a self-reference or, in case the variable becomes instantiated, a bound term. This representation implies that testing whether a (source level) variable is bound or unbound, requires dereferencing. Such dereferencing is necessary during each unification and it is thus performed quite often. Example 1 Consider the execution of the goal X = Y, Z = W, X = Z, X = a when each variable is initially represented by a self-reference. Using the WAM representation, the first unification points X at Y. The second unification points Z at W. In the third unification we must first dereference X to get Y, dereference Z to give W, and then point Y at W. In the last unification we dereference X and set W to a. The changes in heap states are shown in Figure 1. X Y X Y X Y X Y X Z W Z W Z W Z W Z (a) Initially (b) X = Y (c) Z = W (d) X = Z Y a W (e) X = a Fig. 1. Example of binding chains using the WAM representation. In his PARMA-system (Taylor 1996), Taylor introduced a different variable representation scheme that does not suffer from this dereferencing need. In this scheme an unbound variable is represented by a circular chain. If the variable is free the 3 chain has length one (a self-reference as in the WAM). Unifying two variables in this scheme consists of cutting their circular chains and combining them into one big circular chain. When the variable is bound, each cell in the circular chain is replaced by the value to which it is bound. No dereferencing is required to verify whether a cell is bound, because the tag in a cell immediately identifies the cell as being bound or not. However, as we will see later, other costs are incurred by the scheme. Example 2 Consider the execution of the same goal X = Y, Z = W, X = Z, X = a when again each variable is initially represented by a self-reference. Using the PARMA representation, the first unification points X at Y and Y at X. The second unification points Z at W and W at Z. In the third unification we must point X at W and Z at Y. In the final unification each variable in the chain of X is set to a. The changes in heap states are shown in Figure 2. Notice how no references remain in the final state, as opposed to Figure 1(e). X Y X Y X Y X Y X Z W Z W Z W Z W Z (a) Initially (b) X = Y (c) Z = W (d) X = Z a a a a Y W (e) X = a Fig. 2. Example of binding chains using the PARMA representation. Another difference between the WAM and PARMA binding schemes becomes apparent when constructing a new term containing an unbound variable X. Effectively, we are aliasing a new variable with X and, hence, this new variable must be added into the variable chain of X. Example 3 Consider the execution of the goal X = Y, Z = f(X) when each variable is initially represented by a self-reference. Using the WAM representation, the first unification points X at Y. The second unification constructs a heap term f(X) with the content of X, namely Y, and points Z at this. Using the PARMA representation, the first unification chains X and Y together. The second unification has to add the copy of X in f(X), to the chain for X. The resulting heap states are shown in Figure 3. As mentioned before, trailing is a technique that stores enough information regarding the representation state of a variable before each choice-point, to be able to reconstruct such state upon backtracking. For both WAM and PARMA chains the 4 X Y X Z Z (a) X = Y Y X f Y Z (b) Z=f(X) X Z (c) X = Y Y f (d) Z=f(X) Fig. 3. Example of constructing a term containing an unbound variable using both WAM (a)(b) and PARMA (c)(d) representations. change of representation state occurs at the cell level: from being a self-reference (when the variable represented by the cell – the associated variable – is unbound and unaliased), to pointing to another cell in the chain (when the associated variable gets aliased), to pointing to the final bound structure (when the variable is bound directly or indirectly). Thus, what needs to be trailed are the cells. In the rest of the section we will discuss the PARMA trailing scheme in greater detail, the orthogonal issue of conditional/unconditional trailing, and a possible improvement based on compile-time detection of unnecessary trailings. 2.1 The classic PARMA Scheme: Value trailing The classic PARMA trailing scheme uses value trailing, described by the following C-like code:1 valuetrail(p) { *(tr++) = *p; /* store the contents of the cell p */ *(tr++) = p; /* store the address of the cell p */ } which takes the address p of a cell in a PARMA chain and stores in the trail stack first the (old) contents of the cell and then its address. Here, tr is a global pointer to the top of the trail stack. The untrail operation for value trailing is straightforwardly defined by: untrail_valuetrail() { address = *(--tr); /* retrieve the cell address */ *address = *(--tr); /* recover the cell contents */ } which first pops the address of a cell and then its contents. In contrast, trailing in the WAM stores only the address of the cell. The reasons are twofold. First, a cell is updated at most once, from a self-reference to a pointer to 1 All code in this paper is pseudo-C code. Implementation details that obfuscate rather than clarify the concepts at hand, have been omitted. 5 either another cell in a linear chain or a structure. And second, for a self-referencing cell the address and the content of the cell are the same. Therefore, when a cell is updated the old content of the cell (which is the one stored during trailing) is always the same as its address. This allows the WAM value trailing to be optimized by only storing the address of the cell, reducing by half the space cost of a single cell trailing. Let us now discuss when cells need to be trailed in the classic PARMA scheme. We have seen before that trailing is only needed when the representation state of a variable changes, and that this can only happen when the variable is unbound and, due to a unification, it becomes either aliased or bound. Therefore, we only need to trail cells when their associated variables are involved in a unification or when creating a new term which contains an unbound variable. The following discussion distinguishes three cases: cells associated to variables involved in a variable–variable unification, in a variable–nonvariable unification, and in new term construction. Trailing during variable–variable unification: The result of aliasing two unbound variables belonging to separate chains is the merging of the two chains into a single one. This can be done by changing the state of only two cells: those associated to each of the variables. Since each associated cell appears in a different chain, the final chain can be formed by simply interchanging their respective successors. One can then reconstruct the previous situation by remembering which two cells have been changed and what their initial value was. This is achieved for unification X = Y by the following (simplified) code: valuetrail(X); valuetrail(Y); tmp = *X; *X = *Y; *Y = tmp; Notice that X and Y are trailed independently. As only their associated cells need to be trailed, we will refer to this kind of trailing as shallow trailing. In contrast, for this kind of unification the WAM will update and trail the last cell in just one of the two linear chains. Hence, the space cost is four times lower (one value as opposed to four). Example 4 Consider the PARMA trailing that occurs during the first three unifications of the goal X = Y, Z = W, X = Z, X = a from Example 2, when each variable is initially represented by a self-reference. From the first unification we trail X together with its initial value (which, since X is a self-reference, is also) X, and Y together with its initial value Y. Similarly, for the second unification we trail Z together with its value Z, and W together with its value W. For the third unification, we trail X together with its value Y, and Z together with its value W. The resulting trail is X X Y Y Z Z W 6 W Y X W Z The WAM trail for the same goal illustrated in Figure 1 trails first X, then Z and finally Y. The resulting trail is X Z Y . Trailing during variable–nonvariable unification: When an unbound variable becomes bound, every single cell in its chain is set to point to the nonvariable term. Thus, we can only reconstruct the chain if all cells in the chain are trailed. The combined unification-trailing (simplified) code for unification X = Term is as follows: start = X; do { next = *X; valuetrail(X); *X = Term; X = next; } while (X != start); Since all cells in the chain of the unbound variable are trailed, we will refer to this kind of trailing as deep trailing. In contrast, for this kind of unification, the WAM will trail again just one cell in the linear chain. Hence, the space complexity for WAM is just O(1) compared to O(n) for PARMA, where n is the number of cells in the chain. However, the time complexity is O(n) for both, due to the dereferencing in the WAM. Example 5 Consider the PARMA trailing that happens in the last unification X = a of the goal from Example 2. The binding of all variables in the chain adds the trail elements W X X Y Y Z Z W In contrast the WAM trailing adds a single trail element Y . Trailing during new term construction: As mentioned before, when a new term is constructed on the heap with a copy of an unbound variable X, the cell containing this copy must be added into the chain for X. This means we must trail X since its value (i.e., its successor in the chain) is going to change. We do not need to trail the new cell since it clearly has no previous value we need to recover. The combined construction-trailing (simplified) code for constructing f(X) where X is an unbound variable and th is the current top of heap pointer, is: *(++th) = *X; valuetrail(X); *X = th; In contrast, for this construction the WAM need not trail at all since it simply points the new cell at the old unbound variable. If X is either a bound or a new variable, this complexity does not arise: X will be placed in the new structure pointing to either the nonvariable term or to itself, with no trailing required in any case. 7 Summary: The major advantage of the PARMA binding scheme is that it requires no dereferencing, while its major disadvantages are (for a detailed account see (Lindgren et al. 1995)): 1. PARMA trails more cells per unification: two in variable-variable unifications and all in variable-nonvariable, versus one. 2. Trailing of an individual cell is more expensive: two slots used versus one. 3. Unlike in the WAM, cells can be trailed more than once: every time a cell is updated which can happen more than once. 4. Copying an unbound variable into a structure involves trailing a cell. As a result, the trail stack usage is expected to be much higher in the PARMA scheme than in the WAM. Demoen and Nguyen (Demoen and Nguyen 2000) have indeed observed in the dProlog system maximal trail sizes for the PARMA scheme that are on average twice as large as with the WAM scheme. The techniques we present in this paper attempt to counter the disadvantages. The trailing analysis reduces the number of trailings and thereby counters disadvantages 1, 3 and 4, while the modified trailing scheme counters disadvantage 2. 2.2 Conditional versus unconditional trailing A cell that is changed only requires trailing if the cell did exist before the most recent choice point since, otherwise, there is no previous state that has to be restored during backtracking. This property applies equally to the WAM and PARMA schemes. In some systems a simple run-time test can be used to verify whether a cell is older than the most recent choice point. Younger cells require no trailing. If all cells on the heap are kept in order of allocation, the test simply checks whether the address of the cell is smaller than that of bh, the address of the top of the heap at the beginning of the most recent choice point. Systems, such as dProlog, which take advantage of this property use what is known as conditional trailing. Let us assume the existence of function is older(p,bh) which succeeds if p < bh. Conditional trailing is then described by the following code: cond_valuetrail(p, bh) { if (is_older(p,bh)) valuetrail(p); } thus avoiding the trailing of cells which are newer than the most recent choice point. The code for variable–variable and variable–nonvariable unification described in the previous sections using the unconditional valuetrail operation can be rewritten to use conditional trailing by simply substituting each call to valuetrail by a call to cond valuetrail. The untrail operation remains unchanged. In systems where the order of cells on the heap is not guaranteed, unconditional trailing is required. The Mercury back-end of the HAL system, for example, is such a system since Mercury uses the Boehm garbage collector which does not 8 preserve the order of the cells on the heap between garbage collections. Other systems use unconditional trailing at least during some unifications (see for instance (Van Roy and Despain 1992)). In (Demoen and Nguyen 2000) it is shown that global performance is hardly affected by the choice between conditional or unconditional trailing, since the savings made on avoided trailings are balanced by the overhead of the run-time tests. The differences between conditional and unconditional trailing do not affect the proposed analysis. Thus, the same analysis can still be used if at some point conditional trailing becomes available in Mercury. 2.3 Unnecessary trailing in the classic PARMA scheme: When considering the trailing of an unbound variable appearing in a unification, there are at least two cases in which its trailing can be avoided: • If the variable is new there is no previous value to remember and, therefore, trailing is not required. This is in fact a subset of the cases exploited by conditional trailing. • The cells that need to be trailed (the associated cell in the case of variable– variable, all cells in the case of variable–nonvariable) have already been trailed since the most recent choice-point. Upon backtracking only the earliest trailing after the choice-point is important, since that is the one which enables the reconstruction of the state of the variable before the choice-point. In the following sections we will see how compile-time analysis information can be obtained to detect the above two cases and can therefore be used to (a) eliminate unnecessary trailing in the classical PARMA trailing scheme, and (b) eliminate runtime tests performed by conditional trailing on variables known at compile-time to have no representation and thus be younger than the most recent choice point. 3 Language Requirements The analysis presented in this paper was designed for the HAL language. However, it can be useful for any language that uses PARMA representation and that provides accurate information regarding the following properties: • Instantiation state: trailing analysis can gain accuracy by taking into account the instantiation state of a program variable, i.e. whether the variable is new, ground or old. State new corresponds to program variables with no internal representation (equivalent to Mercury’s free instantiation). State ground corresponds to program variables known to be bound to ground terms. In any other case the state is old, corresponding to program variables which might be unbound but do have a representation (a chain of length one or more) or bound to a term not known to be ground. Program variables with instantiation state new, ground or old will be called new, ground or old variables, respectively. Note that once a new variable becomes old or ground, it can never 9 become new again. And once it is known to be ground, it remains ground. Thus, the three states can be considered mutually exclusive. The information should be available at each program point p as a table associating with each variable in scope of p its instantiation state. We will represent the instantiation table information at program point p as follows. Let V arp denote the set of all program variables in scope at program point p. The function instp : V arp → {new, ground, old} defines the instantiation state of program variable X at point p. This function allows us to partition V arp into three disjoint sets: N ewp , Groundp and Oldp containing the set of new, ground and old variables, respectively. • Determinism: trailing analysis can also gain accuracy from the knowledge that particular predicates have at most one solution. This information should be available as a table associating with each predicate (procedure to be more precise) its determinism. Herein we will refer to six main kinds of determinism: semidet (minimum-maximum set of solutions: 0-1), det (1-1), multi (1-∞), nondet (0-∞), erroneous (1,0), and failure (0-0). For our purposes we will only be interested in whether a predicate can return more than one answer. We will represent the determinism table by a function det : P red → {0, 1, ∞} which maps each predicate q to its maximum number of solutions. • Sharing: trailing analysis can exploit sharing information to increase accuracy. This information should be available at each program point p as a table associating with each variable in scope of p the set of variables which possibly share with it. Clearly, any variables that may be aliased together must possibly share. We will represent the sharing table at program point p by the function sharep : Oldp → P(Oldp ) which assigns to each program variable in Oldp the set of program variables in Oldp that share with it. Note that program variables in N ewp and Groundp cannot share by definition. 4 The notrail Analysis Domain The aim of the notrail domain is to keep enough information to be able to decide whether the run-time variables in a unification need to be trailed or not, so that if possible, optimized versions which do not perform the trailing can be used instead. In order to do this, we must remember that only run-time variables which are unbound and have a representation (i.e., are not new) need to be trailed. This suggests making use of the instantiation information mentioned in the previous section. Note that, since the analysis works on the level of program variables, some indirection will be required. We have already established that program variables in N ewp and Groundp represent run-time variables which do not need to be trailed. Thus, only variables in Oldp need to be represented in the notrail domain. the set of new, ground and old program variables, respectively. Assuming that V arp contains n variables and 10 the tree we have used to implement the underlying table is sufficiently balanced, then, the size of the Oldp is O(n) and the complexity of instp is O(log n). Recall that Oldp contains all program variables representing not only run-time variables which are unbound and have a representation, but also run-time variables bound to terms which the analysis cannot ensure to be ground. This is necessary to ensure correctness: even though run-time variables which are bound do not need to be trailed, the nonvariable terms to which they are bound might contain one or more unbound run-time variables. It is the trailing state of these unbound runtime variables that is represented through the domain representation of the bound program variable. Now that we have decided which program variables need to be represented by our domain, we have to decide how to represent them. We saw before that it is unnecessary to trail a run-time variable in a variable–variable unification if its associated cell has already been trailed, i.e., if the run-time variable has already been shallow trailed since the most recent choice-point. For the case of variable– nonvariable unification this is not enough, we need to ensure all cells in the chain have already been trailed, i.e, the run-time variable has already been deep trailed. This suggests a domain which distinguishes between shallow and deep trailed runtime variables. This can be easily done by partitioning Oldp into three disjoint sets of program variables with a different trailing state: those representing runtime variables which might not have been trailed yet, those representing run-time variables which have at least been shallow trailed, and those representing run-time variables which have been deep trailed. It is sufficient to keep track of only two sets to be able to reconstruct the third. Hence, the type of the elements of our notrail domain Lnotrail will be P(Oldp ) × P(Oldp ), where the first component contains the set of program variables representing run-time variables which have already been shallow trailed, and the second component contains the set of program variables representing run-time variables which have already been deep trailed. In the following we will use l1 , l2 , . . . to denote elements of Lnotrail at program points 1, 2, . . ., and s1 , s2 , . . . and d1 , d2 , . . . for the already shallow and deep trailed components of the corresponding elements. Also, the elements of the domain will be referred to as descriptions, with descriptions before and after a goal being referred to as the pre- and post-descriptions, respectively. Note that, by definition, we can state that if a run-time variable has already been deep trailed, then it has also been shallow trailed (i.e., if all cells in the chain have already been trailed, then the cell associated to the variable has also been trailed). The partial ordering relation ⊑ on Lnotrail is thus defined as follows: ∀(s1p , d1p ), (s2p , d2p ) ∈ Lnotrail : (s1p , d1p ) ⊑ (s2p , d2p ) ⇔  s2p d2p ⊆ ⊆ d1p d1p ∪ s1p This implies that deep trailing is stronger information than shallow trailing, and shallow trailing is stronger than no trailing at all. Also note that descriptions are compared at the same program point only (so that the instantiation and sharing information is identical). An example of a trailing lattice is shown in Fig. 4. Clearly 11 (∅, ∅) SS SSSS kk kkkk ({Y }, ∅) ({X}, ∅) SSSS RRRR kkkk llll (∅, {Y }) ({X, Y }, ∅) (∅, {X}) RRRR SSSS kkkk llll ({Y }, {X}) ({X}, {Y }) SSSS kkkk (∅, {X, Y }) Fig. 4. Notrail lattice Hasse diagram for variables {X, Y } where if l1 ⊑ l2 then l1 is below l2 in the diagram (Lnotrail , ⊑) is a complete lattice with top description ⊤p = (∅, ∅) and bottom description ⊥p = (∅, Oldp ). There are two important points that need to be taken into account when considering the above domain. The first point is that the dp component of a description will be used not only to represent already deep trailed variables but any variable in Oldp which, for whatever reason (e.g., it has been initialized since the last choicepoint), does not need to have any part of it trailed The second point is that as soon as a deeply trailed program variable X is made to share with a shallow trailed program variable Y , X also must become shallow trailed since some cell in some newly merged chain might come from Y and thus might not have been trailed. The sharing information at each program point is used to define the following function which makes trailing information consistent with its associated sharing information: consistp ((s, d)) = (s ∪ x, d \ x) where x = {X ∈ d|(sharep (X) \ d) 6= ∅} Intuitively, the function eliminates from d every program variable X which shares with other variables not in d, and adds them to s. From now on we will assume that ∀(s, d) ∈ Lnotrail : consistp ((s, d)) = (s, d) and use the consist function to preserve this property.2 Given HAL’s implementation of the sharing analysis domain ASub (Søndergaard 1986) the time complexity of determining sharep (X) for a variable X is O(n2 ). Furthermore, since ASub explicitly carries the set of ground variables at each program point (gp ), we will use this set rather than computing a new one (Groundp ) from the instantiation information, thus increasing efficiency. The major cost of consistp is the computation of x: for each of the O(n) variables the sharep set has to be computed. All other set operations are negligible in comparison. Hence, the overall time complexity is O(n3 ). We will see that the complexity of this function determines the 2 Note that the notrail domain can be seen as a “product domain” that also includes the mode and sharing information. However, for simplicity, we will consider the different elements separately, relating them only via their associated program point. 12 complexity of all the operations that use it. Thus, we will use it only when strictly necessary. In summary, each element lp = (sp , dp ) in our domain can be interpreted as follows. Consider a program variable X. If X ∈ dp , this means that all cells in all chains represented by X have already been trailed (if needed). Therefore, X does not need to be trailed in any unification for which lp is a pre-description. Note that X could be a bound variable which includes many different variable chains. If X ∈ sp we have two possibilities. If X is known to be unbound, then its associated cell has been shallow trailed. Therefore, it does not need to be trailed in any unification for which lp is a pre-description (although, in practice, we will only consider optimizing variable-variable unifications). If X might be bound, then a cell of one of its chains might not be trailed. As a result, no optimization can be performed in this case. We could, of course, represent bound variables more accurately, by requiring the domain to keep track of the different chains contained in the structures to which the program variables are bound, their individual trailing state and how these are affected by the different program constructs. Known techniques (see for instance (Janssens and Bruynooghe 1993; Van Hentenryck et al. 1995; Mulkers et al. 1994; Lagoon and Stuckey 2001)) based on type information could be used to keep track of the constructor that a variable is bound to and of the trailing state of the different arguments, thereby making this approach possible. 5 Analyzing HAL Body Constructs with Lnotrail This section defines the notrail operations required by HAL’s analysis framework (Bueno et al. 2001; Nethercote 2001) to analyze the different body constructs. This framework is quite similar to the well known framework of (Bruynooghe 1991) when analyzing a single module. While the analysis framework handles analysis of multiple module programs, it makes no extra demands on the analysis domain. Thus, for this paper we will simply treat the program to be analyzed as a single module. For each body construct in HAL, we will show how to obtain the postdescription from the information contained in the pre-description. Variable initialization init(X) In HAL a variable X transits from its initial instantiation new to instantiation old by being initialized. Since a new variable does not need to be trailed, we can simply add X to the d component of the pre-description (recall that d not only represents already deep trailed variables, but also any other old variable which does not need to be trailed). Formally, let l1 = (s1 , d1 ) be the pre-description, the post-description l2 can be obtained as: l2 = (s1 , d1 ∪ {X}) Variable–variable unification: X = Y . There are several cases to consider: • If one of the variables (say X) is new, it will simply be assigned a copy of 13 • • • • the pointer of Y . After the unification is performed, the trailing state of X becomes that of Y . Thus, the trailing state of X in the post-description should be that of Y in the pre-description. Note that this will never require a call to consist since a new variable cannot introduce any sharing. If one of the variables is ground, the other one will be ground after the unification. Hence, neither of them will appear in the post-description. If both variables are deep trailed, all cells in their associated chains are trailed and will remain trailed after unification (which is obtained by simply merging the chains). Hence, all variables retain their current trailing state and the pre-description will remain unchanged. If both variables are already aliased (they belong to the same chain) nothing is done by unification. Hence, they will retain the current trailing state. Hence, all variables retain their current trailing state and the pre-description will remain unchanged. Otherwise, at least one of the variables is not deep trailed and two unaliased variables are being considered. If both variables are unbound, unification will merge both chains while at the same time performing shallow trailing if necessary. Thus, after the unification both variables will be shallow trailed. If at least one variable is bound, the other one will become bound after the unification. As stated earlier, bound variables can be treated in the same way. Note that if either variable was deep trailed before the unification, all shared variables must become shallow trailed as well after the unification. This requires applying the consist function. Formally, let l1 = (s1 , d1 ) be the pre-description and g2 be the set of ground variables at program point 2 after the unification. Its post-description l2 can be obtained as:  same(X, Y, l1 ) X is new    remove ground(l1 , g2 ) X is ground l2 = unify(X, Y ) =  min(X, Y, l1 ) X and Y are old   unify(Y, X) otherwise with   (s1 ∪ {X}, d1 ) Y ∈ s1 same(X, Y, (s1 , d1 )) = (s , d ∪ {X}) Y ∈ d1  1 1 (s1 , d1 ) otherwise remove ground(li , vi ) = (si \ vi , di \ vi )  {X, Y } ⊆ d1  (s1 , d1 ) min(X, Y, (s1 , d1 )) = consist2 ((s1 ∪ {X, Y }, d1 \ {X, Y })) X 6∈ share1 (Y )  (s1 , d1 ) otherwise Here same(X, Y, li ) gives X the same trailing state as Y , remove ground(li , vi ) removes all variables in vi from li , and min(X, Y, li ) distinguished between three cases. If X and Y are both deep trailed, nothing has to be changed. If X and Y are definitely not aliased (they do not share) it ensures that they move to a shallow 14 X f/1 X f/1 (a) Before. (b) After. Fig. 5. Term construction example: f (X). The dashed line represents a choicepoint. trailed state. Otherwise, the description must remain unchanged since unification might have done nothing (and thus they might still be untrailed, so adding them to s1 would be a mistake). Note that there is no need to apply consist here since X and Y already share in the pre-description and, although sharing information might have changed, it can only create sharing among variables already connected (through X and Y ) by the closure under union performed by consist. The worst case time complexity, O(n3 ), is again due to consist. Variable–term unification: Y = f (X1 , . . . , Xn ). There are two cases to consider: If Y is new, the unification simply constructs the term in Y . Otherwise, we can treat this for the purpose of the analysis as two unifications, Y ′ = f (X1 , . . . , Xn ), Y = Y ′ where Y ′ is a new variable. Since unifications of the form Y ′ = Y have been discussed above, here we only focus on the construction into a new variable. In the following we assume that the Y in the variable-term unification is new. When a term, e.g. f (X), is constructed with X being represented by a PARMA chain, the argument cell in the structure representation of f /1 is inserted in the chain of X (see Fig.5). While X requires shallow trailing, the cell of the term requires no trailing at all as it is newly created. The generalization of this to an n-ary variable term unification is as follows. If all arguments are deep trailed, then Y becomes deep trailed and the arguments remain deep trailed. Otherwise, Y and all its arguments become shallow trailed (since each argument is at least shallow trailed by the operation). Note that if at least one argument was deep trailed, and since each argument shares with Y after the unification, we must apply consist to maintain the information consistent. Formally, let l1 = (s1 , d1 ) be the pre-description of the unification, x be the set of variables {X1 , . . . , Xn } and g2 the set of ground variables after the unification. Its post-description l2 can be obtained as:  (s1 , d1 ∪ {Y }) x ⊆ d1 l2 = consist2 (remove ground((s1 ∪ x ∪ {Y }, d1 \ x), g2 )) otherwise The worst case time complexity is O(n3 ). This definition can be combined with the previous one for the overall definition of variable–term unification. The implementation can be more efficient, but the complexity will still be O(n3 ). 15 Predicate call: q(X1 . . . Xn ). Let l1 be the pre-description of the predicate call and x the set of variables {X1 , . . . , Xn }. The first step will be to project l1 onto x resulting in description lproj . Note that onto-projection is trivially defined as: onto proj(l, v) = (s ∩ v, d ∩ v) The second step consists in extending lproj onto the set of variables local to the predicate call. Since these variables are known to be new (and thus they do not appear in Old1 ), the extension operation in our domain is trivially defined as the identity. Thus, from now on we will simply disregard the extension steps required by HAL’s framework. Let lanswer be the answer description resulting from analyzing the predicate’s definition for calling description lproj . We will assume that the set v of variables local to q/n has already been projected out from lanswer , where out-projection is identical to remove ground, which has time complexity O(n). In order to obtain the post-description, we will make use of the determinism information. Thus, the post-description l2 can be derived by combining the lanswer and l1 , using the determinism of the predicate call as follows: • If the predicate has determinism multi or nondet (which can have more than one answer), then all variables not in x become not trailed by the (possible) introduction of a new choice point. Hence, l2 is equal to lanswer except for the fact that we have to apply the consist function in order to take into account the changes in sharing involving variables not in x. • Otherwise, we know the trailing state of variables in l1 is unchanged except by possibly new introduced sharing. Thus, l2 is the result of combining lanswer and l1 as follows: the trailing state of variables in x is taken from lanswer , while that of other variables is taken from l1 . Any deep trailed variables that share with non-deep trailed variables must, of course, become shallow trailed. Formalized, the combination3 function is defined as: l2 = = comb(l1 , lanswer )  consist2 (((s1 \ x) ∪ sanswer , (d1 \ x) ∪ danswer )) consist2 (lanswer ) det(q) ≤ 1 otherwise Obviously, the complexity is O(n3 ) because of consist. Example 6 Assume that the call q(X) has pre-description ({X, Y }, ∅) and the predicate q/1 has answer description ({X}, ∅). The post-description of the call depends on the determinism of the predicate. If the predicate q/1 has at most one solution, the postdescription will be (({X, Y } \ {X}) ∪ {X}, (∅ \ {X}) ∪ ∅) = ({X, Y }, ∅). Otherwise the post-description will be equal to the answer description, ({X}, ∅). 3 Note that the combination is not the meet of the two descriptions. It is the “specialized combination” introduced in (de la Banda et al. 1998) which assumes that lanswer contains the most accurate information about the variables in x, the role of the combination being just to propagate this information to the rest of variables in the clause. 16 Disjunction: (G1 ; G2 ; . . . ; Gn ). Disjunction is the reason why trailing becomes necessary. As mentioned before, trailing might be needed for all variables which were already old before the disjunction. Thus, let l0 be the pre-description of the entire disjunction. Then, ⊤ will be the pre-description of each Gi except for Gn whose pre-description is simply l0 (since the disjunction implies no backtracking over the last branch). Let li = (si , di ), 1 ≤ i ≤ n be the post-description of goal Gi . We will again assume that the set vi of variables local to each Gi has already been projected out from li . The end result ln+1 of the disjunction is the least upper bound (lub) of all branches,4 which is defined as: l1 ⊔ . . . ⊔ ln = consistn+1 (remove ground((s, d), gn+1 )) where s d s′i d′i = = = = (s′1 ∩ . . . ∩ s′n ) \ d (d′1 ∩ . . . ∩ d′n ) si ∪ d′i di ∪ gi Intuitively, all variables which are deep trailed in all descriptions are ensured to remain deep trailed; all variables which are trailed in all descriptions but have not always been deep trailed (i.e., are not in d) are ensured to have already been (at least) shallow trailed. Note that variables which are known to be ground in all descriptions (those in gn+1 ) are eliminated. This is consistent with the view that only old variables are represented by the descriptions and avoids adding overhead to the abstract operations. HAL also includes switches, which are disjunctions where the compiler has detected that only one branch needs to be executed. Switches are treated identically to disjunctions except for the fact that the pre-description for each Gi is l0 rather than ⊤. Example 7 Let l0 = (∅, {X, Y, Z}) be the pre-description of the code fragment: ( A = a, X = Y ; A = b, X = f(Y, Z) ) Let us assume there is no sharing at that program point. Assuming that A is old, then this is simply a disjunction. Then, the pre-descriptions of the first branch is (∅, ∅), the ⊤ element of our domain. The pre-description of the second branch is (∅, {X, Y, Z}), i.e., since this is the last branch in the disjunction, its pre-description is identical to the pre-description of the entire disjunction. Their post-descriptions are ({X, Y }, ∅) and (∅, {X, Y, Z}), respectively. Finally, the lub of the two postdescriptions results in ({X, Y }, ∅). Now assume A is ground. Then this code fragment is a switch on A. The predescription for the first branch becomes (∅, {X, Y, Z}) and the post description 4 Note that this is not the lub of the notrail domain alone, but that of the product domain which includes sharing (and groundness) information. 17 is the same. Finally the lub of the two post-descriptions for the two branches is (∅, {X, Y, Z}). The time complexity of the joining of the branches is simply that of the lub operator (O(n3 )) for a fixed maximum number of branches, and it is completely dominated by the consistn+1 function. If-then-else: I → T ; E . Although the if-then-else could be treated as (I, T ; E), this is rather inaccurate since (as in the case of switches) only one branch will ever be executed and, thus, there is no backtracking between the two branches. Hence, we can do better if no old variable that exists before the if-then-else is bound or aliased, i.e. possibly requiring trailing and backtracking if the condition fails. This is not a harsh restriction, since it is ensured whenever the if-condition is used in a logical way, i.e., it simply inspects existing variables and does not change any non-local variable. However, in general it is not possible to statically determine this property. Instead a safe approximation is used: the if-then-else is treated as (I, T ; E) if the condition contains any pre-existing old variables, otherwise the following stronger treatment is used. Let l1 be the pre-description to the if-then-else. Then l1 will also be the predescription to both I and E. Let lI be the post-description obtained for I. Then lI will also be the pre-description of T . Finally, let lT and lE be the post-descriptions obtained for T and E, respectively. Then, the post-description for the if-then-else can be obtained as the lub lT ⊔ lE . The time complexity of the joining of the branches is again O(n3 ), just like the operation over the disjunction. Example 8 Let l0 = (∅, ∅) be the pre-description of the following if-then-else where N is known to be ground: ( N = 1 -> X = Y ; X = f(Y, Z) ) Assume no variables share before the if-then-else. Then, l0 is equal to the predescription of both the thenand else-branch. The post-description of the then-branch is ({X, Y }, ∅) and that of the else-branch is ({X, Y, Z}, ∅). The post-description finally is obtained as their lub: ({X, Y }, ∅). If the pre-description was l0 = (∅, {X, Y, Z}) as in Example 7, then the postdescription would be (∅, {X, Y, Z}), since no additional trailing will be required. Higher-order term construction: Y = p(X1 , . . . , Xn ). This involves the creation of a partially evaluated predicate, i.e., we are assuming there is a predicate with name p and arity equal or higher than n for which the higher-order construct Y is being created. In HAL, Y is required to be new. Also, it is often too difficult or even impossible to know whether Y will be actually called or not and, if so, where. Thus, HAL follows a conservative approach and requires that the instantiation of the “captured” arguments (i.e., X1 , . . . , Xn ) remain unchanged after calling Y . It 18 also guarantees (through type and mode checking) that no higher-order terms are ever unified. The above requirements allow us to follow a simple (although conservative) approach: Only after a call to Y will the trailing of the captured variables be affected. If the call to Y might have more than one solution and thus may involve backtracking, then the involved variables will be treated safely in the analysis at the call location if they are still statically live there. If the call to Y does not involve backtracking but does involve unifications, then trailing information might not be inferred correctly at the call location. This is because the captured variables are generally not known at the call location. To keep the trailing information safe, any potential unifications have to be accounted for in the higher-order unification. Since the construction of the higher-order term involves no backtracking and all unifications leave the variables they involve at least shallow trailed, it is sufficient to demote all captured deep trailed variables to shallow trailed status, together with all sharing deep trailed variables. Formally, let l1 = (s1 , d1 ) be the pre-description of the higher-order term construction and x be the set of variables {X1 , . . . , Xn }. Then its post-description l2 can be obtained with a time complexity of O(n3 ) as:  consist2 ((s1 ∪ (x ∩ d1 ), d1 \ x)) x ∩ d1 6= ∅ l2 = l1 otherwise Higher-order call: call(P, X1 , . . . , Xn ). The exact impact of a higher-order call is difficult to determine in general. Fortunately, even if the exact predicate associated to variable P is unknown, the HAL compiler still knows its determinism. This can help us improve accuracy. If the predicate might have more than one solution, all variables must become not trailed. Since the called predicate is typically unknown, no answer description is available to improve accuracy. Otherwise, the worst that can happen is that the deep trailed arguments of the call become shallow trailed. So in the post-description we move all deep trailed arguments to the set of shallow trailed variables, together with all variables they share with. Recall that for this case the captured variables have already been taken care of when constructing the higher-order term. The sequence of steps is much the same as that for the predicate call. First, we project the pre-description l1 onto the set x of variables {X1 , . . . , Xn }, resulting in lproj . Next, the answer description lanswer of the higher-order call is computed as indicated above:  (s ∪ d, ∅) det(P ) ≤ 1 lanswer = (∅, ∅) otherwise The combination of lanswer and l1 is computed to obtain the post-description l2 . 6 Trailing Optimization The optimization phase consists of deciding for each unification in the body of a clause which variables need to be trailed. This decision is based on the pre19 description of the unification, inferred by the trailing analysis. If some variables do not need to be trailed, the general unification predicate is replaced with a variant that does not trail those particular variables. Thus, we will need a different variant for each possible combination of variables that do and do not need to be trailed. • For the unification of two unbound variables, trailing is omitted for either variable if it is shallow trailed or deep trailed in the pre-description. • For the binding of an unbound variable X, trailing of X is omitted if it is deep trailed in the pre-description. • In the construction of a term containing an old unbound variable X, trailing of X is omitted if X is either shallow or deep trailed in the pre-description. • For the unification of two bound variables, the trailing for chains in the structure of either is omitted if it is deep trailed in the pre-description. Often it is not known at compile time whether a variable is bound or not, so a general variable-variable unification predicate is required that performs run-time boundness tests before selecting the appropriate kind of unification. Various optimized variants of this general predicate are needed as well. Experimental results for the analysis are presented in Section 9. 7 The improved trailing scheme Let us now present a trailing scheme which is more sophisticated than the classic PARMA value trailing discussed in Section 2. We will start by considering the improvements that apply to each kind of unification (variable–variable and variable– nonvariable) and finish by showing how to combine them. Our modified scheme must be able to apply different untrail operations depending on the kinds of trailing that was performed. A simple tagging scheme (explained in detail in Section 7.3) is used to indicate the kind of untrailing required in each case. 7.1 Variable–variable unification: swap trailing In the classic scheme the value trailing of both cells takes up four trail stack slots (two for the addresses of each variable plus another two for their contents) when trailing is unconditional. Undoing such variable–variable unification consists of simply restoring the old values of the cells separately. However, there is a more economic inverse operation that undoes the swapping that happened during unification: simply swapping back. This swapping only requires the addresses of the involved cells and not their respective old contents. We introduce a new kind of trailing named swap trailing which exploits this and also the corresponding untrailing operation. Swap trailing is defined by the following code: swaptrail(p, q) { *(tr++) = p; *(tr++) = set_tag(q,SWAP_TRAIL); } 20 where p and q are the addresses of the two cells, tr is a pointer to the top of the trailing stack, SWAP TRAIL is a tag, and the function set tag(c,t) tags cell c with tag t. Note that swap trailing only consumes two slots in the trail stack, as opposed to the four used by (unconditional) value trailing in the classical scheme. The untrail operation for swap trailing is: untrail_swaptrail() { q = untag(*(--tr)); /* recover address q */ p = *(--tr); /* recover address p */ tmp = *q; *q = *p; /* swap contents of p with q */ *p = tmp; } The above improvement assumes that both cells are unconditionally trailed. If conditional value trailing is available, the classic scheme would either consume zero, two or four slots if respectively none, only one or both variables are older than the most recent choice point. Swap trailing can only be used in conjunction with conditional trailing to replace the four slot case, with value trailing still needed for the two slot case. As a result the code for conditional variable–variable trailing looks like: cond_varvartrail(p, q, bh) { if (is_older(p,bh)) { if (is_older(q,bh)) { swaptrail(p,q); /* trail both using swaptrail */ } else { valuetrail(p); /* only trail p */ } } else if (is_older(q,bh)) { valuetrail(q); /* only trail q */ } } It is important to note that the potential gain in space on the trail obtained by the above operations comes at a cost in execution time (more run-time operations are needed) and that the gain in space is not guaranteed. 7.2 Variable–nonvariable unification: chain trailing As seen before, variable-nonvariable unification pulls the entire chain of the variable apart by setting every cell in the chain to the nonvariable. In the case of classic value trailing, every address of a cell is stored twice: once as the address of a cell and once as the contents of the predecessor cell. This means that there is quite some redundancy. The obvious improvement is to store each address only once. We name this chain trailing. Because the length of the chain is not known, a marker is needed to indicate, for the untrailing operation, where chain trailing ends. The last 21 entry of the chain encountered during untrailing, is the first one actually trailed. We use the CHAIN END tag to mark this entry. The last address put on the trail is tagged with CHAIN BEGIN to indicate the kind of trailing. For chains of length one, the last and first cell coincide. The CHAIN END tag is used to mark this single address. Chain trailing is defined by the code: chaintrail(p) { start = p; *(tr++) = set_tag(p,CHAIN_END); p = *p; only_one = TRUE; while (p != start) { /*trail each cell address*/ only_one = FALSE; *(tr++) = p; p = *p; } if (!only_one) { /* if more than one cell */ last = tr - 1; /* tag last one as CHAIN_BEGIN*/ *last = set_tag(*last,CHAIN_BEGIN); } } The untrail operation for reconstructing the chain is straightforward: it dispatches to the appropriate untrailing action depending on the tag of the first cell encountered during untrailing. If this is CHAIN BEGIN, meaning n ≥ 1, the corresponding code is: untrail_chaintrail() { head = untag(*(--tr)); previous = head; current = *(--tr); while (get_tag(current) != CHAIN_END) { *current = previous; previous = current; current = *(--tr); } current = untag(current); *current = previous; *head = current; } If the first tag is CHAIN END, then n = 1 and the code for untrailing is: untrail_shortchain() { cell = untag(*(--tr)); *cell = cell; } 22 Example 9 Consider the trailing that occurs using the improved scheme for the goal X = Y, Z = W, X = Z, X = a from Example 4. The first unification is a swaptrail, trailing X and Y, similarly the second unification swaptrails Z and W and the third unification swap trails X and Z. Finally the last unification chain trails X. The resulting trail looks like: X Y sw Z W sw X Z sw X ce W Z Y cb where we use superscripts sw, cb and ce to represent the SWAP TRAIL, CHAIN BEGIN and CHAIN END tags respectively. This uses 10 trail entries compared to the 24 entries in Examples 4 and 5 The above improvement assumes that all cells are unconditionally trailed. Let us assume that the chain consists of n cells, k of which are older than the most recent choice point. If conditional trailing is available and 2 ∗ k < n, our unconditional chain trailing will consume more space than the classic conditional value trailing. Fortunately, a conditional variant of chain trailing is also possible: cond_chaintrail(p, bh) { start = p; first = TRUE; only_one = TRUE; do { if (is_older(p,bh)) /* trail each older cell in chain*/ if (first) { *(tr++) = set_tag(p,CHAIN_END); /*tag if first*/ first = FALSE; } else { only_one = FALSE; *(tr++) = p; } p = *p; } while (p != start); if (!only_one) { /* if more than one older cell */ last = tr - 1; /* tag last one as CHAIN_BEGIN*/ *last = set_tag(*last,CHAIN_BEGIN); } } This conditional variant uses only k slots of the stack trail, so it is clearly an improvement over conditional value trailing whenever k > 0. Note that the untrail operation used is the same as for the unconditional chain trailing. This might look wrong at first since the cond chaintrail might not trail all cells in the chain. However, this is simply exploiting the fact that the objective of trailing is to be able to reconstruct the bindings that existed at the creation time of a choice point. Thus, the final state of younger cells and the state of any cell 23 during the intermediate steps of untrailing are irrelevant. In fact, the more general – and better with respect to stack trail consumption – principle behind this is that only the old cells (older than the most recent choice point) in the chain pointing to other old cells have to be trailed (an old cell must have been made to point to a new cell after the last choice-point). The kind of trailing suitable for this insight is a special kind of value trailing, where the successive equal slots on the trail stack are overlapped. The above cond chaintrail operation only approximates this, since an implementation would incur an undue time overhead because of the extra runtime tests needed to test the age of the successors. Thus, we store the addresses of old cells even if they neither point to nor are pointed to by old cells. Example 10 Figure 6 illustrates with a small example how the above specified conditional chain trailing, together with previous trailings, safely restores the state of all variables older than the most recent choice point. Consider the following goal X = Z, Z = Y, X = a, fail and let us assume that both X and Y are older than the most recent choice point, Z is newer, and all three are chains of length 1 as depicted in Figure 6(a). The successive forward steps are shown in the Figures 6(b), 6(c) and 6(d). X is value trailed during X = Z, as is Y during Z = Y. The addresses of X and Y are stored on the trail stack with conditional chain trailing during X = a5 . The cb and ce to the side of the stack trail entries represent the CHAIN BEGIN and CHAIN END tags respectively. The execution fails immediately after X = a, and backtracks to the initial state in three steps. First (Figure 6(e)), the conditional chain trailing is untrailed, creating a chain of X and Y. Next (Figure 6(f)), the value trailing of Y is undone and finally (Figure 6(g)), the value trailing of X is reversed too. The final state corresponds to the initial state, except for Z, which is still bound to a. However, as Z did not exist before the most recent choice point, its content is irrelevant at that point because it is inaccessible and will be reclaimed from the heap anyway when forward execution resumes. Note the illegal intermediate state illustrated in Figure 6(f) is not important since it only occurs in the middle of untrailing, and never during execution. 7.3 Combining the improvements Let us first consider the combination in the context of the modified unconditional trailing scheme of the Mercury back-end of HAL. In this context, in addition to swap and unconditional chain trailing, function trailing is used to allow custom trailings for constraint solvers. Function trailing stores a pointer to an untrailing function and to untrailing data. Thus, we need four different tags to distinguish the different trailing information that can appear on the trail. Fortunately, there are two tag bits available (because of the aligned addressing for 32 bit machines). There is one constraint on the allocation of the four different tags to the kinds of 5 This could be avoided if X is known to have been trailed already. 24 X Y X Z Y X X X Z (a) Initially X Z a Y Y X X (e) Untrail X = a Y Z (b) X = Z Y X Y a (f) Untrail Z = Y a Y a Y X Y Y X X cb ce (d) X = a X X X a Z (c) Z = Y X Z Y Y X X Y Z a (g) Untrail X = Z Fig. 6. Conditional chain trailing example. trailing: the CHAIN END tag should not look the same as the tag of the intermediate addresses in a chain trail. The general untrail operation then simply looks like: untrail(tr_cp) { while (tr > tr_cp) { switch (get_tag(*tr)) { case FUNCTION_TRAIL: untrail_functiontrail(); break; case SWAP_TRAIL: untrail_swaptrail(); break; case CHAIN_BEGIN: untrail_chaintrail(); break; case CHAIN_END: untrail_shortchain(); } } } Note that, since we are assuming we are in a modified unconditional trailing scheme, value trailing is never used. This is because value trailing is only needed in the modified scheme whenever only one of the two variables involved in a variablevariable unification is newer than the most recent choice point, and thus only that 25 one was trailed. Otherwise swap trailing will be used. Since no conditional trailing is allowed, swap trailing is always used for variable-variable unifications. Let us now consider the combination in the context of the modified conditional trailing scheme of dProlog. In this context only value, swap and conditional chain trailing are used. The remarks on the application and allocation of tags is the same as for the unconditional case and the general conditional untrail operation looks identical except for the fact that the FUNCTION TRAIL case is substituted by a VALUE TRAIL case, and the call to untrail functiontrail() is substituted by a call to untrail valuetrail(). When looking at the value trailings of chains of length one in the example in the previous section (see Figure 6), there is an obvious trailing alternative in the conditional system that stores no redundant information: chain trailing. Indeed, if such a variable would be chain trailed instead of value trailed, only one instead of two slots would be used on the stack. However, this would require more run-time tests and we have not implemented this. value_trail(p) { if (*p == p) /* self pointer */ *(tr++) = set_tag(p,CHAIN_END); else *(tr++) = *p; *(tr++) = p; } Experimental results for both the conditional and unconditional trailing scheme are presented in Section 9. 8 Analysis for the improved trailing scheme Trailing analyses heavily depend on the details of the trailing scheme. The analysis presented in Section 4 was defined for the classic PARMA trailing scheme. In this section we present the modifications needed by that analysis in order to be applied to our improved trailing scheme. As we will see, the improved scheme gives rise to fewer opportunities for trail savings. 8.1 Unnecessary trailing in the improved trailing scheme The main difference between the two schemes in terms of unnecessary trailing appears when considering cells that have been trailed since the most recent choicepoint. In the case of value- and chain-trailing, these cells do not need to be trailed again since the information stored the first time allows us to reconstruct the state right before the choice-point.6 As we will see later in the experimental evaluation, this allows our previous analysis to detect many spurious trailings. 6 This is assuming that the semantics of function trailing is such that it does not rely on the intermediate state of any Herbrand variable during untrailing. 26 In the case of swap trailing, however, cells need to be trailed even if they have already been trailed since the most recent choice-point. This is because swap trailing is an incremental kind of trailing (the content of the cells is not stored during the trailing, but only the incremental change) and thus relies on future trailings for proper untrailing of cells. As a result, during the untrailing process in our improved scheme, all later chain and swap trailings have to be undone before the swap trailing can be untrailed correctly. Thus, there is no opportunity here to avoid future trailings between two choice points, after the first trailing has been performed. Let us illustrate this with a counterexample. Counterexample. Let us not trail variables a second time between two choice points. Consider then the following code: X = Y, Z = W, X = Z, fail where all variables are older than the most recent choice point and, initially, they are represented as chains of length one, as depicted in Figure 7(a). In the first two steps the four variables are aliased and swap trailed pairwise, creating two chains of length two (see Figure 7(b)). The s’s represent SWAP TRAIL tags. X Z Y W (a) Initially W Z Y W X X Y Z (b) Z = W s X s Z W Z Y W X Y s (c) X = Z X = Y, X Y Z W s (d) Untrail Fig. 7. Counterexample of incremental behavior of swap trailing: it does not eliminate the need for further trailing of the same cells. Next X and Z are aliased, creating one large chain (see Figure 7(c)). During this step X and Z are not (swap) trailed since they have already been swap trailed after the most recent choice point (and we are assuming this means trailing is not needed). Finally, the execution fails and untrailing tries to restore the situation at the most recent choice point. However, Figure 7(d) shows that the omission of the last swap trailing was invalid, as untrailing fails to restore the correct situation. Thus, a cell involved in swap trailing still needs trailing later in the same segment of the execution. 8.2 The Ltrail analysis domain The implications for the Ltrail analysis domain are simple: it only needs to distinguish between variables that do not have to be trailed again (deep trailed) and those which have to (rest). In other words, variables can only have one of two possible 27 states at a particular program point: deep trailed or not trailed at all. Hence, the type of elements of our Ltrail domain will be P(Oldp ). The ordering ⊑ is simply ⊇. All the operations we have defined for the Lnotrail domain have to be adapted to this simplification. This adaptation is rather straightforward: every description l in Ltrail is treated as if it were the description (∅, l) in Lnotrail , and new descriptions l′ in Ltrail are obtained by first calculating the (s′ , d′ ) descriptions using the Lnotrail operations and then setting l′ = d′ . 8.3 Optimization based on the analysis Again, the pre-description of every unification is used to improve that unification. The possible optimizations based on the Ltrail domain are more limited than those for the Lnotrail domain, as only deep trailed variables are represented in the descriptions: • For the unification of two variables, a variant without (swap) trailing can be used if both variables are in the pre-description (i.e. deep-trailed). • For the binding of an unbound variable Y to a term f (X1 , ..., Xn ), a variant of the unification without (chain) trailing can be used if Y is in the predescription. In addition, no (swap) trailing is required for any of the Xi that appear in the pre-description. • For the unification of two bound variables, if both variables are in the predescription, or if one is in the pre-description and the other is known to be ground, then no trailing is needed at runtime. This means that if during the recursive unification process of the bound variables, unbound variables are unified or bound, nothing will need to be trailed for these unbound variables. 9 Experimental Results We first examine the effect of the trailing analysis Lnotrail and its associated optimizations on the classic PARMA trailing scheme for HAL. We then look at the effect of the improved PARMA trailing scheme, and at the effect of the use of the trailing analysis Ltrail on the improved PARMA trailing scheme. Finally, we examine the improved PARMA trailing scheme in the context of dProlog. All timing results were obtained on an Intel Pentium 4 2.00 GHz 512 MB. 9.1 Effect of trailing analysis using Lnotrail in HAL The Lnotrail analyzer has been implemented in the analysis framework of HAL and applied to six HAL benchmarks that use the Herbrand solver: icomp, hanoi, qsort, serialize, warplan and zebra. Table 1 gives a summary of these benchmarks. All benchmarks make use of the Herbrand solver and cannot be executed as Mercury programs (without significantly modifying the algorithm and representation). The pre-descriptions inferred for the unifications of these benchmarks have been 28 Table 1. HAL Benchmark descriptions and lines of code Benchmark icomp hanoi qsort serialize warplan zebra Description a cut down version of the interactive BIM compiler the Hanoi puzzle using difference lists the quick sort algorithm using difference lists the classic Prolog palindrome benchmark war planner for robot control the classic five houses puzzle Lines 294 31 43 74 316 82 Table 2. Compilation statistics for notrail analysis Benchmark icomp hanoi qsort serialize warplan zebra Compilation Time Analysis Total Relative 1.170 2.110 55.5 % 0.030 0.350 8.6 % 0.020 0.810 2.5 % 0.040 0.430 9.3 % 1.080 2.590 41.7 % 0.090 0.560 16.1 % Old unifications Improved Total Relative 314 1,542 20.4 % 13 13 100.0 % 7 7 100.0 % 1 20 5.0 % 93 1,347 6.9 % 40 177 22.6 % Size Relative 120.5 % 100.0 % 100.0 % 100.2 % 156.2 % 108.6 % used to optimize the generated Mercury code by avoiding unnecessary trailing, as explained in Section 6. Table 2 shows, for each benchmark, the analysis time in seconds compared to the total compilation time, the number of improved unifications compared to the total number of unifications involving old variables, and the size of generated binary executable. The binary size of the optimized program is expressed as the number of bytes relative to the unoptimized program. The high compilation times obtained for some benchmarks are due to the existence of predicates with many different pre-descriptions, something the analysis has not been optimized for yet. The deterministic nature of both hanoi and qsort benchmarks, allows the analysis to infer that all unifications should be replaced by a non-trailing alternative. In the other benchmarks a much smaller fraction of unifications can be improved due to the heavy use of non-deterministic predicates. The last table shows that due to the multi-variant specialization, there may be a considerable size blow-up. In particular, for icomp and warplan the size is substantially increased. Various approaches to limit the number generated variants, explored in other work, apply to this work as well. For example, one approach is to use profiling information to only retain the most performance-critical variants (see (Ferreira and Damas 2003)). Another approach, taken in (Mazur 2001), is to only generate the most and least optimized variants. The latter would reproduce the optimal result for hanoi and qsort. Table 3 presents the execution times in seconds obtained by executing each benchmark a number of times in a loop; the iteration number in the table gives that loop 29 Table 3. Benchmark timings for classic PARMA: unoptimized (cparma) and optimized with trailing analysis (caparma) Benchmark icomp hanoi qsort serialize warplan zebra Iterations 10,000 10 10,000 10,000 10 200 cparma 0.834 0.990 0.363 0.901 1.293 1.239 Time caparma 0.790 0.707 0.303 0.884 1.407 1.254 relative 94.7 % 71.4 % 83.5 % 98.1 % 108.8 % 101.2 % Table 4. Benchmark trail sizes for classic PARMA: unoptimized (cparma) and optimized with trailing analysis (caparma) Benchmark icomp hanoi qsort serialize warplan zebra Maximum trail cparma caparma relative 5,545 4,217 76.1 % 61,441 0 0.0 % 11,801 0 0.0 % 16,569 12,657 76.4 % 17 9 52.9 % 209 185 88.5 % Trailing operations cparma caparma relative 1,110 860 77.5 % 7,864,300 0 0.0 % 1,510 0 0.0 % 2,120 1,620 76.4 % 102,290 101,820 99.5 % 5,153,800 4,920,600 95.5 % count. This execution process (and the iteration number) is also used to obtain all other results shown for these HAL benchmarks. The significant speed-up obtained for both the hanoi and qsort benchmarks is explained by the effects of replacing all unifications with a non-trailing version on the maximum size of the trail stack (in kilobytes), and on the total number of trailing operations, as shown in Table 4. In the non-deterministic benchmarks, a much smaller fraction of the trailing operations is removed. This results in a smaller speed-up or even a slight slow-down. The slow-down shows that the optimization does not come without a cost. The larger active code size due to the multi-variant specialization has an impact on the instruction cache behavior. Table 5 shows the impact on instruction references and instruction cache misses, obtained with the cachegrind skin of the valgrind memory debugger (see (Nethercote and Seward 2003)). The number of instruction references is the number of times an instruction is retrieved from memory and the instruction cache miss rate is the percentage of instruction references in main memory instead of cache. The table clearly shows that the elimination of all trailing operations results in a considerable reduction of executed instructions. On the other side of the spectrum, the multi-variant specialization has a negative effect on the instruction cache miss rate, which explains the slow-down of the warplan benchmark. 30 Table 5. Benchmark instruction cache misses for classic PARMA: unoptimized (cparma) vs. optimized with trailing analysis (caparma) Benchmark icomp hanoi qsort serialize warplan zebra I1 instruction cache miss rate cparma caparma relative 0.85 % 1.79 % 210.6 % 0.00 % 0.00 % -% 0.00 % 0.00 % -% 0.00 % 0.70 % ∞% 1.55 % 4.44 % 286.5 % 0.40 % 0.10 % 25.0 % Instruction references cparma caparma relative 716 ×106 709 ×106 99.0 % 991 ×106 839 ×106 84.7 % 427 ×106 397 ×106 93.0 % 6 912 ×10 899 ×106 98.6 % 1,559 ×106 1,560 ×106 100.1 % 1,300 ×106 1,291 ×106 99.3 % 9.2 Effect of the improved trailing scheme in the Mercury back-end of HAL The improved unconditional PARMA trailing scheme has also been implemented in the Mercury back-end of HAL. Since Mercury already has a tagged trail, this was not too difficult. Aside from the discussed trailings for unification, this system also requires trailing when a term is constructed with an old variable as an argument. In this term construction, the argument cell in the term structure is inserted in the variable chain. This modifies one cell in the old variable chain. In the classic scheme this cell is trailed with value trailing. To avoid value trailing altogether this has been replaced with swap trailing in the improved trailing scheme. Table 6 presents the timing and maximal trail for both the classic and improved trailing scheme for the six HAL benchmarks used before. Table 6. Timing and maximal trail for the classic (cparma) and improved (iparma) unconditional PARMA trailing scheme for the Mercury back-end of HAL. Benchmark icomp hanoi qsort serialize warplan zebra cparma 0.834 0.990 0.363 0.901 1.293 1.239 Time iparma 0.809 0.944 0.350 0.836 1.284 1.171 relative 97.0 % 95.4 % 96.4 % 92.8 % 99.3 % 94.5 % Maximal trail cparma iparma relative 5,545 3,049 55.0 % 61,441 40,961 66.7 % 11,801 7,857 66.6 % 16,569 10,233 61.8 % 17 9 52.9 % 209 105 50.2 % In all benchmarks the improved trailing scheme is faster than the classic scheme. The differences are a few percentages though, with a maximum difference of slightly more than 7% for the serialize benchmark. Much more important are the effects of the improved trailing scheme on the maximal trail size. The maximal trail is at least 30% and up to 50% smaller for the improved scheme than for the classic scheme. 31 9.3 Effect of the improved trailing scheme combined with trailing analysis Ltrail in the Mercury back-end of HAL The trailing analysis presented in Section 4 and implemented in HAL, was modified, as proposed in Section 8, to deal with the improved trailing scheme. Table 7 presents the timing and maximal trail for the HAL benchmarks obtained under the improved scheme with the information inferred by the modified analysis, and compares the results obtained under the same scheme without any analysis information. Table 7. Timing and maximal trail for the improved unconditional PARMA scheme without (iparma) and with (iaparma) Ltrail trailing analysis, relative to the classic scheme without trailing. Benchmark icomp hanoi qsort serialize warplan zebra iparma 97.0 % 95.4 % 96.4 % 92.8 % 99.3 % 94.5 % Time iaparma 93.3 % 71.6 % 83.5 % 92.8 % 99.7 % 91.9 % relative 96.2 % 75.1 % 86.6 % 100.0 % 100.4 % 97.3 % iparma 55.0 % 66.7 % 66.6 % 61.8 % 52.9 % 50.2 % Maximal trail iaparma relative 47.9 % 87.1 % 0.0 % 0.0 % 0.0 % 0.0 % 61.8 % 100.0 % 52.9 % 100.0 % 46.4 % 92.4 % For the serialize and warplan benchmarks the analysis was not able to reduce the number of actual trailing operations. For the other four benchmarks the combination of the improved scheme with analysis yields better results, both for time and maximal trail. For the hanoi and qsort benchmarks there is again a drastic improvement: all trailings have been avoided, with a distinctive time improvement of 25% and 15 % respectively. For the other two benchmarks, icomp and zebra, there is a maximal trail improvement of about 10% together with a slightly reduced time, 4% and 3% better respectively. Overall, the combination of the improved scheme with the trailing analysis never makes the results worse. Since it drastically improves some benchmarks and shows a modest improvement of others, it is fair to conclude that the combination is superior to the improved system without analysis. 9.4 Effect of the improved trailing scheme in dProlog Let us now present the experimental results of the improved conditional PARMA trailing scheme in dProlog for several small benchmarks and one bigger program, comp. Table 8 shows the timing and maximal trail use for each benchmark. Time is given in seconds and applies to the number of runs (iterations) given. The maximal trail size is given in kilobytes and applies to a single run. The time difference between the classic and the improved scheme is negligible. The improved scheme is at most 8.8% slower, for the zebra benchmark, but on 32 Table 8. PARMA in dProlog: classic (cparma) vs. improved trailing (iparma) Benchmark Iterations boyer 10 browse 10 cal 100 chat 50 crypt 2,000 ham 20 meta qsort 1,250 nrev 50,000 100 poly 10 queens 16 20 queens 100 reducer 200 sdda 12,000 send 100 tak 100 zebra 300 relative average comp 1 comp relative Time cparma iparma .950 .920 1.010 1.010 1.800 1.800 1.020 1.040 1.160 1.170 1.160 1.130 1.070 1.090 .900 .860 .630 .650 1.810 1.790 3.310 3.300 .440 .430 1.000 1.010 .800 .800 1.620 1.520 2.510 2.730 100% 99.9% 1.930 1.890 100% 97.9% Maximal trail cparma iparma 450.6 225.3 5.2 4.5 0.4 0.2 3.6 1.9 0.5 0.2 0.8 0.4 12.6 7.4 0.4 0.2 52.6 26.3 0.7 0.3 0.7 0.3 18.9 10.0 1.3 0.8 0.5 0.2 373.1 186.6 1.6 0.8 100% 51.7% 2516.3 1319.8 100% 52.4% average both are about equally fast. The price for the lower trail usage is an increase in instructions executed and that is why there is no net speedup. The differences in maximal trail use however are substantial. While swap trail and chain trail halve the trail stack consumption, value trailing is still used for some cases of variable–variable trailing. Yet experimental results show that that kind of variable–variable trailing does not occur very often in most benchmarks, as the maximal trail stack is effectively halved in eleven benchmarks and on average the maximal trail use is 51.7% of the classical scheme. The results for the smaller benchmarks are confirmed by the larger comp program. Execution time is nearly the same for the classic and improved trailing scheme and the maximal trail shows a similar improvement of almost 50%. 10 Related and future work As far as we know, the modifications suggested to the classic PARMA trailing scheme are new. A somewhat similar analysis for detecting variables that do not have to be trailed is presented by Debray in (Debray 1992) together with corresponding optimizations. Debray’s analysis however is for the WAM variable representation and in a traditional Prolog setting, i.e., without type, mode and determinism declarations. Also 33 in (Van Roy and Despain 1992) trailing is avoided, but only for variables that are new in our terminology and, again, the setting is basically the WAM representation. Taylor too keeps track of a trailing state of variables in the global analysis of his PARMA system with the classic PARMA trailing scheme (see (Taylor 1991; Taylor 1989)). As opposed to the Lnotrail analysis we have presented here, Taylor’s analysis is less precise and closer to the Ltrail analysis presented here: the trailing state of a variable can only be that it has to be trailed or not, i.e. there is no intermediary shallow trailing state. There exist also two run-time technique for preventing the multiple value trailing between two choice points. The first, described in (Noyé 1994), only works in the WAM scheme, because it introduces linear reference chains that PARMA does not allow. The second, described in (Aggoun and Beldiceanu 1990), maintains a timestamp for every cell that corresponds to the choicepoint before the last update. However, such a timestamp requires additional space, even in the case that the cell is never updated. In the context of PARMA, timestamps would likely consume more space than is actually saved by avoiding trailing. Finally, there are other approaches to the reconstruction of state on backtracking other than trailing, using either copying (Schulte 1999) or recomputation (Van Hentenryck and Ramachandran 1995 While PARMA (and for that matter WAM) bindings do not keep enough information to allow recomputation on backtracking, a copying approach to backtracking in PARMA is quite feasible. This remains as an interesting question for future work. There is little room left for optimization of the trailing analysis for the improved unconditional trailing scheme. Of course, the analysis itself can be improved by adopting a more refined representation for bound variables. Currently, all PARMA chains in the structure of a bound variable are represented by the same trailing state. Bound variables could be represented more accurately, by requiring the domain to keep track of the different chains contained in the structures to which the program variables are bound, their individual trailing state and how these are affected by the different program constructs. Known techniques (see for instance (Janssens and Bruynooghe 1993; Van Hentenryck et al. 1995; Mulkers et al. 1994; Lagoon and Stuckey 2001; Lagoon et al. 2003)) based on type information could be used to keep track of the constructor that a variable is bound to and the trailing state of the different arguments, thereby making this approach possible. This applies equally to the analysis of the classical scheme. Additionally, it would be interesting to see how much extra gain analysis can add to the improved conditional trailing scheme as implemented in dProlog or in the Mercury back-end of HAL that supports conditional trailing. Such analysis would certainly not improve the maximal trail, but it would remove the overhead of the run-time test. This will most likely also result in a small speed-up. Though experimental results show that the improved scheme with analysis is better than the classic scheme with analysis, this need not be true for all programs. Recall that between two choice points all value trailings of a cell but the first can be eliminated in the classic scheme, while no swap trailings could be eliminated in the improved scheme. A hybrid scheme would be possible using analysis to decide on a single unification basis if either swap trailing or value trailing is better at minimizing 34 the amount of trailing and the cost of untrailing. This analysis would require a more global view of all the trailings in between two choice points. Moreover, some trailings could be common to different pairs of choice points and optimality would depend on where execution spends most of its time. Also the untrailing operation can be improved: when analysis is able to determine for instance that the only trailing that happened was a swap trailing, no tags need to be set and tested. Acknowledgements We would like to thank the referees for their detailed and insightful reports which have significantly improved the paper. References Aggoun, A. and Beldiceanu, N. 1990. Time Stamps Techniques for the Trailed Data in Constraint Logic Programming Systems. In SPLT’90: 8ème Séminaire Programmation en Logique, S. Bourgault and M. Dincbas, Eds. CNET, Trégastel, France, 487–510. Aı̈t-Kaci, H. 1991. Warren’s Abstract Machine: A Tutorial Reconstruction. MIT Press. Bruynooghe, M. 1991. A Practical Framework for the Abstract Interpretation of Logic Programs. Journal of Logic Programming 10, 1/2/3&4, 91–124. Bueno, F., de la Banda, M. J. G., Hermenegildo, M. V., Marriott, K., Puebla, G., and Stuckey, P. J. 2001. A Model for Inter-module Analysis and Optimizing Compilation. In LOPSTR ’00: Selected Papers form the 10th International Workshop on Logic Based Program Synthesis and Transformation, K.-K. Lau, Ed. Lecture Notes in Computer Science, vol. 2042. Springer Verlag, London, UK, 86–102. de la Banda, M. J. G., Demoen, B., Marriott, K., and Stuckey, P. J. 2002. To the Gates of HAL: A HAL Tutorial. In FLOPS 2002: Proceedings of the 6th International Symposium on Functional and Logic Programming, Z. Hu and M. Rodrı́guez-Artalejo, Eds. Lecture Notes in Computer Science, vol. 2441. Springer Verlag, Aizu, Japan, 47–66. de la Banda, M. J. G., Marriott, K., Stuckey, P. J., and Søndergaard, H. 1998. Differential Methods in Logic Program Analysis. Journal of Logic Programming 35, 1, 1–37. Debray, S. 1992. A Simple Code Improvement Scheme for Prolog. Journal of Logic Programming 13, 1 (May), 57–88. Demoen, B., de la Banda, M. J. G., Harvey, W., Marriott, K., and Stuckey, P. J. 1999. An Overview of HAL. In CP’99: Proceedings of the 5th International Conference on Principles and Practice of Constraint Programming, J. Jaffar, Ed. Lecture Notes in Computer Science, vol. 1713. Springer Verlag, Alexandria, Virginia, USA, 174–188. Demoen, B. and Nguyen, P.-L. 2000. So Many WAM Variations, so Little Time. In CL2000: Proceedings of the 1st International Conference on Computational Logic, J. Lloyd, V. Dahl, U. Furbach, M. Kerber, K.-K. Lau, C. Palamidessi, L. Moniz Pereira, Y. Sagiv, and P. J. Stuckey, Eds. Lecture Notes in Artificial Intelligence, vol. 1861. ALP, Springer Verlag, London, UK, 1240–1254. Ferreira, M. and Damas, L. 2003. Controlling Code Expansion in a Multiple Specialization Prolog Compiler. In Proceedings of CICLOPS 2003: Colloquium on Implementation of Constraint and LOgic Programming Systems, R. Lopes and M. Ferreira, Eds. University of Porto, Mumbai, India, 75–87. Technical Report DCC-2003-05, DCC - FC & LIACC, Univeristy of Porto, December 2003. 35 Janssens, G. and Bruynooghe, M. 1993. Deriving Descriptions of Possible Value of Program Variables by means of Abstract Interpretation. Journal of Logic Programming 13, 205–258. Lagoon, V., Mesnard, F., and Stuckey, P. J. 2003. Termination Analysis with Types Is More Accurate. In ICLP 2003: Proceedings of the 19th International Conference on Logic Programming, C. Palamidessi, Ed. Lecture Notes in Computer Science, vol. 2916. Springer Verlag, Mumbai, India, 254–268. Lagoon, V. and Stuckey, P. 2001. A Framework for Analysis of Typed Logic Programs. In FLOPS 2001: Proceedings of the 5th International Symposium on Functional and Logic Programming, H. Kuchen and K. Ueda, Eds. Lecture Notes in Computer Science, vol. 2024. Springer Verlag, Tokyo, Japan, 296–310. Lindgren, T., Mildner, P., and Bevemyr, J. 1995. On Taylor’s Scheme for Unbound Variables. Tech. rep., Computer Science Department, Uppsala University. Oct. Mazur, N. 2001. Compile-time Garbage Collection for the Declarative Language Mercury. Ph.D. thesis, Department of Computer Science, K.U.Leuven, Leuven, Belgium. Mulkers, A., Winsborough, W. H., and Bruynooghe, M. 1994. Live-Structure Dataflow Analysis for Prolog. ACM Transactions on Programming Languages and Systems 16, 2, 205–258. Nethercote, N. 2001. The Analysis Framework of HAL. M.S. thesis, University of Melbourne. Nethercote, N. and Seward, J. 2003. Valgrind: A Program Supervision Framework. Electronic Notes in Theoretical Computer Science 89, 2, 1–23. Noyé, J. 1994. Elagage de contexte, retour arrière superficiel, modifications réversibles et autres: une étude approfondie de la WAM. Ph.D. thesis, Université de Rennes I. Schulte, C. 1999. Comparing Trailing and Copying for Constraint Programming. In Proceedings of the Sixteenth International Conference on Logic Programming, D. De Schreye, Ed. MIT Press, Las Cruces, NM, USA, 275–289. Somogyi, Z., Henderson, F., and Conway, T. 1996. The Execution Algorithm of Mercury, an Efficient Purely Declarative Logic Programming Language. Journal of Logic Programming 29, 1–3, 17–64. Søndergaard, H. 1986. An Application of Abstract Interpretation of Logic Programs: Occur Check Reduction. In ESOP 86: Proceedings of the European Symposium on Programming, B. Robinet and R. Wilhelm, Eds. Lecture Notes in Computer Science, vol. 213. Springer Verlag, Saarbrücken, Germany, 327–338. Taylor, A. 1989. Removal of Dereferencing and Trailing in Prolog Compilation. In Proceedings of the 6th Internation Conference on Logic Programming, G. Levi and M. Martelli, Eds. MIT Press, Lisbon, Portugal, 48–60. Taylor, A. 1991. High Performace Prolog Implementation. Ph.D. thesis, Basser Department of Computer Science. Taylor, A. 1996. Parma - Bridging the Performance GAP Between Imperative and Logic Programming. Journal of Logic Programming 29, 1-3, 5–16. Van Hentenryck, P., Cortesi, A., and Charlier, B. L. 1995. Type analysis of Prolog using Type Graphs. Journal of Logic Programming 22, 3, 179–209. Van Hentenryck, P. and Ramachandran, V. 1995. Backtracking without Trailing in CLP(Rlin). ACM Transactions on Programming Languages and Systems 17, 4 (July), 635–671. Van Roy, P. and Despain, A. 1992. High-Performance Logic Programming with the Aquarius Prolog Compiler. IEEE Computer 25, 1, 54–68. 36
6cs.PL
An Optimal Algorithm for ℓ1-Heavy Hitters in Insertion Streams and Related Problems arXiv:1603.00213v1 [cs.DS] 1 Mar 2016 Arnab Bhattacharyya⋆ , Palash Dey⋆ , and David P. Woodruff† ⋆ Indian Institute of Science, Bangalore † ⋆ IBM Research, Almaden {arnabb,palash}@csa.iisc.ernet.in,† [email protected] Abstract We give the first optimal bounds for returning the ℓ1 -heavy hitters in a data stream of insertions, together with their approximate frequencies, closing a long line of work on this problem. For a stream of m items in {1, 2, . . . , n} and parameters 0 < ε < ϕ 6 1, let fi denote the frequency of item i, i.e., the number of times item i occurs in the stream. With arbitrarily large constant probability, our algorithm returns all items i for which fi > ϕm, returns no items j for which fj 6 (ϕ − ε)m, and returns approximations f˜i with |f˜i − fi | 6 εm for each item i that it returns. Our algorithm uses O(ε−1 log ϕ−1 + ϕ−1 log n + log log m) bits of space, processes each stream update in O(1) worst-case time, and can report its output in time linear in the output size. We also prove a lower bound, which implies that our algorithm is optimal up to a constant factor in its space complexity. A modification of our algorithm can be used to estimate the maximum frequency up to an additive εm error in the above amount of space, resolving Question 3 in the IITK 2006 Workshop on Algorithms for Data Streams for the case of ℓ1 -heavy hitters. We also introduce several variants of the heavy hitters and maximum frequency problems, inspired by rank aggregation and voting schemes, and show how our techniques can be applied in such settings. Unlike the traditional heavy hitters problem, some of these variants look at comparisons between items rather than numerical values to determine the frequency of an item. 1 Introduction The data stream model has emerged as a standard model for processing massive data sets. Because of the sheer size of the data, traditional algorithms are no longer feasible, e.g., it may be hard or impossible to store the entire input, and algorithms need to run in linear or even sublinear time. Such algorithms typically need to be both randomized and approximate. Moreover, the data may not physically reside on any device, e.g., if it is internet traffic, and so if the data is not stored by the algorithm, it may be impossible to recover it. Hence, many algorithms must work given only a single pass over the data. Applications of data streams include data warehousing [HSST05, BR99, FSG+ 98, HPDW01], network measurements [ABW03, CKMS08, DLOM02, EV03], sensor networks [BGS01, SBAS04], and compressed sensing [GSTV07, CRT06]. We refer the reader to recent surveys on the data stream model [Mut05, Nel12, Cor12]. One of the oldest and most fundamental problems in the area of data streams is the problem of finding the ℓ1 -heavy hitters (or simply, “heavy hitters”), also known as the top-k, most popular items, frequent items, elephants, or iceberg queries. Such algorithms can be used as subroutines in network flow identification at IP routers [EV03], association rules and frequent itemsets [AS94, SON95, Toi96, Hid99, HPY00], iceberg queries and iceberg datacubes [FSG+ 98, BR99, HPDW01]. The survey [CH08] presents an overview of the state-of-the-art for this problem, from both theoretical and practical standpoints. We now formally define the heavy hitters problem that we focus on in this paper: 1 Definition 1. ((ε, ϕ)-Heavy Hitters Problem) In the (ε, ϕ)-Heavy Hitters Problem, we are given parameters 0 < ε < ϕ 6 1 and a stream a1 , . . . , am of items aj ∈ {1, 2, . . . , n}. Let fi denote the number of occurrences of item i, i.e., its frequency. The algorithm should make one pass over the stream and at the end of the stream output a set S ⊆ {1, 2, . . . , n} for which if fi > ϕm, then i ∈ S, while if fi 6 (ϕ − ε)m, then i∈ / S. Further, for each item i ∈ S, the algorithm should output an estimate f˜i of the frequency fi which satisfies |fi − f˜i | 6 εm. Note that other natural definitions of heavy hitters Pn are possible and sometimes used. For example, ℓ2 heavy hitters are those items i for which fi2 > ϕ2 j=1 fj2 , and more generally, ℓp -heavy hitters are those Pn items i for which fip > ϕp j=1 fjp . It is in this sense that Definition 1 corresponds to ℓ1 -heavy hitters. While ℓp -heavy hitters for p > 1 relax ℓ1 -heavy hitters and algorithms for them have many interesting applications, we focus on the most direct and common formulation of the heavy hitters notion. We are interested in algorithms which use as little space in bits as possible to solve the (ε, ϕ)-Heavy Hitters Problem. Further, we are also interested in minimizing the update time and reporting time of such algorithms. Here, the update time is defined to be the time the algorithm needs to update its data structure when processing a stream insertion. The reporting time is the time the algorithm needs to report the answer after having processed the stream. We allow the algorithm to be randomized and to succeed with probability at least 1 − δ for 0 < δ < 1. We do not make any assumption on the ordering of the stream a1 , . . . , am . This is desirable as often in applications one cannot assume a best-case or even a random order. We are also interested in the case when the length m of the stream is not known in advance, and give algorithms in this more general setting. The first algorithm for the (ε, ϕ)-Heavy Hitters Problem was given by Misra and Gries [MG82], who achieved O(ε−1 (log n + log m)) bits of space for any ϕ > ε. This algorithm was rediscovered by Demaine et al. [DLOM02], and again by Karp et al. [KSP03]. Other than these algorithms, which are deterministic, there are also a number of randomized algorithms, such as the CountSketch [CCFC04], Count-Min sketch [CM05], sticky sampling [MM02], lossy counting [MM02], space-saving [MAE05], sample and hold [EV03], multi-stage bloom filters [CFM09], and sketch-guided sampling [KX06]. Berinde et al. [BICS10] show that using O(kε−1 log(mn)) bits of space, one can achieve the stronger guarantee of reporting, for each item i ∈ S, res(k) res(k) f˜i with |f˜i − fi | 6 ε/kF1 , where F1 < m denotes the sum of frequencies of items in {1, 2, . . . , n} excluding the frequencies of the k most frequent items. We emphasize that prior to our work the best known algorithms for the (ε, ϕ)-Heavy Hitters Problem used O(ε−1(log n + log m)) bits of space. Two previous lower bounds were known. The first is a lower bound n of log( 1/ϕ ) = Ω(ϕ−1 log(ϕn)) bits, which comes from the fact that the output set S can contain ϕ−1 items and it takes this many bits to encode them. The second lower bound is Ω(ε−1 ) which follows from a folklore reduction from the randomized communication complexity of the Index problem. In this problem, there are two players, Alice and Bob. Alice has a bit string x of length (2ε)−1 , while Bob has an index i. Alice creates a stream of length (2ε)−1 consisting of one copy of each j for which xj = 1 and copies of a dummy item to fill the rest of the stream. She runs the heavy hitters streaming algorithm on her stream and sends the state of the algorithm to Bob. Bob appends (2ε)−1 copies of the item i to the stream and continues the execution of the algorithm. For ϕ = 1/2, it holds that i ∈ S. Moreover, fi differs by an additive εm factor depending on whether xi = 1 or xi = 0. Therefore by the randomized communication complexity of the Index problem [KNR99], the (ε, 1/2)-heavy hitters problem requires Ω(ε−1 ) bits of space. Although this proof was for ϕ = 1/2, no better lower bound is known for any ϕ > ε. Thus, while the upper bound for the (ε, ϕ)-Heavy Hitters Problem is O(ε−1 (log n + log m)) bits, the best known lower bound is only Ω(ϕ−1 log n + ε−1 ) bits. For constant ϕ, and log n ≈ ε−1 , this represents a nearly quadratic gap in upper and lower bounds. Given the limited resources of devices which typically run heavy hitters algorithms, such as internet routers, this quadratic gap can be critical in applications. A problem related to the (ε, ϕ)-Heavy Hitters Problem is estimating the maximum frequency in a data stream, also known as the ℓ∞ -norm. In the IITK 2006 Workshop on Algorithms for Data Streams, Open Question 3 asks for an algorithm to estimate the maximum frequency of any item up to an additive εm error using as little space as possible. The best known space bound is still O(ε−1 log n) bits, as stated in the original formulation of the question (note that the “m” in the question there corresponds to the “n” here). 2 Space complexity Problem (ε, ϕ)-Heavy Hitters ε-Maximum and ℓ∞ -approximation ε-Minimum ε-Borda ε-Maximin Upper bound O ε −1 −1 −1 log ϕ + ϕ log n + log log m [Theorem 1 and 7]  O ε−1 log ε−1 + log n + log log m [Theorem 1 and 7]  −1 O ε log log ε−1 + log log m [Theorem 4 and 8]  O n(log ε−1 + log n) + log log m [Theorem 5 and 8]  O nε−2 log2 n + log log m [Theorem 6 and 8] Lower bound  log ϕ + ϕ−1 log n + log log m [Theorem 9 and 14]  Ω ε−1 log ε−1 + log n + log log m [Theorem 9 and 14]  Ω ε−1 + log log m [Theorem 11 and 14]  Ω n(log ε−1 + log n) + log log m [Theorem 12 and 14]  Ω n(ε−2 + log n) + log log m [Theorem 13] Ω ε −1 −1  Table 1: The bounds hold for constant success probability algorithms and for n sufficiently large in terms of ε. For the (ε, ϕ)-Heavy Hitters problem and the ε-Maximum problem, we also achieve O(1) update time and reporting time which is linear in the size of the output. The upper bound for ε-Borda (resp. ε-Maximin) is for returning every item’s Borda score (resp. Maximin score) up to an additive εmn (resp. additive εm), while the lower bound for ε-Borda (resp. ε-Maximin) is for returning only the approximate Borda score (resp. Maximin score) of an approximate maximum. Note that, if one can find an item whose frequency is the largest, up to an additive εm error, then one can solve this problem. The latter problem is independently interesting and corresponds to finding approximate plurality election winners in voting streams [DB15]. We refer to this problem as the ε-Maximum problem. Finally, we note that there are many other variants of the (ε, ϕ)-Heavy Hitters Problem that one can consider. One simple variant of the above is to output an item of frequency within εm of the minimum frequency of any item in the universe. We refer to this as the ε-Minimum problem. This only makes sense for small universes, as otherwise outputting a random item typically works. This is useful when one wants to count the “number of dislikes”, or in anomaly detection; see more motivation below. In other settings, one may not have numerical scores associated with the items, but rather, each stream update consists of a “ranking” or “total ordering” of all stream items. This may be the case in ranking aggregation on the web (see, e.g., [MBG04, MYCC07]) or in voting streams (see, e.g., [CS05, CP11, DB15, Xia12]). One may consider a variety of aggregation measures, such as the Borda score of an item i, which asks for the sum, over rankings, of the number of items j 6= i for which i is ranked ahead of j in the ranking. Alternatively, one may consider the Maximin score of an item i, which asks for the minimum, over items j 6= i, of the number of rankings for which i is ranked ahead of j. For these aggregation measures, one may be interested in finding an item whose score is an approximate maximum. This is the analogue of the ε-Maximum problem above. Or, one may be interested in listing all items whose score is above a threshold, which is the analogue of the (ε, ϕ)-Heavy Hitters Problem. We give more motivation of these variants of heavy hitters in this section below, and more precise definitions in Section 2. 1.1 Our Contributions Our results are summarized in Table 1. We note that independently of this work and nearly parallelly, there have been improvements to the space complexity of the ℓ2 -heavy hitters problem in insertion streams [BCIW16] and to the time complexity of the ℓ1 -heavy hitters problem in turnstile1 streams [LNNT16]. These works use very different techniques. 1 In a turnstile stream, updates modify an underlying n-dimensional vector x initialized at the zero vector; each update is of the form x ← x + ei or x ← x − ei where ei is the i’th standard unit vector. In an insertion stream, only updates of the form x ← x + ei are allowed. 3 Our first contribution is an optimal algorithm and lower bound for the (ε, ϕ)-Heavy Hitters Problem. Namely, we show that there is a randomized algorithm with constant probability of success which solves this problem using O(ε−1 log ϕ−1 + ϕ−1 log n + log log m) bits of space, and we prove a lower bound matching up to constant factors. In the unit-cost RAM model with O(log n) bit words, our algorithm has O(1) update time and reporting time linear in the output size, under the standard assumptions that the length of the stream and universe size are at least poly(ε−1 log(1/ϕ)). Furthermore, we can achieve nearly the optimal space complexity even when the length m of the stream is not known in advance. Although the results of [BICS10] achieve stronger error bounds in terms of the tail, which are useful for skewed streams, here we focus on the original formulation of the problem. Next, we turn to the problem of estimating the maximum frequency in a data stream up to an additive εm. We give an algorithm using O(ε−1 log ε−1 + log n + log log m) bits of space, improving the previous best algorithms which required space at least Ω(ε−1 log n) bits, and show that our bound is tight. As an example setting of parameters, if ε−1 = Θ(log n) and log log m = O(log n), our space complexity is O(log n log log n) bits, improving the previous Ω(log2 n) bits of space algorithm. We also prove a lower bound showing our algorithm is optimal up to constant factors. This resolves Open Question 3 from the IITK 2006 Workshop on Algorithms for Data Streams in the case of insertion streams, for the case of “ℓ1 -heavy hitters”. Our algorithm also returns the identity of the item with the approximate maximum frequency, solving the ε-Maximum problem. We then focus on a number of variants of these problems. We first give nearly tight bounds for finding an item whose frequency is within εm of the minimum possible frequency. While this can be solved using our new algorithm for the (ε, ε)-Heavy Hitters Problem, this would incur Ω(ε−1 log ε−1 + log log m) bits of space, whereas we give an algorithm using only O(ε−1 log log(ε−1 ) + log log m) bits of space. We also show a nearly matching Ω(ε−1 + log log m) bits of space lower bound. We note that for this problem, a dependence on n is not necessary since if the number of possible items is sufficiently large, then outputting the identity of a random item among the first say, 10ε−1 items, is a correct solution with large constant probability. Finally, we study variants of heavy hitter problems that are ranking-based. In this setting, each stream update consists of a total ordering of the n universe items. For the ε-Borda problem, we give an algorithm using O(n(log ε−1 + log log n) + log log m) bits of space to report the Borda score of every item up to an additive εmn. We also show this is nearly optimal by proving an Ω(n log ε−1 + log log m) bit lower bound for the problem, even in the case when one is only interested in outputting an item maximum Borda score up to an additive εmn. For the ε-Maximin problem, we give an algorithm using O(nε−2 log2 n + log log m) bits of space to report the maximin score of every item up to an additive εm, and prove an Ω(nε−2 + log log m) bits of space lower bound even in the case when one is only interested in outputting the maximum maximin score up to an additive εm. This shows that finding heavy hitters with respect to the maximin score is significantly more expensive than with respect to the Borda score. 1.2 Motivations for Variants of Heavy Hitters While the (ε, ϕ)-Heavy Hitters and ε-Maximum problem are very well-studied in the data stream literature, the other variants introduced are not. We provide additional motivation for them here. For the ε-Minimum problem, in our formulation, an item with frequency zero, i.e., one that does not occur in the stream, is a valid solution to the problem. In certain scenarios, this might not make sense, e.g., if a stream containing only a small fraction of IP addresses. However, in other scenarios we argue this is a natural problem. For instance, consider an online portal where users register complaints about products. Here, minimum frequency items correspond to the “best” items. That is, such frequencies arise in the context of voting or more generally making a choice: in cases for which one does not have a strong preference for an item, but definitely does not like certain items, this problem applies, since the frequencies correspond to “number of dislikes”. 4 The ε-Minimum problem may also be useful for anomaly detection. Suppose one has a known set of sensors broadcasting information and one observes the “From:” field in the broadcasted packets. Sensors which send a small number of packets may be down or defective, and an algorithm for the ε-Minimum problem could find such sensors. Finding items with maximum and minimum frequencies in a stream correspond to finding winners under plurality and veto voting rules respectively in the context of voting2 [BCE+ 15]. The streaming aspect of voting could be crucial in applications like online polling [KTW11], recommender systems [RV97, HKTR04, AT05] where the voters are providing their votes in a streaming fashion and at every point in time, we would like to know the popular items. While in some elections, such as for political positions, the scale of the election may not be large enough to require a streaming algorithm, one key aspect of these latter votingbased problems is that they are rank-based which is useful when numerical scores are not available. Orderings naturally arise in several applications - for instance, if a website has multiple parts, the order in which a user visits the parts given by its clickstream defines a voting, and for data mining and recommendation purposes the website owner may be interested in aggregating the orderings across users. Motivated by this connection, we define similar problems for two other important voting rules, namely Borda and maximin. The Borda scoring method finds its applications in a wide range of areas of artificial intelligence, for example, machine learning [HHS94, CP06, VZ14, PPR15], image processing [LN06, MG09], information retrieval [Li14, AM01, NC06], etc. The Maximin score is often used when the spread between the best and worst outcome is very large (see, e.g., p. 373 of [MR91]). The maximin scoring method also has been used frequently in machine learning [WL04, JMP+ 14], human computation [MPC12, MPC13], etc. 2 Preliminaries We denote the disjoint union of sets by ⊔. We denote the set of all permutations of a set U by L(U). For a positive integer ℓ, we denote the set {1, . . . , ℓ} by [ℓ]. In most places, we ignore floors and ceilings for the sake of notational simplicity. 2.1 Model of Input Data The input data is an insertion-only stream of elements from some universe U. In the context of voting, the input data is an insertion-only stream over the universe of all possible rankings (permutations). 2.2 Communication Complexity We will use lower bounds on communication complexity of certain functions to prove space complexity lower bounds for our problems. Communication complexity of a function measures the number of bits that need to be exchanged between two players to compute a function whose input is split among those two players [Yao79]. In a more restrictive one-way communication model, Alice, the first player, sends only one message to Bob, the second player, and Bob outputs the result. A protocol is a method that the players follow to compute certain functions of their input. Also the protocols can be randomized; in that case, the protocol needs to output correctly with probability at least 1 − δ, for δ ∈ (0, 1) (the probability is taken over the random coin tosses of the protocol). The randomized one-way communication complexity of a function f with error probability δ is denoted by R1-way (f ). [KN97] is a standard reference for communication complexity. δ 2.3 Model of Computation Our model of computation is the unit-cost RAM model on words of size O(log n), capable of generating uniformly random words and of performing arithmetic operations in {+, −, log2 } in one unit of time. We note that this model of computation has been used before [DHKP97]. We store an integer C using a variable length array of [BB08] which allows us to read and update C in O(1) time and O(log C) bits of space. 2 In fact, the first work [Moo81] to formally pose the heavy hitters problem couched it in the context of voting. 5 2.4 Universal Family of Hash Functions Definition 2. (Universal family of hash functions) A family of functions H = {h|h : A → B} is called a universal family of hash functions if for all a 6= b ∈ A, Pr{h(a) = h(b)} = 1/|B|, where h is picked uniformly at random from H. We know that there exists a universal family of hash functions H from [k] to [ℓ] for every positive integer ℓ and every prime k [LRSC01]. Moreover, |H|, the size of H, is O(k 2 ). 2.5 Problem Definitions We now formally define the problems we study here. Suppose we have 0 < ε < ϕ < 1. Definition 3. (ε, ϕ)-List heavy hitters Given an insertion-only stream of length m over a universe U of size n, find all items in U with frequency more than ϕm, along with their frequencies up to an additive error of εm, and report no items with frequency less than (ϕ − ε)m. Definition 4. ε-Maximum Given an insertion-only stream of length m over a universe U of size n, find the maximum frequency up to an additive error of εm. Next we define the minimum problem for 0 < ε < 1. Definition 5. ε-Minimum Given an insertion-only stream of length m over a universe U of size n, find the minimum frequency up to an additive error of εm. Next we define related heavy hitters problems in the context of rank aggregation. The input is a stream of rankings (permutations) over an item set U for the problems below. The Borda score of an item i is the sum, over all rankings, of the number of items j 6= i for which i is ranked ahead of j in the ranking. Definition 6. (ε, ϕ)-List borda Given an insertion-only stream over a universe L(U) where |U| = n, find all items with Borda score more than ϕmn, along with their Borda score up to an additive error of εmn, and report no items with Borda score less than (ϕ − ε)mn. Definition 7. ε-Borda Given an insertion-only stream over a universe L(U) where |U| = n, find the maximum Borda score up to an additive error of εmn. The maximin score of an item i is the minimum, over all items j 6= i, of the number of rankings for which i is ranked ahead of j. Definition 8. (ε, ϕ)-List maximin Given an insertion-only stream over a universe L(U) where |U| = n, find all items with maximin score more than ϕm along with their maximin score up to an additive error of εm, and report no items with maximin score less than (ϕ − ε)m. Definition 9. ε-maximin Given an insertion-only stream over a universe L(U) where |U| = n, find the maximum maximin score up to an additive error of εm. Notice that the maximum possible Borda score of an item is m(n − 1) = Θ(mn) and the maximum possible maximin score of an item is m. This justifies the approximation factors in Definition 6 to 9. We note that finding an item with maximum Borda score within additive εmn or maximum maximin score within additive εm corresponds to finding an approximate winner of an election (more precisely, what is known as an ε-winner) [DB15]. 6 3 Algorithms In this section, we present our upper bound results. All omitted proofs are in Appendix B. Before describing specific algorithms, we record some claims for later use. Lemma 1 follows by checking whether we get all heads in log m tosses of a fair coin. Lemma 1. Suppose m is a power of two3 . Then there is an algorithm A for choosing an item with probability 1/m that has space complexity of O(log log m) bits and time complexity of O(1) in the unit-cost RAM model. Proof. We generate a (log2 m)-bit integer C uniformly at random and record the sum of the digits in C. Choose the item only if the sum of the digits is 0, i.e. if C = 0. We remark that the algorithm in Lemma 1 has optimal space complexity as shown in Proposition 2 in Appendix B. Our second claim is a standard result for universal families of hash functions. 2 Lemma 2. For S ⊆ A, δ ∈ (0, 1), and universal family of hash functions H = {h|h : A → [⌈|S| /δ⌉]}: Pr [∃i 6= j ∈ S, h(i) = h(j)] 6 δ h∈U H Proof. For every i 6= j ∈ S, since H is a universal family of hash functions, we have Prh∈U H [h(i) = h(j)] 6 |S|2 1 ⌈|S|2 /δ⌉ . Now we apply the union bound to get Prh∈U H [∃i 6= j ∈ S, h(i) = h(j)] 6 ⌈|S|2 /δ⌉ 6 δ Our third claim is folklore and also follows from the celebrated DKW inequality [DKW56]. We provide a simple proof here that works for constant δ. Lemma 3. Let fi and fˆi be the frequencies of an item i in a stream S and in a random sample T of size r from S, respectively. Then for r > 2ε−2 log(2δ −1 ), with probability 1 − δ, for every universe item i simultaneously, fˆi fi − 6 ε. r m Proof for constant δ. This follows by Chebyshev’s inequality and a union bound. Indeed, consider a given i ∈ [n] with frequency fi and suppose we sample each of its occurrences pairwise-independently with probability r/m, for a parameter r. Then the expected number E[fˆi ] of sampled occurrences is fi · r/m and the variance Var[fˆi ] is fi · r/m(1 − r/m) 6 fi r/m. Applying Chebyshev’s inequality, h 4fi r rε i Var[fˆi ] 6 . 6 Pr fˆi − E[fˆi ] > 2 (rε/2)2 mr2 ε2 4fi . By the union bound, if we sample Setting r = εC2 for a constant C > 0 makes this probability at most Cm r each element in the stream independently with probability m , then the probability there exists an i for which Pn 4fi 4 1 |fˆi − E[fˆi ]| > rε i=1 Cm 6 C , which for C > 400 is at most 100 , as desired. 2 is at most For now, assume that the length of the stream is known in advance; we show in Section 3.5 how to remove this assumption. 3 In all our algorithms, whenever we pick an item with probability p > 0, we can assume, without loss of generality, that 1/p is a power of two. If not, then we replace p with p′ where 1/p′ is the largest power of two less than 1/p. This does not affect correctness and performance of our algorithms. 7 3.1 List Heavy Hitters For the (ε, ϕ)-List heavy hitters problem, we present two algorithms. The first is slightly suboptimal, but simple conceptually and already constitutes a very large improvement in the space complexity over known algorithms. We expect that this algorithm could be useful in practice as well. The second algorithm is more complicated, building on ideas from the first algorithm, and achieves the optimal space complexity upto constant factors. We note that both algorithms proceed by sampling O(ε−2 ln(1/δ)) stream items and updating a data structure as the stream progresses. In both cases, the time to update the data structure is bounded by O(1/ε), and so, under the standard assumption that the length of the stream is at least poly(ln(1/δ)ε), the time to perform this update can be spread out across the next O(1/ε) stream updates, since with large probability there will be no items sampled among these next O(1/ε) stream updates. Therefore, we achieve worst-case4 update time of O(1). 3.1.1 A simpler, near-optimal algorithm Theorem 1. Assume the stream length is known beforehand. Then there is a randomized one-pass algorithm A for the (ε, ϕ)-List heavy hitters problem  which succeeds with probability at least 1 − δ using O ε−1 (log ε−1 + log log δ −1 ) + ϕ−1 log n + log log m bits of space. Moreover, A has an update time of O(1) and reporting time linear in its output size. Overview The overall idea is as follows. We sample ℓ = O(ε−2 ) many items from the stream uniformly at random as well as hash the id’s (the word “id” is short for identifier) of the sampled elements into a space of size O(ε−4 ). Now, both the stream length as well as the universe size are poly(ε−1 ). From Lemma 3, it suffices to solve the heavy hitters problem on the sampled stream. From Lemma 2, because the hash function is chosen from a universal family, the sampled elements have distinct hashed id’s. We can then feed these elements into a standard Misra-Gries data structure with ε−1 counters, incurring space O(ε−1 log ε−1 ). Because we want to return the unhashed element id’s for the heavy hitters, we also use log n space for recording the ϕ−1 top items according to the Misra-Gries data structure and output these when asked to report. Proof of Theorem 1. The pseudocode of our (ε, ϕ)-List heavy hitters algorithm is in Algorithm 1. By Lemma 3, if we select a subset S of size at least ℓ = 6ε−2 log(6δ −1 ) uniformly at random from the stream, then Pr[∀i ∈ U, |(fˆi/|S|) − (fi/n)| 6 ε] > 1 − δ/3, where fi and fˆi are the frequencies of item i in the input stream and S respectively. First we show that with the choice of p in line 10 in Algorithm 1, the number of items sampled is at least ℓ and at most 11ℓ with probability at least (1 − δ/3). Let Xi be the indicator random Pmvariable of the event that the item xi is sampled for i ∈ [m]. Then the total number of items sampled X = i=1 Xi . We have E[X] = 6ℓ since p = 6ℓ/m. Now we have the following. Pr[X 6 ℓ or X > 11ℓ] 6 Pr[|X − E[X]| > 5ℓ] 6 δ/3 The inequality follows from the Chernoff bound and the value of ℓ. From here onwards we assume that the number of items sampled is in [ℓ, 11ℓ]. We use (a modified version of) the Misra-Gries algorithm [MG82] to estimate the frequencies of items in S. The length of the table in the Misra-Gries algorithm is ε−1 . We pick a hash function h uniformly at 2 random from a universal family H = {h|h : [n] → ⌈4ℓ /δ ⌉} of hash functions of size |H| = O(n2 ). Note that picking a hash function h uniformly at random from H can be done using O(log n) bits of space. Lemma 2 shows that there are no collisions in S under this hash function h with probability at least 1 − δ/3. From here onwards we assume that there is no collision among the ids of the sampled items under the hash function h. We modify the Misra-Gries algorithm as follows. Instead of storing the id of any item x in the Misra-Gries table (table T1 in line 5 in Algorithm 1) we only store the hash h(x) of the id x. We also store the ids (not 4 We emphasize that this is stronger than an amortized guarantee, as on every insertion, the cost will be O(1). 8 Algorithm 1 for (ε, ϕ)-List heavy hitters Input: A stream S of length m over U = [n]; let f (x) be the frequency of x ∈ U in S Output: A set X ⊆ U and a function fˆ : X → N such that if f (x) > ϕm, then x ∈ X and f (x) − εm 6 fˆ(x) 6 f (x) + εm and if f (y) 6 (ϕ − ε)m, then y ∈ / X for every x, y ∈ U 1: Initialize: 2: ℓ ← 6 log(6/δ)/ε2 2 3: Hash function h uniformly at random from a universal family H ⊆ {h : [n] → ⌈4ℓ /δ⌉}. −1 4: An empty table T1 of (key, value) pairs of length ε . Each key entry of T1 can store an 2 integer in [0, ⌈400ℓ /δ⌉] and each value entry can store an integer in [0, 11ℓ]. ⊲ The table T1 will be in sorted order by value throughout. 5: An empty table T2 of length 1/ϕ. Each entry of T2 can store an integer in [0, n]. ⊲ The entries of T2 will correspond to ids of the keys in T1 of the highest 1/ϕ values 6: 7: 8: 9: 10: 11: 12: 13: 14: 15: 16: 17: 18: 19: procedure Insert(x) With probability p = 6ℓ/m, continue. Otherwise, return . Perform Misra-Gries update using h(x) maintaining T1 sorted by values. if The value of h(x) is among the highest 1/ϕ valued items in T1 then if xi is not in T2 then if T2 currently contains 1/ϕ many items then For y in T2 such that h(y) is not among the highest 1/ϕ valued items in T1 , replace y with x. else We put x in T2 . Ensure that elements in T2 are ordered according to corresponding values in T1 . procedure Report( ) return items in T2 along with their corresponding values in T1 the hash of the id) of the items with highest 1/ϕ values in T1 in another table T2 . Moreover, we always maintain the table T2 consistent with the table T1 in the sense that the ith highest valued key in T1 is the hash of the ith id in T2 . Upon picking an item x with probability p, we create an entry corresponding to h(x) in T1 and make its value one if there is space available in T1 ; decrement the value of every item in T1 by one if the table is already full; increment the entry in the table corresponding to h(x) if h(x) is already present in the table. When we decrement the value of every item in T1 , the table T2 remains consistent and we do not need to do anything else. Otherwise there are three cases to consider. Case 1: h(x) is not among the 1/ϕ highest valued items in T1 . In this case, we do not need to do anything else. Case 2: h(x) was not among the 1/ϕ highest valued items in T1 but now it is among the 1/ϕ highest valued items in T1 . In this case the last item y in T2 is no longer among the 1/ϕ highest valued items in T1 . We replace y with x in T2 . Case 3: h(x) was among the 1/ϕ highest valued items in T1 . When the stream finishes, we output the ids of all the items in table T2 along with the values corresponding to them in table T1 . Correctness follows from the correctness of the Misra-Gries algorithm and the fact that there is no collision among the ids of the sampled items. 3.1.2 An optimal algorithm Theorem 2. Assume the stream length is known beforehand. Then there is a randomized one-pass algorithm A for the (ε, ϕ)-List heavy  hitters problem which succeeds with constant probability using O ε−1 log ϕ−1 + ϕ−1 log n + log log m bits of space. Moreover, A has an update time of O(1) and reporting time linear in its output size. Note that in this section, for the sake of simplicity, we ignore floors and ceilings and state the results for 9 a constant error probability, omitting the explicit dependence on δ. Algorithm 2 for (ε, ϕ)-List heavy hitters Input: A stream S of length m over universe U = [n]; let f (x) be the frequency of x ∈ U in S Output: A set X ⊆ U and a function fˆ : X → N such that if f (x) > ϕm, then x ∈ X and f (x) − εm 6 fˆ(x) 6 f (x) + εm and if f (y) 6 (ϕ − ε)m, then y ∈ / X for every x, y ∈ U 1: Initialize: 2: ℓ ← 105 ε−2 3: s ← 0 4: Hash functions h1 , . . . , h200 log(12ϕ−1 ) uniformly at random from a universal family H ⊆ {h : [n] → [100/ε]}. 5: An empty table T1 of (key, value) pairs of length 2ϕ−1 . Each key entry of T1 can store an element of [n] and each value entry can store an integer in [0, 10ℓ]. 6: An empty table T2 with 100ε−1 rows and 200 log(12ϕ−1 ) columns. Each entry of T2 can store an integer in [0, 100εℓ]. 7: An empty 3-dimensional table T3 of size at most 100ε−1 × 200 log(12ϕ−1 ) × 4 log(ε−1 ). Each entry of T3 can store an integer in [0, 10ℓ]. ⊲ These are upper bounds; not all the allowed cells will actually be used. 8: 9: 10: 11: 12: 13: 14: 15: 16: 17: 18: 19: 20: 21: 22: 23: 24: 25: 26: 27: procedure Insert(x) With probability ℓ/m, increment s and continue. Else, return Perform Misra-Gries update on T1 with x. for j ← 1 to 200 log(12ϕ−1 ) do i ← hj (x) With probability ε, increment T2 [i, j] t ← ⌊log(10−6 T2 [i, j]2 )⌋ and p ← min(ε · 2t , 1) if t > 0 then With probability p, increment T3 [i, j, t] procedure Report( ) X←∅ for each key x with nonzero value in T1 do for j ← 1 to 200 log(12ϕ−1 ) do P4 log(ε−1 ) T3 [h(x), j, t]/ min(ε2t , 1) fˆj (x) ← t=0 fˆ(x) ← median(fˆ1 , . . . , fˆ10 log ϕ−1 ) if fˆ(x) > (ϕ − ε/2)s then X ← X ∪ {x} return X, fˆ Overview As in the simpler algorithm, we sample ℓ = O(ε−2 ) many stream elements and solve the (ε/2, ϕ)List heavy hitters problem on this sampled stream. Also, the Misra-Gries algorithm for (ϕ/2, ϕ)-List heavy hitters returns a candidate set of O(ϕ−1 ) items containing all items of frequency at least ϕℓ. It remains to count the frequencies of these O(ϕ−1 ) items with upto εℓ/2 = O(ε−1 ) additive error, so that we can remove those whose frequency is less than (ϕ − ε/2)ℓ. Fix some item i ∈ [n], and let fi be i’s count in the sampled stream. A natural approach to count fi approximately is to increment a counter probabilistically, instead of deterministically, at every occurrence of i. Suppose that we increment a counter with probability 0 6 pi 6 1 whenever h i item i arrives in the stream. ˆ Let the value of the counter be ĉi , and let fi = ĉi /pi . We see that E fˆi = fi and Var[fˆi ] 6 fi /pi . It follows that if pi = Θ(ε2 fi ), then Var[fˆi ] = O(ε−2 ), and hence, fˆi is an unbiased estimator of fi with additive 10 error O(ε−1 ) with constant probability. We call such a counter an accelerated counter as the probability of incrementing accelerates with increasing counts. For each i, we can maintain O(log ϕ−1 ) accelerated counters independently and take their median to drive the probability of deviating by more than O(ε−1 ) down to O(ϕ). So, with constant probability, the frequency for each of the O(ϕ−1 ) items in the Misra-Gries data structure is estimated within O(ε−1 ) error, as desired. However, there are two immediate issues with this approach. The first problem is that we may need to keep counts for Ω(ℓ) = Ω(ε−2 ) distinct items, which is too costly for our purposes. To get around this, we use a hash function from a universal family to hash the universe to a space of size u = Θ(ε−1 ), and we work throughout with the hashed id’s. We can then show that the space complexity for each iteration is O(ε−1 ). Also, the accelerated counters now estimate frequencies of hashed id’s instead of actual items, but because of universality, the expected frequency of any hashed id is ℓ/u = O(ε−1 ), our desired error bound. The second issue is that we need a constant factor approximation of fi , so that we can set pi to Θ(ε2 fi ). But because the algorithm needs to be one-pass, we cannot first compute pi in one pass and then run the accelerated counter in another. So, we divide the stream into epochs in which fi stays within a factor of 2, and use a different pi for each epoch. In particular, set pti = ε · 2t for 0 6 t 6 log(pi /ε). We want to keep a running estimate of i’s count to within a factor of 2 to know if the current epoch should be incremented. For this, we subsample each element of the stream with probability ε independently and maintain exact counts for the observed hashed id’s. It is easy to see that this requires only O(ε−1 ) bits in expectation. Consider any i ∈ [u] and the prefix of the stream upto b 6 ℓ, and let fi (b) be i’s frequency in the prefix, let c̄i (b) be i’s   frequency among the samples in the prefix, and f¯i (b) = c̄iε(b) . We see that E f¯i (b) = fi (b), Moreover, we show that for any b ∈ [ℓ], f¯i (b) is a 4-factor approximation of fi (b) with constant probability. By repeating O(log ϕ−1 ) times independently and taking the median, the error probability can be driven down to O(ϕ). Now, for every hashed id i ∈ [u], we need not one accelerated counter but O(log(εfi )) many, one corresponding to each epoch t. When an element with hash id i arrives at position b, we decide, based on f¯i (b), the epoch t it belongs to and then increment the t’th accelerated counter with probability pti . The storage cost over all i is still O(1/ε). Also, we iterate the whole set of accelerated counters O(log ϕ−1 ) times, making the total storage cost O(ε−1 log ϕ−1 ). P Let ĉi,th bei the count in the accelerated counter for hash id i and epoch t. Then, let fˆi = t ĉi,t /pti . Clearly, E fˆi = fi . The variance is O(ε−2 ) in each epoch, and so, Var[fˆi ] = O(ε−2 log ε−1 ), not O(ε−2 ) which we wanted. This issue is fixed by a change in how the sampling probabilities are defined. We now go on to the formal proof. Proof of Theorem 2. Pseudocode appears in Algorithm 2. Note that the numerical constants are chosen for convenience of analysis and have not been optimized. Also, for the sake of simplicity, the pseudocode does not have the optimal reporting time, but it can be modified to achieve this; see the end of this proof for details. By standard Chernoff bounds, with probability at least 99/100, the length of the sampled stream ℓ/10 6 s 6 10ℓ. For x ∈ [n], let fsamp (x) be the frequency of x in the sampled stream. By Lemma 3, with probability at least 9/10, for all x ∈ [n]: fsamp (x) f (x) ε − 6 s m 4 P −1 Now, fix j ∈ [10 log ϕ ] and x ∈ [n]. Let i = hj (x) and fi = y:hj (y)=hj (x) fsamp (y). Then, for a random f (x) ε hj ∈ H, the expected value of fsi − samp is 100 , since H is a universal mapping to a space of size 100ε−1. s Hence, using Markov’s inequality and the above:       1 f (x) fsamp fsamp (x) fi 1 3 ε ε ε f (x) fi 6 Pr + Pr < − − − + < (1) > > > Pr m s 2 m s 4 m s 4 10 25 20 In Lemma 4 below, we show that for each j ∈ [200 log(12ϕ−1 )], with error probability at most 3/10, fˆj (x) (in line 23) estimates fi with additive error at most 5000ε−1, hence estimating fsi with additive error at most 2ε . Taking the median over 200 log(12ϕ−1 ) repetitions (line 24) makes the error probability go down 11 to ϕ6 using standard Chernoff bounds. Hence, by the union bound, with probability at least 2/3, for each of (x) the 2/ϕ keys x with nonzero values in T1 , we have an estimate of f m within additive error ε, thus showing correctness. Lemma 4. Fix x ∈ [n] and j ∈ [200 log 12ϕ−1 ], and let i = hj (x). Then, Pr[|fˆj (x) − fi | > 5000ε−1] 6 3/10, where fˆj is the quantity computed in line 23. Proof. Index the sampled stream elements 1, 2, . . . , s, and for b ∈ [s], let fi (b) be the frequency of items with hash id i restricted to the first b elements of the sampled stream. Let f¯i (b) denote the value of T2 [i, j] · ε−1 after the procedure Insert has been called for the first b items of the sampled stream. Claim 1. With probability at least 9/10, for all b ∈ [s] such that fi (b) > 100ε−1, f¯i (b) is within a factor of 4 of fi (b).   Proof. Fix b ∈ [s]. Note that E f¯i (b) = fi (b) as T2 is incremented with rate ε. Var[f¯i (b)] 6 fi /ε, and so by Chebyshev’s inequality: 4 Pr[|f¯i (b) − fi (b)| > fi (b)/2] < fi (b)ε We now break the stream into chunks, apply this inequality to each chunk and then take a union bound to conclude. Namely, for any integer t > 0, define bt to be the first b such that 100ε−1 2t 6 fi (b) < 100ε−12t+1 if such a b exists. Then: X 4 Pr[∃t > 0 : |f¯i (bt ) − fi (bt )| > fi (bt )/2] < 100 · 2t−1 t < 1 10 So, with probability at least 9/10, every f¯i (bt ) and fi (bt ) are within a factor of 2 of each other. Since for every b > b0 , fi (b) is within a factor of 2 from some fi (bt ), the claim follows. Assume the event in Claim 1 henceforth. Now, we are ready to analyze T3 and in particular, fˆj (x). First of all, observe that if t < 0 in line 15, at some position b in the stream, then T2 [i, j] at that time must be at most 1000, and so by standard Markov and Chernoff bounds, with probability at least 0.85, ( < 4000ε−1, if t < 0 fi (b) (2) > 100ε−1 , if t > 0 i h Assume this event. Then, fi − 4000ε−1 6 E fˆj (x) 6 fi . Claim 2. Var(fˆj (x)) 6 20000ε−2 Proof. If the stream element at position b causes an increment in T3 with probability ε2t (in line 17), then 1000 · 2t/2 6 T2 [i, j] 6 1000 · 2(t+1)/2 , and so, f¯i (b) 6 1000ε−12(t+1)/2 . This must be the case for the highest b = b̄t at which the count for i in T3 increments at the t’th slot. The number of such occurrences of i is at most fi (b̄t ) 6 4f¯i (b̄t ) 6 4000ε−12(t+1)/2 by Claim 1 (which can be applied since fi (b) > 100ε−1 by Equation 2). So: Var[fˆj (x)] 6 X fi (b̄t ) t>0 ε2t 6 X 4000 t>0 ε2 2−t/3 6 20000ε−2 Elements inserted with probability 1 obviously do not contribute to the variance. 12 So, conditioning on the events mentioned, the probability that fˆj (x) deviates from fi by more than 5000ε−1 is at most 1/50. Removing all the conditioning yields what we wanted: Pr[|fˆj (x) − fi | > 5000ε−1] 6 1 3 1 + + 6 0.3 50 20 10 We next bound the space complexity. Claim 3. With probability at least 2/3, Algorithm 2 uses O(ε−1 log ϕ−1 + ϕ−1 log n + log log m) bits of storage, if n = ω(ε−1 ). Proof. The expected length of the sampled stream is ℓ = O(ε−2 ). So, the number of bits stored in T1 is O(ϕ−1 log n). For T2 , note that in lines 13-15, for any given j, T2 is storing a total of εℓ = O(ε−1 ) elements in expectation. So, for k > 0, there can be at most O((ε2k )−1 ) hashed id’s with counts between 2k and 2k+1 . Summing over all k’s and accounting for the empty cells gives O(ε−1 ) bits of storage, and so the total space requirement of T2 is O(ε−1 log ϕ−1 ). . The probability that a hashed id i gets counted in table T3 is at most 10−6 ε3 f¯i2 (s) from line 15 and our definition of f¯i above. Moreover, from Claim 1, we have that this is at most 16 · 10−6 ε3 fi2 (s) if fi > 100ε−1. Therefore, if fi = 2k · 100ε−1 with k > 0, then the expected value of a cell in T3 with first coordinate i is at most 1600 · 22k ε = 2O(k) . Taking into account that there are at most O((ε2k )−1 ) many such id’s i and that the number of epochs t associated with such an i is at most log(16 · 10−6 ε2 fi2 ) = O(log(εfi )) = O(k) (from line 15), we get that the total space required for T3 is: O(log ϕ−1 ) X O(ε−1 ) + j=1 = O(ε−1 log ϕ−1 ) ∞ X k=0 ! O((ε2k )−1 ) · O(k) · O(k) where the first O(ε−1 ) term inside the summation is for the i’s with fi < 100ε−1. Since we have an expected space bound, we obtain a worst-case space bound with error probability 1/3 by a Markov bound. The space required for sampling is an additional O(log log m), using Lemma 1. We note that the space bound can be made worst case by aborting the algorithm if it tries to use more space. The only remaining aspect of Theorem 2 is the time complexity. As observed in Section 3.1, the update time can be made O(1) per insertion under the standard assumption of the stream being sufficiently long. The reporting time can also be made linear in the output by changing the bookkeeping a bit. Instead of computing fˆj and fˆ at reporting time, we can maintain them after every insertion. Although this apparently makes INSERT costlier, this is not true in fact because we can spread the cost over future stream insertions. The space complexity grows by a constant factor. 3.2 Maximum By tweaking Algorithm 1 slightly, we get the following result for the ε-Maximum problem. Theorem 3. Assume the length of the stream is known beforehand. Then there is a randomized onepass algorithm A for the ε-Maximum problem which succeeds with probability at least 1 − δ using O (min{1/ε, n}(log 1/ε + log log 1/δ) + log n + log log m) bits of space. Moreover, the algorithm A has an update time of O(1). Proof. Instead of maintaining the table T2 in Algorithm 1, we just store the actual id of the item with maximum frequency in the sampled items. 13 3.3 Minimum Theorem 4. Assume the length of the stream is known beforehand. Then there is a randomized one-pass algorithm A for the ε-Minimum problem which succeeds with probability at least 1 − δ using O ((1/ε) log log(1/εδ) + log log m) bits of space. Moreover, the algorithm A has an update time of O(1). Overview Pseudocode is provided in Algorithm 3. The idea behind our ε-Minimum problem is as follows. It is most easily explained by looking at the REPORT(x) procedure starting in line 13. In lines 14-15 we ask, is the universe size |U | significantly larger than 1/ε? Note that if it is, then outputting a random item from |U | is likely to be a solution. Otherwise |U | is O(1/ε). The next point is that if the number of distinct elements in the stream were smaller than 1/(ε log(1/ε)), then we could just store all the items together with their frequencies with O(1/ε) bits of space. Indeed, we can first sample O(1/ε2 ) stream elements so that all relative frequencies are preserved up to additive ε, thereby ensuring each frequency can be stored with O(log(1/ε) bits. Also, since the universe size is O(1/ε), the item identifiers can also be stored with O(log(1/ε) bits. So if this part of the algorithm starts taking up too much space, we stop, and we know the number of distinct elements is at least 1/(ε log(1/ε)), which means that the minimum frequency is at most O(mε log(1/ε)). This is what is being implemented in steps 9-10 and 18-19 in the algorithm. We can also ensure the minimum frequency is at least Ω(mε/ log(1/ε)). Indeed, by randomly sampling O((log(1/ε)/ε) stream elements, and maintaining a bit vector for whether or not each item in the universe occurs - which we can with O(1/ε) bits of space since |U | = O(1/ε) - any item with frequency at least Ω(εm/ log(1/ε)) will be sampled and so if there is an entry in the bit vector which is empty, then we can just output that as our solution. This is what is being implemented in steps 8 and 16-17 of the algorithm. Finally, we now know that the minimum frequency is at least Ω(mε/ log(1/ε)) and at most O(mε log(1/ε)). At this point if we randomly sample O((log6 1/ε)/ε) stream elements, then by Chernoff bounds all item frequencies are preserved up to a relative error factor of (1 ± 1/ log2 (1/ε)), and in particular the relative minimum frequency is guaranteed to be preserved up to an additive ε. At this point we just maintain the exact counts in the sampled stream but truncate them once they exceed poly(log(1/ε))) bits, since we know such counts do not correspond to the minimum. Thus we only need O(log log(1/ε)) bits to represent their counts. This is implemented in step 11 and step 20 of the algorithm. Proof of Theorem 4. The pseudocode of our ε-Minimum algorithm is in Algorithm 3. If the size of the universe |U| is at least 1/((1−δ)ε), then we return an item x chosen from U uniformly at random. Note that there can be at most 1/ε many items with frequency at least εm. Hence every item x among other remaining δ/((1−δ)ε) many items has frequency less than εm and thus is a correct output of the instance. Thus the probability that we answer correctly is at least (1 − δ). From here on, let us assume |U| < 1/((1−δ)ε). Now, by the value of pj , it follows from the proof of Theorem 1 that we can assume ℓj < |Sj | < 11ℓj for j = 1, 2, 3 which happens with probability at least (1 − (δ/3)). We first show that every item in U with frequency at least εm is sampled in S1 with probability at least (1 − (δ/6)). For that, let Xij be the indicator random variable for the event that the j th sample in S1 is item i where i ∈ U is an item with frequency at least εm. Let H ⊂ U be the set of items with frequencies at least εm. Then we have the following. Pr[Xij = 0] = 1 − ε ⇒ Pr[Xij = 0 ∀j ∈ S1 ] 6 (1 − ε)ℓ1 6 exp{−εℓ1 } = εδ/6 Now applying union bound we get the following. Pr[∃i ∈ H, Xij = 0 ∀j ∈ S1 ] 6 (1/ε)εδ/6 6 δ/6 Hence with probability at least (1 − (δ/3) − (δ/6)) > (1 − δ), the output at line 17 is correct. Now we show below that if the frequency of any item x ∈ U is at most ε ln(6/δ)/ln(6/εδ), then x ∈ S1 with probability at least (1 − (δ/6)). ln(6/εδ)/ε Pr[x ∈ / S1 ] = (1 − ε ln(6/δ)/ln(6/εδ)) 6 δ/6 14 Algorithm 3 for ε-Minimum Input: A stream S = (xi )i∈[m] ∈ U m of length m over U; let f (x) be the frequency of x ∈ U in S Output: An item x ∈ U such that f (x) 6 f (y) + εm for every y ∈ U 1: Initialize: 2: 3: 6: 7: 8: 9: 10: 11: 12: 13: 14: 15: 16: 17: 18: 19: 20: 4: 5: ℓ1 ← log(6/εδ)/ε, ℓ2 ← log(6/δ)/ε2 , ℓ3 ← log p1 ← 6ℓ1/m, p2 ← 6ℓ2/m, p3 ← 6ℓ3/m S1 , S2 , S3 ← ∅ B1 ← the bit vector for S1 6 6 ( /δε) /ε procedure Insert(x) Put x in S1 with probability p1 by updating the bit vector B1 if the number of distinct items in the stream so far is at most 1/(ε log(1/ε)) then Pick x with probability p2 and put the id of x in S2 and initialize the corresponding counter to 1 if x ∈ / S2 and increment the counter corresponding to x by 1. Pick x with probability p3 , put the id of x in S3 and initialize the corresponding counter to 1 if xi ∈ / S3 and increment the counter corresponding to xi by 1. Truncate counters of S3 at 2 log7 (2/εδ). procedure Report( ) if |U| > 1/((1−δ)ε) then return an item x from the first 1/((1−δ)ε) items in U (ordered arbitrarily) uniformly at random if S1 6= U then return any item from U \ S1 if the number of distinct items in the stream is at most 1/(ε log(1/ε)) then return an item in S2 with minimum counter value in S2 return the item with minimum frequency in S3 Hence from here onwards we assume that the frequency of every item in U is at least εm ln(6/δ)/ln(6/εδ). If the number of distinct elements is at most 1/(ε ln(1/ε)), then line 19 outputs the minimum frequency item up to an additive factor of εm due to Chernoff bound. Note that we need only O(ln(1/((1−δ)ε))) bits of space for storing ids. Hence S2 can be stored in space O((1/ε ln(1/ε)) ln(1/((1−δ)ε) ln ln(1/δ )) = O(1/ε ln ln(1/δ)). Now we can assume that the number of distinct elements is at least 1/(ε ln(1/ε)). Hence if f (t) is the frequency of the item t with minimum frequency, then we have mε/ln(1/ε) 6 f (t) 6 mε ln(1/ε). Let fi be the frequency of item i ∈ U, ei be the counter value of i in S3 , and fˆi = ei m/ℓ3 . Now again by applying Chernoff bound we have the following for any fixed i ∈ U. Pr[|fi − fˆi | > fi/ln2 (1/ε)] 6 2 exp{−ℓ3 fi/(m ln4 (1/ε))} 2 6 ( /εδ ) 6 2 exp{−fi ln 6 εδ/6. /(εm)} Now applying union bound we get the following using the fact that |U| 6 1/ε(1−δ). Pr[∀i ∈ U, |fi − fˆi | 6 fi/ln2 (1/ε)] > 1 − δ/6 Again by applying Chernoff bound and union bound we get the following. Pr[∀i ∈ U with fi > 2mε ln(1/ε), |fi − fˆi | 6 fi/2] > 1 − δ/6 Hence the items with frequency more than 2mε ln(1/ε) are approximated up to a multiplicative factor of 1/2 from below in S3 . The counters of these items may be truncated. The other items with frequency at most 2mε ln(1/ε) are be approximated up to (1 ± 1/ln2 (1/ε)) relative error and thus up to an additive error of εm/3. 15 The counters of these items would not get truncated. Hence the item with minimum counter value in S3 is the item with minimum frequency up to an additive εm. We need O(ln(1/εδ )) bits of space for the bit vector B1 for the set S1 . We need O(ln2 (1/εδ )) bits of space for the set S2 and O((1/ε) ln ln(1/εδ )) bits of space for the set S3 (by the choice of truncation threshold). We need an additional O (ln ln m) bits of space for sampling using Lemma 1. Moreover, using the data structure of Section 3.3 of [DLOM02] Algorithm 3 can be performed in O(1) time. Alternatively, we may also use the strategy described in Section 3.1 of spreading update operations over several insertions to make the cost per insertion be O(1). 3.4 Borda and Maximin Theorem 5. Assume the length of the stream is known beforehand. Then there is a randomized onepass algorithm A for (ε, ϕ)-List Borda   problem which succeeds with probability at least 1 − δ using O n log n + log 1ε + log log δ1 + log log m bits of space. Proof. Let ℓ = 6ε−2 log(6nδ −1 ) and p = 6ℓ/m. On each insertion of a vote v, select v with probability p and store for every i ∈ [n], the number of candidates that candidate i beats in the vote v. Keep these exact counts in a counter of length n. Then it follows from the proof of Theorem 1 that ℓ 6 |S| 6 11ℓ with probability at least (1 − δ/3). Moreover, from a straightforward application of the Chernoff bound (see [DB15]), it follows that if ŝ(i) denotes the Borda score of candidate i restricted to the sampled votes, then:   m ŝ(i) − s(i) < εmn > 1 − δ Pr ∀i ∈ [n], |S| The space complexity for exactly storing the counts is O(n log(nℓ)) = O(n(log n + log ε−1 + log log δ −1 )) and the space for sampling the votes is O(log log m) by Lemma 1. Theorem 6. Assume the length of the stream is known beforehand. Then there is a randomized onepass algorithm A for (ε, ϕ)-List maximin problem which succeeds with probability at least 1 − δ using  O nε−2 log2 n + nε−2 log n log δ −1 + log log m bits of space. Proof. Let ℓ = (8/ε2 ) ln(6n/δ ) and p = 6ℓ/m. We put the current vote in a set S with probability p. Then it follows from the proof of Theorem 1 that ℓ 6 |S| 6 11ℓ with probability at least (1 − δ/3). Suppose |S| = ℓ1 ; let S = {vi : i ∈ [ℓ1 ]} be the set of votes sampled. Let DE (x, y) be the total number of votes in which x beats y and DS (x, y)) be the number of such votes in S. Then by the choice of ℓ and the Chernoff bound (see [DB15]), it follows that |DS (x, y)m/ℓ1 − DE (x, y)| 6 εm/2 for every pair of candidates x, y ∈ U. Note that each vote can be stored in O(n log n) bits of space. Hence simply finding DS (x, y) for every x, y ∈ U by storing S and returning all the items with maximin score at least (ϕ − ε/2)ℓ1 in S requires O nε−2 log n(log n + log δ −1 ) + log log m bits of memory, with the additive O(log log m) due to Lemma 1. 3.5 Unknown stream length Now we consider the case when the length of the stream is not known beforehand. We present below an algorithm for (ε, ϕ)-List heavy hitters and ε-Maximum problems in the setting where the length of the stream is not known beforehand. Theorem 7. There is a randomized one-pass algorithm for (ε, ϕ)-List heavy hitters and ε-Maximum  problems with space complexity O ε−1 log ε−1 + ϕ−1 log n + log log m bits and update time O(1) even when the length of the stream is not known beforehand. 16 Proof. We describe below a randomized one-pass algorithm for the (8ε, ϕ)-List heavy hitters problem. We may assume that the length of the stream is at least 1/ε2 ; otherwise, we use the algorithm in Theorem 1 and get the result. Now we guess the length of the stream to be 1/ε2 , but run an instance I1 of Algorithm 1 with ℓ = log(6/δ)/ε3 at line 2. By the choice of the size of the sample (which is Θ(log(1/δ)/ε3 )), I1 outputs correctly with probability at least (1 − δ), if the length of the stream is in [1/ε2 , 1/ε3 ]. If the length of the stream exceeds 1/ε2 , we run another instance I2 of Algorithm 1 with ℓ = log(6/δ)/ε3 at line 2. Again by the choice of the size of the sample, I2 outputs correctly with probability at least (1 − δ), if the length of the stream is in [1/ε3 , 1/ε4 ]. If the stream length exceeds 1/ε3 , we discard I1 , free the space it uses, and run an instance I3 of Algorithm 1 with ℓ = log(6/δ)/ε3 at line 2 and so on. At any point of time, we have at most two instances of Algorithm 1 running. When the stream ends, we return the output of the older of the instances we are currently running. We use the approximate counting method of Morris [Mor78] to approximately count the length of the stream. We know that the Morris counter outputs correctly with k probability (1 − 2− /2 ) using O(log log m+ k) bits of space at any point in time [Fla85]. Also, since the Morris counter increases only when an item is read, it outputs correctly up to a factor of four at every position if it outputs correctly at positions 1, 2, 4, . . . , 2⌊log2 m⌋ ; call this event E. Then we have Pr(E) > 1 − δ by choosing k = 2 log2 (log2 m/δ) and applying union bound over the positions 1, 2, 4, . . . , 2⌊log2 m⌋ . The correctness of the algorithm follows from the correctness of Algorithm 1 and the fact that we are discarding at most εm many items in the stream (by discarding a run of an instance of Algorithm 1). The space complexity and the O(1) update time of the algorithm follow from Theorem 1, the choice of k above, and the fact that we have at most two instances of Algorithm 1 currently running at any point of time. The algorithm for the ε-Maximum problem is same as the algorithm above except we use the algorithm in Theorem 3 instead of Algorithm 1. Note that this proof technique does not seem to apply to our optimal Algorithm 2. Similarly to Theorem 7, we get the following result for the other problems. Theorem 8. There are randomized one-pass algorithms for ε-Minimum, (ε, ϕ)-Borda, and (ε, ϕ)-Maximin  problems with space complexity O ((1/ε) log log(1/εδ ) + log log m), O n log n + log 1ε + log log 1δ + log log m ,  and O nε−2 log2 n + nε−2 log n log(1/δ) + log log m bits respectively even when the length of the stream is not known beforehand. Moreover, the update time for ε-Minimum is O(1). 4 Hardness In this section, we prove space complexity lower bounds for the ε-Heavy hitters, ε-Minimum, ε-Borda, and ε-maximin problems. We present reductions from certain communication problems for proving space complexity lower bounds. Let us first introduce those communication problems with necessary results. 4.1 Communication Complexity Definition 10. ( Indexingm,t ) Let t and m be positive integers. Alice is given a string x = (x1 , · · · , xt ) ∈ [m]t . Bob is given an index i ∈ [t]. Bob has to output xi . The following is a well known result [KN97]. Lemma 5. R1-way (Indexingm,t ) = Ω(t log m) for constant δ ∈ (0, 1). δ [SW15] defines a communication problem called Perm, which we generalize to ε-Perm as follows. Definition 11. (ε-Perm) Alice is given a permutation σ over [n] which is partitioned into 1/ε many contiguous blocks. Bob is given an index i ∈ [n] and has to output the block in σ where i belongs. 17 Our lower bound for ε-Perm matches the lower bound for Perm in Lemma 1 in [SW15] when ε = 1/n. For the proof, the reader may find useful some information theory facts described in Appendix A. Lemma 6. R1-way (ε − Perm) = Ω(n log(1/ε)), for any constant δ < 1/10. δ Proof. Let us assume σ, the permutation Alice has, is uniformly distributed over the set of all permutations. Let τj denotes the block the item j is in for j ∈ [n], τ = (τ1 , . . . , τn ), and τ<j = (τ1 , . . . , τj−1 ). Let M (τ ) be Alice’s message to Bob, which is a random variable depending on the randomness of σ and the private coin tosses of Alice. Then we have R1−way (ε − Perm) > H(M (τ )) > I(M (τ ); τ ). Hence it is enough to lower bound I(M (τ ); τ ). Then we have the following by chain rule. I(M (τ ); τ ) = = > n X j=1 n X j=1 n X j=1 I(M (τ ); τj |τ<j ) H(τj |τ< j) − H(τj |M (τ ), τ< j) H(τj |τ< j) − = H(τ ) − n X j=1 n X j=1 H(τj |M (τ )) H(τj |M (τ )) n The number of ways to partition n items into 1/ε blocks is n!/((εn)!)(1/ε) which is Ω((n/e) /(εn/e)n ). Hence we have H(τ ) = n log(1/ε). Now we consider H(τj |M (τ )). By the correctness of the algorithm, Fano’s inequality, we have H(τj |M (τ )) 6 H(δ) + (1/10) log2 ((1/ε) − 1) 6 (1/2) log(1/ε). Hence we have the following. I(M (τ ); τ ) > (n/2) log(1/ε) Finally, we consider the Greater-than problem. Definition 12. ( Greater-thann ) Alice is given an integer x ∈ [n] and Bob is given an integer y ∈ [n], y 6= x. Bob has to output 1 if x > y and 0 otherwise. The following result is due to [Smi88, MNSW98]. We provide a simple proof of it that seems to be missing5 in the literature. Lemma 7. R1-way (Greater-thann ) = Ω(log n), for every δ < 1/4. δ Proof. We reduce the Augmented-indexing2,⌈log n⌉+1 problem to the Greater-thann problem thereby proving the result. Alice runs the Greater-thann protocol with its input number whose representation in binary is a = (x1 x2 · · · x⌈log n⌉ 1)2 . Bob participates in the Greater-thann protocol with its input number whose representation in binary is b = (x1 x2 · · · xi−1 1 0| ·{z · · 0} )2 . Now xi = 1 if and only if a > b. (⌈log n⌉−i+1) 0′ s 4.2 Reductions We observe that a trivial Ω((1/ϕ) log n) bits lower bound for (ε, ϕ)-List heavy hitters, (ε, ϕ)-List borda, (ε, ϕ)-List maximin follows from the fact that any algorithm may need to output 1/ϕ many items from the universe. Also, there is a trivial Ω(n log n) lower bound for (ε, ϕ)-List borda and (ε, ϕ)-List maximin because each stream item is a permutation on [n], hence requiring Ω(n log n) bits to read. We show now a space complexity lower bound of Ω( 1ε log ϕ1 ) bits for the ε-Heavy hitters problem. 5A similar proof appears in [KNR99] but theirs gives a weaker lower bound. 18 Theorem 9. Suppose the size of universe n is at least 1/4ε(ϕ−ε) and that ϕ > 2ε. Any randomized one pass (ε, ϕ)-Heavy hitters algorithm with success probability at least (1 − δ) must use Ω((1/ε) log 1/ϕ) bits of space, for constant δ ∈ (0, 1). Proof. Consider the Indexing1/2(ϕ−ε),1/2ε problem where Alice is given a string x = (x1 , x2 , · · · , x1/ε ) ∈ 1 [1/2(ϕ−ε)] /2ε and Bob is given an index i ∈ [1/2ε]. We assume ϕ > 2ε. The stream we generate is over [1/2(ϕ−ε)] × [1/2ε] ⊆ U (this is possible since |U| > 1/(4ε(ϕ−ε))). Let m be a large positive integer. Alice generates a stream of length m/2 by inserting εm copies of (xj , j) for each j ∈ [1/2ε]. Alice now sends the memory content of the algorithm to Bob. Bob resumes the run of the algorithm by generating another stream of length m/2 by inserting (ϕ − ε)m copies of (j, i) for each j ∈ [1/2(ϕ−ε)]. The length of the stream is m, the frequency of the item (xi , i) is ϕm, while the frequency of every other item is (ϕ − ε)m or εm. Hence from the output of the (ε, ϕ)-Heavy hitters algorithm, Bob 1 knows i with probability at least (1−δ). Now the result follows from Lemma 5, since 1ε log ϕ−ε > 1ε log ϕ1 . We now use the same idea as in the proof of Theorem 9 to prove an Ω( 1ε log 1ε ) space complexity lower bound for the ε-Maximum problem. Theorem 10. Suppose the size of universe n is at least ε12 . Any randomized one pass ε-Maximum algorithm with success probability at least (1 − δ) must use Ω( 1ε log 1ε ) bits of space, for constant δ ∈ (0, 1). Proof. Consider the Indexing1/ε,1/ε problem where Alice is given a string x = (x1 , x2 , · · · , x1/ε ) ∈ [1/ε] /ε and Bob is given an index i ∈ [1/ε]. The stream we generate is over [1/ε] × [1/ε] ⊆ U (this is possible since |U| > ε12 ). Let m be a large positive integer. Alice generates a stream of length m/2 in such a way that the frequency of every item in {(xj , j) : j ∈ [1/ε]} is at least ⌊εm/2⌋ and the frequency of any other item is 0. Alice now sends the memory content of the algorithm to Bob. Bob resumes the run of the algorithm by generating another stream of length m/2 in such a way that the frequency of every item in {(j, i) : j ∈ [1/ε]} is at least ⌊εm/2⌋ and the frequency of any other item is 0. The frequency of the item (xi , i) is at least ⌊εm⌋ where as the frequency of every other item is at most ⌊εm/2⌋. Hence the ε/5-Maximum algorithm must output (xi , i) with probability at least (1 − δ). Now the result follows from Lemma 5. 1 For ε-Minimum, we prove a space complexity lower bound of Ω(1/ε) bits. Theorem 11. Suppose the universe size n is at least 1/ε. Then any randomized one pass ε-Minimum algorithm must use Ω(1/ε) bits of space. Proof. We reduce from Indexing2,5/ε to ε-Minimum thereby proving the result. Let the inputs to Alice and Bob in Indexing2,5/ε be (x1 , . . . , x5/ε ) ∈ {0, 1}5/ε and an index i ∈ [5/ε] respectively. Alice and Bob generate a stream S over the universe [(5/ε) + 1]. Alice puts two copies of item j in S for every j ∈ U with xj = 1 and runs the ε-Minimum algorithm. Alice now sends the memory content of the algorithm to Bob. Bob resumes the run of the algorithm by putting two copies of every item in U \ {i, (5/ε) + 1} in the stream S. Bob also puts one copy of (5/ε)+1 in S. Suppose the size of the support of (x1 , . . . , x5/ε ) be ℓ. Since 1/(2ℓ+(2/ε)−1) > ε/5, we have the following. If xi = 0, then the ε-Minimum algorithm must output i with probability at least (1 − δ). If xi = 1, then the ε-Minimum algorithm must output (5/ε) + 1 with probability at least (1 − δ). Now the result follows from Lemma 5. We show next a Ω(n log(1/ε)) bits space complexity lower bound for ε-Borda. Theorem 12. Any one pass algorithm for ε-Borda must use Ω(n log(1/ε)) bits of space. Proof. We reduce ε-Perm to ε-Borda. Suppose Alice has a permutation σ over [n] and Bob has an index i ∈ [n]. The item set of our reduced election is U = [n] ⊔ D, where D = {d1 , d2 , . . . , d2n }. Alice generates a vote v over the item set U from σ as follows. The vote v is B1 ≻ B2 ≻ · · · ≻ B1/ε where Bj for j = 1, . . . , 1/ε is defined as follows. Bj = d(j−1)2εn+1 ≻ d(j−1)2εn+2 ≻ · · · ≻ d(2j−1)εn ≻ σjεn+1 ≻ · · · ≻ σ(j+1)εn ≻ d(2j−1)ε+1 ≻ · · · ≻ d2jεn 19 Alice runs the ε-Borda algorithm with the vote v and sends the memory content to Bob. Let D−i = −−→ ←−− −−→ D \ {i}, D−i be an arbitrary but fixed ordering of the items in D−i , and D−i be the reverse ordering of D−i . −−→ ←−− Bob resumes the algorithm by generating two votes each of the form i ≻ D−i and i ≻ D−i . Let us call the resulting election E. The number of votes m in E is 5. The Borda score of the item i is at least 12n. The Borda score of every item x ∈ U is at most 9n. Hence for ε < 1/15, the ε-Borda algorithm must output the item i. Moreover, it follows from the construction of v that an εmn additive approximation of the Borda score of the item i reveals the block where i belongs in the ε-Perm instance. We next give a nearly-tight lower bound for the ε-maximin problem. Theorem 13. Any one-pass algorithm for ε-maximin requires Ω(n/ε2 ) memory bits of storage. Proof. We reduce from Indexing. Let γ = 1/ε2 . Suppose Alice has a string y of length (n−γ)·γ, partitioned into n − γ blocks of length γ each. Bob has an index ℓ = i + (j − γ − 1) · γ where i ∈ [γ], j ∈ {γ + 1, . . . , n}. The Indexing problem is to return yℓ for which there is a Ω(|y|) = Ω(n/ε2 ) lower bound (Lemma 5). The initial part of the reduction follows the construction in the proof of Theorem 6 in [VWWZ15], which we encapsulate in the following lemma. Lemma 8 (Theorem 6 in [VWWZ15]). Given y, Alice can construct a matrix P ∈ {0, 1}n×γ using public randomness, such that if P i and P j are the i’th and j’th rows of P respectively, then with probability at least √ √ 2/3, ∆(P i , P j ) > γ2 + γ if yℓ = 1 and ∆(a, b) 6 γ2 − γ if yℓ = 0. Let Alice construct P according to Lemma 8 and then adjoin the bitwise complement of the matrix P below P to form the matrix P ′ ∈ {0, 1}2n×γ ; note that each column of P ′ has exactly n 1’s and n 0’s. Now, we interpret each row of P as a candidate and each column of P as a vote in the following way: for each ′ v ∈ [γ], vote v has the candidates in {c : Pc,v = 1} in ascending order in the top n positions and the rest of the candidates in ascending order in the bottom n positions. Alice inserts these γ votes into the stream and sends the state of the ε-Maximin algorithm to Bob as well as the Hamming weight of each row in P ′ . Bob inserts γ more votes, in each of which candidate i comes first, candidate j comes second, and the rest of the 2n − 2 candidates are in arbitrary order. Note that because of Bob’s votes, the maximin score of j is the number of votes among the ones casted by Alice in which j defeats i. Since i < j, in those columns v where Pi,v = Pj,v , candidate i beats candidate j. Thus, the set of votes in which j defeats i is {v | Pi,v = 0, Pj,v = 1}. The size of this set is √ 1 i j j i Therefore, if Bob can estimate the maximin score of j upto γ/4 additive error, 2 ∆(P , P ) + |P | − |P | . √ he can find ∆(P i , P j ) upto γ/2 additive error as Bob knows |P i | and |P j |. This is enough, by Lemma 8, to solve the Indexing problem with probability at least 2/3. Finally, we show a space complexity lower bound that depends on the length of the stream m. Theorem 14. Any one pass algorithm for ε-Heavy hitters, ε-Minimum, ε-Borda, and ε-maximin must use Ω(log log m) memory bits, even if the stream is over a universe of size 2, for every ε < 14 . Proof. It is enough to prove the result only for ε-Heavy hitters since the other three problems reduce to ε-Heavy hitters for a universe of size 2. Suppose we have a randomized one pass ε-Heavy hitters algorithm which uses s(m) bits of space. Using this algorithm, we will show a communication protocol for the Greater-thanm problem whose communication complexity is s(2m ) thereby proving the statement. The universal set is U = {0, 1}. Alice generates a stream of 2x many copies of the item 1. Alice now sends the memory content of the algorithm. Bob resumes the run of the algorithm by generating a stream of 2y many copies of the item 0. If x > y, then the item 1 is the only ε-winner; whereas if x < y, then the item 0 is the only ε-winner. Acknowledgments We would like to thank Jelani Nelson for a helpful conversation which led us to discover an error in a previous version of the paper. 20 References [ABW03] Arvind Arasu, Shivnath Babu, and Jennifer Widom. CQL: A language for continuous queries over streams and relations. In Database Programming Languages, 9th International Workshop, DBPL 2003, Potsdam, Germany, September 6-8, 2003, Revised Papers, pages 1–19, 2003. [AM01] Javed A Aslam and Mark Montague. Models for metasearch. In Proceedings of the 24th annual international ACM SIGIR conference on Research and development in information retrieval, pages 276–284. ACM, 2001. [AS94] Rakesh Agrawal and Ramakrishnan Srikant. Fast algorithms for mining association rules in large databases. In VLDB’94, Proceedings of 20th International Conference on Very Large Data Bases, September 12-15, 1994, Santiago de Chile, Chile, pages 487–499, 1994. [AT05] Gediminas Adomavicius and Alexander Tuzhilin. Toward the next generation of recommender systems: A survey of the state-of-the-art and possible extensions. Knowledge and Data Engineering, IEEE Transactions on, 17(6):734–749, 2005. [BB08] Daniel K Blandford and Guy E Blelloch. Compact dictionaries for variable-length keys and data with applications. ACM Transactions on Algorithms (TALG), 4(2):17, 2008. [BCE+ 15] Felix Brandt, Vincent Conitzer, Ulle Endriss, Jérôme Lang, and Ariel Procaccia. Handbook of computational social choice, 2015. [BCIW16] Vladimir Braverman, Stephen R. Chestnut, Nikita Ivkin, and David P. Woodruff. Beating countsketch for heavy hitters in insertion streams. 2016. Preprint at http://arxiv.org/abs/1511.00661. To appear in STOC ‘16. [BGS01] Philippe Bonnet, Johannes Gehrke, and Praveen Seshadri. Towards sensor database systems. In Mobile Data Management, Second International Conference, MDM 2001, Hong Kong, China, January 8-10, 2001, Proceedings, pages 3–14, 2001. [BICS10] Radu Berinde, Piotr Indyk, Graham Cormode, and Martin J. Strauss. Space-optimal heavy hitters with strong error bounds. ACM Trans. Database Syst., 35(4):26, 2010. [BR99] Kevin S. Beyer and Raghu Ramakrishnan. Bottom-up computation of sparse and iceberg cubes. In SIGMOD 1999, Proceedings ACM SIGMOD International Conference on Management of Data, June 1-3, 1999, Philadelphia, Pennsylvania, USA., pages 359–370, 1999. [CCFC04] Moses Charikar, Kevin Chen, and Martin Farach-Colton. Finding frequent items in data streams. Theoretical Computer Science, 312(1):3–15, 2004. [CFM09] Yousra Chabchoub, Christine Fricker, and Hanene Mohamed. Analysis of a bloom filter algorithm via the supermarket model. In 21st International Teletraffic Congress, ITC 2009, Paris, France, September 15-17, 2009, pages 1–8, 2009. [CH08] Graham Cormode and Marios Hadjieleftheriou. Finding frequent items in data streams. Proceedings of the VLDB Endowment, 1(2):1530–1541, 2008. [CKMS08] Graham Cormode, Flip Korn, S. Muthukrishnan, and Divesh Srivastava. Finding hierarchical heavy hitters in streaming data. TKDD, 1(4), 2008. [CM05] Graham Cormode and S Muthukrishnan. An improved data stream summary: the count-min sketch and its applications. Journal of Algorithms, 55(1):58–75, 2005. 21 [Cor12] Graham Cormode. Sketch techniques for massive data. In Graham Cormode, Minos Garofalakis, Peter J. Haas, and Chris Jermaine, editors, Synopses for Massive Data: Samples, Histograms, Wavelets, Sketches, volume 4 of Foundations and Trends in Databases, pages 1–294. Now Publishers Inc., Hanover, MA, USA, January 2012. [CP06] Ben Carterette and Desislava Petkova. Learning a ranking from pairwise preferences. In Proceedings of the 29th annual international ACM SIGIR conference on Research and development in information retrieval, pages 629–630. ACM, 2006. [CP11] Ioannis Caragiannis and Ariel D. Procaccia. Voting almost maximizes social welfare despite limited communication. Artificial Intelligence, 175(910):1655 – 1671, 2011. [CRT06] E. J. Candes, J. Romberg, and T. Tao. Stable signal recovery from incomplete and inaccurate measurements. Communications on Pure and Applied Mathematics, 59:1207–1223, 2006. [CS05] Vincent Conitzer and Tuomas Sandholm. Communication complexity of common voting rules. In Proceedings of the 6th ACM conference on Electronic commerce, pages 78–87. ACM, 2005. [CT12] Thomas M Cover and Joy A Thomas. Elements of information theory. John Wiley & Sons, 2012. [DB15] Palash Dey and Arnab Bhattacharyya. Sample complexity for winner prediction in elections. In Proceeding of the 14th International Conference on Autonomous Systems and Multiagent Systems (AAMAS-15), 2015. [DHKP97] Martin Dietzfelbinger, Torben Hagerup, Jyrki Katajainen, and Martti Penttonen. A reliable randomized algorithm for the closest-pair problem. Journal of Algorithms, 25(1):19–51, 1997. [DKW56] A Dvoretzky, J Kiefer, and J Wolfowitz. Asymptotic minimax character of the sample distribution function and of the classical multinomial estimator. Annals of Mathematical Statistics, 27(3):642 – 669, 1956. [DLOM02] Erik D Demaine, Alejandro López-Ortiz, and J Ian Munro. Frequency estimation of internet packet streams with limited space. In AlgorithmsESA 2002, pages 348–360. Springer, 2002. [EV03] Cristian Estan and George Varghese. New directions in traffic measurement and accounting: Focusing on the elephants, ignoring the mice. ACM Trans. Comput. Syst., 21(3):270–313, 2003. [Fla85] Philippe Flajolet. Approximate counting: a detailed analysis. BIT Numerical Mathematics, 25(1):113–134, 1985. [FSG+ 98] Min Fang, Narayanan Shivakumar, Hector Garcia-Molina, Rajeev Motwani, and Jeffrey D. Ullman. Computing iceberg queries efficiently. In VLDB’98, Proceedings of 24rd International Conference on Very Large Data Bases, August 24-27, 1998, New York City, New York, USA, pages 299–310, 1998. [GSTV07] Anna C. Gilbert, Martin J. Strauss, Joel A. Tropp, and Roman Vershynin. One sketch for all: fast algorithms for compressed sensing. In Proceedings of the 39th Annual ACM Symposium on Theory of Computing, San Diego, California, USA, June 11-13, 2007, pages 237–246, 2007. [HHS94] Tin Kam Ho, Jonathan J Hull, and Sargur N Srihari. Decision combination in multiple classifier systems. Pattern Analysis and Machine Intelligence, IEEE Transactions on, 16(1):66–75, 1994. [Hid99] Christian Hidber. Online association rule mining. In SIGMOD 1999, Proceedings ACM SIGMOD International Conference on Management of Data, June 1-3, 1999, Philadelphia, Pennsylvania, USA., pages 145–156, 1999. 22 [HKTR04] Jonathan L Herlocker, Joseph A Konstan, Loren G Terveen, and John T Riedl. Evaluating collaborative filtering recommender systems. ACM Transactions on Information Systems (TOIS), 22(1):5–53, 2004. [HPDW01] Jiawei Han, Jian Pei, Guozhu Dong, and Ke Wang. Efficient computation of iceberg cubes with complex measures. In Proceedings of the 2001 ACM SIGMOD international conference on Management of data, Santa Barbara, CA, USA, May 21-24, 2001, pages 1–12, 2001. [HPY00] Jiawei Han, Jian Pei, and Yiwen Yin. Mining frequent patterns without candidate generation. In Proceedings of the 2000 ACM SIGMOD International Conference on Management of Data, May 16-18, 2000, Dallas, Texas, USA., pages 1–12, 2000. [HSST05] John Hershberger, Nisheeth Shrivastava, Subhash Suri, and Csaba D. Tóth. Space complexity of hierarchical heavy hitters in multi-dimensional data streams. In Proceedings of the Twentyfourth ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems, June 13-15, 2005, Baltimore, Maryland, USA, pages 338–347, 2005. [JMP+ 14] Albert Jiang, Leandro Soriano Marcolino, Ariel D Procaccia, Tuomas Sandholm, Nisarg Shah, and Milind Tambe. Diverse randomized agents vote to win. In Advances in Neural Information Processing Systems, pages 2573–2581, 2014. [KN97] Eyal Kushilevitz and Noam Nisan. Communication Complexity. Cambridge University Press, New York, NY, USA, 1997. [KNR99] Ilan Kremer, Noam Nisan, and Dana Ron. On randomized one-round communication complexity. Computational Complexity, 8(1):21–49, 1999. [KSP03] Richard M Karp, Scott Shenker, and Christos H Papadimitriou. A simple algorithm for finding frequent elements in streams and bags. ACM Transactions on Database Systems (TODS), 28(1):51–55, 2003. [KTW11] Peter Kellner, Joe Twyman, and Anthony Wells. Polling voting intentions. In Political Communication in Britain, pages 94–108. Springer, 2011. [KX06] Abhishek Kumar and Jun (Jim) Xu. Sketch guided sampling - using on-line estimates of flow size for adaptive data collection. In INFOCOM 2006. 25th IEEE International Conference on Computer Communications, Joint Conference of the IEEE Computer and Communications Societies, 23-29 April 2006, Barcelona, Catalunya, Spain, 2006. [Li14] Hang Li. Learning to rank for information retrieval and natural language processing. Synthesis Lectures on Human Language Technologies, 7(3):1–121, 2014. [LN06] Alessandra Lumini and Loris Nanni. Detector of image orientation based on borda count. Pattern Recognition Letters, 27(3):180–186, 2006. [LNNT16] Kasper Green Larsen, Jelani Nelson, Huy Le Nguyen, and Mikkel Thorup. Optimal space heavy hitters with fast update and query. Abstract at http://ita.ucsd.edu/workshop/16/files/abstract/abstract_3738.txt, 2016. [LRSC01] Charles E Leiserson, Ronald L Rivest, Clifford Stein, and Thomas H Cormen. Introduction to algorithms. The MIT press, 5:2–2, 2001. [MAE05] Ahmed Metwally, Divyakant Agrawal, and Amr El Abbadi. Efficient computation of frequent and top-k elements in data streams. In Proceedings of the 10th International Conference on Database Theory, ICDT’05, pages 398–412, Berlin, Heidelberg, 2005. Springer-Verlag. 23 [MBG04] Amélie Marian, Nicolas Bruno, and Luis Gravano. Evaluating top-k queries over web-accessible databases. ACM Trans. Database Syst., 29(2):319–362, 2004. [MG82] Jayadev Misra and David Gries. Finding repeated elements. Sci. Comput. Program., 2(2):143– 152, 1982. [MG09] Md Maruf Monwar and Marina L Gavrilova. Multimodal biometric system using rank-level fusion approach. Systems, Man, and Cybernetics, Part B: Cybernetics, IEEE Transactions on, 39(4):867–878, 2009. [MM02] Gurmeet Singh Manku and Rajeev Motwani. Approximate frequency counts over data streams. In Proceedings of the 28th international conference on Very Large Data Bases, pages 346–357. VLDB Endowment, 2002. [MNSW98] Peter Bro Miltersen, Noam Nisan, Shmuel Safra, and Avi Wigderson. On data structures and asymmetric communication complexity. J. Comput. Syst. Sci., 57(1):37–49, 1998. [Moo81] J. Strother Moore. Journal of Algorithms, June 1981. p. 208–209. [Mor78] Robert Morris. Counting large numbers of events in small registers. Communications of the ACM, 21(10):840–842, 1978. [MPC12] Andrew Mao, Ariel D. Procaccia, and Yiling Chen. Social Choice for Human Computation. In Proceedings of the Fourth Workshop on Human Computation (HCOMP-12), 2012. [MPC13] Andrew Mao, Ariel D. Procaccia, and Yiling Chen. Better Human Computation Through Principled Voting. In Proceedings of of the 27th Conference on Artificial Intelligence (AAAI’13), 2013. [MR91] D.J. Mullen and B. Roth. Decision making: Its logic and practice. Savage, MD: Rowman and Littlefield Publishers, Inc., 1991. [Mut05] Shanmugavelayutham Muthukrishnan. Data streams: Algorithms and applications. Now Publishers Inc, 2005. [MYCC07] Nikos Mamoulis, Man Lung Yiu, Kit Hung Cheng, and David W. Cheung. Efficient top-k aggregation of ranked inputs. ACM Trans. Database Syst., 32(3):19, 2007. [NC06] Rabia Nuray and Fazli Can. Automatic ranking of information retrieval systems using data fusion. Information Processing & Management, 42(3):595–614, 2006. [Nel12] Jelani Nelson. Sketching and streaming algorithms for processing massive data. XRDS: Crossroads, The ACM Magazine for Students, 19(1):14–19, 2012. [PPR15] Adarsh Prasad, Harsh Pareek, and Pradeep Ravikumar. Distributional rank aggregation, and an axiomatic analysis. In Proceedings of the 32nd International Conference on Machine Learning (ICML-15), pages 2104–2112, 2015. [RV97] Paul Resnick and Hal R Varian. Recommender systems. Communications of the ACM, 40(3):56– 58, 1997. [SBAS04] Nisheeth Shrivastava, Chiranjeeb Buragohain, Divyakant Agrawal, and Subhash Suri. Medians and beyond: new aggregation techniques for sensor networks. In Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems, SenSys 2004, Baltimore, MD, USA, November 3-5, 2004, pages 239–249, 2004. [Smi88] D. Smirnov. Shannon’s information methods for lower bounds for probabilistic communication complexity. Master’s thesis, Moscow University, 1988. 24 [SON95] Ashok Savasere, Edward Omiecinski, and Shamkant B. Navathe. An efficient algorithm for mining association rules in large databases. In VLDB’95, Proceedings of 21th International Conference on Very Large Data Bases, September 11-15, 1995, Zurich, Switzerland., pages 432–444, 1995. [SW15] Xiaoming Sun and David P. Woodruff. Tight bounds for graph problems in insertion streams. In Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques, APPROX/RANDOM 2015, August 24-26, 2015, Princeton, NJ, USA, pages 435–448, 2015. [Toi96] Hannu Toivonen. Sampling large databases for association rules. In VLDB’96, Proceedings of 22th International Conference on Very Large Data Bases, September 3-6, 1996, Mumbai (Bombay), India, pages 134–145, 1996. [VWWZ15] Dirk Van Gucht, Ryan Williams, David P Woodruff, and Qin Zhang. The communication complexity of distributed set-joins with applications to matrix multiplication. In Proceedings of the 34th ACM Symposium on Principles of Database Systems, pages 199–212. ACM, 2015. [VZ14] Maksims N Volkovs and Richard S Zemel. New learning methods for supervised and unsupervised preference aggregation. The Journal of Machine Learning Research, 15(1):1135–1176, 2014. [WL04] Gang Wang and Frederick H Lochovsky. Feature selection with conditional mutual information maximin in text categorization. In Proceedings of the thirteenth ACM international conference on Information and knowledge management, pages 342–349. ACM, 2004. [Xia12] Lirong Xia. Computing the margin of victory for various voting rules. In Proceedings of the 13th ACM Conference on Electronic Commerce, pages 982–999. ACM, 2012. [Yao79] Andrew Chi-Chih Yao. Some complexity questions related to distributive computing (preliminary report). In Proceedings of the eleventh annual ACM symposium on Theory of computing, pages 209–213. ACM, 1979. 25 Appendix A Information Theory Facts For a discrete P random variable X with possible values {x1 , x2 , . . . , xn }, the Shannon entropy of X is defined as H(X) = − ni=1 Pr(X = xi ) log2 Pr(X = xi ). Let Hb (p) = −p log2 p−(1−p) log2 (1−p) denote the binary entropy function when p ∈ (0, 1). For two random variables X and Y with possible values {x1 , x2 ,P . . . , xn } and {y1 , y2 , . . . , ym }, respectively, the conditional entropy of X given Y is defined as H(X | Y ) = i,j Pr(X = Pr(Y =y ) xi , Y = yj ) log2 Pr(X=xi ,Y j=yj ) . Let I(X; Y ) = H(X) − H(X | Y ) = H(Y ) − H(Y | X) denote the mutual information between two random variables X, Y . Let I(X; Y | Z) denote the mutual information between two random variables X, Y conditioned on Z, i.e., I(X; Y | Z) = H(X | Z) − H(X | Y, Z). The following summarizes several basic properties of entropy and mutual information. Proposition 1. Let X, Y, Z, W be random variables. 1. If X takes value in {1, 2, . . . , m}, then H(X) ∈ [0, log m]. 2. H(X) > H(X | Y ) and I(X; Y ) = H(X) − H(X | Y ) > 0. 3. If X and Z are independent, then we have I(X; Y | Z) > I(X; Y ). Similarly, if X, Z are independent given W , then I(X; Y | Z, W ) > I(X; Y | W ). 4. (Chain rule of mutual information) I(X, Y ; Z) = I(X; Z) + PnI(Y ; Z | X). More generally, for any random variables X1 , X2 , . . . , Xn , Y , I(X1 , . . . , Xn ; Y ) = i=1 I(Xi ; Y | X1 , . . . , Xi−1 ). Thus, I(X, Y ; Z | W ) > I(X; Z | W ). 5. (Fano’s inequality) Let X be a random variable chosen from domain X according to distribution µX , and Y be a random variable chosen from domain Y according to distribution µY . For any reconstruction function g : Y → X with error δg , Hb (δg ) + δg log(|X | − 1) > H(X | Y ). We refer readers to [CT12] for a nice introduction to information theory. Appendix B We remark that the algorithm in Lemma 1 has optimal space complexity as shown in Proposition 2 below which may be of independent interest. Proposition 2. [⋆] Any algorithm that chooses an item from a set of size n with probability p for 0 < p 6 in unit cost RAM model must use Ω(log log m) bits of memory. 1 n, Proof. The algorithm generates t bits uniformly at random (the number of bits it generates uniformly at random may also depend on the outcome of the previous random bits) and finally picks an item from the say x. Consider a run R of the algorithm where it chooses the item x with smallest number of random bits getting generated; say it generates t random bits in this run R. This means that in any other run of the algorithm where the item x is chosen, the algorithm must generate at least t many random bits. Let the random bits generated in R be r1 , · · · , rt . Let si be the memory content of the algorithm immediately after it generates ith random bit, for i ∈ [t], in the run R. First notice that if t < log2 n, then the probability with which the item x is chosen is more than n1 , which would be a contradiction. Hence, t > log2 n. Now we claim that all the si ’s must be different. Indeed otherwise, let us assume si = sj for some i < j. Then the algorithm chooses the item x after generating t − (j − i) many random bits (which is strictly less than t) when the random bits being generated are r1 , · · · , ri , rj+1 , · · · , rt . This contradicts the assumption that the run R we started with chooses the item x with smallest number of random bits generated. 26
8cs.DS
Beyond Log-concavity: Provable Guarantees for Sampling Multi-modal Distributions using Simulated Tempering Langevin Monte Carlo arXiv:1710.02736v2 [cs.LG] 6 Nov 2017 Rong Ge*, Holden Lee†, Andrej Risteski‡ November 7, 2017 Abstract In the last several years, provable guarantees for iterative optimization algorithms like gradient descent and expectation-maximization in non-convex settings have become a topic of intense research in the machine learning community. These works have shed light on the practical success of these algorithms in many unsupervised learning settings such as matrix completion, sparse coding, and learning latent variable Bayesian models. Another elementary task at inference-time in Bayesian settings, besides model learning, is sampling from distributions that are only specified up to a partition function (i.e., constant of proportionality). As a concrete example, in latent-variable models, sampling the posterior on the latent variables is how a model is used after it has been learned. Similar worst-case theoretical issues plague this task as do the learning one: without any assumptions, sampling (even approximately) can be #P-hard. However, few works have provided “beyond worst-case” guarantees for such settings. The analogue of “convexity” for inference is “log-concavity”: for log-concave distributions, classical results going back to [BÉ85] show that natural continuous-time Markov chains called Langevin diffusions mix in polynomial time. The most salient feature of log-concavity violated in practice is uni-modality: commonly, the distributions we wish to sample from are multimodal. In the presence of multiple deep and well-separated modes, Langevin diffusion suffers from torpid mixing. We address this problem by combining Langevin diffusion with simulated tempering. The result is a Markov chain that mixes more rapidly by transitioning between different temperatures of the distribution. We analyze this Markov chain for the canonical multi-modal distribution: a mixture of gaussians (of equal variance). The algorithm based on our Markov chain provably samples from distributions that are close to mixtures of gaussians, given access to the gradient of the log-pdf. For the analysis, we use a spectral decomposition theorem for graphs [GT14] and a Markov chain decomposition technique [MR02]. * Duke University, Computer Science Department [email protected] Princeton University, Mathematics Department [email protected] ‡ Massachusetts Institute of Technology, Applied Mathematics and IDSS [email protected] † 1 Contents 1 Introduction 1.1 Our results . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1.2 Prior work . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 4 5 2 Preliminaries 2.1 Markov chains . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2.2 Overview of Langevin dynamics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2.3 Overview of simulated tempering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 6 8 8 3 Our Algorithm 9 4 Overview of proof 4.1 Decomposing the simulated tempering chain 4.2 Existence of partitions . . . . . . . . . . . . 4.3 Mixing at highest temperature . . . . . . . 4.4 Discretizing the Langevin diffusion . . . . . 4.5 Estimating the partition functions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 Spectral gap of simulated tempering 11 12 13 13 13 14 14 6 Defining the partitions 6.1 Proving the eigenvalue gap . . . . . . . . . . . . . . . 6.2 Scaled temperature approximates mixture of gaussians 6.3 Poincaré inequalities on small subsets . . . . . . . . . 6.4 Existence of partition . . . . . . . . . . . . . . . . . . 6.5 Making arbitrarily fine partitions . . . . . . . . . . . . 6.6 Restriction to large compact set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16 17 18 19 23 24 28 7 Mixing at the highest temperature 29 8 Discretizing the continuous chains 31 9 Proof of main theorem 35 10 Acknowledgements 40 A Background on Markov chains A.1 Discrete time Markov chains . . . . . . . A.2 Restricted and projected Markov chains A.3 Conductance and clustering . . . . . . . A.4 Continuous time Markov processes . . . B Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42 42 44 44 45 46 2 C Pertubation tolerance C.1 Mixing time of the tempering chain . C.2 Mixing time at highest temperature C.3 Discretization . . . . . . . . . . . . . C.4 Putting things together . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . D Another lower bound for simulated tempering 1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47 48 49 49 50 51 Introduction In recent years, one of the most fruitful directions of research has been providing theoretical guarantees for optimization in non-convex settings. In particular, a routine task in both unsupervised and supervised learning is to use training data to fit the optimal parameters for a model in some parametric family. Theoretical successes in this context range from analyzing tensor-based approaches using method-of-moments, to iterative techniques like gradient descent, EM, and variational inference in a variety of models. These models include topic models [Ana+12; AGM12; Aro+13; AR15], dictionary learning [Aro+15; Aga+14], gaussian mixture models [HK13], and Bayesian networks [Aro+17]. Finding maximum likelihood values of unobserved quantities via optimization is reasonable in many learning settings, as when the number of samples is large maximum likelihood will converge to the true values of the quantities. However, for Bayesian inference problems (e.g. given a document, what topics is it about) the number of samples can be limited and maximum likelihood may not be well-behaved [SR11]. In these cases we would prefer to sample from the posterior distribution. In more generality, the above (typical) scenario is sampling from the posterior distribution over the latent variables of a latent variable Bayesian model whose parameters are known. In such models, the observable variables 𝑥 follow a distribution 𝑝(𝑥) which has a simple and succinct form given the values of some latent variables ℎ, i.e., the joint 𝑝(ℎ, 𝑥) factorizes as 𝑝(ℎ)𝑝(𝑥|ℎ) where both factors are explicit. Hence, the posterior distribution 𝑝(ℎ|𝑥) has the form 𝑝(ℎ|𝑥) = 𝑝(ℎ)𝑝(𝑥|ℎ) . Even though 𝑝(𝑥) the numerator is easy to evaluate, without structural assumptions such distributions are often hard to sample from (exactly or approximately). The difficulty is in evaluating the denominator P 𝑝(𝑥) = ℎ 𝑝(ℎ)𝑝(𝑥|ℎ), which can be NP-hard to do even approximately even for simple models like topic models [SR11]. The sampling analogues of convex functions, which are arguably the widest class of real-valued functions for which optimization is easy, are log-concave distributions, i.e. distributions of the form 𝑝(𝑥) ∝ 𝑒−𝑓 (𝑥) for a convex function 𝑓 (𝑥). Recently, there has been renewed interest in analyzing a popular Markov Chain for sampling from such distributions, when given gradient access to 𝑓 —a natural setup for the posterior sampling task described above. In particular, a Markov chain called Langevin Monte Carlo (see Section 2.2), popular with Bayesian practitioners, has been proven to work, with various rates depending on the properties of 𝑓 [Dal16; DM16; Dal17]. Log-concave distributions are necessarily uni-modal: their density functions have only one local maximum, which must then be a global maximum. This fails to capture many interesting scenarios. Many simple posterior distributions are neither log-concave nor uni-modal, for instance, the posterior distribution of the means for a mixture of gaussians. In a more practical direction, complicated posterior distributions associated with deep generative models [RMW14] and variational auto-encoders [KW13] are believed to be multimodal as well. 3 Figure 1: Mixture of two gaussians. Left: the two gaussians are well-separated, local sampling algorithm cannot move between modes. Right: Same distribution at high temperature, it is now possible to move between modes. The goal of this work is to initiate an exploration of provable methods for sampling “beyond log-concavity,” in parallel to optimization “beyond convexity”. As worst-case results are prohibited by hardness results, we must again make assumptions on the distributions we will be interested in. As a first step, in this paper we consider the prototypical multimodal distribution, a mixture of gaussians. 1.1 Our results We formalize the problem of interest as follows. We wish to sample from a distribution 𝑝 : R𝑑 → R, such that 𝑝(𝑥) ∝ 𝑒−𝑓 (𝑥) , and we are allowed to query ∇𝑓 (𝑥) and 𝑓 (𝑥) at any point 𝑥 ∈ R𝑑 . To start with, we focus on a problem where 𝑒−𝑓 (𝑥) is the density function of a mixture of gausP sians. That is, given centers 𝜇1 , 𝜇2 , . . . , 𝜇𝑛 ∈ R𝑑 , weights 𝑤1 , 𝑤2 , . . . , 𝑤𝑛 ( 𝑛𝑖=1 𝑤𝑖 = 1), variance 𝜎 2 (all the gaussians are spherical with same covariance matrix 𝜎 2 𝐼), the function 𝑓 (𝑥) is defined as1 𝑛 X ‖𝑥 − 𝜇𝑖 ‖2 𝑤𝑖 exp − 𝑓 (𝑥) = − log 2𝜎 2 𝑖=1 Ç å! . (1) Furthermore, suppose that 𝐷 is such that ‖𝜇𝑖 ‖ ≤ 𝐷, ∀𝑖 ∈ [𝑛]. We show that there is an efficient algorithm that can sample from this distribution given just access to 𝑓 (𝑥) and ∇𝑓 (𝑥). Theorem 1.1 (main, 𝑓 (𝑥) as defined in Equation (1), there is an algorithm with Ä informal). Given ä 1 1 running time poly 𝑤min , 𝐷, 𝑑, 𝜀 , 𝜎2 that outputs a sample from a distribution within TV-distance 𝜀 of 𝑝(𝑥). Note that because the algorithm does not have direct access to 𝜇1 , 𝜇2 , . . . , 𝜇𝑛 , even sampling from this mixture of gaussians distribution is very non-trivial. Sampling algorithms that are based on making local steps (such as the ball-walk [LS93; Vem05] and Langevin Monte Carlo) cannot move between different components of the gaussian mixture when the gaussians are well-separated (see Figure 1 left). In the algorithm we use simulated tempering (see Section 2.3), which is a technique that considers the distribution at different temperatures (see Figure 1 right) in order to move between different components. In Appendix B, we give a few examples to show some simple heuristics cannot work and the assumption that all gaussians have the same covariance cannot be removed. In particular, we show 1 Note that the expression inside the log is essentially the probability density of a mixture of gaussians, except the normalization factor is missing. However, the normalization factor can just introduce a constant shift of 𝑓 and does not really change ∇𝑓 . 4 random initialization is not enough to find all the modes. We also give an example where for a mixture of two gaussians, even if the covariance only differs by a constant multiplicative factor, simulated tempering is known to take exponential time. Of course, requiring the distribution to be exactly a mixture of gaussians is a very strong assumption. Our results can be generalized to all functions that are “close” to a mixture of gaussians. More precisely, the function 𝑓 satisfies the following properties: ∃𝑓˜ : R𝑑 → R where 𝑓˜ − 𝑓 ∞ ≤Δ, ∇𝑓˜ − ∇𝑓 ∞ ≤ 𝜏 and ∇2 𝑓˜(𝑥) ⪯ ∇2 𝑓 (𝑥) + 𝜏 𝐼, ∀𝑥 ∈ R𝑑 (2) and 𝑓˜(𝑥) = − log 𝑛 X 𝑖=1 Ç 𝑤𝑖 exp − ‖𝑥 − 𝜇𝑖 ‖ 2𝜎 2 å! 2 (3) Intuitively, these conditions show that the density of the distribution is within a 𝑒Δ multiplicative factor to an (unknown) mixture of gaussians. Our theorem can be generalized to this case. Theorem 1.2 (general case, informal). ForÄ function 𝑓 (𝑥) that äsatisfies Equations (2) and (3), there is an algorithm that runs in time poly 𝑤min , 𝐷, 𝑑, 1𝜀 , 𝜎12 , 𝑒Δ that outputs a sample 𝑥 from a distribution that has TV-distance at most 𝜀 from 𝑝(𝑥). 1.2 Prior work Our algorithm will use two classical techniques in the theory of Markov chains: Langevin diffusion, a chain for sampling from distributions in the form 𝑝(𝑥) ∝ 𝑒−𝑓 (𝑥) given only gradient access to 𝑓 and simulated tempering, a heuristic technique used for tackling multimodal distributions. We recall briefly what is known for both of these techniques. For Langevin dynamics, convergence to the stationary distribution is a classic result [Bha78]. Understanding the mixing time of the continuous dynamics for log-concave distributions is also a classic result: [BÉ85; Bak+08] show that log-concave distributions satisfy a Poincaré and logSobolev inequality, which characterize the rate of convergence. Of course, algorithmically, one can only run a “discretized” version of the Langevin dynamics, but results on such approaches are much more recent: [Dal16; DM16; Dal17] obtained an algorithm for sampling from a log-concave distribution over R𝑑 , and [BEL15] gave a algorithm to sample from a log-concave distribution restricted to a convex set by incorporating a projection step. [RRT17] give a nonasymptotic analysis of Langevin dynamics for arbitrary non-log-concave distributions with certain regularity and decay properties. Of course, the mixing time is exponential in general when the spectral gap of the chain is small; furthermore, it has long been known that transitioning between different modes can take an exponentially long time, a phenomenon known as meta-stability [Bov+02; Bov+04; BGK05]. It is a folklore result that guarantees for mixing extend to distributions 𝑒−𝑓 (𝑥) where 𝑓 (𝑥) is a “nice” function that is close to a convex function in 𝐿∞ distance; however, this does not address more global deviations from convexity. It is clear that for distributions that are far from being log-concave and many deep modes, additional techniques will be necessary. Among many proposed heuristics for such situations is simulated tempering, which effectively runs multiple Markov chains, each corresponding to a different temperature of the original chain, and “mixes” between these different Markov chains. The 5 intuition is that the Markov chains at higher temperature can move between modes more easily, and if one can “mix in” points from these into the lower temperature chains, their mixing time ought to improve as well. Provable results of this heuristic are however few and far between. [WSH09; Zhe03] lower-bound the spectral gap for generic simulated tempering chains. The crucial technique our paper shares with theirs is a Markov chain decomposition technique due to [MR02]. However, for the scenario of Section 1.1 we are interested in, the spectral gap bound in [WSH09] is exponentially small as a function of the number of modes. Our result will remedy this. 2 Preliminaries In this section we first introduce notations for Markov chains. More details are deferred to Appendix A. Then we briefly discuss Langevin Monte Carlo and Simulated Tempering. 2.1 Markov chains In this paper, we use both discrete time and continuous time Markov chains. In this section we briefly give definitions and notations for discrete time Markov chains. Continuous time Markov chains follow the same intuition, but we defer the formal definitions to Appendix A. Definition 2.1. A (discrete time) Markov chain is 𝑀 = (Ω, 𝑃 ), where Ω is a measure space and 𝑃 (𝑥, 𝑦) 𝑑𝑦 is a probability measure for each 𝑥. It defines a random process (𝑋𝑡 )𝑡∈N0 as follows. If 𝑋𝑠 = 𝑥, then P(𝑋𝑠+1 ∈ 𝐴) = 𝑃 (𝑥, 𝐴) : = R Z 𝑝(𝑥, 𝑦) 𝑑𝑦. (4) 𝐴 A stationary distribution is 𝑝(𝑥) such that if 𝑋0 ∼ 𝑝, then 𝑋𝑡 ∼ 𝑝 for all 𝑡; equivalently, Ω 𝑝(𝑥)𝑃 (𝑥, 𝑦) 𝑑𝑥 = 𝑝(𝑦). A chain is reversible if 𝑝(𝑥)𝑃 (𝑥, 𝑦) = 𝑝(𝑦)𝑃 (𝑦, 𝑥). If a Markov chain has a finite number of states, then it can be represented as a weighted graph where the transition probabilities are proportional to the weights on the edges. A reversible Markov chain can be represented as a undirected graph. Variance, Dirichlet form and Spectral Gap An important quantity of the Markov chain is the spectral gap. Definition 2.2. For a discrete-time Markov chain 𝑀 = (Ω, 𝑃 ), let 𝑃 operate on functions as Z (𝑃 𝑔)(𝑥) = E𝑦∼𝑃 (𝑥,·) 𝑔(𝑦) = 𝑔(𝑥)𝑃 (𝑥, 𝑦) 𝑑𝑦. Suppose 𝑀 = (Ω, 𝑃 ) has unique stationary distribution 𝑝. Let ⟨𝑔, ℎ⟩𝑝 := define the Dirichlet form and variance by ℰ𝑀 (𝑔, ℎ) = ⟨𝑔, (𝐼 − 𝑃 )ℎ⟩𝑝 Var𝑝 (𝑔) = 𝑔 − R Ω 𝑔(𝑥)ℎ(𝑥)𝑝(𝑥) 𝑑𝑥 and (6) 2 Z 𝑔𝑝 𝑑𝑥 Ω 6 (5) Ω (7) 𝑝 Write ℰ𝑀 (𝑔) for ℰ𝑀 (𝑔, 𝑔). Define the eigenvalues of 𝑀 , 0 = 𝜆1 ≤ 𝜆2 ≤ · · · to be the eigenvalues of 𝐼 − 𝑃 with respect to the norm ‖·‖𝑝 . Define the spectral gap by Gap(𝑀 ) = inf 𝑔∈𝐿2 (𝑝) ℰ𝑀 (𝑔) . Var𝑝 (𝑔) (8) In the case of a finite, undirected graph, the function just corresponds to a vector 𝑥 ⊥ ⃗1. The Dirichlet form corresponds to 𝑥⊤ ℒ𝑥 where ℒ is the normalized Laplacian matrix, and the variance is just the squared norm ‖𝑥‖2 . The spectral gap controls mixing for the Markov chain. Define the 𝜒2 distance between 𝑝, 𝑞 by Z Ç 𝜒2 (𝑝||𝑞) = Ω 𝑞(𝑥) − 𝑝(𝑥) 𝑝(𝑥) å2 Z Ç 𝑝(𝑥) 𝑑𝑥 = Ω 𝑞(𝑥)2 𝑝(𝑥) å − 1. (9) Let 𝑝0 be any initial distribution and 𝑝𝑡 be the distribution after running the Markov chain for 𝑡 steps. Then 𝜒2 (𝑝||𝑝𝑡 ) ≤ (1 − 𝐺′ )𝑡 𝜒(𝑝||𝑝0 ) (10) where 𝐺′ = min(𝜆2 , 2 − 𝜆max ). Restrictions and Projections Later we will also work with continuous time Markov chains (such as Langevin dynamics, see Section 2.2). In the proof we will also need to consider restrictions and projections of Markov chains. Intuitively, restricting a Markov chain 𝑀 to a subset of states 𝐴 (which we denote by 𝑀 |𝐴) removes all the states out of 𝐴, and replaces transitions to 𝐴 with ¯ 𝒫 ) “merges” all self-loops. Projecting a Markov chain 𝑀 to partition 𝒫 (which we denote by 𝑀 parts of the partition into individual states. For formal definitions see Appendix A. Conductance and clustering Finally we define conductance and clusters for Markov chains. These are the same as the familiar concepts as in undirected graphs. Definition 2.3. Let 𝑀 = (Ω, 𝑃 ) be a Markov chain with unique stationary distribution 𝑝. Let 𝑄(𝑥, 𝑦) = 𝑝(𝑥)𝑃 (𝑥, 𝑦) x 𝑄(𝐴, 𝐵) = 𝑄(𝑥, 𝑦) 𝑑𝑥 𝑑𝑦. (11) (12) 𝐴×𝐵 (I.e., 𝑥 is drawn from the stationary distribution and 𝑦 is the next state in the Markov chain.) Define the (external) conductance of 𝑆, 𝜑𝑀 (𝑆), and the Cheeger constant of 𝑀 , Φ(𝑀 ), by 𝑄(𝑆, 𝑆 𝑐 ) 𝑝(𝑆) 𝜑𝑀 (𝑆). Φ(𝑀 ) = min 𝜑𝑀 (𝑆) = 𝑆⊂Ω,𝑝(𝑆)≤ 12 (13) (14) The clustering of a Markov chain is analogous to a partition of vertices for undirected graphs. For a good clustering, we require the inner-conductance to be large and the outer-conductance to be small. 7 Definition 2.4. Let 𝑀 = (Ω, 𝑃 ) be a Markov chain on a finite state space Ω. We say that 𝑘 disjoint subsets 𝐴1 , . . . , 𝐴𝑘 of Ω are a (𝜑in , 𝜑out )-clustering if for all 1 ≤ 𝑖 ≤ 𝑘, Φ(𝑀 |𝐴𝑖 ) ≥ 𝜑in 𝜑𝑀 (𝐴𝑖 ) ≤ 𝜑out . 2.2 (15) (16) Overview of Langevin dynamics Langevin diffusion is a stochastic process, described by the stochastic differential equation (henceforth SDE) √ 𝑑𝑋𝑡 = −∇𝑓 (𝑋𝑡 ) 𝑑𝑡 + 2 𝑑𝑊𝑡 (17) where 𝑊𝑡 is the Wiener process. The crucial (folklore) fact about Langevin dynamics is that Langevin dynamics converges to the stationary distribution given by 𝑝(𝑥) ∝ 𝑒−𝑓 (𝑥) . Substituting 𝛽𝑓 for 𝑓 in (17) gives the Langevin diffusion process for inverse temperature 𝛽, which has stationary distribution ∝ 𝑒−𝛽𝑓 (𝑥) . Equivalently it is also possible to consider the temperature as changing the magnitude of the noise: » 𝑑𝑋𝑡 = −∇𝑓 (𝑋𝑡 )𝑑𝑡 + 2𝛽 −1 𝑑𝑊𝑡 . Of course algorithmically we cannot run a continuous-time process, so we run a discretized version of the above process: namely, we run a Markov chain where the random variable at time 𝑡 is described as p 𝑋𝑡+1 = 𝑋𝑡 − 𝜂∇𝑓 (𝑋𝑡 ) + 2𝜂𝜉𝑘 , 𝜉𝑘 ∼ 𝑁 (0, 𝐼) (18) √ where 𝜂 is the step size. (The reason for the 𝜂 scaling is that running Brownian motion for 𝜂 of √ the time scales the variance by 𝜂.) The works [Dal16; DM16; Dal17] have analyzed the convergence properties (both bias from the stationary distribution, and the convergence rate) for log-concave distributions, while [RRT17] give convergence rates for non-log-concave distributions. Of course, in the latter case, the rates depend on the spectral gap, which is often exponential in the dimension. 2.3 Overview of simulated tempering Simulated tempering is a technique that converts a Markov chain to a new Markov chain whose state space is a product of the original state space and a temperature. The new Markov chain allows the original chain to change “temperature” while maintaining the correct marginal distributions. Given a discrete time Markov chain, we will consider it in 𝐿 temperatures. Let [𝐿] denote the set {1, 2, ..., 𝐿}, we define the simulated tempering chain as follows: Definition 2.5. Let 𝑀𝑖 , 𝑖 ∈ [𝐿] be a sequence of Markov chains with state space Ω and unique stationary distributions 𝑝𝑖 . Let 𝑟1 , . . . , 𝑟𝐿 be such that 𝑟𝑖 > 0, 𝐿 X 𝑟𝑖 = 1. 𝑖=1 Define the simulated tempering Markov chain with relative probabilities 𝑟𝑖 as follows. The states of 𝑀st are Ω × [𝐿]. Suppose the current state is (𝑥, 𝑘). 8 1. With probability transition. 1 2, keep 𝑘 fixed, and update 𝑥 according to 𝑀𝑘 . We will call this a Type 1 2. With probability 21 , do the following Metropolis-Hastings step: draw 𝑘 ′ randomly from {0, . . . , 𝐿− 1}. Then transition to (𝑥, 𝑘 ′ ) with probability ® 𝑟𝑘′ 𝑝𝑘′ (𝑥) min ,1 𝑟𝑘 𝑝𝑘 (𝑥) ´ and stay at (𝑥, 𝑘) otherwise. We will call this a Type 2 transition. Remark 2.6. For the type two transitions, we can instead just pick 𝑘 ′ from {𝑘 − 1, 𝑘, 𝑘 + 1}. This 𝑝 (𝑥) will slightly improve our bounds on mixing time, because the ratio 𝑝𝑘𝑘′(𝑥) for 𝑘 ′ ∈ {𝑘 − 1, 𝑘 + 1} is bounded, and can be exponential otherwise. For simplicity, we stick with the traditional definition of the simulated tempering Markov chain. The typical setting is as follows. The Markov chains come from a smooth family of Markov chains with parameter 𝛽 ≥ 0, and 𝑀𝑖 is the Markov chain with parameter 𝛽𝑖 , where 0 ≤ 𝛽1 ≤ · · · 𝛽𝐿 = 1. (Using terminology from statistical physics, 𝛽 = 𝜏1 is the inverse temperature.) We are interested in sampling from the distribution when 𝛽 is large (𝜏 is small). However, the chain suffers from torpid mixing in this case, because the distribution is more peaked. The simulated tempering chain uses smaller 𝛽 (larger 𝜏 ) to help with mixing. For us, the stationary distribution at inverse temperature 𝛽 is ∝ 𝑒−𝛽𝑓 (𝑥) . Of course, the Langevin dynamics introduced in previous section is a continuous time Markov chain. In the algorithm we change it to a discrete time Markov chain by fixing a step size. Another difficulty in running the simulated tempering chain directly is that we don’t have access to 𝑝𝑘 (because we do not know the partition function). We make use of the flexibility in 𝑟𝑖 ’s to fix this issue. For more details see Section 3. The crucial fact to note is that the stationary distribution is a “mixture” of the distributions corresponding to the different temperatures. Namely: Proposition 2.7 (folklore). If the 𝑀𝑘 are reversible Markov chains with stationary distributions 𝑝𝑘 , then the simulated tempering chain 𝑀 is a reversible Markov chain with stationary distribution 𝑝(𝑥, 𝑖) = 𝑟𝑖 𝑝𝑖 (𝑥). 3 Our Algorithm Our algorithm will run a simulated tempering chain, with a polynomial number of temperatures, while running discretized Langevin dynamics at the various temperatures. The full algorithm is specified in Algorithm 2. As we mentioned before, an obstacle in running the simulated tempering chain is that we do not have access to the partition function. We solve this problem by estimating the partition function from high temperature to low temperature, adding one temperature at a time (see Algorithm 2). Note that if the simulated tempering chain mixes and produce good samples, by standard reductions it is easy to estimate the (ratios of) partition functions. Our main theorem is the following. 9 Algorithm 1 Simulated tempering Langevin Monte Carlo “1 , . . . , 𝑍 “ℓ ; step size 𝜂, time interINPUT: Temperatures 𝛽1 , . . . , 𝛽ℓ ; partition function estimates 𝑍 val 𝑇 , number of steps 𝑡. OUTPUT: A random sample 𝑥 ∈ R𝑑 (approximately from the distribution 𝑝ℓ (𝑥) ∝ 𝑒𝛽ℓ 𝑓 (𝑥) ). Let (𝑥, 𝑘) = (𝑥0 , 1) where 𝑥0 ∼ 𝑁 (0, 𝛽1 𝐼). for 𝑠 = 0 → 𝑡 − 1 do √ (1) With probability 12 , keep 𝑘 fixed. Update 𝑥 according to 𝑥 ←[ 𝑥 − 𝜂𝛽𝑘 ∇𝑓 (𝑥) + 2𝜂𝜉𝑘 , 𝜉𝑘 ∼ 𝑁 (0, 𝐼). Repeat this 𝑇𝜂 times. 1 (2) ßWith probability 2 , make a type 2 transition, where the acceptance ratio is ™ min b𝑘′ 𝑒−𝛽𝑘′ 𝑓 (𝑥) /𝑍 ,1 b𝑘 𝑒−𝛽𝑘 𝑓 (𝑥) /𝑍 . end for If the final state is (𝑥, 𝑙) for some 𝑥 ∈ R𝑑 , return 𝑥. Otherwise, re-run the chain. Algorithm 2 Main algorithm INPUT: A function 𝑓 : R𝑑 , satisfying assumption (2), to which we have gradient access. OUTPUT: A random sample 𝑥 ∈ R𝑑 . Let 0 ≤ 𝛽1 < · · · < 𝛽𝐿 = 1 be a sequence of inverse temperatures satisfying (194) and (195). “1 = 1. Let 𝑍 for ℓ = 1 → 𝐿 do Run the simulated tempering chain in Algorithm 1 with temperatures 𝛽1 , . . . , 𝛽ℓ , estimates “1 , . . . , 𝑍 “𝑖 , step size 𝜂, time interval 𝑇 , and number of steps 𝑡 given by Lemma 9.4. 𝑍 If ℓ = 𝐿, return the sample. Ä ä Ä ä ’ c 1 P𝑚 𝑒(−𝛽ℓ+1 +𝛽ℓ )𝑓 (𝑥𝑗 ) . If ℓ < 𝐿, repeat to get 𝑚 = 𝑂(𝐿2 ln 1𝛿 ) samples, and let 𝑍 ℓ+1 = 𝑍ℓ 𝑚 𝑗=1 end for 10 P  2  ‖𝑥−𝜇𝑖 ‖ 𝑛 on R𝑑 where Theorem 3.1 (Main theorem). Suppose 𝑓 (𝑥) = − ln 𝑖=1 𝑤𝑖 exp − 2𝜎 2 P𝑛 𝑖=1 𝑤𝑖 = 1, 𝑤min = min1≤𝑖≤𝑛 𝑤𝑖 > 0, and 𝐷 = max1≤𝑖≤𝑛 ‖𝜇𝑖 ‖. Then Algorithm 2 with parameters given by Lemma 9.4 produces a sample from a distribution 𝑝′ with ‖𝑝 − 𝑝′ ‖1 ≤ 𝜀 in time Ä ä poly 𝑤min , 𝐷, 𝑑, 𝜎1 , 1𝜀 . For simplicity, we stated the theorem for distributions which are exactly mixtures of gaussians. The theorem is robust to 𝐿∞ perturbations as in (2), we give the more general theorem in Appendix C. 4 Overview of proof We will first briefly sketch the entire proof, and in the subsequent sections expand on all the individual parts. The key part of our proof is a new technique for bounding the spectral gap for simulated tempering chain using decompositions (Section 4.1): for each temperature we make a partition into “large” pieces that are well-connected from the inside. If this partition can be done at every temperature, the difference in temperature is small enough, and the chain mixes at the highest temperature, we show the simulated tempering chain also mixes quickly. This is a general theorem for the mixing of simulated tempering chains that may be useful in other settings. Figure 2: For a mixture of gaussians, we can partition space into regions where Langevin Monte Carlo mixes well. We then show that if 𝑓 (𝑥) is a mixture of gaussians, then indeed the partition exists (Section 4.2). Here we use spectral clustering techniques developed by [GT14] for finite graphs. The main technical difficulty is in transferring between the discrete and continuous cases. Finally we complete the proof by showing that 1. the Markov chain mixes at the highest temperature (Section 4.3); 2. the discretized Markov chain approximates the continuous time Markov chain (Section 4.4); 11 3. the partition functions are estimated correctly which allows us to run the simulated tempering chain (Section 4.5). At last, in Appendix C we prove the arguments are tolerant to 𝐿∞ perturbations, i.e. that the algorithm works for distributions that are not exactly mixtures of gaussians. 4.1 Decomposing the simulated tempering chain First we show that if there exists a partition 𝒫𝑖 for each temperature such that 1. the Markov chain mixes rapidly within each set of the partition (i.e., Gap(𝑀𝑖 |𝐴 ) is large), and 2. the sets in the partition are not too small, and the chain mixes at the highest temperature, then the simulated tempering chain mixes rapidly. Theorem (Theorem 5.2). Let 𝑀𝑖 = (Ω, 𝑃𝑖 ), 𝑖 ∈ [𝐿] be a sequence of Markov chains with state space Ω and stationary distributions 𝑝𝑖 . Consider the simulated tempering chain 𝑀 = (Ω × [𝐿], 𝑃st ) with min(𝑟𝑖 ) probabilities (𝑟𝑖 )𝐿 𝑖=1 . Let 𝑟 = max(𝑟𝑖 ) . Let 𝒫𝑖 be a partition of the ground set Ω, for each 𝑖 ∈ [𝐿], with 𝒫1 = {Ω}. Define the overlap parameter of (𝒫𝑖 )𝐿 𝑖=1 to be 𝛿((𝒫𝑖 )𝐿 𝑖=1 ) ïZ = ò min 1<𝑖≤𝐿,𝐴∈𝒫 min{𝑝𝑖−1 (𝑥), 𝑝𝑖 (𝑥)} 𝑑𝑥 /𝑝𝑖 (𝐴). 𝐴 Define 𝑝min = min 𝑝𝑖 (𝐴). 𝑖,𝐴∈𝒫𝑖 Then the spectral gap of the tempering chain satisfies Gap(𝑀st ) ≥ 𝑟4 𝛿 2 𝑝2min 32𝐿4 min 1≤𝑖≤𝐿,𝐴∈𝒫𝑖 (Gap(𝑀𝑖 |𝐴 )). (19) To prove this, we use techniques similar to existing work on simulated tempering. More precisely, similar to the proof in [WSH09], we will apply a “decomposition” theorem (Theorem A.5) for analyzing the mixing time of the simulated tempering chain. Note that as we are only using this theorem in the analysis, we only need an existential, not a algorithmic result. In order to apply this theorem, we will show that there exist good partitions 𝒫𝑖 , such that the spectral gap Gap(𝑀𝑖 |𝐴 ) within each set is large, and each set in the partition has size poly(𝑤min ). Remark 4.1. In Appendix D, Theorem D.3, we also give a different (incomparable) criterion for lower-bounding the spectral gap that improves the bound in [WSH09], in some cases by an exponential factor. Theorem D.3 requires that the partitions 𝒫𝑖 be successive refinements, but has the advantage of depending on a parameter 𝛾((𝒫𝑖 )𝐿 𝑖=1 ) that is larger than 𝑝min , and unlike 𝑝min , can even be polynomial when the 𝒫𝑖 have exponentially many pieces. Theorem D.3 will not be necessary for the proof of our main theorem. 12 4.2 Existence of partitions We will show the existence of good partitions 𝒫𝑖 for 𝑖 ≥ 2 using a theorem of [GT14]. The theorem shows if the 𝑘-th singular value is large, then it is possible to have a clustering with at most 𝑘 parts which has high “inside” conductance within the clusters and low “outside” conductance between the clusters (Definition A.7). Theorem (Spectrally partitioning graphs, Theorem A.8). Let 𝑀 = (Ω, 𝑃 ) be a reversible Markov chain with |Ω| = 𝑛 states. Let 0 = 𝜆1 ≤ 𝜆2 ≤ · · · ≤ 𝜆𝑛 be the eigenvalues of the Markov chain. For any 𝑘 ≥ 2, if 𝜆𝑘 > 0, then √ there exists 1 ≤ ℓ ≤ 𝑘 − 1 and a ℓ-partitioning of Ω into sets 𝑃1 , . . . , 𝑃ℓ that is a (Ω(𝜆𝑘 /𝑘 2 ), 𝑂(ℓ3 𝜆ℓ ))-clustering. For a mixture of 𝑛 gaussians, using the Poincaré inequality for gaussians we can show that 𝜆𝑛+1 for the continuous Langevin chain is bounded away from 0. Therefore one would hope to use Theorem A.8 above to obtain a clustering. However, there are some difficulties, especially that Theorem A.8 only holds for a discrete time, discrete space Markov chain. To solve the discrete time problem, we fix a time 𝑇 , and consider the discrete time chain where each step is running Langevin for time 𝑇 . To solve the discrete space problem, we note that we can apply the theorem to the Markov chain 𝑀𝑖 projected to any partition (See Definition A.4 for the definition of a projected Markov chain). A series of technical lemmas will show that the eigenvalues and conductances do not change too much if we pass to the discrete time (and space) chain. Another issue is that although the theorem guarantees good inner-conductance, it does not immediately give a lowerbound for the size of the clusters. Here we again use Poincaré inequality to show any small set must have a large outer-conductance, therefore the clustering guaranteed by the theorem cannot have small clusters. Thus the assumptions of Theorem A.8 are satisfied, and we get a partition with large internal conductance and small external conductance for the projected chain (Lemma 6.8). By letting the size of the cells in the partition go to 0, we show that the gap of the projected chain approaches the gap of the continuous chain (Lemma 6.10). Because this lemma only works for compact sets, we also need to show that restricting to a large ball doesn’t change the eigenvalues too much (Lemma 6.11). 4.3 Mixing at highest temperature Next, we need to show mixing at the highest temperature. Over bounded domains, we could set the highest temperature to be infinite, which would correspond to uniform sampling over the domain. Since we are working over an unbounded domain, we instead compare it to Langevin dynamics for a strictly convex function which is close in 𝐿∞ distance (Lemma 7.3). We use the fact that Langevin dynamics mixes rapidly for strictly convex functions, and an 𝐿∞ perturbation of 𝜀 affects the spectral gap by at most a factor of 𝑒𝜀 . 4.4 Discretizing the Langevin diffusion Up to this point, though we subdivided time into discrete intervals of size 𝑇 , in each time interval we ran the continuous Langevin chain for time 𝑇 . However, algorithmically we can only run a discretization of Langevin diffusion – so we need to bound the drift of the discretization from the continuous chain. 13 For this, we follow the usual pattern of discretization arguments: if we run the continuous chain for some time 𝑇 with step size 𝜂, the drift of the discretized chain to the continuous will be 𝜂𝑇 . If we have a bound on 𝑇 , this provides a bound for the drift. More precisely, we show: Lemma (Lemma 8.1). Let 𝑝𝑡 , 𝑞 𝑡 : R𝑑 × [𝐿] → R be the distributions after running the simulated tempering chain for 𝑡 steps, where in 𝑝𝑡 , for any temperature 𝑖 ∈ 𝐿, the Type 1 transitions are taken according to the (discrete time) Markov kernel 𝑃𝑇 : running Langevin diffusion for time 𝑇 ; in 𝑞 𝑡 , the Type 1 transitions are taken according to running 𝑇𝜂 steps of the discretized Langevin diffusion, using 𝜂 as the discretization granularity, s.t. 𝜂 ≤ KL(𝑝𝑡 ||𝑞 𝑡 ) . 𝜎2 2 . Then, 𝜂2 𝜂2 𝜂 2 (𝐷 + 𝑑)𝑇 𝑡 + max E𝑥∼𝑝0 (·,𝑖) ‖𝑥 − 𝑥* ‖22 + 4 𝑑𝑡𝑇 𝜂 6 6 𝑖 𝜎 𝜎 𝜎 To prove this, consider the two types of steps separately. The Type 2 steps in the tempering chains do not increase the KL divergence between the continuous and discretized version of the chains, and during the Type 1 steps, the increase in KL divergence on a per-step basis can be bounded by using existing machinery on discretizing Langevin diffusion (see e.g. [Dal16]) along with a decomposition theorem for the KL divergence of a mixture of distributions (Lemma 8.6). We make a brief remark about max𝑖 E𝑥∼𝑝0 (·,𝑖) ‖𝑥 − 𝑥* ‖22 : since the means 𝜇𝑖 satisfy ‖𝜇𝑖 ‖ ≤ 𝐷, it’s easy to characterize the location of 𝑥* and conclude that bounding this quantity essentially requires that most of the mass in the initial distributions should be concentrated on a ball of size 𝑂(𝐷). Namely, the following holds: √ Lemma 4.2. Let 𝑥* = argmin𝑥∈R𝑑 𝑓˜(𝑥). Then, ‖𝑥* ‖ ≤ 2𝐷. 4.5 Estimating the partition functions Finally, the Metropolis-Hastings filter in the Type 2 step of the simulated tempering chain requires us to estimate the partition functions at each of the temperatures. It is sufficient to estimate the partition functions to within a constant factor, because the gap of the tempering chain depends on the ratio of the maximum-to-minimum probability of a given temperature. For this, we run the chain for temperatures 𝛽1 , . . . , 𝛽ℓ , obtain good samples for 𝑝ℓ , and use them to estimate 𝑍ℓ+1 . We use Lemma 9.1 to show that with high probability, this is a good estimate. 5 Spectral gap of simulated tempering In this section we prove a lower bound for the spectral gap of simulated tempering given a partition. Assumptions 5.1. Let 𝑀𝑖 = (Ω, 𝑃𝑖 ), 𝑖 ∈ [𝐿] be a sequence of Markov chains with state space Ω and stationary distributions 𝑝𝑖 . Consider the simulated tempering chain 𝑀st = (Ω × [𝐿], 𝑃st ) with min(𝑟𝑖 ) probabilities (𝑟𝑖 )𝐿 𝑖=1 . Let 𝑟 = max(𝑟𝑖 ) . Let 𝒫𝑖 be a partition2 of the ground set Ω, for each 𝑖 ∈ [𝐿], with 𝒫1 = {Ω}. Define the overlap parameter of (𝒫𝑖 )𝐿 𝑖=1 to be 𝛿((𝒫𝑖 )𝐿 𝑖=1 ) = 2 ïZ min 1<𝑖≤𝐿,𝐴∈𝒫 ò min{𝑝𝑖−1 (𝑥), 𝑝𝑖 (𝑥)} 𝑑𝑥 /𝑝𝑖 (𝐴). 𝐴 We allow overlaps on sets of measure 0. 14 Theorem 5.2. Suppose Assumptions 5.1 hold. Define 𝑝min = min 𝑝𝑖 (𝐴). 𝑖,𝐴∈𝒫𝑖 Then the spectral gap of the tempering chain satisfies Gap(𝑀st ) ≥ 𝑟4 𝛿 2 𝑝2min 32𝐿4 min 1≤𝑖≤𝐿,𝐴∈𝒫𝑖 (Gap(𝑀𝑖 |𝐴 )). (20) Proof. Let 𝑝st be the stationary distribution of 𝑃st . First note that we can easily switch between 𝑝𝑖 and 𝑝st using 𝑝st (𝐴 × {𝑖}) = 𝑤𝑖 𝑝𝑖 (𝐴). Note 𝑤𝑖 ≥ 𝐿𝑟 . Define the partition 𝒫 on Ω × [𝐿] by 𝒫 = {𝐴 × {𝑖} : 𝐴 ∈ 𝒫𝑖 } . By Theorem A.5, Gap(𝑀st ) ≥ 1 Gap(𝑀 st ) min Gap(𝑀st |𝐵 ). 𝐵∈𝒫 2 (21) The second term Gap(𝑀st |𝐵 ) is related to (Gap(𝑀𝑖 |𝐴 )). We now lower-bound Gap(𝑀 st ). We will abuse notation by considering the sets 𝐵 ∈ 𝒫 as states in 𝑀 st , and identify a union of sets in 𝒫 with the corresponding set of states for 𝑀 st . We bound Gap(𝑀 st ) by bounding the conductance of 𝑀 st using Cheeger’s inequality (Theorem A.9). Suppose first that 𝑆 ⊆ 𝒫, Ω × {1} ̸∈ 𝑆. Intuitively, this means the “highest temperature” is not in the set. We will go from top to bottom until we find a partition that is in the set, the interaction of this part and the temperature above it will already provide a large enough cut. 1 Let 𝑖 be minimal such that 𝐴 × {𝑖} ∈ 𝑆 for some 𝐴. There is 2𝐿 probability of proposing a switch to level 𝑖 − 1, so 𝑃st (𝐴 × {𝑖}, Ω × {𝑖 − 1}) ≥ = ≥ ≥ ® ´ 1 1 𝑝𝑖−1 (𝑥) 𝑟𝑖−1 𝑟𝑖 𝑝𝑖 (𝑥) min , 1 𝑑𝑥 2𝐿 𝑟𝑖 𝑝𝑖 (𝐴) 𝐴 𝑝𝑖 (𝑥) 𝑟𝑖 Z ß ™ 1 𝑟𝑖−1 min 𝑝𝑖−1 (𝑥) , 𝑝𝑖 (𝑥) 𝑑𝑥/𝑝𝑖 (𝐴) 2𝐿 𝐴 𝑟𝑖 Z 1 min 𝑟𝑗 min {𝑝𝑖−1 (𝑥), 𝑝𝑖 (𝑥)} 𝑑𝑥/𝑝𝑖 (𝐴) 2𝐿 max 𝑟𝑗 𝐴 1 𝑟𝛿. 2𝐿 Z (22) (23) (24) (25) We have that (defining 𝑄 as in Definition A.6) 𝑄st (𝑆, 𝑆 𝑐 ) 𝑝(𝑆) 𝑝st (𝐴 × {𝑖})𝑃st (𝐴 × {𝑖}, Ω × {𝑖 − 1}) ≥ 𝑝(𝑆) 2 𝑟𝑝min 1 𝑟 𝛿𝑝min ≥ 𝑟𝛿 = 𝐿 2𝐿 2𝐿2 𝜑st (𝑆) = 15 (26) (27) (28) Now consider the case that Ω × {1} ∈ 𝑆. This case the highest temperature is in the set. We then try to find the part with highest temperature that is not in the set. Note that 𝑝st (Ω × {1}) ≥ 𝐿𝑟 . Define 𝐴 × {𝑖} as above for 𝑆 𝑐 , then 𝑄st (𝑆, 𝑆 𝑐 ) 𝑝(𝑆) 𝑝st (Ω × {1})𝑃st (𝐴 × {𝑖}, Ω × {𝑖 − 1}) ≥ 𝑝(𝑆) 𝑟 1 ≥ 𝑟𝛿. 𝐿 2𝐿 𝜑st (𝑆) = (29) (30) (31) Thus by Cheeger’s inequality A.9, Gap(𝑀 st ) ≥ Φ(𝑀 st )2 𝑟4 𝛿 2 𝑝2min = 2 8𝐿4 (32) Therefore we have proved the projected Markov chain (between partitions) has good spectral gap. What’s left is to prove that inside each partition the Markov chain has good spectral gap, note that Gap(𝑀st |𝐵×{𝑖} ) ≥ 1 Gap(𝑀𝑖 |𝐴 ) 2 (33) because the chain 𝑀st , on a state in Ω × {𝑖}, transitions according to 𝑀𝑖 with probability Plugging (32) and (33) into (21) gives the bound. 1 2. Remark 5.3. Suppose in the type 2 transition we instead pick 𝑘 ′ as follows: With probability let 𝑘 ′ = 𝑘 − 1, and with probability 12 , let 𝑘 ′ = 𝑘 + 1. If 𝑘 ′ ̸∈ [𝐿], let 𝑘 ′ = 𝑘 instead. 1 Then the 2𝐿 becomes 14 in the proof above so we get the improved gap 1 2, Gap(𝑀st ) ≥ 6 𝑟4 𝛿 2 𝑝2min 128𝐿2 min 1≤𝑖≤𝐿,𝐴∈𝒫𝑖 (Gap(𝑀𝑖 |𝐴 )). (34) Defining the partitions In this section, we assemble all the ingredients to show that there exists a partition for the Langevin chain such that min2≤𝑖≤𝐿,𝐴∈𝒫𝑖 (Gap(𝑀𝑖 |𝐴 )) is large, and each part in the partition also has significant probability. Hence the partition will be sufficient for the partitioning technique discussed in previous section. The high-level plan is to use Theorem A.8 to find the partitions for each temperature. Indeed, if we have a mixture of 𝑛 gaussians, it is not hard to show that the (𝑛 + 1)-st eigenvalue is large: Lemma 6.1 (Eigenvalue gap for mixtures). Let 𝑝𝑖 (𝑥) = 𝑒−𝑓𝑖 (𝑥) be probability distributions on Ω P P and let 𝑝(𝑥) = 𝑛𝑖=1 𝑤𝑖 𝑝𝑖 (𝑥), where 𝑤1 , . . . , 𝑤𝑛 > 0 and 𝑛𝑖=1 𝑤𝑖 = 1. Suppose that for each 𝑝𝑖 , a Poincaré inequality holds with constant 𝐶. Then the (𝑛 + 1)-th eigenvalue of L satisfies 𝜆𝑛+1 (−L ) ≥ 16 1 . 𝐶 We defer the proof to Section 6.1. However, there are still many technical hurdles that we need to deal with before we can apply Theorem A.8 on spectral partitioning. 1. When the temperature is different, the distribution (which is proportional to 𝑒−𝛽𝑓 (𝑥) ) is no longer a mixture of gaussians. We show that it is still close to a mixture of gaussians in the sense that the density function is point-wise within a fixed multiplicative factor to the density of a mixture of gaussians (Section 6.2). This kind of multiplicative guarantee allows us to relate the Poincaré constants between the two distributions. 2. We then show (Section 6.3) a Poincaré inequality for all small sets. This serves two purposes in the proof: (a) it shows that the inner-conductance is large. (b) it shows that if a set has small conductance then it cannot be small. We also deal with the problem of continuous time here by taking a fixed time 𝑡 and running the Markov chain in multiples of 𝑡. 3. Now we can prove Lemma 6.8, which shows that if we discretize the continuous-space Markov chain, then there exists good partitioning in the resulting discrete-space Markov chain (Section 6.4). 4. We then show that if we restrict the Langevin chain to a large ball, and then discretize the space in the large ball finely enough, then in the limit the spectral gap of the discretized chain is the same as the spectral gap of the continuous-space Markov chain (Section 6.5). 5. Finally in Section 6.6 we show it is OK to restrict the Langevin chain restricted to a large ball. 6.1 Proving the eigenvalue gap Now we prove Lemma 6.1. The main idea is to use the variational characterization of eigenvalues, and show that there can be at most 𝑛 “bad” directions. Proof. We use the variational characterization of eigenvalues: 𝜆𝑛+1 (−L ) = min max subspace 𝑆 ⊆ 𝐿2 (𝑝) 𝑔⊥𝑝 𝑆 dim 𝑆 = 𝑛 − ⟨𝑔, L 𝑔⟩ . ‖𝑔‖2𝑝 R To lower-bound this, it suffices to produce a 𝑛-dimensional subspace 𝑆 and lower-bound ‖∇𝑔‖2 𝑝 𝑑𝑥 R𝑑 ‖𝑔‖2𝑝 for 𝑔 ⊥ 𝑆. We choose 𝑝𝑖 :1≤𝑖≤𝑛 . 𝑆 = span 𝑝 ß Take 𝑔 ⊥𝑝 𝑝𝑖 𝑝 ™ (35) for each 𝑖. Then, since a Poincaré inequality holds on 𝑝𝑖 , 𝑝𝑖 𝑝 𝑑𝑥 = 0 R𝑑 𝑝 R R 2 2 1 𝑑 ‖∇𝑔‖ 𝑝𝑖 𝑑𝑥 R𝑑 ‖∇𝑔‖ 𝑝𝑖 𝑑𝑥 =⇒ = R ≥ . 2 Var𝑝𝑖 (𝑔) 𝐶 ‖𝑔‖𝑝 Z 𝑔 𝑖 17 (36) (37) Thus R R𝑑 ‖∇𝑔‖2 𝑝 𝑑𝑥 ‖𝑔‖2𝑝 2 𝑖=1 R𝑑 ‖∇𝑔‖ 𝑤𝑖 𝑝𝑖 𝑑𝑥 P𝑛 2 𝑖=1 𝑤𝑖 ‖𝑔‖𝑝𝑖 P𝑚 R = ≥ 1 , 𝐶 (38) as needed. 6.2 Scaled temperature approximates mixture of gaussians The following lemma shows that changing the temperature is approximately the same as changing the variance of the gaussian. We state it more generally, for arbitrary mixtures of distributions in the form 𝑒−𝑓𝑖 (𝑥) . Lemma 6.2 (Approximately scaling the temperature). Let 𝑝𝑖 (𝑥) = 𝑒−𝑓𝑖 (𝑥) be probability distribuR −𝛽𝑓 (𝑥) tions on Ω such that for all 𝛽 > 0, 𝑒 𝑖 𝑑𝑥 < ∞. Let 𝑝(𝑥) = 𝑛 X 𝑤𝑖 𝑝𝑖 (𝑥) (39) 𝑖=1 𝑓 (𝑥) = − ln 𝑝(𝑥) (40) where 𝑤1 , . . . , 𝑤𝑛 > 0 and 𝑛𝑖=1 𝑤𝑖 = 1. Let 𝑤min = min1≤𝑖≤𝑛 𝑤𝑖 . Define the distribution at inverse temperature 𝛽 to be 𝑝𝛽 (𝑥), where P 𝑔𝛽 (𝑥) = 𝑒−𝛽𝑓 (𝑥) Z 𝑒−𝛽𝑓 (𝑥) 𝑑𝑥 𝑍𝛽 = (41) (42) Ω 𝑝𝛽 (𝑥) = 𝑔𝛽 (𝑥) . 𝑍𝛽 (43) 𝑤𝑖 𝑒−𝛽𝑓𝑖 (𝑥) (44) Define the distribution 𝑝e𝛽 (𝑥) by 𝑔e𝛽 (𝑥) = 𝑛 X 𝑖=1 ‹𝛽 = 𝑍 Z X 𝑛 𝑤𝑖 𝑒−𝛽𝑓𝑖 (𝑥) 𝑑𝑥 (45) . (46) Ω 𝑖=1 𝑝e𝛽 (𝑥) = 𝑔e𝛽 (𝑥) ‹𝛽 𝑍 Then for 0 ≤ 𝛽 ≤ 1 and all 𝑥, ï 𝑔𝛽 (𝑥) ∈ 1, 1 ò 𝑔e𝛽 𝑤min ï ò ï ò ‹𝛽 𝑍 1 1 𝑝e𝛽 𝑝e𝛽 . 𝑝𝛽 (𝑥) ∈ 1, ⊂ 𝑤min , 𝑤min 𝑍𝛽 𝑤min 18 (47) (48) Proof. By the Power-Mean inequality, 𝑔𝛽 (𝑥) = ≥ 𝑛 X !𝛽 𝑤𝑖 𝑒−𝑓𝑖 (𝑥) (49) 𝑖=1 𝑛 X 𝑤𝑖 𝑒−𝛽𝑓𝑖 (𝑥) = 𝑔e𝛽 (𝑥). (50) 𝑖=1 On the other hand, given 𝑥, setting 𝑗 = argmin𝑖 𝑓𝑖 (𝑥), 𝑔𝛽 (𝑥) = This gives (47). This implies 6.3 e𝛽 𝑍 𝑍𝛽 −𝑓𝑖 (𝑥) 𝑤𝑖 𝑒 𝑖=1 −𝑓𝑗 (𝑥) 𝛽 ≤ (𝑒 ≤ !𝛽 𝑛 X (51) ) 1 𝑤min 𝑛 X (52) 𝑤𝑖 𝑒−𝛽𝑓𝑖 (𝑥) = 𝑖=1 1 𝑔e𝛽 (𝑥). 𝑤min (53) ∈ [𝑤min , 1], which gives (48). Poincaré inequalities on small subsets In this section we prove Poincaré inequalities for small sets. In fact we need to prove that this property is true robustly, in order to transform the continuous time Markov chain to a discrete time Markov chain. Definition 6.3. Given a measure 𝑝 on Ω, say that a Poincaré inequality with constant 𝐶 holds on sets of measure ≤ 𝐷 if whenever 𝑝(Supp(𝑔)) ≤ 𝐷, ℰ𝑝 (𝑔) = Z ‖∇𝑔‖2 𝑝 𝑑𝑥 ≥ Ω 1 Var𝑝 (𝑔). 𝐶 This is robust in the following sense: If the above condition is satisfied, then 𝑔 still satisfies a Poincaré inequality even if it is not completely supported on a small set, but just has a lot of mass on a small set. The main reason we need the robust version is that when we transform the continuous time Markov chain to a discrete time Markov chain, even if we initialized in a small set after some time the probability mass is going to spill over to a slightly larger set. Lemma 6.4 (Robustly Poincaré on small sets). Let 𝐴 ⊆ R𝑑 be a subset. Suppose that for 𝑝, a Poincaré inequality with constant 𝐶 holds on sets of measure ≤ 2𝑝(𝐴). Then if Z 𝑔 2 𝑝 𝑑𝑥 ≥ 𝑘 Z 𝑔 2 𝑝 𝑑𝑥 (54) R𝑑 𝐴 with 𝑘 > 2𝑝(𝐴), then 1 ℰ𝑝 (𝑔) ≥ 20𝐶 Ç 2𝑝(𝐴) 1− 𝑘 19 å Z 𝑘 R𝑑 𝑔 2 𝑝 𝑑𝑥. We lower-bound ℰ𝑝 (𝑔) by showing that (54) implies that not much of 𝑔’s mass comes from when is small, so that much of 𝑔’s mass comes from the intersection of the set 𝐵 ′ where 𝑔 is large and the set 𝐴. This means we can use the Poincaré inequality on a “sliced” version of 𝑔 on 𝐴. 𝑔2 Proof. By scaling we may assume Let   R 2 1 𝑔 𝑝 𝑑𝑥 = 1. It suffices to show that ℰ(𝑔) ≥ 20𝐶 1 − 2𝑝(𝐴) 𝑘. 𝑘 ® 𝑘 𝐵 = 𝑥 ∈ Ω : 𝑔(𝑥) ≥ 2𝑝(𝐴) ℎ(𝑥) = 2   0,   ´ (55) 𝑘 𝑔(𝑥)2 ≤ 𝑔(𝑥) − q 𝑘 ,  q 2𝑝   𝑘 𝑔(𝑥) + , 2𝑝 𝑔(𝑥) > q2𝑝(𝐴) 𝑘 (56) 2𝑝(𝐴) q 𝑔(𝑥) < − 𝑘 2𝑝(𝐴) . i.e., we “slice” out the portion where 𝑔(𝑥)2 is large and translate it to 0. (Note we cannot just take ℎ(𝑥) = 𝑔(𝑥)1𝐵 (𝑥) because this is discontinuous. Compare with [BGL13, Proposition 3.1.17].) ℰ𝑝 (𝑔) = ≥ Z Z ‖∇𝑔‖2 𝑝 𝑑𝑥 (57) ‖∇ℎ‖2 𝑝 𝑑𝑥 = ℰ(ℎ). (58) By Cauchy-Schwarz, noting that Supp(ℎ) ⊆ 𝐵 and Vol𝑝 (𝐵) ≤ ã2 ÅZ ℎ𝑝 𝑑𝑥 We can lower bound R ≤ ÅZ ã ℎ2 𝑝 𝑑𝑥 2𝑝(𝐴) 𝑘 , 2𝑝(𝐴) . 𝑘 n (59) ℎ2 𝑝 𝑑𝑥 as follows. Let 𝐵 ′ = 𝑥 ∈ Ω : 𝑔(𝑥)2 ≥ Z 2𝑘 3𝑝(𝐴) o . 𝑔 2 𝑝 𝑑𝑥 ≥ 𝑘 (60) 𝐴 2𝑘 2𝑘 𝑝(𝐴) = 3𝑝(𝐴) 3 Z 2𝑘 𝑘 𝑔 2 𝑝 𝑑𝑥 ≥ 𝑘 − = 3 3 𝐴∩𝐵 ′ Z Z 2 ℎ ℎ2 𝑝 𝑑𝑥 ≥ 𝑔 2 𝑝 𝑑𝑥 2 Ω 𝐴∩𝐵 ′ 𝑔 Z 𝐴∩𝐵 ′ 𝑐 𝑔 2 𝑝 𝑑𝑥 ≤ ≥ 0.15 Z (61) (62) (63) 𝑔 2 𝑝 𝑑𝑥 (64) 𝐴∩𝐵 ′ ≥ 1 𝑘. 20 (65) » where we used the fact that when 𝑦 2 ≥ 2𝑘 2𝑝(𝐴) , 20 (𝑦− 𝑘 )2 2𝑝(𝐴) 2 𝑦 Ä» ≥ » ä2 2𝑘 − 3𝑝 2𝑘 3𝑝 𝑘 2𝑝 > 0.15. Putting everything together, ÅZ Var(ℎ) = ã ℎ2 𝑝 𝑑𝑥 − Ç 𝐵 ã2 ÅZ ℎ𝑝 𝑑𝑥 å ÅZ 𝐵 (66) 2𝑝(𝐴) ℎ2 𝑝 𝑑𝑥 𝑘 𝐵 Ç å 2𝑝(𝐴) 𝑘 ≥ 1− 𝑘 20 ≥ 1− ã (67) (68) ℰ𝑝 (𝑔) ≥ ℰ𝑝 (ℎ) (69) 1 1 Var(ℎ) = 𝐶 𝐶 ≥ Ç 1− 2𝑝(𝐴) 𝑘 å 𝑘 . 20 (70) Lemma 6.5 (Conductance from small-set Poincaré). Let 𝐴 ⊆ Ω be a set. Suppose that a Poincaré inequality with constant 𝐶 holds on sets of measure ≤ 2𝑝(𝐴). Let Z 𝜑𝑡 (𝐴) = 𝑃𝑡 (𝑥, 𝐴𝑐 ) 𝐴 𝑝(𝑥) 𝑑𝑥 𝑝(𝐴) be the conductance of a set 𝐴 after running Langevin for time 𝑡. Then 1 1 , (1 − 4𝑝(𝐴)) 𝑡 . 𝜑𝑡 (𝐴) ≥ min 2 80𝐶 ™ ß (71) A Poincaré inequality can be thought of as giving a lower bound on “instantaneous” conductance. We show that this implies good conductance for a finite time 𝑇 . What could go wrong is that the rate of mass leaving a set 𝐴 is large at time 0 but quickly goes to 0. We show using Lemma 6.4 that this does not happen until significant mass has escaped. Proof. We want to bound 1 𝑃𝑡 (𝑥, 𝐴)1𝐴 𝑝(𝑥) 𝑑𝑥 𝑝(𝐴) Z 1 =1− (𝑃𝑡 1𝐴 )1𝐴 𝑝(𝑥) 𝑑𝑥 𝑝(𝐴) 1 =1− ⟨𝑃𝑡 1𝐴 , 1𝐴 ⟩𝑝 𝑝(𝐴) ∂ 1 ¨ =1− 𝑃𝑡/2 1𝐴 , 𝑃𝑡/2 1𝐴 𝑝 𝑝(𝐴) 𝜑𝑡 (𝐴) = 1 − Z (72) (73) (74) (75) since (𝑃𝑡 )𝑡≥0 is a one-parameter semigroup and is self-adjoint with respect to 𝑝. Now by definition of L , 𝑑 𝑑 ⟨𝑃𝑡 𝑔, 𝑃𝑡 𝑔⟩𝑝 = 2 𝑃𝑡 𝑔, 𝑃𝑡 𝑔 𝑑𝑡 𝑑𝑡 ≠ ∑ 𝑝 = 2 ⟨𝑃𝑡 𝑔, L 𝑃𝑡 𝑔⟩𝑝 = −2ℰ(𝑃𝑡 𝑔) (76) Let 𝑡0 be the minimal 𝑡 such that 1 ‖𝑃𝑡 1𝐴 ‖ 𝑝 𝑑𝑥 ≤ 2 𝐴 Z 2 1 ‖1𝐴 ‖2 𝑝 𝑑𝑥 = 𝑝(𝐴). 2 𝐴 Z 21 (77) (Let 𝑡 = ∞ if this never happens; however, (83) will show that 𝑡 < ∞.) For 𝑡 < 2𝑡0 , by Lemma 6.4, 𝑑 𝑑𝑡 Z ‖𝑃𝑡 1𝐴 ‖2 𝑝 𝑑𝑥 ≤ −2ℰ(𝑃𝑡 1𝐴 ) (78) 1 𝑑 ‖𝑃𝑡 1𝐴 ‖2 𝑝 𝑑𝑥 (1 − 4𝑝(𝐴)) 40𝐶 𝑑𝑡 Z 1 𝑑 ≤− ‖𝑃𝑡 1𝐴 ‖2 𝑝 𝑑𝑥. (1 − 4𝑝(𝐴)) 20𝐶 𝑑𝑡 Z ≤ −2 (79) (80) This differential inequality implies exponential decay, a fact known as Gronwall’s inequality. Z ‖𝑃𝑡 1𝐴 ‖2 𝑝 𝑑𝑥 ≤ 𝑒− 20 (1−4𝑝(𝐴))𝑡 𝐶 Z ‖1𝐴 ‖2 𝑝 𝑑𝑥 𝐴 | 𝜑𝑡 (𝐴) ≤ 1 − {z } 𝑝(𝐴) 1 𝑃 1𝐴 𝑃 (𝐴) 𝑡/2 2 (82) 𝑝 1 ≤ 1 − 𝑒− 40𝐶 (1−4𝑝(𝐴))𝑡 ≤ max where the last inequality follows because because For 𝑡 ≥ 2𝑡0 , we have, because R 1 2 𝐴 ‖𝑃𝑡 𝐴 ‖ 𝑝 𝑑𝑥 (81) 𝑑 −𝑥 𝑑𝑥 𝑒 1 2 ≥ Å 1 1 , (1 − 4𝑝(𝐴))𝑡 2 80𝐶 ã (83) when 𝑒−𝑥 ≥ 12 . is decreasing, 𝑃𝑡/2 1𝐴 2 𝑝 ≤ ‖𝑃𝑡0 1𝐴 ‖2𝑝 = 21 𝑝(𝐴) so 𝜑𝑡 (𝐴) ≥ 12 . Lemma 6.6 (Easy direction of relating Laplacian of projected chain). Let (Ω, 𝑃 ) be a reversible Markov chain and 𝑃 its projection with respect to some partition 𝒫 = {𝐴1 , . . . , 𝐴𝑛 } of Ω. Let ℒ = 𝐼 − 𝑃, ℒ = 𝐼 − 𝑃. 𝜆𝑛 (ℒ) ≤ 𝜆𝑛 (ℒ). Proof. The action of ℒ on functions on [𝑛] is the same as the action of ℒ on the subspace of functions that are constant on each set in the partition, denoted by 𝐿2 (𝒫). This means that 𝐿2 ([𝑛]) under the action of ℒ embeds into 𝐿2 (𝑝) under the action of ℒ. Let 𝜋 = E[·|𝒫] : 𝐿2 (𝑝) → 𝐿2 (𝒫) be the projection; note that for ℎ ∈ 𝐿2 (𝒫), ⟨ℎ, 𝜋𝑔⟩ = ⟨ℎ, 𝑔⟩. By the variational characterization of eigenvalues, we have that for some 𝑆, 𝜆𝑛 (ℒ) = min 𝑔 ⊥𝑝 𝑆 𝑔 ∈ 𝐿2 (𝑝) ⟨𝑔, ℒ𝑔⟩ ≤ ‖𝑔‖2𝑝 min 𝑓 ⊥𝑝 𝜋(𝑆) 𝑔 ∈ 𝐿2 (𝒫) ⟨𝑓, ℒ𝑔⟩ ≤ ‖𝑔‖2𝑝 max 𝐿2 (𝒫) 𝑆⊆ dim(𝑆) = 𝑛 − 1 ⟨𝑔, ℒ𝑔⟩ = 𝜆𝑛 (ℒ). ‖𝑔‖2𝑝 (84) Lemma 6.7 (Small-set Poincaré inequality for mixtures). Keep the setup of Lemma 6.2. Further suppose that Z Z 𝑍𝛽 = 𝑒−𝛽𝑓1 𝑑𝑥 = · · · = 𝑒−𝛽𝑓𝑛 𝑑𝑥. R𝑑 R𝑑 (E.g., this holds for gaussians of equal variance.) Suppose that a Poincaré inequality holds for each −𝛽𝑓 𝑝e𝛽,𝑖 = 𝑒 𝑍𝛽 𝑖 with constant 𝐶𝛽 . Then on 𝑝𝛽 , a Poincaré inequality holds with constant 22 2𝐶𝛽 𝑤min on sets of size ≤ 2 𝑤min 2 . Proof. Let 𝐴 = Supp(𝑔). Then for all 𝑗, by Lemma 6.2, 𝑤min 𝑝e𝛽,𝑗 (𝐴) ≤ 𝑤𝑗 𝑝e𝛽,𝑗 (𝐴) ≤ 𝑛 X 𝑝e𝛽,𝑖 (𝐴) = 𝑝e𝛽 (𝐴) ≤ 𝑖=1 1 𝑤min 𝑝𝛽 (𝐴) ≤ 𝑤min 2 (85) 1 =⇒ 𝑝e𝛽,𝑗 (𝐴) ≤ . 2 (86) As in (66), using 𝑝e𝛽,𝑗 (𝐴) ≤ 12 , Var𝑝e𝛽,𝑗 (𝑔) ≥ ≥ ÅZ 1 2 ã Z𝐴 𝑔 2 𝑝e𝛽,𝑗 𝑑𝑥 − 𝐴 ã2 ÅZ 𝐴 (87) 𝑔 𝑝e𝛽,𝑗 𝑑𝑥 𝑔 2 𝑝e𝛽,𝑗 𝑑𝑥 (88) Then ℰ𝑝e𝛽 (𝑓 ) = ≥ Z 2 ‖∇𝑓 ‖ 𝐴 𝑛 X 𝑤𝑗 𝑝e𝛽,𝑗 (𝑥) 𝑑𝑥 (89) 𝑖=1 𝑛 1 X 𝑤𝑖 Var𝑝e𝛽,𝑗 (𝑓 ) 𝐶𝛽 𝑖=1 (90) Z 𝑛 1 1 X 𝑤𝑖 𝑓 2 𝑝e𝛽,𝑗 (𝑥) 𝑑𝑥 ≥ 𝐶𝛽 𝑖=1 2 𝐴 ≥ 1 Var𝑝e𝛽 (𝑓 ). 2𝐶𝛽 Using Lemma 6.2 and Lemma C.3(3), 𝑝𝛽 satisfies a Poincaré inequality with constant 6.4 (91) (92) 2𝐶𝛽 𝑤min . Existence of partition Now we are ready to prove the main lemma of this section, which gives the partitioning for any discrete space, discrete time Markov chain. In later subsections we will connect this back to the continuous space Markov chain. Lemma 6.8. Let 𝑝(𝑥) ∝ 𝑒−𝑓 (𝑥) be a probability density function on R𝑑 . Let 𝐶 and 𝜇 ≤ 1 be such that the Langevin chain on 𝑓 (𝑥) satisfies 𝜆𝑛+1 (L ) ≥ 𝐶1 , and a Poincaré inequality holds with constant 2𝐶 on sets of size ≤ 𝜇. Let 𝒫 = {𝐴1 , . . . , 𝐴𝑚 } be any partition of 𝐵 ⊆ R𝑑 . Let (R𝑑 , 𝑃𝑇 ) be the discrete-time Markov chain where each step is running continuous Langevin for time 𝑇 ≤ 𝐶2 , (𝐵, 𝑃𝑇 |𝐵 ) be the same Markov chain restricted to 𝐵, and ([𝑚], 𝑃𝑇 |𝐵 ) is the projected chain with respect to 𝒫. Suppose that 𝐵 satisfies the following. 1. For all 𝑥 ∈ 𝐵, 𝑃𝑇 (𝑥, 𝐵 𝑐 ) ≤ 2. 𝜆𝑛+1 (𝐼 − 𝑃𝑇 |𝐵 ) ≥ 3 4 Ä 𝑇 1000𝐶 . 𝜆𝑛+1 (𝐼 − 𝑃𝑇 ) − 𝑇 6𝐶 ä . Then there exists ℓ ≤ 𝑛 and a partition 𝒥 of [𝑚] into ℓ sets 𝐽1 , . . . , 𝐽ℓ such that the following hold. 23 Ä Ä 1. 𝒥 is a Ω 𝑇2 𝐶 2 𝑚8 ä ,𝑂 Ä ää 𝑇 𝐶 -clustering. 2. Every set in the partition has measure at least 𝜇 2. Proof. First we show that the (𝑛 + 1)th eigenvalue is large. Note that the eigenvalues of 𝑃𝑇 are the exponentials of the eigenvalues of L . 𝜆𝑛+1 (𝐼 − 𝑃𝑇 |𝐵 ) ≥ 𝜆𝑛+1 (𝐼 − 𝑃𝑇 |𝐵 ) Å ã 𝑇 3 𝜆𝑛+1 (𝐼 − 𝑃𝑇 ) − ≥ 4 6𝐶 3 𝑇 3 𝑇 −𝜆𝑛+1 (−L )𝑇 = (1 − 𝑒 − ) ≥ (1 − 𝑒−𝑇 /𝐶 − ) 4Å 6𝐶 4 6𝐶 ß ™ ã 1 𝑇 𝑇 𝑇 3 min , − = ≥ 4 2 2𝐶 6𝐶 4𝐶 Lemma 6.6 (93) assumption (94) (95) (96) Let 𝑐 be a small constant to be chosen. Let 𝑘 ≤ 𝑛 + 1 be the largest integer so that 𝜆𝑘−1 (𝐼 − 𝑃𝑇 |𝐵 ) ≤ Then 𝜆𝑘 (𝐼 − 𝑃𝑇 |𝐵 ) > parameters 𝑐2 𝑇 2 . 𝐶 2 𝑛6 𝑐2 𝑇 2 𝐶 2 𝑛6 (97) By Theorem A.8, for some 1 ≤ ℓ ≤ 𝑘 − 1, there exists a clustering with p 𝜆𝑘 Ω 2 , 𝑂(ℓ3 𝜆ℓ ) = 𝑘 Å Å ã ã Ç Ç 2 2å 𝑐 𝑇 Ω 𝐶 2 𝑛8 𝑐𝑇 ,𝑂 𝐶 Å ãå (98) S Now consider a set 𝐽 in the partition. Let 𝐴 = 𝑗∈𝐽 𝐴𝑗 . Suppose by way of contradiction that 𝑝(𝐴) ≤ 𝜇2 . By Lemma 6.5 and noting 𝑝(𝐴) < 12 , the conductance of 𝐴 in R𝑑 is 𝜑𝑇 (𝐴) ≥ 𝑇 1 (1 − 4𝑝(𝐴))𝑇 ≥ . 80(2𝐶) 320𝐶 (99) The conductance of 𝐴 in 𝐵 satisfies Å 𝑂 R Now by assumption, 𝐴 𝑃 (𝑥,𝐵 𝑐 )𝑝(𝑥) 𝑑𝑥 𝑝(𝐴) ≤ Å 𝑂 𝑐𝑇 𝐶 ã 𝑇 1000𝐶 , 𝑐𝑇 𝐶 ã + ≥ 𝜑𝑇 |𝐵 (𝐴). (100) so 𝑇 ≥ 𝜑𝑇 (𝐴) 1000𝐶 (101) For 𝑐 chosen small enough, together (99) and (101) give a contradiction. 6.5 Making arbitrarily fine partitions In this section we show when the discretization is fine enough, the spectral gap of the discrete Markov chain approaches the spectral gap of the continuous-space Markov chain. We will need the following fact from topology. 24 Lemma 6.9 (Continuity implies uniform continuity on compact set). If (Ω, 𝑑) is a compact metric space and 𝑔 : Ω → R is continuous, then for every 𝜀 > 0 there is 𝛿 such that for all 𝑥, 𝑥′ ∈ Ω with 𝑑(𝑥, 𝑥′ ) < 𝛿, |𝑔(𝑥) − 𝑔(𝑥′ )| < 𝜀. We know that the gap of a projected chain is at least the gap of the original chain, Gap(𝑀 ) ≥ Gap(𝑀 ) (Lemma 6.6). We show that if the size of the cells goes to 0, then the reverse inequality also holds. Moreover, the convergence is uniform in the size of the cells. Lemma 6.10. Let 𝑀 = (R𝑑 , 𝑃 ′ ) be a reversible Markov chain where the kernel 𝑃 ′ : Ω × Ω → R is continuous and > 0 everywhere and the stationary distribution 𝑝′ : Ω → R is a continuous function. Fix a compact set Ω ⊂ R𝑛 . Then 𝒫 lim inf 𝛿↘0 𝐾,𝒫 Gap(𝑀 |𝐾 ) =1 Gap(𝑀 |𝐾 ) where the infimum is over all compact sets 𝐾 ⊆ Ω and all partitions 𝒫 of 𝐾 composed of sets 𝐴 with diam(𝐴) < 𝛿. Proof. By Lemma 6.9 on ln 𝑃 ′ (𝑥, 𝑦) : Ω × Ω → R and 𝑝′ (𝑥), there exists 𝛿 > 0 such that for all 𝑥, 𝑦 ∈ Ω such that 𝑑(𝑥, 𝑥′ ) < 𝛿 and 𝑑(𝑦, 𝑦 ′ ) < 𝛿, 𝑃 ′ (𝑥′ , 𝑦 ′ ) ∈ [𝑒−𝜀 , 𝑒𝜀 ] 𝑃 ′ (𝑥, 𝑦) 𝑝′ (𝑥) ∈ [𝑒−𝜀 , 𝑒𝜀 ]. 𝑝′ (𝑥′ ) (102) (103) We also choose 𝛿 small enough so that for all sets 𝐴 with diameter < 𝛿, 𝑝(𝐴) < 𝜀. Let 𝑃 and 𝑝 denote the kernel and stationary distribution for 𝑀 |𝐾 , and let 𝑃 (𝑥, 𝑑𝑦) = 𝛿𝑥 (𝑑𝑦)𝑃rej (𝑥) + 𝑃tr (𝑥, 𝑦) 𝑑𝑦, (104) where 𝑃rej (𝑥) = 𝑃 ′ (𝑥, 𝐾 𝑐 ) and 𝑃tr = 𝑃 ′ (the notation is to remind us that this is when a transition succeeds). Let 𝑃acc (𝑥) = 1 − 𝑃rej (𝑥) = Z 𝑃tr (𝑥, 𝑦) 𝑑𝑦. (105) 𝑌 Consider a partition 𝒫 all of whose components have diameter < 𝛿. Let the projected chain be 𝑀 |𝐾 = (Ω, 𝑃 ) with stationary distribution 𝑝. We let capital letters 𝑋, 𝑌 denote the elements of Ω, or the corresponding subsets of Ω, and 𝑓 denote a function Ω → R. Let 𝑄 be the probability distribution on Ω × Ω given by 𝑄(𝑥, 𝑑𝑦) = 𝑝(𝑥)𝑃 (𝑥, 𝑑𝑦), and similarly define 𝑄(𝑋, 𝑌 ) = 𝑝(𝑋)𝑃 (𝑋, 𝑌 ). Also write 𝑃 (𝑋, 𝑌 ) = 1𝑋=𝑌 𝑃 rej (𝑋) + 𝑃 tr (𝑋, 𝑌 ) Z 𝑃 rej (𝑋) = (106) 𝑝(𝑥)𝑃rej (𝑥) 𝑑𝑥 = 1 − 𝑃 acc (𝑋) (107) 𝑝(𝑥)𝑃tr (𝑥, 𝑦) 𝑑𝑥. (108) Z𝑋 𝑃 tr (𝑋, 𝑌 ) = 𝑋 25 We have s (𝑔(𝑥) − 𝑔(𝑦))2 𝑝(𝑥)𝑃 (𝑥, 𝑑𝑦) 𝑑𝑥 E𝑥,𝑦∼𝑄 [𝑔(𝑥) − 𝑔(𝑦)]2 R (109) = inf 𝑔 𝑔 2 (𝑔(𝑥) − E𝑝 𝑔(𝑥))2 𝑝(𝑥) 𝑑𝑥 E𝑥∼𝑝 [𝑔(𝑥) − E𝑝 𝑔]2 P 2 𝑋,𝑌 (𝑔(𝑋) − 𝑔(𝑌 )) 𝑝(𝑋)𝑃 (𝑋, 𝑌 ) 𝑑𝑥 𝑑𝑦 R P (110) Gap(𝑀 ) = inf 𝑔 2 ( 𝑋 𝑔(𝑋) − E𝑝 𝑔(𝑋))2 𝑝(𝑋) 𝑑𝑥 P 2 E𝑋,𝑌 ∼𝑄 [E𝑝 [𝑔|𝑋] − E𝑝 [𝑔|𝑌 ]]2 𝑋,𝑌 (E𝑝 [𝑔|𝑋] − E𝑝 [𝑔|𝑌 ]) 𝑝(𝑋)𝑃 (𝑋, 𝑌 ) R = inf = inf . 𝑔 𝑔 2 (E𝑝 [𝑔|𝒫](𝑥) − E𝑝 [𝑔])2 𝑝(𝑥) 𝑑𝑥 E𝑋∼𝑝 [E𝑝 [𝑔|𝑋] − E𝑝 [𝑔]]2 (111) Gap(𝑀 ) = inf We will relate these two quantities. Consider the denominator of (109). By the Pythagorean theorem, it equals the variation between sets in the partition, given by the denominator of (111), plus the variation within sets in the partition. 2 2 2 E [𝑔(𝑥) − E 𝑔] = E [E[𝑔|𝒫](𝑥) − E 𝑔] + E [𝑔(𝑥) − E[𝑔|𝒫](𝑥)] . 𝑥∼𝑝 𝑝 𝑥∼𝑝 𝑝 𝑥∼𝑝 𝑝 𝑝 (112) We also decompose the numerator of (109). First we show that we can approximate 𝑝(𝑥)𝑃tr (𝑥, 𝑦) with a distribution where 𝑦 is independent of 𝑥 given the set 𝑋 containing 𝑥. Using (102) and (103), s 𝑝(𝑥)𝑝(𝑦) 𝑋×𝑌 𝑝(𝑥′ )𝑃tr (𝑥′ , 𝑦 ′ ) 𝑑𝑥′ 𝑑𝑦 ′ 𝑝(𝑦) 𝑝(𝑥)𝑃 tr (𝑋, 𝑌 ) = (113) 𝑝(𝑌 ) 𝑝(𝑋)𝑝(𝑌 ) s 𝑝(𝑥)𝑃tr (𝑥, 𝑦) 𝑋×𝑌 𝑝(𝑥′ )𝑝(𝑦 ′ ) 𝑑𝑥′ 𝑑𝑦 ′ 2𝜀 ≤𝑒 (114) 𝑝(𝑋)𝑝(𝑌 ) = 𝑒2𝜀 𝑝(𝑥)𝑃tr (𝑥, 𝑦). (115) Let 𝑅 be the distribution on Ω × Ω defined as follows: 𝑋, 𝑌 ∼ 𝑄, 𝑥 ∼ 𝑝|𝑋 𝑦 ∼ 𝑝|𝑌 . We then have by (115) that x x (𝑔(𝑥) − 𝑔(𝑦))2 𝑝(𝑥)𝑃 (𝑥, 𝑦) 𝑑𝑥 𝑑𝑦 = (𝑔(𝑥) − 𝑔(𝑦))2 𝑝(𝑥)𝑃tr (𝑥, 𝑦) 𝑑𝑥 𝑑𝑦 Ω×Ω Ω×Ω ≥ 𝑒−2𝜀 x (𝑔(𝑥) − 𝑔(𝑦))2 𝑝(𝑥)𝑃 tr (𝑋, 𝑌 ) Ω×Ω = 𝑒−2𝜀 h E (116) (117) 𝑝(𝑦) 𝑑𝑥 𝑑𝑦 𝑝(𝑌 ) [𝑔(𝑥) − 𝑔(𝑦)]2 (118) (119) (𝑥,𝑦)∼𝑅 − X x [𝑔(𝑥) − 𝑔(𝑦)]2 𝑝(𝑥)𝑃 rej (𝑋) 𝑋 𝑋×𝑋 i 𝑝(𝑦) 𝑑𝑥 𝑑𝑦 . 𝑝(𝑋) (120) We use the Pythagorean Theorem: letting ℬ be the 𝜎-algebra of Ω, E[𝑔(𝑥) − 𝑔(𝑦)|𝒫 × ℬ] = E[𝑔|𝑋] − 𝑔(𝑦), (121) E[𝑔(𝑥) − 𝑔(𝑦)|𝒫 × 𝒫] = E[𝑔|𝑋] − E[𝑔|𝑌 ]. (122) 𝑝 𝑅 𝑝 𝑅 26 𝑝 Then (120) = 𝑒−2𝜀 h E (𝑥,𝑦)∼𝑅 − X x [(E[𝑔|𝑋] − E[𝑔|𝑌 ])2 + (𝑔(𝑥) − E[𝑔|𝒫](𝑥))2 + (𝑔(𝑦) − E[𝑔|𝒫](𝑦))2 ] 𝑝 𝑝 [(𝑔(𝑥) − E[𝑔|𝒫](𝑥))2 + (𝑔(𝑦) − E[𝑔|𝒫](𝑦))2 ]𝑝(𝑋)𝑃 rej (𝑋) 𝑋 𝑋×𝑋 = 𝑒−2𝜀 h i 𝑝(𝑦) 𝑑𝑥 𝑑𝑦 𝑝(𝑌 ) 2 E [𝑔(𝑥) − 𝑔(𝑦)] (123) (124) (125) 𝑥,𝑦∼𝑄 + x [(𝑔(𝑥) − E[𝑔|𝒫](𝑥))2 + (𝑔(𝑦) − E[𝑔|𝒫](𝑦))2 ]𝑝(𝑋)𝑃 tr (𝑋, 𝑌 ) 𝑋×𝑌 Thus, using 𝑎′ +𝑏′ 𝑎+𝑏 ≥ min ¶ 𝑎′ 𝑏′ 𝑎, 𝑏 © i 𝑝(𝑦) 𝑑𝑥 𝑑𝑦 𝑝(𝑌 ) (126) for 𝑎′ , 𝑏′ , 𝑎, 𝑏 > 0, and the decompositions (112) and (126), 2 nE E𝑥,𝑦∼𝑄 [𝑔(𝑥) − 𝑔(𝑦)]2 𝑋,𝑌 ∼𝑄 [(E𝑝 [𝑔|𝑋] − E𝑝 [𝑔|𝑌 ]) ] −2𝜀 , (127) ≥ 𝑒 min 2 E𝑥∼𝑝 [𝑔(𝑥) − E𝑝 𝑔]2 2 E𝑥∼𝑝 [E𝑝 [𝑔|𝒫](𝑥) − E𝑝 𝑔]2 s P 𝑝(𝑦) 2 2 𝑋,𝑌 ( 𝑋×𝑌 [(𝑔(𝑥) − E[𝑔|𝒫](𝑥)) + (𝑔(𝑦) − E[𝑔|𝒫](𝑦)) ]𝑝(𝑋)𝑃 tr (𝑋, 𝑌 ) 𝑝(𝑌 ) 𝑑𝑥 𝑑𝑦) o . 2 E𝑥∼𝑝 [𝑔(𝑥) − E𝑝 [𝑔|𝒫](𝑥)]2 (128) The first ratio in the minimum is at least Gap(𝑃 ) by (111). We now bound the second ratio (128). The numerator of (128) is ≥ min 𝑃 acc (𝑋) 𝑋 E (𝑥,𝑦)∼𝑅 [(𝑔(𝑥) − E[𝑔|𝒫](𝑥))2 + (𝑔(𝑦) − E[𝑔|𝒫](𝑦))2 ] = 2 min 𝑃 acc (𝑋) E [𝑔(𝑥) − E[𝑔|𝒫](𝑥)]2 . 𝑥∼𝑝 𝑋 (129) (130) We claim that 𝑃 acc (𝑋) ≥ (1 − 𝜀) Gap(𝑀 ). Consider 𝑔(𝑌 ) = 1𝑋=𝑌 . Then Gap(𝑃 ) ≤ E𝑋,𝑌 ∼𝑄 [𝑔(𝑋) − 𝑔(𝑌 )]2 2[E𝑥∼𝑝 [𝑔(𝑋)2 ] − [E𝑥∼𝑝 𝑔(𝑋)]2 ] 2𝑄(𝑋, 𝑋 𝑐 ) 2[𝑝(𝑋) − 𝑝(𝑋)2 ] 𝑃 acc (𝑋) ≤ 1 − 𝑝(𝑋) 𝑃 acc (𝑋) ≤ 1−𝜀 ≤ (131) (132) (133) (134) Putting everything together, Gap(𝑀 |𝐾 ) ≥ 𝑒−2𝜀 min{Gap(𝑀 |𝐾 ), (1 − 𝜀) Gap(𝑀 |𝐾 )}. (135) Combined with Lemma 6.6 (Gap(𝑀 |𝐾 ) ≥ Gap(𝑀 |𝐾 )) and letting 𝜀 ↘ 0, this finishes the proof. 27 6.6 Restriction to large compact set Finally we show it is OK to restrict to a large compact set. Intuitively this should be clear as the gaussian density functions are highly concentrated around their means. Lemma 6.11. Let 𝑝𝛽 (𝑥) ∝ 𝑒−𝛽𝑓¶(𝑥) where 𝑓 (𝑥) = ©− ln 𝑛𝑖=1 𝑤𝑖 𝑝𝑖 (𝑥) and 𝑝𝑖 (𝑥) is the pdf of a gaussian with mean 𝜇𝑖 . Let 𝐵𝑅 = 𝑥 ∈ R𝑑 : ‖𝑥‖ ≤ 𝑅 . For any 𝑇 > 0, for any 𝜀1 > 0, there exists 𝑅 such that for any 𝑟 ≥ 𝑅, P 1. For any 𝑥 ∈ 𝐵𝑅 , 𝑃𝑇 (𝑥, 𝐵 𝑐 ) ≤ 𝑒−𝛽𝑇 /2 . 2. For any 𝑓 with Supp(𝑓 ) ⊆ 𝐵𝑅 , ℰ𝑃𝑇 |𝐵 (𝑔) 𝑅 Var𝑝|𝐵 (𝑔) Ç ≥ (1 − 𝜀1 ) 𝑅 ℰ𝑃𝑇 (𝑔) − 𝑒−𝛽𝑇 /2 Var𝑝 (𝑔) å (136) 3. For all 𝑚, 𝜆𝑚 (𝑃𝑇 |𝐵𝑅 ) ≥ (1 − 𝜀1 )(𝜆𝑚 (𝑃𝑇 ) − 𝑒−𝛽𝑇 /2 ). Note that we can improve the 𝑒−𝛽𝑇 /2 to arbitrary 𝜀2 > 0 with a more careful analysis using martingale concentration bounds, but this weaker version suffices for us. Proof. Let 𝜇 be such that ‖𝜇𝑖 ‖ ≤ 𝐷 for all 1 ≤ 𝑖 ≤ 𝑚. Let 𝑌𝑡 = ‖𝑋𝑡 ‖2 . By It^o’s Lemma, ¨ ∂ √ 𝑑𝑌𝑡 = 2 𝑋𝑡 , −𝛽∇𝑓 (𝑋𝑡 ) 𝑑𝑡 + 2 𝑑𝐵𝑡 + 2𝑑 · 𝑑𝑡 * = −2 𝑋𝑡 , ≤ ≤ −‖𝑋𝑡 −𝜇𝑖 ‖2 /2 𝑖=1 𝑤𝑖 (𝑋𝑡 − 𝜇𝑖 )𝑒 P𝑛 −‖𝑋𝑡 −𝜇𝑖 ‖2 /2 𝑖=1 𝑤𝑖 𝑒 P𝑛 ! + 2𝑑 𝑑𝑡 + −‖𝑋𝑡 −𝜇𝑖 ‖2 𝑖=1 𝑤𝑖 [(𝑋𝑡 − 𝜇) + (𝜇 − 𝜇𝑖 )]𝑒 −2 𝑋𝑡 , P𝑛 −‖𝑋𝑡 −𝜇𝑖 ‖2 𝑖=1 𝑤𝑖 𝑒 √ (−2𝛽𝑌𝑡 + 𝛽𝐷 ‖𝑋𝑡 ‖ + 2𝑑)𝑑𝑡 + 8(𝑋𝑡 − 𝜇)* 𝑑𝐵𝑡 Ç å √ 𝐷2 𝛽 −𝛽𝑌𝑡 + + 2𝑑 𝑑𝑡 + 8(𝑋𝑡 − 𝜇)* 𝑑𝐵𝑡 * = −𝛽 + 𝛽 P𝑛 + √ 8(𝑋𝑡 − 𝜇)* 𝑑𝐵𝑡 ! + 2𝑑 𝑑𝑡 + √ 8(𝑋𝑡 − 𝜇)* 𝑑𝐵𝑡 (137) (138) (139) (140) (141) 4 2 Let 𝐶 = 𝐷4 𝛽 + 2𝑑 and consider the change of variable 𝑍𝑡 = 𝑒𝛽𝑡 (𝑌𝑡 − 𝐶𝛽 ). Since this is linear in 𝑌𝑡 , It^o’s Lemma reduces to the usual change of variables and Å ã √ 𝐶 𝛽𝑡 𝑑𝑍𝑡 ≤ 𝛽𝑒 𝑌𝑡 − 𝑑𝑡 + 𝑒𝛽𝑡 ((−𝛽𝑌𝑡 + 𝐶)𝑑𝑡 + 8(𝑋𝑡 − 𝜇* )𝑑𝐵𝑡 ) (142) 𝛽 √ 𝛽𝑡 ≤ 8𝑒 (𝑋𝑡 − 𝜇)* 𝑑𝐵𝑡 . (143) Suppose 𝑍0 is a point with norm ≤ 𝑅. By the martingale property of the It^o integral and Markov’s inequality, ï Å E 𝑒𝛽𝑇 ‖𝑋𝑇 ‖2 − 𝐶 𝛽 ãò = E𝑍𝑇 ≤ 𝑍0 = ‖𝑋0 ‖2 − 𝐶 𝛽 𝐶 (1 − 𝑒−𝛽𝑇 ) 𝛽 𝑒−𝛽𝑇 (𝑅2 + 𝐶𝛽 (1 − 𝑒−𝛽𝑇 )) (144) =⇒ E ‖𝑋𝑇 ‖2 ≤ 𝑒−𝛽𝑇 ‖𝑋0 ‖2 + (145) P(‖𝑋𝑇 ‖ ≥ 𝑅) ≤ (146) 𝑅2 ≤ 𝑒−𝛽𝑇 /2 28 (147) for all 𝑅 large enough. This shows the first part. Note that the restricted 𝑃𝑇 |𝐵𝑅 operates on functions 𝑔 with Supp(𝑔) ⊆ 𝐵𝑅 as 𝑃𝑇 |𝐵𝑅 𝑔(𝑥) = Z 𝐵𝑅 Z = 𝐵𝑅 𝑃𝑇 |𝐵𝑅 (𝑥, 𝑑𝑦)𝑔(𝑥) (148) 𝑐 𝑃𝑇 (𝑥, 𝑦)𝑔(𝑥) 𝑑𝑦 + 𝑃𝑇 (𝑥, 𝐵𝑅 )𝑔(𝑥) (149) 𝑐 = 1𝐵𝑅 [𝑃𝑇 𝑔(𝑥) + 𝑃𝑇 (𝑥, 𝐵𝑅 )𝑔(𝑥)] (150) Without loss of generality we may assume that E𝑔 = 0. (This is unchanged by whether we take 𝑥 ∼ 𝑝 or 𝑥 ∼ 𝑝|𝐵𝑅 .) Then for 𝑅 large enough, ⟨𝑃𝑇 |𝐵𝑅 𝑔, 𝑔⟩𝑝 ≤ ⟨𝑃𝑇 𝑔, 𝑔⟩𝑝 + 𝑒−𝛽𝑇 /2 ‖𝑔‖2𝑝 ⟨(𝐼 − 𝑃𝑇 |𝐵𝑅 )𝑔, 𝑔⟩𝑝|𝐵 ≥ ⟨(𝐼 − 𝑃𝑇 |𝐵𝑅 )𝑔, 𝑔⟩𝑝 ⟨(𝐼 − 𝑃𝑇 )𝑔, 𝑔⟩ − 𝑒−𝛽𝑇 /2 ‖𝑔‖2 𝑝(𝐵𝑅 ) ℰ𝑝𝑇 |𝐵 (𝑔) 𝑅 Var𝑝|𝐵 𝑅 (152) 𝑝(𝐵𝑅 ) 𝑅 ≥ (151) 1 ≥ 𝑝(𝐵𝑅 ) (𝑔) Ç (153) å ℰ𝑝𝑇 (𝑔) − 𝑒−𝛽𝑇 /2 . Var𝑝 (𝑔) (154) Taking 𝑅 large enough, 𝑝(𝐵1𝑅 ) can be made arbitrarily close to 1. The inequality for eigenvalues follows from the variational characterization as in the proof of Lemma C.3. 7 Mixing at the highest temperature Definition 7.1. For a function 𝑓 : R𝑑 → R ∪ {∞}, define the 𝛼-strongly convex envelope SCE𝛼 [𝑓 ] : R𝑑 → R ∪ {∞} by SCE𝛼 [𝑓 ] = sup 𝑔(𝑥) (155) 𝑔≤𝑓 𝑔 is 𝛼-s.c. where “s.c.” is an abbreviation for strongly convex. Proposition 7.2. SCE𝛼 [𝑓 ] is 𝛼-strongly convex. Note we use the following definition of strongly convex, valid for any (not necessarily differentiable) function 𝑓 : R𝑑 → R, ∀𝑡 ∈ [0, 1], 1 𝑓 (𝑡𝑥 + (1 − 𝑡)𝑦) ≤ 𝑡𝑓 (𝑥) + (1 − 𝑡)𝑓 (𝑦) − 𝛼𝑡(1 − 𝑡) ‖𝑥 − 𝑦‖22 2 29 (156) Proof. Let 𝑡 ∈ [0, 1]. We check 𝑡SCE𝛼 [𝑓 ](𝑥) + (1 − 𝑡)SCE𝛼 [𝑓 ](𝑦) = 𝑡 𝑔(𝑥) + (1 − 𝑡) sup 𝑔≤𝑓 𝑔 is 𝛼-s.c. ≤ sup sup 𝑔(𝑦) (157) 𝑔≤𝑓 𝑔 is 𝛼-s.c. [𝑡𝑔(𝑥) + (1 − 𝑡)𝑔(𝑦)] (158) 1 [𝑔(𝑡𝑥 + (1 − 𝑡)𝑦) + 𝛼𝑡(1 − 𝑡) ‖𝑥 − 𝑦‖22 ] 2 (159) 𝑔≤𝑓 𝑔 is 𝛼-s.c. ≤ sup 𝑔≤𝑓 𝑔 is 𝛼-s.c. ≤ SCE𝛼 [𝑓 ](𝑡𝑥 + (1 − 𝑡)𝑦). Ç − 𝑖=1 𝑤𝑖 𝑒 P𝑛 Lemma 7.3. Let 𝑓 (𝑥) = − ln ‖𝑥−𝜇𝑖 ‖2 (160) å where 𝑤1 , . . . , 𝑤𝛼 > 0, 2 P𝑚 𝑖=1 𝑤𝑖 = 1, and 𝑤min = min1≤𝑖≤𝑚 𝑤𝑖 . Suppose ‖𝜇𝑖 ‖ ≤ 𝐷 for all 1 ≤ 𝑖 ≤ 𝑚. Then there exists a 12 -strongly convex function 𝑔(𝑥) such that ‖𝑓 − 𝑔‖∞ ≤ 𝐷2 . Proof. We show that 𝑔 = SCE 1 [𝑓 ] works. It is 2 that 𝑔(𝑥) ≤ 𝑓 (𝑥) − 𝐷2 . Let 𝑥, 𝑦 ∈ R𝑑 . We have 𝑓 (𝑥) = − ln 𝑛 X − 𝑤𝑖 𝑒 ‖𝑥−𝜇𝑖 ‖2 ! = − ln 2 𝑖=1 ≥ − ln 𝑛 X Ç 𝑤𝑖 𝑒 𝑖=1 𝑛 Ç X 𝑤𝑖 𝑒 1 2 -strongly − ‖𝑦−𝜇𝑖 ‖2 − ‖𝑦−𝜇𝑖 ‖2 2 𝑖=1 2 − convex by Proposition 7.2. We show ‖𝑥−𝑦‖2 +⟨𝑥−𝑦,𝜇𝑖 −𝑦⟩ 2 å å (161) ‖𝑥 − 𝑦‖2 + ⟨𝑥 − 𝑦, 𝜇𝑖 − 𝑦⟩ − max − 𝑖 2 (162) ô ñ ‖𝑥 − 𝑦‖2 ‖𝑥 − 𝑦‖2 = 𝑓 (𝑦) + + ⟨𝑥 − 𝑦, 𝑦⟩ + min − ⟨𝑥 − 𝑦⟩ , 𝜇𝑖 𝑖 4 4 (163) ñ î ó ‖𝑥 − 𝑦‖2 + ⟨𝑥 − 𝑦, 𝑦⟩ + min − ‖𝜇𝑖 ‖2 ≥ 𝑓 (𝑦) + 𝑖 4 2 ‖𝑥 − 𝑦‖ ≥ 𝑓 (𝑦) + + ⟨𝑥 − 𝑦, 𝑦⟩ − 𝐷2 4 ô (164) (165) The RHS is a 12 -strongly convex function in 𝑥 that equals 𝑓 (𝑦) − 𝐷2 at 𝑥 = 𝑦, and is ≤ 𝑓 (𝑥) everywhere. Therefore, SCE 1 [𝑓 ](𝑦) ≥ 𝑓 (𝑦) − 𝐷2 . 2 Lemma 7.4. Keep the setup of Lemma 7.3. Then Langevin diffusion on 𝛽𝑓 (𝑥) satisfies a Poincaré inequality with constant 16𝑒2𝛽𝐷 𝛽 2 . Proof. Let 𝑔(𝑥) be as in Lemma 7.3. Since 𝛽𝑔(𝑥) is 𝛽2 -strongly convex, by Theorem A.12 it satisfies 2 a Poincaré inequality with constant 16 𝛽 . Now ‖𝛽𝑓 − 𝛽𝑔‖∞ ≤ 𝛽𝐷 , so by Lemma C.3, 𝛽𝑓 satisfies a Poincaré inequality with constant 16 2𝛽𝐷2 . 𝛽 𝑒 30 8 Discretizing the continuous chains As a notational convenience, in the section to follow we will denote 𝑥* = argmin𝑥∈R𝑑 𝑓˜(𝑥). Lemma 8.1. Let 𝑝𝑡 , 𝑞 𝑡 : R𝑑 × [𝐿] → R be the distributions after running the simulated tempering chain for 𝑡 steps, where in 𝑝𝑡 , for any temperature 𝑖 ∈ 𝐿, the Type 1 transitions are taken according to the (discrete time) Markov kernel 𝑃𝑇 : running Langevin diffusion for time 𝑇 ; in 𝑞 𝑡 , the Type 1 transitions are taken according to running 𝑇𝜂 steps of the discretized Langevin diffusion, using 𝜂 as the discretization granularity, s.t. 𝜂 ≤ KL(𝑝𝑡 ||𝑞 𝑡 ) . 𝜎2 2 . Then, 𝜂2 𝜂 𝜂2 2 2 (𝐷 + 𝑑)𝑇 𝑡 + max E𝑥∼𝑝0 (·,𝑖) ‖𝑥 − 𝑥* ‖22 + 4 𝑑𝑡𝑇 𝜎6 𝜎6 𝑖 𝜎 Before proving the above statement, we make a note on the location of 𝑥* to make sense of max𝑖 E𝑥∼𝑝0 (·,𝑖) ‖𝑥 − 𝑥* ‖22 Namely, we show: √ Lemma 8.2 (Location of minimum). Let 𝑥* = argmin𝑥∈R𝑑 𝑓˜(𝑥). Then, ‖𝑥* ‖ ≤ 2𝐷. Proof. Since 𝑓˜(0) = 𝐷2 , 𝜎2 it follows that min𝑥∈R𝑑 𝑓˜(𝑥) ≤ −𝐷2 /𝜎 2 . However, for any 𝑥, it holds that 2 ‖𝜇𝑖 − 𝑥‖ 𝑓˜(𝑥) ≥ min 𝑖 𝜎2 2 ‖𝑥‖ − max𝑖 ‖𝜇𝑖 ‖2 ≥ 𝜎2 2 ‖𝑥‖ − 𝐷2 ≥ 𝜎2 Hence, if ‖𝑥‖ > √ 2𝐷, 𝑓˜(𝑥) > min𝑥∈R𝑑 𝑓˜(𝑥). This implies the statement of the lemma. We prove a few technical lemmas. First, we prove that the continuous chain is essentially contained in a ball of radius 𝐷. More precisely, we show: Lemma 8.3 (Reach of continuous chain). Let 𝑃𝑇𝛽 (𝑋) be the Markov kernel corresponding to evolving Langevin diffusion 𝑑𝑋𝑡 = −𝛽∇𝑓˜(𝑋𝑡 ) + 𝑑𝐵𝑡 𝑑𝑡 with 𝑓˜ and 𝐷 are as defined in 2 for time 𝑇 . Then, E[‖𝑋𝑡 − 𝑥* ‖2 ] ≤ E[‖𝑋0 − 𝑥* ‖2 ] + (4𝛽𝐷2 + 2𝑑)𝑇 Proof. Let 𝑌𝑡 = ‖𝑋𝑡 − 𝑥* ‖2 . By It^ os Lemma, we have ‖𝑋𝑡 −𝜇𝑖 ‖2 𝜎2 𝑛 X 𝑤𝑖 𝑒− * 𝑑𝑌𝑡 = −2⟨𝑋𝑡 − 𝑥 , 𝛽 P𝑛 𝑖=1 − 𝑖=1 𝑤𝑖 𝑒 (𝑋𝑡 − 𝜇𝑖 ) ‖𝑋𝑡 −𝜇𝑖 ‖2 𝜎2 31 𝑑 √ X ⟩ + 2𝑑 𝑑𝑡 + 8 (𝑋𝑡 )𝑖 𝑑(𝐵𝑖 )𝑡 𝑖=1 (166) We claim that −⟨𝑋𝑡 − 𝑥* , 𝑋𝑡 − 𝜇𝑖 ⟩ ≤ 𝐷 2 Indeed, −⟨𝑋𝑡 − 𝑥* , 𝑋𝑡 − 𝜇𝑖 ⟩ ≤ −‖𝑋𝑡 ‖2 + ‖𝑋𝑡 ‖(‖𝜇𝑖 ‖ + ‖𝑥* ‖) + ‖𝑥* ‖‖𝜇𝑖 ‖ ≤ 4𝐷2 where the last inequality follows from ‖𝜇𝑖 | ≤ 𝐷 and Lemma 8.2 Together with (166), we get 𝑑 √ X 𝑑𝑌𝑡 ≤ 𝛽4𝐷2 + 2𝑑 𝑑𝑡 + 8 (𝑋𝑡 )𝑖 𝑑(𝐵𝑖 )𝑡 𝑖=1 Integrating, we get √ Z 𝑌𝑡 ≤ 𝑌0 + 𝛽4𝐷 𝑇 + 2𝑑𝑇 + 8 2 0 𝑇 𝑑 X (𝑋𝑡 )𝑖 𝑑(𝐵𝑖 )𝑡 𝑖=1 Taking expectations and using the martingale property of the It^o integral, we get the claim of the lemma. Next, we prove a few technicall bound the drift of the discretized chain after 𝑇 /𝜂 discrete steps. The proofs follow similar calculations as those in [Dal16]. We will first need to bound the Hessian of 𝑓˜. Lemma 8.4 (Hessian bound). ∇2 𝑓˜(𝑥) ⪯ 2 𝐼, ∀𝑥 ∈ R𝑑 𝜎2 Proof. For notational convenience, let 𝑝(𝑥) = 𝑛𝑖=1 𝑤𝑖 𝑒−𝑓𝑖 (𝑥) , where 𝑓𝑖 (𝑥) = R 𝑍 = R𝑑 𝑒−𝑓𝑖 (𝑥) 𝑑𝑥. Note that 𝑓˜(𝑥) = − log 𝑝(𝑥). The Hessian of 𝑓˜ satisfies P ∇2 𝑓˜ = P 𝑖 𝑤𝑖 𝑒 −𝑓𝑖 ∇2 𝑓 𝑖 𝑝 ⪯ max ∇2 𝑓𝑖 ⪯ 𝑖 − 1 2 P 𝑖,𝑗 (𝑥−𝜇𝑖 )2 𝜎2 + log 𝑍 and 𝑤𝑖 𝑤𝑗 𝑒−𝑓𝑖 𝑒−𝑓𝑗 (∇𝑓𝑖 − ∇𝑓𝑗 )⊗2 𝑝2 2 𝐼 𝜎2 as we need. Lemma 8.5 (Bounding interval drift). In the setting of this section, let 𝑥 ∈ R𝑑 , 𝑖 ∈ [𝐿], and let 𝜎2 𝜂 ≤ 2𝛼 . ä 𝑑𝑇 𝜂 4𝜂 2 Ä ” KL(𝑃𝑇 (𝑥, 𝑖)||𝑃 (𝑥, 𝑖)) ≤ ‖𝑥 − 𝑥* ‖22 ) + 2𝑇 𝑑 + 4 𝑇 6 3𝜎 𝜎 32 d Proof. Let 𝑥𝑗 , 𝑖 ∈ [0, 𝑇 /𝜂 − 1] be a random variable distributed as 𝑃 𝜂𝑗 (𝑥, 𝑖). By Lemma 2 in [Dal16] and Lemma 8.4 , we have ” KL(𝑃𝑇 (𝑥, 𝑖)||𝑃 𝑇 (𝑥, 𝑖)) ≤ 𝑇 /𝜂−1 𝑑𝑇 𝜂 𝜂3 X E[‖∇𝑓 (𝑥𝑘 )‖22 ] + 4 4 3𝜎 𝑘=0 𝜎 Similarly, the proof of Corollary 4 in [Dal16] implies that 𝑇 /𝜂−1 𝜂 X E[‖∇𝑓 (𝑥𝑘 )‖22 ] ≤ 𝑘=0 4 8𝑇 𝑑 ‖𝑥 − 𝑥* ‖22 + 2 𝜎2 𝜎 Finally, we prove a convenient decomposition theorem for the KL divergence of two mixtures of distributions, in terms of the KL divergence of the weights and the components in the mixture. Concretely: Lemma 8.6. Let 𝑤, 𝑤′ : 𝐼 → R be distributions over a domain 𝐼 with full support. Let 𝑝𝑖 , 𝑞𝑖 : ∀𝑖 ∈ 𝐼 be distributions over an arbitrary domain. Then: ÅZ KL 𝑤𝑖 𝑝𝑖 || Z 𝑖∈𝐼 𝑖∈𝐼 ã 𝑤𝑖′ 𝑞𝑖 ≤ KL(𝑤||𝑤′ ) + Z 𝑤𝑖 KL(𝑝𝑖 ||𝑞𝑖 ) 𝑖∈𝐼 Proof. Overloading notation, we will use 𝐾𝐿(𝑎||𝑏) for two measures 𝑎, 𝑏 even if they are not necessarily probability distributions, with the obvious definition. ÅZ KL 𝑖∈𝐼 𝑤𝑖 𝑝𝑖 || Z 𝑖∈𝐼 𝑤𝑖′ 𝑞𝑖 ã 𝑤′ 𝑤𝑖 𝑝𝑖 || 𝑤𝑖 𝑞𝑖 𝑖 = KL 𝑤𝑖 𝑖∈𝐼 𝑖∈𝐼 Ç å Z ′ 𝑤 ≤ 𝑤𝑖 KL 𝑝𝑖 ||𝑞𝑖 𝑖 𝑤𝑖 𝑖∈𝐼 Ç å Z 𝑤𝑖 = 𝑤𝑖 log + KL(𝑝𝑖 ||𝑞𝑖 ) 𝑤𝑖′ 𝑖∈𝐼 ÇZ å Z ′ Z = KL(𝑤||𝑤 ) + 𝑤𝑖 KL(𝑝𝑖 ||𝑞𝑖 ) 𝑖∈𝐼 where the first inequality holds due to the convexity of KL divergence. With this in mind, we can prove the main claim: Proof of 8.1. Let’s denote by 𝑃𝑇 (𝑥, 𝑖) : R𝑑 × [𝐿] → R, ∀𝑥 ∈ R𝑑 , 𝑖 ∈ [𝐿] the distribution on R𝑑 × [𝐿] corresponding to running the Langevin diffusion chain for 𝑇 time steps on the 𝑖-th coordinate, ” starting at 𝑥 × {𝑖}, and keeping the remaining coordinates fixed. Let us define by 𝑃 𝑇 (𝑥, 𝑖) : 𝑑 R × [𝐿] → R the analogous distribution, except running the discretized Langevin diffusion chain for 𝑇𝜂 time steps on the 𝑖-th coordinate. 33 Let’s denote by 𝑅 (𝑥, 𝑖) : R𝑑 × [𝐿] → R the distribution on R𝑑 × [𝐿], running the Markov transition matrix corresponding to a Type 2 transition in the simulated tempering chain, starting at (𝑥, 𝑖). We will proceed by induction. Towards that, we can obviously write 𝑝 𝑡+1 1 = 2 𝐿−1 X ! 1 𝑝 (𝑥, 𝑖)𝑃𝑇 (𝑥, 𝑖) + 2 𝑖=0 Z 𝑥∈R𝑑 𝐿−1 X Z 𝑡 ! 𝑡 𝑝 (𝑥, 𝑖)𝑅(𝑥, 𝑖) 𝑥∈R𝑑 𝑖=0 and similarly 𝑞 𝑡+1 1 (𝑥, 𝑖) = 2 𝐿−1 X Z ! 𝑡 ” 𝑞 (𝑥, 𝑖)𝑃 𝑇 (𝑥, 𝑖) 𝑥∈R𝑑 𝑖=0 1 + 2 𝐿−1 X Z ! 𝑡 𝑞 (𝑥, 𝑖)𝑅(𝑥, 𝑖) 𝑥∈R𝑑 𝑖=0 (Note: the 𝑅 transition matrix doesn’t change in the discretized vs continuous version.) By convexity of KL divergence, we have KL(𝑝 𝑡+1 𝑡+1 ||𝑞 1 ) ≤ KL 2 1 + KL 2 𝐿−1 X Z 𝑥∈R𝑑 𝑖=0 Z 𝐿−1 X Z 𝑡 𝑝 (𝑥, 𝑖)𝑃𝑇 (𝑥, 𝑖)|| 𝑥∈R𝑑 𝑖=0 𝐿−1 X Z 𝑡 𝑝 (𝑥, 𝑖)𝑅(𝑥, 𝑖)|| 𝑥∈R𝑑 𝑖=0 𝐿−1 X ! 𝑡 ” 𝑞 (𝑥, 𝑖)𝑃 𝑇 (𝑥, 𝑖) ! 𝑡 𝑞 (𝑥, 𝑖)𝑅(𝑥, 𝑖) 𝑥∈R𝑑 𝑖=0 By Lemma 8.6, we have that 𝐿−1 X Z KL 𝐿−1 X Z 𝑡 𝑝 (𝑥, 𝑖)𝑅(𝑥, 𝑖)|| 𝑥∈R𝑑 𝑖=0 ! 𝑡 𝑞 (𝑥, 𝑖)𝑅(𝑥, 𝑖) ≤ KL(𝑝𝑡 ||𝑞 𝑡 ) 𝑥∈R𝑑 𝑖=0 Similarly, by Lemma 8.5 together with Lemma 8.6 we have 𝐿−1 X Z KL 𝑥∈R𝑑 𝑖=0 KL(𝑝𝑡 ||𝑞 𝑡 ) + Z 𝑡 𝑝 (𝑥, 𝑖)𝑃𝑇 (𝑥, 𝑖)|| 𝐿−1 X 𝑥∈R𝑑 𝑖=0 ! ” 𝑞 (𝑥, 𝑖)𝑃𝑇 (𝑥, 𝑖) ≤ 𝑡 Å 4𝜂 2 3𝜎 6 ã max E𝑥∼𝑝𝑡 (·,𝑖) ‖𝑥 − 𝑥* ‖22 + 2𝑇 𝑑 + 𝑖 𝑑𝑇 𝜂 𝜎4 By Lemmas 8.3 and 8.2, we have that for any 𝑖 ∈ [0, 𝐿 − 1], E𝑥∼𝑝𝑡 (·,𝑖) ‖𝑥 − 𝑥* ‖22 ≤ E𝑥∼𝑝𝑡−1 (·,𝑖) ‖𝑥‖2 + (4𝐷2 + 2𝑑)𝑇 Hence, inductively, we have E𝑥∼𝑝𝑡 (·,𝑖) ‖𝑥 − 𝑥* ‖22 ≤ E𝑥∼𝑝0 (·,𝑖) ‖𝑥 − 𝑥* ‖22 + (4𝐷2 + 2𝑑)𝑇 𝑡 Putting together, we have KL(𝑝 𝑡+1 ||𝑞 𝑡+1 4𝜂 2 𝑑𝑇 𝜂 ) ≤ KL(𝑝 ||𝑞 ) + 6 max E𝑥∼𝑝0 (·,𝑖) ‖𝑥 − 𝑥* ‖22 + (4𝐷2 + 2𝑑)𝑇 𝑡 + 2𝑇 𝑑 + 4 𝑖 3𝜎 𝜎 𝑡 𝑡 Å ã By induction, we hence have KL(𝑝𝑡 ||𝑞 𝑡 ) . 𝜂2 2 𝜂2 𝜂 2 (𝐷 + 𝑑)𝑇 𝑡 + max E𝑥∼𝑝0 (·,𝑖) ‖𝑥 − 𝑥* ‖22 + 4 𝑑𝑡𝑇 𝜂 𝜎6 𝜎6 𝑖 𝜎 as we need. 34 9 Proof of main theorem Before putting everything together, we show how to estimate the partition functions. We will apply the following to 𝑔1 (𝑥) = 𝑒−𝛽ℓ 𝑓 (𝑥) and 𝑔2 (𝑥) = 𝑒−𝛽ℓ+1 𝑓 (𝑥) . Lemma 9.1 (Estimating the partition function to within a constant factor). Suppose that 𝑝1 (𝑥) = 𝑔2 (𝑥) 𝑔1 (𝑥) e 𝑍1 and 𝑝2 (𝑥) = 𝑍2 are probability distributions on Ω. Suppose 𝑝1 is a distribution such that 𝑑𝑇 𝑉 (𝑝e1 , 𝑝1 ) < variable 𝜀 , 2𝐶 2 and 𝑔2 (𝑥) 𝑔1 (𝑥) ∈ [0, 𝐶] for all 𝑥 ∈ Ω. Given 𝑛 samples from 𝑝e1 , define the random 𝑛 1X 𝑔2 (𝑥𝑖 ) 𝑟= . 𝑛 𝑖=1 𝑔1 (𝑥𝑖 ) (167) Let 𝑟= E 𝑥∼𝑝1 and suppose 𝑟 ≥ 1 𝐶. 𝑔2 (𝑥) 𝑍2 = 𝑔1 (𝑥) 𝑍1 (168) 𝑛𝜀2 Then with probability ≥ 1 − 𝑒− 2𝐶 4 , 𝑟 − 1 ≤ 𝜀. 𝑟 (169) 𝑔2 (𝑥) 𝜀 𝑔2 (𝑥) − E . ≤ 𝐶𝑑𝑇 𝑉 (𝑝e1 , 𝑝1 ) ≤ 2𝐶 𝑥∼𝑝 e1 𝑔1 (𝑥) 𝑥∼𝑝1 𝑔1 (𝑥) (170) Proof. We have that E The Chernoff bound gives 𝑔2 (𝑥) 𝜀 ≥ 𝑔 (𝑥) 2𝐶 𝑥∼𝑝 e1 1 ! 𝑟− E P 2 𝜀 ) ( 2𝐶 2 𝑛𝜀2 2( 𝐶 2) = 𝑒− 2𝐶 4 . ≤𝑒 − 𝑛 (171) Combining (170) and (171) using the triangle inequality, 𝑛𝜀2 1 P |𝑟 − 𝑟| ≥ 𝐶 ≤ 𝑒− 2𝐶 4 . 𝜀 Å Dividing by 𝑟 and using 𝑟 ≥ 1 𝐶 ïZ R R𝑑 (172) gives the result. Lemma 9.2. Suppose that 𝑓 (𝑥) = − ln 𝑝𝛼 (𝑥) ∝ 𝑒−𝛼𝑓 (𝑥) , 𝑍𝛼 = If 𝛼 < 𝛽, then ã ñ P𝑛 𝑖=1 𝑤𝑖 𝑒 − ‖𝑥−𝜇𝑖 ‖2 ô 2 , 𝑝(𝑥) ∝ 𝑒−𝑓 (𝑥) , and for 𝛼 ≥ 0 let 𝑒−𝛼𝑓 (𝑥) 𝑑𝑥. Suppose that ‖𝜇𝑖 ‖ ≤ 𝐷 for all 𝑖. ò min{𝑝𝛼 (𝑥), 𝑝𝛽 (𝑥)} 𝑑𝑥 /𝑝𝛽 (𝐴) ≥ min 𝑥 𝐴 𝑍𝛽 𝑝𝛼 (𝑥) ≥ 𝑝𝛽 (𝑥) 𝑍𝛼   𝑍𝛽  1 −2(𝛽−𝛼) ∈ 𝑒 𝑍𝛼 2 35 𝐷+ √1𝛼 (173) √ 𝑑+ q Ä ln 2 𝑤min ä2  , 1 . (174) ! 1 Ä 1 𝑑 +𝛼 ln 𝑤 1 𝐷2 + 𝛼 Choosing 𝛽 − 𝛼 = 𝑂 ä , this quantity is Ω(1). min 2 −𝛼‖𝑥−𝜇𝑖 ‖ /2 . Proof. Let 𝑝e𝛼 (𝑥) ∝ 𝑛𝑖=1 𝑤𝑖 𝑒q Ä ä √ 2 Let 𝐶 = 𝐷 + √1𝛼 𝑑 + 2 ln 𝑤min . Then by Lemma 6.2, P 1 P (‖𝑥‖ ≥ 𝐶) 𝑤min 𝑥∼𝑝e𝛼 𝑛 1 X 𝑤𝑖 P𝑥∼e𝑔𝛼 (‖𝑥‖ ≥ 𝐶) ≤ 𝑤min 𝑖=1 P𝑥∼𝑝 (‖𝑥‖ ≥ 𝐶) ≤ ≤ 1 𝑤min 𝑛 X 𝑖=1 𝑤𝑖 P Ä 𝑥∼𝑁 0, √1𝛼 𝐼𝑑  = ñ (176) ä (‖𝑥‖2 ≥ (𝐶 − 𝐷)2 ) 1 ‖𝑥‖2 ≥ P 𝑤min 𝑥∼𝑁 (0,𝐼𝑑 ) 1 (175) √ Ç Å 𝑑+ Ç 2 2 ln 2 𝜀𝑤min ïZ 𝐴 ò  ãå2  (178) 2 2 𝑑 ln + ln 𝜀𝑤min 𝜀𝑤min Å P ‖𝑥‖ ≥ 𝑑 + 2 𝑤min 𝑥∼𝑁 (0,𝐼𝑑 ) 1 𝑤min 1 ≤ = 𝑤min 2 2 √ using the 𝜒2𝑑 tail bound P𝑦∼𝜒2 (𝑦 ≥ 2( 𝑑𝑥 + 𝑥)) ≤ 𝑒−𝑥 from [LM00]. 𝑑 Thus, using 𝑓 (𝑥) ≥ 0, ≤ (177) ã Å ãåô (180) . 𝑝𝛼 (𝑥) , 1}𝑝𝛽 (𝑥) 𝑑𝑥 𝑝𝛽 (𝐴) 𝑝𝛽 (𝑥) 𝐴 Z . 𝑍𝛽 ≥ min{ 𝑒(−𝛽+𝛼)𝑓 (𝑥) , 1}𝑝𝛽 (𝑥) 𝑑𝑥 𝑝𝛽 (𝐴) 𝑍𝛼 𝐴 𝑍𝛽 ≥ 𝑍𝛼 R −𝛽𝑓 (𝑥) 𝑒 𝑑𝑥 = R −𝛼𝑓 (𝑥) 𝑒 𝑑𝑥 min{𝑝𝛼 (𝑥), 𝑝𝛽 (𝑥)} 𝑑𝑥 /𝑝𝛽 (𝐴) ≥ Z min{ Z = ≥ (179) 𝑑 ZR 𝑒(−𝛽+𝛼)𝑓 (𝑥) 𝑝𝛼 (𝑥) 𝑑𝑥 ‖𝑥‖≤𝐷+ √1𝛼 1 ≥ 𝑒 2 √ −(𝛽−𝛼) max 1 −2(𝛽−𝛼) ≥ 𝑒 2 36  𝑑+ q 2 ln Ä ‖𝑥‖≤𝐷+ √2 𝛼 (182) (183) (184) (185) 2 𝑤min ä 𝑒(−𝛽+𝛼)𝑓 (𝑥) 𝑝𝛼 (𝑥) 𝑑𝑥 Ä√ » 𝑑+ ln 𝑤 2 min q Ä ä 2 √ 𝐷+ √1𝛼 ( 𝑑+ (181) ln ( 2 𝑤min ) (186) ä (𝑓 (𝑥)) ) (187) (188) Lemma 9.3. If 𝑝 = P𝑛 𝑖=1 𝑤𝑖 𝑝𝑖 where 𝑝𝑖 are probability distributions and 𝑤𝑖 > 0 sum to 1, then 𝜒2 (𝑝||𝑞) ≤ 𝑛 X 𝑤𝑖 𝜒2 (𝑝𝑖 ||𝑞). (189) 𝑖=1 Proof. We calculate 𝜒2 (𝑝||𝑞) = 𝑛 X 𝑞(𝑥)2 𝑑𝑥 − 1 𝑖=1 𝑤𝑖 𝑝𝑖 (𝑥) 𝑖=1 ≤ 𝑛 X Z 𝑤𝑖 !Ç X 𝑖=1 = (190) P𝑛 𝑛 X 𝑞(𝑥)2 𝑖𝑛𝑤𝑖 𝑝𝑖 (𝑥) 𝑞(𝑥)2 𝑑𝑥 − 1 𝑝𝑖 (𝑥) å ÇZ 𝑤𝑖 𝑖=1 = å 𝑑𝑥 − 1 𝑛 X (191) 𝑤𝑖 𝜒2 (𝑝𝑖 ||𝑞). (192) 𝑖=1 Lemma 9.4. Suppose that Algorithm 1 is run on temperatures 0 < 𝛽1 < · · · < 𝛽ℓ ≤ 1, ℓ ≤ 𝐿 with ”1 , . . . , 𝑍 cℓ satisfying partition function estimates 𝑍 c𝑖 ”1 𝑍 𝑍 1 − ≤ 1+ 𝑍𝑖 𝑍1 𝐿 Å ã𝑖−1 (193) for all 1 ≤ 𝑖 ≤ ℓ and with parameters satisfying 𝛽1 = 𝑂 Ç 2å 𝜎 (194) 𝐷2 Ñ 𝛽𝑖 − 𝛽𝑖−1 = 𝑂 Ä 𝐷2 𝑑 + ln Å 𝑇 = Ω 𝐷2 ln Ö Ä 1 Å (195) ää 1 𝑤min ãã (196) 𝑤min  𝐷8 𝑑4 + ln 𝑡=Ω Ä ä4  1 𝑤min 𝜀𝜎 2 𝑑𝑡𝑇 Ç ln 4 𝜎 8 𝑤min Ç 𝜂=𝑂 é 𝜎2 1 𝐷2 𝑑 ln (1/𝑤min ) 𝜖 𝜎 8 𝑤min å Ç max 𝐷2 𝑚16 , 𝜎 2 ln(1/𝑤min )4 è å (197) å . (198) Ä Ä 2 ä ä Let 𝑞 0 be the distribution 𝑁 0, 𝜎𝛽1 , 1 on R𝑑 × [ℓ]. The distribution 𝑞 𝑡 after running for 𝑡 steps satisfies 𝑝 − 𝑞 𝑡 1Ä≤ ä𝜀. Ä Ä ää Setting 𝜀 = 𝑂 𝐿1 above and taking 𝑚 = Ω ln 1𝛿 samples, with probability 1 − 𝛿 the estimate Ñ “ℓ+1 = 𝑍 “ℓ 𝑍 𝑚 1 X 𝑒(−𝛽ℓ+1 +𝛽ℓ )𝑓𝑖 (𝑥𝑗 ) 𝑚 𝑗=1 also satisfies (238). 37 é (199) Proof. First consider the case 𝜎 = 1. Consider simulated tempering 𝑀st |𝐵𝑅 : the type 1 transitions are running continuous Langevin for time 𝑇 , and if a type 1 transition would leave 𝐵𝑅 , then instead stay at the same location. Let 𝑝𝑡 |𝐵𝑅 be the distribution of 𝑀𝑠𝑡 |𝐵𝑅 after 𝑡 steps starting from 𝑝0 . By the triangle inequality, 𝑝 − 𝑞𝑡 1 ≤ ‖𝑝 − 𝑝|𝐵𝑅 ‖1 + 𝑝|𝐵𝑅 − 𝑝𝑡 |𝐵𝑅 1 + 𝑝𝑡 |𝐵𝑅 − 𝑝𝑡 + 𝑝𝑡 − 𝑞 𝑡 1 1 (200) Note that ‖𝑝 − 𝑝|𝐵𝑅 ‖1 and 𝑝𝑡 |𝐵𝑅 − 𝑝𝑡 1 approach 0 as 𝑅 → ∞, so we concentrate on the other two terms. Let 𝑀𝑖 be the chain at inverse temperature 𝛽𝑖 . Consider first 𝑖 ≥ 2. By Lemma 6.11, for any 𝜀 > 0 we can choose 𝑅 such that for all 𝑥 ∈ 𝐵𝑅 , 𝑃𝑇 (𝑥, 𝐵 𝑐 ) ≤ 𝑒−𝛽𝑇 /2 and 𝜆𝑛 (𝐼 − 𝑃𝑇 |𝐵𝑅 ) ≥ (1 − 𝜀)(𝜆𝑛 (𝐼 − 𝑃𝑇 ) − 𝑒−𝛽𝑇 /2 ) Ä For 𝑇 = Ω ln Ä 1 𝑤min ä ä 𝐷2 , we have 𝑒−𝛽𝑇 /2 = 𝑜 Ä 𝑇 𝑤min 𝐷2 ä . Thus we can ensure 3 𝑇 𝑤min 𝜆𝑛 (𝐼 − 𝑃𝑇 |𝐵𝑅 ) ≥ 𝜆𝑛 (𝐼 − 𝑃𝑇 ) − 𝑜 4 𝐷2 Å Å ãã By Theorem A.12, a Poincaré inequality holds for 𝛽𝑖 𝑓𝑗 with constant P the generator for Langevin on 𝑔e𝛽𝑖 (𝑥) = 𝑛𝑗=1 𝑤𝑖 𝑒−𝛽𝑖 𝑓𝑗 (𝑥) , 𝜆𝑛+1 (L ) ≥ 𝑤min 𝜆𝑛+1 (L ′ ) ã Å 𝑤min ≥Ω 𝐷2 (201) (202) ≤ 𝑂(𝐷2 ). Letting L ′ be 8 𝛽𝑖 by Lemma 6.2 and Lemma C.3 (203) by Lemma 6.1 (204) Ä 2 𝑤2 ä By Lemma 6.7 on 𝑝𝛽 , a Poincaré inequality holds with constant 𝑂 𝑤𝐷min . on sets of size ≤ min 2 . By Lemma 6.10, for each 𝑖, we can choose a partition 𝒬𝑖 of 𝐵𝑅 such that for every compact 𝐾 consisting of a union of sets in 𝒬𝑖 , Gap(𝑀𝑖 |𝐾 ) ≥ (1 − 𝜀) Gap(𝑀𝑖 |𝐾 All the conditions of Lemma 6.8 are satisfied with 𝐶 = 𝑂 Ä Ä is a Ω ä Ä ää , 𝑂 𝑇 𝑤𝐷min 2 2 𝑤min at least 4 2 (ln 1 )2 𝑚8 𝑤min 𝑤min Ä 𝒬𝑖 ). 𝐷2 𝑤min (205) ä . We obtain a partition 𝒫𝑖 that -clustering under the projected chain with each set in the partition having measure under 𝑝𝑖 . By having chose the partition fine enough, and by Cheeger’s inequality A.9, for each set 𝐴 in the 𝒫𝑖 , 1 (ln 𝑤min )4 𝒫𝑖 Gap(𝑀𝑖 |𝐴 ) ≥ (1 − 𝜀) Gap(𝑀𝑖 |𝐴 ) ≥ Ω 𝑚16 ! . (206) For the highest temperature, by Lemma 7.4, we have Gap(𝑀1 ) = Ω 𝛽1 𝑒−2𝛽1 𝐷 Ä 38 2 ä Å =Ω 1 . 𝐷2 ã (207) By Lemma 9.2, since the condition on 𝛽𝑖 − 𝛽𝑖−1 is satisfied, 𝛿((𝒫𝑖 )ℓ𝑖=1 ) = Ω(1). By assumption c𝑖 , 𝑟 = Ω(1) (𝑟 is defined in Assumption 5.1). By Theorem 5.2, the spectral gap of the simulated on 𝑍 tempering chain is 𝑟4 𝛿 2 𝑝2min 𝐺 := Gap(𝑀st ) = Ω min ℓ4 1 )4 (ln 𝑤min ( ! 𝑚16 1 , 2 𝐷 )! Ñ  𝑤4 = min min  ℓ4 1 ln 𝑤min 4 é 𝑚16  1  , 2 . 𝐷  (208) ln Choosing 𝑡 = Ω 𝑝 − 𝑞𝑡 1 Ä ℓ 𝜀𝑤min ä! , we get by Cauchy-Schwarz and (225) that 𝐺 ≤ 𝜒2 (𝑝||𝑞 𝑡 ) ≤ (1 − 𝐺)𝑡 𝜒2 (𝑝||𝑞 0 ) ≤ 𝑒−𝐺𝑡 𝜒2 (𝑝||𝑞 0 ) = 𝑂 Å 𝜀𝑤min 𝜒2 (𝑝||𝑞 0 ) ℓ ã (209) 1 (Note that 𝐺 < 2 − 𝜆max because the chain is somewhat lazy; it stays with probability 2ℓ .) To 2 2 2 2 2 2 ‖𝜇‖ /𝜎 calculate 𝜒 (𝑞||𝑝0 ), first note the 𝜒 distance between 𝑁 (0, 𝜎 𝐼𝑑 ) and 𝑁 (𝜇, 𝜎 𝐼𝑑 ) is ≤ 𝑒 : 𝜒2 (𝑁 (0, 𝜎 2 𝐼𝑑 ), 𝑁 (𝜇, 𝜎 2 𝐼𝑑 )) = ≤ 1 Z 𝑑 2 (2𝜋𝜎 2 ) R𝑑 Z 1 (2𝜋𝜎 2 ) 𝑑 2 𝑒2(− 𝑒(− ‖𝑥−𝜇‖2 ‖𝑥‖2 )+ 2 2𝜎 2 2𝜎 𝑑𝑥 − 1 ‖𝑥‖2 +2⟨𝑥,𝜇⟩−2‖𝜇‖2 )/𝜎 2 2 (210) 2 𝑒‖𝜇‖ /𝜎 2 2 𝑑𝑥 = 𝑒‖𝜇‖ /𝜎 2 . (211) R𝑑 Then by Lemma 9.3 and Lemma 6.2, 1 𝐼𝑑 𝑤min 𝛽1 Å Å Å ãX ãã 𝑚 ℓ 1 1 2 =𝑂 𝜒 𝑁 𝜇𝑖 , 𝐼𝑑 )||𝑁 (0, 𝐼𝑑 𝑤min 𝑖=1 𝛽1 𝛽1 𝜒2 (𝑝||𝑞 0 ) ≤ 𝑂 ℓ Å ã 2 𝑒 𝐷 𝛽1 ℓ 𝑤min =𝑂 Å ãã Å 𝜒2 𝑝e𝛽 ||𝑁 0, ! Å =𝑂 ℓ 𝑤min (212) (213) ã . (214) Together with (252) this gives 𝑝 − 𝑞 𝑡 1 ≤ 3𝜀 . For the term 𝑝𝑡 − 𝑞 𝑡 1 , use Pinsker’s inequality and Lemma 8.1 to get 𝑝𝑡 − 𝑞 𝑡 1 ≤ » 2KL(𝑝𝑡 ||𝑞 𝑡 ) (215) Ä ä = 𝑂 𝜂 2 [(𝐷2 + 𝑑)𝑇 𝑡2 + 𝐷2 ] + 𝜂𝑑𝑡𝑇 ≤ Å ß for 𝜂 = 𝑂 𝜀 min 1 √ , 1 𝑇 𝑡(𝐷+ 𝑑) 𝑑𝑡𝑇 𝑞 𝑡 1 ≤ 𝜀. ™ã √ 𝜀 3 (216) 𝜀 = 𝑂( 𝑑𝑡𝑇 ). This gives 𝑝 − Ä ä Ä ä 1 For the second part, setting 𝜀 = 𝑂 ℓ𝐿 gives that 𝑝𝑙 − 𝑞𝑙𝑡 = 𝑂 𝐿1 . By Lemma 9.1, Ä Ä ää noting Lemma 9.2 gives 𝐶 = 𝑂(1), after collecting 𝑛 = Ω 𝐿2 ln 1𝛿 samples, with probability ≥ 1 − 𝛿, ‘ 𝑍 ℓ+1 ∈ “1 𝑍 hÄ 1− ‘ “ℓ 𝑍 ℓ+1 /𝑍 𝑍ℓ+1 /𝑍ℓ ä Ä 1 ℓ , 1 𝐿 + −1 ≤ ä 1 ℓ 𝐿 i 1 𝐿. ’ c Set 𝑍 ℓ+1 = 𝑟 𝑍ℓ . 𝑍ℓ+1 𝑍1 . 39 Then ‘ 𝑍 ℓ+1 “ℓ 𝑍 ∈ [1 − 1 𝐿, 1 + 1 𝑍ℓ+1 𝐿 ] 𝑍ℓ and Now consider general 𝜎. We can transform the problem to the problem where 𝜎 = 1 by the change of variables 𝑥 ←[ 𝑥𝜎. This changes 𝐷 to 𝐷 𝜎 . Note that running the discretized chain on this transformed problem with step size 𝜂 corresponds to running the discretized chain on the original √ problem with step size 𝜂𝜎 2 . This is becauseÄ a step 𝑌 = 𝑌 −𝜂∇𝑔(𝑌 ) 𝑑𝑡+ 2𝜂𝜉𝑘 with 𝑔(𝑥) = 𝑓 𝜎𝑥 𝑡+1 𝑡 𝑡 ä √ p corresponds to a step 𝑋𝑡+1 = 𝑋𝑡 − 𝜂𝜎∇𝑔 𝑋𝜎𝑡 + 2𝜂𝜎𝜉𝑘 = 𝑋𝑡 − 𝜂𝜎 2 ∇𝑓 (𝑋𝑡 ) + 2𝜂𝜎 2 𝜉𝑘 . Now we prove the main theorem, Theorem 3.1. Proof of Theorem 3.1. Choose 𝛿 = 𝜀 2𝐿 where 𝐿 is the number of temperatures. Use Lemma 9.4 in- ductively, with probability 1− 2𝜀 each estimate satisfies 𝑍“𝑙 ∈ [ 1𝑒 , 𝑒]. Estimating the final distribution 𝑍1 within 2𝜀 accuracy gives the desired sample. “ Remark 9.5. One reason that the large powers appear in Lemma 9.4 is that we are going between conductance and spectral gap multiple times, and each time we lose a square by Cheeger’s inequality. We care about a spectral gap within sets of the partition, but Theorem A.8 controls the conductance rather than the spectral gap. It may be possible to tighten the bound by proving a variant of the theorem that controls the spectral gap directly. 10 Acknowledgements This work was done in part while the authors were visiting the Simons Institute for the Theory of Computing. We thank Matus Telgarsky and Maxim Raginsky for illuminating conversations in the early stages of this work. References [Aga+14] A. Agarwal et al. “Learning Sparsely Used Overcomplete Dictionaries.” In: Conference on Learning Theory (COLT). 2014. [AGM12] S. Arora, R. Ge, and A. Moitra. “Learning Topic Models – Going Beyond SVD”. In: Proceedings of the 53rd Annual IEEE Symposium on Foundations of Computer Science (FOCS). 2012. [Ana+12] A. Anandkumar et al. “A spectral algorithm for latent dirichlet allocation”. In: Advances in Neural Information Processing Systems. 2012, pp. 917–925. [AR15] P. Awasthi and A. Risteski. “On some provably correct cases of variational inference for topic models”. In: Advances in Neural Information Processing Systems. 2015, pp. 2098– 2106. [Aro+13] S. Arora et al. “A practical algorithm for topic modeling with provable guarantees”. In: International Conference on Machine Learning. 2013, pp. 280–288. [Aro+15] S. Arora et al. “Simple, efficient, and neural algorithms for sparse coding”. In: (2015). [Aro+17] S. Arora et al. “Provable learning of Noisy-or Networks”. In: Symposium on the Theory of Computing (STOC). 2017. 40 [Bak+08] D. Bakry et al. “A simple proof of the Poincaré inequality for a large class of probability measures including the log-concave case”. In: Electron. Commun. Probab 13 (2008), pp. 60–66. [BÉ85] D. Bakry and M. Émery. “Diffusions hypercontractives”. In: Séminaire de Probabilités XIX 1983/84. Springer, 1985, pp. 177–206. [Bel+15] A. Belloni et al. “Escaping the local minima via simulated annealing: Optimization of approximately convex functions”. In: Conference on Learning Theory. 2015, pp. 240– 265. [BEL15] S. Bubeck, R. Eldan, and J. Lehec. “Sampling from a log-concave distribution with Projected Langevin Monte Carlo”. In: arXiv preprint arXiv:1507.02564 (2015). [BGK05] A. Bovier, V. Gayrard, and M. Klein. “Metastability in reversible diffusion processes II: Precise asymptotics for small eigenvalues”. In: Journal of the European Mathematical Society 7.1 (2005), pp. 69–99. [BGL13] D. Bakry, I. Gentil, and M. Ledoux. Analysis and geometry of Markov diffusion operators. Vol. 348. Springer Science & Business Media, 2013. [Bha78] R. Bhattacharya. “Criteria for recurrence and existence of invariant measures for multidimensional diffusions”. In: The Annals of Probability (1978), pp. 541–553. [Bov+02] A. Bovier et al. “Metastability and Low Lying Spectra in Reversible Markov Chains”. In: Communications in mathematical physics 228.2 (2002), pp. 219–255. [Bov+04] A. Bovier et al. “Metastability in reversible diffusion processes I: Sharp asymptotics for capacities and exit times”. In: Journal of the European Mathematical Society 6.4 (2004), pp. 399–424. [Dal16] A. S. Dalalyan. “Theoretical guarantees for approximate sampling from smooth and log-concave densities”. In: Journal of the Royal Statistical Society: Series B (Statistical Methodology) (2016). [Dal17] A. S. Dalalyan. “Further and stronger analogy between sampling and optimization: Langevin Monte Carlo and gradient descent”. In: arXiv preprint arXiv:1704.04752 (2017). [DM16] A. Durmus and E. Moulines. “High-dimensional Bayesian inference via the Unadjusted Langevin Algorithm”. In: (2016). [DS93] P. Diaconis and L. Saloff-Coste. “Comparison theorems for reversible Markov chains”. In: The Annals of Applied Probability (1993), pp. 696–730. [GT14] S. O. Gharan and L. Trevisan. “Partitioning into expanders”. In: Proceedings of the twenty-fifth annual ACM-SIAM symposium on Discrete algorithms. Society for Industrial and Applied Mathematics. 2014, pp. 1256–1266. [HK13] D. Hsu and S. M. Kakade. “Learning mixtures of spherical gaussians: moment methods and spectral decompositions”. In: Proceedings of the 4th conference on Innovations in Theoretical Computer Science. ACM. 2013, pp. 11–20. [KW13] D. P. Kingma and M. Welling. “Auto-encoding variational bayes”. In: arXiv preprint arXiv:1312.6114 (2013). 41 [LM00] B. Laurent and P. Massart. “Adaptive estimation of a quadratic functional by model selection”. In: Annals of Statistics (2000), pp. 1302–1338. [LR16] Y. Li and A. Risteski. “Algorithms and matching lower bounds for approximatelyconvex optimization”. In: Advances in Neural Information Processing Systems. 2016, pp. 4745–4753. [LS93] L. Lovász and M. Simonovits. “Random walks in a convex body and an improved volume algorithm”. In: Random structures & algorithms 4.4 (1993), pp. 359–412. [MR02] N. Madras and D. Randall. “Markov chain decomposition for convergence rate analysis”. In: Annals of Applied Probability (2002), pp. 581–606. [RMW14] D. J. Rezende, S. Mohamed, and D. Wierstra. “Stochastic Backpropagation and Approximate Inference in Deep Generative Models”. In: International Conference on Machine Learning. 2014, pp. 1278–1286. [RRT17] M. Raginsky, A. Rakhlin, and M. Telgarsky. “Non-convex learning via Stochastic Gradient Langevin Dynamics: a nonasymptotic analysis”. In: arXiv preprint arXiv:1702.03849 (2017). [SR11] D. Sontag and D. Roy. “Complexity of inference in latent dirichlet allocation”. In: Advances in neural information processing systems. 2011, pp. 1008–1016. [Vem05] S. Vempala. “Geometric random walks: a survey”. In: Combinatorial and computational geometry 52.573-612 (2005), p. 2. [W+09] D. B. Woodard, S. C. Schmidler, M. Huber, et al. “Sufficient conditions for torpid mixing of parallel and simulated tempering”. In: Electronic Journal of Probability 14 (2009), pp. 780–804. [WSH09] D. B. Woodard, S. C. Schmidler, and M. Huber. “Conditions for rapid mixing of parallel and simulated tempering on multimodal distributions”. In: The Annals of Applied Probability (2009), pp. 617–640. [Zhe03] Z. Zheng. “On swapping and simulated tempering algorithms”. In: Stochastic Processes and their Applications 104.1 (2003), pp. 131–154. A A.1 Background on Markov chains Discrete time Markov chains Definition A.1. A (discrete time) Markov chain is 𝑀 = (Ω, 𝑃 ), where Ω is a measure space and 𝑃 (𝑥, 𝑦) 𝑑𝑦 is a probability measure for each 𝑥. 3 It defines a random process (𝑋𝑡 )𝑡∈N0 as follows. If 𝑋𝑠 = 𝑥, then P(𝑋𝑠+1 ∈ 𝐴) = 𝑃 (𝑥, 𝐴) : = R Z 𝑝(𝑥, 𝑦) 𝑑𝑦. (217) 𝐴 A stationary distribution is 𝑝(𝑥) such that if 𝑋0 ∼ 𝑝, then 𝑋𝑡 ∼ 𝑝 for all 𝑡; equivalently, 𝑝(𝑥)𝑃 (𝑥, 𝑦) 𝑑𝑥 = 𝑝(𝑦). Ω 3 For simplicity of notation, in this appendix we consider chains absolutely continuous with respect to R𝑛 , so we use the notation 𝑝(𝑥) 𝑑𝑥 rather than 𝑑𝜇(𝑥), and 𝑃 (𝑥, 𝑦) 𝑑𝑦 rather than 𝑃 (𝑥, 𝑑𝑦). The same results and definitions apply with the modified notation if this is not the case. 42 A chain is reversible if 𝑝(𝑥)𝑃 (𝑥, 𝑦) = 𝑝(𝑦)𝑃 (𝑦, 𝑥). Definition A.2. For a discrete-time Markov chain 𝑀 = (Ω, 𝑃 ), let 𝑃 operate on functions as Z (𝑃 𝑔)(𝑥) = E𝑦∼𝑃 (𝑥,·) 𝑔(𝑦) = 𝑔(𝑥)𝑃 (𝑥, 𝑦) 𝑑𝑦. (218) Ω Suppose 𝑀 = (Ω, 𝑃 ) has unique stationary distribution 𝑝. Let ⟨𝑔, ℎ⟩𝑝 := define the Dirichlet form and variance by R Ω 𝑔(𝑥)ℎ(𝑥)𝑝(𝑥) 𝑑𝑥 ℰ𝑀 (𝑔, ℎ) = ⟨𝑔, (𝐼 − 𝑃 )ℎ⟩𝑝 Var𝑝 (𝑔) = 𝑔 − and (219) 2 Z 𝑔𝑝 𝑑𝑥 Ω (220) 𝑝 Write ℰ𝑀 (𝑔) for ℰ𝑀 (𝑔, 𝑔). Define the eigenvalues of 𝑀 , 0 = 𝜆1 ≤ 𝜆2 ≤ · · · to be the eigenvalues of 𝐼 − 𝑃 with respect to the norm ‖·‖𝑝 . Define the spectral gap by Gap(𝑀 ) = inf 𝑔∈𝐿2 (𝑝) ℰ𝑀 (𝑔) . Var𝑝 (𝑔) (221) Note that ℰ𝑀 (𝑔) = 1 x (𝑔(𝑥) − 𝑔(𝑦))2 𝑝(𝑥)𝑃 (𝑥, 𝑦) 𝑑𝑥 𝑑𝑦 2 (222) Ω×Ω and that Gap(𝑀 ) = ℰ𝑀 (𝑔 = 𝜆2 (𝐼 − 𝑃 ). 𝑔∈𝐿2 (𝑝),𝑔⊥𝑝 1 ‖𝑔‖2 𝑝 inf (223) 1 1 Remark A.3. The normalized Laplacian of a graph is defined as ℒ = 𝐼 − 𝐷− 2 𝐴𝐷− 2 , where 𝐴 is the adjacency matrix and»𝐷 is the diagonal matrix of degrees. A change of scale by 𝑝(𝑥) turns ℒ into 𝐼 −𝑃 , where 𝑃 has the transition matrix of the random walk of the graph, so the eigenvalues of ℒ are equal to the eigenvalues of the Markov chain defined here. The spectral gap controls mixing for the Markov chain. Define the 𝜒2 distance between 𝑝, 𝑞 by Z Ç 𝜒2 (𝑝||𝑞) = Ω 𝑞(𝑥) − 𝑝(𝑥) 𝑝(𝑥) å2 Z Ç 𝑝(𝑥) 𝑑𝑥 = Ω 𝑞(𝑥)2 𝑝(𝑥) å − 1. (224) Let 𝑝0 be any initial distribution and 𝑝𝑡 be the distribution after running the Markov chain for 𝑡 steps. Then 𝜒2 (𝑝||𝑝𝑡 ) ≤ (1 − 𝐺′ )𝑡 𝜒(𝑝||𝑝0 ) where 𝐺′ = min(𝜆2 , 2 − 𝜆max ). 43 (225) A.2 Restricted and projected Markov chains Given a Markov chain on Ω, we define two Markov chains associated with a partition of Ω. Definition A.4. For a Markov chain 𝑀 = (Ω, 𝑃 ), and a set 𝐴 ⊆ Ω, define the restriction of 𝑀 to 𝐴 to be the Markov chain 𝑀 |𝐴 = (𝐴, 𝑃 |𝐴 ), where 𝑃 |𝐴 (𝑥, 𝐵) = 𝑃 (𝑥, 𝐵) + 1𝐵 (𝑥)𝑃 (𝑥, 𝐴𝑐 ). (In words, 𝑃 (𝑥, 𝑦) proposes a transition, and the transition is rejected if it would leave 𝐴.) Suppose the unique stationary distribution of 𝑀 is 𝑝. Given a partition 𝒫 = {𝐴𝑗 : 𝑗 ∈ 𝐽}, 𝒫 𝒫 define the projected Markov chain with respect to 𝒫 to be 𝑀 = (𝐽, 𝑃 ), where 1 𝑃 (𝑖, 𝑗) = 𝑝(𝐴𝑖 ) 𝒫 Z Z 𝑃 (𝑥, 𝑦)𝑝(𝑥) 𝑑𝑥. 𝐴𝑖 𝐴𝑗 (In words, 𝑃 (𝑖, 𝑗) is the “total probability flow” from 𝐴𝑖 to 𝐴𝑗 .) We omit the superscript 𝒫 when it is clear. The following theorem lower-bounds the gap of the original chain in terms of the gap of the projected chain and the minimum gap of the restrictioned chains. Theorem A.5 (Gap-Product Theorem[MR02]). Let 𝑀 = (Ω, 𝑃 ) be a Markov chain with stationary distribution 𝑝. Let 𝒫 = {𝐴𝑗 : 𝑗 ∈ 𝐽} be a partition of Ω such that 𝑝(𝐴𝑗 ) > 0 for all 𝑗 ∈ 𝐽. 1 𝒫 𝒫 Gap(𝑀 ) min Gap(𝑀 |𝐴𝑗 ) ≤ Gap(𝑀 ) ≤ Gap(𝑀 ). 𝑗∈𝐽 2 A.3 Conductance and clustering Definition A.6. Let 𝑀 = (Ω, 𝑃 ) be a Markov chain with unique stationary distribution 𝑝. Let 𝑄(𝑥, 𝑦) = 𝑝(𝑥)𝑃 (𝑥, 𝑦) x 𝑄(𝐴, 𝐵) = 𝑄(𝑥, 𝑦) 𝑑𝑥 𝑑𝑦. (226) (227) 𝐴×𝐵 (I.e., 𝑥 is drawn from the stationary distribution and 𝑦 is the next state in the Markov chain.) Define the (external) conductance of 𝑆, 𝜑𝑀 (𝑆), and the Cheeger constant of 𝑀 , Φ(𝑀 ), by 𝑄(𝑆, 𝑆 𝑐 ) 𝑝(𝑆) Φ(𝑀 ) = min 𝜑𝑀 (𝑆). 𝜑𝑀 (𝑆) = 𝑆⊂Ω,𝑝(𝑆)≤ 12 (228) (229) Definition A.7. Let 𝑀 = (Ω, 𝑃 ) be a Markov chain on a finite state space Ω. We say that 𝑘 disjoint subsets 𝐴1 , . . . , 𝐴𝑘 of Ω are a (𝜑in , 𝜑out )-clustering if for all 1 ≤ 𝑖 ≤ 𝑘, Φ(𝑀 |𝐴𝑖 ) ≥ 𝜑in 𝜑𝑀 (𝐴𝑖 ) ≤ 𝜑out . 44 (230) (231) Theorem A.8 (Spectrally partitioning graphs, [GT14]). Let 𝑀 = (Ω, 𝑃 ) be a reversible Markov chain with |Ω| = 𝑛 states. Let 0 = 𝜆1 ≤ 𝜆2 ≤ · · · ≤ 𝜆𝑛 be the eigenvalues of the Markov chain. For any 𝑘 ≥ 2, if 𝜆𝑘 > 0, then √ there exists 1 ≤ ℓ ≤ 𝑘 − 1 and a ℓ-partitioning of Ω into sets 𝑃1 , . . . , 𝑃ℓ that is a (Ω(𝜆𝑘 /𝑘 2 ), 𝑂(ℓ3 𝜆ℓ ))-clustering. Proof. This is [GT14, Theorem 1.5], except that they use a different notion of the restriction of a Markov chain 𝑀 |𝐴𝑖 . We reconcile this below. They consider the Markov chain associated with a graph 𝐺, and consider the Cheeger constant of the induced graph, in their definition of a (𝜑in , 𝜑out ) clustering: Φ(𝐺[𝐴𝑖 ]) ≥ 𝜑in . We can recast our definition in graph-theoretic language as follows: construct a weighted graph 𝐺 with weight on edge 𝑥𝑦 given by 𝑝(𝑥)𝑃 (𝑥, 𝑦). Now the restricted chain 𝑀 |𝐴 corresponds to the graph 𝐺|𝐴 , which is the same as the induced graph 𝐺[𝐴] except that we take all edges leaving a vertex 𝑥 ∈ 𝐴 and redraw them as self-loops at 𝑥. On the surface, this seems to cause a problem because if we define the volume of a set 𝑆 ⊆ 𝐴 to be the sum of weights of its vertices, the volume of 𝑆 can be larger in 𝐺|𝐴 than 𝐺[𝐴], yet the amount of weight leaving 𝑆 does not increase. However, examining the proof in [GT14], we see that every lower bound of the form 𝜑𝐺[𝐴] (𝑆) is obtained by first lower-bounding by 𝑤(𝑆,𝐴∖𝑆) Vol(𝑆) , which is exactly 𝜑𝐺|𝐴 (𝑆). Thus their theorem works equally well with 𝐺|𝐴 instead of 𝐺[𝐴]. Cheeger’s inequality relates the conductance with the spectral gap. Theorem A.9 (Cheeger’s inequality). Let 𝑀 = (Ω, 𝑃 ) be a reversible Markov chain on a finite state space and Φ = Φ(𝑀 ) be its conductance. Then Φ2 ≤ Gap(𝑃 ) ≤ Φ. 2 A.4 Continuous time Markov processes A continuous time Markov process is instead defined by (𝑃𝑡 )𝑡≥0 , and a more natural object to consider is the generator. Definition A.10. A continuous time Markov process is given by 𝑀 = (Ω, (𝑃𝑡 )𝑡≥0 ) where the 𝑃𝑡 define a random proces (𝑋𝑡 )𝑡≥0 by P(𝑋𝑠+𝑡 ∈ 𝐴) = 𝑃𝑡 (𝑥, 𝐴) := Z 𝑃 (𝑥, 𝑦) 𝑑𝑦. 𝐴 Define stationary distributions, reversibility, 𝑃𝑡 𝑓 , and variance as in the discrete case. Define the generator L by L 𝑔 = lim 𝑡↘0 𝑃𝑡 𝑔 − 𝑔 . 𝑡 (232) If 𝑝 is the unique stationary distribution, define ℰ𝑀 (𝑔, ℎ) = − ⟨𝑔, L ℎ⟩𝑝 . (233) The spectral gap is defined as in the discrete case with this definition of ℰ𝑀 . The eigenvalues of 𝑀 are defined as the eigenvalues of −L .4 4 Note that ℒ = 𝐼 − 𝑃 in the discrete case corresponds to −L in the continuous case. 45 Note that in order for (𝑃𝑡 )𝑡≥0 to be a valid Markov process, it must be the case that 𝑃𝑡 𝑃𝑢 𝑔 = 𝑃𝑡+𝑢 𝑔, i.e., the (𝑃𝑡 )𝑡≥0 forms a Markov semigroup. Definition A.11. A continuous Markov process satisfies a Poincaré inequality with constant 𝐶 if ℰ𝑀 (𝑔) ≥ 1 Var𝑝 (𝑔). 𝐶 (234) This is another way of saying that Gap(𝑀 ) ≥ 𝐶1 . For Langevin diffusion with stationary distribution 𝑝, ℰ𝑀 (𝑔) = ‖∇𝑔‖2𝑝 . (235) Since this depends in a natural way on 𝑝, we will also write this as ℰ𝑝 (𝑔). A Poincaré inequality for Langevin diffusion thus takes the form ℰ𝑝 (𝑔) = Z ‖∇𝑔‖2 𝑝 𝑑𝑥 ≥ Ω 1 Var𝑝 (𝑔). 𝐶 (236) We have the following classical result. Theorem A.12 ([BGL13]). Let 𝑔 be 𝜌-strongly convex and differentiable. Then 𝑔 satisfies the Poincaré inequality ℰ𝑝 (𝑔) ≥ 𝜌 Var𝑝 (𝑔). 2 In particular, this holds for 𝑔(𝑥) = ‖𝑥−𝜇‖ with 𝜌 = 1, giving a Poincaré inequality for the 2 gaussian distribution. A spectral gap, or equivalently a Poincaré inequality, implies rapid mixing (cf. (225)): 𝑡 ‖𝑔 − 𝑃𝑡 𝑔‖2 ≤ 𝑒−𝑡 Gap(𝑀 ) = 𝑒− 𝐶 . B (237) Examples It might be surprising that sampling a mixture of gaussians require a complicated Markov Chain such as simulated tempering. However, many simple strategies seem to fail. Langevin with few restarts One natural strategy to try is simply to run Langevin a polynomial number of times from randomly chosen locations. While the time to “escape” a mode and enter a different one could be exponential, we may hope that each of the different runs “explores” the individual modes, and we somehow stitch the runs together. The difficulty with this is that when the means of the gaussians are not well-separated, it’s difficult to quantify how far each of the individual runs will reach and thus how to combine the various runs. Recovering the means of the gaussians Another natural strategy would be to try to recover the means of the gaussians in the mixture by performing gradient descent on the log-pdf with a polynomial number of random restarts. The hope would be that maybe the local minima of the log-pdf correspond to the means of the gaussians, and with enough restarts, we should be able to find them. 46 Unfortunately, this strategy without substantial modifications also seems to not work: for instance, in dimension 𝑑, consider a mixture of 𝑑 + 1 gaussians, 𝑑 of them with means on the corners of a 𝑑-dimensional simplex with a side-length substantially smaller than the diameter 𝐷 we are considering, and one in the center of the simplex. In order to discover the mean of the gaussian in the center, we would have to have a starting point extremely close to the center of the simplex, which in high dimensions seems difficult. Additionally, this doesn’t address at all the issue of robustness to perturbations. Though there are algorithms to optimize “approximately” convex functions, they can typically handle only very small perturbations. [Bel+15; LR16] Gaussians with different covariance Our result requires all the gaussians to have the same variance. This is necessary, as even if the variance of the gaussians only differ by a factor of 2, there are examples where a simulated tempering chain takes exponential time to converge [W+09]. Intuitively, this is illustrated in Figure 3. The figure on the left shows the distribution in low temperature – in this case the two modes are separate, and both have a significant mass. The figure on the right shows the distribution in high temperature. Note that although in this case the two modes are connected, the volume of the mode with smaller variance is much smaller (exponentially small in 𝑑). Therefore in high dimensions, even though the modes can be connected at high temperature, the probability mass associated with a small variance mode is too small to allow fast mixing. Figure 3: Mixture of two gaussians with different covariance at different temperature C Pertubation tolerance In the previous sections, we argued that we can sample from distributions of the form 𝑝˜(𝑥) ∝ ˜ exp(𝑓 (𝑥)), where 𝑓˜ is as (3). In this section, the goal we be to argue that we can sample from distributions of the form 𝑝(𝑥) ∝ exp(𝑓 (𝑥)), where 𝑓 is as (2). Our main theorem is the following. Theorem C.1 (Main theorem with perturbations). Suppose 𝑓 (𝑥) and 𝑓˜(𝑥) satisfy (3) and (2). ′ Then, algorithm 2 with parameters given by Lemma Ä ä C.2 produces a sample from a distribution 𝑝 with ‖𝑝 − 𝑝′ ‖1 ≤ 𝜀 in time poly 𝑤min , 𝐷, 𝑑, 1𝜀 , 𝑒Δ , 𝜏 . 47 The theorem will follow immediately from Lemma C.2, which is a straightforward analogue of 9.4. More precisely: Lemma C.2. Suppose that Algorithm 1 is run on temperatures 0 < 𝛽1 < · · · < 𝛽ℓ ≤ 1, ℓ ≤ 𝐿 with ”1 , . . . , 𝑍 cℓ satisfying partition function estimates 𝑍 c𝑖 ”1 𝑍 𝑍 1 − ≤ 1+ 𝑍𝑖 𝑍1 𝐿 Å ã𝑖−1 (238) for all 1 ≤ 𝑖 ≤ ℓ and with parameters satisfying Ç 𝛽1 = 𝑂 min Ç 2 𝜎 𝐷2 Ñ 𝛽𝑖 − 𝛽𝑖−1 = 𝑂 ,Δ (239) Ñ min Å 𝑇 = Ω 𝐷2 ln Ö åå Ä 𝐷2 𝑑 + ln 1 Å Ä 1 𝑤min ää , Δ (240) ãã (241) 𝑤min  𝐷8 𝑑4 + ln 𝑡=Ω éé 𝜎2 Ä 1 è ä4  𝑤min Ç ln 4 𝜎 8 𝑤min 1 max 𝜖 Ç 𝐷2 𝑑 ln (1/𝑤 min ) 𝜎 8 𝑤min , 𝑒Δ åå Ç max 𝐷2 𝑚16 å , 𝜎 2 ln(1/𝑤min )4 (242) Ç 𝜂=𝑂 𝜀𝜎 2 𝑑𝑡𝑇 𝜏 2 å . (243) Ä Ä 2 ä ä Let 𝑞 0 be the distribution 𝑁 0, 𝜎𝛽1 , 1 on R𝑑 × [ℓ]. The distribution 𝑞 𝑡 after running for 𝑡 steps satisfies 𝑝 − 𝑞 𝑡 1 ≤ 𝜀. Setting 𝜀 = 𝑂 1 − 𝛿 the estimate Ä ä 1 𝐿 Ä above and taking 𝑚 = Ω ln Ñ “ℓ+1 = 𝑍 “ℓ 𝑍 𝑚 1 X 𝑒(−𝛽ℓ+1 +𝛽ℓ )𝑓𝑖 (𝑥𝑗 ) 𝑚 𝑗=1 Ä ää 1 𝛿 samples, with probability é (244) also satisfies (238). The way we prove this theorem is to prove the tolerance of each of the proof ingredients to perturbations to 𝑓 . C.1 Mixing time of the tempering chain We first show that the mixing time of the tempering chain that uses the continous Langevin transition 𝑃𝑇 for 𝑝(𝑥) ∝ exp(𝑓 (𝑥)) is comparable to that of 𝑝˜(𝑥) ∝ exp(𝑓˜(𝑥)). Keeping in mind the statement of Lemma 6.8, the following lemma suffices: Lemma C.3. Suppose ‖𝑓1 − 𝑓2 ‖∞ ≤ R𝑑 . Then the following hold. Δ 2 and 𝑝1 ∝ 𝑒−𝑓1 , 𝑝2 ∝ 𝑒−𝑓2 are probability distributions on 1. ℰ𝑝1 (𝑔) −Δ ℰ𝑝2 (𝑔) . 2 ≥𝑒 ‖𝑔‖𝑝1 ‖𝑔‖2𝑝2 48 (245) 2. Letting L1 , L2 be the generators for Langevin diffusion on 𝑝1 , 𝑝2 , 𝜆𝑛 (−L1 ) ≥ 𝑒−Δ 𝜆𝑛 (−L2 ). (246) 3. If a Poincaré inequality holds for 𝑝1 with constant 𝐶, then a Poincaré inequality holds for 𝑝2 with constant 𝐶𝑒Δ . Note that if we are given probability distributions 𝑝1 , 𝑝2 such that 𝑝1 ∈ [1, 𝑒Δ ]𝑝2 𝑅 for some 𝑅, then the conditions of the lemma are satisfied. Proof. 1. The ratio between 𝑝1 and 𝑝2 is at most 𝑒Δ , so R R𝑑 R ‖∇𝑔‖2 𝑝1 𝑑𝑥 R𝑑 ‖𝑔‖2 𝑝1 𝑑𝑥 ≥ 𝑒−Δ 𝑒Δ R 𝑑 RR R𝑑 ‖∇𝑔‖2 𝑝2 𝑑𝑥 ‖𝑔‖2 𝑝2 𝑑𝑥 (247) 2. Use the first part along with the variational characterization 𝜆𝑚 (−L ) = max 𝐿2 (𝑝) closed subspace 𝑆 ⊆ dim(𝑆 ⊥ ) = 𝑚 − 1 min 𝑔∈𝑆 − ⟨𝑔, L 𝑔⟩ . ‖𝑔‖2𝑝 (248) 3. Use the second part for 𝑚 = 2; a Poincaré inequality is the same as a lower bound on 𝜆2 . C.2 Mixing time at highest temperature We show that we can use the same highest temperature corresponding to 𝑓 (𝑥) for 𝑓˜(𝑥) as well, at the cost of 𝑒Δ in the mixing time. Namely, since ‖𝑓˜ − 𝑓 ‖∞ ≤ Δ, from Lemma 7.3, we immediately have: Lemma C.4. If 𝑓 and 𝑓˜ satisfy (2) and (3), there exists a 1/2 strongly-convex function 𝑔, s.t. ‖𝑓 − 𝑔‖∞ ≤ 𝐷2 + Δ. As a consequence, the proof of Lemma 7.4 implies Lemma C.5. If 𝑓 and 𝑓˜ satisfy (2) and (3), Langevin diffusion on 𝛽𝑓 (𝑥) satisfies a Poincaré inequality with constant C.3 16𝑒2𝛽(𝐷 𝛽 2 +Δ) . Discretization The proof of Lemma 8.3, combined with the fact that ∇𝑓˜ − ∇𝑓 ∞ ≤ Δ gives Lemma C.6 (Perturbed reach of continuous chain). Let 𝑃𝑇𝛽 (𝑋) be the Markov kernel corresponding to evolving Langevin diffusion 𝑑𝑋𝑡 = −𝛽∇𝑓 (𝑋𝑡 ) + 𝑑𝐵𝑡 𝑑𝑡 with 𝑓 and 𝐷 are as defined in 2 for time 𝑇 . Then, E[‖𝑋𝑡 − 𝑥* ‖2 ] . E[‖𝑋0 − 𝑥* ‖2 ] + (𝛽(𝐷 + 𝜏 )2 + 𝑑)𝑇 49 Proof. The proof proceeds exactly the same as Lemma 8.3, noting that ∇𝑓˜ − ∇𝑓 ≤ 𝜏 implies ∞ −⟨𝑋𝑡 − 𝑥* , 𝑋𝑡 − 𝜇𝑖 ⟩ ≤ −‖𝑋𝑡 ‖2 + ‖𝑋𝑡 ‖(‖𝜇𝑖 ‖ + ‖𝑥* ‖ + 𝜏 ) + ‖𝑥* ‖(‖𝜇𝑖 ‖ + 𝜏 ) Furthermore, since ∇2 𝑓˜(𝑥) ⪯ ∇2 𝑓 (𝑥) + 𝜏 𝐼, ∀𝑥 ∈ R𝑑 , from Lemma 8.4, we get Lemma C.7 (Perturbed Hessian bound). 2 + 𝜏 𝐼, ∀𝑥 ∈ R𝑑 ∇ 𝑓 (𝑥) ⪯ 𝜎2 ã Å 2 As a consequence, the analogue of Lemma 8.5 gives: Lemma C.8 (Bounding interval drift). In the setting of Lemma 8.5, let 𝑥 ∈ R𝑑 , 𝑖 ∈ [𝐿], and let 𝜂≤ ( 𝜎1 +𝜏 )2 . 𝛼 Then, Å ã2 ä 𝜂 2 ( 𝜎12 + 𝜏 )3 𝛼 Ä 1 * 2 ” ‖𝑥 − 𝑥 ‖2 ) + 𝑇 𝑑 + 𝑑𝑇 𝜂 +𝜏 KL(𝑃𝑇 (𝑥, 𝑖)||𝑃𝑇 (𝑥, 𝑖)) . 2 2𝛼 − 1 𝜎 Putting these together, we get the analogue of Lemma 8.1: Lemma C.9. Let 𝑝𝑡 , 𝑞 𝑡 : R𝑑 × [𝐿] → R be the distributions after running the simulated tempering chain for 𝑡 steps, where in 𝑝𝑡 , for any temperature 𝑖 ∈ 𝐿, the Type 1 transitions are taken according to the (discrete time) Markov kernel 𝑃𝑇 : running Langevin diffusion for time 𝑇 ; in 𝑞 𝑡 , the Type 1 transitions are taken according to running 𝑇𝜂 steps of the discretized Langevin diffusion, using 𝜂 as 1  the discretization granularity, s.t. 𝜂 ≤ . Then, 1 2 𝑡 𝑡 KL(𝑝 ||𝑞 ) . 𝜂 C.4 2 Å 1 +𝜏 𝜎2 ã3 Ä 𝜎2 ä 2 +𝜏 2 (𝐷 + 𝜏 ) + 𝑑 𝑇 𝑡 + 𝜂 2 Å 1 +𝜏 𝜎2 ã3 max E𝑥∼𝑝0 (·,𝑖) ‖𝑥 − 𝑖 𝑥* ‖22 1 +𝜂 +𝜏 𝜎2 Å ã2 Putting things together Finally, we prove Theorem C.2 Proof of C.2. The proof is analogous to the one of Lemma 9.4 in combination with the Lemmas from the previous subsections. For the analysis of the simulated tempering chain, consider the same partition 𝒫𝑖 we used in Lemma 9.4. Then, by Lemma C.3, Gap(𝑀𝑖 |𝐴 ) ≥ Ω 𝑒 1 (ln 𝑤min )4 −Δ 𝑚16 !! . (249) For the highest temperature, by Lemma C.5, we have  Gap(𝑀1 ) = Ω 𝛽1 𝑒−2𝛽1 (𝐷  ) = Ω(min( 1 , 1 )). Δ 𝐷2 2 +Δ 50 (250) 𝑑𝑡𝑇 Furthermore, by Lemma 9.2, since the condition on 𝛽𝑖 − 𝛽𝑖−1 is satisfied, 𝛿((𝒫𝑖 )ℓ𝑖=1 ) = Ω(1). Then, same as in Lemma 9.4, the spectral gap of the simulated tempering chain 𝐺 := Gap(𝑀st ) = Ç As in Lemma 9.4, since 𝑡 = Ω 𝑤4 𝑒−Δ min ℓ4 𝑙 ,𝑒Δ )) min ln( 1𝜖 max( 𝑤 Å 1 ln Ä 1 ä4 é 𝑤min 𝑚16 . (251) å 𝐺 𝑝˜ − 𝑞 𝑡 Ñ =𝑂 , 𝜀𝑤min 𝜒2 (˜ 𝑝||𝑞 0 ) ℓ ã (252) By triangle inequality, 𝜒2 (˜ 𝑝||𝑞 0 ) ≤ 𝜒2 (˜ 𝑝||𝑝) + 𝜒2 (𝑝||𝑞 0 ) The proof of Lemma 9.4 bounds 𝜒2 (𝑝||𝑞 0 ) = 𝑂 2 𝜒 (˜ 𝑝||𝑝) = Ç Z 𝑥∈R𝑑 ≤ Ä ℓ 𝑤min ä , and 𝑝˜(𝑥) − 𝑝(𝑥) 𝑝(𝑥) Ç Δ å2 𝑒 𝑝(𝑥) − 𝑝(𝑥) 𝑝(𝑥) å2 𝑝(𝑥)𝑑𝑥 𝑝(𝑥) ≤ 𝑒Δ From this, we get 𝑝˜ − 𝑞 𝑡 1 ≤ 3𝜖 . For the term 𝑝𝑡 − 𝑞 𝑡 1 , use Pinsker’s inequality and Lemma C.9 to get 𝑝˜𝑡 − 𝑞 𝑡 Å for ß 1 √ , 1 𝜂 = 𝑂 𝜀 min √𝑇 𝑡𝜏 3/2 (𝐷+ 𝑑+𝜏 ) 𝜏 2 𝑑𝑡𝑇 This gives 𝑝˜ − 𝑞 𝑡 1 ≤ 𝜀. 1 ™ã ≤ » 2KL(˜ 𝑝𝑡 ||𝑞 𝑡 ) ≤ 𝜀 3 (253) 𝜀 = 𝑂( 𝜏 2 𝑑𝑡𝑇 ). The proof of the second part of the Lemma proceeds exactly as C.9. D Another lower bound for simulated tempering Theorem D.1 (Comparison theorem using canonical paths, [DS93]). Let (Ω, 𝑃 ) be a finite Markov chain with stationary distribution 𝑝. Suppose each pair 𝑥, 𝑦 ∈ Ω, 𝑥 ̸= 𝑦 is associated with a path 𝛾𝑥,𝑦 . Define the congestion to be 𝛾𝑥,𝑦 ∋(𝑧,𝑤) |𝛾𝑥,𝑦 |𝑝(𝑥)𝑝(𝑦) ñP 𝜌(𝛾) = max 𝑝(𝑧)𝑃 (𝑧, 𝑤) 𝑧,𝑤∈Ω,𝑧̸=𝑤 Then Gap(𝑃 ) ≥ 51 1 . 𝜌(𝛾) ô . Definition D.2. Say that partition 𝒫 refines 𝒬, written 𝑃 ⊑ 𝒬, if for every 𝐴 ∈ 𝒫 there exists 𝐵 ∈ 𝒬 such that 𝐴 ⊆ 𝐵. Define a chain of partitions as {𝒫𝑖 = {𝐴𝑖,𝑗 }}𝐿 𝑖=1 , where each 𝒫𝑖 is a refinement of 𝒫𝑖−1 : 𝒫𝐿 ⊑ · · · ⊑ 𝒫1 . Theorem D.3. Suppose Assumptions 5.1 hold. Furthermore, suppose that (𝒫𝑖 )𝐿 𝑖=1 is a chain of partitions. Define 𝛾 for the chain of partitions as 𝑝𝑖 (𝐴) 𝛾((𝒫𝑖 )𝐿 min min 1 . 𝑖=1 ) = 1≤𝑖1 ≤𝑖2 ≤𝐿 𝐴∈𝒫𝑖1 𝑝𝑖2 (𝐴) Then Gap(𝑀st ) ≥ 𝑟2 𝛾𝛿 32𝐿3 min 1≤𝑖≤𝐿,𝐴∈𝒫𝑖 (Gap(𝑀 |𝐴 )). (254) Proof. Let 𝑝st be the stationary distribution of 𝑃st . First note that we can easily switch between 𝑝𝑖 and 𝑝st using 𝑝st (𝐴 × {𝑖}) = 𝑟𝑖 𝑝𝑖 (𝐴). Define the partition 𝒫 on Ω × {0, . . . , 𝑙 − 1} by 𝒫 = {𝐴 × {𝑖} : 𝐴 ∈ 𝒫𝑖 } . By Theorem A.5, Gap(𝑀st ) ≥ 1 Gap(𝑀 st ) min Gap(𝑀st |𝐵 ). 𝐵∈𝒫 2 (255) We now lower-bound Gap(𝑀 st ). We will abuse notation by considering the sets 𝐵 ∈ 𝒫 as states in 𝑀 st , and identify a union of sets in 𝒫 with the corresponding set of states for 𝑀 st . Consider a tree with nodes 𝐵 ∈ 𝒫, and edges connecting 𝐴 × {𝑖}, 𝐴′ × {𝑖 − 1} if 𝐴 ∈ 𝐴′ . Designate Ω × {1} as the root. For 𝑋, 𝑌 ∈ 𝒫, define the canonical path 𝛾𝑋,𝑌 to be the unique path in this tree. Note that |𝛾𝑋,𝑌 | ≤ 2(𝐿 − 1). Given an edge (𝐴 × {𝑖}, 𝐴′ × {𝑖 − 1}), consider 𝛾𝑋,𝑌 ∋(𝐴×{𝑖},𝐴′ ×{𝑖−1}) |𝛾𝑋,𝑌 |𝑝st (𝑋)𝑝st (𝑌 𝑝st (𝐴 × {𝑖})𝑃st (𝐴 × {𝑖}, 𝐴′ × {𝑖 − 1}) P ) 2(𝐿 − 1)2𝑝st (𝑆)𝑝st (𝑆 𝑐 ) 𝑝st (𝐴 × {𝑖})𝑃st (𝐴 × {𝑖}, 𝐴′ × {𝑖 − 1}) ≤ (256) where 𝑆 = 𝐴 × {𝑖, . . . , 𝐿} is the union of all children of 𝐴 × {𝑖} (including itself). This follows because the paths which go through (𝐴 × {𝑖}, 𝐴′ × {𝑖 − 1}) are exactly those between 𝑋, 𝑌 where one of 𝑋, 𝑌 is a subset of 𝑆 = 𝐴 × {𝑖, . . . , 𝐿} and the other is not. To upper bound (256), we 𝑝(𝑆) upper-bound 𝑝(𝐴×{𝑖}) and lower-bound 𝑃 (𝐴 × {𝑖}, 𝐴′ × {𝑖 + 1}). We upper-bound by definition of 𝛾, 𝑝(𝑆) = 𝑝(𝐴 × {𝑖}) P𝐿 𝑘=𝑖 𝑟𝑖 𝑝𝑖 (𝐴) 𝑟𝑖 𝑝𝑖 (𝐴) P max 𝑟𝑖 𝐿 𝑘=𝑖 𝑝𝑖 (𝐴) ≤ min 𝑟𝑖 𝑝𝑖 (𝐴) 𝐿 ≤ . 𝑟𝛾 52 (257) (258) (259) Next we lower bound 𝑃st (𝐴 × {𝑖}, 𝐴′ × {𝑖 − 1}). There is probability to level 𝑖 − 1, so ′ 𝑃st (𝐴 × {𝑖}, 𝐴 × {𝑖 − 1}) ≥ = ≥ ≥ ® 1 2𝐿 of proposing a switch ´ 1 𝑝𝑖−1 (𝑥) 𝑟𝑖−1 𝑟𝑖 𝑝𝑖 (𝑥) min , 1 𝑑𝑥/(𝑟𝑖 𝑝𝑖 (𝐴)) 2𝐿 Ω 𝑝𝑖 (𝑥) 𝑟𝑖 Z ß ™ 𝑟𝑖−1 1 min 𝑝𝑖−1 (𝑥) , 𝑝𝑖 (𝑥) 𝑑𝑥/𝑝𝑖 (𝐴) 2𝐿 Ω 𝑟𝑖 Z 1 min 𝑟𝑗 min {𝑝𝑖−1 (𝑥), 𝑝𝑖 (𝑥)} 𝑑𝑥/𝑝𝑖 (𝐴) 2𝐿 max 𝑟𝑗 Ω 1 𝑟𝛿. 2𝐿 Z (260) (261) (262) (263) Putting (256), (259), and (263) together, (256) ≤ 2(𝐿 − 1)2 ≤ Å 𝐿 𝑟𝛾 ãÅ 2𝐿 𝑟𝛿 ã 8𝐿3 . 𝑟2 𝛾𝛿 (264) (265) Using (255) and Theorem D.1, 1 Gap(𝑀 st ) min Gap(𝑀st |𝐵 ) 𝐵∈𝒫 2 2 𝑟 𝛾𝛿 ≥ min Gap(𝑀st |𝐵 ) 16𝐿3 𝐵∈𝒫 𝑟2 𝛾𝛿 Gap(𝑀𝑖 |𝐴 ) ≥ min 32𝐿3 1≤𝑖≤𝐿,𝐴∈𝒫𝑖 Gap(𝑀st ) ≥ (266) (267) (268) By taking all the partitions except the first to be the same, we see that this theorem is an improvement to the bound for simulated tempering in [WSH09, Theorem 3.1], which gives the bound ™ ß 𝛾 𝐽+3 𝛿 3 Gap(𝑃st ) ≥ 14 min min (Gap(𝑀𝑖 |𝐴 )), Gap(𝑀1 ) 2≤𝑖≤𝐿,𝐴∈𝒫 2 (𝐿 + 1)5 𝐽 3 when 𝑟 = 1, where 𝐽 is the number of sets in the partition. Most notably, their bound is exponential in 𝐽, while our bound has no dependence on 𝐽. 53
8cs.DS
Generative Encoder-Decoder Models for Task-Oriented Spoken Dialog Systems with Chatting Capability Tiancheng Zhao, Allen Lu, Kyusong Lee and Maxine Eskenazi Language Technologies Institute Carnegie Mellon University Pittsburgh, Pennsylvania, USA {tianchez,arlu,kyusongl,max+}@cs.cmu.edu arXiv:1706.08476v1 [cs.CL] 26 Jun 2017 Abstract Generative encoder-decoder models offer great promise in developing domaingeneral dialog systems. However, they have mainly been applied to open-domain conversations. This paper presents a practical and novel framework for building task-oriented dialog systems based on encoder-decoder models. This framework enables encoder-decoder models to accomplish slot-value independent decision-making and interact with external databases. Moreover, this paper shows the flexibility of the proposed method by interleaving chatting capability with a slotfilling system for better out-of-domain recovery. The models were trained on both real-user data from a bus information system and human-human chat data. Results show that the proposed framework achieves good performance in both offline evaluation metrics and in task success rate with human users. 1 Introduction Task-oriented spoken dialog systems have transformed human-computer interaction by enabling people interact with computers via spoken language (Raux et al., 2005; Young, 2006; Bohus and Rudnicky, 2003). The task-oriented SDS is usually domain-specific. The system creators first map the user utterances into semantic frames that contain domain-specific slots and intents using spoken language understanding (SLU) (De Mori et al., 2008). Then a set of domain-specific dialog state variables is tracked to retain the context information over turns (Williams et al., 2013). Lastly, the dialog policy decides the next move from a list of dialog acts that covers the expected communicative functions from the system. Although the above approach has been successfully applied to many practical systems, it has limited ability to generalize to out-of-domain (OOD) requests and to scale up to new domains. For example, even within in a simple domain, real users often make requests that are not included in the semantic specifications. Due to this, proper error handling strategies that guide users back to the in-domain conversation are crucial to dialog success (Bohus and Rudnicky, 2005). Past error handling strategies were limited to a set of predefined dialog acts, e.g. request repeat, clarification etc., which constrained the system’s capability in keeping users engaged. Moreover, there has been an increased interest in extending task-oriented systems to multiple topics (Lee et al., 2009; Gašić et al., 2015b) and multiple skills, e.g. grouping heterogeneous types of dialogs into a single system (Zhao et al., 2016). Both cases require the system to be flexible enough to extend to new slots and actions. Our goal is to move towards a domain-general task-oriented SDS framework that is flexible enough to expand to new domains and skills by removing domain-specific assumptions on the dialog state and dialog acts (Bordes and Weston, 2016). To achieve this goal, the neural encoderdecoder model(Cho et al., 2014; Sutskever et al., 2014) is a suitable choice, since it has achieved promising results in modeling open-domain conversations (Vinyals and Le, 2015; Sordoni et al., 2015). It encodes the dialog history using deep neural networks and then generates the next system utterance word-by-word via recurrent neural networks (RNNs). Therefore, unlike the traditional SDS pipeline, the encoder-decoder model is theoretically only limited by its input/output vocabulary. A na`‘ive implementation of an encoderdecoder-based task-oriented system would use RNNs to encode the raw dialog history and generate the next system utterance using a separate RNN decoder. However, while this implementation might achieve good performance in an offline evaluation of a closed dataset, it would certainly fail when used by humans. There are several reasons for this: 1) real users can mention new entities that do not appear in the training data, such as a new restaurant name. These entities are, however, essential in delivering the information that matches users’ needs in a task-oriented system. 2) a task-oriented SDS obtains information from a knowledge base (KB) that is constantly updated (“today’s” weather will be different every day), so simply memorizing KB results that occurred in the training data would produce false information. Instead, an effective model should learn to query the KB constantly to get the most up-to-date information. 3) users may give OOD requests (e.g. say, “how is your day”, to a slot-filling system), which must be handled gracefully in order to keep the conversation moving in the intended direction. This paper proposes an effective encoderdecoder framework for building task-oriented SDSs. We propose entity indexing to tackle the challenges of out-of-vocabulary (OOV) entities and to query the KB. Moreover, we show the extensibility of the proposed model by adding chatting capability to a task-oriented encoder-decoder SDS for better OOD recovery. This approach was assessed on the Let’s Go Bus Information data from the 1st Dialog State Tracking Challenge (Williams et al., 2013), and we report performance on both offline metrics and real human users. Results show that this model attains good performance for both of these metrics. 2 matically learn a distributed vector representation of the dialog state by accumulating the observations at each turn (Williams and Zweig, 2016; Zhao and Eskenazi, 2016; Dhingra et al., 2016; Williams et al., 2017). The learned dialog state is then used by the dialog policy to select the next action. The second branch of research develops a domain-general action space for dialog policy. Prior work replaced the domain-specific dialog acts with domain-independent natural language semantic schema as the action space of dialog managers (Eshghi and Lemon, 2014), e.g. Dynamic Syntax (Kempson et al., 2000). More recently, Wen, et al. (2016) have shown the feasibility of using an RNN as the decoder to generate the system utterances word by word, and the dialog policy of the proposed model can be fine tuned using reinforcement learning (Su et al., 2016). Furthermore, to deal with the challenge of developing end-to-end task-oriented dialog models that are able to interface with external KB, prior work has unified the special KB query actions via deep reinforcement learning (Zhao and Eskenazi, 2016) and soft attention over the database (Dhingra et al., 2016). The third branch strives to solve both problems at the same time by building an end-to-end model that maps an observable dialog history directly to the word sequences of the system’s response. By using an encoder-decoder model, it has been successfully applied to open-domain conversational models (Serban et al., 2015; Li et al., 2015, 2016; Zhao et al., 2017), as well as to task oriented systems (Bordes and Weston, 2016; Yang et al., 2016; Eric and Manning, 2017). In order to better predict the next correct system action, this branch has focused on investigating various neural network architectures to improve the machine’s ability to reason over user input and model longterm dialog context. Related Work Past research in developing domain-general dialog systems can be broadly divided into three branches. The first one focuses on learning domain-independent dialog state representation while still using hand-crafted dialog act system actions. Researchers proposed the idea of extracting slot-value independent statistics as the dialog state (Wang et al., 2015; Gašić et al., 2015a), so that the dialog state representation can be shared across systems serving different knowledge sources. Another approach uses RNNs to auto- This paper is closely related to the third branch, but differs in the following ways: 1) these models are slot-value independent by leveraging domaingeneral entity recognizer, which is more extensible to OOV entities, 2) these models emphasize the interactive nature of dialog and address out-ofdomain handling by interleaving chatting in taskoriented conversations, 3) instead of testing on a synthetic dataset, this approach focuses on real world use by testing the system on human users via spoken interface. 3 Proposed Method Our proposed framework consists of three steps as shown in Figure 2: a) entity indexing (EI), b) slot-value independent encoder-decoder (SiED), c) system utterance lexicalization (UL). The intuition is to leverage domain-general named entity recognition (NER) (Tjong Kim Sang and De Meulder, 2003) techniques to extract salient entities in the raw dialog history and convert the lexical values of the entities into entity indexes. The encoder-decoder model is then trained to focus solely on reasoning over the entity indexes in a dialog history and to make decisions about the next utterance to produce (including KB query). In this way, the model can be unaffected by the inclusion of new entities and new KB, while maintaining its domain-general input/output interface for easy extension to new types of conversation skills. Lastly, the output from the decoder networks are lexicalized by replacing the entity indexes and special KB tokens with natural language. The following sections explain each step in detail. 3.1 Entity Indexing and Utterance Lexicalization Entity Indexing EI has two parts. First, the EI utilizes an existing domain-general NER to extract entities from both the user and system utterances. Note that the entity here is assumed to be a super-set of the slots in the domain. For example, for a flight-booking system, the system may contain two slots: [from-LOCATION] and [toLOCATION] for the departure and arrival city, respectively. However, EI only extracts every mention of [LOCATION] in the utterances and leaves the task of distinguishing between departure and arrival to the encoder-decoder model. Furthermore, this step replaces each KB search result with its search query (e.g. the weather is cloudy → [kbsearch]-[DATETIME-0]). The second step of EI involves constructing a indexed entity table. Each entity is indexed by its order of occurrence in the conversation. Figure 1 shows an example in which there are two [LOCATION] mentions. Properties of Entity Indexing In this section, several properties of EI and their assumptions are addressed. First, each entity is indexed uniquely by its entity type and index. Note that the index is not associated with the entity value, but rather solely by the order of appearance in the dialog. Despite the actual words being hidden, Figure 1: An example of entity indexing and utterance lexicalization. a human can still easily predict which entity the system should confirm or search for in the KB based on logical reasoning. Therefore, that the EI not only alleviates the OOV problem of deploying the encoder-decoder model in the real world, but also forces the encoder-decoder model’s focus on learning the reasoning process of task-oriented dialogs instead of leveraging too much information from the language modeling. Moreover, most slot-filling SDSs, apart from informing the concepts from KBs, usually do not introduce novel entities to users. Instead, systems mostly corroborate the entities introduced by the users. With this assumption, every entity mention in the system utterances can always be found in the users’ utterances in the dialog history, and therefore can also be found in the indexed entity table. This property reduces the grounding behavior of the conventional task-oriented dialog manager into selecting an entity from the indexed entity table and confirming it with the user. Utterance Lexicalization is the reverse of EI. Since EI is a deterministic process, its effect can always be reversed by finding the corresponding entity in the indexed entity table and replacing the index with its word. For KB search, a simple string matching algorithm can search for the special [kbsearch] token and take the following generated entities as the argument to the KB. Then the actual KB results can replace the original KB query. Figure 1 shows an example of utterance lexicalization. 3.2 Encoder-Decoder Models The encoder-decoder model can then read in the EI-processed dialog history and predict the system’s next utterance in EI format. Specifically, a dialog history of k turns is represented by [(a0 , u0 , c0 ), ...(ak−1 , uk−1 , ck−1 )], in which ai , ui and ci are, respectively, the system, user utterance and ASR confidence score at turn i. Each utterance in the dialog history is encoded into fixedsize vectors using Convolutional Neural Networks Figure 2: The proposed pipeline for task-oriented dialog systems. (CNNs) proposed in (Kim, 2014). Specifically, each word in an utterance x is mapped to its word embedding, so that an utterance is represented as a matrix R ∈ R|x|×D , in which D is the size of the word embedding. Then L filters of size 1,2,3 conduct convolutions on R to obtain a feature map, c, of n-gram features in window size 1,2,3. Then c is passed through a nonlinear ReLu (Glorot et al., 2011) layer, followed by a max-pooling layer to obtain a compact summary of salient n-gram features, i.e. et (x) = maxpool(ReLu(c + b)). Using CNNs to capture word-order information is crucial, because the encoder-decoder has to be able to distinguish between fine-grained differences between entities. For example, a simple bag-of-word embedding approach will fail to distinguish between the two location entities in “leave from [LOCATION-0] and go to [LOCATION-1]”, while a CNN encoder can capture the context information of these two entities. After obtaining utterance embedding, a turnlevel dialog history encoder network similar to the one proposed in (Zhao and Eskenazi, 2016) is used. Turn embedding is a simple concatenation of system, user utterance embedding and the confidence score t = [eu (ai ); eu (ui ); ci ]. Then an Long Short-Term Memory (LSTM) (Hochreiter and Schmidhuber, 1997) network reads the sequence turn embeddings in the dialog history via recursive state update si+1 = LSTM(ti+1 , hi ), in which hi is the output of the LSTM hidden state. Decoding with/without Attention A vanilla decoder takes in the last hidden state of the encoder as its initial state and decodes the next system utterance word by word as shown in (Sutskever et al., 2014). This assumes that the fixed-size hidden state is expressive enough to encode all important information about the history of a dialog. However, this assumption may often be violated for a task that has long-dependency or complex reasoning of the entire source sequence. An attention mechanism proposed (Bahdanau et al., 2014) in the machine translation community has helped encoderdecoder models improve state-of-art performance in various tasks (Bahdanau et al., 2014; Xu et al., 2015). Attention allows the decoder to look over every hidden state in the encoder and dynamically decide the importance of each hidden state at each decoding step, which significantly improves the model’s ability to handle long-term dependency. We experiment decoders both with and without attention. Attention is computed similarly multiplicative attention described in (Luong et al., 2015). We denote the hidden state of the decoder at time step j by sj , and the hidden state outputs of the encoder at turn i by hi . We then predict the next word by aji = softmax(hTi Wa sj + ba ) X cj = aji hi (1) (2) i   s sej = tanh(Ws j ) cj (3) p(wj |sj , cj ) = softmax(Wo sej ) (4) The decoder next state is updated by sj+1 = LSTM(sj , e(wj+1 ), sej ). 3.3 Leveraging Chat Data to Improve OOD Recovery Past work has shown that simple supervised learning is usually inadequate for learning robust sequential decision-making policy (Williams and Young, 2003; Ross et al., 2011). This is because the model is only exposed to the expert demonstration, but not to examples of how to recover from its own mistakes or users’ OOD requests. We present a simple yet effective technique that leverages the extensibility of the encoder-decoder model in order to obtain a more robust policy in the setting of supervised learning. Specifically, we artificially augment a task-oriented dialog dataset with chat data from an open-domain conversation corpus. This has been shown to be effective in improving the performance of task-oriented systems (Yu et al., 2017). Let the original dialog dataset with N dialogs be D = [d0 ..., dn , ...dN ], where dn is a multi-turn task-oriented dialog of |dn | turns. Furthermore, we assume we have access to a chat dataset Dc = [(q0 , r0 ), ...(qm , rm ), ...(qM , rM )], where qm , rm are common adjacency pairs that appear in chats, (e.g. q = hello, r = hi, how are you). Then we can create a new dataset D∗ by repeating the following process a certain number of times: 1. Randomly sample dialog dn from D 2. Randomly sample turn ti = [ai , ui ] from dn 3. Randomly sample (qm , rm ) from Dc an adjacency pair 4. Replace the user utterance of ti by qm so that ti = [ai , qm ] 5. Insert a new turn after ti , i.e. ti+1 = [rm + ei+1 , ui ] Figure 3: Illustration of data augmentation. The turn in the dashed line is inserted in the original dialog. In Step 5, ei is an error handling system utterance after the system answers the user’s OOD request, qm . In this study, we experimented with a simple case where ei+1 = ai so that the system should repeat its previous prompt after responding to qm via rm . Figure 3 shows an example of an augmented turn. Eventually, we train the model on the union of the two datasets D+ = D ∪ D∗ Discussion: There are several reasons that the above data augmentation process is appealing. First, the model effectively learns an OOD recovery strategy from D∗ , i.e. it first gives chatting answers to users’ OOD requests and then tries to pull users back to the main-task conversation. Second, chat data usually has a larger vocabulary and more diverse natural language expressions, which can reduce the chance of OOVs and enable the model to learn more robust word embeddings and language models. 4 4.1 Experiment Setup Dataset and Domain The CMU Let’s Go Bus Information System (Raux et al., 2005) is a task-oriented spoken dialog system that contains bus information. We combined the train1a and train1b datasets from DSTC 1 (Williams et al., 2013), which contain 2608 total dialogs. The average dialog length is 9.07 turns. The dialogs were randomly splitted into 85/5/10 proportions for train/dev/test data. The data was noisy since the dialogs were collected from real users via telephone lines. Furthermore, this version of Let’s Go used an inhouse database containing the Port Authority bus schedule. In the current version, that database was replaced with the Google Directions API, which both reduces the human burden of maintaining a database and opens the possibility of extending Let’s Go to cities other than Pittsburgh. Connecting to Google Directions API involves a POST call to their URL, with our given access key as well as the parameters needed: departure place, arrival place and departure time, and the travel mode, which we always set as TRANSIT to obtain relevant bus routes. There are 14 distinct dialog acts available to the system, and each system utterance contains one or more dialog acts. Lastly, the system vocabulary size is 1311 and the user vocabulary size is 1232. After the EI process, the sizes become 214 and 936, respectively. For chat data, we use a publicly available chat corpus used in (Yu et al., 2015)1 . In total, there are 3793 chatting adjacency pairs. We control the number of data injections to 30% of the number of turns in the original DTSC dataset, which leads to a user vocabulary size of 3537 and system vocabulary size of 4047. 4.2 Training Details For all experiments, the word embedding size was 100. The sizes of the LSTM hidden states for both the encoder and decoder were 500 with 1 layer. The attention context size was also 500. We tied the CNN weights for the encoding system and user utterances. Each CNN has 3 filter windows, 1, 2, and 3, with 100 feature maps each. We trained the model end-to-end using Adam (Kingma and Ba, 2014), with a learning rate of 1e-3 and a batch size of 40. To combat overfitting, we apply dropout (Zaremba et al., 2014) to the LSTM layer outputs and the CNN outputs after the maxpooling layer, with a dropout rate of 40%. 5 responses. Then we computed the micro-average precision, recall, and the F-score. Slots: This metric measures the model’s performance in generating the correct slot-values. The slot-values mostly occur in grounding utterances (e.g. explicit/implicit confirm) and KB queries. We compute precision, recall, and F-score. KB Queries: Although the slots metric already covers the KB queries, here the precision/recall/Fscore of system utterances that contain KB queries are also explicitly measured, due to their importance. Specifically, this action measures whether the system is able to generate the special [kbquery] symbol to initiate a KB query, as well as how accurate the corresponding KB query arguments are. BLEU (Papineni et al., 2002): compares the ngram precision with length penalty, and has been a popular score used to evaluate the performance of natural language generation (Wen et al., 2015) and open-domain dialog models (Li et al., 2016). Corpus-level BLEU-4 is reported. Experiments Results This approach was assessed both offline and online evaluations. The offline evaluation contains standard metrics to test open-domain encoderdecoder dialog models (Li et al., 2015; Serban et al., 2015). System performance was assessed from three perspectives that are essential for taskoriented systems: dialog acts, slot-values, and KB query. The online evaluation is composed of objective task success rate, the number of turns, and subjective satisfaction with human users. 5.1 Offline Evaluation Dialog Acts (DA): Each system utterance is made up of one or more dialog acts, e.g. “leaving at [TIME-0], where do you want to go?” → [implicit-confirm, request(arrival place)]. To evaluate whether a generated utterance has the same dialog acts as the ground truth, we trained a multilabel dialog tagger using one-vs-rest Support Vector Machines (SVM) (Tsoumakas and Katakis, 2006), with bag-of-bigram features for each dialog act label. Since the natural language generation module in Let’s Go is handcrafted, the dialog act tagger achieved 99.4% average label accuracy on a held-out dataset. We used this dialog act tagger to tag both the ground truth and the generated 1 github.com/echoyuzhou/ticktock text api Metrics Vanilla EI DA (p/r/f1) 83.5 77.9 80.5 42.0 30.3 35.2 N/A Slot (p/r/f1) KB (p/r/f1) BLEU 36.9 79.7 80.1 80.0 60.6 63.6 62.1 48.9 55.3 51.9 54.6 EI +Attn 80.0 83.1 81.5 63.7 64.7 64.2 55.4 70.8 62.2 59.3 EI+Attn +Chat 81.8 83.5 82.7 64.6 69.1 66.8 58.2 71.9 64.4 60.5 Table 1: Performance of each model on automatic measures. Four systems were compared: the basic encoder-decoder models without EI (vanilla), the basic model with EI pre-processing (EI), the model with attentional decoder (EI+Attn) and the model trained on the dataset augmented with chatting data (EI+Attn+Chat). The comparison was carried out on exactly the same held-out test dataset that contains 261 dialogs. Table 1 shows the results. It can be seen that all four models achieve similar performance on the dialog act metrics, even the vanilla model. This confirms the capacity of encoder-decoders models to learn the “shape” of a conversation, since they have achieved impressive results in more challenging settings, e.g. modeling open-domain conversations. Furthermore, since the DSTC1 data was collected over several months, there were minor updates made to the dialog manager. Therefore, there are inherent ambiguities in the data (the dialog manager may take different actions in the same situation). We conjecture that ∼80% is near the upper limit of our data in modeling the system’s next dialog act given the dialog history. On the other hand, these proposed methods significantly improved the metrics related to slots and KB queries. The inclusion of EI alone was able to improve the F-score of slots by a relative 76%, which confirms that EI is crucial in developing slot-value independent encoder-decoder models for modeling task-oriented dialogs. Likewise, the inclusion of attention further improved the prediction of slots in system utterances. Adding attention also improved the performance of predicting KB queries, more so than the overall slot accuracy. This is expected, since KB queries are usually issued near the end of a conversation, which requires global reasoning over the entire dialog history. The use of attention allows the decoder to look over the history and make better decisions rather than simply depending on the context summary in the last hidden layer of the encoder. Because of the good performance achieved by the models with the attentional decoder, the attention weights in Equation 1 at every step of the decoding process in two example dialogs from test data are visualized. For both figures, the vertical axes show the dialog history flowing from the top to the bottom. Each row is a turn in the format of (system utterance # user utterance). The top horizontal axis shows the predicted next system utterance. The darkness of a bar indicates the value of the attention calculated in Equation 1. The first example shows attention for grounding the new entity [LOCATION-1] in the previous turn. The attention weights become focus on the previous turn when predicting [LOCATION1] in the implicit confirm action. The second dialog example shows a more challenging situation, in which the model is predicting a KB query. We can see that the attention weights when generating each input argument of the KB query clearly focus on the specific mention in the dialog history. The visualization confirms the effectiveness of the attention mechanism in dealing with long-term de- pendency at discourse level. Figure 4: Visualization of attention weights when generating implicit confirm (top) and KB query (bottom). Surprisingly, the model trained on the data augmented with chat achieved slightly better slot accuracy performance, even though the augmented data is not directly related to task-oriented dialogs. Furthermore, the model trained on chataugmented data achieved better scores for the KB query metrics. Several reasons may explain this improvement: 1) since chat data exposes the model to a significantly larger vocabulary, the resulting model is more robust to words that it had not seen in the original task-oriented-only training data, and 2) the augmented dialog turn can be seen as noise in the dialog history, which adds extra regularization to the model and enables the model to learn more robust long-term reasoning mechanisms. 5.2 Human Evaluation Although the model achieves good performance in offline evaluation, this may not carray over to real user dialogs, where the system must simultaneously deal with several challenges, such as automatic speech recognition (ASR) errors, OOD requests, etc. Therefore, a real user study was conducted to evaluate the performance of the proposed systems in the real world. Due to the limited number of real users, only two best performing system were compared, EI+Attn and EI+Attn+Chat. Users were able to talk to a web interface to the dialog systems via speech. Google Chrome Speech API 2 served as the ASR and textto-speech (TTS) modules. Turn-taking was done via the built-in Chrome voice activity detection (VAD) plus a finite state machine-based end-ofturn detector (Zhao et al., 2015). Lastly, a hybrid named entity recognizer (NER) was trained using Conditional Random Field (CRF) (McCallum and Li, 2003) and rules to extract 4 types of entities (location, hour, minute, pm/am) for the EI process. The experiment setup is as follows: when a user logs into the website, the system prompts the user with a goal, which is a randomly chosen combination of departure place, arrival place and time (e.g. leave from CMU and go to the airport at 10:30 AM). The system also instructs the user to say goodbye if the he/she thinks the goal is achieved or wants to give up. The user begins a conversation with one of the two evaluated systems, with a 50/50 chance of choosing either system (not visible to the user). After the user’s session is finished, the system asks the him/her to give two scores between 1 and 5 for correctness and naturalness of the system respectively. The subjects in this study consist of undergraduate and graduate students. However, many subjects did not follow the prompted goal, but rather asked about bus routes of their own. Therefore, the dialog was manually labeled for dialog success. A dialog is successful if and only if the systems give at least one bus schedule that matches with all three slots expressed by the users. Table 2 shows the Metrics EI+Attn # of Dialog Slot Precision KB Precision Success Rate Avg Turns Avg Correctness Avg Naturalness 75 73.3% 88.6% 73.3% 4.88 3.45 (1.32) 3.46 (1.41) EI+Attn +Chat 74 71.8% 93.7% 77.0% 4.91 3.22 (1.40) 3.53 (1.34) Table 2: Performance of each model on automatic measures. The standard deviations of subjective scores are in parentheses. results. Overall, our systems achieved reasonable performance in terms of dialog success rate. The EI+Attn+Chat model achieves slightly higher success and subjective naturalness metrics (although the difference between EI+Attn+Chat and EI+Attn 2 www.google.com/intl/en/chrome/demos/speech.html was not statistically significant due to the limited number of subjects). The precision of grounding the correct slots and predicting the correct KB query was also manually labelled. EI+Attn model performs slightly better than the EI+Attn+Chat model in slot precision, while the latter model performs significantly better in KB query precision. In addition, EI+Attn+Chat leads to slightly longer dialogs because sometimes it generates chatting utterances with users when it cannot understand users’ utterances. At last, we investigated the log files and identified the following major types of sources of dialog failure: RNN Decoder Invalid Output: Occasionally, the RNN decoder outputs system utterances as “Okay going to [LOCATION-2]. Did I get that right?”, in which [LOCATION-2] cannot be found in the indexed entity table. Such invalid output confuses users. This occurred in 149 of the dialogs, where 4.1% of system utterances contain invalid symbols. Imitation of Suboptimal Dialog Policy: Since our models are only trained to imitate the suboptimal hand-crafted dialog policy, their limitations show when the original dialog manager cannot handle the situation, such as failing to understand slots that appeared in compound utterances. Future plans involves improving the models to perform better than the suboptimal teacher policy. 6 Conclusions In conclusion, this paper discusses constructing task-oriented dialog systems using generative encoder decoder models. EI is effective in solving both the OOV entity and KB query challenges for encoder-decoder-based task-oriented SDSs. Additionally, the novel data augmentation technique of interleaving task-oriented dialog corpus with chat data led to better model performance in both online and offline evaluation. Future work includes developing more advanced encoder-decoder models that to better deal with long-term dialog history and complex reasoning challenges than current models do. Furthermore, inspired by the success of mixing chatting with slot-filling dialogs, we will take full advantage of the extensibility of encoder-decoder models by investigating how to make systems that are able to interleave various conversational tasks, e.g. different domains, chatting or task-oriented, which in turn can create a more versatile conversational agent. References Dzmitry Bahdanau, Kyunghyun Cho, and Yoshua Bengio. 2014. Neural machine translation by jointly learning to align and translate. arXiv preprint arXiv:1409.0473 . Dan Bohus and Alexander I Rudnicky. 2003. Ravenclaw: Dialog management using hierarchical task decomposition and an expectation agenda . Dan Bohus and Alexander I Rudnicky. 2005. Error handling in the ravenclaw dialog management framework. In Proceedings of the conference on Human Language Technology and Empirical Methods in Natural Language Processing. Association for Computational Linguistics, pages 225–232. Antoine Bordes and Jason Weston. 2016. Learning end-to-end goal-oriented dialog. arXiv preprint arXiv:1605.07683 . Kyunghyun Cho, Bart Van Merriënboer, Caglar Gulcehre, Dzmitry Bahdanau, Fethi Bougares, Holger Schwenk, and Yoshua Bengio. 2014. Learning phrase representations using rnn encoder-decoder for statistical machine translation. arXiv preprint arXiv:1406.1078 . Renato De Mori, Frédéric Bechet, Dilek Hakkani-Tur, Michael McTear, Giuseppe Riccardi, and Gokhan Tur. 2008. Spoken language understanding. IEEE Signal Processing Magazine 25(3). Bhuwan Dhingra, Lihong Li, Xiujun Li, Jianfeng Gao, Yun-Nung Chen, Faisal Ahmed, and Li Deng. 2016. End-to-end reinforcement learning of dialogue agents for information access. arXiv preprint arXiv:1609.00777 . Mihail Eric and Christopher D Manning. 2017. A copy-augmented sequence-to-sequence architecture gives good performance on task-oriented dialogue. arXiv preprint arXiv:1701.04024 . Arash Eshghi and Oliver Lemon. 2014. How domaingeneral can we be? learning incremental dialogue systems without dialogue acts. DialWattSemdial 2014 page 53. M Gašić, N Mrkšić, Pei-hao Su, David Vandyke, Tsung-Hsien Wen, and Steve Young. 2015a. Policy committee for adaptation in multi-domain spoken dialogue systems. In Automatic Speech Recognition and Understanding (ASRU), 2015 IEEE Workshop on. IEEE, pages 806–812. Milica Gašić, Dongho Kim, Pirros Tsiakoulis, and Steve Young. 2015b. Distributed dialogue policies for multi-domain statistical dialogue management. In Acoustics, Speech and Signal Processing (ICASSP), 2015 IEEE International Conference on. IEEE, pages 5371–5375. Xavier Glorot, Antoine Bordes, and Yoshua Bengio. 2011. Deep sparse rectifier neural networks. In Aistats. volume 15, page 275. Sepp Hochreiter and Jürgen Schmidhuber. 1997. Long short-term memory. Neural computation 9(8):1735–1780. Ruth Kempson, Wilfried Meyer-Viol, and Dov M Gabbay. 2000. Dynamic syntax: The flow of language understanding. Wiley-Blackwell. Yoon Kim. 2014. Convolutional neural networks for sentence classification. arXiv preprint arXiv:1408.5882 . Diederik Kingma and Jimmy Ba. 2014. Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980 . Cheongjae Lee, Sangkeun Jung, Seokhwan Kim, and Gary Geunbae Lee. 2009. Example-based dialog modeling for practical multi-domain dialog system. Speech Communication 51(5):466–484. Jiwei Li, Michel Galley, Chris Brockett, Jianfeng Gao, and Bill Dolan. 2015. A diversity-promoting objective function for neural conversation models. arXiv preprint arXiv:1510.03055 . Jiwei Li, Will Monroe, Alan Ritter, Michel Galley, Jianfeng Gao, and Dan Jurafsky. 2016. Deep reinforcement learning for dialogue generation. arXiv preprint arXiv:1606.01541 . Minh-Thang Luong, Hieu Pham, and Christopher D Manning. 2015. Effective approaches to attentionbased neural machine translation. arXiv preprint arXiv:1508.04025 . Andrew McCallum and Wei Li. 2003. Early results for named entity recognition with conditional random fields, feature induction and web-enhanced lexicons. In Proceedings of the seventh conference on Natural language learning at HLT-NAACL 2003-Volume 4. Association for Computational Linguistics, pages 188–191. Kishore Papineni, Salim Roukos, Todd Ward, and WeiJing Zhu. 2002. Bleu: a method for automatic evaluation of machine translation. In Proceedings of the 40th annual meeting on association for computational linguistics. Association for Computational Linguistics, pages 311–318. Antoine Raux, Brian Langner, Dan Bohus, Alan W Black, and Maxine Eskenazi. 2005. Lets go public! taking a spoken dialog system to the real world. In in Proc. of Interspeech 2005. Citeseer. Stéphane Ross, Geoffrey J Gordon, and Drew Bagnell. 2011. A reduction of imitation learning and structured prediction to no-regret online learning. In AISTATS. volume 1, page 6. Iulian V Serban, Alessandro Sordoni, Yoshua Bengio, Aaron Courville, and Joelle Pineau. 2015. Building end-to-end dialogue systems using generative hierarchical neural network models. arXiv preprint arXiv:1507.04808 . Alessandro Sordoni, Michel Galley, Michael Auli, Chris Brockett, Yangfeng Ji, Margaret Mitchell, Jian-Yun Nie, Jianfeng Gao, and Bill Dolan. 2015. A neural network approach to context-sensitive generation of conversational responses. arXiv preprint arXiv:1506.06714 . Pei-Hao Su, Milica Gasic, Nikola Mrksic, Lina RojasBarahona, Stefan Ultes, David Vandyke, TsungHsien Wen, and Steve Young. 2016. Continuously learning neural dialogue management. arXiv preprint arXiv:1606.02689 . Ilya Sutskever, Oriol Vinyals, and Quoc V Le. 2014. Sequence to sequence learning with neural networks. In Advances in neural information processing systems. pages 3104–3112. Erik F Tjong Kim Sang and Fien De Meulder. 2003. Introduction to the conll-2003 shared task: Language-independent named entity recognition. In Proceedings of the seventh conference on Natural language learning at HLT-NAACL 2003-Volume 4. Association for Computational Linguistics, pages 142–147. and efficient end-to-end dialog control with supervised and reinforcement learning. arXiv preprint arXiv:1702.03274 . Jason D Williams and Geoffrey Zweig. 2016. Endto-end lstm-based dialog control optimized with supervised and reinforcement learning. arXiv preprint arXiv:1606.01269 . Kelvin Xu, Jimmy Ba, Ryan Kiros, Kyunghyun Cho, Aaron C Courville, Ruslan Salakhutdinov, Richard S Zemel, and Yoshua Bengio. 2015. Show, attend and tell: Neural image caption generation with visual attention. In ICML. volume 14, pages 77–81. Zichao Yang, Phil Blunsom, Chris Dyer, and Wang Ling. 2016. Reference-aware language models. arXiv preprint arXiv:1611.01628 . Steve J Young. 2006. Using pomdps for dialog management. In SLT. pages 8–13. Zhou Yu, Alan W Black, and Alexander I Rudnicky. 2017. Learning conversational systems that interleave task and non-task content. arXiv preprint arXiv:1703.00099 . Grigorios Tsoumakas and Ioannis Katakis. 2006. Multi-label classification: An overview. International Journal of Data Warehousing and Mining 3(3). Zhou Yu, Alexandros Papangelis, and Alexander Rudnicky. 2015. Ticktock: A non-goal-oriented multimodal dialog system with engagement awareness. In Proceedings of the AAAI Spring Symposium. Oriol Vinyals and Quoc Le. 2015. A neural conversational model. arXiv preprint arXiv:1506.05869 . Wojciech Zaremba, Ilya Sutskever, and Oriol Vinyals. 2014. Recurrent neural network regularization. arXiv preprint arXiv:1409.2329 . Zhuoran Wang, Tsung-Hsien Wen, Pei-Hao Su, and Yannis Stylianou. 2015. Learning domainindependent dialogue policies via ontology parameterisation. In 16th Annual Meeting of the Special Interest Group on Discourse and Dialogue. page 412. Tsung-Hsien Wen, Milica Gasic, Nikola Mrksic, PeiHao Su, David Vandyke, and Steve Young. 2015. Semantically conditioned lstm-based natural language generation for spoken dialogue systems. arXiv preprint arXiv:1508.01745 . Tsung-Hsien Wen, David Vandyke, Nikola Mrksic, Milica Gasic, Lina M Rojas-Barahona, Pei-Hao Su, Stefan Ultes, and Steve Young. 2016. A networkbased end-to-end trainable task-oriented dialogue system. arXiv preprint arXiv:1604.04562 . Jason Williams, Antoine Raux, Deepak Ramachandran, and Alan Black. 2013. The dialog state tracking challenge. In Proceedings of the SIGDIAL 2013 Conference. pages 404–413. Jason Williams and Steve Young. 2003. Using wizardof-oz simulations to bootstrap reinforcementlearning-based dialog management systems. In Proceedings of the 4th SIGDIAL Workshop on Discourse and Dialogue. Jason D Williams, Kavosh Asadi, and Geoffrey Zweig. 2017. Hybrid code networks: practical Tiancheng Zhao, Alan W Black, and Maxine Eskenazi. 2015. An incremental turn-taking model with active system barge-in for spoken dialog systems. In 16th Annual Meeting of the Special Interest Group on Discourse and Dialogue. page 42. Tiancheng Zhao and Maxine Eskenazi. 2016. Towards end-to-end learning for dialog state tracking and management using deep reinforcement learning. In 17th Annual Meeting of the Special Interest Group on Discourse and Dialogue. Tiancheng Zhao, Maxine Eskenazi, and Kyusong Lee. 2016. Dialport: A general framework for aggregating dialog systems. EMNLP 2016 page 32. Tiancheng Zhao, Ran Zhao, and Maxine Eskenazi. 2017. Learning discourse-level diversity for neural dialog models using conditional variational autoencoders. arXiv preprint arXiv:1703.10960 .
2cs.AI
Alternating Back-Propagation for Generator Network Tian Han † , Yang Lu † , Song-Chun Zhu, Ying Nian Wu arXiv:1606.08571v4 [stat.ML] 6 Dec 2016 Department of Statistics, University of California, Los Angeles, USA Abstract a convolutional neural network (ConvNet or CNN) (LeCun et al., 1998; Krizhevsky, Sutskever, and Hinton, 2012; Dosovitskiy, Springenberg, and Brox, 2015). It has been shown recently that the generator network is capable of generating realistic images (Denton et al., 2015; Radford, Metz, and Chintala, 2016). The generator network is a fundamental representation of knowledge, and it has the following properties: (1) Analysis: The model disentangles the variations in the observed signals into independent variations of latent factors. (2) Synthesis: The model can synthesize new signals by sampling the factors from the known prior distribution and transforming the factors into the signal. (3) Embedding: The model embeds the high-dimensional non-Euclidean manifold formed by the observed signals into the low-dimensional Euclidean space of the latent factors, so that linear interpolation in the lowdimensional factor space results in non-linear interpolation in the data space. This paper proposes an alternating back-propagation algorithm for learning the generator network model. The model is a nonlinear generalization of factor analysis. In this model, the mapping from the continuous latent factors to the observed signal is parametrized by a convolutional neural network. The alternating back-propagation algorithm iterates the following two steps: (1) Inferential back-propagation, which infers the latent factors by Langevin dynamics or gradient descent. (2) Learning back-propagation, which updates the parameters given the inferred latent factors by gradient descent. The gradient computations in both steps are powered by back-propagation, and they share most of their code in common. We show that the alternating back-propagation algorithm can learn realistic generator models of natural images, video sequences, and sounds. Moreover, it can also be used to learn from incomplete or indirect training data. 1 Introduction 1.2 This paper studies the fundamental problem of learning and inference in the generator network (Goodfellow et al., 2014), which is a generative model that has become popular recently. Specifically, we propose an alternating back-propagation algorithm for learning and inference in this model. 1.1 The factor analysis model can be learned by the Rubin-Thayer EM algorithm (Rubin and Thayer, 1982; Dempster, Laird, and Rubin, 1977), where both the E-step and the M-step are based on multivariate linear regression. Inspired by this algorithm, we propose an alternating back-propagation algorithm for learning the generator network that iterates the following two-steps: (1) Inferential back-propagation: For each training example, infer the continuous latent factors by Langevin dynamics or gradient descent. (2) Learning back-propagation: Update the parameters given the inferred latent factors by gradient descent. The Langevin dynamics (Neal, 2011) is a stochastic sampling counterpart of gradient descent. The gradient computations in both steps are powered by back-propagation. Because of the ConvNet structure, the gradient computation in step (1) is actually a by-product of the gradient computation in step (2) in terms of coding. Given the factors, the learning of the ConvNet is a supervised learning problem (Dosovitskiy, Springenberg, and Brox, 2015) that can be accomplished by the learning backpropagation. With factors unknown, the learning becomes an unsupervised problem, which can be solved by adding the inferential back-propagation as an inner loop of the learning Non-linear factor analysis The generator network is a non-linear generalization of factor analysis. Factor analysis is a prototype model in unsupervised learning of distributed representations. There are two directions one can pursue in order to generalize the factor analysis model. One direction is to generalize the prior model or the prior assumption about the latent factors. This led to methods such as independent component analysis (Hyvärinen, Karhunen, and Oja, 2004), sparse coding (Olshausen and Field, 1997), non-negative matrix factorization (Lee and Seung, 2001), matrix factorization and completion for recommender systems (Koren, Bell, and Volinsky, 2009), etc. The other direction to generalize the factor analysis model is to generalize the mapping from the continuous latent factors to the observed signal. The generator network is an example in this direction. It generalizes the linear mapping in factor analysis to a non-linear mapping that is defined by † Alternating back-propagation Equal contributions. 1 process. We shall show that the alternating back-propagation algorithm can learn realistic generator models of natural images, video sequences, and sounds. The alternating back-propagation algorithm follows the tradition of alternating operations in unsupervised learning, such as alternating linear regression in the EM algorithm for factor analysis, alternating least squares algorithm for matrix factorization (Koren, Bell, and Volinsky, 2009; Kim and Park, 2008), and alternating gradient descent algorithm for sparse coding (Olshausen and Field, 1997). All these unsupervised learning algorithms alternate an inference step and a learning step, as is the case with alternating back-propagation. 1.3 is the generative adversarial network (GAN) (Goodfellow et al., 2014; Denton et al., 2015; Radford, Metz, and Chintala, 2016), where the assisting network is a discriminator network that plays an adversarial role against the generator network. Unlike alternating back-propagation, VAE does not perform explicit explain-away inference, while GAN avoids inferring the latent factors altogether. In comparison, the alternating back-propagation algorithm is simpler and more basic, without resorting to an extra network. While it is difficult to compare these methods directly, we illustrate the strength of alternating back-propagation by learning from incomplete and indirect data, where we only need to explain whatever data we are given. This may prove difficult or less convenient for VAE and GAN. Meanwhile, alternating back-propagation is complementary to VAE and GAN training. It may use VAE to initialize the inferential back-propagation, and as a result, may improve the inference in VAE. The inferential back-propagation may help infer the latent factors of the observed examples for GAN, thus providing a method to test if GAN can explain the entire training set. The generator network is based on a top-down ConvNet. One can also obtain a probabilistic model based on a bottomup ConvNet that defines descriptive features (Xie et al., 2016; Lu, Zhu, and Wu, 2016). Explaining-away inference The inferential back-propagation solves an inverse problem by an explaining-away process, where the latent factors compete with each other to explain each training example. The following are the advantages of the explaining-away inference of the latent factors: (1) The latent factors may follow sophisticated prior models. For instance, in textured motions (Wang and Zhu, 2003) or dynamic textures (Doretto et al., 2003), the latent factors may follow a dynamic model such as vector auto-regression. By inferring the latent factors that explain the observed examples, we can learn the prior model. (2) The observed data may be incomplete or indirect. For instance, the training images may contain occluded objects. In this case, the latent factors can still be obtained by explaining the incomplete or indirect observations, and the model can still be learned as before. 1.4 2 2.1 Factor analysis and beyond Let Y be a D-dimensional observed data vector, such as an image. Let Z be the d-dimensional vector of continuous latent factors, Z = (zk , k = 1, ..., d). The traditional factor analysis model is Y = W Z + , where W is D × d matrix, and  is a D-dimensional error vector or the observational noise. We assume that Z ∼ N(0, Id ), where Id stands for the d-dimensional identity matrix. We also assume that  ∼ N(0, σ 2 ID ), i.e., the observational errors are Gaussian white noises. There are three perspectives to view W . (1) Basis vectors. Write W = (W1 , ..., Wd ), where each Wk is a Pd D-dimensional column vector. Then Y = k=1 zk Wk + , i.e., Wk are the basis vectors and zk are the coefficients. (2) Loading matrix. Write W = (w1 , ..., wD )> , where wj> is the j-th row of W . Then yj = hwj , Zi + j , where yj and j are the j-th components of Y and  respectively. Each yj is a loading of the d factors where wj is a vector of loading weights, indicating which factors are important for determining yj . W is called the loading matrix. (3) Matrix factorization. Suppose we observe Y = (Y1 , ..., Yn ), whose factors are Z = (Z1 , ..., Zn ), then Y ≈ W Z. The factor analysis model can be learned by the RubinThayer EM algorithm, which involves alternating regressions of Z on Y in the E-step and of Y on Z in the M-step, with both steps powered by the sweep operator (Rubin and Thayer, 1982; Liu, Rubin, and Wu, 1998). The factor analysis model is the prototype of many subsequent models that generalize the prior model of Z. (1) Independent component analysis (Hyvärinen, Karhunen, and Oja, 2004), d = D,  = 0, and zk are assumed to follow independent heavy tailed distributions. (2) Sparse coding Learning from incomplete or indirect data We venture to propose that a main advantage of a generative model is to learn from incomplete or indirect data, which are not uncommon in practice. The generative model can then be evaluated based on how well it recovers the unobserved original data, while still learning a model that can generate new data. Learning the generator network from incomplete data can be considered a non-linear generalization of matrix completion. We also propose to evaluate the learned generator network by the reconstruction error on the testing data. 1.5 Factor analysis with ConvNet Contribution and related work The main contribution of this paper is to propose the alternating back-propagation algorithm for training the generator network. Another contribution is to evaluate the generative models by learning from incomplete or indirect training data. Existing training methods for the generator network avoid explain-away inference of latent factors. Two methods have recently been devised to accomplish this. Both methods involve an assisting network with a separate set of parameters in addition to the original network that generates the signals. One method is variational auto-encoder (VAE) (Kingma and Welling, 2014; Rezende, Mohamed, and Wierstra, 2014; Mnih and Gregor, 2014), where the assisting network is an inferential or recognition network that seeks to approximate the posterior distribution of the latent factors. The other method 2 (Olshausen and Field, 1997), d > D, and Z is assumed to be a redundant but sparse vector, i.e., only a small number of zk are non-zero or significantly different from zero. (3) Non-negative matrix factorization (Lee and Seung, 2001), it is assumed that zk ≥ 0. (4) Recommender system (Koren, Bell, and Volinsky, 2009), Z is a vector of a customer’s desires in different aspects, and wj is a vector of product j’s desirabilities in these aspects. 2.2 algorithm (Dempster, Laird, and Rubin, 1977), the completedata model is given by log p(Y, Z; W ) = log [p(Z)p(Y |Z, W )] 1 1 = − 2 kY − f (Z; W )k2 − kZk2 + const. (3) 2σ 2 The observed-data model is obtained by integrating out Z: R p(Y ; W ) = p(Z)p(Y |Z, W )dZ. The posterior distribution of Z is given by p(Z|Y, W ) = p(Y, Z; W )/p(Y ; W ) ∝ p(Z)p(Y |Z, W ) as a function of Z. For the training data {Y the complete-data logPi }, n likelihood is L(W, {Zi }) = i=1 log p(Yi , Zi ; W ), where we assume σ 2 is given. Learning and inference can be accomplished by maximizing the complete-data log-likelihood, which can be obtained by the alternating gradient descent algorithm that iterates the following two steps: (1) Inference step: update Zi by running l steps of gradient descent. (2) Learning step: update W by one step of gradient descent. A more rigorous method is to maximize Pn the observed-data log-likelihood, which is L(W ) = i=1 log p(Yi ; W ) = R Pn The observed-data logi=1 log p(Yi , Zi ; W )dZi . likelihood takes into account the uncertainties in inferring Zi . See Appendix for an in-depth understanding. The gradient of L(W ) can be calculated according to the following well-known fact that underlies the EM algorithm: Z ∂ 1 ∂ log p(Y ; W ) = p(Y, Z; W )dZ ∂W P (Y ; W ) ∂W   ∂ log p(Y, Z; W ) . (4) = Ep(Z|Y,W ) ∂W ConvNet mapping In addition to generalizing the prior model of the latent factors Z, we can also generalize the mapping from Z to Y . In this paper, we consider the generator network model (Goodfellow et al., 2014) that retains the assumptions that d < D, Z ∼ N(0, Id ), and  ∼ N(0, σ 2 ID ) as in traditional factor analysis, but generalizes the linear mapping W Z to a non-linear mapping f (Z; W ), where f is a ConvNet, and W collects all the connection weights and bias terms of the ConvNet. Then the model becomes Y = f (Z; W ) + , Z ∼ N(0, Id ),  ∼ N(0, σ 2 ID ), d < D. (1) 2 The reconstruction error is ||Y − f (Z; W )|| . We may assume more sophisticated models for , such as colored noise or non-Gaussian texture. If Y is binary, we can emit Y by a probability map P = 1/[1 + exp(−f (Z; W ))], where the sigmoid transformation and Bernoulli sampling are carried out pixel-wise. If Y is multi-level, we may assume multinomial logistic emission model or some ordinal emission model. Although f (Z; W ) can be any non-linear mapping, the ConvNet parameterization of f (Z; W ) makes it particularly close to the original factor analysis. Specifically, we can write the top-down ConvNet as follows: Z (l−1) = fl (Wl Z (l) + bl ), The expectation with respect to p(Z|Y, W ) can be approximated by drawing samples from p(Z|Y, W ) and then computing the Monte Carlo average. The Langevin dynamics for sampling Z ∼ p(Z|Y, W ) iterates (2) where fl is element-wise non-linearity at layer l, Wl is the matrix of connection weights, bl is the vector of bias terms at layer l, and W = (Wl , bl , l = 1, ..., L). Z (0) = f (Z; W ), and Z (L) = Z. The top-down ConvNet (2) can be considered a recursion of the original factor analysis model, where the factors at the layer l − 1 are obtained by the linear superposition of the basis vectors or basis functions that are column vectors of Wl , with the factors at the layer l serving as the coefficients of the linear superposition. In the case of ConvNet, the basis functions are shift-invariant versions of one another, like wavelets. See Appendix for an in-depth understanding of the model. 3 Zτ +1 = Zτ + sUτ +   s2 1 ∂ f (Z ; W ) − Z (Y − f (Z ; W )) , (5) τ τ τ 2 σ2 ∂Z where τ denotes the time step for the Langevin sampling, s is the step size, and Uτ denotes a random vector that follows N(0, Id ). The Langevin dynamics (5) is an explain-away process, where the latent factors in Z compete to explain away the current residual Y − f (Zτ ; W ). To explain Langevin dynamics, its continuous time version for sampling √ π(x) ∝ exp[−E(x)] is xt+∆t = xt − 0 ∆tE (xt )/2 + ∆tUt . The dynamics has π as its stationary distribution, because it can be shown that for any wellbehaved testing function h, if xt ∼ π, then E[h(xt+∆t )] − E[h(xt )] → 0, as ∆t → 0, so that xt+∆t ∼ π. Alternatively, given xt = x, suppose xt+∆t ∼ K(x, y), then [π(y)K(y, x)]/[π(x)K(x, y)] → 1 as ∆t → 0. The stochastic gradient algorithm of (Younes, 1999) can be used for learning, where in each iteration, for each Zi , only a single copy of Zi is sampled from p(Zi |Yi , W ) by running a finite number of steps of Langevin dynamics starting from the current value of Zi , i.e., the warm start. With {Zi } sampled Alternating back-propagation If we observe a training set of data vectors {Yi , i = 1, ..., n}, then each Yi has a corresponding Zi , but all the Yi share the same ConvNet W . Intuitively, we should infer Pn{Zi } and learn W to minimize the reconstruction error i=1 ||Yi − f (Zi ; W )||2 plus a regularization term that corresponds to the prior on Z. More formally, the model can be written as Z ∼ p(Z) and [Y |Z, W ] ∼ p(Y |Z, W ). Adopting the language of the EM 3 is close to the prior N(0, Id ). If σ 2 is very small, then the posterior may be multi-modal, but the evolving energy landscape of p(Zi |Yi , W ) may help alleviate the trapping of the local modes. In practice, we tune the value of σ 2 instead of estimating it. The Langevin dynamics can be extended to Hamiltonian Monte Carlo (Neal, 2011) or more sophisticated versions (Girolami and Calderhead, 2011). in this manner, we can update the parameter W based on the gradient L0 (W ), whose Monte Carlo approximation is: L0 (W ) ≈ n X ∂ log p(Yi , Zi ; W ) ∂W i=1 n X ∂ 1 kYi − f (Zi ; W )k2 2 ∂W 2σ i=1 = − = n X 1 ∂ (Yi − f (Zi ; W )) f (Zi ; W ).(6) 2 σ ∂W i=1 4 Experiments The code in our experiments is based on the MatConvNet package of (Vedaldi and Lenc, 2015). The training images and sounds are scaled so that the intensities are within the range [−1, 1]. We adopt the structure of the generator network of (Radford, Metz, and Chintala, 2016; Dosovitskiy, Springenberg, and Brox, 2015), where the topdown network consists of multiple layers of deconvolution by linear superposition, ReLU non-linearity, and up-sampling, with tanh non-linearity at the bottom-layer (Radford, Metz, and Chintala, 2016) to make the signals fall within [−1, 1]. We also adopt batch normalization (Ioffe and Szegedy, 2015). We fix σ = .3 for the standard deviation of the noise vector . We use l = 10 or 30 steps of Langevin dynamics within each learning iteration, and the Langevin step size s is set at .1 or .3. We run T = 600 learning iterations, with learning rate .0001, and momentum .5. The learning algorithm produces the learned network parameters W and the inferred latent factors Z for each signal Y in the end. The synthesized signals are obtained by f (Z; W ), where Z is sampled from the prior distribution N(0, Id ). Algorithm 1 describes the details of the learning and sampling algorithm. Algorithm 1 Alternating back-propagation Require: (1) training examples {Yi , i = 1, ..., n} (2) number of Langevin steps l (3) number of learning iterations T Ensure: (1) learned parameters W (2) inferred latent factors {Zi , i = 1, ..., n} 1: Let t ← 0, initialize W . 2: Initialize Zi , for i = 1, ..., n. 3: repeat 4: Inferential back-propagation: For each i, run l steps of Langevin dynamics to sample Zi ∼ p(Zi |Yi , W ) with warm start, i.e., starting from the current Zi , each step follows equation (5). 5: Learning back-propagation: Update W ← W + γt L0 (W ), where L0 (W ) is computed according to equation (6), with learning rate γt . 6: Let t ← t + 1 7: until t = T 4.1 If the Gaussian noise Uτ in the Langevin dynamics (5) is removed, then the above algorithm becomes the alternating gradient descent algorithm. It is possible to update both W and {Zi } simultaneously by joint gradient descent. Both the inferential back-propagation and the learning back-propagation are guided by the residual Yi − f (Zi ; W ). The inferential back-propagation is based on ∂f (Z; W )/∂Z, whereas the learning back-propagation is based on ∂f (Z; W )/∂W . Both gradients can be efficiently computed by back-propagation. The computations of the two gradients share most of their steps. Specifically, for the top-down ConvNet defined by (2), ∂f (Z; W )/∂W and ∂f (Z; W )/∂Z share the same code for the chain rule computation of ∂Z (l−1) /∂Z (l) for l = 1, ..., L. Thus, the code for ∂f (Z; W )/∂Z is part of the code for ∂f (Z; W )/∂W . In Algorithm 1, the Langevin dynamics samples from a gradually changing posterior distribution p(Zi |Yi , W ) because W keeps changing. The updating of both Zi and W collaborate to reduce the reconstruction error kYi − f (Zi ; W )||2 . The parameter σ 2 plays the role of annealing or tempering in Langevin sampling. If σ 2 is very large, then the posterior Qualitative experiments Figure 1: Modeling texture patterns. For each example, Left: the 224×224 observed image. Right: the 448×448 generated image. Experiment 1. Modeling texture patterns. We learn a separate model from each texture image. The images are collected from the Internet, and then resized to 224× 224. The synthesized images are 448 × 448. Figures 1 shows four examples. √ √ The factors Z at the top layer form a d × d image, √ with √ each pixel following N(0, 1) independently. The d × d 4 image Z is then transformed to Y by the top-down ConvNet. We use d = 72 in the learning stage for all the texture experiments. In order to obtain the synthesized image, we randomly sample a 14 × 14 Z from N(0, I), and then expand the learned network W to generate the 448 × 448 synthesized image f (Z; W ). The training network is as follows. Starting from 7 × 7 image Z, the network has 5 layers of deconvolution with 5×5 kernels (i.e., linear superposition of 5 × 5 basis functions), with an up-sampling factor of 2 at each layer (i.e., the basis functions are 2 pixels apart). The number of channels in the first layer is 512 (i.e., 512 translation invariant basis functions), and is decreased by a factor 2 at each layer. The Langevin steps l = 10 with step size s = .1. Figure 3: Modeling object patterns. Left: the synthesized images generated by our method. They are generated by f (Z; W ) with the learned W , where Z = (z1 , z2 ) ∈ [−2, 2]2 , and Z is discretized into 9 × 9 values. Right: the synthesized images generated using Deep Convolutional Generative Adversarial Net (DCGAN). Z is discretized into 9 × 9 values within [−1, 1]2 . Figure 2: Modeling sound patterns. Row 1: the waveform of the training sound (the range is 0-5 seconds). Row 2: the waveform of the synthesized sound (the range is 0-11 seconds). Figure 4: Modeling object patterns. Left: each image generated by our method is obtained by first sampling Z ∼ N(0, I100 ) and then generating the image by f (Z; W ) with the learned W . Middle: interpolation. The images at the four corners are reconstructed from the inferred Z vectors of four images randomly selected from the training set. Each image in the middle is obtained by first interpolating the Z vectors of the four corner images, and then generating the image by f (Z; W ). Right: the synthesized images generated by DCGAN, where Z is a 100 dimension vector sampled from uniform distribution. Experiment 2. Modeling sound patterns. A sound signal can be treated as a one-dimensional texture image (McDermott and Simoncelli, 2011). The sound data are collected from the Internet. Each training signal is a 5 second clip with the sampling rate of 11025 Hertz and is represented as a 1 × 60000 vector. We learn a separate model from each sound signal. The latent factors Z form a sequence that follows N(0, Id ), with d = 6. The top-down network consists of 4 layers of deconvolution with kernels of size 1 × 25, and up-sampling factor of 10. The number of channels in the first layer is 256, and decreases by a factor of 2 at each layer. For synthesis, we start from a longer Gaussian white noise sequence Z with d = 12 and generate the synthesized sound by expanding the learned network. Figure 2 shows the waveforms of the observed sound signal in the first row and the synthesized sound signal in the second row. Experiment 3. Modeling object patterns. We model object patterns using the network structure that is essentially the same as the network for the texture model, except that we include a fully connected layer under the latent factors Z, now a d-dimensional vector. The images are 64 × 64. We use ReLU with a leaking factor .2 (Maas, Hannun, and Ng, 2013; Xu et al., 2015). The Langevin steps l = 30 with step size s = .3. In the first experiment, we learn a model where Z has two components, i.e., Z = (z1 , z2 ), and d = 2. The training data are 11 images of 6 tigers and 5 lions. After training the model, we generate images using the learned top-down ConvNet for (z1 , z2 ) ∈ [−2, 2]2 , where we discretize both z1 and z2 into 9 equally spaced values. The left panel of Figure 3 displays the synthesized images on the 9 × 9 panel. In the second experiment, we learn a model with d = 100 from 1000 face images randomly selected from the CelebA dataset (Liu et al., 2015). The left panel of Figure 4 displays the images generated by the learned model. The middle panel displays the interpolation results. The images at the four corners are generated by the Z vectors of four images randomly selected from the training set. The images in the middle are obtained by first interpolating the Z’s of the four corner images using the sphere interpolation (Dinh, Sohl-Dickstein, and Bengio, 2016) and then generating the images by the learned ConvNet. We also provide qualitative comparison with Deep Convolutional Generative Adversarial Net (DCGAN) (Goodfellow et al., 2014; Radford, Metz, and Chintala, 2016). The right panel of Figure 3 shows the generated results 5 for the lion-tiger dataset using 2-dimensional Z. The right panel of Figure 4 displays the generated results trained on 1000 aligned faces from celebA dataset, with d = 100. We use the code from https://github.com/carpedm20/ DCGAN-tensorflow, with the tuning parameters as in (Radford, Metz, and Chintala, 2016). We run T = 600 iterations as in our method. Experiment 4. Modeling dynamic patterns. We model a textured motion (Wang and Zhu, 2003) or a dynamic texture (Doretto et al., 2003) by a non-linear dynamic system Yt = f (Zt ; W ) + t , and Zt+1 = AZt + ηt , where we assume the latent factors follow a vector auto-regressive model, where A is a d×d matrix, and ηt ∼ N(0, Q) is the innovation. This model is a direct generalization of the linear dynamic system of (Doretto et al., 2003), where Yt is reduced to Zt by principal component analysis (PCA) via singular value decomposition (SVD). We learn the model in two steps. (1) Treat {Yt } as independent examples and learn W and infer {Zt } as before. (2) Treat {Zt } as the training data, learn A and Q as in (Doretto et al., 2003). After that, we can synthesize a new dynamic texture. We start from Z0 ∼ N(0, Id ), and then generate the sequence according to the learned model (we discard a burn-in period of 15 frames). Figure 5 shows some experiments, where we set d = 20. The first row is a segment of the sequence generated by our model, and the second row is generated by the method of (Doretto et al., 2003), with the same dimensionality of Z. It is possible to generalize the auto-regressive model of Zt to recurrent network. We may also treat the video sequences as 3D images, and learn generator networks with 3D spatial-temporal filters or basis functions. puted by summing over all the pixels. For a partially observed image, we compute it by summing over only the observed pixels. Then we can continue to use the alternating backpropagation algorithm to infer Z and learn W . With inferred Z and learned W , the image can be automatically recovered by f (Z; W ). In the end, we will be able to accomplish the following tasks: (T1) Recover the occluded pixels of training images. (T2) Synthesize new images from the learned model. (T3) Recover the occluded pixels of testing images using the learned model. experiment error P.7 .0662 P.9 .0771 M20 .0773 M30 .1035 Table 1: Recovery errors in 5 experiments of learning from occluded images. Figure 6: Learning from incomplete data. The 10 columns belong to experiments P.5, P.7, P.9, P.9, P.9, P.9, P.9, M20, M30, M30 respectively. Row 1: original images, not observed in learning. Row 2: training images. Row 3: recovered images during learning. We want to emphasize that in our experiments, all the training images are partially occluded. Our experiments are different from (1) de-noising auto-encoder (Vincent et al., 2008), where the training images are fully observed, and noises are added as a matter of regularization, (2) in-painting or de-noising, where the prior model or regularization has already been learned or given. (2) is about task (T3) mentioned above, but not about tasks (T1) and (T2). Learning from incomplete data can be difficult for GAN and VAE, because the occluded pixels are different for different training images. We evaluate our method on 10,000 images randomly selected from CelebA dataset. We design 5 experiments, with two types of occlusions: (1) 3 experiments are about salt and pepper occlusion, where we randomly place 3 × 3 masks on the 64 × 64 image domain to cover roughly 50%, 70% and 90% of pixels respectively. These 3 experiments are denoted P.5, P.7, and P.9 respectively (P for pepper). (2) 2 experiments are about single region mask occlusion, where we randomly place a 20×20 or 30×30 mask on the 64×64 image domain. These 2 experiments are denoted M20 and M30 respectively (M for mask). We set d = 100. Table 1 displays the recovery errors of the 5 experiments, where the error is defined as per pixel difference (relative to the range of the pixel values) between the original image and the recovered image on the occluded pixels. We emphasize that the recovery errors are not training errors, because the intensities of the occluded Figure 5: Modeling dynamic textures. Row 1: a segment of the synthesized sequence by our method. Row 2: a sequence by the method of (Doretto et al., 2003). Rows 3 and 4: two more sequences by our method. 4.2 P.5 .0571 Quantitative experiments Experiment 5. Learning from incomplete data. Our method can learn from images with occluded pixels. This task is inspired by the fact that most of the images contain occluded objects. It can be considered a non-linear generalization of matrix completion in recommender system. Our method can be adapted to this task with minimal modification. The only modification involves the computation of kY − f (Z; W )k2 . For a fully observed image, it is com6 experiment ABP PCA pixels are not observed in training. Figure 6 displays recovery results. In experiment P.9, 90% of pixels are occluded, but we can still learn the model and recover the original images. experiment error d = 20 .0795 d = 60 .0617 d = 20 .0810 .1038 d = 60 .0617 .0820 d = 100 .0549 .0722 d = 200 .0523 .0621 Table 3: Reconstruction errors on testing images, after learning from training images using our method (ABP) and PCA. d = 100 .0625 Table 2: Recovery errors in 3 experiments of learning from compressively sensed images. Figure 8: Comparison between our method and PCA. Row 1: original testing images. Row 2: reconstructions by PCA eigenvectors learned from training images. Row 3: reconstructions by the generator learned from training images. d = 20 for both methods. Figure 7: Learning from indirect data. Row 1: the original 64 × 64 × 3 images, which are projected onto 1,000 white noise images. Row 2: the recovered images during learning. Experiment 6. Learning from indirect data. We can learn the model from the compressively sensed data (Candès, Romberg, and Tao, 2006). We generate a set of white noise images as random projections. We then project the training images on these white noise images. We can learn the model from the random projections instead of the original images. We only need to replace kY − f (Z; W )k2 by kSY − Sf (Z; W )k2 , where S is the given white noise sensing matrix, and SY is the observation. We can treat S as a fully connected layer of known filters below f (Z; W ), so that we can continue to use alternating back-propagation to infer Z and learn W , thus recovering the image by f (Z; W ). In the end, we will be able to (T1) Recover the original images from their projections during learning. (T2) Synthesize new images from the learned model. (T3) Recover testing images from their projections based on the learned model. Our experiments are different from traditional compressed sensing, which is task (T3), but not tasks (T1) and (T2). Moreover, the image recovery in our work is based on non-linear dimension reduction instead of linear sparsity. We evaluate our method on 1000 face images randomly selected from CelebA dataset. These images are projected onto K = 1000 white noise images with each pixel randomly sampled from N(0, .52 ). After this random projection, each image of size 64 × 64 × 3 becomes a K-dimensional vector. We show the recovery errors for different latent dimensions d in Table 2, where the recovery error is defined as the per pixel difference (relative to the range of the pixel values) between the original image and the recovered image. Figure 7 shows some recovery results. Experiment 7. Model evaluation by reconstruction error on testing data. After learning the model from the training images (now assumed to be fully observed), we can evaluate the model by the reconstruction error on the testing images. We randomly select 1000 face images for training and 300 images for testing from CelebA dataset. After learning, we infer the latent factors Z for each testing image using inferential back-propagation, and then reconstruct the testing image by f (Z; W ) using the inferred Z and the learned W . In the inferential back-propagation for inferring Z, we initialize Z ∼ N(0, Id ), and run 300 Langevin steps with step size .05. Table 3 shows the reconstruction errors of alternating backpropagation learning (ABP) as compared to PCA learning for different latent dimensions d. Figure 8 shows some reconstructed testing images. For PCA, we learn the d eigenvectors from the training images, and then project the testing images on the learned eigenvectors for reconstruction. Experiments 5-7 may be used to evaluate generative models in general. Experiments 5 and 6 appear new, and we have not found comparable methods that can accomplish all three tasks (T1), (T2), and (T3) simultaneously. 5 Conclusion This paper proposes an alternating back-propagation algorithm for training the generator network. We recognize that the generator network is a non-linear generalization of the factor analysis model, and develop the alternating backpropagation algorithm as the non-linear generalization of the alternating regression scheme of the Rubin-Thayer EM algorithm for fitting the factor analysis model. The alternating back-propagation algorithm iterates the inferential backpropagation for inferring the latent factors and the learning back-propagation for updating the parameters. Both backpropagation steps share most of their computing steps in the chain rule calculations. Our learning algorithm is perhaps the most canonical algorithm for training the generator network. It is based on maximum likelihood, which is theoretically the most accurate estimator. The maximum likelihood learning seeks to explain and charge the whole dataset uniformly, so that there is little concern of under-fitting or biased fitting. As an unsupervised learning algorithm, the alternating back-propagation algorithm is a natural generalization of the original back-propagation algorithm for supervised learning. It adds an inferential back-propagation step to the learn7 Y = Wδ Z + bδ + , for an overall bias term that depends on δ. So the distribution of Y is essentially piecewise Gaussian. The generator model can be considered an explicit implementation of the local linear embedding (Roweis and Saul, 2000), where Z is the embedding of Y . In local linear embedding, the mapping between Z and Y is implicit. In the generator model, the mapping from Z to Y is explicit. With ReLU ConvNet, the mapping is piecewise linear, which is consistent with local linear embedding, except that the partition of the linear pieces by δ(Z; W ) in the generator model is learned automatically. The inferential back-propagation is a Langevin dynamics on the energy function kY − f (Z; W )k2 /(2σ 2 ) + kZk2 /2. With f (Z; W ) = Wδ Z, ∂f (Z; W )/∂Z = Wδ . If Z belongs to the piece defined by δ, then the inferential backpropagation seeks to approximate Y by the basis Wδ via a ridge regression. Because Z keeps changing during the Langevin dynamics, δ(Z; W ) may also be changing, and the algorithm searches for the optimal reconfigurable basis Wδ to approximate Y . We may solve Z by second-order methods such as iterated ridge regression, which can be computationally more expensive than the simple gradient descent. ing back-propagation step, with minimal overhead in coding and affordable overhead in computing. The inferential back-propagation seeks to perform accurate explaining-away inference of the latent factors. It can be worthwhile for tasks such as learning from incomplete or indirect data, or learning models where the latent factors themselves follow sophisticated prior models with unknown parameters. The inferential back-propagation may also be used to evaluate the generators learned by other methods on tasks such as reconstructing or completing testing data. Our method or its variants can be applied to non-linear matrix factorization and completion. It can also be applied to problems where some components or aspects of the factors are supervised. Code, images, sounds, and videos http://www.stat.ucla.edu/~ywu/ABP/main.html Acknowledgement We thank Yifei (Jerry) Xu for his help with the experiments during his 2016 summer visit. We thank Jianwen Xie for helpful discussions. The work is supported by NSF DMS 1310391, DARPA SIMPLEX N66001-15-C-4035, ONR MURI N00014-16-12007, and DARPA ARO W911NF-16-1-0579. 6 6.1 6.2 EM, density mapping, and density shifting Suppose the training data {Yi , i = 1, ..., n} come from a data distribution Pdata (Y ). To understand how the alternating back-propagation algorithm or its EM idealization maps the prior distribution of the latent factors p(Z) to the data distribution Pdata (Y ) by the learned g(Z; W ), we define Appendix ReLU and piecewise factor analysis The generator network is Y = f (Z; W ) + , Z (l−1) = fl (Wl Z (l) + bl ), l = 1, ..., L, with Z (0) = f (Z; W ), and Z (L) = Z. The element-wise non-linearity fl in modern ConvNet is usually the two-piece linearity, such as rectified linear unit (ReLU) (Krizhevsky, Sutskever, and Hinton, 2012) or the leaky ReLU (Maas, Hannun, and Ng, 2013; Xu et al., 2015). Each ReLU unit corresponds to a binary switch. For the case of non-leaky ReLU, following the analysis of (Pascanu, Montufar, and Bengio, 2013), we can write Z (l−1) = δl (Wl Z (l) + bl ), where δl = diag(1(Wl Z (l) + bl > 0)) is a diagonal matrix, 1() is an element-wise indicator function. For the case of leaky ReLU, the 0 values on the diagonal are replaced by a leaking factor (e.g., .2). δ = (δl , l = 1, ..., L) forms a classification of Z according to the network W . Specifically, the factor space of Z is divided into a large number of pieces by the hyperplanes Wl Z (l) + bl = 0, and each piece is indexed by an instantiation of δ. We can write δ = δ(Z; W ) to make explicit its dependence on Z and W . On the piece indexed by δ, f (Z; W ) = Wδ Z + bδ . Assuming bl = 0, ∀l, for simplicity, we have Wδ = δ1 W1 ...δL WL . Thus each piece defined by δ = δ(Z; W ) corresponds to a linear factor analysis Y = Wδ Z + , whose basis Wδ is a multiplicative recomposition of the basis functions at multiple layers (Wl , l = 1, ..., L), and the recomposition is controlled by the binary switches at multiple layers δ = (δl , l = 1, ..., L). Hence the top-down ConvNet amounts to a reconfigurable basis Wδ for representing Y , and the model is a piecewise linear factor analysis. If we retain the bias term, we will have Pdata (Z, Y ; W ) = Pdata (Y )p(Z|Y, W ) = Pdata (Z; W )Pdata (Y |Z, W ), (7) R where Pdata (Z; W ) = p(Z|Y, W )Pdata (Y )dY is obtained by averaging the posteriors p(Z|Y ; W ) over the observed data Y ∼ Pdata . That is, Pdata (Z; W ) can be considered the data prior. The data prior Pdata (Z; W ) is close to the true prior p(Z) in the sense that KL(Pdata (Z; W )|p(Z)) ≤ KL(Pdata (Y )|p(Y ; W )) = KL(Pdata (Z, Y ; W )|p(Z, Y ; W )). (8) The right hand side of (8) is minimized at the maximum likelihood estimate Ŵ , hence the data prior Pdata (Z; Ŵ ) at Ŵ should be especially close to the true prior p(Z). In other words, at Ŵ , the posteriors p(Z|Y, Ŵ ) of all the data points Y ∼ Pdata tend to pave the true prior p(Z). From Rubin’s multiple imputation point of view (Rubin, 2004) of the EM algorithm, the E-step of EM infers (m) Zi ∼ p(Zi |Yi , Wt ) for m = 1, ..., M , where M is the number of multiple imputations or multiple guesses of Zi . The multiple guesses account for the uncertainty in inferring Zi from Yi . The M-step of EM maximizes Q(W ) = Pn P (m) M ; W ) to obtain Wt+1 . For each i=1 m=1 log p(Yi , Zi data point Yi , Wt+1 seeks to reconstruct Yi by g(Z; W ) from (m) the inferred latent factors {Zi , m = 1, ..., M }. In other (m) words, the M-step seeks to map {Zi } to Yi . Pooling over (m) all i = 1, ..., n, {Zi , ∀i, m} ∼ Pdata (Z; Wt ), hence the 8 If σ 2 is unknown, it can be obtained by averaging the diagonal elements of Σ. The computation can again be done by the sweep operator on S, with SZZ being the pivotal matrix. The E-step is based on the multivariate linear regression of Z on Y given W . The M-step updates W by the multivariate linear regression of Y on Z. Both steps can be accomplished by the sweep operator. We use the notation S and S for the Gram matrices to highlight the analogy between the two steps. The EM algorithm can then be considered alternating linear regression or alternating sweep operation, which serves as a prototype for alternating back-propagation. M-step seeks to map Pdata (Z; Wt ) to the data distribution (m) Pdata (Y ). Of course the mapping from {Zi } to Yi cannot (m) be exact. In fact, g(Z; W ) maps {Zi } to a d-dimensional patch around the D-dimensional Yi . The local patches for all {Yi , ∀i} patch up the d-dimensional manifold form by the D-dimensional observed examples and their interpolations. The EM algorithm is a process of density shifting, so that Pdata (Z; W ) shifts towards p(Z), thus g(Z; W ) maps p(Z) to Pdata (Y ). 6.3 Factor analysis and alternating regression The alternating back-propagation algorithm is inspired by Rubin-Thayer EM algorithm for factor analysis, where both the observed data model p(Y |W ) and the posterior distribution p(Z|Y, W ) are available in closed form. The EM algorithm for factor analysis can be interpreted as alternating linear regression (Rubin and Thayer, 1982; Liu, Rubin, and Wu, 1998). In the factor analysis model Z ∼ N(0, Id ), Y = W Z + ,  ∼ N(0, σ 2 ID ). The joint distribution of (Z, Y ) is       Z 0 I W> ∼N , d . (9) Y 0 W W W > + σ 2 ID References Candès, E. J.; Romberg, J.; and Tao, T. 2006. Robust uncertainty principles: Exact signal reconstruction from highly incomplete frequency information. IEEE Transactions on information theory 52(2):489–509. Dempster, A. P.; Laird, N. M.; and Rubin, D. B. 1977. Maximum likelihood from incomplete data via the em algorithm. Journal of the Royal Statistical Society: B 1–38. Denton, E. L.; Chintala, S.; Fergus, R.; et al. 2015. Deep generative image models using a laplacian pyramid of adversarial networks. In NIPS, 1486–1494. Denote  S S = ZZ SY Z SZY SY Y  E[ZZ > ] E[ZY > ] = E[Y Z > ] E[Y Y > ]   Id W> = . W W W > + σ 2 ID  Dinh, L.; Sohl-Dickstein, J.; and Bengio, S. 2016. Density estimation using real nvp. CoRR abs/1605.08803.  (10) Doretto, G.; Chiuso, A.; Wu, Y.; and Soatto, S. 2003. Dynamic textures. IJCV 51(2):91–109. The posterior distribution p(Z|Y, W ) can be obtained by linear regression of Z on Y , [Z|Y, W ] ∼ N(βY, V ), where Dosovitskiy, E.; Springenberg, J. T.; and Brox, T. 2015. Learning to generate chairs with convolutional neural networks. In CVPR. β = SZY SY−1Y , (11) V = SZZ − SZY SY−1Y SY Z . (12) Girolami, M., and Calderhead, B. 2011. Riemann manifold langevin and hamiltonian monte carlo methods. Journal of the Royal Statistical Society: B 73(2):123–214. Goodfellow, I.; Pouget-Abadie, J.; Mirza, M.; Xu, B.; WardeFarley, D.; Ozair, S.; Courville, A.; and Bengio, Y. 2014. Generative adversarial nets. In NIPS, 2672–2680. The above computation can be carried out by the sweep operator on S, with SY Y being the pivotal matrix. Suppose we have observations {Yi , i = 1, ..., n}. In the E-step, we compute E[Zi |Yi , W ] = βYi , E[Zi Zi> |Yi , W ] =V + In the M-step, we compute   SZZ SZY S= SY Z SY Y  Pn > Pni=1 E[Zi Zi >]/n = i=1 Yi E[Zi ] /n Hyvärinen, A.; Karhunen, J.; and Oja, E. 2004. Independent component analysis. John Wiley & Sons. (13) βYi Yi> β > . Ioffe, S., and Szegedy, C. 2015. Batch normalization: Accelerating deep network training by reducing internal covariate shift. In ICML. (14) Kim, H., and Park, H. 2008. Nonnegative matrix factorization based on alternating nonnegativity constrained least squares and active set method. SIAM Journal on Matrix Analysis and Applications 30(2):713–730.  Pn > i=1 E[Zi ]Yi /n , (15) P n > i=1 Yi Yi /n Kingma, D. P., and Welling, M. 2014. Auto-encoding variational bayes. In ICLR. E[Zi Zi> ] where we use E[Zi ] and to denote the conditional expectations in (13) and (14). Then we regress Y on Z to obtain the coefficient vector and residual variance-covariance matrix −1 W = SY Z SZZ (16) Σ = SY Y − SY Z S−1 ZZ SZY . (17) Koren, Y.; Bell, R.; and Volinsky, C. 2009. Matrix factorization techniques for recommender systems. Computer 42(8):30–37. Krizhevsky, A.; Sutskever, I.; and Hinton, G. E. 2012. Imagenet classification with deep convolutional neural networks. In NIPS, 1097–1105. 9 LeCun, Y.; Bottou, L.; Bengio, Y.; and Haffner, P. 1998. Gradient-based learning applied to document recognition. Proceedings of the IEEE 86(11):2278–2324. Lee, D. D., and Seung, H. S. 2001. Algorithms for nonnegative matrix factorization. In NIPS, 556–562. Liu, Z.; Luo, P.; Wang, X.; and Tang, X. 2015. Deep learning face attributes in the wild. In ICCV, 3730–3738. Liu, C.; Rubin, D. B.; and Wu, Y. N. 1998. Parameter expansion to accelerate em: The px-em algorithm. Biometrika 85(4):755–770. Lu, Y.; Zhu, S.-C.; and Wu, Y. N. 2016. Learning FRAME models using CNN filters. In AAAI. Maas, A. L.; Hannun, A. Y.; and Ng, A. Y. 2013. Rectifier nonlinearities improve neural network acoustic models. In ICML. McDermott, J. H., and Simoncelli, E. P. 2011. Sound texture perception via statistics of the auditory periphery: evidence from sound synthesis. Neuron 71(5):926–940. Mnih, A., and Gregor, K. 2014. Neural variational inference and learning in belief networks. In ICML. Neal, R. M. 2011. Mcmc using hamiltonian dynamics. Handbook of Markov Chain Monte Carlo 2. Olshausen, B. A., and Field, D. J. 1997. Sparse coding with an overcomplete basis set: A strategy employed by v1? Vision Research 37(23):3311–3325. Pascanu, R.; Montufar, G.; and Bengio, Y. 2013. On the number of response regions of deep feed forward networks with piece-wise linear activations. arXiv:1312.6098. Radford, A.; Metz, L.; and Chintala, S. 2016. Unsupervised representation learning with deep convolutional generative adversarial networks. In ICLR. Rezende, D. J.; Mohamed, S.; and Wierstra, D. 2014. Stochastic backpropagation and approximate inference in deep generative models. In NIPS, 1278–1286. Roweis, S. T., and Saul, L. K. 2000. Nonlinear dimensionality reduction by locally linear embedding. Science 290(5500):2323–2326. Rubin, D. B., and Thayer, D. T. 1982. Em algorithms for ml factor analysis. Psychometrika 47(1):69–76. Rubin, D. B. 2004. Multiple imputation for nonresponse in surveys, volume 81. John Wiley & Sons. Vedaldi, A., and Lenc, K. 2015. Matconvnet – convolutional neural networks for matlab. In Int. Conf. on Multimedia. Vincent, P.; Larochelle, H.; Bengio, Y.; and Manzagol, P.A. 2008. Extracting and composing robust features with denoising autoencoders. In ICML, 1096–1103. Wang, Y., and Zhu, S.-C. 2003. Modeling textured motion: Particle, wave and sketch. In ICCV, 213–220. Xie, J.; Lu, Y.; Zhu, S.-C.; and Wu, Y. N. 2016. A theory of generative convnet. In ICML. Xu, B.; Wang, N.; Chen, T.; and Li, M. 2015. Empirical evaluation of rectified activations in convolutional network. CoRR abs/1505.00853. Younes, L. 1999. On the convergence of markovian stochastic algorithms with rapidly decreasing ergodicity rates. Stochastics: An International Journal of Probability and Stochastic Processes 65(3-4):177–228. 10
9cs.NE
Delimited continuations in natural language Quantification and polarity sensitivity Chung-chieh Shan Harvard University 33 Oxford Street Cambridge, MA 02138 USA arXiv:cs/0404006v1 [cs.CL] 5 Apr 2004 [email protected] ABSTRACT (1) Making a linguistic theory is like making a programming language: one typically devises a type system to delineate the acceptable utterances and a denotational semantics to explain observations on their behavior. Via this connection, the programming language concept of delimited continuations can help analyze natural language phenomena such as quantification and polarity sensitivity. Using a logical metalanguage whose syntax includes control operators and whose semantics involves evaluation order, these analyses can be expressed in direct style rather than continuation-passing style, and these phenomena can be thought of as computational side effects. The sentence in (2) is ambiguous between at least two readings. On one reading, the speaker must decline to run any spot that fails to substantiate any claims whatsoever. On another reading, there exist certain claims (anti-war ones, say) such that the speaker must decline to run any spot that fails to substantiate them. Categories and Subject Descriptors D.3.3 [Programming languages]: Language constructs and features—control structures; J.5 [Linguistics] (2) Languages, Theory Keywords Delimited continuations, control effects, natural language semantics, quantification, polarity sensitivity 1. INTRODUCTION This paper is about computational linguistics, in the sense of applying insights from computer science to linguistics. Linguistics strives to scientifically explain empirical observations of natural language. Semantics, in particular, is concerned with phenomena such as the following. In (1) below, some sentences to the left entail their counterparts to the right, but others do not. Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. To copy otherwise, to republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Continuation Workshop 2004 Venice, Italy Copyright 200X ACM X-XXXXX-XX-X/XX/XX ...$5.00. We must decline to run any spot that fails to substantiate certain claims.1 Finally, among the four sentences in (3), only (3a) is acceptable. That is, only it can be used in idealized conversation. The unacceptability of the rest is notated with asterisks. (3) General Terms Every student passed ⊢ Every diligent student passed No student passed ⊢ No diligent student passed A student passed 0 A diligent student passed Most students passed 0 Most diligent students passed a. No student liked any course. b. *Every student liked any course. c. *A student liked any course. d. *Most students liked any course. The linguistic entailments and non-entailments in (1) are facts about English, in that only a speaker of English can make these judgments. Nevertheless, they presumably have to do with corresponding logical entailments and non-entailments: both the English speaker who judges that Every student passed entails Every diligent student passed and the Mandarin speaker who judges that Meige xuesheng dou jige-le entails Meige yonggong-de xuesheng dou jige-le rely on knowing that, if every student passed, then every diligent student passed. Thus the typical linguistic theory specifies a semantics for natural language by translating declarative sentences into logical statements with truth conditions. The linguistic entailments in (1) hold, goes the theory, because the meanings—truth conditions—of the two sentences are such that any model that verifies the former also verifies the latter. Much work in natural language semantics aims in this way, as depicted in Figure 1, to explain the horizontal by positing the vertical. This approach is reminiscent of programming language research where an ill-understood language (perhaps one with a complicating feature like ex1 This sentence is part of a statement made by the cable television company Comcast after its CNN channel rejected an anti-war commercial hours before it was scheduled to air on January 28, 2003. Every student passed ∀x. student(x) ⇒ passed(x) ⊢ Every diligent student passed  ⊢ ∀x. student(x) ∧ diligent(x) ⇒ passed(x) hsome truth condition on modelsi ⊢ hsome other truth condition on modelsi Figure 1: The translation/denotation approach to natural language semantics ceptions) is studied by translation into a simpler language (without exceptions) that is better understood. The translation target posited in natural language semantics is often some combination of the λ-calculus and predicate logic. For example, the verb passed might be translated as λx. passed(x). This paper argues by example that the translation target should be a logical metalanguage with first-class delimited continuations. The examples are two natural language phenomena: quantification by words like every and most in (1), and polarity sensitivity on the part of words like any in (3). Quantification was first analyzed explicitly using continuations by Barker (2002). Building on that insight, this paper makes the following two contributions. First, I analyze natural language in direct style rather than in continuation-passing style. In other words, the logical metalanguage used here is one that includes control operators for delimited continuations, rather than a pure λ-calculus in which denotations need to handle continuations explicitly. Natural language is thus endowed with an operational semantics from computer science that is richer than just βη-reduction. Second, I propose a new analysis of polarity sensitivity that improves upon prior theories in explaining why No student liked any course is acceptable but *Any student liked no course is not. This analysis crucially relies on the notion of evaluation order from programming languages, thus elucidating the role of control effects in natural language and supporting the broader claim that linguistic phenomena can be fruitfully thought of as computational side effects. The rest of this paper is organized as follows. In §2, I introduce a simple grammatical formalism. In §3, I describe the linguistic phenomenon of quantification and show a straw man analysis that deals with some cases but not others. I then introduce a programming language with delimited continuations and use it to improve the straw man analysis: quantification in non-subject position is treated in §4, and inverse scope is covered in §5. In §6, I turn to the linguistic phenomenon of polarity sensitivity and show how a computationally motivated notion of evaluation order improves upon previous analyses. In §7, I place these examples in a broader context and conclude. 2. A GRAMMATICAL FORMALISM In this section, I introduce a simple grammatical formalism for use in the rest of the paper. It is a notational variant of categorial grammar (as introduced by Carpenter (1997; chapter 4), for instance). The verb like usually requires an object to its right and a subject to its left. (4) a. Alice liked CS187. b. *Alice liked. c. *Alice liked Bob CS187. Intuitively, like is a function that takes two arguments, and the sentences (4b–c) are unacceptable due to type mismatch. We can model this formally by assigning types to the denotations of Alice, CS187, and liked, which we take to be atomic expressions. (5) (6) (7) JAliceK = alice : Thing JCS187K = cs187 : Thing JlikedK = liked : Thing → Thing → Bool Here Thing is the type of individual objects, and Bool is the type of truth values or propositions. Following (justifiable) standard practice in linguistics, we let liked take its object as the first argument and its subject as the second argument. For example, in (4a), the first argument to liked is cs187, and the second argument is alice. As (4a) shows, there are two ways to combine expressions. A function can take its argument either to its right (combining liked with CS187 ) or to its left (combining Alice with liked CS187 ). We denote these two cases with two infix operators: “′” for forward combination and “8” for backward combination. (The tick marks depict the direction in which a function “leans on” an argument.) (8) (9) f ′ x = f (x) : β x 8 f = f (x) : β where f : α → β, x : α where f : α → β, x : α We can now derive the sentence (4a)—that is, prove it to have type Bool. The derivation can be written as a tree (10) or a term (11). (10) Alice liked CS187 (11) JAliceK 8 (JlikedK ′ JCS187K) = liked cs187 alice : Bool By convention, the infix operators ′ and 8 associate to the right, so parentheses such as those in (11) above are optional. Unfortunately, the system set up so far derives not only the acceptable sentence (4a) but also the unacceptable sentence (12), with the same meaning. (12) *Alice CS187 liked. The reason the system derives (12) is that the direction of function application is unconstrained: in the derivation below, liked takes its first (object) argument to the left, which is usually disallowed in English. (13) Alice (14) CS187 liked JAliceK 8 JCS187K 8 JlikedK = liked cs187 alice : Bool To rule out this derivation of (12) in our type system, we split the function type constructor “→” into two type con- structors “→” ´ and “→”, ` one for each direction of application. Using these new type constructors, we change the denotation of liked to specify that its first argument is to its right and its second argument is to its left. (15) JlikedK = liked : Thing → ´ Thing → ` Bool We also revise the combination rules (8) and (9) to require different function type constructors. (16) (17) f ′x:β x8f :β where f : α → ´ β, x : α where f : α → ` β, x : α The system now rejects (12) while continuing to accept (4a), as desired. 3. the grammar can derive the sentence (18a). (23) every (24) student liked CS187 (JeveryK ′ JstudentK) ′ JlikedK ′ JCS187K = (19) The existential determiner some can be analyzed similarly: let some denote (25) JsomeK = λ′r. λ′s. ∃x. r(x) ∧ x 8 s : (Thing → Bool) → ´ (Thing → ` Bool) → ´ Bool to derive the sentence Some student liked CS187. (26) QUANTIFICATION some student liked CS187 The linguistic phenomenon of quantification is illustrated by the following sentences. (27) (18) a. Every student liked CS187. b. Some student liked every course. c. Alice consulted Bob before most meetings. To summarize, we treat determiners like every and some as functions of two arguments: the restrictor and the scope of a quantifier, both functions from Thing to Bool. Such higher-order functions are a popular analysis of natural language determiners, and have been known to semanticists since Montague (1974) as generalized quantifiers. However, the simplistic account presented above only handles quantificational noun phrases in subject position, as in (18a) but not (18b) or (18c). For example, in (18b), neither forward nor backward combination can apply to join the verb liked, of type Thing → ´ Thing → ` Bool, to its object every course, of type (Thing → ` Bool) → ´ Bool. Yet, empirically speaking, the sentence (18b) is not only acceptable but in fact ambiguous between two available readings. This problem has prompted a great variety of supplementary proposals in the linguistics literature (Barwise and Cooper 1981; Hendriks 1993; May 1985; inter alia). The next section presents a solution using delimited continuations. As with the previously encountered sentences, the natural language semanticist wants to translate English into logical formulas that account for entailment and other properties. More precisely, the problem is to posit translation rules that map these sentences thus. For instance, we would like to map (18a) to a formula like (19) ∀x. student(x) ⇒ x 8 liked ′ cs187 : Bool, where the constants (20) ∀ : (Thing → Bool) → Bool, ⇒ : Bool → Bool → Bool are drawn from the (higher-order) abstract syntax of predicate logic. To this end, what should the subject noun phrase every student denote? Unlike with Alice, there is nothing of type Thing that the quantificational noun phrase every student can denote and still allow the desired translation (19) to be generated. At the same time, we would like to retain the denotation that we previously computed for the verb phrase liked CS187, namely liked ′ cs187. Taking these considerations into account, one way to translate (18a) to (19) is for the determiner every to denote (21) JeveryK = λ′r. λ′s. ∀x. r(x) ⇒ x 8 s : (Thing → Bool) → ´ (Thing → ` Bool) → ´ Bool. Here the restrictor r and the scope s are λ-bound variables intended to receive, respectively, the denotations of the noun student (of type Thing → Bool) and the verb phrase liked CS187 (of type Thing → ` Bool). (More precisely, r and s are λ′ -bound variables; the tick mark again signifies the direction of function application.) In a non-quantificational sentence like (4a), the verb phrase takes the subject as its argument; by contrast, in the quantificational sentence (18a), the subject takes the verb phrase as its argument. Extended with the lexical entry (21) for every, and assuming that student denotes (22) JstudentK = student : Thing → Bool, (JsomeK ′ JstudentK) ′ JlikedK ′ JCS187K = ∃x. student(x) ∧ x 8 liked ′ cs187 : Bool 4. DELIMITED CONTINUATIONS First-class continuations represent “the entire (default) future for the computation” (Kelsey, Clinger, Rees et al. 1998). Refining this concept, Felleisen (1988) introduced delimited continuations, which encapsulate only a prefix of that future. This paper uses shift and reset (Danvy and Filinski 1989, 1990), a popular choice of control operators for delimited continuations. To review briefly, the shift operator (notated ξ) captures the current context of computation, removing it and making it available to the program as a function. For example, when evaluating the term (28) 10 × (ξf. 1 + f (2)), the variable f is bound to the function that multiplies every number by 10. Thus the above expression evaluates to 21 via the following sequence of reductions. (The reduced subexpression at each step is underlined.) (29) [10 × (ξf. 1 + f (2))] ⊲ [1 + (λv. [10 × v])(2)] ⊲ [1 + [10 × 2]] ⊲ [1 + [20]] ⊲ [1 + 20] ⊲ [21] ⊲ 21 Term reductions are performed deterministically in applicative order: call-by-value and left-to-right. The reset operator (notated with square brackets [ ]) delineates how far shift can reach: shift captures the current context of computation up to the closest dynamically enclosing reset. Hence “3 ×” below is out of reach.   (30) 3 × [10 × (ξf. 1 + f (2))]   ⊲ 3 × [1 + (λv. [10 × v])(2)]     ⊲ 3 × [1 + [10 × 2]] ⊲ 3 × [1 + [20]] ⊲ · · · ⊲ 63 Shift and reset come with an operational semantics (illustrated by the reductions above) as well as a denotational semantics (via the CPS transform). That both kinds of semantics are available is important to linguistics, because the meanings of natural language expressions (studied in semantics) need to be related to how humans process them (studied in psycholinguistics). Quantificational expressions in natural language can be thought of as phrases that manipulate their context. In a sentence like Alice liked CS187 (4a), the context of CS187 is the function mapping each thing x to the proposition that Alice liked x. Compared to the proper noun CS187, what is special about a quantificational expression like every course is that it captures its surrounding context when used. (31) Alice liked [every course]. Thus, loosely speaking, the meaning of the sentence (31) no longer has the overall shape alice 8 liked ′ · · · once the occurrence of every course is considered, much as the meaning of the program (28) no longer has the overall shape 10 × · · · once the shift expression is evaluated. Let us add shift and reset to the target language of our translation from English. We can then translate every course as (32) Jevery courseK = ξs. ∀x. course(x) ⇒ s(x) : ThingBool Bool . The type notation αδγ here indicates an α with a control effect; the CPS transform maps it to (α → γ) → δ. The denotation of every course behaves locally as a Thing, but requires the current context to have the answer type Bool and maintains that answer type. To see the new denotation (32) in action, let us derive the sentence (31). The type of every course is ThingBool Bool , similar to the type Thing of CS187, so the derivation of (31) is analogous to (10–11). (33) Alice liked (34)  every course  JAliceK 8 JlikedK ′ Jevery courseK = [alice 8 liked ′ ξs. ∀x. course(x) ⇒ s(x)] ⊲ [∀x. course(x) ⇒ (λv. [alice 8 liked ′ v])(x)] ⊲ · · · ⊲ ∀x. course(x) ⇒ alice 8 liked ′ x : Bool Like the straw man analysis in §3, the denotation in (32) generalizes to determiners other than every: we can abstract the noun course out of every course, and deal with some student similarly. (35) (36) JeveryK = λ′r. ξs. ∀x. r(x) ⇒ s(x), JsomeK = λ′r. ξs. ∃x. r(x) ∧ s(x) : (Thing → Bool) → ´ ThingBool Bool (We require here that the restrictor r have the type Thing → Bool, not a type of the form Thing → Boolδγ , so r cannot incur control effects when applied to x. Any control effect in the restrictor, such as induced by the quantificational noun phrase a company in the sentence Every representative of a company left, must be contained within reset.) More importantly, unlike the straw man analysis, the new analysis works uniformly for quantificational expressions in subject, object, and other positions, such as in (18a–c). Intuitively, this is because shift captures the context of an expression no matter how deeply it is embedded in the sentence.2 By adding control operators for delimited continuations to our logical metalanguage, we arrive at an analysis of quantification with greater empirical coverage. Figure 2 shows a logical metalanguage that formalizes the basic ideas presented above. It is in this language that denotations on this page are written and reduced. Refining Danvy and Filinski’s original shift-reset language, we distinguish between pure and impure expressions. An impure expression may incur control effects when evaluated, whereas a pure expression only incurs control effects contained within reset (Danvy and Hatcliff 1992, 1994; Nielsen 2001; Thielecke 2003). This distinction is reflected in the typing judgments: an impure judgment (37) Γ ⊢ E : αδγ not only gives a type α for E itself but also specifies two answer types γ and δ. By contrast, a pure judgment (38) Γ⊢E:α only gives a type α for E itself. As can be seen in the Lift rule, pure expressions are polymorphic in the answer type. As mentioned in §2, the use of directionality in function types to control word order is not new in linguistics, but the use of delimited control operators to analyze quantification is. It turns out that we can tie the potential presence of control effects in function bodies to directionality. That is, only directional functions—those whose types are decorated with tick marks—are potentially impure; all non-directional functions we need to deal with, including contexts captured by shift, are pure. Another link between directionality and control effects is that the →E ´ and →E ` rules for directional function application are not merely mirror images of each other: the answer types γ0 through γ3 are chained differently through the premises. This is due to left-to-right evaluation. Having made the distinction between pure and impure expressions, we require in our Shift rule that the body of a shift expression be pure. This change from Danvy and Filinski’s original system simplifies the type system and the CPS transform, but a shift expression ξf. E in their language may need to be rewritten here to ξf. [E]. The CPS transform for the metalanguage follows from the typing rules and is standard; it supplies a denotational semantics. The operational semantics for the metalanguage specifies a computation relation between complete terms; it is also standard and shown in Figure 3. The present analysis is almost, but not quite, the directstyle analogue of Barker’s (2002) CPS analysis. Put in direct-style terms, Barker’s function bodies are always pure, whereas function bodies here can harbor control effects. In 2 No matter how deep, that is, up to the closest dynamically enclosing reset. Control delimiters correspond to islands in natural language (Barker 2002). Directions ∆ ::= ′ | 8 ∆ α, β, γ, δ ::= Thing | Bool | α → β | α → βγδ Γ ::= x1 : α1 , . . . , xn : αn E, F ::= c | x | λx. E | λ∆x. E | F E | F ′ E | E 8 F | [E] | ξf. E Types Antecedents Terms Constants c : α ∀ : (Thing → Bool) → Bool ∃ : (Thing → Bool) → Bool ⇒ : Bool → Bool → Bool ∧ : Bool → Bool → Bool ··· liked : Thing → ´ (Thing → ` Boolδδ )γγ student : Thing → Bool Pure expressions Γ ⊢ E : α c:α Γ⊢c:α Γ, x : α ⊢ E : β Γ ⊢ λx. E : α → β Const Γ, x : α ⊢ x : α Γ, x : α ⊢ E : βγδ →I ∆ ∆ Γ ⊢ λ x. E : α → βγδ Var ∆ →I Γ ⊢ E : αβα Γ ⊢ [E] : β Reset Γ⊢F :α→β Γ⊢E:α Γ ⊢ FE : β →E Impure expressions Γ ⊢ E : αδγ Γ⊢E:α Γ⊢E: γ2 γ0 Γ ⊢ F : (α → ´ βγ3 )γ1 αγγ Γ, f : α → γ ⊢ E : δ Lift Γ ⊢ E : αγ1 γ2 γ0 Γ ⊢ F ′ E : βγ3 Γ ⊢ ξf. E : αδγ →E ´ Γ ⊢ E : αγ0 γ1 Shift γ2 γ1 Γ ⊢ F : (α → ` βγ3 )γ2 γ0 Γ ⊢ E 8 F : βγ3 →E ` Figure 2: A logical metalanguage with directionality and delimited control operators Values Unknowns Contexts V ::= U | λx. E | λ∆x. E U ::= c | U V | U ′ V | V 8 U Ch i ::= h i | (Ch i)E | Ch i ′ E | Ch i 8 F | V (Ch i) | V ′ Ch i | V 8 Ch i Metacontexts Dh i ::= h i | Ch[Dh i]i Computations E ⊲ E ′ DhCh(λx. E)V ii DhCh(λ′x. E) ′ V ii DhChV 8 (λ8x. E)ii DhCh[V ]ii DhChξf. Eii ⊲ ⊲ ⊲ ⊲ ⊲ DhChE{x 7→ V }ii DhChE{x 7→ V }ii DhChE{x 7→ V }ii DhChV ii DhE{f 7→ λx. [Chxi]}i Figure 3: Reductions for the logical metalanguage other words, function bodies are allowed to shift, as in the determiner denotations in (35) and (36). By contrast, Barker uses choice functions to assign meanings to determiners. 5. QUANTIFIER SCOPE AMBIGUITY Of course, natural language phenomena are never as simple as a couple of programming language control operators. Quantification is no exception, so to speak. For example, the sentence Some student liked every course (18b) is ambiguous between the following two readings. (39) (40) ∃x. student(x) ∧ ∀y. course(y) ⇒ x 8 liked ′ y ∀y. course(y) ⇒ ∃x. student(x) ∧ x 8 liked ′ y In the surface scope reading (39), some takes scope over every. In the inverse scope reading (40), every takes scope over some. Given that evaluation takes place from left to right, the shift for some student is evaluated before the shift for every course. Our grammar thus predicts the surface scope reading but not the inverse scope reading. This prediction can be seen in the first few reductions of the (unique) derivation for (18b):   (41) (JsomeK ′ JstudentK) 8 JlikedK ′ JeveryK ′ JcourseK  ′  = (λ r. ξs. ∃x. r(x) ∧ s(x)) ′ student  8 liked ′ (λ′r. ξs. ∀y. r(y) ⇒ s(y)) ′ course   ⊲ ξs. ∃x. student(x) ∧ s(x)  8 liked ′ (λ′r. ξs. ∀y. r(y) ⇒ s(y)) ′ course  ⊲ ∃x. student(x) ∧ λv. [v   8 liked ′ ((λ′r. ξs. ∀y. r(y) ⇒ s(y)) ′ course)] (x) Regardless of what evaluation order we specify, as long as our rules for semantic translation remain deterministic, they will only generate one reading for the sentence. Hence our theory fails to predict the ambiguity of the sentence (18b). To better account for the data, we need to introduce some sort of nondeterminism into our theory. There are two natural ways to proceed. First, we can allow arbitrary evaluation order, not just left-to-right. This change would render our term calculus nonconfluent, a result unwelcome for most programming language researchers but welcome for us in light of the ambiguous natural language sentence (18b). This route has been pursued with some success by Barker (2002) and de Groote (2001). However, there are empirical reasons to maintain left-to-right evaluation, one of which appears in §6. A second way to introduce nondeterminism is to maintain left-to-right evaluation but generalize shift and reset to a hierarchy of control operators (Barker 2000; Danvy and Filinski 1990; Shan and Barker 2003), leaving it unspecified at which level on the hierarchy each quantificational phrase shifts. Following Danvy and Filinski, we extend our logical metalanguage by superscripting every shift expression and pair of reset brackets with a nonnegative integer to indicate a level on the control hierarchy. Level 0 is the highest level (not the lowest). When a shift expression at level n is evaluated, it captures the current context of computation up to the closest dynamically enclosing reset at level n or higher (smaller). For example, whereas the expression  0 (42) 3 × [10 × (ξ 5f. 1 + f (2))]5 evaluates to 63 as in (30), the expression  0 (43) 3 × [10 × (ξ 3f. 1 + f (2))]5 evaluates to 1 + 3 × 10 × 2, or 61. The superscripts can be thought of “strength levels” for shifts and resets. Danvy and Filinski (1990) give a denotational semantics for multiple levels of delimited control using continuations of higher-order type. We can take advantage of that work in our quantificational denotations (35–36) by letting them shift at any level. The ambiguity of (18b) is then predicted as follows. Suppose that some student shifts at level m and every course shifts at level n. (44) Somem student liked everyn course. If m ≤ n, the surface scope reading (39) results. If m > n, the inverse scope reading (40) results. In general, a quantifier that shifts at a higher level always scopes over another that shifts on a lower level, regardless of which one is evaluated first. This way, evaluation order does not determine scoping possibilities among quantifiers in a sentence unless two quantifiers happen to shift at the same level. To summarize the discussion so far, whether we introduce nondeterministic evaluation order or a hierarchy of delimited control operators, we can account for the ambiguity of the sentence (18b), as well as more complicated cases of quantification in English and Mandarin (Shan 2003). For example, both the nondeterministic evaluation order approach and the control hierarchy approach predict correctly that the sentence below, with three quantifiers, is 5-way ambiguous. (45) Every representative of a company saw most samples. Despite the fact that there are three quantifiers in this sentence and 3! = 6, this sentence has only 5 readings. Because a company occurs within the restrictor of every representative of a company, it is incoherent for every to scope over most and most over a. The reason neither approach generates such a reading can be seen in the denotation of every in (35): “∀x” is located immediately above “⇒” in the abstract syntax, with no intervening control delimiter, so no control operator can insert any material (such as most-quantification over samples) in between. There exist in the computational linguistics literature algorithms for computing the possible quantifier scopings of a sentence like (45) (Hobbs and Shieber 1987; followed by Lewin 1990; Moran 1988). Having related quantifier scoping to control operators, we gain a denotational understanding of these algorithms that accords with our theoretical intuitions and empirical observations. An extended logical metalanguage with an infinite hierarchy of control operators is shown in Figure 4. This system is more complex than the one in Figure 2 in two ways. First, instead of making a binary distinction between pure and impure expressions, we use a number to measure “how pure” each expression is. An expression is pure up to level n if it only incurs control effects at levels above n when evaluated. Pure expressions are the special case when n = 0. The purity level of an expression is reflected in its typing judgment: a judgment (46) Γ ⊢ E : α!n states that the expression E is pure up to level n. Here α!n is a computation type with n levels: as defined in the figure, it consists of 2n+1 − 1 value types that together specify how a computation that is pure up to level n affects answer types between levels 0 and n − 1. In the special case where n = 1, the computation type α!1 is of the familiar form αδγ . In the previous system in Figure 2, directional functions are always impure (that is, pure up to level 1) while nondirectional functions are always pure (that is, pure up to level 0). In the current system, both kinds of functions declare in their types up to what level their bodies are pure. For example, the determiners every and some, now allowed to shift at any level, both have not just the type (47) Bool δ!n (Thing → Bool) → ´ ThingBool γ!n δ!n , γ!n but also the type (48) ´ Thing (Thing → Boolγ0!n γ1!n ) → γ0!n Boolγ2!n γ1!n Boolγ2!n (but see the second technical complication below). As the argument type Thing → Boolγ0!n γ1!n above shows, the first argument to these determiners, the restrictor, is non-directional yet can be impure (that is, pure up to level n + 1). To traverse the control hierarchy, we add a new Reset rule, which makes an expression more pure, and a new Lift rule, which makes less pure. (Consecutive nested n  an expression resets like [E]n+1 can be abbreviated to [E]n without loss of coherence.) A second complication in this system, in contrast to Figure 2, is that we can no longer encode logical quantification using a higher-order constant like ∀ : (Thing → Bool) → Bool, because such a constant requires its argument—the logical formula to be quantified—to be a pure function. This requirement is problematic because it is exactly the impurity of quantified logical formulas that underlies this account of quantifier scope ambiguity. On one hand, we want to quantify logical formulas that are impure; on the other hand, we want to rule out expressions like (49) ∀x. ξf. x, where the logical variable x “leaks” illicitly into the surrounding context. This issue is precisely the problem of classifying open and closed terms in staged programming (see Taha and Nielsen 2003 and references therein): the types Thing and Bool really represent not individuals or truth values but staged programs that compute individuals and truth values. For this paper, we adopt the simplistic solution of adjoining to these types a set of free logical variables for Directions ∆ ::= ′ | 8 ∆ Value types Computation types Antecedents Terms α, β, γ, δ ::= Thing{~ p} | Bool{~ p} | α → β!n | α → β!n α!0 ::= α, α!(n + 1) ::= αδ!n γ!n Γ ::= x1 : α1 , . . . , xn : αn E, F ::= c | x | λnx. E | λ∆nx. E | F E | F ′ E | E 8 F | [E]n | ξ nf. E Constants c : α p : Thing{p} ∀p : Bool{p, ~ q } → Bool{~ q} ⇒ : Bool{~ p} → Bool{~ q } → Bool{~ p∪~ q} ∃p : Bool{p, ~ q } → Bool{~ q} ∧ : Bool{~ p} → Bool{~ q } → Bool{~ p∪~ q} γ!n liked : Thing{~ p} → ´ (Thing{~ q} → ` Bool{~ p∪~ q }δ!m δ!m )γ!n student : Thing{~ p} → Bool{~ p} Expressions Γ ⊢ E : α!n c:α Γ⊢c:α Const Γ, x : α ⊢ x : α Var Γ, x : α ⊢ E : β!n Γ ⊢ λ(∆)x. E : α (∆) → β!n Γ⊢E:α Γ⊢E: αγγ 0 Γ ⊢ [E] : β (∆) →I Γ ⊢ E : αγ0!n γ1!n Lift γ2!n γ0!n Γ ⊢ F : (α → ´ βγ3!n )γ1!n Γ ⊢ E : αβα γ0!n βγ2!n γ1!n βγ2!n Γ⊢E:α Γ ⊢ E : αγ1!n γ2!n γ0!n Γ ⊢ F ′ E : βγ3!n Γ ⊢ F : (α → ´ β) Γ⊢E:α Γ⊢F ′E :β →E ´ →E ´ β!(n+1) Γ⊢E:α Reset Γ ⊢ F : α → β!n n+1 Γ ⊢ [E] Γ⊢E:α : β!(n + 1) Γ ⊢ ξ nf. E : αδ!n γ!n Shift γ2!n γ1!n Γ ⊢ F : (α → ` βγ3!n )γ2!n γ0!n Γ ⊢ E 8 F : βγ3!n Γ⊢E:α Γ ⊢ F : (α → ` β) Γ⊢E8F :β Reset →E Γ, f : α → γ!n ⊢ E : δ!n Γ ⊢ E : αγ0!n γ1!n γ!n αγ!n Γ ⊢ F E : β!n Lift ··· →E ` →E ` Figure 4: Extending the logical metalanguage to a hierarchy of control operators tracking purposes, denoted p, q, . . . . Unfortunately, we also need to stipulate that these logical variables be freshly αrenamed (“created by gensym”) for each occurrence of a quantifier in a sentence. As before, the CPS transform and reductions for this metalanguage are standard; the latter appears in Figure 5. The present analysis is almost, but not quite, the directstyle analogue of Shan and Barker’s (2003) CPS analysis, even though both use a control hierarchy. Each level in Shan and Barker’s hierarchy is intuitively a staged computation produced at one level higher. More concretely, a computation type with n levels in that system has the shape δ0 (αγ0 γ1 )δ1 (50) rather than the shape (51) γ0δ0 δ1 αγ1δ2 . δ3 The issue above of how to encode logical quantification over impure formulas receives a more satisfactory treatment in Shan and Barker’s system: no stipulation of α-renaming is necessary, because there is no analogue of (49) to prohibit. The relation between that system and staged programming with effects has yet to be explored. 6. POLARITY SENSITIVITY Because the analysis so far focuses on the truth-conditional meaning of quantifiers, it equates the determiners a and some—both are existential quantifiers with the type and denotation in (36). Furthermore, sentences like Has anyone arrived? suggest that the determiner any also means the same thing as a and some. To the contrary, though, the determiners a, some, and any are not always interchangeable in their existential usage. The sentences and readings in (52) show that they take scope differently relative to negation (in these cases the quantifier no). (52) a. No student liked some course. (unambiguous ∃¬) b. No student liked a course. (ambiguous ¬∃, ∃¬) c. No student liked any course. (unambiguous ¬∃) d. Some student liked no course. (unambiguous ∃¬) e. A student liked no course. (ambiguous ¬∃, ∃¬) f. *Any student liked no course. (unacceptable) The determiner any is a negative polarity item: to a first approximation, it can occur only in downward-entailing contexts, such as under the scope of a monotonically decreasing quantifier (Ladusaw 1979). A quantifier q, of type (Thing → Bool) → Bool, is monotonically decreasing just in case  (53) ∀s1 . ∀s2 . ∀x. s2 (x) ⇒ s1 (x) ⇒ q(s1 ) ⇒ q(s2 ). The quantificational noun phrases no student and no course are monotonically decreasing since, for instance, if no student liked any course in general, then no student liked any computer science course in particular. Whereas any is a negative polarity item, some is a positive polarity item. Roughly speaking, some is allergic to down- V ::= U | λx. E | λ∆x. E Values Unknowns Contexts U ::= c | U V | U ′ V | V 8 U Ch i ::= h i | (Ch i)E | Ch i ′ E | Ch i 8 F | V (Ch i) | V ′ Ch i | V 8 Ch i Dn h i ::= h i | Dn+1 hDn+2 h· · · hCh[Dn h i]n ii · · · ii Metacontexts at level n Computations E ⊲ E ′ D0 hD1 h· · · hCh(λx. E)V ii · · · ii ⊲ D0 hD1 h· · · hChE{x 7→ V }ii · · · ii D0 hD1 h· · · hCh(λ′x. E) ′ V ii · · · ii ⊲ D0 hD1 h· · · hChE{x 7→ V }ii · · · ii D0 hD1 h· · · hChV 8 (λ8x. E)ii · · · ii ⊲ D0 hD1 h· · · hChE{x 7→ V }ii · · · ii D0 hD1 h· · · hCh[V ]ii · · · ii ⊲ D0 hD1 h· · · hChV ii · · · ii D0 hD1 h· · · hDn hDn+1 h· · · hChξ nf. Eii · · · iii · · · ii ⊲ D0 hD1 h· · · hDn hE{f 7→ λx. [Dn+1 h· · · hChxii · · · i]n }ii · · · ii Figure 5: Reductions for the extended logical metalanguage ward-entailing contexts (especially those with an overtly negative word like no). These generalizations regarding polarity items cover the data in (52a–e): in principle, goes the theory, all these sentences are ambiguous between two scopings, but the polarity sensitivity of some and any rule out one scoping each in (52a), (52c), (52d), and (52f). These four sentences are thus predicted to be unambiguous, but it remains unclear why (52f) is downright unacceptable. In the type-theoretic tradition of linguistics, polarity sensitivity is typically implemented by splitting the answer type Bool into several types, each a different functor applied to Bool, that are related by subtyping (Bernardi 2002; Bernardi and Moot 2001; Fry 1999). For instance, to differentiate the determiners in (52) from each other in our formalism, we can add the types BoolPos and BoolNeg alongside Bool, such that both are supertypes of Bool (but not of each other). (54) (57) α′ ≤ α ′ (∆) (∆) α≤α ′ α → β!n ≤ α → β !n γ ′ !n ≤ γ!n α ≤α αδ!n γ!n Γ ⊢ E : α!n ≤ δ!n ≤ δ ′ !n ′ α′δγ ′!n !n α!n ≤ β!n Γ ⊢ E : β!n Sub Γ ⊢ E : αβα Γ ⊢ [E] : β Reset where β ≤ BoolPos β!(n+1) (59) Γ⊢E:α γ!n αγ!n Γ ⊢ [E] : β!(n + 1) Reset where β ≤ BoolPos Finally, we refine the types of our determiners from (47) to (60) Bool δ!n γ!n JnoK : (Thing → Bool) → ´ ThingBoolNeg δ!n , γ!n (61) (63) JanyK : (Thing → Bool) → ´ ThingBoolNegδ!n . γ!n The chain of answer-type transitions from one quantificational expression to the next acts as a finite-state automaton, shown in Figure 6. The states of the automaton are the three supertypes of Bool; the ǫ-transitions are the two subtyping relations in (54); and the non-ǫ transitions are the determiners in (60–63). some any ǫ BoolPos Bool BoolNeg no a Figure 6: An automaton of answer-type transitions This three-state machine enforces polarity constraints as follows. Any valid derivation for a sentence assigns each of its quantifiers to shift at a certain level in the control hierarchy. For each level, the quantifiers at that level—in the order in which they are evaluated—must form β!n ≤ β ′ !n We then add a side condition to Reset, requiring that the produced answer type be Bool or BoolPos, not BoolNeg. (58) γ!n BoolNeg δ!n γ!n ǫ ′ (56) Boolδ!n γ!n JaK : (Thing → Bool) → ´ ThingBoolδ!n , Bool ≤ BoolNeg Bool ≤ BoolPos We also extend the subtyping relation between (value and computation) types with the usual closure rules, and allow implicit coercion from a subtype to a supertype. (55) (62) BoolPos δ!n γ!n JsomeK : (Thing → Bool) → ´ ThingBoolPosδ!n , γ!n • either a path from BoolPos to Bool in the state machine, in other words a string of determiners matching the regular expression “some∗ (a | no any∗ )∗ ”; • or a path from Bool to Bool in the state machine, in other words a string of determiners matching the regular expression “(a | no any∗ )∗ ”. Furthermore, the BoolPos-to-Bool levels in the hierarchy must all be higher than the Bool-to-Bool levels. Every assignment of quantifiers to levels that satisfies these conditions gives a reading for the sentence, in which quantifiers at higher levels scope wider, and, among quantifiers at the same level, ones evaluated earlier scope wider. Consider now the two alternative ways to characterize scope ambiguity suggested in §5. The first approach is to allow arbitrary evaluation order (and use a degenerate control hierarchy of one level only). If we take this route, we can account for all of the acceptability and ambiguity judgments in (52a–e), but we cannot distinguish the acceptable sentence (52c) from the unacceptable (52f). In other words, it would be a mystery how the acceptability of a sentence hinges on the linear order in which the quantifiers no and any appear. This mystery has been noted by Ladusaw (1979; §9.2) and Fry (1999; §8.2) as a defect in current accounts of polarity sensitivity. The second approach, using a control hierarchy with multiple levels, fares better by comparison.3 We can stick to left-to-right evaluation, under which—as desired—an any must be preceded by a no that scopes over it with no intervening a or some. Indeed, the variations in ambiguity and acceptability among sentences in (52) are completely captured. For intuition, we can imagine that the hearer of a sentence must first process the trigger for a downward-entailing context, like no, before it makes sense to process a negative polarity item, like any.4 Intuition aside, the programming-language notion of evaluation order provides the syntactic hacker of formal types with a new tool with which to capture observed regularities in natural language. 7. LINGUISTIC SIDE EFFECTS This paper outlines how quantification and polarity sensitivity in natural language can be modeled using delimited continuations. These two examples support my claim that the formal theory and computational intuition we have for continuations can help us construct, understand, and maintain linguistic theories. To be sure, this work is far from the first time insights from programming languages are applied to natural language: • It has long been noted that the intensional logic in which Montague grammar is couched can be understood computationally (Hobbs and Rosenschein 1978; Hung and Zucker 1991). • Dynamic semantics (Groenendijk and Stokhof 1991), which relates anaphora and discourse in natural languages to nondeterminism and mutable state in programming languages (van Eijck 1998), has been applied to a variety of natural language phenomena, such as verb-phrase ellipsis (van Eijck and Francez 1995; Gardent 1991; Hardt 1999). kind is jumps to labels; one of the second kind is mutable state. By analogy, I use the term “linguistic side effects” to refer to aspects of natural language where either it is unclear what a denotational semantics should look like, or the “obvious” denotational semantics (such as making each clause denote whether it is true) turns out to break referential transparency. Besides quantification and polarity sensitivity, some examples are: (64) a. b. c. d. e. Bob thinks Alice likes CS187. A man walks. He whistles. Which star did Alice see? Alice only saw Venus. The king of France whistles. (Intensionality) (Variable binding) (Interrogatives) (Focus) (Presuppositions) To study linguistic side effects, I propose to draw an analogy between them and computational side effects. Just as computer scientists want to express all computational side effects in a uniform and modular framework and study how control interacts with mutable state (Felleisen and Hieb 1992), linguists want to investigate properties common to all linguistic side effects and study how quantification interacts with variable binding. Furthermore, just as computer scientists want to relate operational notions like evaluation order and parameter passing to denotational models like continuations and monads, linguists want to relate the dynamics of information in language processing to the static definition of a language as a generative device. Whether this analogy yields a linguistic theory that is empirically adequate is an open scientific question that I find attractive to pursue. 8. ACKNOWLEDGMENTS Thanks to Stuart Shieber, Chris Barker, Raffaella Bernardi, Barbara Grosz, Pauline Jacobson, Aravind Joshi, William Ladusaw, Fernando Pereira, Avi Pfeffer, Chris Potts, Norman Ramsey, Dylan Thurston, Yoad Winter, and anonymous referees. This work is supported by the United States National Science Foundation Grants IRI-9712068 and BCS0236592. 9. REFERENCES However, the link between natural language and continuations has only recently been made explicit, and this paper’s use of control operators for a direct-style analysis is novel. The analyses presented here are part of a larger project, that of relating computational side effects to linguistic side effects. The term “computational side effect” here covers all programming language features where either it is unclear what a denotational semantics should look like, or the “obvious” denotational semantics (such as making each arithmetic expression denote a number) turns out to break referential transparency. A computational side effect of the first Barker, Chris. 2000. Notes on higher-order continuations. Manuscript, University of California, San Diego. 3 Although this paper uses Danvy and Filinski’s control hierarchy, polarity sensitivity can be expressed equally well in Shan and Barker’s system. 4 The syntactic distinction among the types Bool, BoolPos, and BoolNeg may even be semantically interpretable via the formulas-as-types correspondence, but the potential for such a connection has only been briefly explored (Bernardi and Nilsen 2001) and we do not examine it here. In this connection, Krifka (1995) and others have proposed on pragmatic grounds that determiners like any are negative polarity items because they indicate extreme points on a scale. Bernardi, Raffaella, and Richard Moot. 2001. Generalized quantifiers in declarative and interrogative sentences. Journal of Language and Computation 1(3):1–19. ———. 2002. Continuations and the nature of quantification. Natural Language Semantics 10(3):211–242. Barwise, Jon, and Robin Cooper. 1981. Generalized quantifiers and natural language. Linguistics and Philosophy 4: 159–219. Bernardi, Raffaella. 2002. Reasoning with polarity in categorial type logic. Ph.D. thesis, Utrecht Institute of Linguistics (OTS), Utrecht University. Bernardi, Raffaella, and Øystein Nilsen. 2001. Polarity items in type logical grammar: Connection with DMG. Slides for talk at Learning Logic and Grammar workshop, Amsterdam. Carpenter, Bob. 1997. Type-logical semantics. Cambridge: MIT Press. Danvy, Olivier, and Andrzej Filinski. 1989. A functional abstraction of typed contexts. Tech. Rep. 89/12, DIKU, University of Copenhagen, Denmark. http://www.daimi. au.dk/∼danvy/Papers/fatc.ps.gz. ———. 1990. Abstracting control. In Proceedings of the 1990 ACM conference on Lisp and functional programming, 151–160. New York: ACM Press. Danvy, Olivier, and John Hatcliff. 1992. CPS-transformation after strictness analysis. ACM Letters on Programming Languages and Systems 1(3):195–212. ———. 1994. On the transformation between direct and continuation semantics. In Mathematical foundations of programming semantics: 9th international conference (1993), ed. Stephen D. Brookes, Michael G. Main, Austin Melton, Michael W. Mislove, and David A. Schmidt, 627–648. Lecture Notes in Computer Science 802, Berlin: Springer-Verlag. van Eijck, Jan. 1998. Programming with dynamic predicate logic. Report INS-R9810, Centrum voor Wiskunde en Informatica, Amsterdam. Also as Research Report CT1998-06, Institute for Logic, Language and Computation, Universiteit van Amsterdam. van Eijck, Jan, and Nissim Francez. 1995. Verb-phrase ellipsis in dynamic semantics. In Applied logic: How, what, and why: Logical approaches to natural language, ed. László Pólos and Michael Masuch. Dordrecht: Kluwer. Felleisen, Matthias. 1988. The theory and practice of firstclass prompts. In POPL ’88: Conference record of the annual ACM symposium on principles of programming languages, 180–190. New York: ACM Press. Felleisen, Matthias, and Robert Hieb. 1992. The revised report on the syntactic theories of sequential control and state. Theoretical Computer Science 103(2):235–271. Fry, John. 1999. Proof nets and negative polarity licensing. In Semantics and syntax in lexical functional grammar: The resource logic approach, ed. Mary Dalrymple, chap. 3, 91–116. Cambridge: MIT Press. Gardent, Claire. 1991. Dynamic semantics and VP-ellipsis. In Logics in AI: European workshop JELIA ’90, ed. Jan van Eijck, 251–266. Lecture Notes in Artificial Intelligence 478, Berlin: Springer-Verlag. Groenendijk, Jeroen, and Martin Stokhof. 1991. Dynamic predicate logic. Linguistics and Philosophy 14(1):39–100. de Groote, Philippe. 2001. Type raising, continuations, and classical logic. In Proceedings of the 13th Amsterdam Colloquium, ed. Robert van Rooy and Martin Stokhof, 97– 101. Institute for Logic, Language and Computation, Universiteit van Amsterdam. Hardt, Daniel. 1999. Dynamic interpretation of verb phrase ellipsis. Linguistics and Philosophy 22(2):185–219. Hendriks, Herman. 1993. Studied flexibility: Categories and types in syntax and semantics. Ph.D. thesis, Institute for Logic, Language and Computation, Universiteit van Amsterdam. Hobbs, Jerry R., and Stanley J. Rosenschein. 1978. Making computational sense of Montague’s intensional logic. Artificial Intelligence 9:287–306. Hobbs, Jerry R., and Stuart M. Shieber. 1987. An algorithm for generating quantifier scopings. Computational Linguistics 13(1–2):47–63. Hung, Hing-Kai, and Jeffery I. Zucker. 1991. Semantics of pointers, referencing and dereferencing with intensional logic. In LICS ’91: Proceedings of the 6th symposium on logic in computer science, 127–136. Washington, DC: IEEE Computer Society Press. Kelsey, Richard, William Clinger, Jonathan Rees, et al. 1998. Revised5 report on the algorithmic language Scheme. Higher-Order and Symbolic Computation 11(1): 7–105. Also as ACM SIGPLAN Notices 33(9):26–76. Krifka, Manfred. 1995. The semantics and pragmatics of polarity items. Linguistic Analysis 25:209–257. Ladusaw, William A. 1979. Polarity sensitivity as inherent scope relations. Ph.D. thesis, Department of Linguistics, University of Massachusetts. Reprinted by New York: Garland, 1980. Lewin, Ian. 1990. A quantifier scoping algorithm without a free variable constraint. In COLING ’90: Proceedings of the 13th international conference on computational linguistics, vol. 3, 190–194. May, Robert. 1985. Logical form: Its structure and derivation. Cambridge: MIT Press. Montague, Richard. 1974. The proper treatment of quantification in ordinary English. In Formal philosophy: Selected papers of Richard Montague, ed. Richmond Thomason, 247–270. New Haven: Yale University Press. Moran, Douglas B. 1988. Quantifier scoping in the SRI core language engine. In Proceedings of the 26th annual meeting of the Association for Computational Linguistics, 33– 40. Somerset, NJ: Association for Computational Linguistics. Nielsen, Lasse R. 2001. A selective CPS transformation. In Proceedings of MFPS 2001: 17th conference on the mathematical foundations of programming semantics, ed. Stephen Brooks and Michael Mislove. Electronic Notes in Theoretical Computer Science 45, Amsterdam: Elsevier Science. Shan, Chung-chieh. 2003. Quantifier strengths predict scopal possibilities of Mandarin Chinese wh-indefinites. Draft manuscript, Harvard University; http://www.eecs. harvard.edu/∼ ccshan/mandarin/. Shan, Chung-chieh, and Chris Barker. 2003. Explaining crossover and superiority as left-to-right evaluation. Draft manuscript, Harvard University and University of California, San Diego; http://semanticsarchive.net/ Archive/TBjZDQ3Z/. Taha, Walid, and Michael Florentin Nielsen. 2003. Environment classifiers. In POPL ’03: Conference record of the annual ACM symposium on principles of programming languages, 26–37. New York: ACM Press. Thielecke, Hayo. 2003. From control effects to typed continuation passing. In POPL ’03: Conference record of the annual ACM symposium on principles of programming languages, 139–149. New York: ACM Press.
6cs.PL
1 PsyPhy: A Psychophysics Driven Evaluation Framework for Visual Recognition (a) Traditional Natural Evaluation Brandon RichardWebster, Student Member, IEEE, Samuel E. Anthony, Student Member, IEEE, and Walter J. Scheirer, Senior Member, IEEE (b) Visual Psychophysics arXiv:1611.06448v3 [cs.CV] 14 Sep 2017 Natural Abstract—By providing substantial amounts of data and standardized evaluation protocols, datasets in computer vision have helped fuel advances across all areas of visual recognition. But even in light of breakthrough results on recent benchmarks, it is still fair to ask if our recognition algorithms are doing as well as we think they are. The vision sciences at large make use of a very different evaluation regime known as Visual Psychophysics to study visual perception. Psychophysics is the quantitative examination of the relationships between controlled stimuli and the behavioral responses they elicit in experimental test subjects. Instead of using summary statistics to gauge performance, psychophysics directs us to construct item-response curves made up of individual stimulus responses to find perceptual thresholds, thus allowing one to identify the exact point at which a subject can no longer reliably recognize the stimulus class. In this article, we introduce a comprehensive evaluation framework for visual recognition models that is underpinned by this methodology. Over millions of procedurally rendered 3D scenes and 2D images, we compare the performance of well-known convolutional neural networks. Our results bring into question recent claims of humanlike performance, and provide a path forward for correcting newly surfaced algorithmic deficiencies. Index Terms—Object Recognition, Visual Psychophysics, Neuroscience, Psychology, Evaluation, Deep Learning. I. I NTRODUCTION We often attribute “understanding” and other cognitive predicates by metaphor and analogy to cars, adding machines, and other artifacts, but nothing is proved by such attributions. John Searle Imagine the following scenario: a marvelous black box algorithm has appeared that purportedly solves visual object recognition with human-like ability. As a good scientist, how might you go about falsifying this claim? By all accounts, the algorithm achieves superior performance on established benchmarks in computer vision, but its internal workings are opaque to the external observer. Such a situation is not far fetched — it should be familiar to any of us studying machine learning for visual recognition. But what many of us in computer vision might not realize is that this setup happens to be the classic Chinese Room [3] problem proposed by the philosopher John Searle. In Searle’s thought experiment, a person who does not speak Chinese is alone in a locked room and following instructions from a computer program to generate Chinese characters to respond to Chinese messages that are slipped under the door. To the message passer outside of the room, the person inside B. RichardWebster and W. Scheirer are with the Department of Computer Science and Engineering, University of Notre Dame, Notre Dame, IN, 46556. Corresponding Author’s E-mail: [email protected]. S. Anthony is with the Department of Psychology, Harvard University, and Perceptive Automata, Inc. p e r t u r b a t i o n Rendered Gaussian blur Linear Occlusion Rotation Fig. 1. In this article, the concept of applying psychophysics [1], [2] on a recognition model is introduced. In this figure, A and B are two models being compared. (Top) In traditional dataset-based evaluation, summary statistics are generated over large sets of data, with little consideration given to specific conditions that lead to incorrect recognition instances. (Bottom) Psychophysics, a set of experimental concepts and procedures from psychology and neuroscience, helps us plot the exact relationships between perturbed test images and resulting model behavior to determine the precise conditions under which models fail. Instead of comparing summary statistics, we compare itemresponse curves representing performance (y-axis) versus the dimension of the image being manipulated (x-axis). understands Chinese. However, this is not the case. The person inside the room is simply following instructions to complete the task — there is no real replication of the competency of knowing the Chinese language. Linking this back to computer vision, the summary statistics of performance from our algorithms look good on benchmark tests — enough so that we believe them to be close to human performance in some cases. But are these algorithms really solving the general problem of visual object recognition, or are they simply leveraging “instructions” provided in the form of labeled training data to solve the dataset? Datasets in computer vision are intended to be controlled testbeds for algorithms, where the task and difficulty can be modulated to facilitate measurable progress in research. A dataset could be made up of images specifically acquired for experimentation, or publicly available images crawled from the web. Under this regime, strong advancements have been demonstrated for a number of problems, most notably for object recognition [4]. Deep learning is now a mainstay in computer vision thanks in part to the 2012 ImageNet Challenge [5], where AlexNet [6] reduced top-5 object classification error to 16.4% from the previously best reported result of 25.8%. When algorithms are evaluated on a common footing, it is possible to track meaningful improvements in artificial intelligence like this one. However, increases in error when different datasets are used for training and testing [7], 2 [8] make us wonder if this is the only way to do it. When it comes to natural intelligence, neuroscientists and psychologists do not evaluate animals or people in the same way that computer vision scientists evaluate algorithms — and for a very good reason. With a collection of images crawled from the web, there is no straightforward way to determine the exact condition(s) that caused a subject to fail at recognizing a stimulus presented during an experiment. A natural image is the product of the physics at the instant the sensor acquired the scene; its latent parameters are largely unknown. Instead, for behavioral experiments meant to discover perceptual thresholds (i.e., the average point at which subjects start to fail), the vision sciences outside of computer vision use the concepts and procedures from the discipline of visual psychophysics. Psychophysics is the quantitative study of the relationships between controlled stimuli and the behavioral responses they elicit in a subject [1], [2]. It is a way to probe perceptual processes through the presentation of incremental and, in many cases, extremely fine-grained perturbations of visual stimuli. The properties of each stimulus are varied along one or more physical dimensions, thus controlling the difficulty of the task. The result (Fig. 1) is an item-response curve [9], where performance (e.g., accuracy) on the y-axis is plotted against the dimension being manipulated (e.g., Gaussian blur) on the x-axis. Each point on the curve reflects an individual stimulus, letting us map performance back to causal conditions in a precise manner. Psychophysics is an indispensable tool to vision science, and has been deployed to discover the minimum threshold for stimulation of a retinal photoreceptor (a single photon) [10], confirm Helmholtz’s assertions on color absorption in the retina [11], and establish criteria to diagnose prosopagnosia [12] (the inability to recognize a face). As in these discoveries from biological vision, we submit that psychophysics holds much promise for discovering new aspects of the inner workings of machine learning models. In this article, we introduce a comprehensive evaluation framework for visual recognition that is underpinned by the principles of psychophysics. In this regime, a stimulus can be an object drawn from purely rendered data or natural scene data, and a varying physical parameter can control the amount of transformation in the subsequent set of manipulated images derived from the original stimulus. A key difference from traditional benchmarks in computer vision is that instead of looking at summary statistics (e.g., average accuracy, AUC, precision, recall) to compare algorithm performance, we compare the resulting item-response curves. For complete control of the underlying parameter space, we find that procedural graphics [13]–[16] are a useful way to generate stimuli that can be manipulated in any way we desire. Because we have the procedure that rendered each scene, we can find out where a model is failing at the parametric level. As we will see, by using this framework to explore artificial vision systems like psychologists, many interesting new findings can be surfaced about the strengths and limitations of computer vision models. To summarize, our main contributions are as follows: • A general evaluation framework is developed for performing visual psychophysics on computer vision models. The framework has a strong grounding in well-established • • • work in psychology and neuroscience for behavioral experimentation. An investigation of procedural graphics for large-scale psychophysics experiments applied to models. A parallelized implementation of the psychophysics framework that is deployable as a Python package. A case study consisting of a battery of experiments incorporating millions of procedurally rendered images and 2D images that were perturbed, performed over a set of well-known Convolutional Neural Network (CNN) models [6], [17]–[19]. II. R ELATED W ORK Methods of Evaluation from the Vision Sciences. With respect to work in computer vision directly using psychophysics, most is related to establishing human baselines for comparison to algorithmic approaches. Riesenhuber and Poggio [20] described a series of psychophysical comparisons between humans and the HMAX [21] model of visual cortex using a limited set of stimuli rendered by computer graphics. Similarly, Eberhardt et al. [22] designed an experiment to measure human accuracy and reaction time during visual categorization tasks with natural images, which were then compared to different layers of CNN models [6], [19]. Geirhos et al. undertook a similar study for image degradations [23]. With respect to low-level features, Gerhard et al. [24] introduced a new psychophysical paradigm for comparing human and model sensitivity to local image regularities. Psychophysics can also be used for more than just performance evaluation. Scheirer et al. [25] introduced the notion of “perceptual annotation” for machine learning, whereby psychophysical measurements are used as weights in a loss function to give a training regime some a priori notion of sample difficulty. Using accuracy and reaction time measured via the online psychophysics testing platform TestMyBrain.org [26], perceptual annotation was shown to enhance face detection performance. Along these lines, Vondrick et al. [27] devised a method inspired by psychophysics to estimate useful biases for recognition in computer vision feature spaces. Outside of work specifically invoking psychophysics, one can find other related methods from psychology and neuroscience for behavioral-style model testing. 2D natural images are the most common type of data in computer vision, and form a good basis for algorithmic evaluation in this mode. O’Toole et al. [28], [29] and Philips et al. [30] have designed controlled datasets of natural images to compare human face recognition performance against algorithms. With the focus on algorithmic consistency with human behavior, there is no explicit model vs. model comparison in these methods. More control in experimentation can be achieved through the use of rendered 3D scenes. Cadiue et al. [31], Yamins et al. [32] and Hong et al. [33] all make use of rendered images with parametrized variation to compare the representations of models with those found in the primate brain. Pramod and Arun [34] describe a set of perceived dissimilarity measurements from humans that is used to study the systematic differences between human perception and a large number 3 of handcrafted and learned feature representations. Because of a need for very fine-grained control of object parts and other latent parameters of scenes, procedural graphics were introduced by Tenenbaum et al. [13] for the study of oneshot learning using probabilistic generative models. The use of procedural graphics for generative models was further developed by Yildirim et al. [14], Kulkarni et al. [15], and Wu et al. [16]. These studies do not vary the conditions of the stimuli using the procedures of psychophysics, nor do they use large-scale renderings on the order of millions of scenes. Other Manipulations of Stimuli in Visual Recognition Evaluations. Work coming directly out of computer vision also addresses stimulus generation for the purpose of isolating model weaknesses. Hoiem et al. [35] suggest systematically varying occlusion, size, aspect ratio, visibility of parts, viewpoint, localization error, and background to identify errors in object detectors. Wilber et al. [36] systematically apply noise, blur, occlusion, compression, textures and warping effects over 2D scenes to assess face detection performance. Finally, a whole host of approaches can be found to manipulate the inputs to CNNs in order to highlight unexpected classification errors. These include the noise patterns introduced by Szegedy et al. [37] that are imperceptible to humans, and the fooling images produced via evolutionary algorithms that were explored by Nguyen et al. [38] and Bendale and Boult [39]. The level of control in the evaluation procedures varies between these approaches, but a common starting point based on model preference for each class is missing (i.e., which object configuration produces the highest score?). We suggest in this article that the use of computer graphics helps us address this. III. M ETHOD : T HE P SY P HY F RAMEWORK Our procedure for performing psychophysics on a model largely follows established procedures found in psychology, with a few key adaptations to accommodate artificial perception. For the purposes of this article, our focus is on two performance-based forced-choice tasks that yield an interpretable item-response curve. For descriptions of other procedures in psychophysics, see [1], [2]. First, let us consider the two-alternative forced choice (2AFC) match-to-sample task that is common in psychological testing. In the 2AFC match-to-sample procedure, an observer is shown a “sample” stimulus, followed by two “alternate” stimuli where one is a positive (i.e., matching) stimulus and the other is a negative (i.e., non-matching) stimulus. The observer is then asked to choose from the alternate stimuli the stimulus that best matches the sample — the match criterion may or may not be provided to the observer. The observer repeats the task at different perturbed stimulus levels in either an adaptive pattern, which is like gradient descent for humans, or via the method of constants, which is a predetermined set of perturbed stimulus levels. Regardless of method, each task has two presented alternate stimuli (N = 2) and thus two-alternative forced-choices (M = 2). Analysis of the experiment would utilize the mean or median accuracy humans achieved at each stimulus level and mean or median human response time, if recorded. Models can be tested in precisely the same way Algorithm 1 Dfm (i, c), the top-1 binary decision of the Softmax layer of a CNN. Used for both preferred view calculation and MAFC. Input: f , a single pre-trained network model Input: i, an input image Input: c, the expected class 1: V = f (i) . the Softmax vector 2: c∗ = argmaxj∈[0,|V |) Vj . find class label 3: ς = Vc∗ 4: if c 6= c∗ then . incorrect class, negate response 5: ς = −1 ∗ ς 6: end if 7: return ς, the decision score when the input images are arranged as described above and accuracy is used as the performance measure. Second, we can consider a mapping of a more difficult classification procedure in machine learning to a more general version of the 2AFC match-to-sample procedure. We call this mapped classification MAFC match-to-sample. In MAFC, the probe image in classification is equivalent to the sample stimulus. In classification, we rarely have only two classes for a model to choose from. Thus the value of M becomes the number of labeled training classes (e.g., ImageNet 2012 has 1K learned classes, making M = 1K). Likewise, N — the number of presented alternate stimuli — changes to the number of images used in training, as this is the set of images the model is implicitly matching to (e.g., for ImageNet 2012, N = ∼1.2M training images). When testing a model with any psychophysics procedure, we need a special process for the selection of the stimuli’s default state, that is, where there is no perturbation. Blanz et al. [40] show that humans have a natural inclination towards recognizing a certain view of an object, called a canonical view. We assume in human trials that an object configuration close to a canonical view will be chosen, maximizing the probability that all observers will have no problems performing at least some part of a match-to-sample task. However, this is not as simple for any task involving a model because we do not necessarily know if it follows a similar canonical view. But we can say that a model’s preferred view is a view that produces the strongest positive response, as determined by a decision score. Note that there can be more than one preferred view (hence our use of the term preferred), because ties are often observed for the strongest response, especially in quantized decision score spaces. Choosing a preferred view is crucial to guaranteeing that when the stimulus is perturbed, the model’s response will already be at its maximum for that class. Any perturbation will cause a decline (or possibly no change) in the strength of the model’s response, not an increase. PsyPhy Framework for 2AFC and MAFC. Inspired by software frameworks for subject testing like PsychoPy [41], we have implemented the 2AFC and MAFC procedures described above using a Python framework for model testing called PsyPhy. Here we describe the details of each component of the framework. The basic steps of (1) stimuli selection, (2) preferred view selection, (3) perturbation, and (4) item-response 4 Algorithm 2 φ2T (Df2 , V, s): an item-response point generation function supporting 2AFC tasks for any image transformation function T (s, v) Input: Df2 , decision function for 2AFC Input: V , a vector of preferred views for a set of classes Input: s, the stimulus level 1: h(v) :=random v 0 |v 0 ∈ [V \ {v}] . pick negative P 2 2: β = max(0, dD (T (s, v), v, h(v))e) f v∈V β 3: a = |V | 4: return {s, a}, an x, y coordinate pair (stimulus level, accuracy over trials) for one item-response point curve generation apply to any psychophysics procedure, and the specific 2AFC and MAFC procedures may be viewed as pluggable modules within the framework. PsyPhy is very flexible with respect to tasks it can support. The first step is to select the initial set of stimuli for each class. For 2D natural images, this is any set of chosen images I2D for a class c. For a rendered scene, a set of image specifications I3D is provided to a rendering function R(c, v) (implemented in this work using Mitsuba [42]) to render a single object centered in an image. The view v ∈ I3D is the parameter set {x, y, z, ψ}, where the coordinates x, y, and z are real numbers in the range (−180.0, 180.0] and ψ, representing scale, is a real number in the range (0.0, 25.0]. The second step is to find an individual model’s preferred view for each class. For natural 2D images, the preferred view function in Eq. 1 is used. The second preferred view function, Eq. 2, uses R to create rendered images for classification. In Eq. 2, the search space is almost infinite, thus it does not find the absolute global maximum, but rather an approximation. P2D (I2D , c) := argmax Dfm (i, c) (1) P3D (I3D , c) := argmax Dfm (R(c, v), c) (2) i∈I2D v∈I3D A decision function for classification Dfm (i, c) (Alg. 1) normalizes the score output of a model f to a value in the range [−1.0, 1.0], which gives both a decision and a confidence associated with that decision. A value in the range [−1.0, 0] is an incorrect decision and (0, 1.0] is a correct decision. The parameter i is the input stimulus and c is the expected class. A natural 2D preferred view (Eq. 1) is a single selected image i ∈ I2D , where Dfm has the strongest positive response. A 3D preferred view (Eq. 2) is a single selected set v = {xv , yv , zv , ψv } ∈ I3D , where Dfm has the strongest positive response. The major difference between Eq. 1 and Eq. 2 is the use of R in Eq. 2 to render the image prior to measuring the response from Dfm . Invoking Eq. 1 or Eq. 2 for each class will create a vector of preferred views V . After preferred views have been selected for all classes, whether natural or rendered, the next step is to apply perturbations to them. In this procedure, a set of preferred views is perturbed at a specific stimulus level (i.e., the amount of perturbation) using a function T (s, v), where T could be any image transformation function (e.g., Gaussian blur, rotation). The parameter v is one preferred view — either in m Algorithm 3 φm T (Df , V, s): an item-response point generation function supporting MAFC tasks for any image transformation function T (s, v) Input: Dfm , decision function for MAFC Input: V , a vector of preferred views for a set of classes Input: s,Pthe stimulus level m 1: β = v∈V max(0, dDf (T (s, v), c(v))e) β 2: a = |V | 3: return {s, a}, an x, y coordinate pair (stimulus level, accuracy over trials) for one item-response point 2D image format or {x, y, z, ψ} for rendered stimuli — and s is the stimulus level. The function φT (D, V, s) perturbs the set of preferred views given in V and then makes a decision on each image using a decision function D. The specific implementation φ2T (Df2 , V, s) for 2AFC is described in Alg. 2, m and φm T (Df , V, s) for MAFC is described in Alg. 3. Procedure specific decision functions are required, with Df2 (Alg. 4) used for 2AFC and Dfm (Alg. 1) used for MAFC. Each individual image evaluation is a trial. The value returned by φT represents one point on an item-response curve, which is the computed accuracy over all trials (one trial per class). An item-response curve is the set of x, y coordinates that represent the model behavior for a set of stimuli. Each x, y value represents a perturbation level and accuracy of the model’s performance. Note that traditional psychophysics experiments with live test subjects often apply a psychometric function to interpolate between the points to generate the curve. To approximate a psychometric function for better interpretability, we applied rectangular smoothing (i.e., unweighted sliding-average smoothing) with a window size of 15 while padding the curve with repeated edge values. The final step generates item-response curves using the function CT (φ, D, V, n, bl , bu ). The procedure is simple, and only requires a repeated execution of φT for each stimulus level. Its steps are shown in Alg. 5. The procedure will create a set of stimulus levels starting with a lower bound, bl , and ending with an upper bound bu . bl is the closest stimulus level to the preferred view and bu is the stimulus level that is farthest away. The parameter n is the number of stimulus levels to use. Typically in visual pyschophysics, log-spaced stepping is used for finer-grained evaluation near the canonical view; the same strategy is used for preferred view. IV. E XPERIMENTS The first goal of our experiments was to demonstrate PsyPhy as a large-scale psychophysics evaluation framework. To do this, we processed millions of procedurally rendered 3D scenes and 2D images that were perturbed. The second goal was to demonstrate the utility of procedural graphics for largescale psychophysics experiments. Thus we broke our data up into two sets: natural scenes and rendered scenes. Our final goal was to evaluate the strengths and weaknesses of well-known CNN models. To do this, we looked at model behavior for 2AFC and MAFC tasks, the behavior of dropout at test time [43] under perturbations, and comparisons to 5 Algorithm 4 Df2 (i, p, q), best match decision of the final feature layer of a CNN. Used for 2AFC. Input: f , a single pre-trained network model Input: i, an input image Input: p, the expected positive image Input: q, the expected negative image 1: Wi = f (i) . gather activations from final feature layer 2: Wp = f (p) 3: Wq = f (q) 4: ςp = r(Wi , Wp ) . Pearson’s Correlation 5: ςq = r(Wi , Wq ) 6: if ςp > ςq then . if incorrect selection, negate response 7: ς = ςp 8: else 9: ς = −1 ∗ ςq 10: end if 11: return ς, the decision score Algorithm 5 CT (φ, D, V, n, bl , bu ): an item-response curve generation function for any type of decision function Input: φ, an item-response point generator Input: f , an input model Input: V , a vector of preferred views Input: n, the number of stimulus levels Input: bl and bu , the lower and upper bound values of the stimulus levels 1: Let S be n log-spaced stimulus levels from bl to bu S 2: I = {φT (D, V, s)} s∈S 3: return I, the item-response curve human behavior. In all of our experiments, we chose to use five convolutional neural network models that were pretrained on ImageNet 2012 [5]: AlexNet [6], CaffeNet [17], GoogleNet [18], VGG-16, and VGG-19 [19]. The complete set of plots and more details on the methods can be found in the supplemental material for this article1 . Data Generation. For the natural scene experiments, we perturbed images from the ImageNet 2012 [5] training dataset, which consists of ∼1.2M million images and 1K classes. Using the training set instead of the testing set gives each model an intentional bias towards “expert” performance. The following transformations were applied: Gaussian blur, linear occlusion, salt & pepper noise, brightness, contrast, and sharpness. For each condition, we created 200 perturbed images starting with the preferred view and log-spaced stepped towards increasing difficulty. The result was 201 images per class per network, or 201K images per network, or ∼1M images per condition. In total, ∼9M images were evaluated. For the experiments with rendered images, we selected 40 3D objects from the Blend Swap [44] library that corresponded to classes in ImageNet (see supp. material for a list of the classes). For each of the 3D objects, we randomly rendered 100K uniformly distributed x, y, z rotations and scales, result1 Supplemental material is accessible at http://bjrichardwebster.com/papers/psyphy/supp ing in 4M images. After each preferred view was selected from that set, the following transformations were applied by our graphics engine: rotations in the x, y, z dimensions, and scale. All were applied in the positive and negative direction. In addition, all of the transformations from the 2D natural image experiment were repeated using the rendered preferred views. For each of the 3D transformations, we rendered 200 images starting with the preferred view and log-spaced stepped towards increasing difficulty. The result was 201 images per class per network, or ∼8K images per network, or ∼40K images per transformation. The additional 2D transformations resulted in a total of ∼362K images, which brought the rendered image total to ∼683K evaluated images. 2AFC Experiments. The motivation for the 2AFC experiments is twofold: (1) to test decision making at a fundamental level via activation matching (i.e., to not just look at class labels), and (2) to test a precise implementation of a wellknown match-to-sample task. Given that this setting is just two instances of pair-matching, we had initially expected models to perform relatively well under a variety of perturbations. The experiments included the use of both natural scenes and rendered scenes as stimuli. Model behavior was only very stable for the 3D rotation (Fig. 2 center and Supp. Fig. 1), and contrast and sharpness (Supp. Figs. 3 & 4) transformations. The rest of the transformations induced more erratic behavior, with accuracy declining below 80% (e.g., Fig. 2 left and right). Gaussian blur was very detrimental to model accuracy, even in this limited matching setting. This tells us something about the receptive fields of the convolutional layers of the networks — they are not large enough to tolerate even modest levels of blur. Also interesting were results for the 3D-specific scale perturbation that let us isolate specific failure modes. For example, when scale decreases to 20% of the original size, the object structure is still clearly visible, but accuracy drops to ∼60% or lower for all networks (Supp. Fig. 1). This is an observation that could not have been made by looking at summary statistics. What about the differences in behavior across networks? Are they significant? When examining the item-response curves with the the 95% confidence interval plotted (Supp. Figs. 2, 5, 6 & 8) all network behavior consistently demonstrates the same trends for each transformation type across perturbations. While it is commonly believed that architectural innovation is advancing deep learning, this finding indicates that model behavior is more influenced by the training data, which was the same for all models in these experiments. For the VGG networks, this suggests that additional layers — beyond a certain point — do not imply better performance under degrading conditions. Likewise, switching the order of the pooling and normalization layers in CaffeNet and AlexNet [45] does not imply better performance under degrading conditions. MAFC Experiments. The motivation for the MAFC experiments is to evaluate a task that is more closely aligned to the multi-class classification task the models were originally trained for. Given that there are 1, 000 choices in this setting instead of just two, we expected models to perform much worse under the transformations. And this is exactly what we observed in the results (Fig. 3 and Supp. Figs. 9, 11, 6 Fig. 2. A selection of item-response curves for the 2AFC task. The natural scene experiment (left) reflects the classification accuracy across all 1K ImageNet classes and the rendered scene experiments (center and right) reflect the accuracy across 40 classes. Each experiment used five well-known CNNs [6], [17]– [19]. A perfect curve would be a flat line at the top of the plot. The images at the bottom of each curve show how the perturbations increase from right to left, starting with no perturbation (i.e., the original image) for all conditions. The 2AFC experiments indicate that the models tolerate different perturbations in some settings, but not in all cases (e.g., Gaussian blur). The red dot indicates mean human performance for a selected stimulus level. These plots (as well as the next sets in Figs. 3 & 4) are best viewed in color. 12 & 15). For instance, compare the plots for increasing brightness (Fig. 3 upper-left) and positive rotation in the x-axis (Fig. 3 lower-center) to the corresponding plots in Fig. 2. For both transformation types the networks, which only experienced moderate dips in performance for the most extreme perturbations in the 2AFC case, fall to under ∼20% accuracy at points. A caveat to the MAFC decision function is that because it is patterned after the classification task in computer vision, it only uses class labels to make its decisions. Thus it leaves out the layer-specific activation information that was used in the 2AFC case. This highlights an important trade-off that can occur when designing decision functions for psychophysics evaluations: task fidelity versus task difficulty. Curiously, there are large asymmetries for some of the transformations with increasing and decreasing perturbation levels. See the plots (Fig. 3 upper-left and Supp. Figs. 11 & 12) for brightness, contrast, and sharpness. Contrast is a particularly intriguing case. As a transformation, contrast is a non-linear single pixel-level operation applied globally to an image. In the positive direction, contrast is increased, and the performance of each network degrades rapidly. In the negative direction, contrast is decreased, but the performance of each network remains relatively stable until the objects have very low contrast. This suggests a contrast sensitivity problem under the MAFC decision function that is the opposite of what human patients with contrast-related vision deficits struggle with. There is a positive aspect to this finding — while diminished contrast sensitivity may induce night-blindness in a human driver, CNN-based autonomous driving systems can be expected to operate more effectively in the dark. Dropout Experiments. The experiments we have looked at thus far assume deterministic outputs. What about settings with stochastic outputs that support uncertainty in decision making? Gal and Ghahramani [43] introduced dropout at testing time to implement Bayesian inference in neural networks. What sort of variability does this lead to under various transformations and perturbation levels, and what does this tell us about the certainty of the experiments above? The setup for these experiments is identical to the setup for the MAFC experiments (including preferred views) except that during evaluation we applied dropout at test time to the Caffe version of AlexNet (which was also trained with dropout). Deploying the pre-trained model for each test, we dropped out 50% (because the model is large) of the neurons in layers fe6 and fe7 by uniformly randomly setting their activations to zero. This is repeated with 5 different random seeds for each transformation except salt & pepper noise and linear occlusion, which were not performed due to randomness in their underlying perturbation functions. As anticipated, some variability in the base model performance was introduced (Fig. 4 and Supp. Figs. 17-20). But importantly, most runs still demonstrated a large measure of consistency (e.g., Fig. 4) across the ranges of perturbations, indicating higher degrees of model certainty. This is a good stability property — when a model fails, it does so in an expected way across different dropout configurations, lending credibility to the initial characterizations of the behavior in the earlier experiments. More variability was observed for the rendered objects versus the natural scenes. This can be attributed to the use of the 3D objects that were outside of the training set for all of the models. The maximum difference observed between points from two runs for any transformation was 16.5% for sharpness applied to 3D objects (Supp. Fig. 19). In over half the cases, the maximum difference was over 10%. Human Comparisons. Using psychophysics, model performance can be directly compared to human performance. To obtain human data points (red dots) for Figs. 2-4, we conducted a study with 24 participants. Each participant performed the 2AFC task as described above, but to mitigate fatigue, only 5 trials with a fixed psychophysical parameter setting were given for each of the transformations from Fig. 2. The participants also performed the MAFC task, but were limited to 3 choices instead of the full 1000 classes to make the task tractable. For those experiments, participants performed in 5 trials with a fixed psychophysical parameter setting for each transformation in Fig. 3. The original images for each trial were chosen randomly from the VGG-16 preferred views such that each class was only used one time for each participant in order to 7 Fig. 3. A selection of item-response curves for the MAFC task. (Top) Natural scenes. (Bottom) Rendered scenes. The plots in the upper-left and bottom-center are directly comparable to the corresponding plots in Fig. 2. For all perturbations except linear occlusion, human and model behavior is not consistent. prevent participants from learning while performing the task. For all trials on both tasks, the sample images were presented for 50ms and subjects had unlimited time to answer. Even without generating a full psychometric curve for the human subjects, it was apparent that only two out of nine experiments showed any consistency between human and model performance (Fig. 2 center and Fig. 3 top-center). In some cases, human and model behavior was wildly divergent (e.g., salt & pepper noise in Fig. 3). While human performance was superior to model performance in most cases, there was one case where humans were slightly worse than the models: increasing brightness (Fig. 2 left). Brightness adjustment in image processing is a constant multiplicative change to all the pixel values, which preserves edges and allows the networks to recognize the geometry of an object almost until saturation is reached. Humans were also good at this task, but were still ∼9% worse than VGG-19 for the perturbation level analyzed. V. D ISCUSSION In visual psychophysics, we have a convenient and practical alternative to traditional dataset evaluation. However, the use of psychophysics testing and datasets are not mutually exclusive. One needs datasets to form a training basis for any datadriven model. Moreover, there is major utility to having a large amount of such data — this is essential for making machine learning capture enough intraclass variance to generalize well to unseen class instances. Data augmentation [6], [46] is an obvious strategy for leveraging the rendered images that were problematic for a model during psychophysics testing to expand the scope of the training set. However, this has diminishing returns as datasets grow to sizes that exceed available memory (or even disk space) during training. Using more limited training data and reinforcement learning that optimizes over item-response curves to correct for recognition errors is likely a better path forward. Recent research has shown that CNNs are able to predict neural responses in the visual cortex of primates [32]. This, coupled with excellent benchmark dataset results across multiple recognition domains, suggests that good progress is being made towards reaching human-like performance. As a strong counterpoint, our psychophysics experiments show that the current most popular CNN models sometimes fail to correctly classify images that humans do not make mistakes on. What is missing from the models that is causing this behavioral discrepancy? While certainly capturing some of the operation of the ventral stream (particularly at the filtering stages of early vision), today’s CNN architectures lack the intricate structure and function of biological neural networks [47]. Advances in connectomics [48], a subfield of neuroscience that is attempting to map circuits in the brain, and functional imaging [49], which allows for the in vivo study of neuronal responses, are likely to inform new biologically-inspired architectures in the near future. With psychophysics as a guide to performance, candidate models can more easily be accepted or dismissed as being representative of some form of AI — making it harder for us to be fooled by the person inside of the Chinese room. ACKNOWLEDGMENT The authors thank Lucas Parzianello for helping import Blendswap models into PsyPhy and Brian Turnquist for providing feedback on an early draft of this work. Funding was 8 Fig. 4. Item-response curves for five different runs of an AlexNet model with dropout applied at test time [43] for a 3D rotation transformation. The black line indicates the mean of the five AlexNet curves. The maximum difference between points on any two curves in this plot is 12.2%. provided under IARPA contract #D16PC00002, NSF DGE #1313583, and NSF SBIR Award #IIP-1621689. Hardware support was generously provided by the NVIDIA Corporation. R EFERENCES [1] Z.-L. Lu and B. Dosher, Visual Psychophysics: From Laboratory to Theory. MIT Press, 2013. 1, 2, 3 [2] F. Kingdom and N. Prins, Psychophysics: a Practical Introduction. Academic Press, 2016. 1, 2, 3 [3] J. R. Searle, “Minds, brains, and programs,” Behavioral and Brain Sciences, vol. 3, no. 03, pp. 417–424, 1980. 1 [4] O. Russakovsky, J. Deng, H. Su, J. Krause, S. Satheesh, S. Ma, Z. Huang, A. Karpathy, A. Khosla et al., “ImageNet large scale visual recognition challenge,” IJCV, vol. 115, no. 3, pp. 211–252, 2015. 1 [5] ImagetNet Large Scale Visual Recognition Challenge 2012 (ILSVRC2012), “http://image-net.org/challenges/LSVRC/2012/ index,” Accessed: 2016-10-12. 1, 5 [6] A. Krizhevsky, I. Sutskever, and G. E. Hinton, “ImageNet classification with deep convolutional neural networks,” in NIPS, 2012. 1, 2, 5, 6, 7 [7] A. Torralba and A. A. Efros, “Unbiased look at dataset bias,” in IEEE CVPR, 2011. 1 [8] T. Tommasi, N. Patricia, B. Caputo, and T. Tuytelaars, “A deeper look at dataset bias,” ser. LNCS, J. Gall, P. Gehler, and B. Leibe, Eds. Springer, 2015, vol. 9358, pp. 504–516. 1 [9] S. E. Embretson and S. P. Reise, Item response theory for psychologists. Lawrence Erlbaum Associates, Inc., 2000. 2 [10] S. Hecht, S. Shlaer, and M. H. Pirenne, “Energy, quanta, and vision,” The Journal of General Physiology, vol. 25, no. 6, pp. 819–840, 1942. 2 [11] J. K. Bowmaker and H. J. Dartnall, “Visual pigments of rods and cones in a human retina,” The Journal of Physiology, vol. 298, no. 1, pp. 501–511, 1980. 2 [12] B. Duchaine and K. Nakayama, “The Cambridge face memory test: Results for neurologically intact individuals and an investigation of its validity using inverted face stimuli and prosopagnosic participants,” Neuropsychologia, vol. 44, no. 4, pp. 576–585, 2006. 2 [13] J. B. Tenenbaum, C. Kemp, T. L. Griffiths, and N. D. Goodman, “How to grow a mind: Statistics, structure, and abstraction,” Science, vol. 331, no. 6022, pp. 1279–1285, 2011. 2, 3 [14] I. Yildirim, T. D. Kulkarni, W. A. Freiwald, and J. B. Tenenbaum, “Efficient and robust analysis-by-synthesis in vision: A computational framework, behavioral tests, and modeling neuronal representations,” in Annual Conference of the Cognitive Science Society (CogSci), 2015. 2, 3 [15] T. D. Kulkarni, P. Kohli, J. B. Tenenbaum, and V. Mansinghka, “Picture: A probabilistic programming language for scene perception,” in IEEE CVPR, 2015. 2, 3 [16] J. Wu, C. Zhang, T. Xue, W. T. Freeman, and J. B. Tenenbaum, “Learning a probabilistic latent space of object shapes via 3d generativeadversarial modeling,” in NIPS, 2016. 2, 3 [17] Y. Jia, E. Shelhamer, J. Donahue, S. Karayev, J. Long, R. Girshick, S. Guadarrama, and T. Darrell, “Caffe: Convolutional architecture for fast feature embedding,” arXiv preprint arXiv:1408.5093, 2014. 2, 5, 6 [18] C. Szegedy, W. Liu, Y. Jia, P. Sermanet, S. Reed, D. Anguelov, D. Erhan, V. Vanhoucke, and A. Rabinovich, “Going deeper with convolutions,” in IEEE CVPR, 2015. 2, 5, 6 [19] K. Simonyan and A. Zisserman, “Very deep convolutional networks for large-scale image recognition,” CoRR, vol. abs/1409.1556, 2014. 2, 5, 6 [20] M. Riesenhuber and T. Poggio, “The individual is nothing, the class everything: Psychophysics and modeling of recognition in object classes,” MIT, Tech. Rep. AIM-1682, October 2000. 2 [21] ——, “Hierarchical models of object recognition in cortex,” Nature Neuroscience, vol. 2, no. 11, pp. 1019–1025, 1999. 2 [22] S. Eberhardt, J. Cader, and T. Serre, “How deep is the feature analysis underlying rapid visual categorization?” in NIPS, 2016. 2 [23] R. Geirhos, D. H. J. Janssen, H. H. Schütt, J. Rauber, M. Bethge, and F. A. Wichmann, “Comparing deep neural networks against humans: object recognition when the signal gets weaker,” arXiv preprint 1706.06969, 2017. 2 [24] H. E. Gerhard, F. A. Wichmann, and M. Bethge, “How sensitive is the human visual system to the local statistics of natural images?” PLoS Computational Biology, vol. 9, no. 1, p. e1002873, 2013. 2 [25] W. J. Scheirer, S. E. Anthony, K. Nakayama, and D. D. Cox, “Perceptual annotation: Measuring human vision to improve computer vision,” IEEE T-PAMI, vol. 36, no. 8, August 2014. 2 [26] L. Germine, K. Nakayama, B. C. Duchaine, C. F. Chabris, G. Chatterjee, and J. B. Wilmer, “Is the web as good as the lab? comparable performance from web and lab in cognitive/perceptual experiments,” Psychonomic Bulletin & Review, vol. 19, no. 5, pp. 847–857, 2012. 2 [27] C. Vondrick, H. Pirsiavash, A. Oliva, and A. Torralba, “Learning visual biases from human imagination,” in NIPS, 2015. 2 [28] A. J. O’Toole, P. J. Phillips, F. Jiang, J. Ayyad, N. Penard, and H. Abdi, “Face recognition algorithms surpass humans matching faces over changes in illumination,” IEEE T-PAMI, vol. 29, no. 9, pp. 1642– 1646, 2007. 2 [29] A. J. O’Toole, X. An, J. Dunlop, V. Natu, and P. J. Phillips, “Comparing face recognition algorithms to humans on challenging tasks,” ACM Transactions on Applied Perception (TAP), vol. 9, no. 4, p. 16, 2012. 2 [30] P. J. Phillips and A. J. O’Toole, “Comparison of human and computer performance across face recognition experiments,” Image and Vision Computing, vol. 32, no. 1, pp. 74–85, 2014. 2 [31] C. F. Cadieu, H. Hong, D. Yamins, N. Pinto, N. J. Majaj, and J. J. DiCarlo, “The neural representation benchmark and its evaluation on brain and machine,” in ICLR, 2013. 2 [32] D. Yamins, H. Hong, C. F. Cadieu, E. A. Solomon, D. Seibert, and J. J. DiCarlo, “Performance-optimized hierarchical models predict neural responses in higher visual cortex,” Proceedings of the National Academy of Sciences, vol. 111, no. 23, pp. 8619–8624, 2014. 2, 7 [33] H. Hong, D. Yamins, N. J. Majaj, and J. J. DiCarlo, “Explicit information for category-orthogonal object properties increases along the ventral stream,” Nature Neuroscience, vol. 19, no. 4, pp. 613–622, 2016. 2 [34] R. T. Pramod and S. P. Arun, “Do computational models differ systematically from human object perception?” in IEEE CVPR, 2016. 2 [35] D. Hoiem, Y. Chodpathumwan, and Q. Dai, “Diagnosing error in object detectors,” in ECCV, 2012. 3 [36] M. J. Wilber, V. Shmatikov, and S. Belongie, “Can we still avoid automatic face detection?” in IEEE WACV, 2016. 3 [37] C. Szegedy, W. Zaremba, I. Sutskever, J. Bruna, D. Erhan, I. Goodfellow, and R. Fergus, “Intriguing properties of neural networks,” in ICLR, 2014. 3 [38] A. Nguyen, J. Yosinski, and J. Clune, “Deep neural networks are easily fooled: High confidence predictions for unrecognizable images,” in IEEE CVPR, 2015. 3 [39] A. Bendale and T. E. Boult, “Towards open set deep networks,” in IEEE CVPR, 2016. 3 [40] V. Blanz, M. J. Tarr, and H. H. Bülthoff, “What object attributes determine canonical views?” Perception, vol. 28, no. 5, pp. 575–599, 1999. 3 [41] J. W. Peirce, “PsychoPy: Psychophysics software in python,” Journal of Neuroscience Methods, vol. 162, no. 1-2, pp. 8–13, 2007. 3 [42] W. Jakob, “Mitsuba https://pillow.readthedocs.io/en/3.0.0/index.html,” Accessed: 2016-11-05. 4 [43] Y. Gal and Z. Ghahramani, “Dropout as a bayesian approximation: Representing model uncertainty in deep learning,” in ICML, 2016. 5, 6, 8 [44] Mitsuba renderer, “http://www.blendswap.com,” 2010. 5 [45] BVLC Caffe, “https://github.com/BVLC/caffe,” Accessed: 2016-11-10. 5 9 [46] K. Chatfield, K. Simonyan, A. Vedaldi, and A. Zisserman, “Return of the devil in the details: Delving deep into convolutional nets,” in BMVC, 2014. 7 [47] D. D. Cox and T. Dean, “Neural networks and neuroscience-inspired computer vision,” Current Biology, vol. 24, no. 18, pp. R921–R929, 2014. 7 [48] N. Kasthuri, K. J. Hayworth, D. R. Berger, R. L. Schalek et al., “Saturated reconstruction of a volume of neocortex,” Cell, vol. 162, no. 3, pp. 648–661, 2015. 7 [49] K. Ohki, S. Chung, Y. H. Ch’ng, P. Kara, and R. C. Reid, “Functional imaging with cellular resolution reveals precise micro-architecture in visual cortex,” Nature, vol. 433, no. 7026, pp. 597–603, 2005. 7
1cs.CV
1 Reconstruction Codes for DNA Sequences with Uniform Tandem-Duplication Errors arXiv:1801.06022v1 [cs.IT] 18 Jan 2018 Yonatan Yehezkeally, Student Member, IEEE, and Moshe Schwartz, Senior Member, IEEE Abstract—DNA as a data storage medium has several advantages, including far greater data density compared to electronic media. We propose that schemes for data storage in the DNA of living organisms may benefit from studying the reconstruction problem, which is applicable whenever multiple reads of noisy data are available. This strategy is uniquely suited to the medium, which inherently replicates stored data in multiple distinct ways, caused by mutations. We consider noise introduced solely by uniform tandem-duplication, and utilize the relation to constantweight integer codes in the Manhattan metric. By bounding the intersection of the cross-polytope with hyperplanes, we prove the existence of reconstruction codes with greater capacity than known error-correcting codes, which we can determine analytically for any set of parameters. Index Terms—DNA storage, reconstruction, string-duplication systems, tandem-duplication errors I. I NTRODUCTION DNA is attracting considerable attention in recent years as a medium for data storage, due to its high density and longevity [6]. Data storage in DNA may provide integral memory for synthetic-biology methods, where such is required, and offer a protected medium for long-period data storage [4], [33]. In particular, storage in the DNA of living organisms is now becoming feasible [31]; it has varied usages, including watermarking generically modified organisms [3], [13], [27] or research material [18], [33], and even afford some concealment to sensitive information [7]. Naturally, therefore, data integrity in such media is of great interest. Several recent works have studied the inherent constraints of storing and retrieving data from DNA. While desired sequences (over quaternary alphabet) may be synthesized (albeit, while suffering from substitution noise), generally data can only be read by observation of its subsequences, quite possibly an incomplete observation [19]. Moreover, the nature of DNA and current technology results in asymmetric errors which depend upon the dataset [10]. The medium itself also introduces other types of errors which are atypical in electronic storage, such as symbol/block-deletion and adjacent transpositions (possibly inverted) [11]. Finally, the purely combinatorial problem of recovering a sequence from the multiset of all its subsequences (including their numbers of incidence), was also studied [1], [32], as well as coding schemes involving only these multisets (or their profile vectors – describing the incidence frequency of each subsequence) [30]. A version of this paper was submitted to ISIT’2018. This work was supported in part by ISF grant no. 130/14. The authors are with the Department of Electrical and Computer Engineering, Ben-Gurion University of the Negev, Beer Sheva 8410501, Israel (e-mail: [email protected]; [email protected]). Other works were concerned with data storage in the DNA of a living organism. While this affords some level of protection to the data, and even propagation (through DNA replication), it is also exposed to specific noise mechanisms due to mutations. Examples of such noise include symbol insertions, deletion, substitutions (point-mutation), and duplication (including tandem- and interspersed-duplication). Therefore, schemes for data storage in live DNA must address data integrity and error-correction. In an effort to better understand these typical noise mechanism, their potential to generate the diversity observed in nature was studied. [12] classified the capacity and/or expressiveness of the systems of sequences over a finite alphabet generated by four distinct substring duplication rules: endduplication, tandem-duplication, tandem-palindromic- duplication, and interspersed-duplication. [15] fully characterized the expressiveness of bounded tandem-duplication systems, proved bounds on their capacity (and, in some cases, even exact values). [17] later showed that when point-mutations act together with tandem-duplication as a sequence-generation process, they may actually increase the capacity of the generated system. [2] looked at the typical duplication distance of binary sequences; i.e., the number of tandem-duplications generating a binary sequence from its root. It was proven that for all but an exponentially small number of sequences that number is proportional to the sequence length. Further, when tandem-duplication is combined with point-mutations (here, only within the duplicated string), it was shown that the frequency of substitutions governs whether that distance becomes logarithmic. The generative properties of interspersed-duplication were also studied from a probabilistic point of view. [9] showed (under assumption of uniformity) that the frequencies of incidence for each subsequence converge to the same limit achieved by an i.i.d. source, thus reinforcing the notion that interspersedduplication is–on its own–capable of generating diversity. [8] specifically looked at tandem- and end-duplication, and found exact capacities in the case of duplication length 1 by a generalization of the Pólya urn model that applies to strings. It also tightly bounded the capacity of complement tandem-duplication, a process where the duplicated symbol is complemented (using binary alphabet). Finally, error-correcting codes for data affected by tandemduplication have been studied in [16], which presented a construction of optimal-size codes for correcting any number of errors under uniform tandem-duplication (fixed duplication length), computing their (and thus, the optimal-) capacity. It also presented a framework for the construction of optimal 2 codes for the correction of a fixed number of errors. Next, it studies bounded tandem-duplications, where a characterization of the capacity of error-correcting codes is made for small constants. In general, it characterized the cases where the process of tandem-duplication can be traced back uniquely. However, classical error-correction coding ignores some properties of the DNA storage channel; namely, stored information is expected to be replicated, even as it is mutated. This lends itself quite naturally to the reconstruction problem [26], which assumes that data is simultaneously transmitted over several noisy channels, and a decoder must therefore estimate that data based on several (distinct) noisy versions of it. Solutions to this problem have been studied in several contexts. It was solved in [26] for sequence reconstruction over finite alphabets, where several error models were considered, such as substitutions, transpositions and deletions. Moreover, a framework was presented for solving the reconstruction problem in general cases of interest in coding theory, utilizing a graph representation of the error model, which was further developed in [24], [25]. The problem was also studied in the context of permutation codes with transposition and reversal errors [20]–[22], and partially solved therein. Later, applications were found in storage technologies [5], [34], [35], since modern application might preclude the retrieval of a single data point, in favor of multiple-point requests. However, the problem hasn’t been addressed yet for data storage in DNA of living organisms, where it may be most applicable. In this paper, we study the reconstruction problem over DNA sequences, with uniform tandem-duplication error. The paper is organized as follows: In Section II we present notations and definitions. In Section III we demonstrate that reconstruction codes are error-correcting codes and find their requisite minimal-distance, as a function of the reconstruction parameters. In Section IV we then study bounds on the sizes of such codes by an isometric embedding to constant-weight codes in the Manhattan metric. Finally, in Section V we show that by considering reconstruction codes we improve the capacity of known error-correcting codes, and conclude with closing remarks in Section VI. II. P RELIMINARIES Throughout this paper, though human DNA is composed of four nucleotide bases, we observe the more general case of sequences over a finite alphabet; since the alphabet elements are immaterial to our discussion, we denote it throughout as Zq . We observe the set of finite sequences (also: words) over S n ∗ it Z∗q = ∞ Z n=0 q . For any two words u, v ∈ Zq , we denote n their concatenation uv. For each word x ∈ Zq , we denote its length |x| = n. We also take special note of the set of words with length higher  than or equal to some 0 < k ∈ N, which we denote Z>k = x ∈ Z∗q |x| > k . For ease of notation, q we let N stand for the set of non-negative integers throughout the paper; when an integer is assumed to be strictly positive, we make special note of that fact. For 0 < k ∈ N, i ∈ N, we define a tandem-duplication of duplication-length k by the mappings ( uvvw x = uvw, |u| = i, |v| = k, Tk,i (x) = x otherwise. If y = Tk,i (x) and y 6= x (which occurs whenever |x| > i+k), we say that y is a descendant of x, and denote x =⇒ y. k t Further, given a sequence {xj }j=0 ⊆ Z∗q such that for all 0 6 j < t, xj =⇒ xj+1 , we say that xt is a t-descendant k t of x0 , and denote x0 =⇒ xt . For completeness, we also 0 k denote x =⇒ x. Finally, if there exists some t ∈ N such that k t ∗ x =⇒ y, we also denote x =⇒ y. k k We denote the set of t-descendants of x ∈ Z∗q as   t Dkt (x) = y ∈ Z∗q x =⇒ y , k for some t ∈SN. We also denote the descendant-cone of x t by Dk∗ (x) = ∞ t=0 Dk (x). For ease of notation, we define for t ∈ N the set of t-ancestors of some given x ∈ Zq>k+1 as  Dk−t (x) = y ∈ Z∗q x ∈ Dkt (y) , and similarly Dk−∗ (x). We say that x ∈ Zq>k is irreducible if it is not the descendant of any word. We exclude from the definition shorter words, for which the condition vacuously holds. We denote by Irrk the set of all irreducible words, and Irrk (n) = Irrk ∩Znq . It was shown in [17], [23] that for each word x ∈ Z>k q , a unique irreducible word exists for which x is a descendant. We call it the root of x, and denote it by Rk (x). This induces an equivalence relation by x ∼k y if Rk (x) = Rk (y). We also follow [17] in defining, for x ∈ Z>k q , Pref k (x) as the length-k prefix of x, and Suff k (x) as its suffix; i.e., if x = uu′ = v ′ v where |u| = |v| = k, then Pref k (x) = u and Suff k (x) = v. Using this notation, we define an embedding φk : Zq>k → Zkq × Z∗q by  φk (x) = Pref k (x), Suff |x|−k (x) − Pref |x|−k (x) . It is seen in [17] that this mapping is indeed injective. Further, it was shown that, if one also defines ζk,i : Zkq ×Z∗q → Zkq ×Z∗q by ( (a, b1 0k b2 ) b = b1 b2 , |b1 | = i, ζk,i (a, b) = (a, b) otherwise, where 0 < k ∈ N, i ∈ N, then φk (Tk,i (x)) = ζk,i (φk (x)). The simplicity of ζk,i in comparison to Tk,i motivates the analysis of tandem-duplications using the φk images of sequence. If b ∈ Z∗q is composed of the subsequences b = 0s1 w1 0s2 · · · wm 0sm+1 ; ∗ w1 , . . . , wm ∈ (Zq \ {0}) we define µ(b) = 0s1 mod k w1 0s2 mod k · · · wm 0sm+1 mod k , js k j s k m+1 1 ,..., . σ(b) = k k 3 Lemma 4 For all y, z ∈ Dk∗ (x) it holds that y =⇒ z if and We may note that wtH (b) = wtH (µ(b)), where wtH is the Hamming weight, and σ(b) ∈ NwtH (b)+1 = NwtH (µ(b))+1 . We also observe that b is recoverable from σ(b), µ(b). It was proven in [17, Cor. 10] that if φk (x) = (a, b) then only if ψx (z) = ψx (y) + ej , for some unit vector ej ∈ Nm+1 . φk (Rk (x)) = (a, µ(b)). φk (y) = (a, 0s1 w1 0s2 · · · wm 0sm+1 ). Thus, if x, y ∈ Z>k q , φk (x) = (a1 , b1 ) and φk (y) = (a2 , b2 ), then x ∼k y if and only if a1 = a2 and µ(b1 ) = µ(b2 ). Moreover, x ∈ Irrk if and only if σ(b1 ) = (0, 0, . . . , 0). Finally, for n > k and x, y ∈ Znq we define  dk (x, y) = min t ∈ N Dkt (x) ∩ Dkt (y) 6= ∅ , or dk (x, y) = ∞ if {t ∈ N | Dkt (x) ∩ Dkt (y) 6= ∅} = ∅. It was shown in [17, Lem. 14] that dk (x, y) = ∞ if and only if x 6∼k y, hence dk (·, ·) is finite on Dkt (x), for any particular x ∈ Z>k q . Furthermore, [17, Lem. 19] shows that for any x ∼k y with |x| = |y| it holds that dk (x, y) = 1 2 kσ(b1 ) − σ(b2 )k1 , k Proof: Let us denote Now note that y =⇒ z if and only if there exists i ∈ N k such that φk (z) = ζi,k (φk (y)) and φk (z) 6= φk (y), which occurs if and only if there exists 1 6 j 6 m + 1 such that φk (z) = (a, 0s1 w1 0s2 · · · wj−1 0sj +k · · · wm 0sm+1 ). This, in turn, can equivalently be stated as ψx (z) = ψx (y)+ej where ej is a unit vector. ∗ Corollary 5 For all y, z ∈ Dk∗ (x) it holds that y =⇒ z if k and only if ψx (y)  ψx (z). ∗ Proof: Using Lemma 4 we observe that y =⇒ z if and only if y = z (in which case ψx (y) = ψx (z)) or thus dk (·, ·) defines a metric on Znq for all n > k. ψx (z) = ψx (y) + III. R ECONSTRUCTION C ODES The reconstruction problem in the context of uniform tandem-duplication errors can be stated as follows: suppose data is encoded in C ⊆ Znq , and suppose we later are able to read distinct x0 , x1 , . . . , xN ∈ Dkt (c) for some specific c ∈ C and t ∈ N; can we uniquely identify c? As seen in [26], successful reconstruction is ensured if and only if the code C satisfies the following requirement: Znq Definition 1 Take N, t, n > 0. We say that C ⊆ is a uniform tandem-duplication reconstruction code, which we abbreviate as an (N, t, k)q -UTR code, if max |Dkt (c) ∩ Dkt (c′ )| 6 N. c,c′ ∈C c6=c′ for some unit vectors ej1 , . . . , ejt ∈ Nm+1 . The claim follows. Theorem 6 ψx is a poset isomorphism from  to Nm(x)+1 ,  . Definition 2 We let ψx : Dk∗ (x) → Nm+1 be defined by ψx (y) = σ(b′ ), where φk (y) = (a, b′ ). It was noted in the previous section that ψx is then an isometry from (Dk∗ (x), dk ) to Nm+1 , 12 k·k1 . Definition 3 We define on Nm+1 the partial order b′  b′′ if for every coordinate i = 1, . . . , m + 1 it holds that b′i 6 b′′i ( is the well-known product order).   ∗ Dk∗ (x), =⇒ k  Proof: Using Corollary 5 and thefact that Nm+1  ,  is a ∗ partially ordered set we observe that Dk∗ (x), =⇒ is also a k poset, and that ψx is a poset homomorphism. We have already noted that it is injective (as an isometry). Finally, note that ψx (x) = 0m+1 . Every element of Nm+1 can be decomposed into t X eju = ψx (x) + t X eju u=1 u=1 Throughout this section we fix some x ∈ Irrk , and denote φk (x) = (a, b). As noted above, for all y ∈ Dk∗ (x), we have φk (y) = (a, b′ ), with µ(b′ ) = b (hence, in particular, wtH (b′ ) = wtH (b)). We therefore denote m = m(x) = wtH (b) and make the following definition: eju u=1 In this section we find the size of intersection of descendant cones, and thereby evaluate the size of (N, t, k)q -UTR codes. A. The structure of descendant cones t X k for some unit vectors ej1 , . . . , ejt ∈ Nm+1 . By Lemma 4 we get a sequence x =⇒ y1 =⇒ · · · =⇒ yt k k k Pt such that ψx (yt ) = u=1 eju , thus ψx is also surjective. ∗ Thus, =⇒ endows Dk∗ (x) with a lattice structure; We k denote the join of y, z ∈ Dk∗ (x) as y ∨ z, and their meet y ∧ z. We have the following immediate results: Corollary 7 For all y, z ∈ Dk∗ (x), Dk∗ (y) ∩ Dk∗ (z) = Dk∗ (y ∨ z). Lemma 8 |Dkt (x)| = t+m(x) . m(x) Proof: By Lemma 4 we know that Dkt (x) = {y ∈ Dk∗ (x) | kψx (y)k1 = t}. 4 Since ψx : Dk∗ (x) → Nm(x)+1 is bijective, |Dkt (x)| equals the Pm+1 number of distinct integer solutions to j=1 xj = t, where x1 , . . . , xm+1 > 0 (equivalently, the number of distinct ways to distribute t identical balls into m(x) + 1 bins). Corollary 12 For n > |x|, C ⊆ Dk∗ (x) ∩ Znq is an (N, t, k)q UTR code if and only if B. Reconstruction from uniform tandem-duplication errors Proof: The claim follows from Lemma 8, Lemma 10. In other words, the intersection of a uniform-tandemduplication reconstruction code C with the descendant cone of any irreducible word Dk∗ (x) is simply an error-correcting code with suitable minimal distance. Note, however, that this doesn’t hold for C in general: the minimal distance is dependent on x, and also Dk∗ (x) ∩ Znq depends on |x|. We start by rephrasing the properties of descendant cones as seen in the previous section: Corollary 9 Suppose that x, x′ ∈ Irrk . Then the following conditions are equivalent: 1) m(x′ ) = m(x). ′ 2) For Dk∗ (x′ ) and y ∈  Dk∗ (x), it holds that  all y ∈  ∗ ∗ D∗ (y ′ ), =⇒ ∼ = D∗ (y), =⇒ . k k k k 3) For all t > 0, y ′ ∈ Dk∗ (x′ ) and y ∈ Dk∗ (x), it holds that |Dkt (y ′ )| = |Dkt (y)|. 4) There exist some t > 0, y ′ ∈ Dk∗ (x′ ) and y ∈ Dk∗ (x) such that |Dkt (y ′ )| = |Dkt (y)|. Proof: That (1) =⇒ (2) follows from Theorem 6. Implications (2) =⇒ (3) =⇒ (4) follow trivially. To show that (4) =⇒ (1), note by previous parts that Dk∗ (y ′ ) ∼ = Dk∗ (x′ ) and Dk∗ (y) ∼ = Dk∗ (x). In particular, we have t ′ t that |Dk (x )| = |Dk (x)|. Lemma 8 now implies (1). These observations allow us to classify the intersection size of descendant-cones. Lemma 10 For n > k, t > 0 and y1 , y2 ∈ Znq , t−dk (y1 ,y2 ) Dkt (y1 ) ∩ Dkt (y2 ) = Dk (Rk (y1 )) if y1 ∼k y2 and t > dk (y1 , y2 ), or Dkt (y1 ) ∩ Dkt (y2 ) = ∅ otherwise. Proof: As already noted, if y1 6∼k y2 or t < dk (y, z) we have Dkt (y) ∩ Dkt (z) = ∅. Otherwise, by Corollary 7 we have Dk∗ (y1 ) ∩ Dk∗ (y2 ) = Dk∗ (y1 ∨ y2 ). Note, then, that if z ∈ Dkt (y1 ) ∩ Dkt (y2 ) then y1 ∨ y2 t−dk (y1 ,y2 ) =⇒ k z, therefore t−dk (y1 ,y2 ) Dkt (y1 ) ∩ Dkt (y2 ) = Dk (y1 ∨ y2 ), and by Corollary 9 we have t−d (y ,y ) Dk k 1 2 (y1 t−d (y ,y ) ∨ y2 ) ∼ = Dk k 1 2 (Rk (y1 ∨ y2 )) t−dk (y1 ,y2 ) = Dk (Rk (y1 )). This allows us, using the following definition, to characterize (N, t, k)q -UTR codes. Definition 11 Take N, m > 0. We denote for t > 0     t−δ+m dN,t (m) = min δ ∈ N 6N m min dk (c, c′ ) > dN,t (m(x)), c,c′ ∈C c6=c′ C. Size of reconstruction codes In this section we aim to estimate the maximal size of (N, t, k)q -UTR codes. Definition 13 For m, r > 0 we denote   Xm+1 m+1 m+1 m xj = r , ∆r = (xi )i=1 ∈ N j=1 which we will call the (m, r)−simplex. Theorem 14 We take positive integers N, t and n > k. For C ⊆ Znq and x ∈ Irrk we denote Cx = C ∩ Dk∗ (x) and define r(x) = n−|x| k .   If Cx 6= ∅ then r(x) ∈ N and r(x) < nk . Moreover, C is an (N, t, k)q -UTR code if and only if for all x ∈ Irrk such m(x) that Cx 6= ∅, the image ψx (Cx ) ⊆ ∆r(x) satisfies  min 21 kc − c′ k1 c 6= c′ ∈ ψx (Cx ) > dN,t (m(x)). Proof: If C ∩ Dk∗ (x) 6= ∅ then it follows from the definitions that for some r ∈ N we have  |x|  + rk = n; since |x| > k, necessarily r = r(x) < nk . Furthermore, C ∩ Dk∗ (x) = C ∩ Dkr (x), hence we’ve seen in the proof of Theorem 6 that for all y ∈ Dkr (x) we have ψx (y) = Pr m(x) . u=1 eju ∈ ∆r To conclude the proof, we recall that for x, x′ ∈ Irrk we have Dk∗ (x) ∩ Dk∗ (x′ ) = ∅, and that ψx is a bijective isometry into Nm(x)+1 , 12 k·k1 . We therefore see that finding error-correcting codes for uniform tandem-duplication essentially amounts to finding error-correcting codes in the Manhattan metric over ∆m r . We start by notating the maximal size of such codes: Definition 15 For m, r > 0 and d > 0 we define o n ′ 1 kc − c k > d . M (m, r, d) = max |C| C ⊆ ∆m r , min 1 2 ′ c,c ∈C c6=c′ We now note that if C ⊆ Znq , x, x′ ∈ Irrk (n − rk) (i.e., r(x) = r(x′ ) = r) and m(x) = m(x′ ), then Dkn−rk (x) ∼ = Dkn−rk (x′ ) (through, e.g., ψx−1 ′ ◦ ψx ). It is therefore practical to assume |Cx | = |Cx′ | = M (m, r, dN,t (m)) for all such x, x′ . This results in the following corollary, which concludes this section: 5 Corollary 16 If C ⊆ Znq is an (N, t, k)q -UTR code, and for all x ∈ Irrk it holds that |Cx | = M (m, r, dN,t (m)), then |C| = = ⌊n/k⌋−1 X X r=0 m · M (m, r, dN,t (m)) X Xn b ∈ Zn−(r+1)k q r=0 since the size of each ball is invariant in r, x, we also denote B m (d) = B0m (d; 0) for ease of notation. |{x ∈ Irrk (n − rk) | m(x) = m}|· ⌊n/k⌋−1 b is (0,k−1)q - RLL wtH (b)=m m o · · M (m, r, dN,t (m)). P Proof: First, trivially, |C| = x∈Irrk |Cx |. Observe that x ∈ Irrk satisfies Cx 6= ∅, r(x) = r and m(x) = m, if and only if x ∈ Zqn−rk and in φk (x) = (a, b), b is (0, k − 1)q -RLL, and wtH (b) = m. The rest now follows from Theorem 14. IV. C ODES ON THE SIMPLEX WITH THE M ANHATTAN METRIC Corollary 16 motivates us to estimate the optimal size of error-correcting codes in the Manhattan metric over the (m, r)simplex. This section is dedicated to that question; a key component of which will be the evaluation of the requisite minimal distance dN,t (m). A. Sphere size In this section we evaluate the size of Manhattan-metric spheres in ∆m r , then establish the Gilbert-Varshamov bound in the asymptotic regime. Lemma 17 [28, Ch.10, Sec.11, Lem.7] For positive integers k < n it holds that   r r k k n n n 2nH ( n ) 6 2nH ( n ) 6 8πk(n − k) 2πk(n − k) k where H is the binary entropy function, defined H(p) = −p log2 p − (1 − p) log2 (1 − p). Proof: For all 0 < k < n we have n−1 6 k(n−k) 6 hence   1 1 n 1 1+ 6 < 1, 6 2πk(n − k) 2π n−1 π 1 n > . 8πk(n − k) 2πn n2 4 , Thus the claim trivially follows from Lemma 17. Definition 19 For 0 < m ∈ N and r ∈ Z, we denote the hyperplane   Xm+1 m+1 m+1 x = r , Am = (x ) ∈ Z i i i=1 r i=1 and omit r = 0 in A = Am 0 . Lemma 20 For d, m > 0 denote    min{d,m}  X m+1 d−1 m−k+d B m (d) = . k k−1 d k=1 then B m (d) 6 |B m (d)| 6 d · B m (d). Proof: We may count |B m (d)| in the following manner: 1 • Partition by distance from the origin 2 kxk1 = r; then m for each 0 6= x ∈ B (d) we have 1 6 r 6 d. • Further partition by the number k of strictly positive coordinates xi > 0; then 1 6 k 6 min{r, m}. • Choose positive coordinates, which may be done in  m+1 distinct ways. k Pk • Find the number of solutions to j=1 xij = r such that  r−1 each xij > 0. That is k−1 . • The remaining m + 1 − k coordinates are non-positive,  and their sum is −r. There are m−k+r such distinct r distributions. Thus, m |B (d)| = 1 + d X B m (r) r=1 min{d,m}  d    m+1 X r−1 m−k+r k k−1 r k=1 r=k   r−1 m−k+r It now suffices to note that k−1 is a strictly r increasing function of r, thus the claim is satisfied. In the following lemma we make an asymptotic evaluation of |B m (d)|: =1+ X Lemma 21 Take µ ∈ (0, 1) and fix d > 0. Suppose we’re given a sequence of dimensions (mn )n>0 such that limn→∞ mnn = µ. Then limn→∞ n1 log2 |B mn (d)| = 0. Lemma 18 For integers 0 < k < n it holds that       1 n k k − log2 (2πn) 6 log2 . < nH nH n 2 n k m We also denote the ball of radius d > 0 about x ∈ Am r as  m m 1 Br (d; x) = y ∈ Ar 2 ky − xk1 6 d ; Proof: For sufficiently large n we find that    d  X mn + 1 d − 1 mn − k + d mn B (d) = k k−1 d k=1     mn + 1 d−1 mn − 1 + d 6d· . 2 d d Thus using Lemma 18 it is straightforward to show that lim 1 n→∞ n log2 B mn (d) = 0. Recalling that by Lemma 20 we have |B mn (d)| 6 d · B mn (d), the proof is completed. We can now quickly state the Gilbert-Varshamov bounds on M (m, r, d): 6 Lemma 22 For m, r, d > 0 we have   r+m M (m, r, d) > |B m (d − 1)| . m Next, in order to bound dN,t , we first establish an upper bound on H(x): Proof: The proof is an application of Lemma 8 and the typical GV argument: if if C ⊆ ∆m r is a maximal code such 1 that for all x = 6 y ∈ C we have kx − yk1 > d, then ∆m r ⊆ 2 S m x∈C B (d − 1; x). Thus, we have the following: Theorem 23 Take µ ∈ (0, 1), ρ > 0 and integer sequences (mn )n>0 , (rn )n>0 such that limn→∞ mnn = µ and limn→∞ rnn = ρ. Also take a fixed d > 0. Then ! 1 1 . (1) lim log2 M (mn , rn , d) = (µ + ρ)H n→∞ n 1 + µρ Proof: We use Lemma 22 to find 1 n log2 |B mn (d − 1)| lim  t−δ q Proof: Using Lemma 26 we mayqbound H 1 + m 6 log2 N t−δ 2 t−δ we get m . Reordering the inequality 2 m 6 m n = On the other hand, since M (mn , rn , d) 6 ∆m rn Lemma 18 implies the reverse inequality. (log2 N )2 , 4m yielding the claim. OF RECONSTRUCTION CODES We can now determine the capacity of (N, t, k)q -codes, in some asymptotic regimes. We define the rate of of a family of codes (C n ), C n ⊆ Znq , as 1 log2 |B mn (d − 1)| = 0; n R(C n ) = lim sup n1 logq |C n |, rn +mn mn  , B. Minimal distance of reconstruction codes Next, given N, t > 0 and m > 0, we establish bounds on     t−δ+m dN,t (m) = min δ ∈ N 6N m seen in Definition 11. For ease of notation in what follows, we make the notation, for 1 6 x ∈ R:  H(x) = xH x1 . Lemma 24 If N 6 m then dN,t (m) = t. Proof:  We may verify by substitution that δ = t satisfies 6 N , while δ = t − 1 does not. Using the strict monotonicity of s 7→ s+m m , we’re done. t−δ+m m Lemma 25 For N > m > 0 and t > 0 it holds that     log2 N t−δ 6 . dN,t (m) 6 min δ ∈ N H 1 + m m Proof: Under the assumption, δ = t − 1 satisfies the inequality t−δ+m 6 N . Therefore we may restrict the m minimum to δ < t, giving 0 < m < (t − δ) + m. Now, Lemma 18 implies !     t−δ t−δ+m 1 log2 6m 1+ H , m m 1 + t−δ m which completes the proof. Theorem 27 Take N > m > 0. Then    (log2 N )2 dN,t (m) 6 max 1, t − . 4m V. C APACITY  Using Lemma 21 we know that n→∞ Proof: The claim can be restated by the substitution p = x1 as the known inequality H(p)2 6 4p(1 − p) (its proof follows elementary calculus, and is omitted here). Finally, δ > t− 1 n log2 M (mn , rn , d) >    rn + mn > lim sup n1 log2 − mn lim inf √ Lemma 26 For x > 1 it holds that H(x) 6 2 x − 1. and the capacity of (N, t, k)q -codes as the supremum of rates of families of such codes. Since [16] showed that Irrk (n) can correct any number of tandem-duplication errors, they are trivially (N, t, k)q -codes for all N, t. In this section we prove that reconstruction codes have strictly higher capacity. First,   we denote for any n, r ∈ N such that n > k and r < nk , and any N, t ∈ N MN,t (n, r) = X M (m, r, dN,t (m))· m n · b ∈ Zn−(r+1)k q b is (0,k−1)q - RLL wtH (b)=m o . We recall for all n, if rn = arg maxr MN,t (n, r), that by Corollary 16 we have an (N, t, k)q -code C ⊆ Znq with |C| > MN,t (n, rn ). On the other hand, for every such C it holds that |C| 6 nk MN,t (n, rn ). We therefore focus on maximizing lim sup n1 logq MN,t (n, rn ) by choice of rn . In what follows, we take γ ∈ (0, 1) and set rn = 1−γ k n−1 for any n ∈ N for which rn ∈ N; we shall assume that such n exist (hence, infinitely many exist), and refer only to such indinces. For all x ∈ Irrk (n − rn k) = Irrk (k + γn), recall that we denoted φk (x) = (a, b) with b ∈ Zγn q in (0, k − 1)q - RLL. We shall build a reconstruction code in the descendant cones of only such x, which we denote Cγ . Lemma 28  There exists a system S ⊆ (0, k − 1)q - RLL and θ ∈ 12 , 1 such that 1 l→∞ l cap S = lim logq S ∩ Zlq = cap (0, k − 1)q - RLL and for all b ∈ S it holds that wtH (b) > θ|b|. 7 Proof: Let Gq (k − 1) be the strongly connected deterministic digraph generating the system (0, k −1)q - RLL which adjacency matrix is  q−1  q − 1  . Tq (k − 1) =   ..  q − 1 q−1 0 As is well known for the case of q = 2 (see, e.g., [14], [36]), its characteristic polynomial is pq(k−1) (x) = xk − (q − 1) k−1 X xj = j=0 xk+1 − qxk + (q − 1) , x−1 hence the Perron eigenvalue λ of Tq (k − 1) is the unique (k−1) (x) = xk+1 − qxk + (q − 1) greater than positive root of p̂q 1 (in fact, λ ∈ (q−1, q), which can readily be confirmed either using elementary calculus or by information-thoretic methods, ∗ since (Zq \ {0}) ⊆ (0, k − 1)q - RLL ⊆ Z∗q ). Further, Tq (k − 1) has positive right- and left-eigenvectors associated with λ, which we denote v̄, w̄ respectively; specifically, v̄ = 1, λ − (q − 1), . . . , λj−1 − (q − 1) j−2 X λi , . . . , k−2 X i=0 λi ! v +(q−1)  l · P(e) − e terminates at first node ǫ k(q − 1) =⇒ λ > 2 − k(q − λ)  k−2 X  = l(π1 − ǫ) λ+k(q − λ) = q + (k − 1)(q − λ) > q > 2  k−1 X 1 k i k−1 λj  λ = λ − (q − 1) vk = λ − (q − 1) λ j=1 i=0 q−1 >0 λ X To conclude the proof, note and we may verify that = λk−1 − (q − 1) λ−1 . (Incidentally, it follows from and in particular π1 = λ−k(q−λ) q π1 ∈ (0, 1) that 1 < k(q − λ) < λ, that is, q − k+1 <λ< 1 q − k .) Next, recall that for a given ǫ > 0, a (P, ǫ)-stronglytypical path in G is a path γ = (e1 , e2 , . . . , el ) (denoted by its edges {e1 , e2 , . . . , el } ⊆ Eq (k − 1)) such that for each e ∈ Eq (k − 1) appears in the path l · τ times, for some τ satisfying |τ − P(e)| 6 ǫ. If we let Sǫ ⊆ Z∗q be the system ǫ induced by (P, k(q−1) )-strongly-typical paths, then it is well known that cap Sǫ = cap (0, k−1)q - RLL. Note, for b ∈ Sǫ of length |b| = l, which is generated by the path γ = (e1 , . . . , el ), wtH (b) is precisely the number of edges which terminate at ǫ )-strongly-typical, the first node; since γ is (P, k(q−1) wtH (b) > , k  X  λk−1 − λk−i λ−1 i=2    k q − 1 X k−i q−1 λ + = λk−1 1 + (k − 1) 1 − λ−1 λ − 1 i=2   k−2 q−1 X j q−1 k−1 + λ k − (k − 1) =λ λ−1 λ − 1 j=0   λk − (q − 1)λk−1 q−1 k−1 + k − (k − 1) =λ λ−1 λ−1 k−1 λ = [λ − k(q − λ)] λ−1 π̂i = λk−1 + i=0 . . . λk−1 − (q − 1)  w̄ = λk−1 , λk−2 , . . . , λk−j , . . . , 1 . k X i=1  ··· 0 ..  . 0 1   .. .. . 0 .  0 · · · 0 1 0 ··· ··· 0 1 Note, then, that , hence every entry of v̄ is indeed positive. and vj = j+1 λ v Denoting qi,j = (Tq (k − 1))i,j · λvji , it follows (see, e.g., [29][Sec. 3.5]) that Q = (qi,j )16i,j6k is stochastic, and represents a transition matrix of a stationary Markov chain P on Gq (k−1) (a probability measure on its edges set Eq (k−1)) satisfying H(P) = logq λ = cap (0, k − 1)q - RLL. Further, the stationary distribution ofP the Markov chain, i.e., a positive π̄ = (π1 , . . . , πk ) such that kj=1 πj = 1 and π̄ T Q = π̄ T , is π̂ given by πj = Pk j π̂ , where π̂ is defined by π̂j = wj vj . It P i=1 i holds for all j that πj is the sum of probabilities P(e) of edges terminating at the jth node. =⇒ 2(λ − 1) > λ − k(q − λ) =⇒ π1 > 1 2 Hence we can take any 0 < ǫ < π1 − 21 , and observe that S = Sǫ , θ = π1 − ǫ satisfy the proposition. Lemma 28 implies that there exists a subset Sk ⊆ Irrk such that cap Sk = cap Irrk , and for every x ∈ Sk of length |x| = k + γn we have m(x) > ⌈θ · γn⌉. For the rest of this section we only build codes Cγn in the descendant cones of roots in Sk . Note, then, that if we denote mn = ⌈θ · γn⌉ then the resulting codes have rate h R(Cγn ) > lim sup n1 logq |Irrk (k + γn)|· i · M (mn , rn , dN,t (mn )) = γ cap(Irrk )+ + lim sup n1 logq M (mn , rn , dN,t (mn )) (2) 8 Theorem 29 As before, we denote rn = ⌈θ · γn⌉. Then 1−γ k n−1 and mn = 1 (a) 0.8 lim n1 logq M (mn , rn , dNn ,tn (mn )) = n   θγ 1−γ ·H 1+ log2 q kθγ (b) 0.6 R = in both of the following two regimes: 1) When Nn = o(n) and tn = t is fixed. PSfrag replacements 2) When Nn = 2αn and tn = βn for constants α, β > 0 2 satisfying αβ > 4θγ (such that Nn , tn ∈ N for some, hence infinitely many, indices). 0.4 0.2 0 0 Proof: 1) Note, for sufficiently large n, that Nn < θ · γn 6 mn , resulting by Lemma 24 in dNn ,t (mn ) = t. We note that limn→∞ rnn = 1−γ and limn→∞ mnn = θγ, hence by k Theorem 23 the claim is proven when t is fixed. 2) By Theorem 27:    α2 n dNn ,tn (mn ) 6 max 1, βn − n 4⌈θ · γn⌉     α2 n n . = max 1, β − 4⌈θ · γn⌉ α2 β > 4θγ then for sufficiently large α2 n 4⌈θ·γn⌉ , hence dNn ,tn (mn ) = 1. Since it n we have β < is fixed, we may now apply the same argument used in the previous part. If Before moving on to show that generally R(Cγn ) may be made to exceed cap(Irrk ) by a careful choice of γ, we look at the following example. Example 30 Set√q = k = 2. Then the Perron eigenvalue of T2 (1) is λ = 1+2 5 , and √ ! 1+ 5 cap(Irr2 ) = log2 (λ) = log2 ≈ 0.6942. 2   In addition, any θ which is less than π1 = 21 1 + √15 ≈ 0.7236 satisfies Lemma 28. Alternatively, we may set q = 4 (for the special case of human DNA) and duplication-length k = √ 2. Now the Perron 3+ 21 eigenvalue of T4 (1) is given by λ = 2 , hence √ ! 3 + 21 ≈ 0.9613. cap(Irr2 ) = log4 (λ) = log4 2 Further, qwe may choose any θ which is less than π1 =  1 3 2 1+ 7 ≈ 0.8273. n R(Cγ ) is shown as a function of γ ∈ (0, 1) for both cases in Figure 1, under the assumptions of asymptotic regime made in Theorem 29. The figure demonstrates that the capacity of reconstruction codes (bounded from below by the maximum of the curve) is greater than cap(Irrk ).  We now attempt to maximize R(Cγn ) by a proper choice of γ. Theorem 29 motivates the following definition: 0.2 0.4 γ 0.6 0.8 1 Figure 1. Rate R(Cγn ) in the cases (a) q = k = 2, θ = 0.7236, and (b) q = 4, k = 2, θ = 0.8273. The value at γ = 1 equals cap(Irrk ), which was previously the best known construction. 1 2, 1  . We define R : (0, 1) → R   θγ 1−γ . R(γ) = γR + H 1+ log2 q kθγ Definition 31 Take R, θ ∈ by Analysis of R(γ) is simpler using the following change of variable: Definition 32 Define x : (0, 1) → (0, ∞) by x(γ) = 1−γ γ . We observe that x is a decreasing diffeomorphism, and γ = 1 1+x(γ) . Lemma 33 One has     x(γ) x(γ) R(γ) = γR + θγ 1 + logq 1 + kθ kθ   x(γ) x(γ) logq − kθ kθ  Proof: We observe that for all x > 0, log 1 + x1 =  log x+1 = log(x + 1) − log x; in particular x       1−γ 1−γ kθγ = logq 1 + − logq logq 1 + 1−γ kθγ kθγ Hence,   θγ 1−γ R(γ) =γR + ·H 1+ log2 q kθγ   1−γ =γR + θγ logq 1 + kθγ   kθγ 1−γ logq 1 + + k 1−γ     1−γ 1−γ logq 1 + =γR + θγ + k kθγ   1−γ 1−γ logq − k kθγ     1−γ 1−γ =γR + θγ 1 + logq 1 + kθγ kθγ   1−γ 1−γ − logq kθγ kθγ 9 We can now show that there always exists a choice of γ for which we get R(Cγn ) > cap(Irrk ): Theorem 34 maxγ∈(0,1) R(γ) > R. Proof: Observe that R(γ) is continuously differentiable and satisfies limγ→0 R(γ) = 0, limγ→1 R(γ) = R. We find    dx d θ x x ′ R (γ) =R + · 1+ logq 1 + dγ dx 1 + x kθ kθ    x x − logq kθ kθ x=x(γ)    −θ x x 1 logq 1 + 1+ =R − 2 γ (1 + x)2 kθ kθ   x x − logq kθ kθ    θ x 1 + · logq 1 + (1 + x) kθ kθ  x  1 logq − kθ kθ x=x(γ)      x(γ) x(γ) 1 (kθ − 1) logq 1 + + logq =R + k kθ kθ Thus, R′ (γ) = 0 if and only if  kθ−1 x(γ) x(γ) q −kR = 1 + · kθ kθ (3) This equation has a unique solution x0 = x(γ0 ), since the RHS is a monotonic increasing function of x, vanishing at x = 0 and unbounded as x grows. Moreover, 0 < x0 < kθ, since kθ > 1, hence the RHS is greater than 1 at x = kθ. Thus R(γ) has a unique local extremum in (0, 1). It now suffices to show that R(γ) is concave. Indeed,   x 1 dx d ′′ (kθ − 1) logq 1 + · R (γ) = k dγ dx kθ  x  + logq kθ x=x(γ)   kθ − 1 1 −1 <0 + = k ln(q)γ 2 kθ + x(γ) x(γ) Proof: For  fixed  x ∈ [0, ∞) define gx : (0, ∞) → R by gx (y) = y ln 1 + xy . Then     y x x −x x + − = ln 1 + · gx′ (y) = ln 1 + x 2 y 1+ y y y y+x   x x = − ln 1 − − x+y y+x   x x − > 0. >− − x+y y+x y  satisfies 1 + x = Therefore, fx (y) = egx (y) = 1 + xy  y fx (1) 6 fx (y) = 1 + xy for all y > 1. In our case kθ > 1 and x0 satisfies Equation 3, hence  1 + x0 x0 x0 + x20 x0 kθ−1 x0 > = q −Rk = 1 + x0 · kθ kθ 1 + kθ kθ kθ + x0  which we simplify to 0 > x20 + 1 − q −Rk x0 − kθq −Rk . Thus, the first upper bound is proven. For √ the second, we a , require only that for a, b > 0 it holds that a + b2 − b 6 2b which is readily shown by differentiation. On the other hand, Equation 3 implies that x0 6 kθ. Therefore  x0 x0 kθ−1 x0 2kθ · q −Rk = 1 + 6 kθ kθ 1 + xkθ0 kθ  ⇐⇒ kθq −Rk 6 2kθ − q −Rk x0 which proves the lower bound. Next, we show that we may tighten the bounds we derived in the previous lemma. Lemma 36 Let x0 > 0 be the unique solution to Equation 3, and denote z0 = xkθ0 . If z 6 z0 6 z then F (z) 6 z0 6 F (z), where q −Rk F (z) =  kθ−1 . q−Rk 1 + (1+z)kθ−1 kθ−1 It follows that R(γ0 ) > limγ→1 R(γ) = R. Thus, the main result of this paper is established. In what remains of this section we show that we can analytically find γ0 which maximizes R(γ). We begin by establishing bounds in the following lemma. Proof: By assumption we have q −Rk = (1 + z0 ) ·z0 , kθ−1 hence q −Rk 6 (1 + z) · z0 , implying that z0 > G(z) q−Rk where G(z) = (1+z) kθ−1 . Similarly, z0 6 G(z). The proposition now trivially follows for F (z) = G(G(z)). Lemma 35 Let γ0 ∈ (0, 1) be the unique maximum of R(γ), and denote x0 = x(γ0 ). Then Finally, we can show that x0 may be found by the following limiting process: x0 > and x0 6 1 2 kθ k (2θ q R ) Theorem 37 The unique solution to Equation 3 is given by x0 = kθ limn→∞ F n (z1 ), for all z1 ∈ [0, 1]. −1 q   2 (1 − q −Rk ) + kθq 2−Rk − 1 − q −Rk 6 kθq 2 . 4(q Rk − 1) Proof: As before, we denote the unique solution x0 > 0, x0 . and take z0 = kθ Note that Lemma 36 implies that z0 = F (z0 ). We will prove that F : [0, 1] → [0, 1] is a contraction; that is, for all z1 , z2 ∈ 10 [0, 1] we have |F (z1 ) − F (z2 )| 6 c|z1 − z2 | for some c < 1. Indeed, recalling kθ > 1 we find F ′ (z) = 6 2−2Rk (kθ − 1)2  kθ q−Rk (1 + z)kθ 1 + (1+z) kθ−1 (k − 1)2 9 (kθ − 1)2 6 6 < 1, 2R k k (2 ) 2 16 where the next to last inequality may be directly verified for all small k. Having done so, we utilize Banach’s fixed-point theorem to deduce that F has a unique fixed point (necessarily z0 ), and for all z1 ∈ [0, 1], defining zn+1 = F (zn ) we get limn→∞ zn = z0 . VI. C ONCLUSION We have proposed that reconstruction codes can be applied to data-storage in the DNA of living organisms, due to the channel’s inherent property of data replication. We have showed, under the assumption of uniform tandem-duplication noise, that reconstruction codes are errorcorrecting codes with minimal distance dependent on the reconstruction parameters. We then proved the existence of such codes with rates surpassing that of know error-correcting codes. In particular, Theorem 37 allows us to find the parameters required for code-design in any real application, such that the resulting code has optimal rate. We believe that further research should focus on explicit code constructions. It is also desirable to examine the problem under broader noise models, such as bounded tandemduplication, interspersed-duplication (perhaps inversed), as well as combinations of multiple error models. R EFERENCES [1] J. Acharya, H. Das, O. Milenkovic, A. Orlitsky, and S. Pan, “String reconstruction from substring compositions,” SIAM J. Discrete Math., vol. 29, no. 3, pp. 1340–1371, 2015. [2] N. Alon, J. Bruck, F. F. Hassanazadeh, and S. Jain, “Duplication distance to the root for binary sequences,” IEEE Transactions on Information Theory, vol. PP, no. 99, pp. 1–1, 2017. [3] M. Arita and Y. Ohashi, “Secret signatures inside genomic DNA,” Biotechnology Progress, vol. 20, no. 5, pp. 1605–1607, 2004. [4] F. Balado, “Capacity of DNA data embedding under substitution mutations,” IEEE Trans. on Inform. Theory, vol. 59, no. 2, pp. 928–941, Feb. 2013. [5] Y. Cassuto and M. Blaum, “Codes for symbol-pair read channels,” IEEE Transactions on Information Theory, vol. 57, no. 12, pp. 8011–8020, Dec 2011. [6] G. M. Church, Y. Gao, and S. Kosuri, “Next-generation digital information storage in DNA,” Science, vol. 337, no. 6102, pp. 1628–1628, 2012. [7] C. T. Clelland, V. Risca, and C. Bancroft, “Hiding messages in DNA microdots,” Nature, vol. 399, no. 6736, pp. 533–534, 1999. [8] O. Elishco, F. Farnoud, M. Schwartz, and J. Bruck, “The capacity of some Pólya string models,” in Proceedings of the 2016 IEEE International Symposium on Information Theory (ISIT2016), Barcelona, Spain, July 2016, pp. 270–274. [9] F. Farnoud, M. Schwartz, and J. Bruck, “A stochastic model for genomic interspersed duplication,” in Proceedings of the 2015 IEEE International Symposium on Information Theory (ISIT2015), Hong Kong, China, Jun. 2015, pp. 904–908. [10] R. Gabrys, H. M. Kiah, and O. Milenkovic, “Asymmetric Lee distance codes for DNA-based storage,” IEEE Trans. Information Theory, vol. 63, no. 8, pp. 4982–4995, Aug 2017. [11] R. Gabrys, E. Yaakobi, and O. Milenkovic, “Codes in the Damerau distance for DNA storage,” in Proceedings of the 2016 IEEE International Symposium on Information Theory (ISIT2016), Barcelona, Spain, July 2016, pp. 2644–2648. [12] F. F. Hassanzadeh, M. Schwartz, and J. Bruck, “The capacity of stringduplication systems,” IEEE Trans. on Inform. Theory, vol. 62, no. 2, pp. 811–824, Feb 2016. [13] D. Heider and A. Barnekow, “DNA-based watermarks using the DNACrypt algorithm,” BMC Bioinformatics, vol. 8, no. 1, pp. 1–10, 2007. [14] T. D. Howell, “Statistical properties of selected recording codes,” IBM Journal of Research and Development, vol. 33, no. 1, pp. 60–73, Jan 1989. [15] S. Jain, F. F. Hassanzadeh, and J. Bruck, “Capacity and expressiveness of genomic tandem duplication,” IEEE Transactions on Information Theory, vol. 63, no. 10, pp. 6129–6138, Oct 2017. [16] S. Jain, F. F. Hassanzadeh, M. Schwartz, and J. Bruck, “Duplicationcorrecting codes for data storage in the DNA of living organisms,” IEEE Trans. Information Theory, vol. 63, no. 8, pp. 4996–5010, 2017. [17] ——, “Noise and uncertainty in string-duplication systems,” in Proceedings of the 2017 IEEE International Symposium on Information Theory (ISIT2017), Aachen, Germany, June 2017, pp. 3120–3124. [18] D. C. Jupiter, T. A. Ficht, J. Samuel, Q.-M. Qin, and P. de Figueiredo, “DNA watermarking of infectious agents: Progress and prospects,” PLoS Pathog, vol. 6, no. 6, p. e1000950, 2010. [19] H. M. Kiah, G. J. Puleo, and O. Milenkovic, “Codes for DNA sequence profiles,” IEEE Trans. on Inform. Theory, vol. 62, no. 6, pp. 3125–3146, June 2016. [20] E. Konstantinova, “Reconstruction of permutations distorted by single reversal errors,” Discrete Appl. Math., vol. 155, pp. 2426–2434, 2007. [21] ——, “On reconstruction of signed permutations distorted by reversal errors,” Discrete Math., vol. 308, pp. 974–984, 2008. [22] E. Konstantinova, V. Levenshtein, and J. Siemons, “Reconstruction of permutations distorted by single transposition errors,” arXiv preprint arXiv:math/0702191, 2007. [23] P. Leupold, C. Martín-Vide, and V. Mitrana, “Uniformly bounded duplication languages,” Discrete Appl. Math., vol. 146, no. 3, pp. 301– 310, 2005. [24] V. I. Levenshtein, E. Konstantinova, E. Konstantinov, and S. Molodtsov, “Reconstruction of a graph from 2-vicinities of its vertices,” Discrete Appl. Math., vol. 156, pp. 1399–1406, 2008. [25] V. I. Levenshtein and J. Siemons, “Error graphs and the reconstruction of elements in graphs,” J. Combin. Theory Ser. A, vol. 116, pp. 795–815, 2009. [26] V. I. Levenshtein, “Efficient reconstruction of sequences,” IEEE Trans. on Inform. Theory, vol. 47, no. 1, pp. 2–22, Jan 2001. [27] M. Liss, D. Daubert, K. Brunner, K. Kliche, U. Hammes, A. Leiherer, and R. Wagner, “Embedding permanent watermarks in synthetic genes,” PLoS ONE, vol. 7, no. 8, p. e42465, 2012. [28] F. J. MacWilliams and N. J. A. Sloane, The Theory of Error-Correcting Codes. North-Holland, 1978. [29] B. H. Marcus, R. M. Roth, and P. H. Siegel, “An introduction to coding for constrained systems,” Oct 2001, unpublished Lecture Notes. [Online]. Available: ronny.cswp.cs.technion.ac.il/wp-content/uploads/sites/54/2016/05/chapters1-9.pdf [30] N. Raviv, M. Schwartz, and E. Yaakobi, “Rank modulation codes for DNA storage,” in Proceedings of the 2017 IEEE International Symposium on Information Theory (ISIT2017), Aachen, Germany, June 2017, pp. 3125–3129. [31] S. L. Shipman, J. Nivala, J. D. Macklis, and G. M. Church, “CRISPRCas encoding of a digital movie into the genomes of a population of living bacteria,” Nature, vol. 547, p. 345, Jul. 2017. [32] I. Shomorony, T. A. Courtade, and D. Tse, “Fundamental limits of genome assembly under an adversarial erasure model,” IEEE Transactions on Molecular, Biological and Multi-Scale Communications, vol. 2, no. 2, pp. 199–208, Dec. 2016. [33] P. C. Wong, K. k. Wong, and H. Foote, “Organic data memory using the DNA approach,” Commun. ACM, vol. 46, no. 1, pp. 95–98, Jan. 2003. [34] E. Yaakobi, J. Bruck, and P. H. Siegel, “Decoding of cyclic codes over symbol-pair read channels,” in Proceedings of the 2012 IEEE International Symposium on Information Theory (ISIT2012), Cambridge, MA, USA, July 2012, pp. 2891–2895. [35] E. Yaakobi and J. Bruck, “On the uncertainty of information retrieval in associative memories,” in Proceedings of the 2012 IEEE International Symposium on Information Theory (ISIT2012), Cambridge, MA, USA, Jul. 2012, pp. 106–110. [36] E. Zehavi and J. K. Wolf, “On runlength codes,” IEEE Trans. on Inform. Theory, vol. 34, no. 1, pp. 45–54, Jan 1988.
7cs.IT
CROSSED-PRODUCTS BY LOCALLY COMPACT GROUPS: INTERMEDIATE SUBFACTORS arXiv:1611.10121v2 [math.OA] 2 Dec 2016 RÉMI BOUTONNET & ARNAUD BROTHIER Abstract. We study actions of locally compact groups on von Neumann factors and the associated crossed-product von Neumann algebras. In the setting of totally disconnected groups we provide sufficient conditions on an action G y Q ensuring that the inclusion Q ⊂ Q ⋊ G is irreducible and that every intermediate subfactor is of the form Q ⋊ H for a closed subgroup H < G. This partially generalizes a result of Izumi-Longo-Popa [ILP98] and Choda [Ch78]. We moreover show that one can not hope to use their strategy for non-discrete groups. 1. Introduction In the theory of von Neumann algebras, the crossed-product construction associates to an action of a locally compact group G on a von Neumann algebra Q a new von Neumann algebra, denoted by Q ⋊ G, which encodes the action (to some extent). This construction goes back to Murray and von Neumann [MvN36] in the case of state preserving actions of countable groups on abelian von Neumann algebras, and was called the group measure-space construction. Thus crossed-product algebras appear as one of the most basic examples of von Neumann algebras. In the case of actions of discrete groups, elementary properties of these crossed-product algebras are quite well understood. For instance: (A) If Q is abelian, Q = L∞ (X, µ), and if the corresponding non-singular G-action on (X, µ) is essentially free then Q′ ∩ (Q ⋊ G) ⊂ Q, so that the crossed-product Q ⋊ G is a factor if and only if the action is ergodic. (B) If Q is a factor, then Q′ ∩ (Q ⋊ G) = C if and only if the action is properly outer, meaning that for all g ∈ G, the corresponding automorphism of Q is not inner. Moreover, in both settings one can completely describe all the intermediate subalgebras between Q and Q ⋊ G. Hybrid cases combining aspects of cases (A) and (B) above have been considered recently in [CS16] In the case of non-discrete groups the picture is not as nice. The main difference is that there is no “Fourier decomposition” of elements Q ⋊ G. Namely, not every element of x ∈ Q ⋊ G can be represented as an L2 -element x ∈ L2 (Q) ⊗ L2 (G). Nevertheless, in the setting (A) above of actions on abelian algebras there are some satisfying results. Sauvageot showed in [Sa77, Section 2] that the equivalence between Q′ ∩ (Q ⋊ G) ⊂ Q and the action G y (X, µ) being essentially free still holds. Moreover, in the case of state preserving actions of unimodular groups, a powerful tool is available: the so-called crossedsection equivalence relation. It relies on the observation that appropriate II1 corners of Q ⋊ G can be described by an explicit equivalence relation. We refer to [KPV14] for details and references. In this article we will be interested in the setting (B) of actions on factors. An action G y Q of a locally compact group G on a factor Q is called strictly outer if Q′ ∩ (Q ⋊ G) = C. It is known in this case that properly outer actions need not be strictly outer. As we will see, assuming The first author was partially supported by a PEPS grant from INSMI and the second author was partially supported by NSF Grant DMS-1362138. 1 2 RÉMI BOUTONNET & ARNAUD BROTHIER that the action is strictly outer allows to deduce more conclusions. For instance we will see that it implies that the normalizer of Q inside Q ⋊ G is the semi-direct product U (Q) ⋊ G, see Corollary 3.11. In particular we will derive as in the discrete case that for strictly outer actions the pairs Q ⊂ Q ⋊ G completely characterize the actions up to cocycle conjugacy. We refer to [Va05, Theorem 5.1] for examples of strictly outer actions. We will also give a new criterion providing more examples in Proposition 4.4. Our main goal is to prove an intermediate subfactor theorem. Namely we will provide examples of strictly outer actions of non-discrete groups that satisfy the following property. Definition. We will say that a strictly outer action G y Q of a locally compact group on a factor Q satisfies the Intermediate Subfactor Property if any subfactor of Q ⋊ G, containing Q is of the form Q ⋊ H for some closed subgroup H < G. In the case of outer actions of discrete groups, Choda [Ch78] proved such an intermediate subfactor property under the extra assumption that the intermediate subfactor is the range of a normal conditional expectation on Q ⋊ G. Then Izumi-Longo-Popa [ILP98] were able to show that the existence of such a conditional expectation is automatic for crossed-products by discrete groups. So the result is known for discrete groups. Unfortunately, as we discuss below, there is no hope to adapt this strategy for general locally compact groups. In fact, the general situation is analytically much harder to handle precisely because conditional expectations need not exist in general. Our main result relies on a very different approach inspired from II1 -factor techniques. We will restrict our attention to actions of totally disconnected groups. This will allow us to use Fourier decomposition arguments. Here is the statement. Theorem A. Consider an action σ : G y Q of a totally disconnected locally compact group G on a semi-finite factor Q. Assume that σ is properly outer relative to a compact open subgroup K0 < G whose action is minimal. Then σ satisfies the Intermediate Subfactor Property. We refer to Section 2.5 for the definition of a minimal action and to Definition 4.5 for the notion of relatively properly outer action. Theorem A applies to Bernoulli shifts G y (⊗G/K Q0 ) where Q0 is an arbitrary II1 -factor, and K is any compact open subgroup of G, see Section 4.4. For instance if G is a closed subgroup of automorphisms of a locally finite tree T , and if G acts transitively on T , then the Bernoulli shift action G y (⊗T Q0 ) satisfies the Intermediate Subfactor Property. We refer to Section 4.4 for more examples. As we mentioned above this result is not a simple generalization of the discrete case, even if Q is tracial, because in general an intermediate subalgebra Q ⊂ N ⊂ Q ⋊ G does not behave well from the Hilbert theory perspective. Nevertheless we still manage to use Hilbert techniques to perform the proof. Our approach relies on two ingredients. The first one is an averaging argument. This is where the semi-finiteness assumption on Q will be used. As we will see in Remark 4.13, this technique also allows to deal with some actions on type III factors Q, but we need to make an assumption that there is a G-invariant state on Q that has a large centralizer. Our second ingredient is an extension of the notion of support defined by Eymard [Ey64]. In the language of quantum groups, the support of an element of Q ⋊ G is the spectrum of the dual action. In the setting of totally disconnected groups, this notion is particularly well suited, see for instance the proof of Proposition 4.4. The key fact that we will use in the proof of Theorem A is that an element whose support is contained in some closed subgroup H < G actually belongs to the subalgebra Q ⋊ H ⊂ Q ⋊ G. This result is certainly known to experts CROSSED-PRODUCTS BY LOCALLY COMPACT GROUPS 3 in quantum groups, but as we were not able to find an explicit reference, we will provide a self contained proof in Section 3. In view of Theorem A and Remark 4.13 we make the following general conjecture. Conjecture. Any strictly outer action G y Q on a factor (of any type) satisfies the Intermediate Subfactor Property. Remark. The conjecture holds in full generality for compact groups. Indeed, if K is a compact group and K y Q is a strictly outer action on an arbitrary von Neumann algebra, then the pair Q ⊂ Q ⋊ K can be identified with the basic construction of the inclusion QK ⊂ Q. This result was showed more generally for integrable (strictly outer) actions of locally compact groups by Vaes, [Va01, Theorem 5.3]. Moreover, by [ILP98, Theorem 3.15], every intermediate subfactor of the inclusion QK ⊂ Q is of the form QL form some closed subgroup L < K. Combining these two facts indeed yells that K y Q satisfies the Intermediate Subfactor Property. Going back to general (not necessarily compact) groups, can one prove the conjecture even when Q is tracial and G is an arbitrary locally compact group? As we mentioned, Remark 4.13 allows to produce actions on type III factors. But the condition on large centralizers that we need is never fulfilled in the case of actions on factors of type III0 . This raises the following question. Question 1. Can one provide an explicit example of a strictly outer action (of a non-discrete group) on a type III0 -factor that satisfies the Intermediate Subfactor Property? We discuss in Section 5 the (im)possibility to solve the above conjecture by generalizing the work of Izumi-Longo-Popa. Namely, we completely characterize in the case of arbitrary strictly outer actions G y Q, existence of normal conditional expectation and operator valued weight for an inclusion Q ⋊ H ⊂ Q ⋊ G, where H is a closed subgroup of G. Theorem B. Consider a strictly outer action G y Q on an arbitrary von Neumann algebra Q and take a closed subgroup H < G. Then we have the following characterizations. (1) There exists a normal faithful semi-finite operator valued weight T ∈ P(Q ⋊ G, Q ⋊ H) if and only if the modular functions δG and δH coincide on H. (2) The inclusion Q ⋊ H ⊂ Q ⋊ G is with expectation if and only if H is open inside G. For both parts in the above theorem, the only if parts follow easily from modular theory. Namely both conditions are easily seen to imply the existence of an operator valued weight and conditional expectation, respectively. Our main contribution is to show that they are actually necessary. Note that that for non-strictly outer actions there can exist conditional expectations although H is not open inside G. For instance, consider a product G = G1 × G2 , with the trivial action G y C. Assume that G2 is second countable and not discrete. Then G1 is not open inside G but any faithful normal state on LG2 gives rise to a conditional expectation from LG ≃ LG1 ⊗ LG2 onto LG1 . On the other hand we do not know whether the above characterization regarding existence of normal faithful semi-finite operator valued weights holds for arbitrary actions (not necessarily strictly outer). Next, we will show that nevertheless the strategy of Izumi-Longo-Popa and Choda can be applied to some intermediate subfactors, yielding the following result. We will also mention applications to crossed-products by Hecke pairs of groups, see Corollary 5.7. Theorem C. Consider an arbitrary strictly outer action G y Q and a compact open subgroup K < G. Then any subfactor of Q ⋊ G containing Q ⋊ K is of the form Q ⋊ H for some intermediate subgroup H; K < H < G. 4 RÉMI BOUTONNET & ARNAUD BROTHIER Going back to the conjecture, let us finally mention another partial result. It is about intermediate subfactors that are globally invariant under the dual action ∆Q : Q ⋊ G → (Q ⋊ G) ⊗ LG. Namely if Q is a factor and if N is an intermediate subfactor such that ∆Q (N ) ⊂ N ⊗ LG, then N is of the form Q ⋊ H for some closed subgroup H < G, see for instance [NT79, Chapter VII.2]. Question 2. Consider a strictly outer action α of a locally compact quantum group (M, ∆) on a factor N . Can one show that any von Neumann subalgebra Q ⊂ M ⋉α N containing N is globally invariant under the dual action? We refer to [Va05] for definitions. We mention that the Remark above also applies in the quantum setting. Namely, Vaes’ result [Va01, Theorem 5.3] is valid in the general quantum setting, while the correspondence result of Izumi-Longo-Popa [ILP98, Theorem 3.15] was generalized by Tomatsu to the quantum setting in [To08]. Acknowledgement. This work was initiated during the trimester Von Neumann algebras held at the Hausdorff Institute in Spring 2016. Parts of this work are also due to discussions during the Conference in the memory of Uffe Haagerup held in Copenhagen in June 2016 and during the Oberwolfach meeting on C∗ -algebras in August 2016. We warmly thank the organizers of all these events. The second author was invited at the Mathematical Institute of Bordeaux in September 2016. He gratefully acknowledges the kind hospitality he received. Mathematically, we are grateful to Sven Raum for interesting discussions and for pointing out [Ey64] to us regarding the notion of support. We are also indebted to Amaury Freslon for explaining to us part of the history on quantum groups related to this work and for providing references. Theorem B were motivated by discussions of the first author with Hiroshi Ando and Cyril Houdayer. Many thanks to them. We thank Narutaka Ozawa and Yoshimichi Ueda for helpful comments on a previous version of this preprint. Contents 1. Introduction 1 2. Preliminaries 4 3. Support and applications 8 4. Crossed-products by actions of totally disconnected groups 13 5. Existence of conditional expectations and operator valued weights 20 References 28 2. Preliminaries 2.1. General notations. In all the article, the letter G refers to a locally compact1 group; mG denotes a Haar measure on G, and δG the modular function of G. When we consider L2 -spaces it is always meant with respect to the measure mG . When integrating functions on G, we will sometimes use the notation ds instead of dmG (s), s ∈ G. The left regular representation of G on L2 (G) is denoted by λG . 1We follow the French convention according to which the locally compact assumption also contains the Hausdorff axiom. CROSSED-PRODUCTS BY LOCALLY COMPACT GROUPS 5 The letter Q refers to an arbitrary von Neumann algebra on which G acts. The action will be denoted by G y Q, and called generically σ. By an action, we mean an ultraweakly continuous homomorphism from G into the automorphism group of Q. Given a von Neumann algebra M represented on a Hilbert space H, M ′ denotes its commutant, (M )1 its unit ball in the operator norm, U (M ) its unitary group and Aut(M ) its automorphism group. We denote by S(M ) and P(M ) the set of normal faithful states on M and the set of normal faithful semi-finite weights (nfs weights for short), respectively. For any p weight Φ ∈ P(Q), consider the left ideal nΦ (M ) = {x ∈ M | Φ(x∗ x) < ∞}, on which x 7→ Φ(x∗ x) defines a norm k · kΦ . We denote by L2 (M, Φ) the Hilbert space completion of nΦ (M ) and we write ΛΦ the inclusion map ΛΦ : nΦ (M ) → L2 (M, Φ). 2.2. Group actions and crossed-product von Neumann algebras. Let us give the precise definition of our main object of study. We refer to [Ta03, Chapter X] and [Ha77a, Ha77b] for details about the facts below. Definition 2.1. Fix an action G y Q and represent Q on a Hilbert space H. The crossedproduct von Neumann algebra, denoted by Q ⋊ G, is the von Neumann algebra on L2 (G, H) generated by the operators {π(x) , x ∈ Q} and {us , s ∈ G} defined by the formulae: (π(x)ξ)(t) = σt−1 (x)ξ(t) and (us ξ)(t) = ξ(s−1 t), for all ξ ∈ L2 (G, H). For notational simplicity we will often omit the π and identify π(Q) with Q in the above definition. Throughout the article we will always assume that Q is standardly represented on H, with conjugation operator J and positive cone P. In this case, we abuse with notations and denote again by σ : g ∈ G → σg ∈ U (H) the canonical implementation of the action G y Q, see [Ha75]. Then for all g ∈ G the operator ρG (g) on L2 (G, H) defined as follows lies in the commutant of Q ⋊ G: (2.1) ρG (g)(f )(s) = δG (g)1/2 σg (f (sg)), for all s ∈ G, f ∈ L2 (G, H). Denote by K(G, Q) the ∗-algebra of compactly supported, ∗-ultrastrongly continuous functions, endowed with product and involution given by the formulae Z σs (F1 (ts))F2 (s−1 ) ds and F1∗ (t) = δG (t)−1 σt−1 (F1 (t−1 )∗ ), (F1 · F2 )(t) = G for all F1 , F2 ∈ K(G, Q), t ∈ G. The algebra K(G, Q) is also a two sided Q-module with actions (x · F )(t) = σt−1 (x)F (t), R for all F ∈ K(G, Q), x ∈ Q, t ∈ G. The map F 7→ G us F (s) ds defines a Q-bimodular embedding of K(G, Q) into the crossed-product Q ⋊ G. In this way K(G, Q) is viewed as an ultraweakly dense ∗-subalgebra of Q ⋊ G. (F · x)(t) = F (t)x and 2.3. Crossed-products by subgroups. Given a subgroup H of G, one can restrict any action G y Q to an action H y Q. In the case where H < G is closed inside G, then the von Neumann subalgebra of Q ⋊ G generated by Q and by the unitaries uh , h ∈ H, is isomorphic to Q ⋊ H. This can be seen using induced representations, see [Ta03, Chapter X.4]. With the same tools one can also compute the commutant of Q ⋊ H inside B(L2 (G, H)). Theorem 2.2 ([NT79], Theorem VII.1.1). The commutant of Q⋊H inside B(L2 (G, H)) is the von Neumann algebra generated by the commutant of Q ⋊ G and the subalgebra L∞ (H\G) ⊂ L∞ (G) consisting of left-H-invariant functions on G. Equivalently, Q ⋊ H = (Q ⋊ G) ∩ L∞ (H\G)′ . 6 RÉMI BOUTONNET & ARNAUD BROTHIER Remark 2.3. Using the J-map, the above theorem also allows to compute the basic construction hQ ⋊ G, Q ⋊ Hi of the inclusion Q ⋊ H ⊂ Q ⋊ G. In fact this description gives the isomorphism hQ ⋊ G, Q ⋊ Hi ≃ (L∞ (G/H) ⊗ Q) ⋊ G, where G acts diagonally. 2.4. Modular theory and operator valued weights. Given a von Neumann algebra M , the modular flow of a weight Φ ∈ P(M ) is denoted by σtΦ ∈ Aut(M ), t ∈ R. The centralizer of Φ in M is the subalgebra of elements fixed by the flow (σtΦ )t , it is denoted by QΦ . If ψ ∈ P(M ) is another weight, (Dψ : DΦ)t , t ∈ R, denotes the Connes Radon-Nikodym derivate as defined in [Co73, Section 1.2]. We will need the following simple Lemma. Lemma 2.4. Consider a von Neumann algebra M , two weights Φ, Ψ ∈ P(M ), and an automorphism θ ∈ Aut(M ). Then (DΨ ◦ θ : DΦ ◦ θ)t = θ −1 ((DΨ : DΦ)t ), for all t ∈ R. Proof. Denote by (ei,j )1≤i,j≤2 the canonical basis of M2 (C). Put M̃ := M ⊗ M2 (C), and define ϕ ∈ P(M̃ ) by the formula   2 X xi,j ⊗ ei,j  = Φ(x1,1 ) + Ψ(x2,2 ), for all xi,j ∈ M. ϕ i,j=1 Note that the weight on M̃ associated in a similar manner to Φ ◦ θ and Ψ ◦ θ is ϕ ◦ (θ ⊗ id). By the definition of Connes Radon-Nikodym derivative [Co73, Lemme 1.2.2], we have for all t ∈ R, (DΨ : DΦ)t ⊗ e2,1 = σtϕ (1 ⊗ e2,1 ) ϕ◦(θ⊗id) and (DΨ ◦ θ : DΦ ◦ θ)t = σt The KMS condition, see [Ta03, Chapter VIII.1], implies for all t ∈ R. The lemma easily follows. ϕ◦(θ⊗id) σt (1 ⊗ e2,1 ). = (θ ⊗ id)−1 ◦ σtϕ ◦ (θ ⊗ id)  The notions of modular group and Connes Radon-Nikodym derivative have been defined for normal faithful conditional expectations in [CD75]. We will need the extended definition for operator valued weights defined by Haagerup [Ha77d]. Let us fix some notations and recall known facts about operator valued weights. We refer to [Ha77c, Ha77d] for precise definitions and proofs. If N ⊂ M is an inclusion of von Neumann algebras, then we denote by P(M, N ) the set of nfs operator valued weights from M to N . Given T ∈ P(M, N ), we set nT (M ) := {x ∈ M | T (x∗ x) ∈ N }. One can define the composition Φ ◦ T of a weight T ∈ P(M, N ), with an nfs weight Φ ∈ P(N ); the resulting weight Φ ◦ T is again normal faithful semi-finite. More generally, it makes sense to compose operator valued weights: if M1 ⊂ M2 ⊂ M3 are von Neumann algebras and S ∈ P(M3 , M2 ), T ∈ P(M2 , M1 ) then one can naturally define T ◦ S ∈ P(M3 , M1 ) in such a way that for all Φ ∈ P(M1 ), we have Φ ◦ (T ◦ S) = (Φ ◦ T ) ◦ S. If T ∈ P(M, N ) and Φ ∈ P(N ), then for all t ∈ R, the modular automorphism σtΦ◦T associated to the weight Φ ◦ T leaves the von Neumann subalgebra N c := N ′ ∩ M globally invariant, and its restriction to N c does not depend on the choice of Φ. This restriction is called the modular flow of T , denoted by σtT . Moreover, if S ∈ P(M, N ) is another operator valued weight then for all t ∈ R, the Connes Radon-Nikodym derivative (D(Φ ◦ S) : D(Φ ◦ T ))t is an element of N c that does not depend on Φ. It is then denoted by (DS : DT )t and called the Connes Radon-Nikodym derivative at time t. If P(M, N ) is non-empty then P(N ′ , M ′ ) is non-empty. In particular in this case P(M1 , M ) is non-empty as well, where M1 denotes the Jones basic construction of the inclusion N ⊂ M , see b ∈ P(M1 , M ) such that E(e) b [Jo83]. Better, if N ⊂ M is with expectation E there exists E = 1, CROSSED-PRODUCTS BY LOCALLY COMPACT GROUPS 7 b is called the dual where e is the Jones projection associated with E, see [Ko85, Lemma 3.1]. E operator valued weight. Finally, consider an action G y Q. By [Ha77b, Theorem 3.1], there exists a unique operator valued weight TQ ∈ P(Q ⋊ G, Q) such that for all F ∈ K(G, Q), g ∈ G and x ∈ Q ⋊ G+ , (2.2) TQ (F ∗ F ) = (F ∗ F )(e) and TQ (ug xu∗g ) = δG (g)ug TQ (x)u∗g . We call it the Plancherel operator valued weight. For any weight Φ ∈ P(Q), one defines the dual weight Φ ◦ TQ ∈ P(Q ⋊ G). See [Ha77a] for a different construction. 2.5. Outer actions on von Neumann algebras. Definition 2.5. We say that a group action G y Q on a von Neumann algebra is • Properly outer if no non-trivial element of G acts on Q by inner automorphism. • Strictly outer if the relative commutant Q′ ∩ Q ⋊ G is trivial. • Minimal if it is faithful and the fixed point subalgebra QG is an irreducible subfactor of Q: (QG )′ ∩ Q = C. As observed in [Va01, Va05], a strictly outer action has to be properly outer, but the converse is not true in general. Lemma 2.6 ([Va01], Proposition 6.2). An action of a compact group is strictly outer if and only if it is minimal. Let us record a basic example for later use. Example 2.7. Consider a diffuse factor Q0 . For any faithful action of a group H on a finite set X, the corresponding Bernoulli action H y Q⊗X is strictly outer, hence minimal. 0 In the setting of totally disconnected groups the following lemma will be useful. Its proof is very much inspired from that of [Va01, Proposition 6.2], with an other input, the Galois correspondence theorem [ILP98, Theorem 3.15]. Lemma 2.8. Consider a minimal action K0 y Q of a compact group K0 . For any open subgroup K < K0 , we have (QK )′ ∩ (Q ⋊ K0 ) = LK ⊂ Q ⋊ K. Proof. Recall that Q is represented on the Hilbert space H and that Q ⋊ K0 is the subalgebra of B(L2 (K0 )) ⊗ Q generated by LK0 ⊗ 1 and by the operators π(a) ∈ L∞ (K0 ) ⊗ Q, a ∈ Q, defined by π(a)(g) = σg−1 (a), g ∈ G. In this picture, we have π(QK0 ) = 1 ⊗ QK0 . Take x ∈ (QK )′ ∩ M . Since x commutes with QK0 and K0 acts minimally, we deduce that x ∈ B(L2 (K0 )) ⊗ 1. Note also that (Q ⋊ K0 ) ∩ B(L2 (K0 )) ⊗ 1 = LK0 ⊗ 1, so we can write x = z ⊗ 1 for some z ∈ LK0 . For all a ∈ QK and all linear functional µ ∈ Q∗ , we have z(id ⊗ µ)(π(a)) = (id ⊗ µ)(π(a))z. Note that the functions (id ⊗ µ)(π(a)) ∈ L∞ (K0 ) are left K-invariant. Let us prove that these functions generate ℓ∞ (K\K0 ) as a von Neumann algebra as a ∈ QK and µ ∈ Q∗ . To see that it is sufficient to check that they separate points of K\K0 . Take g, h ∈ K0 such that gh−1 ∈ / K. K Then by [ILP98, Theorem 3.15], there exists a ∈ Q such that σgh−1 (a) 6= a. In particular π(a)(g) = σg−1 (a) and π(a)(h) = σh−1 (a) are distinct elements of Q. So we can find a linear functional µ ∈ Q∗ that separates them. So we arrived at the conclusion that z commutes with ℓ∞ (K\K0 ), and in particular with P (K), the orthogonal projection onto L2 (K). This means that z leaves L2 (K) invariant : z ∈ LK.  8 RÉMI BOUTONNET & ARNAUD BROTHIER 2.6. Fourier algebra, dual action, multipliers. For a locally compact group G, denote by A(G) its Fourier algebra as introduced by Eymard [Ey64]. By definition A(G) is the set of functions on G of the form ξ ∗ η̃, ξ, η ∈ L2 (G), where ∗ denotes the convolution product and η̃ is the function g 7→ η(g −1 ). Note that for all g ∈ G, we have the equality (ξ ∗ η̃)(g) = hλ(g)ξ, ηi. This set is an algebra under the pointwise multiplication. The norm of φ ∈ A(G) is defined to be the minimal value of kξkkηk as the functions ξ, η ∈ L2 (G) satisfy φ = ξ ∗ η̃. With this norm, A(G) is a Banach algebra. The set of compactly supported continuous functions on G is contained (densely) inside A(G). As a Banach space, A(G) is isometric to the predual (LG)∗ of LG. The duality pairing is given by the well defined formula < x, φ >:= hxξ, ηi, for all x ∈ LG, and φ = ξ ∗ η̃ ∈ A(G). We will abuse with notations and write φ(x) for x ∈ LG to mean < x, φ >. This notation is somewhat consistent with the fact that φ is a function on G, namely we have: φ(ug ) = φ(g) for all g ∈ G. Using the product on A(G) we can define multipliers on LG. More precisely, any φ ∈ A(G) gives rise to a normal completely bounded map mφ : LG → LG, defined by the formula: < mφ (x), ψ >:=< x, ψφ > for all x ∈ LG, ψ ∈ A(G). More generally, for any action G y Q, from an element φ ∈ A(G) one can construct a multiplier mφ on M := Q ⋊ G in the following way. Consider the unitary operator W on L2 (G × G, H) such that (W ξ)(g, h) = ξ(g, gh) for all ξ ∈ L2 (G×G, H), g, h ∈ G. Denote by ∆ := Ad(W ∗ ) the associated automorphism of B(L2 (G × G, H)). We can identify L2 (G × G, H) with L2 (G, H) ⊗ L2 (G) in such a way that ∆(M ⊗ 1) ⊂ M ⊗ LG, and the restriction ∆|L∞ (G)⊗1 = id. Definition 2.9. With the above notations, the Fourier multiplier associated with an element φ ∈ A(G) is the normal completely bounded map mφ : Q ⋊ G → Q ⋊ G defined by the formula mφ (x) = (id ⊗ φ) ◦ ∆(x ⊗ 1), x ∈ Q ⋊ G. In practice, the multiplier mφ is characterized by the formula mφ (aug ) = φ(g)aug for all a ∈ Q, g ∈ G. In this way, one easily checks that in the case where Q = C, the two constructions of multipliers coincide. 3. Support and applications In this section we give generalities about the spectrum of the dual action, defined for instance in [NT79, Chapter IV.1]. We adopt the point of view of Eymard [Ey64], and rather talk about “support” because we believe it is more transparent for the reader who is familiar with actions of discrete groups, and not so much with the quantum group language. Our goal is to prove Theorem 3.7, regarding elements whose support is contained in a subgroup. This is certainly known to experts but we were not able to find an explicit reference, although it is used in [NT79, Theorem VII.2.1]. For convenience we tried to keep this section self-contained. 3.1. Definition and first properties. Let us fix an arbitrary action G y Q on a von Neumann algebra. Definition 3.1. The support of an element x ∈ Q ⋊ G, denoted by supp(x), is the set of elements g ∈ G such that for all φ ∈ A(G) satisfying φ(g) 6= 0, we have mφ (x) 6= 0. We also describe the support explicitly in terms of interactions between Q ⋊ G and the copy of L∞ (G) inside B(L2 (G, H)). If Ω ⊂ G is a measurable subset, we write P (Ω) ∈ L∞ (G) ⊗ 1H for the orthogonal projection from L2 (G, H) onto L2 (Ω, H). Proposition 3.2. Take x ∈ Q ⋊ G and g ∈ G. The following are equivalent: CROSSED-PRODUCTS BY LOCALLY COMPACT GROUPS 9 (i) g ∈ supp(x); (ii) For any non-empty open set Ω ⊂ G we have P (gΩ)xP (Ω) 6= 0. Proof. (i) ⇒ (ii). Consider a non-empty open set Ω ⊂ G. Take a non-empty open subset Ω0 ⊂ Ω and an open neighborhood V of g in G such that V Ω0 ⊂ gΩ. Fix a function φ ∈ A(G) supported on V such that φ(g) 6= 0. Then for all y ∈ LG, we have mφ (y)P (Ω0 ) = P (gΩ)mφ (y)P (Ω0 ). Indeed the formula is clear for all y of the form auh , a ∈ Q, h ∈ G, and follows for arbitrary y by linearity and density. Note that (Q⋊G)′ L2 (Ω0 , H) spans a dense subset of L2 (G, H). Indeed, for all g ∈ G, we see that ρG (g)L2 (Ω0 , H) = L2 (Ω0 g, H), where ρG (g) is defined in (2.1). If follows that mφ (x)P (Ω0 ) 6= 0. Extend arbitrarily φ ∈ A(G) = (LG)∗ to a linear functional φ̃ on B(L2 (G)). With the notations from Section 2.6, since W commutes with L∞ (G) ⊗ 1, we have (id ⊗ φ̃) ◦ Ad(W ∗ )(P (gΩ)xP (Ω0 ) ⊗ 1) = P (gΩ)(id ⊗ φ) ◦ Ad(W ∗ )(x ⊗ 1)P (Ω0 ) = P (gΩ)mφ (x)P (Ω0 ) = mφ (x)P (Ω0 ) 6= 0. We deduce that P (gΩ)xP (Ω0 ) 6= 0, and in particular P (gΩ)xP (Ω) 6= 0. (ii) ⇒ (i). Fix φ ∈ A(G) such that φ(g) 6= 0. Pick an open neighborhood V of g on which φ does not vanish. Take ψ ∈ A(G) such that ψ(h) = 1/φ(h) for all h ∈ V , and put φ′ := φψ. In particular we have φ′ (h) = 1 for all h ∈ V , and it suffices to show that mφ′ (x) 6= 0, since m φ′ = m ψ ◦ m φ . Pick a non-empty open set Ω ⊂ G such that gΩ · Ω−1 ⊂ V . We claim that for all y ∈ Q ⋊ G P (gΩ)mφ′ (y)P (Ω) = P (gΩ)yP (Ω). By linearity and density, it suffices to check this formula for all y of the form auh , a ∈ Q, / V , and h ∈ G. If h ∈ V , then mφ′ (auh ) = auh for all a ∈ Q, so the formula is obvious. If h ∈ y = auh for some a ∈ Q, then both sides of the formula are equal to 0. Indeed, since mφ′ is a multiplier, the two terms are scalar multiple of each other, and it suffices to check vanishing of the right-hand side. Since gΩ · Ω−1 ⊂ V and h ∈ / V , we deduce that gΩ ∩ hΩ = ∅. This leads to P (gΩ)auh P (Ω) = P (gΩ)P (hΩ)auh = 0, as wanted. This proves the claimed equality and hence mφ′ (y) 6= 0.  In the sequel it will sometimes appear that one of the above two descriptions will be better suited to work with than the other. We will freely switch between these two points of view to reach the simplest arguments. Let us record a few properties of the support. Lemma 3.3. Take x ∈ Q ⋊ G. The following assertions are true. a) The support of x is a closed subset of G; b) If x belongs to K(G, Q), then supp(x) coincides with its support as a function on G; c) If x = ug for some g ∈ G, then supp(x) = {g}. Proof. a) Consider a net (gi )i of elements in supp(x) that converges to some g ∈ G, and take φ ∈ A(G) such that φ(g) 6= 0. Since φ is continuous, for i large enough we also have φ(gi ) 6= 0. Hence mφ (x) 6= 0, as desired. b) If x is a continuous function in K(G, Q) and ψ ∈ A(G) observe that mψ (x) is the function in K(G, Q) defined by g 7→ ψ(g)x(g). The statement easily follows. c) If x = ug , for all φ ∈ A(G) we have mφ (x) = φ(g)x. The result is then obvious.  10 RÉMI BOUTONNET & ARNAUD BROTHIER Lemma 3.4. Consider x ∈ Q ⋊ G and some open subsets Ω1 , Ω2 ⊂ G satisfying the relation Ω1 · Ω−1 2 ∩ supp(x) = ∅. Then P (Ω1 )xP (Ω2 ) = 0. In particular, for any open set Ω ⊂ G, we have xP (Ω) = P (supp(x)Ω)xP (Ω). Proof. We first treat the special case where Ω1 · Ω−1 2 ∩ supp(x) = ∅ and Ω2 is compact. For any (g, h) ∈ Ω1 ×Ω2 , there exists a non-empty open set Vg,h such that P (gh−1 Vg,h )xP (Vg,h ) = 0. Conjugating this equation with ρG (k) for some k ∈ G we can assume that Vg,h is an open neighborhood of h. Here, recall that ρG is the right action defined in (2.1), which satisfies ρG (k)P (Vg,h )ρG (k−1 ) = P (Vg,h · k−1 ). By compactness, for a fixed g ∈ G there exists n > 1, h1 , · · · , hn ∈ Ω2 such that {Vg,hi }ni=1 is a finite open cover of Ω2 . We can then define an open neighborhood Wg of e ∈ G: Wg := n \ h−1 i Vg,hi i=1 We get that P (gWg )xP (Vg,hi ) = 0 for any 1 6 i 6 n, g ∈ Ω1 . Since P (Ω2 ) is smaller than the supremum of the projections ∨ni=1 P (Vg,hi ), we obtain that P (gWg )xP (Ω2 ) = 0 for any g ∈ Ω1 . Therefore, P (Ω1 )xP (Ω2 ) = 0 since ∨g∈Ω1 P (gWg ) > P (Ω1 ). Suppose now that Ω2 is open and non-necessarily relatively compact. For any g ∈ Ω2 , there exists a compact neighborhood Kg of g such that Ω1 · Kg−1 ∩ supp(x) = ∅. We have that P (Ω1 )xP (Kg ) = 0 for any g ∈ G, by the proof of above. This proves the desired equality P (Ω1 )xP (Ω2 ) = 0 because P (Ω2 ) ≤ ∨g∈Ω2 P (Kg ). The second part of the statement follows from taking Ω2 = Ω, Ω1 = G \ supp(x)Ω.  Before mentioning interesting consequences of this lemma, let us give an essentially equivalent form involving the multipliers. Lemma 3.5. Consider x ∈ Q ⋊ G with compact support, and take a function φ ∈ A(G) which is equal to 1 on a neighborhood of supp(x). Then x = mφ (x). Proof. Take a non-empty open set Ω ⊂ G such that φ is equal to 1 on supp(x)Ω·Ω−1 . Proceeding as in the proof of Proposition 3.2, (ii) ⇒ (i), one checks that P (supp(x)Ω)xP (Ω) = P (supp(x)Ω)mφ (x)P (Ω). Since supp(mφ (x)) ⊂ supp(x), Lemma 3.4 and the above equality imply that xP (Ω) = mφ (x)P (Ω). Moreover, for all g ∈ G, the set Ωg satisfies the same condition as Ω. So the same equality holds with Ωg in the place of Ω, for all g ∈ G: xP (Ωg) = xP (Ωg). Since Ω is open inside G, we get that 1 = ∨g P (Ωg). The equality x = mφ (x) follows.  Corollary 3.6. Consider x, y ∈ Q ⋊ G. The following assertions are true. a) b) c) d) Adjoint: supp(x∗ ) = supp(x)−1 ; Sum: supp(x + y) ⊂ supp(x) ∪ supp(y); Product: supp(xy) ⊂ supp(x) · supp(y). Vanishing criterion: If supp(x) = ∅, then x = 0. CROSSED-PRODUCTS BY LOCALLY COMPACT GROUPS 11 Proof. a) This results from the fact that for all φ ∈ A(G), (mφ (x))∗ = mφ∗ (x∗ ), where φ∗ ∈ A(G) is defined by φ∗ (g) = φ(g −1 ), g ∈ G. b) Consider g in the complementary of supp(x) ∪ supp(y). Then there exists φ1 and φ2 such that φi (g) 6= 0, i = 1, 2, while mφ1 (x) = 0 and mφ2 (y) = 0. In particular the product φ := φ1 φ2 satisfies φ(g) 6= 0, while mφ (x) = mφ2 ◦ mφ1 (x) = 0 and mφ (y) = mφ1 ◦ mφ2 (y) = 0. In summary mφ (x + y) = 0 and hence g ∈ / supp(x + y). c) Consider an element g ∈ G which is not in supp(x) · supp(y) and take open neighborhoods of the identity e ∈ G, Ω and V , such that supp(x) · supp(y) ∩ gΩV Ω−1 = ∅. In particular, for all h ∈ supp(x)−1 gΩ and k ∈ supp(y)Ω we have h−1 k ∈ / V . Further, the closures X := supp(x∗ )gΩ and Y := supp(y)Ω do not intersect. Besides, Lemma 3.4 implies that • yP (Ω) = P (Y )yP (Ω); • x∗ P (gΩ) = P (X)x∗ P (gΩ). Altogether, the following equality shows that g ∈ / supp(xy): P (gΩ)xyP (Ω) = P (gΩ)xP (X)P (Y )yP (Ω) = P (gΩ)xP (X ∩ Y )yP (Ω) = 0. d) If supp(x) = ∅, then Lemma 3.4 implies that x = P (G)xP (G) = 0.  Theorem 3.7. Consider an action of a locally compact group G y Q on an arbitrary von Neumann algebra and take a closed subgroup H < G. Then an element x ∈ Q ⋊ G belongs to the subalgebra Q ⋊ H if and only if its support is contained in H. Proof. First, assume that x ∈ Q ⋊ H. For all g ∈ G \ H we can find a non-empty open set Ω ⊂ G such that gΩ · Ω−1 ∩ H = ∅. By Lemma 3.4, we deduce that P (gΩ)xP (Ω) = 0, so that g∈ / supp(x). Hence supp(x) ⊂ H. Conversely assume that x ∈ Q ⋊ G is an element with support contained in H. In order to show that x ∈ Q ⋊ H, we will use Theorem 2.2. This reduces our task to check that x commutes inside B(L2 (G, H)) with the subalgebra L∞ (H\G) ⊂ L∞ (G) consisting of left H-invariant functions on G. Given a left H-invariant open set Ω whose boundary has measure 0, we have equality of the projections P (Ω) = P (HΩ). By Lemma 3.4, we get xP (Ω) = P (Ω)xP (Ω). Since x∗ also has support in H we moreover have x∗ P (Ω) = P (Ω)x∗ P (Ω). This shows that x commutes with P (Ω) ∈ L∞ (H\G). Claim. The set of functions P (Ω) with Ω as above generates L∞ (H\G). Denote by q : G → H\G the canonical projection and by µ a quasi-invariant measure on the coset space H\G. The map f ∈ L∞ (H\G, µ) 7→ f ◦ q ∈ L∞ (H\G) is a normal isomorphism. With this identification, the indicator function 1U of a set U ⊂ H\G is identified with the indicator function 1q−1 (U ) = P (q −1 (U )) ∈ L∞ (H\G). Moreover, for all open subset U ⊂ H\G such that µ(∂U ) = 0, the set Ω := q −1 (U ) ⊂ G is open, H-invariant and its boundary has Haar measure 0. So we are left to check that the span of functions 1U for U ⊂ H\G such that µ(∂U ) = 0, is ultraweakly dense in L∞ (H\G). This is a classical fact about Borel measures on locally compact spaces (see e.g. [Ey64, Proof of (3.33)] and the references therein). We deduce from the claim that x commutes with L∞ (H\G). So as wanted, we can use Theorem 2.2 to deduce that x ∈ Q ⋊ H.  12 RÉMI BOUTONNET & ARNAUD BROTHIER The special case where H is the trivial subgroup of G, the above theorem yields Beurling’s Theorem, [Ey64, Théorème 4.9]. In particular we stress the following corollary that we will use several times. Corollary 3.8. Given an element x in a crossed product von Neumann algebra Q ⋊ G, if the support of x is a singleton {g}, then there exists a ∈ Q such that x = aug . Proof. If supp(x) = {g}, then supp(u∗g x) = {e}. In particular u∗g x ∈ Q, by Theorem 3.7.  3.2. Applications. Before moving on to the proof of our main theorems, let us mention a few classical results that follow easily from the above properties of the support. Our first application concerns a generalization of the so-called Eymard-Steinespring-Tatsuuma’s Theorem, [Ta03, Theorem VII.3.9]. We start with analyzing how the support behaves under the co-product map. Given an action σ : G y Q, put M = Q ⋊ G and consider the notations W ∈ B(L2 (G × G, H)) and ∆ = Ad(W ∗ ) : M ⊗ 1 → M ⊗ LG introduced in Section 2.6. We will view the algebra M ⊗ LG as the crossed-product von Neumann algebra associated with the action σ × id : G × G y Q: M ⊗ LG ≃ Q ⋊ (G × G). In this way it makes sense to talk about the support of an element inside M ⊗ LG. Lemma 3.9. With the above notations, the following fact hold. a) For all x ∈ M , the support ∆(x ⊗ 1) is equal to {(g, g) , g ∈ supp(x)}; b) For all a ∈ M and b ∈ LG, supp(a ⊗ b) = supp(a) × supp(b). Proof. a) For all φ, ψ ∈ A(G) the function φ × ψ : (g, h) 7→ φ(g)ψ(h) belongs to the Fourier algebra A(G × G) and one easily checks the formula (3.1) mφ×ψ (∆(x ⊗ 1)) = ∆(mφ·ψ (x) ⊗ 1). In particular if g 6= h ∈ G, we can find φ, ψ ∈ A(G) such that (φ × ψ)(g, h) = φ(g)ψ(h) 6= 0, but such that φ · ψ = 0 (just take functions with disjoint supports). By (3.1), we get mφ×ψ (∆(x ⊗ 1)) = 0 and hence (g, h) does not belong to the support of ∆(x ⊗ 1). We thus deduce that the support of ∆(x ⊗ 1) is contained in the diagonal of G × G. Further, (3.1) easily implies that if (g, g) belongs to the support of ∆(x ⊗ 1) then g ∈ supp(x). Conversely, take g ∈ supp(x), and ρ ∈ A(G × G) such that ρ(g, g) 6= 0. We show that mρ (∆(x ⊗ 1)) 6= 0. Since ρ is continuous, it does not vanish on some open neighborhood U × U of (g, g). Multiplying ρ by a local inverse if necessary, we may assume that ρ is actually equal to 1 on U × U . Pick any function φ ∈ A(G) supported on U and such that φ(g) 6= 0. We deduce from (3.1) that mφ×φ (mρ (∆(x ⊗ 1))) = m(φ×φ)·ρ (∆(x ⊗ 1)) = mφ×φ (∆(x ⊗ 1)) = ∆(mφ2 (x) ⊗ 1). Since g ∈ supp(x) and φ2 (g) 6= 0, the above term is non-zero and hence mρ (∆(x ⊗ 1))) 6= 0. b) Take (g, h) ∈ supp(a⊗ b), and φ, ψ ∈ A(G) such that φ(g), ψ(h) 6= 0. Then (φ× ψ)(g, h) 6= 0, and we get mφ (a) ⊗ mψ (b) = mφ×ψ (a ⊗ b) 6= 0. We deduce that g ∈ supp(a) and h ∈ supp(b). The converse inclusion can be treated by using a local inverse as in a). Alternatively, we can use the other description of the support as follows. Take g ∈ supp(a), h ∈ supp(b) and take a non-empty open set Ω ⊂ G × G. We find non-empty open sets U, V ⊂ G such that U × V ⊂ Ω. By assumption we know that P (gU )aP (U ) 6= 0 and P (hV )bP (V ) 6= 0, and hence CROSSED-PRODUCTS BY LOCALLY COMPACT GROUPS 13 P (gU × hV )(a ⊗ b)P (U × V ) 6= 0. It then clearly follows that P ((g, h) · Ω)(a ⊗ b)P (Ω) 6= 0. This proves that (g, h) ∈ supp(a ⊗ b).  We can now prove the following well known generalization of [Ta03, Theorem VII.3.9]. This theorem initially deals with the case of group algebras LG, that is, with the case of trivial actions G y C. The proof given in [Ta03] is rather involved, while an elementary proof relying (implicitly) on the support already appears in [Ey64, Théorème 3.34]. In the case of general actions G y Q, the predual (Q ⋊ G)∗ is not identified with an algebra in general, and hence the notion of character doesn’t apply anymore. Nevertheless we can still provide an easy proof relying on the notion of support. Corollary 3.10. Given any action G y Q, put M = Q⋊G and denote by ∆ : M ⊗1 → M ⊗LG the co-product map defined above. Assume that x ∈ M is an element such that ∆(x ⊗ 1) is of the form a ⊗ b for some elements a ∈ M and b ∈ LG. Then there exists g ∈ G and y ∈ Q such that x = yug . Proof. We may assume that x 6= 0. By Lemma 3.9, the equality ∆(x ⊗ 1) = a ⊗ b implies that supp(a) × supp(b) is contained in the diagonal of G × G. The only way this can happen is if supp(∆(x ⊗ 1)) is a singleton {(g, g)}. In this case, supp(x) = {g} and the result follows from Corollary 3.8.  As an immediate corollary, we deduce the following result. Corollary 3.11. Given any strictly outer action G y Q, the normalizer of Q inside the crossed-product M := Q ⋊ G is equal to {aug , g ∈ G, a ∈ U (Q)}. In particular, two strictly outer actions αi : Gi y Qi , i = 1, 2 of locally compact groups are cocycle conjugate if and only if the pairs Q1 ⊂ Q1 ⋊ G1 and Q2 ⋊ Q2 ⋊ G2 are isomorphic. Proof. Take u ∈ NM (Q). Use the notation ∆ : M ⊗ 1 → M ⊗ LG as above. We have that ∆ is the identity map on Q ⊗ 1. Hence one easily checks that (u∗ ⊗ 1)∆(u ⊗ 1) commutes with Q ⊗ 1. In other words, (u∗ ⊗ 1)∆(u ⊗ 1) ∈ (Q′ ∩ M ) ⊗ LG = 1 ⊗ LG. So there exists b ∈ LG such that ∆(u ⊗ 1) = u ⊗ b, and we conclude by Corollary 3.10 that u = aug for some a ∈ U (Q) and g ∈ G. The second part of the statement is routine. The only if part is always true, even when the actions are not strictly outer, see [Ta73, Corollary 3.6]. The if part follows from adapting [BNP07, Proposition 1.7] to the case of actions of general locally compact groups.  4. Crossed-products by actions of totally disconnected groups 4.1. Notations and tools. There are several advantages in working with totally disconnected groups. Fix a locally compact group G and an action G y Q on a von Neumann algebra and put M = Q ⋊ G. Firstly, given a compact open subgroup K < G, one can define a projection pK := 1K /mG (K). Note that the net of projections (pK )K increases to 1 as the compact open subgroups K decrease to {e}. Let us mention two elementary properties of these projections. Lemma 4.1. Fix a weight Φ ∈ P(Q) and denote by Ψ ∈ P(M ) the corresponding dual weight.pConsider a compact open subgroup K < G. Then for all a ∈ QK we have kapK kΨ = kakΦ / mG (K). Proof. This is an immediate consequence of (2.2).  14 RÉMI BOUTONNET & ARNAUD BROTHIER Lemma 4.2. Given a compact open subgroup K < G, the map a ∈ QK 7→ apK ∈ pK (Q⋊K)pK is an onto isomorphism of von Neumann algebras. Proof. This is a particular case of Proposition 5.6. We give a complete proof of this simpler case for the convenience of the reader. Since pK commutes with QK , it is clear that the map is a normal ∗-morphism. By the computations given in Lemma 4.1 above, we see that it is moreover injective. To check that it is onto, we only need to prove that it has dense image. For all a ∈ Q and g ∈ K, we have pK (aug )pK = pK apK = E(a)pK , where E : Q → QK is the conditional expectation. Hence pK (aug )pK belongs to the range of our map, proving the lemma.  Secondly, for all open subgroup K < G and any action G y Q, there always exists a faithful normal conditional expectation EK : Q ⋊ G → Q ⋊ K such that EK (ug ) = 1K (g) for all g ∈ G. In the case where K is compact open, one sees that the multiplier mφ associated with the function φ := 1K ∈ A(G) gives the desired expectation. In the general case of open subgroups φ does not necessarily belong to A(G) but it is still positive definite and one can use [Ha77b, Theorem 3.1.a] to construct the associated multiplier mφ . An alternative way to construct the expectation EK is by considering modular flows as in [HR16]. With this point of view, it becomes obvious that EK preserves the Plancherel operator valued weight: TQ ◦ EK = TQ . When G is totally disconnected, one checks that the support of an element x ∈ M is described as follows: (4.1) supp(x) = {g ∈ G : EK (u∗g x) 6= 0 for all compact open subgroups K < G}. Notation. Given a compact open subgroup K of a group G and a set S ⊂ G/K, we denote by lift(S) a set of representatives of S inside G. This means that for all g ∈ lift(S) we have gK ∈ S and for all s ∈ S there exists a unique element g ∈ lift(S) such that gK = s. Lemma 4.3. Consider a compact open subgroup K < G. Given an element x ∈ M with compact support, the map g 7→ ug EK (u∗g x) is right K-invariant on G and compactly supported. Moreover, X x= ug EK (u∗g x). g∈lift(G/K) Proof. Fix S ⊂ G/K a finite set such that the support of x is contained in lift(S) · K. The function φ = 1lift(S)K ∈ A(G) is equal to 1 on a neighborhood of the support of x, so by Lemma P 3.5, we have that x = mφ (x). Moreover, φ can be decomposed as φ = g∈lift(S) 1K (g−1 ·). One easily checks that the corresponding multiplier satisfies X mφ = ug EK (u∗g ·). g∈lift(S) We leave the rest of the proof to the reader.  Although we will not use this fact, let us mention that for a general element x ∈ M , a Kdecomposition as above still makes sense. In this case the sum that appears is infinite but it converges in the Bures topology associated with the inclusion Q ⋊ K ⊂ Q ⋊ G, with expectation EK . We refer to [CS16, Section 2] or to the original book [Bu71] for the definition of the Bures topology. CROSSED-PRODUCTS BY LOCALLY COMPACT GROUPS 15 4.2. Strictly outer actions. The following proposition combines the ”Fourier coefficient approach” used in the setting of discrete groups with Lemma 2.6 about actions of compact groups. Proposition 4.4. Consider a properly outer action of a totally disconnected locally compact group σ : G y Q. The action σ is strictly outer if and only if G admits a compact open subgroup that acts minimally. In that case any unitary u ∈ Q ⋊ G normalizing Q is of the form aug for some a ∈ Q, g ∈ G. Proof. Assume that σ : G y Q is strictly outer. Then one easily checks from the definitions that σ is properly outer. Moreover, the restriction of σ to any compact subgroup is strictly outer and thus minimal by [Va01, Proposition 6.2]. Conversely, assume that σ : G y Q is properly outer and admits a compact open subgroup K0 that acts minimally. Note that any subgroup K < K0 acts minimally as well, and hence in a strictly outer way. Put M = Q ⋊ G and take a non-zero element x ∈ Q′ ∩ M . By Proposition 3.8 we only need to show that the support of x is the singleton {e}. The support of x is non-empty by Corollary 3.6.d. Take g ∈ supp(x). For all compact open subgroups K < K0 , put aK := EK (u∗g x) ∈ Q ⋊ K. Since g ∈ supp(x), these elements aK are non-zero. By minimality, for all K ′ < K < K0 , we have (4.2) a∗K ′ aK ∈ Q′ ∩ (Q ⋊ K) = C. When K = K ′ this relation tells us that aK is a (non-zero) multiple of a unitary element. Then (4.2) further implies that all these unitaries are proportional to each other. In particular, for all K < K0 , aK0 is proportional to aK ∈ Q ⋊ K. We conclude that aK0 is contained in Q ⋊ K, for all K < K0 . Hence its support is equal to {e}, implying that aK0 ∈ Q. Moreover, aK0 satisfies aK0 x = σg−1 (x)aK0 , for all x ∈ Q. Since the G-action is properly outer, this gives g = e, as desired. The statement on the normalizer then follows from Corollary 3.11 (although this could be checked directly by similar computations on the support).  4.3. Intermediate subfactors. We now turn to the question of determining all intermediate subfactors Q ⊂ N ⊂ Q ⋊ G. In order to establish our main result Theorem A, we will need to be able to compute relative commutants of the form (QK )′ ∩ Q ⋊ G for small compact open subgroups K < G. This forces us to strengthen our assumptions on the action. Definition 4.5. Given a subgroup K of G we will say that the action G y Q is properly outer relative to K if the following holds. The only elements g ∈ G for which there exists a non-zero a ∈ Q such that σg (x)a = ax for all x ∈ QK are the elements of K: g ∈ K. Note that an action is properly outer if and only if it is properly outer relative to the trivial subgroup. We will provide examples of relatively properly outer actions in the next section. Lemma 4.6. Consider an action σ : G y Q of a totally disconnected group G which is properly outer relative to a compact open subgroup K < G. Put M = Q ⋊ G. We have (QK )′ ∩ M ⊂ Q ⋊ K. Proof. Take x ∈ (QK )′ ∩M . We show that supp(x) ⊂ K. Fix g ∈ supp(x), so that EK (u∗g x) 6= 0. Since the net (pL )L converges strongly to 1 when L ց {e}, we can find a compact open subgroup L0 < G such that pL0 EK (u∗g x)pL0 6= 0. 16 RÉMI BOUTONNET & ARNAUD BROTHIER Define L1 = L0 ∩ K ∩ gKg−1 and L := ∩h∈K hL1 h−1 . Since L1 is open, it has finite index inside K, and hence the intersection defining L is in fact finite. We conclude that L < K is an open subgroup which is moreover contained in L0 ∩ K ∩ gKg−1 . In particular pL ≥ pL0 , so that pL EK (u∗g x)pL 6= 0. Since L is normal inside K, the projection pL commutes with uh for all h ∈ K. By Lemma 4.3, we have X X pL EK (u∗g x)pL = pL uh EL (u∗gh x)pL = uh pL EL (u∗gh x)pL . h∈lift(K/L) h∈lift(K/L) The non-vanishing of this sum implies that there exists h ∈ K such that X := pL EL (u∗gh x)pL is non-zero. Since L < K ∩ gKg−1 , we have that QK ⊂ QL and σg (QK ) = QgKg b ∈ QK , the two elements b and σg (b) commute with pL . It follows −1 ⊂ QL . Hence for all Xb = pL EL (u∗gh xb)pL = pL EL (u∗gh bx)pL = pL σg (b)EL (u∗gh x)pL = σg (b)X. By Lemma 4.2, pL (Q ⋊ L)pL = QL pL , so there exists a unique (non-zero) a ∈ QL such that X = apL . By uniqueness, we see that a satisfies ab = σg (b)a for all a ∈ QK . We conclude that g ∈ K0 , and hence supp(x) ⊂ K. By Theorem 3.7 we have that x ∈ Q ⋊ K.  Proposition 4.7. Consider an action σ : G y Q of a totally disconnected group G which is properly outer relative to a compact open subgroup K0 < G whose action is minimal. For all open subgroup K < K0 , we have (QK )′ ∩ M = LK ⊂ Q ⋊ K. Proof. Fix x ∈ (QK )′ ∩ M . By Lemma 4.6 applied to K0 , we see that x ∈ Q ⋊ K0 . Since K0 acts minimally, the result follows from Lemma 2.8.  In order to prove Theorem A, we will use a convex combination argument. The following lemma will be needed. Lemma 4.8 ([HI15], Lemma 4.4). Consider a von Neumann algebra M, a weight Θ ∈ P(M), and a σ-weakly closed convex subset C of M. If C is bounded both in the operator norm and the k · kΘ -norm, then ΛΘ (C) is k · kΘ -closed in L2 (M, Θ). Proof of Theorem A. Fix an intermediate subfactor Q ⊂ N ⊂ M . Set H := {g ∈ G , ug ∈ N }, so that Q ⋊ H ⊂ N . Take x0 ∈ N . We will show that the support of x0 is contained in H. This will conclude by Theorem 3.7. Denote by Tr a normal faithful semi-finite trace on Q, and denote by Ψ ∈ P(M ) the corresponding dual weight. Step 1. For all compact open subgroups K < K0 , all g ∈ G and all finite trace projection q ∈ QK , if there exists x ∈ N such that qpK EK (u∗g x)qpK 6= 0, then ug qpK ∈ (N )1 pK . Fix K < K0 , q ∈ QK , x ∈ N and g ∈ G such that qpK EK (u∗g x)qpK 6= 0. Put x′ := σg (q)xq ∈ N . We have pK EK (u∗g x′ )pK = qpK EK (u∗g x)qpK 6= 0. By Lemma 4.2, there exists a unique a ∈ QK such that pK EK (u∗g x′ )pK = apK . Note that a ∈ qQq. The element y := σg (a∗ )x′ ∈ σ(q)N q satisfies pK EK (u∗g y)pK = a∗ apK 6= 0. Lemma 4.1, implies that Ψ(pK u∗g ypK ) = Ψ(pK EK (u∗g y)pK ) = 1 kak2Tr 6= 0. mG (K) Denote by C ⊂ N the ultraweak closure of the convex hull C0 := conv({σg (u)yu∗ , u ∈ U (qQK q)}). CROSSED-PRODUCTS BY LOCALLY COMPACT GROUPS 17 We proceed as in the proof of [HI15, Theorem 4.3 (5) ⇒ (6)] to show that CpK is bounded in k · kΨ -norm, except that we have slightly weaker assumptions. Since Q is contained in the centralizer of Ψ, it is clear from the triangle inequality that kXpK kΨ ≤ kypK kΨ for all X ∈ C0 . Now if X ∈ C is arbitrary, take a net (Xj )j∈J ⊂ C0 that converges ultrastrongly to X. Then (Xj∗ Xj )j∈J converges ultraweakly to X ∗ X, and since Ψ is lower ultraweakly semi-continuous (see [Ta03, Theorem VII.1.11.(iii)]) we get that kXpK k2Ψ = Ψ(pK X ∗ XpK ) ≤ lim inf Ψ(pK Xj∗ Xj pK ) ≤ kypK k2Ψ . j Note moreover that kypK kΨ < +∞ since y = yq and qpK ∈ nΨ (M ). Thus the ultraweakly closed convex set CpK ⊂ M is bounded both in the operator norm and in the k · kΨ -norm and we can apply Lemma 4.8 to it. In particular we can find z ∈ C, such that zpK is the unique element of CpK with minimal k · kΨ -norm2. Let us check that such an element z ∈ N satisfies zpK 6= 0. First, since qpK ∈ nΨ (M ), Ψ(qpK · pK q) is a bounded normal linear functional on M , which is constant on u∗g C0 . Hence it is constant on u∗g C. It follows: Ψ(qpK u∗g zpK q) = Ψ(qpK u∗g ypK q) = Ψ(pK u∗g (σg (q)yq)pK ) = Ψ(pK u∗g ypK ) 6= 0. So we indeed find that zpK 6= 0. Note also that CpK is globally invariant under the affine action U (qQK q) y σ(q)M q given by u · X := σg (u)Xu∗ . Since Ψ centralizes Q, this action is k · kΨ -isometric, so it fixes zpK . Equivalently, we have u∗g zpK ∈ (qQK q)′ ∩M . Moreover u∗g zpK belongs to qM q. By Proposition 4.7, we have that (qQK q)′ ∩ qM q ⊂ qLK, so u∗g zpK ∈ qLKpK . Since the projection pK is both central and minimal inside LK, there exists a non-zero scalar λ ∈ C such that u∗g zpK = λqpK . (4.3) We obtain that ug qpK = (z/λ)pK ∈ N pK . Unfortunately we don’t have, a priori, any control on how small |λ| is, so z/λ could have a very large operator norm. To get around this issue, we would like to identify polar parts, but we need extra commutations properties. We apply the convex combination argument a second time. Arguing as above, one can find an element z1 ∈ C ′ , where C ′ ⊂ C is the ultraweak closure of conv({σg (u)zu∗ , u ∈ U (qQK q)}) ⊂ N , such that z1∗ zpK is the unique element in (C ′ )∗ zpK with minimal k · kΨ -norm3. Then z1 enjoys the following properties: • z1 ∈ N and z1 pK = zpK , because for all u ∈ U (qQK q), σg (u)zu∗ pK = σg (u)zpK u∗ = zpK . In particular z1 pK 6= 0; • z1∗ zpK ∈ (qQK q)′ ∩ qM q, by uniqueness of a k · kΨ -norm minimizer inside C ′ zpK . Hence Proposition 4.7 gives that z1∗ zpK = λ′ qpK for some non-zero scalar λ′ ∈ C. In particular the above facts give pK z1∗ z1 pK = pK z1∗ zpK = λ′ qpK and λ′ follows positive. Hence the equality z1∗ z1 pK = λ′ qpK = (λ′ qpK )∗ = pK z1∗ z1 shows that z1∗ z1 commutes with pK . Write the polar decomposition z1 = u|z1 |, with u ∈ N a partial isometry and |z1 | = (z1∗ z1 )1/2 . Note that uqpK is a partial isometry since qpK commutes with z1∗ z1 (recall that z1 = z1 q). √ We have: z1 pK = u|z1 |pK = λ′ uqpK . Combining this with (4.3), we get √ λug qpK = zpK = z1 pK = λ′ uqpK . Hence ug qpK and uqpK are proportional partial isometries; they have to coincide, This proves Step 1. ug qpK = (uq)pK ∈ (N )1 pK . 2Note however that z itself needs not be unique. 3Note that (C ′ )∗ zp is nothing but the ultraweakly closed convex hull of {uz ∗ zp u∗ , u ∈ U(qQK q)}. K K 18 RÉMI BOUTONNET & ARNAUD BROTHIER Step 2. For all compact open subgroups K < K0 and g ∈ G, if there exists x ∈ N such that pK EK (u∗g x)pK 6= 0, then ug pK ∈ (N )1 pK . Fix a subgroup K < K0 , g ∈ G and x ∈ N such that pK EK (u∗g x)pK 6= 0. Since K acts minimally on Q and QK is with expectation inside Q, [BHV15, Lemma 5.1] implies that the trace Tr is still semi-finite on QK . Denote by (qi )i∈I an increasing net of projections in QK with finite trace that converges to 1. Then there exists i0 ∈ I such that for all i ≥ i0 , we have that qi pK EK (u∗g x)pK qi 6= 0. By Step 1, we deduce that for all i ≥ i0 , there exists yi ∈ (N )1 such that (4.4) ug qi pK = yi pK . Denote by y ∈ (N )1 an ultraweak limit of the net (yi )i∈I . Then taking the corresponding limit in (4.4) gives ug pK = ypK , as desired. Step 3. The support of x0 is contained in H. Take g ∈ supp(x0 ). Fix a compact open subgroup K < K0 . Then EK (u∗g x0 ) 6= 0. As the net of projections (pL )L<G , converges strongly to the identity when L ց {e}, we have pL EK (u∗g x0 )pL 6= 0 for all small enough compact open subgroups L. Take a normal open subgroup L < K, so that pL commutes with ug for all g ∈ K. By Lemma 4.3, we can write X X uh pL EL (u∗gh x0 )pL . pL EK (u∗g x0 )pL = pL uh EL (u∗h EK (u∗g x0 ))pL = h∈lift(K/L) h∈lift(K/L) For all small enough compact open subgroups L < G that is normal inside K, since the above sum is non-zero, we can find hL ∈ K such that pL EL (u∗ghL x0 )pL 6= 0. Applying Step 2 to L, ghL and x0 , we find an element zL ∈ (N )1 such that ughL pL = zL pL . Note that there exists a net (Li )i of compact open subgroups of G which are all normal in K and form a neighborhood basis of e ∈ G. This comes from the fact that any open subgroup L < K has finite index inside K, so that ∩h∈K hLh−1 is an open normal subgroup of K, contained in L. By compactness of K and (N )1 (for the weak operator topology), there exist subnets of (hLi )i and (zLi )i that converge to elements h ∈ K and z ∈ (N )1 , respectively. Taking ultraweak limits, we get that ugh = lim ughLi pLi = lim zLi pLi = z ∈ N, i i because the net of projections (pL )L converges ultrastrongly to the identity. Hence gh ∈ H, and we conclude that gK ∩ H 6= ∅. As K can be arbitrarily small and H is closed, we conclude that g ∈ H. This finishes the proof of Step 3. Now the theorem follows from Theorem 3.7.  4.4. Examples of actions. Proposition 4.9. Let G be a totally disconnected group with a compact open subgroup K < G such that ∩g∈G gKg−1 = {e} (let us call such a subgroup K eventually malnormal). Take a II1 -factor Q0 , with trace τ0 . The following G-actions satisfy the assumptions of Theorem A, so they are strictly outer and satisfy the Intermediate Subfactor Property. (1) The Bernoulli action G y (Q0 , τ0 )⊗G/K obtained by shifting indices; (2) The free Bernoulli action G y ∗G/K (Q0 , τ0 ); Proof. Let us first check separately the minimality condition on the K-action for each case. ⊗G/K . Since K is eventually malnormal inside G, it acts faithfully on G/K and (1) Put Q = Q0 hence on Q. Since K is compact open in G it is commensurated, and hence it acts on G/K CROSSED-PRODUCTS BY LOCALLY COMPACT GROUPS 19 ⊗O with finite orbits. Let us denote by Oj , j ∈ J these orbits and by Qj := Q0 j . Example 2.7 K shows that for all j, the fixed point algebra QK j ⊂ Qj is an irreducible subfactor. Since Q K contains ⊗j∈J Qj , it is irreducible inside Q = ⊗j∈J Qj . So K acts minimally. (2) Put Q = ∗G/K Q0 . Again, since K is not normal inside G, it acts faithfully on Q. Because of the free product situation, it is clear that the copy of Q0 located at the label K ∈ G/K is irreducible inside Q. Moreover this algebra is contained in QK , so K acts faithfully. We now check the relatively properly outer condition simultaneously for both situations. Take g ∈ G \ K and decompose Q as a product (K) (K) Q ≃ Q0 (gK) (gK) ⊗ Q0 ⊗P (K) (or Q ≃ Q0 (gK) ∗ Q0 ∗ P ), where Q0 and Q0 are the copies of Q0 in position K ∈ G/K and gK ∈ G/K and P is the tensor product (or free product) of all the remaining copies of Q0 . In both the tensor situation and the free situation, one easily checks that for all nets (un )n ⊂ (K) (gK) U (Q0 ) and (vn )n ⊂ U (Q0 ) that converge weakly to 0, and for all a, b ∈ Q, one has lim τ (un avn b) = 0, where τ is the trace of Q. n Assuming that there exists a ∈ Q1 such that σg (x)a = ax for all x ∈ QK 1 , we take for (un )n ⊂ (K) K U (Q0 ) ⊂ U (Q ) any net of unitaries that converges weakly to 0, and we set vn = σg (un ). We get kak2 = lim τ (u∗n a∗ aun ) = lim τ (un a∗ vn a) = 0. n n Hence a = 0, as desired.  More generally, one can easily check the relative outerness condition in Theorem A when the action has a large commutant thanks to the following fact. Lemma 4.10. Consider an action G y Q and a closed subgroup K < G whose action is minimal. Assume that the centralizer Γ of G in Aut(Q) satisfies: for all x ∈ Q \ C, there exists γ ∈ Γ such that γ(x) ∈ / Cx. Then the action is properly outer relative to K if and only if the only elements of G acting trivially on QK are the elements of K. Proof. The only if part is trivial. Conversely assume that K is precisely the set of elements of G that act trivially on QK . Take g ∈ G such that there exists a non-zero a ∈ Q satisfying σg (x)a = ax for all x ∈ QK . Since K acts minimally, we can assume that a is a unitary. For all automorphism γ ∈ Γ, we have σg (γ(x))γ(a) = γ(a)γ(x), for all x ∈ QK . Moreover, using again that γ commutes with the G-action, we see that γ(QK ) = QK , and the previous equation reads as σg (x)γ(a) = γ(a)x, for all x ∈ QK . In particular, we find that a∗ γ(a) ∈ (QK )′ ∩ Q = C. Hence for all γ ∈ Γ, we have γ(a) ∈ Ca. By our assumption on Γ, this leads to a ∈ C, and hence g fixes QK pointwise. Thus g ∈ K by assumption.  Note that the condition on the centralizer Γ in the above lemma is fulfilled as soon as Γ admits a subgroup Γ0 that preserves a state on Q, and such that QΓ0 = C. Moreover, if Q is a II1 -factor the trace is invariant under any automorphism, and hence only the second condition needs to be verified. We deduce the following result in the spirit of Vaes’ examples [Va05, Theorem 5.1] 20 RÉMI BOUTONNET & ARNAUD BROTHIER Corollary 4.11. Fix a totally disconnected group and a compact open subgroup K < G. Consider any faithful action G y Q0 on a II1 -factor such that {g ∈ G | g|QK = id} = K. Then the diagonal action G y (Q, τ ) := (Q0 , τ0 )⊗N satisfies the assumptions of Theorem A. Proof. The K-action on Q0 being faithful, [Va05, Theorem 5.1] implies that it is strictly outer, and hence minimal. Moreover the centralizer Γ of such a diagonal action contains all shift automorphisms obtained by permuting indices. Hence the condition on Γ appearing in Lemma 4.10 is satisfied (see the comment after Lemma 4.10). Thus the result follows from Lemma 4.10.  ⊗G/K Remark 4.12. Note that the Bernoulli shift action G y Q0 as in Lemma 4.9 is sometimes a special case of diagonal action as in Corollary 4.11. For instance this happens if Q0 is the hyperfinite factor. However this is not clear why this should be the case when Q0 is a prime factor. Hence even the strict outerness for such actions does not follow from [Va05, Theorem 5.1]. Before moving to the next section, let us briefly explain how to adapt our argument to cover some actions on type III factors. Remark 4.13. Let G be a totally disconnected group and let K < G be an eventually malnormal compact open subgroup, see Lemma 4.9. Let Q0 be an arbitrary diffuse factor admitting a faithful normal state φ0 with large centralizer (meaning that (Qφ0 0 )′ ∩ Q0 = C). Then the Bernoulli shift G y (Q0 , φ0 )⊗G/K satisfies the Intermediate Subfactor Property. Let us briefly explain. Denote by (Q, φ) := (Q0 , φ0 )⊗G/K . Then the centralizer Qφ of φ is irreducible inside Q, and it is invariant under the G-action. One can show that for all compact open subgroups L < G which is a finite intersection of conjugates of K, the fixed point algebra QL := (Qφ )L satisfies Q′L ∩ (Q ⋊ G) ⊂ L(L). This is done by following the proof of Lemma 4.6, and by noting that the action is properly outer relative to L. Therefore one can use the averaging argument from the proof of Theorem A but instead we average with elements in U ((Qφ )L ) for small groups L as above. Note moreover that in this case since φ is a state (and not a weight), one does not need to bother with the projection q appearing in Step 1 of the proof of Theorem A. In fact the above remark also applies for free Bernoulli actions with weaker assumptions on (Q0 , φ0 ), but we will not elaborate on this. 5. Existence of conditional expectations and operator valued weights In this Section we discuss various results about existence (or non-existence) of conditional expectations and operator valued weights in connection with Izumi, Longo, and Popa’s paper [ILP98]. Let us start our discussion by investigating the existence of conditional expectations/operator valued weights for pairs of the form Q ⋊ H ⊂ Q ⋊ G associated with closed subgroups H < G. CROSSED-PRODUCTS BY LOCALLY COMPACT GROUPS 21 5.1. Proof of Theorem B. Let us start with two lemmas which rely on the notion of support. Lemma 5.1. Consider two actions G y Q and G y P and the diagonal action of G on Q⊗P . If the action G y Q is strictly outer, then Q′ ∩ ((Q ⊗ P ) ⋊ G) = P. Proof. Embed G into G × G diagonally. Then M := (Q ⊗ P ) ⋊ G is identified with a subalgebra of M̃ := (Q ⊗ P ) ⋊ (G × G). Note that   Q′ ∩ M̃ ≃ Q′ ∩ (Q ⋊ G) ⊗ (P ⋊ G) = C ⊗ (P ⋊ G). In particular any element x ∈ Q′ ∩ M , viewed as an element of M̃ has its support contained in the diagonal subgroup of G × G (because x ∈ M ) and in {e} × G (because x ∈ Q′ ∩ M̃ ). So such an element x has its support contained in the trivial group. By Corollary 3.8, we get  x ∈ Q′ ∩ (Q ⊗ P ) = P , as wanted. Lemma 5.2. Consider an action G y Q on an arbitrary von Neumann algebra and put M = Q ⋊ G. Take a weight Φ ∈ P(Q) and denote by Ψ ∈ P(M ) the corresponding dual weight. For any non-zero x ∈ nΨ (M ), the support supp(x) has positive Haar measure inside G. Proof. We will use the description of the dual weight relying on the Hilbert algebra approach, [Ha77a]. According to this approach, given the weight Φ, there exists a left Hilbert algebra AΦ satisfying the following properties. • The Hilbert completion of AΦ is isomorphic to L2 (G, H) and the left von Neumann algebra L(AΦ ) is identified with Q ⋊ G; • The dual weight Ψ corresponds to the canonical weight on L(AΦ ) associated with the Hilbert algebra AΦ ; • For any Φ-right bounded vector η ∈ H and any f ∈ K(G), the function f η ∈ K(G, H) defined by f η : g 7→ f (g)η is a right bounded vector for AΦ . The corresponding operator πr (f η) is given by Z   πr (η)σs (ξ(gs)) f (s−1 ) ds, for all ξ ∈ L2 (G, H), g ∈ G, (5.1) πr (f η)ξ(g) = G where πr (η) denotes the operator on H = L2 (Q, Φ) associated with the right bounded vector η 4. Now take a non-zero x ∈ nΨ (M ). By the above facts and [Ta03, Chapter VII.2], there exists a non-zero left bounded vector ξ ∈ L2 (G, H) such that x = πℓ (ξ) (that is, x is the operator extending the left multiplication by ξ). We claim that the support of ξ as a function in L2 (G, H) is contained in the support of x. In fact the equality holds, but we clearly only need this inclusion to deduce the lemma. Take g ∈ G in the function support of ξ. Take an open neighborhood Ω ⊂ G of the identity element e. We have to show that P (gΩ)πℓ (ξ)P (Ω) is non-zero. For all f ∈ K(Ω) and all Φ-right bounded vector η ∈ H, we have P (gΩ)πℓ (ξ)P (Ω)(f η) = P (gΩ)πℓ (ξ)(f η) = P (gΩ)πr (f η)ξ. We now check that for a suitable choice of f and η the above quantity is non-zero. Since g is in the function support of ξ, there exists η0 ∈ H such that gΩ∩{h ∈ G | hξ(h), η0 i = 6 0} has positive measure. Since the set {πr (η1 )∗ η2 , η1 , η2 ∈ H, Φ-right bounded} is dense inside H, we may find two Φ-right bounded vectors η1 , η2 ∈ H such that πr (η1 )∗ η2 is sufficiently close to η0 so that the set gΩ ∩ {h ∈ G | hξ(h), πr (η1 )∗ η2 i 6= 0} has positive Haar measure. In 4Here we follow [Ha77b] and use the uniqueness of the standard form to identify canonically H with L2 (Q, Φ). 22 RÉMI BOUTONNET & ARNAUD BROTHIER particular, the function ζ ∈ L2 (G, H) defined by h 7→ πr (η1 )ξ(h) satisfies P (gΩ)ζ 6= 0. Put C := kP (gΩ)ζk2 > 0. For f ∈ K(G), denote by fˇ the function h 7→ f (h−1 ). For all non-negative function f ∈ K(G) R such that G f = 1 we have, by (5.1), Z 2 ˇ k(πr (fˇη1 )ξ)(h) − ζ(h)k2 dh kπr (f η1 )ξ − ζk2 = G Z Z   f (s)πr (η1 ) σs (ξ(hs)) − ξ(h) dsk2 dh k = ZG  ZG 2 f (s)kπr (η1 )kkσs (ξ(hs)) − ξ(h)k ds dh ≤ G G Z = kπr (η1 )k2 f (s)f (t)kσs (ξ(hs)) − ξ(h)kkσt (ξ(ht)) − ξ(h)k ds dt dh G×G×G Z 2 ≤ kπr (η1 )k f (s)f (t)kδG (s)−1/2 ρG (s)(ξ) − ξkkδG (t)−1/2 ρG (t)(ξ) − ξk ds dt G×G Z 2  f (s)kδG (s)−1/2 ρG (s)(ξ) − ξk ds , = kπr (η1 )k G where ρG is the representation defined in (2.1). Since ρG is a continuous representation and δG is a continuous function on G, we get that if f is supported on a small enough neighborhood of e, then kπr (fˇη1 )ξ − ζk2 < C/2. By definition of C we get: kP (gΩ)πr (fˇη1 )ξk ≥ kP (gΩ)ζk − kπr (fˇη1 )ξ − ζk ≥ C/2. So there indeed exists a Φ-right bounded vector η1 and a function f1 = fˇ which is supported on Ω such that P (gΩ)xP (Ω)(f1 η1 ) = P (gΩ)πℓ (ξ)(f1 η1 ) 6= 0.  Proof of Theorem B. We prove the two facts separately. (1) First assume that the modular functions δG and δH coincide on H. Then by [Ha77a, Theorem 3.2], for any weight Φ ∈ P(Q), the dual weight ΨG ∈ P(Q ⋊ G) and ΨH ∈ P(Q ⋊ H) satisfy σtΨG (x) = σtΨH (x), for all x ∈ Q ⋊ H, t ∈ R. Therefore there exists a nfs operator valued weight T ∈ P(Q ⋊ G, Q ⋊ H) by [Ha77d, Theorem 5.1]. Conversely, assume that P(Q⋊G, Q⋊H) is non-trivial. By [Ha77d, Theorem 5.9], and Remark 2.3 we deduce that there exists an operator valued weight T ∈ P(M̃ , M ), where M = Q⋊G and M̃ = (L∞ (G/H) ⊗ Q) ⋊ G (because M̃ is isomorphic to the basic construction of Q ⋊ H ⊂ M ). Our intermediate goal is to deduce that there exists a G-invariant nfs weight on A := L∞ (G/H). Unfortunately, we don’t know a priori that T is semi-finite on A. To get around this issue we will exploit the fact that the action is strictly outer and use modular theory. Let us consider the following operator valued weights in P(M̃ , Q). • T1 := TG ◦ T , where TG ∈ P(Q ⋊ G, Q) is the Plancherel operator valued weight. • Tφ := (φ ⊗ id) ◦ T̃G , where T̃G ∈ P(M̃ , A ⊗ Q) is the Plancherel operator valued weight and φ ⊗ id ∈ P(A ⊗ Q, Q) is the tensor product operator valued weight associated to some weight φ ∈ P(A) and the identity map on Q (see [Ha77d, Theorem 5.5]). Fix φ ∈ P(A). By Lemma 5.1, we have that Q′ ∩ M̃ = A, hence the Connes Radon-Nikodym cocycle (DT1 : DTφ )t in the sense of [Ha77d, Definition 6.2] takes values into A, and it is a T 1-cocycle for the flow σt φ . By construction, for any weight ψ ∈ P(Q), the weight ψ ◦ Tφ is CROSSED-PRODUCTS BY LOCALLY COMPACT GROUPS 23 T simply the dual weight associated to φ ⊗ ψ ∈ P(A ⊗ Q). Hence (σt φ )|A = σtφ = id, since A is abelian. We conclude that (ut )t := (DT1 : DTφ )t is a one parameter subgroup of unitaries of A. By [Co73, Théorème 1.2.4], there exists a nfs weight φ′ ∈ P(A) such that (Dφ′ : Dφ)t = ut for all t ∈ R. Claim 1. The weight φ′ is G-invariant. We will denote generically by the letter σ all the G actions. We fix g ∈ G and show that the Connes Radon-Nikodym derivative (Dφ′ ◦ σg : Dφ′ )t is equal to 1 for all t ∈ R. We have (5.2) (Dφ′ ◦ σg : Dφ′ )t = (Dφ′ ◦ σg : Dφ ◦ σg )t (Dφ ◦ σg : Dφ)t (Dφ : Dφ′ )t . By Lemma 2.4, we have that (Dφ′ ◦ σg : Dφ ◦ σg )t = σg−1 ((Dφ′ : Dφ)t ) = σg−1 (ut ). Hence (5.2) becomes (5.3) (Dφ′ ◦ σg : Dφ′ )t = σg−1 (ut )(Dφ ◦ σg : Dφ)t ut . We will show that the right hand side above is equal to 1 by computing all the terms in the equality (5.4) (DT1g : DT1 )t = (DT1g : DTφg )t (DTφg : DTφ )t (DTφ : DT1 )t . Here we denoted by T1g (resp. Tφg ) the operator valued weight σg−1 ◦ T1 ◦ Ad(ug ) ∈ P(M̃ , Q) (resp. σg−1 ◦ Tφ ◦ Ad(ug )). Take a weight ψ ∈ P(Q). By definition of the Connes Radon-Nikodym derivative for operator valued weights, we have (DT1g : DTφg )t = (D(ψ ◦ T1g ) : D(ψ ◦ Tφg ))t = (D(ψ ◦ σg−1 ◦ T1 ) ◦ Ad(ug ) : D(ψ ◦ σg−1 ◦ Tφ ) ◦ Ad(ug ))t = σg−1 ((D(ψ ◦ σg−1 ◦ T1 ) : D(ψ ◦ σg−1 ◦ Tφ ))t ) = σg−1 ((DT1 : DTφ )t ), where the third equality follows from Lemma 2.4. Hence (5.4) becomes (5.5) (DT1g : DT1 )t = σg−1 (ut )(DTφg : DTφ )t u∗t . Now [Ha77b, Theorem 3.1] is easily seen to imply that T1g = δG (g)T1 while Tφg = δG (g)Tφ◦σg . So (DT1g : DT1 )t = δG (g)it and (DTφg : DTφ )t = δG (g)it (DTφ◦σg : DTφ )t = δG (g)it (Dφ ◦ σg : Dφ)t Altogether, (5.5) can be rewritten (5.6) δG (g)it = σg−1 (ut )δG (g)it (Dφ ◦ σg : Dφ)t u∗t . And we see that the right hand side of (5.3) is equal to 1, proving Claim 1. Recall that A = L∞ (G/H) is the subalgebra of right H-invariant functions inside L∞ (G). Denote by q : G → G/H the quotient map. The formula B ⊂ G/H 7→ φ′ (1q−1 (B) ) defines a measure ν on the Borel σ-algebra of G/H. This measure is G-invariant and non-zero (because φ′ is faithful). Claim 2. The G-invariant measure ν is finite on every compact set of G/H. Since φ′ is semi-finite (and faithful), there exists a Borel set B ⊂ G/H such that 0 < ν(B) < ∞. Take a compactly supported non-negative function on G, f ∈ K(G), f 6= 0. Then the function f ∗ 1B defined as follows is continuous: Z f (g)1B (g−1 xH) dmG (g), xH ∈ G/H. (f ∗ 1B )(xH) := G 24 RÉMI BOUTONNET & ARNAUD BROTHIER By Fubini-Tonelli’s Theorem, we have the key equation Z Z Z f (g)1B (g−1 xH) dmG (g) dν(xH) (f ∗ 1B ) dν = G/H G G/H Z f (g)ν(gB) dmG (g) = G Z f dmG . = ν(B) G This key equation tells us first that the continuous non-negative function f ∗ 1B is non-zero. So there exists an open set U ⊂ G/H and α > 0 such that 1U ≤ α(f ∗ 1B ). The key equation also tells us that f ∗ 1B is ν-integrable, and in particular, ν(U ) < ∞. Since any compact set K ⊂ G/H can be covered by finitely many translates of U , Claim 2 follows. By [BHV08, Corollary B.1.7] we deduce from the existence of ν that the modular functions δG and δH must coincide on H. This proves (1). (2) As mentioned earlier in the paper, if H is open inside G, then the indicator function 1H is continuous and positive definite on G. Then the associated multiplier (see [Ha77b, Theorem 3.1.a]) gives the desired conditional expectation from Q ⋊ G onto Q ⋊ H. Conversely, assume that H is not open inside G. If the modular functions δG and δH do not coincide on H, then part (1) ensures that there is no nfs operator valued weight from Q ⋊ G onto Q ⋊ H, and in particular, no conditional expectation. Assume now that the modular functions do coincide. Fix a nfs weight Φ ∈ P(Q), and denote by ΨH ∈ P(Q⋊H) and ΨG ∈ P(Q⋊G) the associated dual weights. As we saw in the proof of (1), [Ha77d, Theorem 5.1] implies that there exists an operator valued weight T ∈ P(Q ⋊ G, Q ⋊ H) such that ΨH ◦ T = ΨG . As the inclusion Q ⋊ H ⊂ Q ⋊ G is irreducible, it suffices to show that T is unbounded, by [Ha77d, Theorem 6.6]. Fix an element f ∈ K(H, Q). Note that since H is not open inside G it has measure 0 inside G5. In particular, since supp(f ) ⊂ H, Lemma 5.2 implies that f ∈ / nΨG (Q ⋊ G). In contrast, ∗ f ∈ nΨH (Q ⋊ H), and hence the expression ψf := ΨH (f · f ) defines a normal positive linear functional on Q ⋊ H. We have T (1)(ψf ) = ψf ◦ T (1) = ΨH ◦ T (f ∗ f ) = ΨG (f ∗ f ) = +∞. Hence T (1) ∈ Q\ ⋊ H + \ Q ⋊ H, and so T is not bounded. The proof is complete.  5.2. When conditional expectations do exist. Applications to Hecke pairs. Before proving Theorem C, let us mention that the argument of Choda applies beyond the setting of discrete groups. Theorem 5.3 ([Ch78], Theorem 3). Consider a strictly outer action G y Q of a locally compact group and take a von Neumann subalgebra N ⊂ Q ⋊ G that contains Q and that is the range of a faithful normal conditional expectation EN : Q ⋊ G → N . Then N is of the form Q ⋊ H for some open subgroup H of G. Proof. As usual, consider the closed subgroup H of G defined by H = {g ∈ G | ug ∈ N }, so that Q ⋊ H ⊂ N . Let us show that the converse inclusion also holds. Since N contains Q, we have u∗g EN (ug ) ∈ Q′ ∩ (Q ⋊ G), for all g ∈ G. As the action is strictly outer, we deduce that for any g ∈ G, EN (ug ) is a scalar multiple of ug . If this scalar multiple 5Indeed for any positive measure Borel set A inside G, the product A−1 A contains a neighborhood of the identity. CROSSED-PRODUCTS BY LOCALLY COMPACT GROUPS 25 is non-zero, this means that ug ∈ N , and hence the scalar in question must be 1. So we obtain the following computation: EN (aug ) = 1{g∈H} aug ∈ Q ⋊ H, for all a ∈ Q and g ∈ G. Since EN is normal we deduce by linearity and density that EN (Q ⋊ G) ⊂ Q ⋊ H. Thus N ⊂ Q ⋊ H, and we have equality. The fact that H is open follows from Theorem B.  We now mention a lemma that provides existence of conditional expectations. It follows from the main technical result of [ILP98]. Lemma 5.4. Consider a compact open subgroup K < G in a locally compact group. Let σ : G y Q be a strictly outer action and put M := Q ⋊ G, N := Q ⋊ K. Then any intermediate von Neumann algebra N ⊂ L ⊂ M is the range of a normal faithful conditional expectation EL : M → L. Proof. We show that N ⊂ M satisfy the assumptions of [ILP98, Corollary 3.1]. Observe that the inclusion N ⊂ M is irreducible since the action of G is strictly outer. As mentioned earlier in the paper, since K is open inside G, there exists a conditional expectation E = EK from M = Q ⋊ G onto N = Q ⋊ K. By Remark 2.3, the basic construction M1 of the N ⊂ M is isomorphic to (Q ⊗ ℓ∞ (G/K)) ⋊ G, where G acts diagonally. The embedding M ⊂ M1 is given by aug 7→ (a ⊗ 1)ug for all a ∈ Q, g ∈ G. Note that G/K is discrete since K is open. By Lemma 5.1, we have Q′ ∩M1 = ℓ∞ (G/K). Hence, the relative commutant N c := N ′ ∩ M1 is isomorphic to the von Neumann algebra of K-bi-invariant maps ℓ∞ (K\G/K). We represent faithfully M1 on H ⊗ ℓ2 (G/K) ⊗ L2 (G) in the obvious way. In this picture, the Jones projection eN is the orthogonal projection onto H ⊗ CδK ⊗ L2 (G) where δK is the Dirac b ∈ P(M1 , M ) of E. mass of the coset K ∈ G/K. Consider the dual operator valued weight E b b We have that E(eN ) = 1 by [Ko85, Lemma 3.1]. This implies that E(1KgK ) = [K : K ∩gKg−1 ], where 1KgK is the characteristic function of KgK, g ∈ G. Since K < G is a compact open subgroup, the index [K : K ∩ gKg−1 ] is finite for any g ∈ G and thus the operator valued b is semi-finite on N c . Given any weight θ ∈ P(N ), [Ha77d, Theorem 6.6] weight T := E ◦ E states that the restriction σ θ◦T |N c of the modular flow associated to θ ◦ T to N c is equal to the modular flow of the restriction of θ ◦ T to N c . Therefore, σtT (x) = x for any t ∈ R, x ∈ N c since N c is commutative. Hence, the pair N ⊂ M indeed satisfies the assumptions of [ILP98, Corollary 3.11], which implies the lemma.  Proof of Theorem C. This follows immediately by combining Theorem 5.3 and Lemma 5.4.  Let us now derive applications to crossed-products by Hecke pairs of groups. By definition, a Hecke pair is a pair of groups (G, H) such that H is a subgroup of G which is commensurated (or almost normal) in G, in the sense that H g := H ∩ gHg−1 has finite index in H and gHg−1 for all g ∈ G. We refer to [AD14] and [Pa12, Br16] for more details on facts below. A typical example of a Hecke pair (G, H) arises when G is a subgroup of the automorphism group of a locally finite connected graph Γ and H is the subgroup of elements of G that stabilize a given vertex of Γ. In fact, this example is somewhat generic, see [AD12, Theorem 2.15]. e H), e which is a new To any Hecke pair (G, H) can be associated its Schlichting completion (G, e e Hecke pair, for which G is a totally disconnected group and H is a compact open subgroup of e The precise construction goes as follows: view G as a subgroup of SG/H , the permutation G. group of G/H. Endow SG/H with the topology of pointwise converge (where G/H is viewed e (resp. H) e to be the closure of G (resp. H) inside SG/H . The as a discrete space), and define G 26 RÉMI BOUTONNET & ARNAUD BROTHIER idea of using the Schlichting completion to study operator algebras of Hecke pairs goes back to Tzanev [Tz01]. The key observation is Proposition 5.6 below. We will say that an action G y Q is action of the Hecke pair (G, H) if it extends continuously e Let us define the crossed-product von Neumann to an action of the Schlichting completion G. algebra associated with such an action. The construction generalizes that of C∗ -algebras associated with Hecke pairs (which correspond to the trivial action G y C), which originate in [BC95]. We also refer to [AD14] for a general treatment. Crossed-product C ∗ -algebras for actions of Hecke pairs were then defined in [Pa12] and the von Neumann algebraic version in [Br16, Section 4]. Let C[Q; G, H] be the space of continuous functions f : G → Q such that f (hgk) = σh (f (g)) for any g ∈ G, h, k ∈ H, and such that the induced functions f : G/H → Q is finitely supported. Note that if f ∈ C[Q; G, H] and g ∈ G, then f (g) is fixed by σ(H ∩ gHg−1 ). We define a multiplication and an involution ∗ on C[Q; G, H] as follows. X f1 f2 (g) = f1 (s)σs (f2 (s−1 g)), for any f1 , f2 ∈ C[Q; G, H] and g ∈ G, s∈lift(G/H) where lift(G/H) is a system of representatives of G/H, f ∗ (g) = σg (f (g−1 )∗ ), for any f ∈ C[Q; G, H] and g ∈ G. The space C[Q; G, H] endowed with those operations is a unital ∗-algebra. It contains a copy of the fixed point von Neumann algebra QH via the map j(a)(g) = χH (g)a, a ∈ QH , g ∈ G, where χH is the characteristic function of H. Assume that Q is standardly represented on a Hilbert space H and denote again by σ : G → U (H) the canonical implementation of the action, see [Ha75]. Let L2 (G/H, H) be the Hilbert space of L2 -functions from G/H to H, where G/H is viewed as a discrete space (and endowed with the counting measure). Consider the subspace K := {ξ ∈ L2 (G/H, H) | ξ(hgH) = σh (ξ(gH)), ∀h ∈ H, gH ∈ G/H}. A similar proof to that of [Br16, Proposition 5.1] gives us the following. Lemma 5.5. The map π : C[Q; G, H] → B(K) defined by X π(f )ξ(gH) = f (s)σs (ξ(s−1 gH)), f ∈ C[Q; G, H], ξ ∈ K, gH ∈ G/H, s∈lift(G/H) is a bounded representation of the ∗-algebra C[Q; G, H]. We call it the standard representation of the Hecke algebra. Denote by vN[Q; G, H] the bicommutant of π(C[Q; G, H]). We call it the crossed-product von Neumann algebra of Q by (G, H). The next proposition relates crossed-products by Hecke pairs to the group crossed-product by the Schlichting completion, it generalizes Lemma 4.2. As mentioned above, this idea goes back to Tzanev [Tz01]. Proposition 5.6. Consider an action of a Hecke pair (G, H) on a von Neumann algebra Q. e H) e the Schlichting completion of (G, H). Then the pairs Denote by (G,    e e e e ⊂ p e (Q ⋊ G)p QH ⊂ vN[Q; G, H] and pHe (Q ⋊ H)p H H H are isomorphic. Here pHe is the averaging projection associated with the compact open subgroup e <G e as defined above. H CROSSED-PRODUCTS BY LOCALLY COMPACT GROUPS 27 e H e are naturally isomorphic. Since the action Proof. Note that the coset spaces G/H and G/ e the pairs G y Q extends continuously to an action of G,    e e H] e QH ⊂ vN[Q; G, H] and QH ⊂ vN[Q; G, e H) e is equal to itself. Replacing are isomorphic. Moreover, the Schlichting completion of (G, e e e = G, (G, H) with (G, H) if necessary, we may assume that H is compact open inside G, and G e = H. H Consider the isometry u : K → L2 (G, H) given by the formula 1 uξ(g) = σ −1 (ξ(gH)), g ∈ G. mG (H)1/2 g Put M := Q ⋊ G. Observe that the map x ∈ pH M pH 7→ u∗ xu ∈ B(K) is a representation that is equivalent to pH M pH acting on pH JpH JL2 (G, H), where J is the conjugation operator on the standard representation L2 (G, H) of M . In particular, x ∈ pH M pH 7→ u∗ xu ∈ B(K) is a faithful representation. Consider the map φ : C[Q; G, H] → K(G, Q) defined by the formula 1 σ −1 (f (g)), for any f ∈ C[Q; G, H], g ∈ G. φ(f )(g) = mG (H) g Observe that the range of φ is the space of functions F ∈ K(G, Q) such that F (kgl) = σl−1 (F (g)) for any g ∈ G, k, l ∈ H. This range is precisely the corner pH K(G, Q)pH and we have that (5.7) u∗ φ(f )u = f for any f ∈ C[Q; G, H]. Therefore, x ∈ pH M pH 7→ u∗ xu ∈ B(K) is an isomorphism of von Neumann algebras onto vN[Q; G, H]. By Lemma 4.2, we have that pH (Q ⋊ H)pH = QH pH and one easily checks that u∗ (QH pH )u = QH .  Observe that if H < L < G is an intermediate closed group, then there is a natural identification of C[Q; L, H] as a subalgebra of C[Q; G, H] of all functions that are supported on L. This identification extends to the respective crossed-product von Neumann algebras. To see this with little effort we can use the above proposition as follows. By definition of the Schlichting completion we have that L̃ is isomorphic to the closure of L inside G̃, where L̃ and G̃ are the Schlichting completions of L and G with respect to the subgroup H. As mentioned in Section 2.3, that the crossed-product Q ⋊ L̃ is isomorphic to the weak closure of the algebraic crossedproduct Q ⋊alg L̃ inside Q ⋊ G̃. Proposition 5.6 and this later fact imply that there exists an injective morphism of von Neumann algebras φ : vN[Q; L, H] → vN[Q; G, H] that sends QH to itself and such that φ(vN[Q; L, H]) is the weak closure of C[Q; L, H] inside vN[Q; G, H]. Theorem C together with Proposition 5.6 implies the following result for crossed-products by Hecke pairs. Corollary 5.7. Consider an action of a Hecke pair (G, H) on a von Neumann algebra Q. If QH ⊂ L ⊂ vN[Q; G, H] is an intermediate von Neumann algebra, then there exists an intermediate group H < H ′ < G such that L is isomorphic to the crossed-product vN[Q; H ′ , H], which we identified as a subalgebra of vN[Q; G, H]. Recently, it has been shown that Hecke pairs appear in subfactor theory. Consider a finite index subfactor N ⊂ M and its symmetric enveloping inclusion T ⊂ S, see [Po94] (or [LR95] in the type III finite depth setting). Then in some cases, there exists a Hecke pair (G, K) and actions G y M ⊗ M op , K × K y M ⊗ M op such that T ⊂ S is isomorphic with (M ⊗ M op )K×K ⊂ vN[M ⊗ M op ; G, K], see [Br16, Theorem 5.5]. Hence, our last corollary gives us information about the lattice of intermediate subfactor in the symmetric enveloping inclusion of N ⊂ M . 28 RÉMI BOUTONNET & ARNAUD BROTHIER References [AD12] [AD14] [BHV08] [BNP07] [BC95] [BHV15] [Br16] [Bu71] [Ch78] [CS16] [CD75] [Co73] [Ey64] [Ha75] [Ha77a] [Ha77b] [Ha77c] [Ha77d] [HI15] [HR16] [ILP98] [Jo83] [Ko85] [KPV14] [LR95] [MvN36] [NT79] [Pa12] [Po94] [Sa77] [Ta73] [Ta03] [To08] [Tz01] C. Anantharaman-Delaroche, Invariant proper metrics on coset spaces. Topology Appl. 160 (2013), 546–552. C. Anantharaman-Delaroche, Approximation properties for coset spaces and their operator algebras. in Proceedings of the Operator Theory, Timisoara. B. Bekka, P. de la Harpe & A. Valette, Kazhdan’s property (T). New Mathematical Monographs, 11. Cambridge University Press, Cambridge, 2008. D. Bisch, R. Nicoara, S. Popa, Continuous families of hyperfinite subfactors with the same standard invariant. Internat. J. Math. 18 (2007), 255–267. J.-B. Bost, A. Connes, Hecke algebras, type III factors and phase transitions with spontaneous symmetry breaking in number theory. Selecta Math. (N.S.) 1 (1995), 411–457. R. Boutonnet, C. Houdayer, S. Vaes, Strong solidity of free Araki-Woods factors. Preprint 2015, arXiv:1512.04820. A. Brothier, On fixed point planar algebras. J. Math. Phys. 57 (2016), 111703. D. Bures, Abelian subalgebras of von Neumann algebras. Memoirs of the American Mathematical Society, 110. American Mathematical Society, Providence, R.I., 1971. H. Choda, A Galois correspondence in a von Neumann algebra. Tohoku Math. Journ. 30 (1978), 491–504. J. Cameron, R. R. Smith, Intermediate subalgebras and bimodules for crossed products of general von Neumann algebras. To appear in Internat. J. Math., 2016. F. Combes, C. Delaroche Groupe modulaire d’une espérance conditionnelle dans une algèbre de von Neumann. Bull. S.M.F. 103 (1975), 385–426. A. Connes, Une classification des facteurs de type III. Ann. Sci. École Norm. Sup. 6 (1973), 133–252. P. Eymard L’algèbre de Fourier d’un groupe localement compact. Bull. S.M.F. 92 (1964), 181–236. U. Haagerup, The standard form of a von Neumann algebra. Math. Scand. 37 (1975), 271–283. U. Haagerup, On the dual weight for crossed-product of von Neumann algebras, I. Math. Scand. 43 (1978), 99–118. U. Haagerup, On the dual weight for crossed-product of von Neumann algebras, II. Math. Scand. 43 (1978), 119–140. U. Haagerup, Operator valued weights in von Neumann algebras, I. J. Funct. Anal. 32 (1979), 175– 206. U. Haagerup, Operator valued weights in von Neumann algebras, II. J. Funct. Anal. 33 (1979), 339–361. C. Houdayer, Y. Isono, Unique prime factorization and bicentralizer problem for a class of type III factors. Adv. Math. 305 (2017), 402–455. C. Houdayer, S. Raum, Locally compact groups acting on trees, the type I conjecture and nonamenable von Neumann algebras. Preprint 2016, arXiv:1610.00884. M. Izumi, R. Longo, S. Popa, A Galois correspondence for compact groups of automorphisms of von Neumann algebras with a generalization to Kac algebras. J. Funct. Anal. 155 (1998), 25–63. V.F.R. Jones, Index for subfactors. Invent. Math. 72 (1983), 1–25. H. Kosaki, Extension of Jones theory on index to arbitrary factors. J. Funct. Anal. 66 (1986), 123–140. D. Kyed, H. Densing-Pedersen, S. Vaes, L2 -Betti numbers of locally compact groups and their cross section equivalence relations. Trans. Amer. Math. Soc. 367 (2015), 4917–4956. R. Longo, K. Rehren, Nets of subfactors. Rev. Math. Phys. 7 (1995), 567–597. F. Murray & J. von Neumann, Rings of operators. I. Ann. of Math. 37 (1936), 116–229. Y. Nakagami, M. Takesaki, Duality for crossed products of von Neumann algebras. Lecture Notes in Mathematics, 731. Springer, Berlin, 1979. R. Palma, Crossed products by Hecke pairs I: ∗-completions. Mem. Am. Math. Soc. (to be published), arXiv:1212.5756. S. Popa, Symmetric enveloping algebras, amenability and AFD properties for subfactors. Math. Res. Lett. 1 (1994), 409–425. J.-L. Sauvageot Sur le type du produit croisé dune algèbre de von Neumann par un groupe localement compact. Bull. Soc. Math. France 105 (1977), 349–368. M. Takesaki, Duality for crossed products and the structure of von Neumann algebras of type III. Acta Math. 131 (1973), 249–310. M. Takesaki, Theory of operator algebras. II. Encyclopaedia of Mathematical Sciences, 125. Operator Algebras and Non-commutative Geometry, 6. Springer-Verlag, Berlin, 2003. xxii+518 pp. R. Tomatsu, A Galois correspondence for compact quantum group actions. J. Reine Angew. Math. 633 (2009), 165–182. K. Tzanev, Hecke C∗ -algebras and amenability. J. Operator Theory 50 (2003), 169–178. CROSSED-PRODUCTS BY LOCALLY COMPACT GROUPS [Va01] [Va05] 29 S. Vaes, The unitary implementation of a locally compact quantum group action. J. of Funct. Anal. 180 (2001), 426–480. S. Vaes, Strictly outer actions of groups and quantum groups. J. Reine Angew Math. 578 (2005), 147–184. Rémi Boutonnet, Institut de Mathématiques de Bordeaux, Université de Bordeaux, 351 cours de la Libération, 33 405 Talence Cedex, France E-mail address: [email protected] Arnaud Brothier, Department of Mathematics, University of Rome Tor Vergata, Via della Ricerca Scientifica 00133 Roma, Italy E-mail address: [email protected] https://sites.google.com/site/arnaudbrothier/
4math.GR
arXiv:1703.08304v1 [math.GR] 24 Mar 2017 DIMENSION QUOTIENTS, FOX SUBGROUPS AND LIMITS OF FUNCTORS ROMAN MIKHAILOV AND INDER BIR S. PASSI Abstract. This paper presents a description of the fourth dimension quotient, using the theory of limits of functors from the category of free presentations of a given group to the category of abelian groups. A functorial description of a quotient of the third Fox subgroup is given and, as a consequence, an identification (not involving an isolator) of the third Fox subgroup is obtained. It is shown that the limit over the category of free representations of the third Fox quotient represents the composite of two derived quadratic functors. 1. Introduction Given a group G, let Z[G] be its integral group ring and g the augmentation ideal of Z[G]. The dimension quotients of G are defined to be its subquotients Dn (G)/γn (G), n ≥ 1, where Dn (G) := G ∩ (1 + gn ) is the nth dimension subgroup of G and γn (G) is the nth term in the lower central series {γi (G)}i≥1 of G. The evaluation of dimension quotients is a challenging problem in the theory of group rings, and has been a subject of investigation since 1935 ([3], [8], [13], [15], [16], [17], [22], [23]). While these quotients are trivial for free groups ([16], [28]), for n = 1, 2, 3 in case of all groups, and for odd prime-power groups [22], it was first shown in 1972 by E. Rips [20] that D4 (G)/γ4 (G) is, in general, non-trivial. Subsequently, the structure of these fourth dimension quotients has been described by K. I. Tahara ([24], [25]) and Narain Gupta [8]. Instances of the non-triviality of dimension quotients in all dimensions n ≥ 4 are now known ([8]; [17], p. 111); however, their precise structure still remains an open problem. Another challenging problem concerning normal subgroups determined by twosided ideals in group rings is the so-called Fox subgroup problem ([6], page 557; [1], Problem 13; [8]). It asks for the identification of the normal subgroup F (n, R) := F ∩ (1 + rfn ) for a free group F and its normal subgroup R. A solution to this problem has been given by I. A. Yunus [27] and Narain Gupta ([8], Chapter III). It turns out that while F (1, R) = γ2 (R), F (2, R) = [R ∩ γ2 (F ), R ∩ γ2 (F )]γ3 (R), the identification p of F (n, R), n ≥ 3, is given as an isolator of a subgroup. For instance, F (3, R) = G(3, R), where G(3, R) := γ2 (R ∩ γ3 (F ))[[R ∩ γ2 (F ), R], R ∩ γ2 (F )]γ4 (R). This identification essentially amounts to the one when the coefficients of the group ring are in the field of rational numbers, rather than in the ring of integers, and thus raises the question of the precise determination of the involved torsion. 1 2 ROMAN MIKHAILOV AND INDER BIR S. PASSI Our aim in this paper is to present an entirely different approach to the above problems via derived functors and limits of functors over the category of free presentations. Our approach is motivated by the connections between the theory of limits of functors with homology of groups, derived functors in the sense of DoldPuppe [4], cyclic homology and group rings ([5], [18], [19], [26]). For instance, the even dimensional integral homology groups turn up as limits [5]: H2n (G) = lim (R/γ2 (R))⊗n F , ←− where (R/γ2 (R))⊗n is the nth tensor power of the relation module R/γ2 (R)), and ⊗n (R/γ2 (R))⊗n , via F is the group of F -coinvariants, the action of F on (R/γ2 (R)) conjugation in R, being diagonal. Certain derived functors in the sense of DoldPuppe [4] turn out as limits [18]: L1 SP2 (Gab ) = lim ←− γ2 (F ) , γ2 (R)γ3 (F ) L1 SP3 (Gab ) = lim ←− γ3 (F ) , [γ2 (R), F ]γ4 (F ) where L1 SP2 and L1 SP3 are the first derived functors of the symmetric square and cube functor respectively and Gab := G/γ2 (G). The description of derived functors L1 SPn (Gab ) as limits for n ≥ 4 is given in [19]. An application of the theory of limits to cyclic homology is given in [26] where it is shown that the cyclic homology of algebras can be defined as limits over the category of free presentations of certain simply defined functors. We work in the same direction, but consider the category of groups. Our approach brings out a fresh context for the study of dimension subgroups and Fox subgroups. To describe the main results of the present work, let F be a free group, R a normal subgroup of F , and G = F/R. Then there is a natural short exact sequence γ2 (F ) γ2 (G) R ∩ γ2 (F ) ֒→ ։ . γ2 (R)(R ∩ γ4 (F )) γ2 (R)γ4 (F ) γ4 (G) Observe that the first two terms can be viewed as functors from the category of free presentations R ֒→ F ։ G of G to the category of abelian groups. The limit functor lim is known to be left ←− exact, i.e., it sends monomorphisms to monomorphisms, however, it is not right exact, and therefore short exact sequences of presentations induce long exact sequences involving higher derived lim i -terms. For instance, the above short ←− sequence induces the following long exact sequence lim ←− R ∩ γ2 (F ) γ2 (G) γ2 (F ) R ∩ γ2 (F ) ֒→ lim → → lim 1 . ←− γ2 (R)γ4 (F ) ←− γ2 (R)(R ∩ γ4 (F )) γ2 (R)(R ∩ γ4 (F )) γ4 (G) Our main result on dimension quotients describes the cokernel of the left monomorphism in the above exact sequence. To be precise, we have Theorem 1. There is a natural short exact sequence lim ←− D4 (G) γ2 (F ) R ∩ γ2 (F ) ֒→ lim ։ . ←− γ2 (R)γ4 (F ) γ2 (R)(R ∩ γ4 (F )) γ4 (G) DIMENSION QUOTIENTS, FOX SUBGROUPS AND LIMITS OF FUNCTORS 3 Thus we present a description of the fourth dimension quotient purely in functorial terms (not involving the group ring), which to us, is a very surprising result. We next give a functorial description of the quotient F (3, R)/G(3, R), together with a complete identification (not involving an isolator), of the third Fox subgroup F (3, R). Theorem 2. Let F be a free group and R a normal subgroup of F . (a) There is a natural isomorphism F (3, R) ≃ L1 SP2 G(3, R)  R ∩ γ2 (F ) γ2 (R)(R ∩ γ3 (F ))  . (b) F (3, R) = G(3, R)W , where W is a subgroup of F , generated by elements [x, y]m [x, sy ]−1 [y, sx ] with xm = rx sx , rx ∈ R ∩ γ3 (F ), sx ∈ γ2 (R) y m = ry sy , ry ∈ R ∩ γ3 (F ), sy ∈ γ2 (R). F (3, R) Finally, we give a description of lim G(3, R) , where it may be noted that compo←− sition of derived functors appears. Theorem 3. There is a natural isomorphism  F (3, R) lim ≃ L1 SP2 L1 SP2 (Gab ) . ←− G(3, R) In particular, there a monomorphism  F (3, R) L1 SP2 L1 SP2 (Gab ) ֒→ . G(3, R) The paper is organized as follows. In Section 2 - Preliminaries- we recall the basic properties and results concerning limits of functors and derived functors needed in the sequel. Section 3 - Generalized Dimension Quotients - is devoted to proving several Lemmas on subgroups determined by two-sided ideals in free group rings. Theorems 1, 2 and 3 are proved in Sections 4, 5 and 6 respectively. We refer the reader to [21] for more details about limits, and to ([8], [17]) for the identification of normal subgroups determined by two-sided idelas in group rings. 2. Preliminaries 2.1. Elementary properties of limits. We begin by recalling the basic facts about limits of functors. Let C, D be arbitrary categories, and let Ab be the category of abelian groups. Recall ([14], Chapter V) that the limit lim F of a functor ←− F : C → D is an object of D together with a universal collection of morphisms {ϕc : lim F → F (c)}c∈C such that F (f )ϕc = ϕc′ for any morphism f : c → c′ . ←− 4 ROMAN MIKHAILOV AND INDER BIR S. PASSI Universality means that for any object d ∈ D and any collection of morphisms {ψc : d → F (c)}c∈C such that F (f )ψc = ψc′ for any morphism f : c → c′ there exists a unique morphism α : d → lim F such that ψc = ϕc α. The limit of a ←− functor does not always exist; however, if it exists, then it is unique up to unique isomorphism that commutes with morphisms ϕc . A category C is said to be strongly connected if for any objects c, c′ ∈ C the homset HomC (c, c′ ) is non-empty. A standard argument implies that, for a strongly connected category C and a functor F : C → Ab, for any object c ∈ C, there is a natural embedding αc : lim F ֒→ F (c). ←− More precisely, lim F can be identified as follows: ←− lim F = {x ∈ F (c) | for all c′ ∈ C, and morphisms f1 , f2 : c → c′ , ←− F (f1 )(x) = F (f2 )(x)}. A category with pairwise coproducts is a category C such that for any objects i2 i1 c2 in C. For a category c1 ⊔ c2 ←− c1 , c2 ∈ C there exists the coproduct c1 −→ with pairwise coproducts C, objects c1 , c2 ∈ C, and a functor F : C → Ab, there is a natural map T : F (c1 ) ⊕ F (c2 ) → F (c1 ⊔ c2 ). A functor F is called monoadditive, if T is injective for any pair of objects c1 , c2 ∈ C. The following lemma is due to S. O. Ivanov. It gives a way to define the limit of a functor as an equalizer. This lemma will not be used in the proofs of main statements of the paper. Lemma 4. Let C be a strongly connected category with pairwise coproducts and F : C → Ab be a functor. Then there are exact sequences α F (i1 )−F (i2 ) c F (c) −−−−−−−−−→ F (c ⊔ c), 0 −→ lim F −→ ←− T 0 −→ lim F −→ F (c) ⊕ F (c) −→ F (c ⊔ c). ←− The map lim F → F (c) ⊕ F (c) is given by x 7→ (αc (x), −αc (x)), where ←− αc : lim F → F (c) is the structure morphism of lim F . ←− ←− Proof. Since C is strongly connected, the map αc : lim F → F (c) is a monomor←− phism and its image is equal to the subgroup of C-invariant elements: lim F ∼ = {x ∈ F (c) | for all c′ , ϕ, ψ : c → c′ F (ϕ)(x) = F (ψ)(x)}. ←− We identify lim F with this subgroup. ←− DIMENSION QUOTIENTS, FOX SUBGROUPS AND LIMITS OF FUNCTORS 5 We claim that Ker(T) = {(x, −x) | x ∈ lim F }. Consider two arbitrary arrows ←− ϕ, ψ : c → c′ and the commutative diagram: F (c) F (i1 )−F (i2 ) / F (c ⊔ c) (−11 )  T / F (c ⊔ c) F (c) ⊕ F (c) ◆◆◆ ◆◆◆ ◆◆ F ((ϕ,ψ)) (F (ϕ), F (ψ)) ◆◆◆ &  F (c′ ). Assume that (x, y) ∈ Ker(T). Then (x, y) ∈ Ker((F (ϕ), F (ψ))), and hence F (ϕ)(x) = −F (ψ)(y). If we take ϕ = ψ = idc , we get x = −y. It follows that for any c′ ∈ C and ϕ, ψ : c → c′ we have F (ϕ)(x) = F (ψ)(x). Thus (x, y) = (x, −x), where x ∈ lim F . Let x ∈ lim F . If we take ϕ = i1 : c → c ⊔ c and ψ = i2 : c → c ⊔ c, we ←− ←− obtain (x, −x) ∈ Ker(T).  1 Since −1 : F (c) → F (c) ⊕ F (c) is a monomorphism and its image contains the kernel of T, the kernel of F (i1 ) − F (i2 ) is equal to lim F as well.  ←− Corollary 5. Let C be a strongly connected category with pairwise coproducts and let F : C → Ab be a functor. Then the functor F is monoadditive if and only if lim F = 0. ←− Our main concern is the category E of free presentations of a given group G. The objects of E are surjective homomorphisms π : F ։ G where F is a free group and morphisms f : (π1 : F1 ։ G) → (π2 : F2 ։ G) are homomorphisms f : F1 → F2 such that π1 = π2 f . The category E has coproducts given by (π1 : F1 ։ G) ⊔ (π2 : F2 ։ G) = ((π1 , π2 ) : F1 ∗ F2 ։ G). The category E is a strongly connected category with pairwise coproducts and therefore, Lemma 4 applies to functors F : E → Ab. Thus, in particular, the limits lim F can be identified with corresponding equalizers. ←− A representation (i.e., a functor) F (F ։ G) : E → Ab will be called a Grepresentation if, for any (F ։ G) ∈ E, the natural inclusion lim F ֒→ F (F ։ G) ←− is an isomorphism. That is, a G-representation F (F ։ G) depends only on G. The limit lim can be defined as the right adjoint to the diagonal functor. It is ←− left exact, but not right exact. A short exact sequence of representations F1 ֒→ F2 ։ F3 induces a long exact sequence of derived functors lim i : ←− 1 lim F1 ֒→ lim F2 → lim F3 → lim F1 → lim 1 F2 → lim 1 F3 → . . . ←− ←− ←− ←− ←− ←− 6 ROMAN MIKHAILOV AND INDER BIR S. PASSI See (Section 2, [21]) for details. In this paper, we will use only one property of higher limits, namely, their triviality for G-representations. The higher limits lim i F can ←− be defined as ith cohomology of the category E with coefficients in a representation F . Since the category E has pairwise products, it is contractible (see, for example, Lemma 3.5 [21]), hence for any G-representation F , lim i F = 0, i ≥ 1. ←− Lemma 6. Let F (F ։ G) be a representation, which lives in an exact sequence F1 (G) → F (F ։ G) → F2 (G), where Fi (F ։ G) = F (G), i = 1, 2 are G-representations. Then F (F ։ G) is also a G-representation. Proof. Let us first consider the case F2 = 0, i.e, the case of a natural surjection F1 (G) ։ F (F ։ G). The assertion in this case follows from the following diagram: lim F1 / ←− ←− F1 (G) lim F1 F1 (G) lim F1 , ←−  lim F / since the quotient // / F1 (G)   / F (F ։ G) // F (F ։G) lim F ←− is zero. Dually, if F1 = 0, the quotient ←− F2 (G)/F (F ։ G) is a G-representation, since it is an epimorphic image of a G-representation. The assertion in this case follows from the following commutative diagram lim F / ←−   F (F ։ G) / / lim F2 ←− / F2 (G) / lim F2 F (F ։G) ←− // F2 (G) F (F ։G) . Let us now assume that the map F1 (G) → F (F ։ G) is a monomorphism and F (F ։ G) → F2 (G) is an epimorphism. Since lim 1 F2 = 0, we obtain the ←− following diagram lim F1 / ←− F1 (G) / and the result follows. / lim F ←−   / F (F ։ G) / / lim F2 ←− / / F2 (G)  DIMENSION QUOTIENTS, FOX SUBGROUPS AND LIMITS OF FUNCTORS 7 2.2. Quadratic functors. We will use the following basic quadratic functors: tensor square ⊗2 , symmetric square SP2 , exterior square Λ2 and antisymmetric ˜ 2 . Recall that, for an abelian group A, square ⊗ SP2 (A) = ⊗2 (A)/ha ⊗ b − b ⊗ a, a, b ∈ Ai Λ2 (A) = ⊗2 (A)/ha ⊗ a, a ∈ Ai ˜ 2 (A) = ⊗2 (A)/ha ⊗ b + b ⊗ a, a, b ∈ Ai. ⊗ For any abelian group A, there is a natural exact sequence ˜ 2 (A) → Λ2 (A) → 0, 0 → A ⊗ Z/2 → ⊗ where the left hand map is given by ā 7→ a ⊗ a, a ∈ A, ā = a + 2A ∈ A ⊗ Z/2. The derived functors in the sense of Dold-Puppe [4] are defined as follows. For an abelian group A and an endofunctor F on the category of abelian groups, the derived functor of F is given as Li F (A) = πi (F KP∗ ), i ≥ 0, where P∗ → A is a projective resolution of A, and K is the Dold-Kan transform, inverse to the Moore normalization functor from simplicial abelian groups to chain complexes. The first derived functor L1 SP2 (A) which will be used in many places of this paper is the natural quotient of Tor(A, A) by diagonal elements (a, a), ma = 0, a ∈ A. The first derived functor L1 Λ2 (A) is the subfunctor of Tor(A, A) generated by these diagonal elements, i.e., there is a natural short exact sequence 0 → L1 Λ2 (A) → Tor(A, A) → L1 SP2 (A) → 0. An abstract value of the abelian group L1 SP2 can be easily computed from the following data: L1 SP2 (Z/m) = L1 SP2 (Z) = 0, m ≥ 2; and L1 SP2 (A ⊕ B) = L1 SP2 (A) ⊕ L1 SP2 (B) ⊕ Tor(A, B), for all abelian groups A, B. The derived functors L1 Λ2 and L1 SP2 naturally appear in the homology of Eilenberg-MacLane spaces. For example, for an abelian A, there are natural short exact sequences, which do not split (see [2]) 0 → Λ3 (A) → H3 (A) → L1 Λ2 (A) → 0 0 → L1 SP2 (A) → H5 K(A, 2) → Tor(A, Z/2) → 0, where Λ3 is the exterior cube. We refer to the thesis of F. Jean [10] for the structure of derived functors of higher symmetric powers. We also need some other natural exact sequences, like the following (2.1) 2 ˜ (A) → L1 Λ2 (A) → 0, 0 → Tor(A, Z/2) → L1 ⊗ and (2.2) ˜ 2 (A) → SP2 (A) → ⊗2 (A) → ⊗ ˜ 2 (A) → 0. 0 → L1 SP2 (A) → Tor(A, A) → L1 ⊗ 8 ROMAN MIKHAILOV AND INDER BIR S. PASSI ˜ 2 (A) → SP2 (A) is, in general, non-zero. There sequences Note that the map L1 ⊗ ˜ 2 ։ Λ2 and SP2 → ⊗2 ։ ⊗ ˜2 are obtained by deriving the sequences − ⊗ Z/2 → ⊗ respectively. The following sequence will be used the proofs of our main results several times. For a free abelian group I and its subgroup J, there is a natural exact sequence (2.3) 0 → L1 SP2 (I/J) → Λ2 (I) → I ⊗ I/J → SP2 (I/J) → 0, Λ2 (J) where the image of an element (x, y), mx = my ∈ J, x, y ∈ I, is mx ∧ y. For the proof see (Theorem 12, [18]; Section 3, [19]). The proof directly follows from the result of Köck [12] saying that the Koszul-type complex Λ2 (J) → I ⊗ J → SP2 (I) represents the element LSP2 (I/J) of the derived category of abelian groups. 3. Generalized dimension quotients In analogy with the dimension subgroups Dn (G) = F ∩ (1 + rZ[F ] + fn )/γn (R), n ≥ 1, when R is a normal subgroup of a free group F with G = F/R, the normal subgroups F ∩ (1 + a + fn ), n ≥ 1, where a is a two-sided ideal of Z[F ] are called generalized dimension subgroups. We set D(n, a) := F ∩ (1 + a + fn ). An example of description of a generalized dimension subgroup and its connection to a derived functor, which we will use later, is the following. It is shown in [9] that, there is a natural isomorphism D(3, fr) D(3, rf) = = L1 SP2 (Gab ). (3.1) γ2 (R)γ3 (F ) γ2 (R)γ3 (F ) See [18] and [19] for more examples of such type. We need the identification of certain generalized dimension subgroups. Recall that if R is a normal subgroup of a free group F and Y is a basis of R, then the two-sided ideal rZ[F ], viewed as a left (resp. right) Z[F ]-module, is free with basis {y − 1 | y ∈ Y } ([7], Theorem 1, p. 32). Lemma 7. If F is a free group of finite rank m ≥ 1, X = {x1 , x2 , . . . , xm } an ordered basis of F , and R a normal subgroup of F generated by {xe11 ξ1 , xe22 ξ2 , . . . , xemm ξm , ξm+1 , . . .} with ξi ∈ γ2 (F ) for i = 1, 2, . . . , and integers ei ≥ 0 satisfying em |em−1 | . . . |e2 |e1 , then the generalized dimension subgroup D(4, frf + f2 r) := F ∩ (1 + frf + f2 r + f4 ) is generated, modulo γ4 (F ), by the commutators • [[xj , xi ], xi ]ei (j > i), • [[xj , xi ], xk ]ℓjk (j > i < k), where ℓjk = lcm(ej , ek ). DIMENSION QUOTIENTS, FOX SUBGROUPS AND LIMITS OF FUNCTORS 9 Proof. It is easy to see that the elements [[xj , xi ], xi ]ei (j > i), and [[xj , xi ], xk ]ℓjk (j > i < k), where ℓjk = lcm(ej , ek ) all lie in D(4, frf + f2 r). Let S = hxei (1 ≤ i ≤ m), γ2 (F )i, and w ∈ D(4, frf + f2 r). Observe that frf + f2 r + f4 = fsf + f2 s + f4 . Since D3 (F ) = γ3 (F ) and {[[xj , xi ], xk ] | m ≥ j > i ≤ k ≤ m} is a basis of γ3 (F )/γ4 (F ), we have, modulo γ4 (F ), w= m Y wi , wi = i=1 Y [[xj , xi ], xk ]aijk ∈ D(4, fsf + f2 s), aijk ∈ Z. j>i≤k 4 Modulo f , we have (3.2) Wi := wi − 1 = X {aijk [(xj − 1)(xi − 1) − (xi − 1)(xj − 1)](xk − 1) j>i≤k − (xk − 1)[(xj − 1)(xi − 1) − (xi − 1)(xj − 1)]}. Left differentiating (in the sense of free differential calculus [see [8], p.7]) with respect to xi , we have X aiji [(xj − 1)(xi − 1) − 2(xi − 1)(xj − 1)] (3.3) xi Wi = j>i − X aijk (xk − 1)(xj − 1) ∈ fs + ei f2 + f3 . j>i<k Right differentiating with respect to xi , gives 2aiji (xj − 1) ∈ s + ei f + f2 (j > i). Hence ej |2aiji , j > i, and Eq(3.3) implies X X aiji (xj − 1)(xi − 1) − aijk (xk − 1)(xj − 1) ∈ fs + ei f2 + f3 . (3.4) j>i j>i<k Since the second sum does not involve xi , we conclude that X aiji (xj − 1)(xi − 1) ∈ fs + ei f2 + f3 (3.5) j>i and (3.6) X aijk (xk − 1)(xj − 1) ∈ fs + ei f2 + f3 . j>i<k Eq(3.5) implies that aiji (xi − 1) ∈ s + ei f + f2 , and therefore we have (3.7) ei |aiji , j > i. Similarly Eq(3.6) implies that (3.8) ej |aijk , j > i < k. Eq(3.2) thus reduces to X (3.9) aijk (xj − 1)(xi − 1)(xk − 1) ∈ fsf + f2 s + f4 . j>i<k 10 ROMAN MIKHAILOV AND INDER BIR S. PASSI Eq(3.9) yields that (3.10) ek |aijk , j > i < k. Eqs (3.8) and (3.10) imply (3.11) ℓij |aijk , j > i < k, ℓ = lcm(ej , ek ). Hence the element w lies in the subgroup generated by the commutators • [[xj , xi ], xi ]ei (j > i), • [[xj , xi ], xk ]ℓjk (j > i < k), where ℓjk = lcm(ej , ek ), as claimed.  Corollary 8. If F is a free group and R a normal subgroup of F such that F/Rγ2 (F ) is torsion-free, then D(4, frf + f2 r) = [[R, F ], R]γ4 (F ). Proof. It is easy to see that [[R, F ], R]γ4 (F ) ⊆ D(4, frf + f2 r). Observe that, for the reverse inclusion, it suffices to consider the case when F is finitely generated, and so Lemma 7 applies.  With free group F and its subgroup S as in Lemma 7, we have Lemma 9. D(4, sf ∩ f3 ) = [γ2 (F ), S]γ4 (F ). Proof. Let w ∈ D(4, sf ∩ f3 ). Then, modulo γ4 (F ), w= m−1 Y wi , wi = i=1 Y [[xj , xi ], xk ]aijk , aijk ∈ Z, m≥j>i≤k≤m 3 with wi ∈ D(4, sf ∩ f ). Modulo sf ∩ f3 + f4 , for every i ∈ {1, 2, . . . , m − 1}, (3.12) Wi := wi − 1 = X {aijk [(xj − 1)(xi − 1) − (xi − 1)(xj − 1)](xk − 1) m≥j>i≤k≤m − (xk − 1)[(xj − 1)(xi − 1) − (xi − 1)(xj − 1)]} Since (xj − 1)(xi − 1) − (xi − 1)(xj − 1) ∈ s, it follows that (3.13) Wi′ := X aijk (xk − 1)[(xj − 1)(xi − 1) − (xi − 1)(xj − 1)] ∈ sf ∩ f3 + f4 . m≥j>i≤k≤m Eq(3.13) implies that for every j ∈ {i + 1, . . . , m} and i ∈ {1, 2, . . . m − 1}, (3.14) ′ xj Wi = m X aijk (xk − 1)(xi − 1) ∈ s + f3 . k=i It follows that (3.15) ek |aijk , for m ≥ j > i ≤ k ≤ m. Thus we see that wi ∈ D(4, sf ∩ f3 ) only if (3.16) ek |aijk (m ≥ j > i ≤ k ≤ m), DIMENSION QUOTIENTS, FOX SUBGROUPS AND LIMITS OF FUNCTORS 11 and so wi and hence w ∈ [γ2 (F ), S]γ4 (F ). Hence D(4, sf ∩ f3 ) ⊆ [γ2 (F ), S]γ4 (F ). The reverse inclusion is easily seen to hold.  Lemma 10. If F is a free group and R a normal subgroup of F , then, modulo γ4 (F ), D(4, fr ∩ f3 ) = D(4, rf ∩ f3 ) = h[f ′ , f ]e | f ′ ∈ γ2 (F ), f ∈ F, f ′e ∈ (R ∩ γ2 (F ))γ3 (F ), f e ∈ Rγ2 (F )i. Proof. The first equality is an immediate consequence of the canonical anti-isomorphism of Z[F ] induced by w 7→ w−1 , w ∈ F . It is easy to check that [f ′ , f ]e ∈ D(4, rf ∩ f3 ) if f ′ ∈ γ2 (F ), f ∈ F, f ′e ∈ (R ∩ γ2 (F ))γ3 (F ), f e ∈ Rγ2 (F ). Conversely, let w ∈ D(4, rf ∩ f3 ). To analyze w, we may clearly assume that F is finitely generated, R, S are as in Lemma 7, and so w ∈ D(4, sf ∩ f3 ). Therefore, by Lemma 9, we have, modulo γ4 (F ), w= m−1 Y wi i=1 with Y wi = [[xj , xi ], xk ]ek bijk , bijk ∈ Z. m≥j<i≤k≤m On collecting terms, we have, w≡ m Y [fk , xk ]ek , fk ∈ γ2 (F ), 1 ≤ k ≤ m. k=1 Now w − 1 ∈ rf ∩ f3 + f4 . Therefore we have m X ek (fk − 1)(xk − 1) ∈ rf ∩ f3 + f4 . k=1 Differentiating with respect to xk , yields fkek − 1 ∈ r + f3 . Hence fkek ∈ (R ∩ γ2 (F ))γ3 (F ), 1 ≤ k ≤ m, and consequently w ∈ h[f ′ , f ]e | f ′ ∈ γ2 (F ), f ∈ F, f ′e ∈ (R ∩ γ2 (F ))γ3 (F ), f e ∈ Rγ2 (F )i.  Observe that, for every free group F and its normal subgroup R, (3.17) γ2 (R) ∩ γ3 (F ) = [R ∩ γ2 (F ), R]. 12 ROMAN MIKHAILOV AND INDER BIR S. PASSI To see this equality, consider the map between exterior squares Λ2 (R/(R ∩ F ′ )) → Λ2 (Fab ), (3.18) induced by inclusion R/(R ∩ γ2 (F )) ֒→ Fab , where Fab denotes the abelianization of F . The map (3.18) is a monomorphism, since it is induced by a monomorphism of free abelian groups. The needed equality (3.17) now follows from the following identifications: Λ2 (R/(R ∩ γ2 (F ))) = γ2 (R) , [R ∩ γ2 (F ), R] Λ2 (Fab ) = γ2 (F )/γ3 (F ). Thus, in particular, (γ2 (R) ∩ γ3 (F ))γ4 (F ) = [R ∩ γ2 (F ), R]γ4 (F ). In view of the known structure ([14], Chapter V, Section 5) of Tor(A, B) for abelian groups A, B, the preceding Lemma immediately yields the following result. Lemma 11. There is a natural epimorphism φ : Tor(γ2 (G)/γ3 (G), Gab ) → D(4, fr ∩ f3 ) D(4, fr ∩ f3 ) = . [R ∩ γ2 (F ), R]γ4 (F ) (γ2 (R) ∩ γ3 (F ))γ4 (F ) 4. Proof of theorem 1 First observe that the cokernel of the natural map D(4, fr) R ∩ D(4, fr) ֒→ γ2 (R)γ4 (F ) γ2 (R)γ4 (F ) can be naturally identified with the fourth dimension quotient D4 (G) D(4, rZ[F ]) = γ4 (G) Rγ4 (F ) (see, for example, [8], p.8̇0). There is an obvious short exact sequence D(4, fr) D4 (G) R ∩ D(4, fr) ֒→ → . γ2 (R)γ4 (F ) γ2 (R)γ4 (F ) γ4 (G) The right hand map is, in fact, surjective. For, let w ∈ D(4, rZ[F ]) so that w − 1 ∈ ] rZ[F ] + f4 . The quotient rZ[F is the relation module R/γ2 (R), and so there is a fr natural epimorphism R/γ2 (R) ։ rZ[F ] + f4 fr + f4 and we can find an element r ∈ R, such that wr − 1 ∈ fr + f4 . It thus follows that D(4, fr) 4 (G) every element of the dimension quotient D γ4 (G) has a preimage in γ2 (R)γ4 (F ) . DIMENSION QUOTIENTS, FOX SUBGROUPS AND LIMITS OF FUNCTORS 13 Consider the natural diagram with exact rows and columns (4.1) R∩D(4, fr) γ2 (R)γ4 (F ) / R∩γ2 (F ) γ2 (R)(R∩γ4 (F )) /  f2 fr+f4 / f2 (R∩γ2 (F )−1)+fr+f4 //     D(4, fr) γ2 (R)γ4 (F ) γ2 (F ) γ2 (R)γ4 (F ) / /  2 f fr+f4 / 2 f (γ2 (F )−1)+fr+f4 //  D4 (G) γ4 (G) / γ2 (G) γ4 (G) / Now observe that f2 f f = lim 3 ⊗Z[G] = 0. ←− fr + f4 ←− f r + f3 f f g This follows from monoadditivity of ff3 ⊗Z[G] r+f 3 = f3 ⊗Z[G] g3 which can be easily checked. The top two horizontal exact sequences in (4.1) imply the natural isomorphisms lim R ∩ γ2 (F ) R ∩ D(4, fr) ≃ lim ←− γ2 (R)(R ∩ γ4 (F )) γ2 (R)γ4 (F ) γ2 (F ) D(4, fr) ≃ lim . lim ←− γ2 (R)γ4 (F ) ←− γ2 (R)γ4 (F ) lim ←− Therefore, the left hand vertical exact sequence in diagram (4.1) implies that we have the following the long exact sequence (4.2) lim ←− R ∩ γ2 (F ) D4 (G) γ2 (F ) R ∩ D(4, fr) ֒→ lim → → lim 1 ←− γ2 (R)γ4 (F ) ←− γ2 (R)γ4 (F ) γ2 (R)(R ∩ γ4 (F )) γ4 (G) Next consider the following diagram with exact rows and columns (4.3) D(4, fr∩f3 ) (γ2 (R)∩γ3 (F ))γ4 (F ) / D(4, fr) γ2 (R)γ4 (F ) / / D(3, fr) γ2 (R)γ3 (F )       γ3 (F ) (γ2 (R)∩γ3 (F ))γ4 (F ) γ2 (F ) γ2 (R)γ4 (F ) γ2 (F ) γ2 (R)γ3 (F ) / /  f3 fr∩f3 +f4 //  / /  f2 fr+f4 (observe that, the right hand horizontal map f2 fr+f3 // D(4, fr) γ2 (R)γ4 (F ) general, surjective). The generalized dimension quotient with the first derived functor of the symmetric square: D(3, fr) = L1 SP2 (Gab ) γ2 (R)γ3 (F ) D(3, fr) γ2 (R)γ3 (F ) D(3, fr) γ2 (R)γ3 (F ) is → is not, in identified 14 ROMAN MIKHAILOV AND INDER BIR S. PASSI (see (3.1)). By Lemmas 6 and 11, the dimension quotient D(4, fr ∩ f3 ) D(4, fr ∩ f3 ) = (γ2 (R) ∩ γ3 (F ))γ4 (F ) [R ∩ γ2 (F ), R]γ4 (F ) is a G-representation. Therefore, by Lemma 6, using the upper horizontal exact fr) sequence in the diagram (4.3), we conclude that γ2D(4, (R)γ4 (F ) is a G-representation, and D(4, fr) D(4, fr) lim = . ←− γ2 (R)γ4 (F ) γ2 (R)γ4 (F ) Looking at the left hand vertical epimorphism in the diagram (4.1), we conclude that the natural map lim ←− D4 (G) γ2 (F ) D(4, fr) = lim → ←− γ2 (R)γ4 (F ) γ2 (R)γ4 (F ) γ4 (G) 1 R∩D(4, fr) 4 (G) is an epimorphism, that is, the map D in (4.2) is zero and γ4 (G) → lim ←− γ2 (R)γ4 (F ) the asserted short exact sequence follows, and the proof is complete. 5. Proof of theorem 2 (a) Let us set G(2, R) := [R ∩ γ2 (F ), R ∩ γ2 (F )]γ3 (R). Since F (2, R) = G(2, R), F (3, R) is a subgroup of G(2, R). Observe that, in view of (3.17), we have γ2 (R ∩ γ2 (F )) ∩ γ3 (R) = [γ2 (R), R ∩ γ2 (F )], and γ2 (R ∩ γ3 (F )) ∩ γ3 (R) = [γ2 (R) ∩ γ3 (F ), R ∩ γ3 (F )] = [[R ∩ γ2 (F ), R], R ∩ γ3 (F )] ⊆ [[R ∩ γ2 (F ), R], R ∩ γ2 (F )]. We have the following natural diagram with exact rows and columns (5.1) F (3, R) G(3, R) / γ2 (R∩γ2 (F ))∩(1+rf3 +r3 Z[F ]) γ2 (R∩γ3 (F ))[γ2 (R), R∩γ2 (F )]    γ3 (R) [R∩γ2 (F ), R, R∩γ2 (F )]γ4 (R) / G(2, R) G(3, R) /  // γ2 (R∩γ2 (F )) γ2 (R∩γ3 (F ))[γ2 (R), R∩γ2 (F )]    r3 Z[F ] r3 Z[F ]∩rf3 rf2 rf3 rf2 rf3 +r3 Z[F ] / / // Let us set I := R ∩ γ2 (F ) , γ2 (R) J := R ∩ γ3 (F ) . γ2 (R) ∩ γ3 (F ) DIMENSION QUOTIENTS, FOX SUBGROUPS AND LIMITS OF FUNCTORS 15 Clearly J ⊂ I ⊂ R/γ2 (R). Observe that γ2 (R ∩ γ2 (F )) Λ2 (I) = . Λ2 (J) γ2 (R ∩ γ3 (F ))[γ2 (R), R ∩ γ2 (F )] Invoking the exact sequence (2.3), we have the following sequence L1 SP2 (I/J) ֒→ Λ2 (I) → I ⊗ I/J. Λ2 (J) There is a natural isomorphism rZ[F ] f2 rf2 = ⊗ rf f3 + r2 rf3 + r3 Z[F ] [Observe that, rf3 + r3 = rf3 + r3 Z[F ], and we can omit the last Z[F ] term.] Recall that D(3, r2 ) = γ2 (R)γ3 (F ) (see [18]). Hence, there are monomorphisms I ֒→ R/γ2 (R) = rZ[F ] , rf I/J ֒→ Since both R/γ2 (R) and Coker(I ֒→ R/γ2 (R)) = that there is a natural monomorphism f2 . f3 + r2 R R∩γ2 (F ) are free abelian, we see rf2 . rf + r3 The sequence (2.3) implies the following diagram I ⊗ I/J ֒→ L1 SP2 (I/J) / / 3 Λ2 (I) Λ2 (J) / I ⊗ I/J   γ2 (R∩γ2 (F )) γ2 (R∩γ3 (F ))[γ2 (R), R∩γ2 (F )] / rf2 rf3 +r3 We thus obtain the following identification: γ2 (R ∩ γ2 (F )) ∩ (1 + rf3 + r3 ) = L1 SP2 (I/J). γ2 (R ∩ γ3 (F ))[γ2 (R), R ∩ γ2 (F )] There is a simple way to pick representatives of L1 SP2 (I/J) in γ2 (R ∩ γ2 (F )), which also follows from the sequence (2.3). The subgroup L1 SP2 (I/J) is generated by elements [x, y]m , x, y ∈ R ∩ γ2 (F ), xm , y m ∈ (R ∩ γ3 (F ))γ2 (R). One can easily check that, for such a pair x, y, [x, y]m − 1 ∈ rf3 + r3 . We assert that the horizontal arrow (let us call it q) in the diagram (5.1) F (3, R) γ2 (R ∩ γ2 (F )) ∩ (1 + rf3 + r3 ) → G(3, R) γ2 (R ∩ γ3 (F ))[γ2 (R), R ∩ γ2 (F )] is an epimorphism. For, let q: xm = rx sx , rx ∈ R ∩ γ3 (F ), sx ∈ γ2 (R), y m = ry sy , ry ∈ R ∩ γ3 (F ), sy ∈ γ2 (R). 16 ROMAN MIKHAILOV AND INDER BIR S. PASSI Consider the element w := [x, y]m [x, sy ]−1 [y, sx ]. Clearly, q(w) = [x, y]m , since [x, sy ]−1 [y, sx ] ∈ γ3 (R). Working modulo rf3 , we have w − 1 ≡ m(x − 1)(y − 1) − m(y − 1)(x − 1) − ([x, sy ] − 1) + ([y, sx ] − 1) ≡ (x − 1)(y m − 1) − (y − 1)(xm − 1) − ([x, sy ] − 1) + ([y, sx ] − 1) ≡ (x − 1)(sy − 1) − (y − 1)(sx − 1) − ([x, sy ] − 1) + ([y, sx ] − 1) ≡ (sy − 1)(x − 1) − (sx − 1)(y − 1) ≡ 0, i.e., w ∈ F (3, R). Hence, the map q is an epimorphism. We next show that the left hand vertical map in the diagram (5.1), namely, r3 Z[F ] γ3 (R) → 3 [[R ∩ γ2 (F ), R], R ∩ γ2 (F )]γ4 (R) r Z[F ] ∩ rf3 is a monomorphism, i.e., γ3 (R) ∩ (1 + r3 Z[F ] ∩ rf3 ) = [[R ∩ γ2 (F ), R], R ∩ γ2 (F )]γ4 (R). Clearly, γ3 (R) ∩ (1 + r3 Z[F ] ∩ rf3 ) = γ3 (R) ∩ (1 + r3 ∩ rf3 ). Next we will use the following identification (see [11]): r2 ∩ f3 = r3 + r∆(R ∩ γ2 (F )) + ∆(γ2 (R) ∩ γ3 (F )). where ∆(H) denotes the augmentation ideal of the group ring Z[H]. We have r3 ∩ rf3 = r(r2 ∩ f3 ) (recall the quote preceding Lemma 7) = r(r∆(R ∩ γ2 (F )) + ∆(R ∩ γ2 (F ))r + ∆(γ2 (R) ∩ γ3 (F )) + r3 ) = r(r∆(R ∩ γ2 (F )) + ∆(R ∩ γ2 (F ))r + ∆([R ∩ γ2 (F ), R]) + r3 ) = r∆(R ∩ γ2 (F ))r + r2 ∆(R ∩ γ2 (F )) + r4 , Corollary 8 implies that the right hand vertical arrow in (5.1) is a monomorphism. Hence   R ∩ γ2 (F ) F (3, R) ≃ L1 SP2 (I/J) = L1 SP2 G(3, R) γ2 (R)(R ∩ γ3 (F )) and the proof part (a) of Theorem 2 is complete. Part (b) follows from the part (a) together with the lifting of elements from L1 SP2 (I/J) described above. 6. Proof of theorem 3 By Theorem 2, F (3, R) = lim L1 SP2 lim ←− ←− G(3, R)  R ∩ γ2 (F ) γ2 (R)(R ∩ γ3 (F ))  . DIMENSION QUOTIENTS, FOX SUBGROUPS AND LIMITS OF FUNCTORS 17 In order to study right hand limit, consider the following diagram with exact rows and columns (6.1) L1 SP2 (Gab )  L1 SP2 (Gab )    R∩γ2 (F ) γ2 (R)(R∩γ3 (F )) / / γ2 (F ) γ2 (R)γ3 (F ) / / γ2 (G)/γ3 (G)    / / g2 /g3  r∩f2 +f3 fr+f3 / / f2 fr+f3   SP2 (Gab ) SP2 (Gab ). The middle vertical sequence in (6.1) is the sequence (2.3) (for I = Fab , J = R/(R ∩ γ2 (F ))): L1 SP2 (Gab ) / / Λ2 (Fab ) Λ2 (R/(R∩γ2 (F ))) / Fab ⊗ Gab γ2 (F ) γ2 (R)γ3 (F ) / / / SP2 (Gab ) f2 fr+f3 The right hand vertical map γ2 (G)/γ3 (G) → g2 /g3 is a monomorphism, since D3 (G) = γ3 (G). Let us set K := R ∩ γ2 (F ) rZ[F ] ∩ f2 + f3 . , L := γ2 (R)(R ∩ γ3 (F )) fr + f3 Then we have the following short exact sequence: 0 → L1 SP2 (Gab ) → K → L → 0. Observe that, the monomorphism L1 SP2 (Gab ) ֒→ K implies that the induced map Tor(L1 SP2 (Gab ), L1 SP2 (Gab )) → Tor(K, K) is also a monomorphism. Therefore, the induced maps L1 SP2 (L1 SP2 (Gab )) → L1 SP2 (K), L1 Λ2 (L1 SP2 (Gab )) → L1 Λ2 (K) are also monomorphisms, since L1 SP2 and L1 Λ2 are subfunctors of the Tor-functor. Since the functor Tor(−, Z/2) is left-exact, the sequence (2.1) implies that the induced map ˜ 2 (L1 SP2 (Gab )) → L1 ⊗ ˜ 2 (K) L1 ⊗ 18 ROMAN MIKHAILOV AND INDER BIR S. PASSI is a monomorphism. Now the sequence (2.2) implies that we have the inclusion Tor(K, K) L1 SP2 (K) ֒→ . 2 2 2 L1 SP (L1 SP (Gab )) Tor(L1 SP (Gab ), L1 SP2 (Gab )) We assert that (6.2) lim ←− Tor(K, K) = 0. Tor(L1 SP (Gab ), L1 SP2 (Gab )) 2 The natural consequence of the above vanishing of lim is that we have the isomor←− phism L1 SP2 (L1 SP2 (Gab )) = lim L1 SP2 (K) ←− and Theorem 3 will follow. It remains to establish the vanishing result (6.2). Observe that we have an exact sequence 0 → Tor(L1 SP2 (Gab ), L1 SP2 (Gab )) → Tor(L1 SP2 (Gab ), K) → Tor(L1 SP2 (Gab ), L). Since L ⊂ f2 rf+f3 = Gab ⊗ Fab , there is a natural inclusion Tor(L1 SP2 (Gab ), L) ֒→ Tor(L1 SP2 (Gab ), Gab ⊗ Fab ). The short exact sequence R 0→ ⊗ Fab → Fab ⊗ Fab → Gab ⊗ Fab → 0, R ∩ γ2 (F ) on tensoring with L1 SP2 (Gab ), gives an inclusion Tor(L1 SP2 (Gab ), Gab ⊗ Fab ) ֒→ Tor(L1 SP2 (Gab ), Gab ⊗ Fab ) ⊗ R ⊗ Fab . R ∩ γ2 (F ) Since the representation Tor(L1 SP2 (Gab ), Gab ⊗ Fab ) ⊗ R∩γR2 (F ) ⊗ Fab is monoadditive [one can easily check that, for any representation F , the representation F ⊗ Fab is mono-additive], it follows that lim Tor(L1 SP2 (Gab ), L) = 0 ←− and consequently Tor(L1 SP2 (Gab ), L1 SP2 (Gab )) = lim Tor(L1 SP2 (Gab ), K). ←− A similar argument shows that lim Tor(L, K) = 0 and hence ←− lim Tor(L1 SP2 (Gab ), K) = lim Tor(K, K). ←− 1 2 ←− 2 Since lim Tor(L1 SP (Gab ), L1 SP (Gab )) = 0, we conclude (6.2). ✷ ←− Remark. Theorem 2 implies that there is a natural exact sequence 0 → L1 SP2 (K) → G(2, R) rf2 → 3, G(3, R) rf The quotient rZ[F ] f2 rf2 ⊗ 3 3 ≃ rf f rf DIMENSION QUOTIENTS, FOX SUBGROUPS AND LIMITS OF FUNCTORS 19 is a mono-additive representation. Hence, lim ←− G(2, R) = L1 SP2 (L1 SP2 (Gab )). G(3, R) Remark. The middle vertical sequence in (6.1) implies that, if Gab is torsion-free, γ2 (F ) R∩γ2 (F ) then the group γ2 (R)γ is torsion-free as well. Since the quotient γ2 (R)(R∩γ 3 (F ) 3 (F )) γ2 (F ) is a subgroup of γ2 (R)γ , we conclude that, if Gab is torsion-free, then F (3, R) = 3 (F ) G(3, R), by Theorem 2. Acknowledgement The research is supported by the Russian Science Foundation grant N 16-1110073. The authors are thankful to Harish-Chandra Research Institute, Allahabad, for the warm hospitality provided to them during their visit in February 2017. References [1] Joan S. Birman: Braids, Links and Mapping Class Groups, Annales of Mathematics Studies Vol. 82, Princeton Univ. Press, 1974. [2] L. Breen: On the functorial homology of abelian groups, J. Pure Appl. Alg. 142 (1999), 199–237. [3] P. M. Cohn: Generalizaion of a theorem of Mangnus, Proc. London Math. Soc., 2 (1952), 297–310. [4] A. Dold and D. Puppe: Homologie nicht additiver Funktoren Anwendugen, Annales de l’institut Fourier, tome 11, no . 6 (1961), 201–312. [5] I. Emmanouil and R. Mikhailov: A limit approach to group homology, J. Algebra 319 (2008), 1450–1461. [6] R. Fox: Free differential calculus I: Derivation in the free group ring, Ann. Math. 57 (1953), 547–560. [7] Karl W. Gruenberg: Cohomological Topics in Group Theory, LNM Vol. 143, Springer-Verlag, 1970. [8] Narain Gupta: Free Group Rings, Contemporary Mathematics, Vol. 66, American Mathematical Society, 1987. [9] M. Hartl, R. Mikhailov and I. B. S. Passi: Dimension quotients, J. Indian Math. Soc., New Ser. Spec. Centenary Vol., 63–107 (2007). [10] F. Jean: Foncteurs derives de lalgebre symetrique: Application au calcul de certains groupes dhomologie fonctorielle des espaces K(B, n), Doctoral thesis, University of Paris 13, 2002, available at: http://homepages.abdn.ac.uk/mth192/pages/html/archive/jean.html [11] R. Karan, D. Kumar and L. Vermani: Some intersection theorems and subgroups determined by certain ideals in integral group rings II, Algebra Colloq. 9 (2002), 135-142. [12] B. Köck: Computing the homology of Koszul complexes, Trans. Amer. Math. Soc., 353 (2001), 3115–3147. [13] G. Losey: On dimension subgroups, Trans. Amer. Math. Soc., 97 (1960), 474–486. [14] S. Mac Lane: Categories for The Working Mathematicians, Secon Edition, Springer, 1998. [15] W. Magnus: Beziehngen zwischen Gruppen in einem speziellen Ring, Math. Ann., 111 (1935), 259–280. [16] W. Magnus: Über Beziehungen zwischen höheren Kommutatoren, J. reine angew. Math., 177 (1937), 105–115. [17] Roman Mikhailov and Inder Bir S. Passi: Lower Central and Dimension Series of Groups, LNM Vol. 1952, Springer 2009. [18] R. Mikhailov and I. B. S. Passi: Generalized dimension subgroups and derived functors, J. Pure Appl. Algebra 220 (2016), 2143–2163. [19] R. Mikhailov and I. B. S. Passi: Free group rings and derived functors, arXiv:1605.08196. 20 ROMAN MIKHAILOV AND INDER BIR S. PASSI [20] E. Rips: On the fourth integer dimension subgroup, Israel J. Math. 12 (1972), 342–346. [21] S. Ivanov and R. Mikhailov: A higher limit approach to homology theories, J. Pure and Appl. Algebra 219 (2015), 1915–1939. [22] I. B. S. Passi: Dimension subgroups, J. Algebra, 9 (1968), 152–182. [23] I. B. S. Passi: Group Rings and Their Augmentation Ideals, LNM Vol. 715, Springer-Verlag, 1979, [24] K.-I. Tahara: On the fourth dimension subgroups and polynomial maps, J. Algebra, 45 (1977), 102–131. [25] K.-I. Tahara: On the structure of Q3 (G) and the fourth dimension subgroup, Japan J. Math. (N.S.) 3 (1977), 381–396. [26] D. Quillen: Cyclic cohomology and algebra extensions, K-Theory 3, (1989), 205–246. [27] A. I. Yunus: On a problem of Fox, Soviet Math. Dokl., 30 (1984), 346–350. [28] E. Witt: Treue Darstellung Liescher Ringe, J. reine angew. Math., 177 (1937), 152–160. DIMENSION QUOTIENTS, FOX SUBGROUPS AND LIMITS OF FUNCTORS 21 Roman Mikhailov St Petersburg Department of Steklov Mathematical Institute, Chebyshev Laboratory, St Petersburg State University 14th Line, 29b, Saint Petersburg 199178 Russia and School of Mathematics, Tata Institute of Fundamental Research Mumbai 400005, India Email: [email protected] Inder Bir S. Passi Centre for Advanced Study in Mathematics Panjab University, Sector 14, Chandigarh 160014 India and Indian Institute of Science Education and Research, Mohali (Punjab) 140306 India Email: [email protected]
4math.GR
On the Lie bracket approximation approach to distributed optimization: Extensions and limitations ∗ arXiv:1802.10519v1 [math.OC] 28 Feb 2018 Simon Michalowsky1 , Bahman Gharesifard2 , and Christian Ebenbauer1 1 Institute for Systems Theory and Automatic Control, University of Stuttgart, Germany {michalowsky,ce}@ist.uni-stuttgart.de 2 Department of Mathematics and Statistics, Queen’s University, Canada [email protected] to relax these assumptions. In the present work we want to extend these results and show that the approach can be applied to a large class of optimization problems under mild assumptions on the communication network. While in [11], [12], [13] only optimization problems with linear constraints and objective functions in the form of a sum of separable functions were considered, in the present work we enhance the methodology to general convex optimization problems. The main idea of the approach is to use Lie bracket approximation techniques to find distributed approximations of non-distributed saddle-point dynamics. While in the previous works only certain Lie bracket approximations were used, we further show here that a whole class is applicable. Abstract. We consider the problem of solving a smooth convex optimization problem with equality and inequality constraints in a distributed fashion. Assuming that we have a group of agents available capable of communicating over a communication network described by a time-invariant directed graph, we derive distributed continuous-time agent dynamics that ensure convergence to a neighborhood of the optimal solution of the optimization problem. Following the ideas introduced in our previous work, we combine saddle-point dynamics with Lie bracket approximation techniques. While the methodology was previously limited to linear constraints and objective functions given by a sum of strictly convex separable functions, we extend these result here and show that it applies to a very general class of optimization problems under mild assumptions on the communication topology. 1 INTRODUCTION 2 PRELIMINARIES Over the last decades, distributed optimization has been an active area of research with high practical relevance, see, e.g., [2, 3, 4] for applications. In these type of problems, the goal is to cooperatively solve an optimization problem using a group of agents communicating over a network. While discrete-time algorithms for distributed optimization constitute the majority in the existing literature, we focus on continuous-time algorithms which have regained interest in the last decades, [5, 6, 7, 8, 9, 10]. These algorithms require strong assumptions either on the structure of the optimization problem or on the communication network. Recently, a novel approach to continuous-time distributed optimization based on Lie bracket approximations has been proposed in [11], [12] that has the potential * 2.1 Notation We denote by Rn the set of n-dimensional real vectors and further write C p , p ∈ N, for the set of p-times continuously differentiable real-valued functions. The gradient of a function f : Rn → R, f ∈ C 1 , with respect to its argument x ∈ Rn , will be denoted by ∇ x f : Rn → Rn ; we often omit the subscript, if it is clear from the context. We denote the (i, j)th entry of a matrix A ∈ Rn×m by aij , and sometimes denote A by A = [ aij ]. We use ei to denote the vector with the ith entry equal to 1 and all other entries equal to 0. We do not specify the dimension of ei but expect it to be clear from the context. For a vector λ ∈ Rn we let diag(λ) ∈ Rn×n denote the diagonal matrix whose diagonal entries are the entries of λ. Given two continuously differentiable vector fields f 1 : Rn → Rn and f 2 : Rn → Rn , the Lie This article is an extended version of [1] additionally including proofs for all results, a discussion of the choice of vector fields after Remark 1 and the overview in Table 1. 1 bracket of f 1 and f 2 evaluated at x is defined to be [ f 1 , f 2 ]( x ) := ∂ f2 ∂f ( x ) f 1 ( x ) − 1 ( x ) f 2 ( x ). ∂x ∂x set of (4) is non-empty and that the problem has a unique solution. Our goal is to design continuous-time optimization algorithms that converge to an arbitrarily small neighborhood of the unique global optimizer of (4) and that can be implemented in a distributed fashion. More precisely, we assume that we have a group of n agents available, each capable of interchanging information over a communication network described by a directed graph G = (V , E ) with graph Laplacian G = [ gij ], where V = {v1 , v2 , . . . , vn } is a set of n nodes and E ⊆ V × V is the edge set between the nodes. In the present setup, each node vi represents an agent and the edges define the existing communication links between the agents, i.e., if there is an edge from node i to node j then agent i has access to the information provided by agent j. We then say that an algorithm is distributed if each agent only uses its own information as well as that provided by its out-neighboring agents. Let L : Rn × Rneq × Rnineq → R, neq = ∑i∈Ieq neq i , nineq = ∑i∈Iineq nineq i , denote the Lagrangian associated to (4), i.e., (1) With a slight abuse of notation we sometimes also write [ f 1 ( x ), f 2 ( x )]. For a vector x = [ x1 , x2 , . . . , xn ]> ∈ Rn and a finite set S ⊆ {1, 2, . . . , n}, we denote by xS ∈ R|S| the ordered stacked vector of all xi with i ∈ S . For example, if n = 5 and S = {2, 4}, then xS = [ x2 , x4 ]> . 2.2 Basics on graph theory We recall some basic notions on graph theory, and refer the reader to [14] or other standard references for more information. A directed graph (or simply digraph) is an ordered pair G = (V , E ), where V = {v1 , v2 , . . . , vn } is the set of nodes and E ⊆ V × V is the set of edges, i.e. (vi , v j ) ∈ E if there is an edge from node vi to v j . In our setup the edges encode to which other agents some agent has access to, i.e. (vi , v j ) ∈ E means that node vi receives information from node v j . We say that node v j is an outneighbor of node vi if there is an edge from node vi to node v j . The adjacency matrix A = [aij ] ∈ Rn×n associated to G is defined as ( 1 if i 6= j and (vi , v j ) ∈ E , (2) aij = 0 otherwise. L( x, ν, λ) = F ( x ) + ν> a( x ) + λ> c( x ), where a = [ ai ]i∈Ieq , c = [ci ]i∈Iineq are the stacked vectors of all ai and ci , respectively, and ν ∈ Rneq , λ ∈ Rnineq are the associated Lagrange multipliers. In the sequel, we assume that the state of the ith agent comprises of xi as well as the dual variables associated to the constraints ai , ci , given they exist. Without loss of generality we then put the following assumption on the indexing of the constraints: We also define the out-degree matrix D = [dij ] associated to G as ( if i = j ∑nk=1 aik dij = (3) 0 otherwise. Assumption 1. For any i ∈ Ieq and any j ∈ Iineq , there exists an x = [ x1 , x2 , . . . , xn ]> ∈ Rn such that and Finally, we call G = D − A = [ gij ] ∈ Rn×n the Laplacian of G . A directed path in G is a sequence of nodes connected by edges and we write pi1 ir = hvi1 |vi2 | . . . |vir i for a path from node vi1 to node vir . We say that a path is simple if the sequence contains no node more than once. i ∈ Ieq ⊆ {1, 2, . . . , n}, ci ( x ) ≤ 0, i ∈ Iineq ⊆ {1, 2, . . . , n}, (6) The following saddle-point dynamics adapted from [15] is known to converge to a saddle point of the Lagrangian (see [13] for a proof), thus providing a solution to (4) F(x) ai ( x ) = 0, 6= 0 6= 0. L( x ? , ν, λ) ≤ L( x ? , ν? , λ? ) ≤ L( x, ν? , λ? ). Consider the following convex optimization problem s.t. ∂c j ∂x j ( x ) ∂ai ∂xi ( x ) In a nutshell, this assumption Newguarantees that the ith constraints ai , ci are both functions of xi . It is well-known that if the Lagrangian has Newa saddle point ( x ? , ν? , λ? ), then x ? is an optimizer of (4). We say that a point ( x ? , ν? , λ? ) is a saddle point if for all x ∈ Rn , nineq ν ∈ Rneq , λ ∈ R+ , we have 3 PROBLEM SETUP min (5) ẋ = −∇ x L( x, ν, λ) (4) = −∇ F ( x ) − > > ∂a ∂c ∂x ( x ) ν − ∂x ( x ) λ (7a) ν̇ = ∇ν L( x, ν, λ) where F : Rn → R, ai : Rn → Rneq i , ci : Rn → Rnineq i , neq i , nineq i ≥ 1, F ∈ C 2 is strictly convex, the functions ai , i ∈ Ieq , are affine and the ci ∈ C 2 , i ∈ Iineq , are convex. We assume further that F, ai , ci are such that the feasible = a( x ) (7b) λ̇ = diag(λ)∇λ L( x, ν, λ) = diag(λ)c( x ). 2 (7c) notation, for each i = 1, 2, . . . , n, we define the index set However, (7) is in general not distributed in the aforementioned sense, since the right-hand side of (7) is not composed only of admissible vector fields, i.e., vector fields that can be computed locally by the nodes. For example, if g12 6= 0 and g13 = 0, then the vector field [ e1> x2 , 0, 0]> is admissible for (7), while [ e1> x3 , 0, 0]> is not. Recently, a novel approach to distributed optimization has been proposed that employs Lie bracket approximation techniques to derive distributed approximations of (7). The idea is to write the right-hand side of (7) by means of Lie brackets of admissible vector fields. If we have achieved to rewrite (7) in this form, i.e., we have ż = ∑ v B B ( z ), i −1 Ī(i ) := {i } ∪ { j = n + ∑ neq k + `, ` = 1, 2, . . . , neq i } k =1 i −1 ∪ { j = n + neq + ∑ nineq k + `, ` = 1, 2, . . . , nineq i } (11) k =1 associating the components of the complete state z to the ith agent meaning that z j is part of the state of agent i for all j ∈ Ī(i ). Hence, the state vector of the ith agent is given by zĪ(i) . Based on this, for all j = 1, 2, . . . , N, we define I( j) = Ī(i ) (8) B∈B (12) for some i such that j ∈ Ī(i ), i.e., I( j) is the set of all indices which are associated to the same agent as the jth index. Note that Ī( j) = I( j), for all j = 1, 2, . . . , n. [ x > , ν> , λ> ]> , where z = v B ∈ R and B is a set of Lie brackets of admissible vector fields {φ1 , φ2 , . . . , φ M }, φi : Rn+neq +nineq → Rn+neq +nineq , then we can employ Lie bracket approximation techniques from [16], [17] to derive distributed approximations of (8). More precisely, we can find a family of functions uiσ : R → R parametrized by σ > 0 such that the trajectories of 4.1 Lie brackets of admissible vector fields In the following, we first want to discuss which kind of vector fields can be written in terms of Lie brackets of admissible vector fields. For i, j = 1, 2, . . . , N, define M żσ = ∑ φi (z)uiσ (t) hi,j (z) = e j f j (zI( j) , zI(i) ), (9) (13) i =1 where f j : R|I( j)| × R|I(i)| → R, f j ∈ C 1 . Observe that hi,j is admissible if and only if there exist `, k ∈ {1, 2, . . . , n} such that i ∈ I(`), j ∈ I(k) and gk` 6= 0. In the next Newresult we consider Lie brackets of admissible vector fields of the form (13). uniformly converge to those of (8) as σ increases, given (8) and (9) are initialized equally. A general algorithm to compute suitable functions uiσ is presented in [16] and we will present a modified version thereof tailored to the problem at hand in [13]. In the present paper we do not discuss the second step of how to design these functions uiσ but focus on rewriting the right-hand side of (7) in terms of Lie brackets of admissible vector fields. Lemma 1. Consider a graph G of n nodes and let pi1 ir = hvi1 |vi2 | . . . |vir i denote a simple path in G from vi1 to vir . Then, for any jk ∈ I(ik ), k = 1, 2, . . . , r, we have  4 MAIN RESULTS r −2 ∂ f jk ∂z j k +1 k =1 = e j1 f jr−1 (zI( jr−1 ) , zI( jr ) ) ∏ Consider the saddle-point dynamics (7) and observe that the right-hand side is a sum of vector fields of the form ei ψ( x ) and ei z j ψ( x ), i, j = 1, 2, . . . , n + neq + nineq , ψ : Rn → R, where z = [ x > , ν> , λ> ]> ∈ R N , N = n + neq + nineq ,  h  i h jr ,jr−1 , h jr−1 ,jr−2 , . . . , [h j3 ,j2 , h j2 ,j1 ] . . . (z) (14) (zI( jk ) , zI( jk+1 ) ) and the left-hand side is a Lie bracket of admissible vector fields. • A proof is given in Section 7.1. By the above Lemma, each non-admissible vector field that takes the same form as the right-hand side of (14) can be written in terms of a Lie bracket of admissible vector fields. It is worth mentioning that this does not classify the whole set of vector fields that can be written as a Lie bracket of admissible vector fields since we limited ourselves to a single path. We next discuss a special case that is of particular importance for the application at hand. (10) is the complete state and ei ∈ R N is the ith unit vector. These vector fields might either be admissible or not, depending on the communication graph as well as the problem structure. In the following, we wish to discuss how to write vector fields of this form by means of Lie brackets of admissible vector fields. For the purpose of 3 Proposition 1. Consider a graph G of n nodes and let pi1 ir = hvi1 |vi2 | . . . |vir i denote a simple path in G from vi1 to vir . Let jk ∈ I(ik ), k = 1, 2, . . . , r, be any set of indices and suppose that (1) (2) k k f jk (zI( jk ) , zI( jk+1 ) ) = f j (zI( jk ) ) f j (zI( jk+1 ) ) for k = 2, . . . , r − 1; hence (1) k (2) k −1 ∂z j k ∂ fj (zI( jk ) ) = 1 (15) | = (2) f j (zI( jk+1 ) ) = z jk+1 , k (17) k = 2, 3, . . . , r − 1, (18a) k = 1, 2, . . . , r − 2; (18b) As we see from the proof, each bounded vector field in (17) leads to another unbounded vector field. Hence, at most half of the vector fields h jk ,jk−1 in (17) can be bounded. In particular, we can choose the functions f jk , k = 1, 2, . . . , r − 1, as follows to guarantee that (16) holds: ( (1) f j (x) k 1  1 cos(α( x −d)) if k is even, if k is odd, k 6= 1,  sin α( x − d) if k is even, k 6= r − 1, ∫ cos(α(1x−d)) dx if k is odd, k 6= r − 1, (21a) (21b) Example 1. Consider the graph shown in Fig. 1 and assume for the sake of simplicity that I( j) = j for j = 1, . . . , 5 and z ∈ R5 . By (14) we can write non-admissible vector fields of the form e1 ϕ1 (z2 ) ϕ2 (z3 ) as well as e1 ϕ3 (z4 ) ϕ4 (z5 ) and sums thereof in terms of Lie brackets of admissible vector fields as long as ϕ1 , ϕ3 admit an analytic expression of their antiderivatives ∫ ϕ1 (z2 )dz2 , ∫ ϕ3 (z4 )dz4 . In fact, with (1) (1) (zI( j ) ) k k = cos(α x − d) where α 6= 0, d ∈ R. However, this choice will lead to functions f jk that are not globally continuous but only π π ); hence we well-defined in the interval (d − 2α , d + 2α need to choose d appropriately and α sufficiently small. By that choice, all functions f jk with even k are bounded while all functions f jk with odd k are unbounded. We next discuss how we can make use of the previous results to rewrite more general vector fields. While Lemma 1 enables us to write products of functions of variables of nodes which lie on the same path as Lie brackets of admissible vector fields, we cannot directly use this result to rewrite functions which do not fulfill this property. To make this clearer, consider the following example: all k = 1, 2, . . . , r. By (15), f j is also bounded for all k k = 1, 2, . . . , r since I( jk ) and I( jk+1 ) are disjunct. However, by (16), fj = ( (2) f j (x) k Proof. Suppose there exists a set of bounded vector fields such that (17) holds. Then f jk is a bounded function for (zI( jk ) ) = ∈ C 1. Remark 1. The same holds true if we do not assume the structure (15). In fact, the structure is required for all other variables except of zI( j1 ) , zI( jr ) to cancel out in (17). • Lemma 2. Suppose that all assumptions from Proposition 1 are fulfilled. Then there exists no set of bounded vector fields h jk ,jk−1 ∈ C 1 such that (17) holds. • (2) k −1 ∂z j k k −1 (2) hence leading to h jk+1 ,jk (zI( jk ) , zI( jk+1 ) ) = e jk z jk+1 . However, in view of (9) where the φi are given by admissible vector fields of the form (13), it is often desired that the admissible vector fields have certain properties such as boundedness in order to simplify the calculation of the approximating inputs uiσ and improve the transient behavior of (9). However, as we see next, it is not possible to render all vector fields bounded. ∂ fj (2) , fj Thus, f j is strictly monotone in z jk which contradicts the k −1 boundedness assumption, thus concluding the proof. A proof is given in Section 7.2. In view of (14), the constraint (16) ensures that all terms depending on zI( jk ) , k = 2, 3, . . . , r − 1, cancel out. Equation (17) is of particular interest since the non-admissible vector fields often take the form as its right-hand side. According to (16), there exists a whole class of vector fields h jk ,jk−1 , or equivalently, functions f jk , such that (17) holds. A particularly simple choice that has been utilized in the previous works [11], [12] is to take k (20) k −1 for all z ∈ R N and the left-hand side is a Lie bracket of admissible vector fields. • (1) (zI( jk ) )| ≥ β. (1) (1) (2) e j1 f j (zI( j1 ) ) f j (zI( jr ) ) 1 r −1 f j (zI( jk ) ) = 1, (2) k −1 ∂z j k ∂ fj Note that h jk ,jk−1 ∈ C 1 if and only if f j (16) R|I( jk )| , for all zI( jk ) ∈ k = 2, 3, . . . , r − 1. Then   h  i (z) h jr ,jr−1 , h jr−1 ,jr−2 , . . . , [h j3 ,j2 , h j2 ,j1 ] . . . is bounded away from zero, i.e., there exists some constant β > 0 such that for all zI( jk ) ∈ R|I( jk )| we have with f j (zI( jk ) ) (2) k −1 ∂z j k ∂ fj (19) 4 h2,1 (z) = e1 ∫ ϕ1 (z2 )dz2 , h3,2 (z) = e2 ϕ2 (z3 ), (22a) h4,3 (z) = e1 ∫ ϕ3 (z4 )dz4 , h5,4 (z) = e4 ϕ4 (z5 ), (22b) z2 z3 2 3 and observe that for all z ∈ R N we have [ψ2 , ψ1 ](z) = e1 ϕ2 (z3 ) ϕ4 (z5 ). z1 1 (27) Further, following Proposition 1 and choosing 5 z5 4 z4 h2,1 (z) = e1 z1 , h3,2 (z) = e2 ϕ2 (z3 ), (28a) h4,3 (z) = e1 , h5,4 (z) = e4 ϕ4 (z5 ), (28b) we have for all z ∈ R N Figure 1. The graph considered in Example 1 where the ith agent has an associated state zi . ψ1 (z) = [h3,2 , h2,1 ](z), ψ2 (z) = [h5,4 , h4,3 ](z). (29) Using this in (27) we finally managed to rewrite e1 ϕ2 (z3 ) ϕ4 (z5 ) in terms of admissible vector fields. • we have for all z ∈ R5 e1 ϕ1 (z2 ) ϕ2 (z3 ) = [h3,2 , h2,1 ](z) (23a) e1 ϕ3 (z4 ) ϕ4 (z5 ) = [h5,4 , h3,2 ](z). (23b) Remark 2. Instead of realizing the multiplication by means of Lie brackets another way is to augment the agent state by estimates of the respective state of the other agent. More precisely, in Example 1, we augment the state of agent 1 by ξ 3 and ξ 5 that are estimates of z3 and z5 , respectively, and let     ż1 w ( z1 , z2 , z4 , ξ 3 , ξ 5 )  + e2 z 5 + e3 z 5 , ξ̇ 3  =  −µξ 3 (30) −µξ 5 ξ̇ 5 However, we cannot directly use (14) to rewrite a nonadmissible vector field of the form e1 ϕ2 (z3 ) ϕ4 (z5 ). • In the next result, we wish to overcome this limitation and show how to not only write sums of the vector fields in the form of the right-hand side of (14) in terms of Lie brackets of admissible vector fields, but also products thereof. where w : R5 → R and µ > 0 is sufficiently large, hence ξ 3 (t) ≈ z3 (t), ξ 5 (t) ≈ z5 (t). The resulting non-admissible vector fields in the complete augmented system can then be written in terms of Lie brackets of admissible vector fields using Proposition 1. However, in the application at hand this alters the saddle-point dynamics (7) which necessitates a stability analysis of the augmented system. Proposition 2. Let ηk : R → R, ηk ∈ C 1 , k = 1, 2, . . . , m, m ≥ 2, and define ψ1 (z) = ei η1 (z j1 ) ∫ η0 (zi )dzi , ψk (z) = ei zi ηk (z jk ), (24a) k = 2, . . . , m − 1, ψm (z) = ei ηm (z jm ), (24b) (24c) i, jk ∈ N, ψk : R N → R N . Then, for any jk 6= i, k = 1, . . . , m, we have for all z ∈ R N h  i   . . . [ψm , ψm−1 ], ψm−2 , . . . , ψ1 (z) m = ei η0 (zi ) ∏ ηk (z jk ). k =1 Hence, under suitable assumptions on the communication graph, this allows us to write vector fields whose components are sums of products of arbitrary functions in terms of Lie brackets of admissible vector fields. This observation gives rise to the next Lemma. (25) Lemma 3. Consider a strongly connected graph G of n nodes and let ϕ : R N → R be an analytic function. Then any vector field ψ(z) = ei ϕ(z), ei ∈ R N , i = 1, 2, . . . , N, can be written as a possibly infinite sum of Lie brackets of admissible vector fields. • • A proof is given in Section 7.3. The vector fields ψk defined by (24) are in general non-admissible; thus, the left-hand side of (25) is not a Lie bracket of admissible vector fields. However, observing that the vector fields ψk take the same form as the right-hand side of (17), we can make use of Proposition 1 to write the left-hand side of (25) as a Lie bracket of admissible vector fields as long as, for any k ∈ {1, . . . , m}, there exists a path from the ith node to the node that is associated to state z jk . We illustrate that by means of Example 1. Proof. Since ϕ is analytic, by a series expansion it can be written as a possibly infinite sum of monomials of the components z j of z, j = 1, 2, . . . , N. Using Proposition 2, all these monomials can be written in terms of Lie brackets of vector fields of the form (24). By strong connectivity of G , all these vector fields can be written in terms of Lie brackets of admissible vector fields, thus concluding the proof. Example 1. [continued] Reconsider Example 1 and suppose we want to rewrite the non-admissible vector field e1 ϕ2 (z3 ) ϕ4 (z5 ). Following Proposition 2 we let ψ1 (z) = e1 z1 ϕ2 (z3 ), ψ2 (z) = e1 ϕ3 (z5 ), While the result might be more of a theoretical nature for the application at hand, it nevertheless shows that the proposed approach in principle applies to a large class of problems. (26) 5 Vector field Admissible if... (`) ei (`) ∂Fi ∂xi ( xi ) ∏ Fj ( x j ) (`) j∈J F Rewritable if... ` = 1, 2, . . . , n F i = 1, 2 . . . , n gij 6= 0 for all j ∈ J F ∃ pij in G for all j ∈ J F k ∈ Ieq i = 1, 2 . . . , n gik 6= 0 for all k : aki 6= 0 ∃ pik in G for all k : aki 6= 0 k ∈ Iineq , ` = 1, 2, . . . , nck i = 1, 2, . . . , n gij 6= 0 for all j ∈ Jck ∃ pij in G for all j ∈ Jck k ∈ Ieq i = 1, 2 . . . , n Assumption 2 holds ∃ pki in G for all aki 6= 0 k ∈ Iineq ` = 1, 2, . . . , nck Assumption 2 holds ∃ pkj in G for all j ∈ Jck (`) (`) j 6 =i ei āki νk (`) ei ∂ck,k ∂xk (`) ( xk ) ∏ ck,j ( x j ) (`) j∈Jc k j6=k en+k aki xi (`) en+neq +k λk ∏ ck,j ( x j ) (`) k j∈Jc (`) (`) (`) Table 1. An overview of all vector fields appearing in (31). 4.2 Distributed optimization via Lie brackets functions, i.e., nF F(x) = In the sequel we apply the results from the last section to the problem at hand and rewrite the saddle-point dynamics (7) by means of Lie brackets of admissible vector fields. For the sake of a simpler notation we assume in the following that neq i = 1 for all i ∈ Ieq and nineq i = 1 for all i ∈ Iineq . We further assume that each agent has an associated equality and inequality constraint, i.e., Ieq = {1, 2, . . . , n}, Iineq = {1, 2, . . . , n}. This can always be achieved by augmenting the optimization problem (4) by constraints that do not alter the feasible set. We emphasize that this is not necessary for the methodology to apply as we will illustrate in the example in Section 5. We can then write the saddle-point dynamics (7) equivalently as n ẋ = − ∑ ei i =1 ν̇ = ∑ ∑ ∑ āik νk + ∑ k ∈Ieq  ∂ck ∂xk ( x ) λk `=1 ∑ āki xi + b̄k  (32) (`) (33) ck,j ( x j ), (`) j∈Jc k (`) (`) where the Fj : R → R, j ∈ J F ⊆ {1, 2, . . . , n}, ` = 1, 2, . . . , n F , n F > 0, are strictly convex functions (`) (`) and the ck,j : R → R, k ∈ Iineq , j ∈ Jck ⊆ {1, 2, . . . , n}, ` = 1, 2, . . . , nci , nck > 0, are convex. Observe that, (`) (`) if n F and nck are infinite and Fj , ck,j are monomials, (`) this includes all analytic functions F, ck . If J F = {`}, (`) Jck = {`}, we obtain the particularly important special case that both the objective function and the constraints are a sum of separable functions; hence also the case of linear constraints considered in [11], [12] is covered here. Under this assumption the vector fields appearing in (31) are summed up in Table 1. Depending on the communication graph as well as the structure of the constraints and the objective function, these vector fields can either be admissible or not. In particular, the vector fields in (31b), (31c) are admissible if the constraints are compatible with the communication topology defined by the graph G , i.e., if the following assumption holds: (31a) k ∈Iineq (31b) i =1 e k λ k c k ( x ), ∑ ∏ `=1 (`) Fj ( x j ), (`) j∈J F nck ck ( x ) = n ek k ∈Ieq λ̇ = ∂F ∂xi ( x ) + ∑ ∏ (31c) k ∈Iineq Assumption 2. For all i, j = 1, 2, . . . , n with gij = 0 we where ai ( x ) = āi x + b̄i , āi = [ āi1 , āi2 , . . . , āin ] ∈ R1×n , b̄i ∈ R. Motivated by our previous discussions, we assume in the following that the objective function as well as the inequality constraints are sums of products of separable have ∂ai ∂x j ( x ) ≡ 0 as well as ∂ci ∂x j ( x ) ≡ 0. • We point out that all non-admissible vector fields in (31) can be written in terms of Lie brackets of admissible vector 6 2 1 5 3 4 Figure 2. The communication graph for the example considered in Section 5. Vector field Corresponding path e5 ν2 p52 = hv5 |v1 |v2 i e2 x 2 λ 1 p21 = hv2 |v5 |v1 i e1 λ 3 p13 = hv1 |v2 |v3 i e4 x 1 λ 4 p41 = hv4 |v5 |v1 i e1 x 4 λ 4 p14 = hv1 |v2 |v3 |v4 i e1 x 1 λ 4 p14 = hv1 |v2 |v3 |v4 i e8 λ 3 x 1 p31 = hv3 |v4 |v5 |v1 i e9 λ 4 x 4 x 1 p41 = hv4 |v5 |v1 i e9 λ4 x12 p41 = hv4 |v5 |v1 i Lie bracket representation   e j z 6 , e5 z j   e j z 7 , e2 z 2 z j   e j λ 3 , e1 z j   e j x 1 , e4 λ 4 z j   e j2 λ4 x4 , [ e j1 z j2 , e1 z j1 ]   e j λ4 , [ e j1 z j2 , e1 x1 z j1 ]  2  e j2 x1 , [ e j1 z j2 , e8 λ2 z j1 ]   e j x 1 , e9 z j x 4 λ 4 ]  2  e j x 1 , e9 λ 4 z j j ∈ I(1) j ∈ I(5) j ∈ I(2) j ∈ I(5) j1 ∈ I(2), j2 ∈ I(3) j1 ∈ I(2), j2 ∈ I(3) j1 ∈ I(4), j2 ∈ I(5) j ∈ I(5) j ∈ I(5) Table 2. An overview of the non-admissible vector fields in (35) and their Lie bracket representations. Here, the index sets are I(1) = {1, 7}, I(2) = {2, 6}, I(3) = {3, 8}, I(4) = {4, 9}, I(5) = {5}. fields under appropriate assumptions on the communication graph, see also the last column of Table 1. Specifically, if the graph is strongly connected, then all non-admissible vector fields can be rewritten independent of the objective function as well as the constraints, given that they admit the structure (32), (33). In most cases, however, much less restrictive requirements on the communication graph are sufficient. We do not explicitly discuss how to rewrite the non-admissible vector fields using Proposition 1 and Proposition 2 in general but illustrate this by means of an example in Section 5. point dynamics (7) are then given by ẋ = − ∇ F ( x ) − (2e2 − e5 )ν2 − 2( x1 e1 + x2 e2 )λ1 (35a) − (2x4 − x1 ) e4 λ4 − (2x1 − x4 ) e1 λ4 − ( e1 + e3 )λ3 ν̇2 = 2x2 − x5 (35b) λ̇ = λ1 e1 ( x12 + x22 − 4) + λ3 e2 ( x1 + x3 − 2) + λ4 e3 ( x42 − x4 x1 + x12 − 100), (35c) where x ∈ R5 , ν2 ∈ R, and λ = [λ1 , λ3 , λ4 ]> ∈ R3 . We next rewrite all non-admissible vector fields in (35) using Proposition 1. We will thereby follow the choice (18) to make sure that (16) holds. We do not discuss how to rewrite each non-admissible vector field in detail, but limit ourselves to the vector field e1 x4 λ4 from (35a). Comparing 5 EXAMPLE (1) with (17), we have j1 = 1, jr = 4, and f j (zI( j1 ) ) = 1, 1 In this section we illustrate the previous results by means of an example. Consider the following optimization problem (2) f j (zI( jr ) ) = x4 λ4 . Following Proposition 1, we require r −1 a path from node 1 to node 4 that is here given by p14 = hv1 |v2 |v3 |v4 i; thus r = 4. We then obtain 5 min x ∈ R5 s.t. F(x) =   e1 x4 λ4 = e j2 λ4 x4 , [ e j1 z j2 , e1 z j1 ] , ∑ Fi (xi ) i =1 a2 ( x ) = 2x2 − x5 = 0 c1 ( x ) = x12 + x22 − 4 ≤ 0 (36) where j1 ∈ I(2) = {2, 6}, j2 ∈ I(3) = {3, 8}, and the right-hand side is a Lie bracket of admissible vector fields. All other non-admissible vector fields in (35) can be treated similarly and we sum up the resulting Lie brackets in Table 2. For the simulation we let each j, j1 , j2 be the largest index in its respective index set. By that choice, we inject less perturbation in the primal and more in the dual variables New which is also visible in the simulation results depicted in Fig. 3. As to be seen, the distributed algorithm approximates the trajectories of the non-distributed saddle-point dynamics (35) and converges to a neighborhood of the optimizer x ? = [0, 2, 2, 4, 4]> . NewWe also (34) c3 ( x ) = x1 + x3 − 2 ≤ 0 c4 ( x ) = x42 − x4 x1 + x12 − 100 ≤ 0, where Fi ( xi ) = ( xi − i )2 , x = [ x1 , x2 , x3 , x4 , x5 ]> ∈ R5 . We assume that the communication topology is described by the graph in Fig. 2. Observe that the constraints c3 and c4 are not compatible with the graph topology, hence Assumption 2 is not fulfilled. The corresponding saddle- 7 6 x(t) bracket approximation approach to distributed optimization proposed in [11], [12] and discussed which kind of vector fields can in principle be written in terms of Lie brackets of admissible vector fields. We did not discuss the construction of approximating inputs but postpone this to [13] where we will present a modified version of the general algorithm from [16] that exploits the structure of the problem at hand. x1 x2 x3 x4 x5 4 2 0 -2 0 5 10 15 1 References ν(t) 0 -1 [1] S. Michalowsky, B. Gharesifard, and C. Ebenbauer, “On the Lie bracket approximation approach to distributed optimization: Extensions and limitations,” in 2018 European Control Conference (ECC), accepted, 2018. [2] S. Boyd, N. Parikh, E. Chu, B. Peleato, and J. Eckstein, “Distributed optimization and statistical learning via the alternating direction method of multipliers,” Foundations and Trends in Machine Learning, vol. 3, no. 1, pp. 1–122, 2011. [3] F. Bullo, J. Cortés, and S. Martínez, Distributed Control of Robotic Networks, ser. Applied Mathematics Series. Princeton University Press, 2009. [4] J. Zhao and F. Dörfler, “Distributed control and optimization in DC microgrids,” Automatica, vol. 61, no. Supplement C, pp. 18 – 26, 2015. [5] D. Feijer and F. Paganini, “Stability of primal–dual gradient dynamics and applications to network optimization,” Automatica, vol. 46, no. 12, pp. 1974 – 1981, 2010. [6] J. Wang and N. Elia, “A control perspective for centralized and distributed convex optimization,” in 2011 IEEE 50th Conference on Decision and Control and European Control Conference (CDC-ECC), 2011, pp. 3800–3805. [7] H.-B. Dürr, C. Zeng, and C. Ebenbauer, “Saddle point seeking for convex optimization problems,” IFAC Proceedings Volumes, vol. 46, no. 23, pp. 540–545, 2013. [8] B. Gharesifard and J. Cortés, “Distributed continuous-time convex optimization on weightbalanced digraphs,” IEEE Transactions on Automatic Control, vol. 59, no. 3, pp. 781–786, 2014. [9] S. K. Niederländer and J. Cortés, “Distributed coordination for separable convex optimization with coupling constraints,” in 2015 54th IEEE Conference on Decision and Control (CDC), Dec 2015, pp. 694–699. -2 0 5 10 15 2 λ(t) 1 0 -1 0 5 10 15 time t Figure 3. Simulation results of the example from Section 5. The upper plot shows the primal variable x (t), the lower left one the dual variable ν2 (t) and the lower right one the dual variable λ(t). NewIn each plot, the dotted black lines marked with squares depict the trajectories of the non-distributed saddlepoint dynamics (35) while the thinner oscillating ones depict the trajectories of the distributed approximation. The corresponding thick lines depict the distributed approximation with additional low-pass filters. The dashed black lines indicate the desired equilbrium of (35). included simulation results with additional low-pass filters in the distributed x-, ν- and λ-dynamics. While the effect on the primal variables is small since we already reduced the oscillations by our design choice, the dual variables show significantly less oscillations and better approximate the non-distributed trajectories. A rigorous stability analysis of the augmented distributed dynamics and a performance-oriented design of the filters is up to future work. 6 CONCLUSIONS AND OUTLOOK We considered a convex optimization problem and showed how distributed optimization algorithms can be designed for a quite general class of problems with little structural requirements under mild assumptions on the communication network. We therefore extended the Lie 8 [10] B. Touri and B. Gharesifard, “Saddle-point dynamics for distributed convex optimization on general directed graphs,” in 2016 IEEE 55th Conference on Decision and Control (CDC), 2016, pp. 862–866. By the induction hypothesis we then have  h h jr̄+1 ,jr̄ , h jr̄ ,jr̄−1 , [ . . . , [h j3 ,j2 , h j2 ,j1 ] . . . ] i (z) = [h jr̄+1 ,jr̄ , e j1 f˜jr̄ ,j1 ](z) [11] C. Ebenbauer, S. Michalowsky, V. Grushkovskaya, and B. Gharesifard, “Distributed optimization over directed graphs with the help of Lie brackets,” in Proc. 20th IFAC World Congress, 2017, pp. 15 908–15 913. N = e j1 ( ∑ i =1 − e jr̄ ( ∂ f˜jr̄ ,j1 ∂zi ∑ ei i ∈I( jr̄ ) ∪I( jr̄+1 ) [12] S. Michalowsky, B. Gharesifard, and C. Ebenbauer, “Distributed extremum seeking over directed graphs,” in 2017 IEEE 56th Conference on Decision and Control (CDC), 2017, pp. 2095–2101. = e j1 ∂ f˜jr̄ ,j1 ∂z jr̄ (z)) e jr̄ f jr̄ (zI( jr̄ ) , zI( jr̄+1 ) ) ∂ f jr̄ ∂zi (zI( jr̄ ) , zI( jr̄+1 ) )) e j1 f˜jr̄ ,j1 (z) (z) f jr̄ (zI( jr̄ ) , zI( jr̄+1 ) ), (38) where e ji ∈ Rn+neq +nineq is the ji th unit vector. Here, we used that pi1 ir̄+1 is a simple path; hence, since I(ik1 ) and I(ik2 ) are disjunct for any k1 6= k2 , also jk1 6= jk2 for any k1 , k2 = 1, 2, . . . , r̄ + 1, k1 6= k2 . Using definition (37), we obtain (14). Finally, since jk ∈ I(ik ) and gik ik+1 6= 0 for all k = 1, 2, . . . , r − 1, all h jk+1 ,jk are admissible; hence the left-hand side of (14) is a Lie bracket of admissible vector fields. [13] ——, “A Lie bracket approximation approach to distributed optimization over directed graphs,” ArXiv e-prints arXiv:1711.05486 [math.OC], 2017, https:// arxiv.org/abs/1711.05486. [14] N. Biggs, Algebraic graph theory. Cambridge university press, 1993. [15] H.-B. Dürr and C. Ebenbauer, “On a class of smooth optimization algorithms with applications in control,” IFAC Proceedings Volumes, vol. 45, no. 17, pp. 291 – 298, 2012, 4th IFAC Conference on Nonlinear Model Predictive Control. 7.2 Proof of Proposition 1 Proof. Observe first that r −2 ∂ f jk ∂z j k +1 k =1 f jr−1 (zI( jr−1 ) , zI( jr ) ) ∏ [16] W. Liu, “An approximation algorithm for nonholonomic systems,” SIAM Journal on Control and Optimization, vol. 35, no. 4, pp. 1328–1365, 1997. (2) (zI( jk ) , zI( jk+1 ) ) (1) = f jr−1 (zI( jr ) ) f jr−1 (zI( jr−1 ) ) r −2 [17] H. J. Sussmann and W. Liu, “Limits of highly oscillatory controls and the approximation of general paths by admissible trajectories,” in 1991 IEEE 30th Conference on Decision and Control (CDC), 1991, pp. 437–442. r − 1 ∂ f (2) j × ∏ f j (zI( jk ) ) ∏ k =1 = (1) k (1) (2) f j (zI( jr ) ) f j (zI( j1 ) ) r −1 1 k =2 r −1 ∏ k =1 k −1 ∂z j k (zI( jk ) ) (2) ∂ fj (1) f j (zI( jk ) ) ∂zk−1 (zI( jk ) ). j k k Then, using (16) and applying Lemma 1, the result immediately follows. 7 APPENDIX 7.1 Proof of Lemma 1 7.3 Proof of Proposition 2 Proof. We prove this result by induction. First, for r = 1, (14) is trivially true by definition (13). Suppose now that the claim holds for all r ≤ r̄, r̄ > 1 and consider r = r̄ + 1. Define Proof. We first show by induction that h  i . . . [[ψm , ψm−1 ], ψm−2 ], . . . , ψ2 (z) = ei m ∏ ηk (z jk ). k =2 f˜jr̄ ,j1 (z) = (39) r̄ −2 ∂ f jk f jr̄−1 (zI( jr̄−1 ) , zI( jr̄ ) ) ∂z j k +1 k =1 ∏ (zI( jk ) , zI( jk+1 ) ). (37) For m = 2 it is clear that (39) holds. Suppose now that (39) holds for all m ≤ m̄, m̄ ≥ 2. For m = m̄ + 1 we then have 9 with a slight abuse of notation h  i . . . [[ψm̄+1 , ψm̄ ], ψm̄−1 ], . . . , ψ2 (z) m̄+1 = [ ei ∏ ηk (z jk ), ei zi η2 (z j2 )] k =2 ∂η2 (z j2 )) ei = ei ( ei> η2 (z j2 ) + zi e j2 ∂z j2 m̄+1 + ei ( ∑ k =2 m̄+1 ∏ ηk (z jk ) k =2 e jk ∂z k (z jk ) ∏ η` (z j` )) ei zi η2 (z j2 ) ∂η jk `=2 `6=k m̄+1 = ei ∏ ηk (z jk ), (40) k =2 where we used that i 6= jk for any k = 1, . . . , m in the last step. This proves (39). Finally, using (39), we obtain h  i . . . [[ψm , ψm−1 ], ψm−2 ], . . . , ψ1 (z) m = [ ei ∏ ηk (z jk ), ei η1 (z j1 ) ∫ η0 (zi )dzi ] k =2 m = ei η0 (zi ) ∏ ηk (z jk ). (41) k =1 This finishes the proof. 10
3cs.SY
Published as a conference paper at ICLR 2018 DYNAMIC N EURAL P ROGRAM E MBEDDINGS FOR P RO GRAM R EPAIR arXiv:1711.07163v3 [cs.AI] 25 Feb 2018 Ke Wang∗ University of California Davis, CA 95616, USA [email protected] Rishabh Singh Microsoft Research Redmond, WA 98052, USA [email protected] Zhendong Su University of California Davis, CA 95616, USA [email protected] A BSTRACT Neural program embeddings have shown much promise recently for a variety of program analysis tasks, including program synthesis, program repair, codecompletion, and fault localization. However, most existing program embeddings are based on syntactic features of programs, such as token sequences or abstract syntax trees. Unlike images and text, a program has well-defined semantics that can be difficult to capture by only considering its syntax (i.e. syntactically similar programs can exhibit vastly different run-time behavior), which makes syntaxbased program embeddings fundamentally limited. We propose a novel semantic program embedding that is learned from program execution traces. Our key insight is that program states expressed as sequential tuples of live variable values not only capture program semantics more precisely, but also offer a more natural fit for Recurrent Neural Networks to model. We evaluate different syntactic and semantic program embeddings on the task of classifying the types of errors that students make in their submissions to an introductory programming class and on the CodeHunt education platform. Our evaluation results show that the semantic program embeddings significantly outperform the syntactic program embeddings based on token sequences and abstract syntax trees. In addition, we augment a search-based program repair system with predictions made from our semantic embedding and demonstrate significantly improved search efficiency. 1 I NTRODUCTION Recent breakthroughs in deep learning techniques for computer vision and natural language processing have led to a growing interest in their applications in programming languages and software engineering. Several well-explored areas include program classification, similarity detection, program repair, and program synthesis. One of the key steps in using neural networks for such tasks is to design suitable program representations for the networks to exploit. Most existing approaches in the neural program analysis literature have used syntax-based program representations. Mou et al. (2016) proposed a convolutional neural network over abstract syntax trees (ASTs) as the program representation to classify programs based on their functionalities and detecting different sorting routines. DeepFix (Gupta et al., 2017), SynFix (Bhatia & Singh, 2016), and sk p (Pu et al., 2016) are recent neural program repair techniques for correcting errors in student programs for MOOC assignments, and they all represent programs as sequences of tokens. Even program synthesis techniques that generate programs as output, such as RobustFill (Devlin et al., 2017), also adopt a token-based program representation for the output decoder. The only exception is Piech et al. (2015), which introduces a novel perspective of representing programs using input-output pairs. However, such representations are too coarse-grained to accurately capture program properties — programs with the same input-output behavior may have very different syntactic characteristics. Consequently, the embeddings learned from input-output pairs are not precise enough for many program analysis tasks. Although these pioneering efforts have made significant contributions to bridge the gap between deep learning techniques and program analysis tasks, syntax-based program representations are fundamentally limited due to the enormous gap between program syntax (i.e. static expression) and ∗ Work done during an internship at Microsoft Research. 1 Published as a conference paper at ICLR 2018 s t a t i c int[] InsertionSort(int[] A) { int left = 0; int right = A.Length; s t a t i c int[] BubbleSort(int[] A) { int left = 0; int right = A.Length - 1; for (int i = right;i > left;i--) { for (int j = left;j < i;j++) { if (A[j] > A[j + 1]) { int tmp = A[j]; for (int i = left;i < right;i++) { for (int j = i - 1;j >= left;j--) { if (A[j] > A[j + 1]) { int tmp = A[j]; A[j] = A[j + 1]; // instrumentation line Console.WriteLine( string.Join(",", A) ); A[j] = A[j + 1]; // instrumentation line Console.WriteLine( string.Join(",", A) ); A[j + 1] = tmp; // instrumentation line Console.WriteLine( string.Join(",", A) ); A[j + 1] = tmp; // instrumentation line Console.WriteLine( string.Join(",", A) ); }}} }}} return A; } return A; Bubble [5,5,1,4,3] [5,8,1,4,3] [5,1,1,4,3] [5,1,8,4,3] [1,1,8,4,3] [1,5,8,4,3] [1,5,4,4,3] [1,5,4,8,3] [1,4,4,8,3] [1,4,5,8,3] [1,4,5,3,3] [1,4,5,3,8] [1,4,3,3,8] [1,4,3,5,8] [1,3,3,5,8] [1,3,4,5,8] Insertion [5,5,1,4,3] [5,8,1,4,3] [5,1,1,4,3] [5,1,8,4,3] [5,1,4,4,3] [5,1,4,8,3] [5,1,4,3,3] [5,1,4,3,8] [1,1,4,3,8] [1,5,4,3,8] [1,4,4,3,8] [1,4,5,3,8] [1,4,3,3,8] [1,4,3,5,8] [1,3,3,5,8] [1,3,4,5,8] } Figure 1: Bubble sort and insertion sort (code highlighted in shadow box are the only syntactic differences between the two algorithms). Their execution traces for the input vector A = [8, 5, 1, 4, 3]are displayed on the right, where, for brevity, only values for variable A are shown. static int max(int[] arr) { 1 Variable Trace State Trace {max val : −∞} {max val : −∞, item : ⊥} {item : 1} {max val : −∞, item : 1} {max val : 1} {max val : 1, item : 1} {item : 5} {max val : 1, item : 5} {max val : 5} {max val : 5, item : 5} {item : 3} {max val : 5, item : 3} 2 int max_val = int.MinValue; 3 4 foreach(int item in arr) { if (item > max_val) max_val = item; } 5 6 7 8 9 10 return max_val; 11 12 } Figure 2: Example for illustrating program dependency. Table 1: Variable and state traces obtained by executing function max, given arr = [1, 5, 3]. semantics (i.e. dynamic execution). This gap can be illustrated as follows. First, when a program is executed at runtime, its statements are almost never interpreted in the order in which the corresponding token sequence is presented to the deep learning models (the only exception being straightline programs, i.e., ones without any control-flow statements). For example, a conditional statement only executes one branch each time, but its token sequence is expressed sequentially as multiple branches. Similarly, when iterating over a looping structure at runtime, it is unclear in which order any two tokens are executed when considering different loop iterations. Second, program dependency (i.e. data and control) is not exploited in token sequences and ASTs despite its essential role in defining program semantics. Figure 2 shows an example using a simple max function. On line 8, the assignment statement means variable max val is data-dependent on item. In addition, the execution of this statement depends on the evaluation of the if condition on line 7, i.e., max val is also control-dependent on item as well as itself. Third, from a pure program analysis standpoint, the gap between program syntax and semantics is manifested in that similar program syntax may lead to vastly different program semantics. For example, consider the two sorting functions shown in Figure 1. Both functions sort the array via two nested loops, compare the current element to its successor, and swap them if the order is incorrect. However, the two functions implement different algorithms, namely Bubble Sort and Insertion Sort. Therefore minor syntactic discrepancies can lead to significant semantic differences. This intrinsic weakness will be inherited by any deep learning technique that adopts a syntax-based program representation. 2 Published as a conference paper at ICLR 2018 To tackle this aforementioned fundamental challenge, this paper proposes a novel semantic program embedding that is learned from the program’s runtime behavior, i.e. dynamic program execution traces. We execute a program on a set of test cases and monitor/record the program states comprising of variable valuations. We introduce three approaches to embed these dynamic executions: (1) variable trace embedding — consider each variable independently, (2) state trace embedding — consider sequences of program states, each of which comprises of a set of variable values, and (3) hybrid embedding — incorporate dependencies into individual variable sequences to avoid redundant variable values in program states. Our novel program embeddings address the aforementioned issues with the syntactic program representations. The dynamic program execution traces precisely illustrate the program behaves at runtime, and the values for each variable at each program point precisely models the program semantics. Regarding program dependencies, the dynamic execution traces, expressed as a sequential list of tuples (each of which represents the value of a variable at a certain program point), provides an opportunity for Recurrent Neural Network (RNN) to establish the data dependency and control dependency in the program. By monitoring particular value patterns between interacting variables, the RNN is able to model their relationship, leading to more precise semantic representations. Reed & De Freitas (2015) recently proposed using program traces (as a sequence of actions/statements) for training a neural network to learn to execute an algorithm such as addition or sorting. Their notion of program traces is different from our dynamic execution traces consisting of program states with variable valuations. Our notion offers the following advantages: (1) a sequence of program states can be viewed as a sequence of input-output pairs of each executed statement, in other words, sequences of program states provide more robust information than that from sequences of executed statements, and (2) although a sequence of executed statements follows dynamic execution, it is still represented syntactically, and therefore may not adequately capture program semantics. For example, consider the two sorting algorithms in Figure 1. According to Reed & De Freitas (2015), they will have an identical representation w.r.t. statements that modify the variable A, i.e. a repetition of A[j] = A[j + 1] and A[j + 1] = tmp for eight times. Our representation, on the other hand, can capture their semantic differences in terms of program states by also only considering the valuation of the variable A. We have evaluated our dynamic program embeddings in the context of automated program repair. In particular, we use the program embeddings to classify the type of mistakes students made to their programming assignments based on a set of common error patterns (described in the appendix). The dataset for the experiments consists of the programming submissions made to Module 2 assignment in Microsoft-DEV204.1X and two additional problems from the Microsoft CodeHunt platform. The results show that our dynamic embeddings significantly outperform syntax-based program embeddings, including those trained on token sequences and abstract syntax trees. In addition, we show that our dynamic embeddings can be leveraged to significantly improve the efficiency of a searchbased program corrector S ARF G EN1 (Wang et al., 2017) (the algorithm is presented in the appendix). More importantly, we believe that our dynamic program embeddings can be useful for many other program analysis tasks, such as program synthesis, fault localization, and similarity detection. To summarize, the main contributions of this paper are: (1) we show the fundamental limitation of representing programs using syntax-level features; (2) we propose dynamic program embeddings learned from runtime execution traces to overcome key issues with syntactic program representations; (3) we evaluate our dynamic program embeddings for predicting common mistake patterns students make in program assignments, and results show that the dynamic program embeddings outperform state-of-the-art syntactic program embeddings; and (4) we show how the dynamic program embeddings can be utilized to improve an existing production program repair system. 2 BACKGROUND : DYNAMIC P ROGRAM A NALYSIS This section briefly reviews dynamic program analysis (Ball, 1999), an influential program analysis technique that lays the foundation for constructing our new program embeddings. Unlike static analysis (Nielson et al., 1999), i.e., the analysis of program source code, dynamic analysis focuses on program executions. An execution is modeled by a set of atomic actions, or events, 1 Currently integrated with Microsoft-DEV204.1X as a feedback generator for production use. 3 Published as a conference paper at ICLR 2018 organized as a trace (or event history). For simplicity, this paper considers sequential executions only (as opposed to parallel executions) which lead to a single sequence of events, specifically, the executions of statements in the program. Detailed information about executions is often not readily available, and separate mechanisms are needed to capture the tracing information. An often adopted approach is to instrument a program’s source code (i.e., by adding additional monitoring code) to record the execution of statements of interest. In particular, those inserted instrumentation statements act as a monitoring window through which the values of variables are inspected. This instrumentation process can occur in a fully automated manner, e.g., a common approach is to traverse a program’s abstract syntax tree and insert “write” statements right after each program statement that causes a side-effect (i.e., changing the values of some variables). Consider the two sorting algorithms depicted in Figure 1. If we assume A to be the only variable of interest and subject to monitoring, we can instrument the two algorithms with Console.WriteLine(A) after each program location in the code whenever A is modified2 (i.e. the lines marked by comments). Given the input vector A = [8, 5, 1, 4, 3], the execution traces of the two sorting routines are shown on the right in Figure 1. One of the key benefits of dynamic analysis is its ability to easily and precisely identify relevant parts of the program that affect execution behavior. As shown in the example above, despite the very similar program syntax of bubble sort and insertion sort, dynamic analysis is able to discover their distinct program semantics by exposing their execution traces. Since understanding program semantics is a central issue in program analysis, dynamic analysis has seen remarkable success over the past several decades and has resulted in many successful program analysis tools such as debuggers, profilers, monitors, or explanation generators. 3 OVERVIEW OF THE A PPROACH We now present an overview of our approach. Given a program and the execution traces extracted for all its variables, we introduce three neural network models to learn dynamic program embeddings. To demonstrate the utility of these embeddings, we apply them to predict common error patterns (detailed in Section 5) that students make in their submissions to an online introductory programming course. Variable Trace Embedding As shown in Table 1, each row denotes a new program point where a variable gets updated.3 The entire variable trace consists of those variable values at all program points. As a subsequent step, we split the complete trace into a list of sub-traces (one for each variable). We use one single RNN to encode each sub-trace independently and then perform max pooling on the final states of the same RNN to obtain the program embedding. Finally, we add a one layer softmax regression to make the predictions. The entire workflow is show in Figure 3. State Trace Embedding Because each variable trace is handled individually in the previous approach, variable dependencies/interactions are not precisely captured. To address this issue, we propose the state trace embedding. As depicted in Table 1, each program point l introduces a new program state expressed by the latest variable valuations at l. The entire state trace is a sequence of program states. To learn the state trace embedding, we first use one RNN to encode each program state (i.e., a tuple of values) and feed the resulting RNN states as a sequence to another RNN. Note that we do not assume that the order in which variables values are encoded by the RNN for each program state but rather maintain a consistent order throughout all program states for a given trace. Finally, we feed a softmax regression layer with the final state of the second RNN (shown in Figure 4). The benefit of state trace embedding is its ability to capture dependencies among variables in each program state as well as the relationship among program states. Dependency Enforcement for Variable Trace Embedding Although state trace embedding can better capture program dependencies, it also comes with some challenges, the most significant of which is redundancy. Consider a looping structure in a program. During an iteration, whenever 2 3 On the abstract syntax trees to enable complete automation regardless of the structure of programs. We ignore the input variable arr since it is read-only (similarly for the state trace later). 4 Published as a conference paper at ICLR 2018 Figure 3: Variable trace for program embedding. Figure 4: State trace for program embedding. Figure 5: Dependency enforcement embedding. Dotted lines denoted dependencies. one variable gets modified, a new program state will be created containing the values of all variables, even of those unmodified by the loop. This issue becomes more severe for loops with larger numbers of iterations. To tackle this challenge, we propose the third and final approach, dependency enforcement for variable trace embedding (hereinafter referred as dependency enforcement embedding), that combines the advantages of variable trace embedding (i.e., compact representation of execution traces) and state trace embedding (i.e., precise capturing of program dependencies). In dependency enforcement embedding, a program is represented by separate variable traces, with each variable being handled by a different RNN. In order to enforce program dependencies, the hidden states from different RNNs will be interleaved in a way that simulates the needed data and control dependencies. Unlike variable trace embedding, we perform an average pooling on the final states of all RNNs to obtain the program embedding on which we build the final layer of softmax regression. Figure 5 describes the workflow. 5 Published as a conference paper at ICLR 2018 4 DYNAMIC P ROGRAM E MBEDDINGS We now formally define the three program embedding models. 4.1 VARIABLE T RACE M ODEL Given a program P , and its variable set V (v0 , v1 ,..., vn ∈ V ), a variable trace is a sequence of values a variable has been assigned during the execution of P .4 Let xt vn denote the value from the variable trace of vn that is fed to the RNN encoder (Gated Recurrent Unit) at time t as the input, and ht vn as the resulting RNN’s hidden state. We compute the variable trace embedding for P in Equation (3) as follows (hT vn denotes the last hidden state of the encoder): ht v1 = GRU(ht−1 v1 , xt v1 ) ... ht vn = GRU(ht−1 vn , xt vn ) hP = MaxPooling(hT (1) v1 , ..., hT vn ) (2) Evidence = (WhP + b) (4) (3) Y = softmax(Evidence) (5) We compute the representation of the program trace by performing max pooling over the last hidden state representation of each variable trace embedding. The hidden states ht v1 , . . . , ht vn , hP ∈ Rk where k denotes the size of hidden layers of the RNN encoder. Evidence denotes the output of a linear model through the program embedding vector hP , and we obtain the predicted error pattern class Y by using a softmax operation. 4.2 S TATE T RACE M ODEL The key idea in state trace model is to embed each program state as a numerical vector first and then feed all program state embeddings as a sequence to another RNN encoder to obtain the program embedding. Suppose xt vn is the value of variable vn at t-th program state, and ht vn is the resulting hidden state of the program state encoder. Equation (8) computes the t-th program state embedding. Equations (9-11) encode the sequence of all program state embeddings (i.e., ht vn , ht+1 vn , . . . , ht+m vn ) with another RNN to compute the program embedding. ht v1 = GRU(ht v0 , xt v1 ) (6) ht v2 = GRU(ht v1 , xt v2 ) ... ht vn = GRU(ht vn−1 , xt vn ) (7) (8) h0t vn = GRU(h0t−1 vn , ht vn ) h0t+1 vn = GRU(h0t vn , ht+1 vn ) ... hP = GRU(h0t+m−1 vn , xt+m vn ) (9) (10) (11) ht v1 , . . . , ht vn ∈ Rk1 ; h0t vn , . . . , hP ∈ Rk2 where k1 and k2 denote, respectively, the sizes of hidden layers of the first and second RNN encoders. 4.3 D EPENDENCY E NFORCEMENT FOR VARIABLE T RACE E MBEDDING The motivation behind this model is to combine the advantages of the previous two approaches, i.e. representing the execution trace compactly while enforcing the dependency relationship among variables as much as possible. In this model, each variable trace is handled with a different RNN. A potential issue to be addressed is variable matching/renaming (i.e., α-renaming). In other words same variables may be named differently in different programs. Processing each variable id with a single RNN among all programs in the dataset will not only cause memory issues, but more importantly the loss of precision. Our solution is to (1) execute all programs to collect traces for all variables, (2) perform dynamic time wrapping (Vintsyuk, 1968) on the variable traces across all programs to find the top-n most used variables that account for the vast majority of variable usage, and (3) rename the top-n most used variables consistently across all programs, and rename all other variables to a same special variable. 4 For presentation simplicity and w.l.o.g., we assume that the program does not take any inputs. 6 Published as a conference paper at ICLR 2018 Given the same set of variables among all programs, the mechanism of dependency enforcement on the top ones is to fuse the hidden states of multiple RNNs based on how a new value of a variable is produced. For example, in Figure 2 at line 8, the new value of max val is data-dependent on item, and control-dependent on both item and itself. So at the time step when the new value of max val is produced, the latest hidden states of the RNNs encode variable item as well as itself; they together determine the previous state of the RNN upon which the new value of max val is produced. If a value is produced without any dependencies, this mechanism will not take effect. In other words, the RNN will act normally to handle data sequences on its own. In this work we enforce the data-dependency in assignment statement, declaration statement and method calls; and control-dependency in control statements such as if , f or and while statements. Equations (11 and 12) expose the inner workflow. hLT vm denotes the latest hidden state of the RNN encoding variable trace of vm up to the point of time t when xt vn is the input of the RNN encoding variable trace of vn . denotes element-wise matrix product. ht−1 vn = hLT v1 hLT vm hLT vn ht vn = GRU(ht−1 vn , xt vn ) (12) 5 Given vn depends on v1 and vm hP = AveragePooling(hT v1 , ..., hT vn ) (11) (13) E VALUATION We train our dynamic program embeddings on the programming submissions obtained from Assignment 2 from Microsoft-DEV204.1X: “Introduction to C#” offered on edx and two other problems on Microsoft CodeHunt platform. • Print Chessboard: Print the chessboard pattern using “X” and “O” to represent the squares as shown in Figure 6. • Count Parentheses: Count the depth of nesting parentheses in a given string. • Generate Binary Digits: Generate the string of binary digits for a given integer. XOXOXOXO OXOXOXOX XOXOXOXO OXOXOXOX XOXOXOXO OXOXOXOX XOXOXOXO OXOXOXOX Figure 6: The desired output for the chessboard exercise. Regarding the three programming problems, the errors students made in their submissions can be roughly classified into low-level technical issues (e.g., list indexing, branching conditions or looping bounds) and high-level conceptual issues (e.g., mishandling corner case, misunderstanding problem requirement or misconceptions on the underlying data structure of test inputs).5 In order to have sufficient data for training our models to predict the error patterns, we (1) convert each incorrect program into multiple programs such that each new program will have only one error, and (2) mutate all the correct programs to generate synthetic incorrect programs such that they exhibit similar errors that students made in real program submissions. These two steps allow us to set up a dataset depicted in Table 2. Based on the same set of training data, we evaluate the dynamic embeddings trained with the three network models and compare them with the syntax-based program embeddings (on the same error prediction task) on the same testing data. The syntax-based models include (1) one trained with a RNN that encodes the run-time syntactic traces of programs (Reed & De Freitas, 2015); (2) another trained with a RNN that encodes token sequences of programs; and (3) the third trained with a RNN on abstract syntax trees of programs (Socher et al., 2013). Problem Print Chessboard Count Parentheses Generate Binary Digits Program Submissions Correct Incorrect 2,281 742 505 315 518 371 Synthetic Data Training Validation Testing 120K 13K 15K 20K 2K 2K 22K 3K 2K Table 2: Dataset for experimental evaluation. 5 Please refer to the Appendix for a detailed summary of the error patterns for each problem. 7 Published as a conference paper at ICLR 2018 All models are implemented in TensorFlow. All encoders in each of the trace model have two stacked GRU layers with 200 hidden units in each layer except that the state encoder in the state trace model has one single layer of 100 hidden units. We adopt random initialization for weight initialization. Our vocabulary has 5,568 unique tokens (i.e., the values of all variables at each time step), each of which is embedded into a 100-dimensional vector. All networks are trained using the Adam optimizer (Kingma & Ba, 2014) with the learning and the decay rates set to their default values (learning rate = 0.0001, beta1 = 0.9, beta2 = 0.999) and a mini-batch size of 500. For the variable trace and dependency enforcement models, each trace is padded to have the same length across each batch; for the state trace model, both the number of variables in each program state as well as the length of the entire state trace are padded. During the training of the dependency enforcement model, we have observed that when dependencies become complex, the network suffers from optimization issues, such as diminishing and exploding gradients. This is likely due to the complex nature of fusing hidden states among RNNs, echoing the errors back and forth through the network. We resolve this issue by truncating each trace into multiple sub-sequences and only back-propagate on the last sub-sequence while only feedforwarding on the rest. Regarding the baseline network trained on syntactic traces/token sequences, we use the same encoder architecture (i.e., two layer GRU of 200 hidden units) processing the same 100-dimension embedding vector for each statement/token. As for the AST model, we learn an embedding (100-dimension) for each type of the syntax node by propagating the leaf (a simple look up) to the root through the learned production rules. Finally, we use the root embeddings to represent programs. Programming Problem Print Chessboard Count Parentheses Generate Binary Digits Variable Trace State Trace 93.9% 92.7% 92.1% 95.3% 93.8% 94.5% Dependency Enforcement 99.3% 98.8% 99.2% Run-Time Syntactic Trace 26.3% 25.5% 23.8% Token AST 16.8% 19.3% 21.2% 16.2% 21.7% 20.9% Table 3: Comparing dynamic program embeddings with syntax-based program embedding in predicting common error patterns made by students. As shown in Table 3, our embeddings trained on execution traces significantly outperform those trained on program syntax (greater than 92% accuracy compared to less than 27% for syntax-based embeddings). We conjecture this is because of the fact that minor syntactic discrepancies can lead to major semantic differences as shown in Figure 1. In our dataset, there are a large number of programs with distinct labels that differ by only a few number of tokens or AST nodes, which causes difficulty for the syntax models to generalize. Even for the simpler syntax-level errors, they are buried in large number of other syntactic variations and the size of the training dataset is relatively small for the syntax-based models to learn precise patterns. In contrast, dynamic embeddings are able to canonicalize the syntactical variations and pinpoint the underlying semantic differences, which results in the trace-based models learning the correct error patterns more effectively even with relatively smaller size of the training data. In addition, we incorporated our dynamic program embeddings into S ARFGEN (Wang et al., 2017) — a program repair system — to demonstrate their benefit in producing fixes to correct students errors in programming assignments. Given a set of potential repair candidates, S ARFGEN uses an enumerative search-based technique to find minimal changes to an incorrect program. We use the dynamic embeddings to learn a distribution over the corrections to prioritize the search for the repair algorithm.6 To establish the baseline, we obtain the set of all corrections from S ARFGEN for each of the real incorrect program to all three problems and enumerate each subset until we find the minimum fixes. On the contrary, we also run another experiment where we prioritize each correction according to the prediction of errors with the dynamic embeddings. It is worth mentioning that one incorrect program may be caused by multiple errors. Therefore, we only predict the top-1 error each time and repair the program with the corresponding corrections. If the program is still incorrect, we repeat this procedure till the program is fixed. The comparison between the two approaches is based on how long it takes them to repair the programs. 6 Some corrections are merely syntactic discrepancies (i.e., they do not change program semantics such as modifying a *= 2 to a += a). In order to provide precise fixes, those false positives would need to be eliminated. 8 Published as a conference paper at ICLR 2018 Number of Fixes 1-2 3-5 6-7 ≥8 Enumerative Search 3.8 44.7 95.9 128.3 Variable Trace Embeddings 2.5 3.6 4.2 41.6 State Trace Embeddings 2.8 3.1 3.6 49.5 Dependency Enforcement Embeddings 3.3 4.1 4.5 38.8 Table 4: Comparing the enumerative search with those guided by dynamic program embeddings in finding the minimum fixes. Time is measured in seconds. As shown in Table 4, the more fixes required, the more speedups dynamic program embeddings yield — more than an order of magnitude speedups when the number of fixes is four or greater. When the number of fixes is greater than seven, the performance gain drops significantly due to poor prediction accuracy for programs with too many errors. In other words, our dynamic embeddings are not viewed by the network as capturing incorrect execution traces, but rather new execution traces. Therefore, the predictions become unreliable. Note that we ignored incorrect programs having greater than 10 errors when most experiments run out of memory for the baseline approach. 6 R ELATED W ORK There has been significant recent interest in learning neural program representations for various applications, such as program induction and synthesis, program repair, and program completion. Specifically for neural program repair techniques, none of the existing techniques, such as DeepFix (Gupta et al., 2017), SynFix (Bhatia & Singh, 2016) and sk p (Pu et al., 2016), have considered dynamic embeddings proposed in this paper. In fact, dynamic embeddings can be naturally extended to be a new feature dimension for these existing neural program repair techniques. Piech et al. (2015) is a notable recent effort targeting program representation. Piech et al. explore the possibility of using input-output pairs to represent a program. Despite their new perspective, the direct mapping between input and output of programs usually are not precise enough, i.e., the same input-output pair may correspond to two completely different programs, such as the two sorting algorithms in Figure 1. As we often observe in our own dataset, programs with the same error patterns can also result in different input-output pairs. Their approach is clearly ineffective for these scenarios. Reed & De Freitas (2015) introduced the novel approach of using execution traces to induce and execute algorithms, such as addition and sorting, from very few examples. The differences from our work are (1) they use a sequence of instructions to represent dynamic execution trace as opposed to using dynamic program states; (2) their goal is to synthesize a neural controller to execute a program as a sequence of actions rather than learning a semantic program representation; and (3) they deal with programs in a language with low-level primitives such as function stack push/pop actions rather than a high-level programming language. As for learning representations, there are several related efforts in modeling semantics in sentence or symbolic expressions (Socher et al., 2013; Zaremba et al., 2014; Bowman, 2013). These approaches are similar to our work in spirit, but target different domains than programs. 7 C ONCLUSION We have presented a new program embedding that learns program representations from runtime execution traces. We have used the new embeddings to predict error patterns that students make in their online programming submissions. Our evaluation shows that the dynamic program embeddings significantly outperform those learned via program syntax. We also demonstrate, via an additional application, that our dynamic program embeddings yield more than 10x speedups compared to an enumerative baseline for search-based program repair. Beyond neural program repair, we believe that our dynamic program embeddings can be fruitfully utilized for many other neural program analysis tasks such as program induction and synthesis. 9 Published as a conference paper at ICLR 2018 R EFERENCES Thoms Ball. The concept of dynamic analysis. In Proceedings of the 7th European Software Engineering Conference Held Jointly with the 7th ACM SIGSOFT International Symposium on Foundations of Software Engineering, pp. 216–234, 1999. Sahil Bhatia and Rishabh Singh. Automated correction for syntax errors in programming assignments using recurrent neural networks. CoRR, abs/1603.06129, 2016. Samuel R Bowman. Can recursive neural tensor networks learn logical reasoning? arXiv preprint arXiv:1312.6192, 2013. Jacob Devlin, Jonathan Uesato, Surya Bhupatiraju, Rishabh Singh, Abdel rahman Mohamed, and Pushmeet Kohli. RobustFill: Neural program learning under noisy I/O. In Proceedings of the 34th International Conference on Machine Learning, pp. 990–998, 2017. Rahul Gupta, Soham Pal, Aditya Kanade, and Shirish K. Shevade. Deepfix: Fixing common c language errors by deep learning. In Proceedings of the Thirty-First AAAI Conference on Artificial Intelligence, 2017. Diederik P. Kingma and Jimmy Ba. Adam: A method for stochastic optimization. abs/1412.6980, 2014. URL http://arxiv.org/abs/1412.6980. CoRR, Lili Mou, Ge Li, Lu Zhang, Tao Wang, and Zhi Jin. Convolutional neural networks over tree structures for programming language processing. In Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence, 2016. Flemming Nielson, Hanne R. Nielson, and Chris Hankin. Principles of Program Analysis. 1999. Chris Piech, Jonathan Huang, Andy Nguyen, Mike Phulsuksombati, Mehran Sahami, and Leonidas Guibas. Learning program embeddings to propagate feedback on student code. In Proceedings of the 32nd International Conference on Machine Learning, pp. 1093–1102, 2015. Yewen Pu, Karthik Narasimhan, Armando Solar-Lezama, and Regina Barzilay. Sk p: A neural program corrector for moocs. In Companion Proceedings of the 2016 ACM SIGPLAN International Conference on Systems, Programming, Languages and Applications: Software for Humanity, SPLASH Companion 2016, pp. 39–40, 2016. Scott Reed and Nando De Freitas. arXiv:1511.06279, 2015. Neural programmer-interpreters. arXiv preprint Richard Socher, Alex Perelygin, Jean Wu, Jason Chuang, Christopher D Manning, Andrew Ng, and Christopher Potts. Recursive deep models for semantic compositionality over a sentiment treebank. In Proceedings of the 2013 conference on empirical methods in natural language processing, pp. 1631–1642, 2013. Taras K Vintsyuk. Speech discrimination by dynamic programming. Cybernetics, 4(1):52–57, 1968. Ke Wang, Rishabh Singh, and Zhendong Su. Data-driven feedback generation for introductory programming exercises. CoRR, abs/1711.07148, 2017. URL http://arxiv.org/abs/ 1711.07148. Wojciech Zaremba, Karol Kurach, and Rob Fergus. Learning to discover efficient mathematical identities. In Advances in Neural Information Processing Systems, pp. 1278–1286, 2014. 10 Published as a conference paper at ICLR 2018 A PPENDIX E RROR PATTERNS Print Chessboard: • Misprinting “O” to “0” or printing lower case instead of upper case characters. • Switching across rows are supposed to be the other way around ( i.e. printing OXOXOXOX for odd number rows and XOXOXOXO for even number rows). • Printing the first row correctly but failed to make a switch across rows. • Printing the entire chessboard as “X” or “O” only. • Printing the chessboard correctly but with extra unnecessary characters. • Printing the incorrect number of rows. • Printing the incorrect number of columns. • Printing the characters correctly but in wrong format (i.e. not correctly seperated with the spaces to form the rows). • Others. Count Parentheses: • Miss the corner case of empty strings. • Mistakenly consider the parenthesis to be symbols rather than “(” or “)”. • Mishandling the string of unmatched parentheses. • Counting the number of matching parentheses rather then depth. • Incorrectly assume nested parentheses are always present. • Miscounting the characters which should have been ignored. • Others. Generate Binary Digits: • Miss the corner case of integer 0. • Misunderstand the binary digits to be underlying bytes of a string. • Mistakes in arithmetic calculation regrading shift operations. • Adding the binary digits rather than concatenating them to a string. • Miss the one on the most significant bit. • Others. 11 Published as a conference paper at ICLR 2018 S ARF G EN ’ S A LGORITHM Algorithm 1: S ARFGEN ’s feedback generation procedure. 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 /* P : an incorrect program; Ps : all correct solutions function FixGeneration(P , Ps ) begin // Among Ps identify Pcs to be reference programs to fix P Pcs ← CandidatesIdentification(P , Ps ) // Initialize the minimum number of fixes k to be inifinity k←∞ // Initialize the minimum set of fixes F(P ) F(P ) ← null for Pc ∈ Pcs do // Generates the syntactic discrepencies w.r.t. each Pc C(P , Pc ) ← DiscrepenciesGeneration(P , Ps ) // Selecting subsets of C(P , Pc ) from size of one itll |C(P , Pc )| for n ∈ [1, 2, ..., |C(P , Pc )|] do Csubs (P , Pc ) ← {x | x ⊆ C(P , Pc ) ∧ |x| = n} // Attemp each subset of C(P , Pc ) for Csub (P , Pc ) ∈ Csubs (P , Pc ) do P 0 ← PatchApplication(P , Csub (P , Pc )) // Update k if necessary if isCorrect(P 0 ) then if |P 0 | <k then k ← |P 0 | F(P ) ← P 0 */ return F(P ) Algorithm 2: Incorporate pre-trained model to S ARFGEN ’s feedback generation procedure. 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 /* P , Ps : same as above; M: learned Model function FixGeneration(P , Ps , M) begin // Among Ps identify Pcs to be reference programs to fix P Pcs ← CandidatesIdentification(P , Ps ) // Initialize the minimum number of fixes k to be inifinity k←∞ // Initialize the minimum set of fixes F(P ) F(P ) ← null for Pc ∈ Pcs do // Generates the syntactic discrepencies w.r.t. each Pc C(P , Pc ) ← DiscrepenciesGeneration(P , Ps ) // Executing P to extract the dynamic execution trace T (P ) ← DynamicTraceExtraction(P ) // Prioritizing subsets of C(P , Pc ) through pre-trained model Csubs (P , Pc ) ← Prioritization(C(P , Pc ), T (P ), M) for Csub (P , Pc ) ∈ Csubs (P , Pc ) do P 0 ← PatchApplication(P , Csub (P , Pc )) if isCorrect(P 0 ) then if |P 0 | <k then k ← |P 0 | F(P ) ← P 0 return F(P ) 12 */
2cs.AI
arXiv:1207.5553v1 [math.AC] 23 Jul 2012 REGULARITY 3 IN EDGE IDEALS ASSOCIATED TO BIPARTITE GRAPHS OSCAR FERNÁNDEZ-RAMOS AND PHILIPPE GIMENEZ Abstract. We focus in this paper on edge ideals associated to bipartite graphs and give a combinatorial characterization of those having regularity 3. When the regularity is strictly bigger than 3, we determine the first step i in the minimal graded free resolution where there exists a minimal generator of degree > i + 3, show that at this step the highest degree of a minimal generator is i + 4, and determine the value of the corresponding graded Betti number βi,i+4 in terms of the combinatorics of the associated bipartite graph. The results can then be easily extended to the non-squarefree case through polarization. We also study a family of ideals of regularity 4 that play an important role in our main result and whose graded Betti numbers can be completely described through closed combinatorial formulas. Introduction Studying homological invariants of monomial ideals in a polynomial ring R = K[x1 , . . . , xn ] by looking for combinatorial properties in discrete objects (graphs, hypergraphs, simplicial complexes, . . . ) associated to them is a well known technique that has been fruitfully exploited in the last decades (see for example the surveys [12] and [15] and their references). In fact, it provides a quite complete dictionary between these two algebraic and combinatorial classes. Classical objects used to relate combinatorics with monomial ideals are Stanley-Reisner ideals, simplicial or cellular resolutions and facet ideals. A monomial ideal generated by quadrics can be viewed as the facet ideal of a graph. When the graph is simple, i.e., has no loops, these ideals are called edge ideals and were first introduced in [18]. The homological invariants of a monomial ideal I that we are interested in are those encoded in the minimal graded free resolution of the ideal, namely, the graded Betti numbers and the Castelnuovo-Mumford regularity. Considering the standard N-grading on the polynomial ring R, the graded Betti number βi,j is the number of minimal generators of degree j in the i-th syzygy module of the ideal. If we denote by ui (resp. li ) the maximal (resp. minimal) degree of a minimal generator in i-th syzygy module then the fact that the resolution is minimal implies that li ≥ l0 + i, where l0 0 Both authors are partially supported by MTM2010-20279-C02-01 (Ministerio de Ciencia e Innovación, Spain). 1 2 OSCAR FERNÁNDEZ-RAMOS AND PHILIPPE GIMENEZ is the minimal degree of a generator of I and the regularity of the ideal is defined as reg(I) := max{ui − i}. An interesting situation is when all minimal generators of I has same degree l0 and ui = li = l0 + i for all i. In this case, reg(I) = l0 and we say that the ideal has an l0 -linear resolution. There is a nice combinatorial characterization of edge ideals having a 2linear resolution, i.e., having regularity 2, in terms of the complement of the associated graph due to Fröberg ([8]). A new proof of this result has recently been obtained in [17] where the topology of the lcm-lattice of edge ideals is studied. Another proof of Fröberg’s characterization can be found in [6] where, moreover, the least i such that ui > i + 2 is characterized in a combinatorial way when the edge ideal does not have a linear resolution. This result was obtained independently in [7] where it is also shown that ui = i+3 for this value of i where non-linear sygygies first appear. Moreover, βi,i+3 is determined in terms of the complement of the graph. These results are recalled in the section 1 (Theorem 1.11) together with all the required definitions and notations. We will also show in the section that the graded Betti numbers of an arbitrary edge ideal I satisfy the following property (Theorem 1.8): for every i ≥ 0 and j ≥ i + 2, βi,j (I) = βi,j+1 (I) = 0 ⇒ βi+1,j+2 (I) = 0 . It implies in particular that ui+1 ≤ ui + 2 for all i ≥ 0 (Corollary 1.9), a refinement of [7, Theorem 5.2]. The aim of this paper is to characterize edge ideals associated to bipartite graphs G having regularity 3 and determine, for those of regularity > 4, the first step i in the minimal resolution such that ui > i + 3. This will be done in section 3 where we will also prove that, for this value of i, one has that ui = i + 4 and show that βi,i+4 is the number of induced subgraphs of the bipartite complement of G that are isomorphic to cycles of minimal length. The fundamental role played by these subgraphs is the reason why we previously devote section 2 to study the graded Betti numbers of the edge ideal associated to the bipartite complement of an even cycle. We show that such an edge ideal has regularity 4 and give closed combinatorial formulas for all its graded Betti numbers. We finally prove in the last section similar results for monomial ideals generated by quadrics that are not squarefree. The dependence of the Betti numbers of edge ideals on the characteristic of the field K, even in the case of edge ideals associated to bipartite graphs, prevents the possibility of obtaining similar results for higher regularity. 1. Preliminaries 1.1. Graphs and simplicial complexes. We start recalling elementary concepts on graphs that we will handle along this paper (see [5] and [16] for the terminology not included here regarding graphs and simplicial complexes, respectively). REGULARITY 3 IN EDGE IDEALS ASSOCIATED TO BIPARTITE GRAPHS 3 Consider a finite simple graph G and denote by E(G) and V (G) its edge and vertex sets respectively. We say that a subgraph H of G is induced on a subset V ′ of V (G) if V (H) = V ′ and E(H) = {{u, v} ∈ E(G) : u, v ∈ V ′ }. We write H = G[V ′ ] or H < G when H is an induced subgraph on an unspecified subset of vertices of G. The complement of G is the graph Gc on the same vertex set as G with E(Gc ) = {{u, v} : u, v ∈ V (G), {u, v} 6∈ E(G)}. Given a vertex u ∈ V (G), we denote by NG (u) the set S of vertices of G adjacent to u and, for a subset W ⊂ V (G), NG (W ) := u∈W NG (u). The degree of u, denoted by deg(u), is the number of elements in NG (u). A connected graph G with t := |V (G)| ≥ 4 whose vertices are all of degree two is called a t-cycle and denoted by Ct . We will say that t is the length of the cycle. An induced subgraph which is also a cycle is called an induced cycle, and a graph G is said to be chordal if it has no induced cycle. A graph whose vertices have all degree one has necessarily 2s vertices for some s ≥ 1 and consists of s disconnected edges. We denote it by sK2 . Definition 1.1. The induced matching number of a graph G is the maximal s such that sK2 < G. We denote this number by µ(G). Consider now a simplicial complex ∆. Given a subset W of its vertex set V (∆), the induced subcomplex of ∆ on W is ∆[W ] := {σ ∈ ∆ : σ ⊂ W }. Recall that if one has two subcomplexes ∆1 and ∆2 of ∆ such that ∆ = ∆1 ∪ ∆2 , there is a long exact sequence of reduced homologies, called the Mayer-Vietoris sequence, (1) H̃i (∆1 ) ⊕ · · · −→ H̃i (∆0 ) −→ −→ H̃i (∆) −→ H̃i−1 (∆0 ) −→ · · · H̃i (∆2 ) whenever ∆0 := ∆1 ∩ ∆2 6= ∅. Definition 1.2. Given a simplicial complex ∆ and u, v 6∈ V (∆), consider the following two simplicial complexes: • v ∗ ∆ := ∆ ∪ {{v} ∪ σ : σ ∈ ∆}, the cone on the base ∆ with appex v; • Σvu ∆ := ∆ ∪ {{u} ∪ σ : σ ∈ ∆} ∪ {{v} ∪ σ : σ ∈ ∆}, the suspension of ∆ on the vertices u and v. The following well-known results on cones and suspensions (see, e.g., [16, Theorems 8.2 and 25.4]) will be very useful in the sequel. Proposition 1.3. (1) H̃i (v ∗ ∆) = 0, ∀ i ≥ 0. (2) H̃0 (Σvu ∆) = 0 and H̃i (Σvu ∆) ≃ H̃i−1 (∆), ∀ i ≥ 1. Associated to a graph G, one has its independence complex ∆(G) which is defined as the simplicial complex on the vertex set V (G) such that F ⊂ V (G) is a face of ∆(G) if and only if no edge of G is a subset of F . Observe that if G is a graph and W is an arbitrary subset of V (G), one has that ∆(G)[W ] = ∆(G[W ]) . 4 OSCAR FERNÁNDEZ-RAMOS AND PHILIPPE GIMENEZ Remark 1.4. A flag complex is a simplicial complex ∆ such that, for any σ ⊂ V (∆), if every pair of elements in σ is a face of ∆ then σ is also a face of ∆. In particular, a flag complex containing all pairs of vertices is necessarily a simplex. Moreover, the independence complex ∆(G) of a graph G is always, by definition, a flag complex. Definition 1.5. If ∆ := ∆(G) is the independence complex of a graph G, for all u ∈ V := V (G), we consider three induced subcomplexes of ∆ that will be featured in this paper. Note that each of them is the independence complex of an induced subgraph of G: • del∆ (u) := {σ ∈ ∆ : u 6∈ σ} = ∆[V \ {u}]; • link∆ (u) := {σ ∈ ∆ : u 6∈ σ and σ∪{u} ∈ ∆} = ∆[V \(NG (u)∪{u})]; • star∆ (u) := {σ ∈ ∆ : σ ∪ {u} ∈ ∆} = ∆[V \ NG (u)]. For any vertex v ∈ V (G), star∆ (v) is a cone with appex v and hence it is acyclic by Proposition 1.3.1. Since del∆ (v) ∪ star∆ (v) = ∆ and del∆ (v) ∩ star∆ (v) = link∆ (v), we can apply (1) whenever link∆ (v) 6= ∅ and get (2) · · · −→ H̃i (link∆ (v)) −→ H̃i (del∆ (v)) −→ H̃i (∆) −→ H̃i−1 (link∆ (v)) −→ · · · · · · −→ H̃0 (link∆ (v)) −→ H̃0 (del∆ (v)) −→ H̃0 (∆) −→ 0 . Let’s focus now on bipartite graphs. Recall that a graph G is bipartite if its vertex set can be splitted into two disjoint sets, V (G) = X ⊔ Y , in such a way that any edge of G has one vertex in X and the other in Y . When one deals with bipartite graphs, it is usually convenient to use different symbols for variables in X and variables in Y . We will denote variables in X by x1 , . . . , xn and variables in Y by y1 , . . . , ym . The biadjacency matrix of the bipartite graph G, M (G) = (ai,j ) ∈ Mn×m ({0, 1}), is defined by ai,j = 1 if {xi , yj } ∈ E(G), 0 otherwise. The bipartite complement of a bipartite graph G is the bipartite graph Gbc on the same vertex set as G, V (Gbc ) = X ⊔ Y , with E(Gbc ) = {{x, y} : x ∈ X, y ∈ Y, {x, y} 6∈ E(G)}. One has that M (Gbc ) = 1n×m − M (G) where 1n×m is the n × m matrix whose entries are all 1. Note that the bipartition V (G) = X ⊔ Y may not be unique if the graph G is not connected and the notions of biadjacency matrix or bipartite complement depend on the bipartition. That’s the reason why in section 3 we will restrict ourselves to connected bipartite graphs. The next lemma will be useful to handle the homology of the independence complex of a bipartite graph G. The last three items are rules that one can apply for a reduction to a simpler case by removing vertices of G when the biadjacency matrix M of G satisfies some properties. Lemma 1.6. Let G be a bipartite graph with bipartition V (G) = {x1 , . . . , xn }⊔ {y1 , . . . , ym }, biadjacency matrix M = (ai,j ) ∈ Mn×m ({0, 1}), and independence complex ∆. (1) If M has a row or a column whose entries are all 0, then H̃i (∆) = 0 for all i ≥ 0. REGULARITY 3 IN EDGE IDEALS ASSOCIATED TO BIPARTITE GRAPHS 5 (2) If there exist r and c such that ar,c = 1 and the rest of entries on the row r and the column c are zeros then, for all i > 0, H̃i (∆) ≃ H̃i−1 (∆[V (G) \ {xr , yc }]) . (3) If M has more than one row (resp. column) and if the entries on the row r (resp. column c) are all 1 then, for all i ≥ 0, H̃i (∆) ≃ H̃i (∆[V (G) \ {xr }]) (resp. H̃i (∆) ≃ H̃i (∆[V (G) \ {yc }])) . (4) If M has a row r (resp. column c) with a unique zero entry, say ar,c = 0, and if there is another zero entry on the column c (resp. row r) then for all i ≥ 0, H̃i (∆) ≃ H̃i (∆[V (G) \ {xr }]) (resp. H̃i (∆) ≃ H̃i (∆[V (G) \ {yc }])) . (5) If M has two rows r and r ′ (resp. two columns c and c′ ) such that {j : ar,j = 0} ⊂ {j : ar′ ,j = 0} (resp. {i : ai,c = 0} ⊂ {j : ai,c′ = 0}) then for all i ≥ 0, H̃i (∆) ≃ H̃i (∆[V (G) \ {xr }]) (resp. H̃i (∆) ≃ H̃i (∆[V (G) \ {yc }])) . Proof. 1: The vertex z of G corresponding to the row or column of M with zero entries is isolated in G and hence ∆ is a cone with appex z, so it is acyclic by Proposition 1.3.1. 2: By 1, one has that H̃i (del∆ (yc )) = H̃i (del∆ (xr )) = 0. Since ∆ = del∆ (xr ) ∪ del∆ (yc ) and del∆ (xr ) ∩ del∆ (yc ) = deldel∆ (xr ) (yc ), the result follows from the Mayer-Vietoris sequence (2). 3 and 4 are particular cases of 5 that follows by applying again the Mayer Vietoris sequence (2), observing that link∆ (xr ) is acyclic by 1. Example 1.7. If Σm is the independence complex of mK2 , then  1 if i = m − 1, dimK (H̃i (Σm )) = 0 otherwise . This can be shown by induction on m ≥ 1 as follows. Since Σ1 consists of two disjoint vertices, H̃0 (Σ1 ) ≃ K and H̃i (Σ1 ) = 0 for all i > 0. If m > 1, H̃0 (Σm ) = 0 because Σm is connected and for i > 0, applying Lemma 1.6.2, one gets that H̃i (Σm ) ≃ H̃i−1 (Σm−1 ) and the result follows. 1.2. Some properties of the graded Betti numbers of an edge ideal. Given a minimal graded free resolution of a homogeneous ideal I in R = K[x1 , · · · , xn ], M M ϕ0 ϕ1 M R(−j)β0,j −→ I −→ 0 , 0 −→ R(−j)βp,j −→ . . . −→ R(−j)β1,j −→ j j j the regularity of I (in the sense of Castelnuovo-Mumford) is defined in terms of the graded Betti numbers βi,j as reg(I) := max{j − i : βi,j 6= 0}. The graded Betti numbers of I are usually arranged in a table called the Betti diagram of I where βi,j is placed in the i-th column and (j − i)-th row of 6 OSCAR FERNÁNDEZ-RAMOS AND PHILIPPE GIMENEZ the table. Note that the index of the last nonzero row in the Betti diagram of I is its regularity. If I is a monomial ideal, we can provide the polynomial ring R with the usual Nn -multigrading and I has a minimal multigraded free resolution. We can then define its multigraded Betti numbers, βi,m , as the number of minimal generators of degree m ∈ Nn in the i-th syzygy module. There is a one-to-one correspondence between squarefree monomial ideals generated in degree 2 and simple graphs: associated to a simple graph G, one has the edge ideal I(G) generated by the monomials of the form xi xj with {xi , xj } ∈ E(G). The edge ideal I(G) is indeed the Stanley-Reisner ideal of the independence complex ∆(G) of G, I(G) = I∆(G) . The multigraded Betti numbers of an edge ideal I(G) can be expressed in terms of the reduced homology of ∆(G) using Hochster’s Formula ([11, Theorem (5.1)]) that we recall now. For any m ∈ Nn and i ≥ 0, one has that βi,m (I(G)) = 0 if the mn 1 monomial xm := xm 1 · · · xn is not squarefree, and (3) βi,m (I(G)) = dimK H̃|m|−i−2(∆(G)[W ]) otherwise, where W := {j ∈ [n] : mj = 1}. The graded Betti numbers of I(G) are then given by the following formula: X (4) βi,j (I(G)) = dimK (H̃j−i−2 (∆(G)[W ])) . W ⊂V (G),|W |=j Hochster’s Formula is a powerful tool when one wants to get information on the Betti numbers of edge ideals. It can be used for example to prove the following property on the graded Betti numbers of an edge ideal I(G): Theorem 1.8. For any i ≥ 0 and any j ≥ i+2, if βi,j (I(G)) = βi,j+1 (I(G)) = 0 then βi+1,j+2 (I(G)) = 0. Proof. Denote by ∆ := ∆(G) the independence complex of G and assume that βi+1,j+2 (I(G)) 6= 0. By (3), there exists W ⊂ V (G) with |W | = j + 2 such that dimK H̃j−i−1 (∆[W ]) > 0. As ∆[W ] = ∆(G[W ]) is a flag complex, there exist u, v ∈ W such that {u, v} 6∈ ∆(G)[W ] by Remark 1.4. Consider then the following decomposition of ∆[W ], ∆[W ] = ∆[W \ {u}] ∪ ∆[W \ {v}] , with ∆[W \ {u}] ∩ ∆[W \ {v}] = ∆[W \ {u, v}] which is not empty since |W | = j + 2 > 2. Invoking Hochster’s Formula (3) again, one has that H̃j−i−1 (∆[W \ {u}]) = H̃j−i−1 (∆[W \ {v}]) = 0 because βi,j+1 (I) = 0 and H̃j−i−2 (∆[W \ {u, v}]) = 0 because βi,j (I) = 0. Using the Mayer-Vietoris sequence (1), one gets that H̃j−i−1 (∆[W ]) = 0, a contradiction.  Note that Theorem 1.8 can easily be extended to monomial ideals generated in degree two that may not be squarefree through polarization (see section 4). The following direct consequence answers a question by Aldo REGULARITY 3 IN EDGE IDEALS ASSOCIATED TO BIPARTITE GRAPHS 7 Conca who asked if our [7, Theorem 5.2] could be improved in this direction. In [1], Avramov, Conca and Iyengar proved bounds for the syzygies of Koszul algebras and that question arose in this context. Corollary 1.9. Let I be a monomial ideal generated in degree two and denote by ui the maximal degree of a minimal generator in its i-th syzygy module. Then, for all i ≥ 0, ui+1 ≤ ui + 2. When an edge ideal I(G) has a linear resolution, all the nonzero entries in its Betti diagram are located on the first row. Fröberg proved that an edge ideal I(G) has a linear resolution if and only if the graph Gc is chordal. We can rephrase this nice combinatorial characterization as follows: Theorem 1.10 ([8]). An edge ideal I(G) has regularity 2 if and only if Gc does not have induced cycles. In [6], the authors go one step further and show that if reg(I(G)) > 2, the non-linear syzygies appear for the first time at the (t − 3)-th step of the resolution where t is the minimal length of an induced cycle in Gc . This result is contained in the following stronger statement: Theorem 1.11 ([7]). If I(G) is an edge ideal with reg(I(G)) > 2, let t ≥ 4 be the minimal length of an induced cycle in Gc . Then: • βi,j (I(G)) = 0 for all i < t − 3 and j > i + 2; • βt−3,t (I(G)) = |{induced t-cycles in Gc }|; • βt−3,j (I(G)) = 0 for all j > t; • for any m ∈ Nn such that |m| = t, one has that βt−3,m (I(G)) = 1 if m ∈ {0, 1}n and Gc [W ] ≃ Ct where W := {xi : mi = 1}. Otherwise, βt−3,m (I(G)) = 0. Observe that in the previous theorem, induced cycles in Gc play an important role. That’s why we previously focused on a particular family of edge ideals, those associated to complements of cycles, and gave in [7, Proposition 3.1] closed combinatorial formulas for all its graded Betti numbers. Following the same philosophy, we will focus now on graphs that are the bipartite complement of an even cycle since induced even cycles in the bipartite complement of an arbitrary graph will play a fundamental role later in our main Theorem 3.2. Again, for this family of graphs, we describe all the graded Betti numbers of the associated edge ideals in Theorem 2.1. 2. Bipartite complement of a cycle of even length The following result is a direct consequence of Propositions 2.7, 2.9 and 2.11, that we will prove in this section. Theorem 2.1. The edge ideal associated to the bipartite complement of an even cycle of length t := 2s ≥ 6 has regularity 4 and its Betti diagram is 8 OSCAR FERNÁNDEZ-RAMOS AND PHILIPPE GIMENEZ 0 1 ... 2 β0,2 β1,3 . . . 3 β1,4 . . . 4 s−3 ... βs−3,s−1 ... ... t−5 t−4 βt−5,t−2 1 where the nonzero entries are located in the shadowed area. Moreover, βj−2,j for 2 ≤ j ≤ s − 1, and βj−3,j for 4 ≤ j ≤ t − 2, are given respectively by the following closed combinatorial formulas:     j−1 X k X s k−1 s−k−1 s−k−c βj−2,j = , c c−1 c−1 j−k c=1 k=1 ⌊j/2⌋ βj−3,j X j − m − a − 1t − j − m X m − 1 t − j − 1 j−2m . = t m m−1 m−1 a a=0 m=2 bc be the bipartite complement of an even cycle C Let G := C2s 2s with at least 6 vertices, i.e., s ≥ 3. The vertices and edges of the even cycle C2s will be V := {x1 , . . . , xs } ⊔ {y1 , . . . , ys } and {{x1 , y1 }, {y1 , x2 }, . . . , {ys , x1 }} respectively along this section. We will sometimes refer to the two subsets in the bipartition of V as X and Y . The biadjacency matrix M of G has exactly two zero entries on each row and column:       M =     0 1 0 0 1 .. . .. . 1 0 .. . 0 .. . 1 .. . .. . .. . .. . 1 1 .. . .. . . ... 0 1 0 0 1 0 ... .. . .. ... ... 0     .     In order to use Hochster’s Formula to determine the graded Betti numbers of I(G), we need to compute the reduced simplicial homologies H̃i (∆(G[W ])) for all subsets W of V . The case W = V is solved in Proposition 2.3. Its proof requires the following lemma. Lemma 2.2. For every v ∈ V , del∆(G) (v) is acyclic. Proof. Without loss of generality, let’s choose v = x1 . As observed in Definition 1.5, del∆(G) (x1 ) is the independence complex of G[V \ {x1 }] whose biadjacency matrix N is obtained by removing the first row of M . Observe that the first and last columns of N satisfy the condition in Lemma 1.6.4 and hence can be removed. Again, the first and last rows of this new matrix satisfy the same condition and we remove them. Recursively, when s is odd (respectively even), we reduce the computation of the homology to the case of the independence complex of a graph whose biadjacency matrix is a 2 × 3 (respectively 3 × 2) matrix whose central column (respectively row) has its  two entries equal to zero and del∆(G) (v) is acyclic by Lemma 1.6.1. REGULARITY 3 IN EDGE IDEALS ASSOCIATED TO BIPARTITE GRAPHS Proposition 2.3. dimK (H̃i (∆(G))) =  1 0 9 if i = 2, otherwise . Proof. Since ∆(G) is connected, dimK (H̃0 (∆(G))) = 0. For i > 0, using the Mayer-Vietoris sequence (2), the previous lemma implies that H̃i (∆(G)) ≃ H̃i−1 (link∆(G) (v)) for every vertex v of G and i > 0. The biadjacency matrix (or its transpose) of G[V \ (NG (v) ∪ {v})] is a 2 × (s − 1) matrix with exactly two zero entries, one in each row and located on two different columns. Applying Lemma 1.6.3 (if s > 3) as many times as necessary, one gets that  H̃i (∆(G)) ≃ H̃i−1 (Σ2 ) and the result follows from Example 1.7. Let W be now a proper subset of V , W ( V = X ⊔ Y . Set WX := W ∩ X, WY := W ∩ Y , and denote by kW the number of connected components of the graph C2s [W ] that are not isolated vertices. Note that if kW 6= 0, then WX 6= ∅ and WY 6= ∅. Proposition 2.4. (1) If WX = ∅ or WY = ∅ then ∆(G[W ]) is acyclic. (2) If WX 6= ∅, WY 6= ∅ and kW = 0 then  1 if i = 0, dimK (H̃i (∆(G[W ]))) = 0 otherwise . (3) If kW > 0 then dimK (H̃i (∆(G[W ]))) =  kW − 1 0 if i = 1, otherwise . Remark 2.5. Observe that Gc = C2s ∪ KX ∪ KY , where KA denotes the complete graph on a set of vertices A ⊂ V . Thus, Gc [W ] = C2s [W ] ∪ KWX ∪ KWY . Since KWX and KWY are connected, if one of them is empty or if they are connected to each other in Gc [W ], i.e., if kW 6= 0, then Gc [W ] is connected. Otherwise, KWX and KWY are its connected components. Thus, the condition in Proposition 2.4.2 is satisfied if and only if Gc [W ] is not connected. When WX 6= ∅ and WY 6= ∅, denote by M [W ] the biadjacency matrix of G[W ]. It is easy to check that if WX 6= ∅ and WY 6= ∅, then kW = 0 ⇔ NC2s (WX ) ∩ WY = ∅ ⇔ M [W ] has no zero entries. Proof of Proposition 2.4. If WX = ∅ or WY = ∅, ∆(G[W ]) is a simplex and 1 follows. Assume now that WX 6= ∅, WY 6= ∅ and kW = 0. Then, M [W ] has no zero entries by Remark 2.5 and, by Lemma 1.6.3, for all i ≥ 0, H̃i (∆(G[W ])) ≃ H̃i (∆(K2 )) = H̃i (Σ1 ). So 2 follows from Example 1.7. Assume now that M [W ] has at least one zero entry. First observe that the number of zero entries in any row and column of M [W ] is at most two (and that for at least two of the columns or rows, it is one). By Lemma 1.6.3, the dimension of the reduced homologies will not change if we remove from M [W ] any row and any column with no zero entry. In other words, since a row or a column of M [W ] with no zero entry corresponds to an isolated vertex in C2s [W ], if W ′ is the subset of W formed by all the elements in W that are not isolated vertices in C2s [W ], one has that H̃i (∆(G[W ])) ≃ 10 OSCAR FERNÁNDEZ-RAMOS AND PHILIPPE GIMENEZ H̃i (∆(G[W ′ ])). Moreover, kW = kW ′ . Using now Lemma 1.6.4, one can remove from M [W ′ ] any row (resp. column) with exactly one zero entry and such that in the column (resp. row) where this zero entry is located, there is another zero entry. Such a row or column of M [W ′ ] corresponds to a vertex of C2s [W ′ ] of degree one whose (unique) neighbor is of degree two. Removing such a vertex does not change the number of connected components of C2s [W ′ ] and it creates in C2s [W ′ ] a vertex of the same kind, until we reach a vertex of degree one whose neighbor also has degree one. Thus, H̃i (∆(G[W ])) ≃ H̃i (∆((kW K2 )bc )) for all i ≥ 0. The result is now a direct consequence of the following technical lemma.   m − 1 if i = 1, Lemma 2.6. For all m ≥ 1, dimK (H̃i (∆((mK2 )bc ))) = 0 otherwise. Proof. The biadjacency matrix of the graph (mK2 )bc is an m × m matrix whose entries are all 1 except the ones on the principal diagonal that are zero. Denote by Θm its independence complex, Θm := ∆((mK2 )bc ). Since Θm is connected, dimK (H̃0 (Θm )) = 0 for all m ≥ 1. In order to determine the homology for i ≥ 1, consider the family of subcomplexes of Θm , F = {Θm [X], Θm [Y ], {x1 , y1 }, . . . , {xm , ym }} whose elements we index by x, y, z1 , . . . , zm . Recall that the nerve of F , N (F ), is the simplicial complex on the vertex set VF := {x, y, z1 , . . . , zm } whose faces are the subsets of VF such that the intersection of the corresponding elements in F is non empty. The simplicial complex NS (F ) has 2m facets, {x, zi } and {y, zi } for all i = 1, . . . , m. Since Θm = i∈VF Fi , applying the Nerve Theorem (see, for example, [2, Theorem 10.6]), one gets that H̃i (Θm ) ≃ H̃i (N (F )) for all i ≥ 0. On the other hand, N (F ) = Σyx h{z1 }, . . . , {zm }i and hence, by Proposition 1.3.2, H̃i (N (F )) ≃ H̃i−1 (h{z1 }, . . . , {zm }i) for all i ≥ 1 and the result follows.  As a straightforward consequence, one gets that the last row of the Betti bc ) with a nonzero entry is the one indexed by 4, i.e., regI(C bc ) = diagram of I(C2s 2s bc )) = 1 is the only nonzero entry on this row. 4, and that β2s−4,2s (I(C2s bc )) = 0 if j > i + 4; • βi,j (I(C2s  1 if i = 2s − 4 , bc )) = • βi,i+4 (I(C2s 0 otherwise . Proposition 2.7. Proof. Putting together Propositions 2.3 and 2.4, one has that for every subset W of V , dimK (H̃i (∆(G[W ]))) = 0 for all i ∈ / {0, 1, 2}. Moreover, dimK (H̃2 (∆(G[W ]))) 6= 0 if and only if W = V and dimK (H̃2 (∆(G))) = 1. The result then follows from Hochster’s Formula (4).  bc ), one In order to complete the description of the Betti diagram of I(C2s has to determine the graded Betti numbers on the first two rows, i.e., βi,j for i + 2 ≤ j ≤ i + 3. REGULARITY 3 IN EDGE IDEALS ASSOCIATED TO BIPARTITE GRAPHS 11 We start with the first row. Using Hochster’s Formula (4) and Proposition 2.4.2, one needs to determine all the proper subsets W of V such that WX 6= ∅, WY 6= ∅ and Gc [W ] is not connected. Indeed, βi,i+2 (I(G)) is the number of induced subgraphs Gc [W ] on i+2 vertices that are non connected. Let’s denote by CX the cycle on the vertex set X whose edges are {x1 , x2 }, {x2 , x3 }, . . . , {xs , x1 }. Note that the edges of CX correspond to the pairs {xi , xj } of elements in X such that NC2s (xi ) ∩ NC2s (xj ) 6= ∅. Lemma 2.8. Assume that Gc [W ] is not connected. (1) There exists x ∈ WX such that NC2s (x) 6⊂ NC2s (WX \{x}). (2) |NC2s (WX )| = |WX | + |comp(CX [WX ])| where comp(CX [WX ]) is the set of connected components of CX [WX ]. Proof. If NC2s (x) ⊂ NC2s (WX \{x}) for some x ∈ WX , then NCX (x) ⊂ WX . Thus, if NC2s (x) ⊂ NC2s (WX \{x}) for all x ∈ WX , then WX = X and one can not have WY 6= ∅ and NC2s (WX ) ∩ WY = ∅. This implies that Gc [W ] is connected by Remark 2.5 and 1 follows. We will prove 2 by induction on r := |WX |. If WX = {x} then |NC2s (x)| = 2, |{x}| = 1, |comp((Cx )[{x}])| = 1 and the statement holds. Consider now W such that |WX | = r > 1 and assume that the statement holds for subsets X ′ such that |WX ′ | = r − 1. By 1, we know that there exists x0 ∈ WX such that NC2s (x0 ) 6⊂ NC2s (WX \{x0 }), and one has two possibilities: • If x0 is connected in CX to some x ∈ WX \{x0 }, i.e., if NC2s (x0 ) ∩ NC2s (WX \{x0 }) 6= ∅, then |NC2s (WX )| = |NC2s (WX \{x0 })| + 1. In this case, |comp((CX )[WX ])| = |comp(CX [WX \{x0 }])|; • Otherwise, |NC2s (WX )| = |NC2s (WX \{x0 })|+2 and |comp(CX [WX ])| = |comp(CX [WX \{x0 }])| + 1. In both cases, applying our inductive hypothesis, one gets that |NC2s (WX )| = |WX \{x0 })| + |comp(CX [WX ])| + 1 = |WX | + |comp(CX [WX ])|.  The nonzero entries on the first row of the Betti diagram are given by the following result. bc )) = 0. Proposition 2.9. (1) For all j ≥ s, βj−2,j (I(C2s (2) For j = 2, . . . , s − 1,     j−1 X k X s k−1 s−k−1 s−k−c bc βj−2,j (I(C2s )) = . c c−1 c−1 j−k k=1 c=1 Proof. Consider a proper subset W of V with |W | = j ≥ 2. As already obbc )) in Hochster’s served, H̃0 (∆(G[W ])) will contribute (by 1) to βj−2,j (I(C2s c Formula if and only if G [W ] is not connected. By Remark 2.5, if Gc [W ] is not connected then |WX | > 0, |WY | > 0 and |NC2s (WX )| + |WY | ≤ |Y | = s. Thus, |WY | ≤ s − |NC2s (WX )| < s − |WX | by 6 0. It implies that Lemma 2.8.2 since WX 6= ∅ and hence |comp(CX [WX ])| = 12 OSCAR FERNÁNDEZ-RAMOS AND PHILIPPE GIMENEZ 0 < |WX | < |W | = |WX | + |WY | < s. Thus if |W | ≥ s, Gc [W ] is connected and 1 follows. Now for j with 2 ≤ j ≤ s − 1, we have to count how many subsets W of V with |W | = j satisfy that Gc [W ] is not connected. For each choice of WX with k elements (1 ≤ k ≤ j − 1 in order to have WX 6= ∅ and WY 6= ∅), we must choose j − k elements from Y \NC2s (WX ) for WY , so there are s−|NC2s (WX )| (CX [WX ])| = s−k−|comp possible choices by Lemma 2.8.2. If j−k j−k we fix the number of connected components of X [WX ] and denote it by c, C s−k−1 possible subsets WX according to [7, Lemma 3.3], there are sc k−1 c−1 c−1 with |WX | = k and |comp(CX [WX ])| = c, and the result follows.  Corollary 2.10. The first and the last nonzero entries on the first row of bc bc bc ) coincide, i.e., β the Betti diagram of I(C2s s−3,s−1 (I(C2s )) = β0,2 (I(C2s )).  Proof. For j = s − 1 one has that s−k−c 6= 0 if and only if c = 1. In j−k k−1 s−k−1 s−k−c bc )) = this case c−1 = c−1 = j−k = 1, and hence βs−3,s−1 (I(C2s Ps−2 bc bc  k=1 s = s(s − 2) = |E(C2s )| = β0,2 (I(C2s )). bc ) will be complete once we The description of the Betti diagram of I(C2s give the graded Betti numbers located on the second row. This is our next result. bc )) = 0. Proposition 2.11. (1) For all j ≥ 2s − 1, βj−3,j (I(C2s (2) For j = 4, . . . , 2s − 2, ⌊j/2⌋ bc βj−3,j (I(C2s )) = X m=2 (m−1) j−2m X a=0     2s j − m − a − 1 2s − j − 1 2s − j − m . m m−1 m−1 a bc )) Proof. By Proposition 2.4, H̃1 (∆(G[W ])) will contribute to βj−3,j (I(C2s in Hochster’s Formula (4) if and only if W is a proper subset of V with |W | = j ≥ 4 such that C2s [W ] has at least 2 connected components that are not isolated vertices. More precisely, denoting by w(j, m) the number of proper subsets W of V with |W | = j and such that C2s [W ] has m connected components that are not isolated vertices, then ⌊j⌋ (5) βj−3,j (I(G)) = 2 X (m − 1)w(j, m) . m=2 In particular, since for any subset W of V with 2s − 1 elements, one has that C2s [W ] is connected, 1 follows. Now for j ≤ 2s − 2, denote by W (j, m, a) the set of proper subsets W of V with |W | = j and such that C2s [W ] has a isolated vertices and m connected components that are not isolated vertices. Then, w(j, m) = Pj−2m a=0 w(j, m, a) where w(j, m, a) = |W (j, m, a)|, and we are reduced to compute w(j, m, a) for all possible j, m, a. REGULARITY 3 IN EDGE IDEALS ASSOCIATED TO BIPARTITE GRAPHS 13 As in the proof of [7, Lemma 3.3], observe that a subset W of V can be represented as a vector of length 2s whose ℓ-th entry is 1 if the ℓ-th element in V belongs to W , 0 otherwise. Using this correspondence, the number of nonzero entries in this vector is the number of vertices in C2s [W ] and the number of blocks of nonzero entries is related to the number of connected components of C2s [W ]. In order to avoid distinguishing cases as when the vector starts/ends with 1/0, we will allow to modify the starting vertex and focus only on vectors whose first entry is 1 and last entry is 0. Denote by B(2s, j, k) the set of vectors of length 2s, with entries in {0, 1}, whose first entry is 1 and last entry is 0, and whose j nonzero entries are located in k different blocks. Let H(j, m, a) be the subset of B(2s, j, m + a) formed by vectors with m blocks of 1’s of length strictly bigger than 1 and a blocks of 1’s of length 1 and whose first block of nonzero entries has length strictly bigger than 1. To each element w in H(j, m, a) corresponds 2s elements in W (j, m, a) (one for each choice of a vertex of C2s as the vertex corresponding to the first entry of w), and to an element W in W (j, m, a) corresponds m distinct elements in H(j, m, a) (one for each connected component of C2s [W ] that we choose as the one that gives the first block of nonzero entries in the vector). Thus, w(j, m, a) = 2s m |H(j, m, a)|. Finally, in order to determine |H(j, m, a)|, note that each element in H(j, m, a) comes from a vector h in B(2s − m − a, j − m − a, m) by adding 1 in each block of 1’s of h (there are m), and by inserting a times a 1 between two zero entries of h. As already observed in the proof of [7, Lemma j−m−a−1 2s−j−1 3.3], |B(2s − m − a, j − m − a, m)| = m−1 m−1 . Moreover, for any element in B(2s − m − a, j − m − a, m), each block of zero entries of length ℓ will give ℓ − 1 places where one can add a 1 between two zero entries, and since and element in B(2s − m − a, j − m − a, m) has 2s − j zero entries located in m different  blocks, each element in B(2s − m − a, j − m − a, m) will provide 2s−j−m elements in H(j, m, a). Putting all together, one gets a    2s 2s−j−m j−m−a−1 2s−j−1 and we are done.  that w(j, m, a) = m a m−1 m−1 Corollary 2.12. The first and the last nonzero entries on the second row of bc ) coincide, i.e., β bc bc the Betti diagram of I(C2s 2s−5,2s−2 (I(C2s )) = β1,4 (I(C2s )).   Proof. For j = 2s−2, 2s−j−1 6= 0 if and only if m = 2, and then 2s−j−m 6= m−1 a  2s 2s−5 bc 0 if and only if a = 0, and hence β2s−5,2s−2 (I(C2s )) = 2 1 = s(2s − 5).    bc )) = 2s 1 2s−5 2s−6 and we are done.  On the other hand, β1,4 (I(C2s 2 1 1 0 Remark 2.13. Recall from [14] that the induced matching number of a graph G and the Castelnuovo-Mumford regularity of the edge ideal I(G) satisfy that µ(G)+1 ≤ reg(I(G)). In the case of the bipartite complement of an even cycle, one can easily determine the induced matching number. Since C6bc = bc because C 6< C , and hence 3K2 , µ(C6bc ) = 3. Now if s > 3, 3K2 6< C2s 6 2s bc ) < 3. As C bc [{x , x , y , y }] is formed by the two non-connected µ(C2s 1 3 1 2 2s bc ) = 2 if s > 3. Hence, the matching edges {x1 , y2 } and {y1 , x3 }, µ(C2s 14 OSCAR FERNÁNDEZ-RAMOS AND PHILIPPE GIMENEZ bc and the Castelnuovo-Mumford regularity of I(C bc ) ⊂ R = number of C2s 2s K[x1 , . . . , xs , y1 , . . . , ys ] are related as follows:  bc ) + 1 if s = 3 , µ(C2s bc reg(I(C2s )) = bc ) + 2 µ(C2s if s ≥ 4 . This is not the only difference between the cases s = 3 and s ≥ 4. Indeed, bc ) is not even R/I(C6bc ) is a complete intersection while, for s ≥ 4, R/I(C2s Cohen-Macaulay (if it was then it would be Gorenstein which is impossible since its Betti diagram is not symmetric). 3. Regularity 3 in bipartite edge ideals In this section we focus on edge ideals associated to bipartite graphs, which we call bipartite edge ideals. We only consider connected graphs because the Betti numbers of the edge ideal associated to a disconnected graph can be computed from the Betti numbers of the edge ideals associated to its connected components; see [13, Lemma 2.1]. Bipartite edge ideals having regularity 2 can be characterized using Theorem 1.10. They are shown to be the edge ideals associated to Ferrer’s graphs in [3, Theorem 4.2]. Our aim here is to prove our main results, Theorems 3.1 and 3.2. The first one, analogous to Fröberg’s classical Theorem 1.10, provides a combinatorial characterization of bipartite edge ideals having regularity 3. The second one, analogous to Theorem 1.11, gives some extra information when the bipartite edge ideal I(G) has regularity > 3: we determine the first step i in the minimal graded free resolution of I(G) where there are syzygies contributing to a graded Betti number located outside the first two rows of the Betti diagram. We also show that these syzygies are then concentrated in degree i + 4 and compute the corresponding graded Betti number βi,i+4 . Theorem 3.1. Let G be a connected bipartite graph. The edge ideal I(G) has regularity 3 if and only if Gc has at least one induced cycle (of length ≥ 4) and Gbc does not have any induced cycle of length ≥ 6. Theorem 3.2. Let G be a connected bipartite graph and set r := |V (G)|. Assume that reg(I(G)) > 3 and let t = 2s ≥ 6 be the minimal length of an induced cycle in Gbc . Then: • βi,j (I(G)) = 0 for all i < t − 4 and j > i + 3; • βt−4,t (I(G)) = |{induced t-cycles in Gbc }|; • βt−4,j (I(G)) = 0 for all j > t; • for any m ∈ Nr such that |m| = t, one has that βt−4,m (I(G)) = 1 if m ∈ {0, 1}r and Gbc [W ] ≃ Ct where W := {vi ∈ V (G) : mi = 1}. Otherwise, βt−4,m (I(G)) = 0. Before we prove these results, let’s recall a construction and some results from [4] that will be useful. Given a simplicial complex Γ on the vertex set X = {x1 , . . . , xn } whose facets are denoted by F1 , . . . , Fm , consider m new REGULARITY 3 IN EDGE IDEALS ASSOCIATED TO BIPARTITE GRAPHS 15 vertices, Y := {y1 , . . . , ym }, and define a new simplicial complex, ∆(Γ), on the vertex set X ⊔ Y by (6) ∆(Γ) := ∆′ ∪ ∆X , where ∆X denotes the (n − 1)-simplex on the vertex set X, and ∆′ is the simplicial complex given by ∆′ = {σ ∪ τ : σ ∈ Γ, τ ⊂ {yj : σ ⊂ Fj }}. Then, [4, Theorem 4.7] states that (7) H̃i+1 (∆(Γ)) ≃ H̃i (Γ) , ∀ i ≥ 0 . Let G be a connected bipartite graph on the vertex set V (G) = X ⊔Y with X = {x1 , . . . , xn }, Y = {y1 , . . . , ym }, set R := K[x1 , . . . , xn , y1 , . . . , ym ], and denote as before WX := W ∩ X, WY := W ∩ Y for any subset W of V (G). One has that the set (8) ΓG := {σ ⊂ NGbc (y) : y ∈ Y } is a simplicial complex on X \ {x ∈ X that are isolated vertices of Gbc }. Definition 3.3. We say that a subset W ⊂ V (G) is relevant if |W | ≥ 3 and, for all u, v ∈ W , NG[W ] (u) 6⊂ NG[W ] (v). Remark 3.4. • If W is not relevant, then there exist u, v ∈ W such that NG[W ] (u) ⊂ NG[W ] (v) and Hi (∆(G[W ])) ≃ Hi (∆(G[W \ {v}])) for all i ≥ 0 by Lemma 1.6.5. • If W is relevant, then |WX | > 1 and |WY | > 1. Lemma 3.5. If W ⊂ V (G) is relevant, then ∆(ΓG[W ] ) = ∆(G)[W ]. Proof. Denote by Γ := ΓG[W ] the simplicial complex associated to the graph G[W ] as in (8), let F(Γ) be its set of facets, and set ∆ := ∆(Γ) as defined in (6). Since W is relevant, G[W ] has no isolated vertex and hence WX is the vertex set of Γ. Moreover, F(Γ) = {NGbc [W ] (y) : y ∈ WY }. This implies that ∆ = ∆′ ∪ ∆WX where ∆′ = {σ ∪ τ : σ ∈ ΓG[W ] , τ ⊂ {y ∈ WY : σ ⊂ NGbc [W ] (y)}}. Consider σ ⊂ W . If σ ⊂ WX then σ ∈ ∆WX ⊂ ∆ and also σ ∈ ∆(G)[W ]. Otherwise, one has that σ ∈ ∆ \ ∆W X ⇔ σX ∈ ΓG[W ], σY 6= ∅ and σX ⊂ NGbc [W ] (y) , ∀y ∈ σY ⇔ σY 6= ∅ and σX ⊂ NGbc [W ](y) , ∀y ∈ σY ⇔ σY 6= ∅ and {x, y} 6∈ E(G[W ]) , ∀x ∈ σX , ∀y ∈ σY ⇔ σ⊂ 6 WX and σ ∈ ∆(G)[W ] ⇔ σ ∈ ∆(G)[W ] \ ∆WX . Thus, σ ∈ ∆ ⇔ σ ∈ ∆(G)[W ].  Lemma 3.6. Let I := IΓG[W ] be the Stanley-Reisner ideal associated to the simplicial complex ΓG[W ] and let {m1 , . . . , ms } be its monomial minimal generating set. One has that: 16 OSCAR FERNÁNDEZ-RAMOS AND PHILIPPE GIMENEZ • if W is relevant then deg(mi ) ≥ 2, ∀i ∈ [s]; • max{deg(mi ) : i ∈ [s]} ≤ µ(G[W ]). Proof. If W is relevant and x ∈ W then NG[W ] (x) ( WY . Thus, x ∈ NGbc [W ] (y) for some y ∈ WY , and hence {x} ∈ ΓG[W ]. Therefore, non-faces must have dimension strictly greater than 1. Since minimal generators of I correspond to minimal non-faces of ΓG[W ] , the first claim follows. If g = xi1 · · · xid is a minimal generator of I, then {xi1 , . . . , xid } 6⊂ NGbc [W ] (y) for all y ∈ WY and xgi 6∈ I for all k ∈ [d]. Hence, for every l ∈ [d], k Fl := {xik : k 6= l} ⊂ NGbc [W ] (y) for some element y in WY that we denote by y(l). Then, xil 6∈ NGbc [W ] (y(l)), or equivalently, xil ∈ NG[W ] (y(l)) and xik 6∈ NG[W ] (y(l)) if k 6= l. So {{xil , y(l)} : l ∈ [d]} is a set consisting of d disconnected edges of G[W ]. This implies that µ(G[W ]) ≥ d.  Proof of Theorems 3.1 and 3.2. We will first prove the equivalence in Theorem 3.1 and show that the extra information contained in Theorem 3.2 then follows quite easily. First assume that reg(I(G)) = 3. By Theorem 1.10, Gc contains an induced cycle of length l ≥ 4. Moreover, if there exists a subset W of V (G) such that Gbc [W ] ≃ Cl for some (even) l ≥ 6 then, since on one hand βi,j (I(G)) ≥ βi,j (I(G[W ])) for all i, j by Hochster’s Formula (4), and on the other βl−4,l (I(Clbc )) = 1 by Theorem 2.1, one gets that reg(I(G)) ≥ 4, a contradiction. Conversely, assume that reg(I(G)) 6= 3. If reg(I(G)) = 2 then there is no induced cycle in Gc by Theorem 1.10 and the result holds. If reg(I(G)) > 3 then, by Theorem 1.8, there exists i such that βi,i+4 (I) 6= 0. Denote by i4 the smallest integer with this property. By [14, Lemma 2.2], i4 ≥ 2 and if i4 = 2, then β2,6 (I) 6= 0 is the number of induced subgraphs of G isomorphic to 3K2 . We only have to notice that (3K2 )bc ≃ C6 to obtain that if i4 = 2, Gbc contains an induced cycle of length 6. On the other hand, all the items in Theorem 3.2 follow in this case from Theorem 1.8 and [9, Theorem 2.1] which states that, for any monomial in R, xm , if one collects at each step of the minimal multigraded free resolution of I(G), the minimal generators whose multidegree divides xm , one gets a minimal multigraded free resolution of I(G)m , the edge ideal whose minimal generators divide xm . If i4 ≥ 3, Hochster’s Formula (3) tells us that there exists W ⊂ V (G) such that (9) |W | = i4 + 4 and dimK (H̃2 (∆(G)[W ])) > 0 . As in the case i4 = 2, we will be done using Theorem 1.8 and [9, Theorem 2.1] if we show that the subsets W ⊂ V (G) satisfying (9) are the ones such that (10) G[W ] ≃ (Ci4 +4 )bc . If W satisfies (10), then it satisfies (9) by Proposition 2.3. Now take W satisfying (9) and consider the simplicial complex Γ := ΓG[W ]. Note that, REGULARITY 3 IN EDGE IDEALS ASSOCIATED TO BIPARTITE GRAPHS 17 using Remark 3.4, W has to be a relevant subset of vertices by minimality of i4 . Applying Lemma 3.5 and (7), one has that dimK (H̃1 (Γ)) = dimK (H̃2 (∆(G)[W ])) > 0 . Moreover, dimK (H̃1 (Γ[X ′ ])) = 0 for all X ′ ( WX since ∆(ΓX ′ ) ≃ ∆(G)[W ′ ] where W ′ = X ′ ⊔ WY and if dimK (H̃1 (Γ[X ′ ])) = dimK (H̃2 (∆(G)[W ′ ])) > 0, we will reach a contradiction with the minimality of the size of W . As i4 > 2, we have β2,6 (I(G)) = 0 and hence, by [14, Lemma 2.2], µ(G) = 2. Thus, by Lemma 3.6, IΓ is generated in degree 2, i.e., it is an edge ideal, and hence we can write Γ = ∆(G∗ ) for some simple graph G∗ on the vertex set WX . Thus, dimK (H̃1 (∆(G∗ ))) > 0 and dimK (H̃1 (∆(G∗ )[X ′ ])) = 0 for all X ′ ( WX . Applying Theorem 1.11, we have that Cl < (G∗ )c for some l ≥ 4 but Cl 6< (G∗ )c [X ′ ] for all X ′ ( WX , so necessarily, (G∗ )c = Cl and l = |WX |. Therefore, Γ = ∆(Clc ) = Cl and we have |NGbc [W ] (y)| = 2, for all y ∈ WY . Together with the fact that NGbc [W ] (u) 6⊂ NGbc [W ] (v) for all u, v ∈ W such that u 6= v (so |NGbc [W ] (u)| = 6 1, u ∈ WX ) and that P P v∈WY degGbc [W ] (v) (so NGbc [W ] (u)| ≤ 2, u ∈ WX ), u∈WX degGbc [W ] (u) = this implies that |NGbc [W ] (y)| = 2 for all y ∈ W . Moreover, Gbc [W ] is connected because Γ is, and hence Gbc [W ] ≃ C|W | .  Remark 3.7. One can find in [14] several examples of edge ideals whose regularity is 3 or 4 depending on the characteristic of the field K. This shows that in Theorem 3.1 the bipartite hypothesis can not be removed since the information provided there only depends on the combinatorics of the graph G. That is why we restricted ourselves to bipartite edge ideals in this work. Now observe that even for bipartite edge ideals, it is hopeless to try an extrapolation of our results for higher values of the regularity as an example in [4] shows. 4. The non-squarefree case Let I be an ideal in R := K[x1 , . . . , xn ] generated by monomials of degree two which is not squarefree. Assume, without loss of generality, that I is minimally generated by {m1 , . . . , ms } where m1 = x21 , . . . , ml = x2l and ml+1 , . . . , ms are squarefree for some l ∈ [s]. We define • Isqf := (ml+1 , . . . , ms ) ⊂ R, and • Ipol := (x1 y1 , . . . , xl yl , ml+1 , . . . , ms ) ⊂ R∗ := K[x1 , . . . , xn , y1 , . . . , yl ]. The ideal Ipol , called the polarization of I, has the following useful property: if we provide R and R∗ with a Nn -multigrading such that deg(xi ) = ei for all i ∈ [n] and deg(yj ) = ej for all j ∈ [l] then, by [10, Corollary 1.6.3], (11) βi,m (I) = βi,m (Ipol ), ∀i ≥ 0, ∀m ∈ Nn . Both ideals Isqf and Ipol are edge ideals, the first one on the vertex set {x1 , . . . , xn } and the second on {x1 , . . . , xn , y1 , . . . , yl }. We will call G the non simple graph associated to I and denote, as in the squarefree case, 18 OSCAR FERNÁNDEZ-RAMOS AND PHILIPPE GIMENEZ I = I(G). Denote by Gsqf and Gpol the simple graphs associated to Isqf and Ipol , respectively. Observe that Gsqf and Gpol are obtained by removing loops in G and substituting whiskers for loops in G, respectively. Definition 4.1. We say that two edges e1 , e2 ∈ E(G) are totally disjoint provided {u, v} 6∈ E(G) if u ∈ e1 and v ∈ e2 . Assume that the simple graph Gsqf is connected and bipartite. In this case, we say that the non simple graph G is bipartite and define the bipartite complement of G as the bipartite complement of the simple graph Gsqf , i.e., Gbc := (Gsqf )bc . We also define the complement of G as the complement of the simple graph Gsqf , i.e., Gc := (Gsqf )c . We can complete the characterization of ideals associated to bipartite graphs having regularity 3 with the non-squarefree case as follows: Proposition 4.2. Let I ⊂ R be a non-squarefree monomial ideal generated in degree two and assume that the non simple graph G associated to I is bipartite. Then, I has regularity 3 if and only if • G either has two totally disjoint edges or Cl < Gc for some l ≥ 5, • G does not have three edges that are pairwise totally disjoint, and • Gbc has no induced cycle of length ≥ 8. Proof. By (11), reg(I) = 3 if and only if reg(Ipol ) = 3 and, using Theorem 3.1, this occurs if and only if (Gpol )c has an induced cycle of length 4 and (Gpol )bc has no induced cycle of length ≥ 6. Rewriting these properties of the graph Gpol in terms of the graph G, the result follows.  When reg(I) > 3, the claims in Theorem 3.2 remain valid if G does not contain three edges that are pairwise totally disjoint since l-cycles in (Gsqf )c and in (Gsqf )bc coincide with the l-cycles in (Gpol )c and (Gpol )bc respectively, provided l > 6. However, if G has three edges that are pairwise totally disjoint, then: • βi,j = 0 if i ≤ 1 and j > i + 3; • β2,6 is the number of induced subgraphs of G isomorphic to three pairwise totally disjoint edges; • β2,j = 0 for all j > 6; • considering the Nn -multigrading on R, for all m ∈ Nn such that |m| = 6, one has that β2,m = 1 if G[{xi : mi = 1}] consists of three totally disjoint edges. Otherwise, β2,m = 0. Example 4.3. The ideal I = (x21 , x1 x5 , x2 x5 , x2 x7 , x3 x5 , x3 x6 , x3 x7 , x4 x6 ) satisfies that β2,6 = 1. The bipartite graph Gbc does not have any induced 6-cycle but there are three pairwise disjoint edges in G. References [1] L. Avramov, A. Conca and S. Iyengar. Free resolutions over commutative Koszul algebras. Math. Res. Lett. 17:197–210, 2010. REGULARITY 3 IN EDGE IDEALS ASSOCIATED TO BIPARTITE GRAPHS 19 [2] A. Björner. Topological methods. In: Handbook of combinatorics, Vol. 1, 2 :1819– 1872. Elsevier, Amsterdam, 1995. [3] A. Corso and U. Nagel. Monomial and toric ideals associated to Ferrers graphs. Trans. Amer. Math. Soc. 361:1371–1395, 2009. [4] K. Dalili and M. Kummini. Dependence of Betti numbers on characteristic. arXiv:1009.4243, Sep. 2010. [5] R. Diestel. Graph theory. Graduate Texts in Mathematics, Vol. 173. Springer, Heidelberg, Fourth edition, 2010. [6] D. Eisenbud, M. Green, K. Hulek, and S. Popescu. Restricting linear syzygies: algebra and geometry. Compos. Math. 141:1460–1478, 2005. [7] O. Fernández-Ramos and P. Gimenez. First nonlinear syzygies of ideals associated to graphs. Comm. Algebra 37:1921–1933, 2009. [8] R. Fröberg. On Stanley-Reisner rings. In: Topics in algebra, Part 2 (Warsaw 1988), Banach Center Publ. Vol. 26:57–70, 1990. [9] V. Gasharov, T. Hibi, and I. Peeva. Resolutions of a-stable ideals. J. Algebra 254:375– 394, 2002. [10] J. Herzog and T. Hibi. Monomial ideals. Graduate Texts in Mathematics, Vol. 260. Springer-Verlag, London, 2011. [11] M. Hochster. Cohen-Macaulay rings, combinatorics, and simplicial complexes. In: Ring theory, II (Proc. Second Conf., Univ. Oklahoma, Norman, Okla., 1975). Lecture Notes in Pure and Appl. Math. Vol. 26: 171–223. Dekker, New York, 1977. [12] H.-T. Ha and A. Van Tuyl. Resolutions of square-free monomial ideals via facet ideals: a survey. In: Algebra, geometry and their interactions, Contemp. Math. Vol. 448:91– 117. Amer. Math. Soc., Providence, RI, 2007. [13] S. Jacques and M. Katzman. The Betti numbers of forests. math.AC/0501226, Jan. 2005. [14] M. Katzman. Characteristic-independence of Betti numbers of graph ideals. J. Combin. Theory Ser. A 113:435–454, 2006. [15] S. Morey and R. H. Villarreal. Edge ideals: algebraic and combinatorial properties. arXiv:1012.5329, Dec. 2010. [16] J. R. Munkres. Elements of algebraic topology. Addison-Wesley Publishing Company, Menlo Park, CA, 1984. [17] E. Nevo. Regularity of edge ideals of C4 -free graphs via the topology of the lcmlattice.. J. Combin. Theory Ser. A 118:491–501, 2011. [18] R. H. Villarreal. Cohen-Macaulay graphs. Manuscripta Math. 66:277–293, 1990. [19] R. H. Villarreal. Monomial algebras. Monographs and Textbooks in Pure and Applied Mathematics, Vol. 238. Marcel Dekker Inc., New York, 2001. University of Valladolid E-mail address: [email protected] University of Valladolid E-mail address: [email protected]
0math.AC
Geometrically Exact Finite Element Formulations for Curved Slender Beams: Kirchhoff-Love Theory vs. Simo-Reissner Theory Christoph Meiera,∗, Wolfgang A. Wallb , Alexander Poppb a Mechanosynthesis b Institute Group, Massachussets Institute of Technology, 77 Massachusetts Avenue, Cambridge, 02139, MA, USA for Computational Mechanics, Technical University of Munich, Boltzmannstrasse 15, D–85748 Garching b. München, Germany arXiv:1609.00119v1 [cs.CE] 1 Sep 2016 Abstract The present work focuses on geometrically exact finite elements for highly slender beams. It aims at the proposal of novel formulations of Kirchhoff-Love type, a detailed review of existing formulations of Kirchhoff-Love and SimoReissner type as well as a careful evaluation and comparison of the proposed and existing formulations. Two different rotation interpolation schemes with strong or weak Kirchhoff constraint enforcement, respectively, as well as two different choices of nodal triad parametrizations in terms of rotation or tangent vectors are proposed. The combination of these schemes leads to four novel finite element variants, all of them based on a C 1 -continuous Hermite interpolation of the beam centerline. Essential requirements such as representability of general 3D, large-deformation, dynamic problems involving slender beams with arbitrary initial curvatures and anisotropic cross-section shapes, preservation of objectivity and path-independence, consistent convergence orders, avoidance of locking effects as well as conservation of energy and momentum by the employed spatial discretization schemes, but also a range of practically relevant secondary aspects will be investigated analytically and verified numerically for the different formulations. It will be shown that the geometrically exact Kirchhoff-Love beam elements proposed in this work are the first ones of this type that fulfill all these essential requirements. On the contrary, Simo-Reissner type formulations fulfilling these requirements can be found in the literature very well. However, it will be argued that the shear-free Kirchhoff-Love formulations can provide considerable numerical advantages such as lower spatial discretization error level, improved performance of time integration schemes as well as linear and nonlinear solvers or smooth geometry representation as compared to shear-deformable Simo-Reissner formulations when applied to highly slender beams. Concretely, several representative numerical test cases confirm that the proposed Kirchhoff-Love formulations exhibit a lower discretization error level as well as a considerably improved nonlinear solver performance in the range of high beam slenderness ratios as compared to two representative Simo-Reissner element formulations from the literature. Keywords: Geometrically exact beams, Simo-Reissner, Kirchhoff-Love, Finite elements, Objectivity, C 1 -continuity 1. Introduction Highly slender fiber- or rod-like components represent essential constituents of mechanical systems in countless fields of application and scientific disciplines such as mechanical engineering, biomedical engineering, material science and bio- or molecular physics. Examples are high-tensile industrial webbings, fiber-reinforced composite materials, fibrous materials with tailored porosity, synthetic polymer materials or also cellulose fibers determining the characteristics of paper [49, 146, 91, 90, 56, 116]. On entirely different time and length scales, such slender components are relevant when analyzing the supercoiling process of DNA strands, the characteristics of carbon nanotubes or the Brownian dynamics within the cytoskeleton of biological cells, a biopolymer network of highly slender filaments that crucially influences biologically relevant processes such as cell division and cell migration [45, 108, 148, 153]. Often, these slender components can be modeled as 1D Cosserat continua based on a geometrically nonlinear beam theory. ∗ Corresponding author Email address: [email protected] (Christoph Meier) September 2, 2016 In all mentioned cases, mechanical contact interaction crucially influences the overall system behavior. While in the authors’ recent works [106] and [107] a novel beam-to-beam contact formulation has been proposed that faces the challenges arising from high beam slenderness ratios and complex 3D contact configurations, the present contribution focuses on the development of geometrically exact beam element formulations suitable for an accurate, efficient and robust modeling of highly slender beams. While the vast majority of geometrically exact beam element formulations available in the literature is based on the Simo-Reissner theory of thick rods, the current work proposes geometrically exact finite elements based on the Kirchhoff-Love theory of thin rods that are taylored for high beam slenderness ratios. Basically, two essential motivations for applying a beam theory instead of a 3D continuum mechanics theory for the modeling of slender bodies can be identified: In the early days of beam theories, it was the accessibility of analytic solutions as for example ”Euler’s Elastica”, even for large deformation problems, that motivated the development and application of one-dimensional theories. Nowadays, it is the knowledge that the modeling of highly slender bodies via beam theories yields considerably more efficient, but also more well-posed, numerical formulations as it would be the case for 3D continuum theories. So-called induced beam theories can be regarded as reduced 1D continuum theories consistently derived from the 3D theory of continuum mechanics under consideration of a basic kinematic constraint that reflects the deformation states expected for slender bodies in a reasonable manner. Such 1D beam theories typically allow to describe the motion and deformation of slender bodies in 3D space on the basis of proper kinematic, kinetic and constitutive resultant quantities. In the case of induced beam theories, these resultant quantities can for example be derived via integration of 3D stress measures over the beam cross-section. The 3D stress measures typically result from the constrained 3D displacement field as well as standard 3D strain measures and constitutive relations. In this context, the cross-section of a beam represents the collection of all material points sharing the same beam length coordinate in the stress-free configuration. On the contrary, so-called intrinsic beam theories directly postulate the 1D resultant quantities. These theories are internally consistent in the sense that the resultant quantities as well as the 1D relations connecting these quantities still fulfill essential mechanical principles such as equilibrium of forces and moments, conservation of energy or rather existence of work conjugated stress-strain pairs, observer invariance or path-independence of conservative problems. Nevertheless, intrinsic beam theories are decoupled from the 3D continuum mechanics theory. Typically, the postulated constitutive constants relating stress and strain measures are determined experimentally, while the constitutive constants of induced beam theories follow directly from the corresponding 3D constitutive laws. Such postulated constitutive laws based on experimentally determined constants are favorable for applications where no 3D continuum foundation exists: Considering the low number of discrete molecules distributed over the thickness of macromolecules as occurring for example in biopolymer networks, DNA strands or carbon nanotubes - to come back to the applications mentioned above - no 3D continuum theory can be applied in a reasonable manner. Nevertheless, it is well-established that these slender components can be described in good approximation by 1D continuum theories and associated experimentally determined constitutive constants [126]. A compromise between induced and intrinsic theories are so-called semi-induced beam theories, where only the constitutive law is postulated. The remaining kinetic and kinematic relations are consistently derived from the 3D theory. Based on the Bernoulli hypothesis of undeformed cross-sections and the work of Euler, the “Kirchhoff beam” [86], proposed by Kirchhoff zu Heidelberg in 1859, was the first formulation allowing for arbitrary initial curvatures and large three-dimensional deformations including the states of bending and torsion. In 1944, this theory was enhanced by Love [101] to also account for small axial tension. A comprehensive historic overview of these early developments is given in the work of Dill [47]. It was Reissner in 1972 for the two-dimensional case [114] and in 1981 for the general three-dimensional case [115], who completed the theory by two additional deformation measures representing the shear deformation of the beam. While the 3D problem statement of Reissner was still based on some additional approximations, Simo [132] extended the work of Reissner to yield a formulation that is truly consistent in the sense of a semi-induced beam theory. Thus, starting from a basic kinematic assumption, all kinetic and kinematic quantities and relations are consistently derived from the 3D continuum theory, while the constitutive law has been postulated. Originally, this theory has been denoted as geometrically exact beam theory. Nowadays, it is also referred to as Simo-Reissner beam theory. According to the definition of Simo [132], also in this work, a beam theory is denoted as geometrically exact, if “the relationships between the configuration and the strain measures are consistent with the virtual work principle and the equilibrium equations at a deformed state regardless of the magnitude of displacements, rotations and strains” ([43], p. 1126). For that reason, also the notation “finite-strain beams” has been applied in the 2 original work [132]. However, as later argued by several authors (see e.g. [43]) and in accordance with derivations in the literature (see e.g. [3, 2, 101], but also Section 3.5 of this work), a consistency of the geometrically exact beam theory and the 3D theory of continuum mechanics in the sense of a (fully) induced beam theory can only be assumed as long as small strains are considered. The fulfillment of the basic kinematic assumption of rigid cross-sections underlying the geometrically exact beam theory requires pointwise six (translational and rotational) degrees of freedom in order to uniquely describe the (centroid) position and orientation of the cross-sections. Consequently, this beam theory can be identified as 1D Cosserat continuum [38], derived from a 3D Boltzmann continuum with pointwise three (translational) degrees of freedom. While there exists a variety of beam theories that also consider in-plane as well as out-of-plane cross-section distortion, this contribution focuses on geometrically exact beam formulations on the basis of the rigid cross-section assumption as applied by Simo and Reissner. Furthermore, throughout this work, the notion Simo-Reissner theory will be preferred since the notion geometrically exact beam theory, when following the definition presented above, also applies to consistently derived shear-free formulations on the basis of the Kirchhoff-Love theory. In the remainder of this work, the notion “shear-free” represents the opposite of ”shear-deformable” and thus is equivalent to “vanishing shear strains”, but, of course, not to ”vanishing shear stresses”. Unfortunately, no absolute consensus concerning naming of different beam models can be found in the literature. For that reason, the following nomenclature, trying to be consistent with the most important representatives in the literature, will be applied here: Name Simo-Reissner (Anisotropic) Kirchhoff-Love Straight Kirchhoff-Love Isotropic Kirchhoff-Love Nonlinear Euler-Bernoulli Torsion-Free Simo-Reissner Torsion-Free Kirchhoff-Love Timoshenko Euler-Bernoulli Inextensible ... Theory Nonlinear Nonlinear Nonlinear κ0 , 0 + + - I2 , I3 + + + Tension + + + Shear + - Torsion + + + Bending + + + Nonlinear - - + - + + Nonlinear Nonlinear Linear Linear ... ... + + ... + + + + - + + - + + ... + + + + ... Table 1: Nomenclature applied within the current contribution for different (geometrically exact) beam theories / models. Geometrically nonlinear beam models capturing the modes of axial tension, torsion and bending and being appropriate for initially straight beams with isotropic cross-section shapes (identical moments of inertia of area I2 = I3 ) are denoted as nonlinear Euler-Bernoulli beams. The extension to anisotropic cross-section shapes (different moments of inertia of area I2 , I3 ) and arbitrary initial curvatures κ0 , 0 is referred to as Kirchhoff-Love theory. In order to simplify the subsequent comparison of shear-free beam formulations from the literature the more refined nomenclature of i) isotropic, ii) straight and iii) anisotropic Kirchhoff-Love formulations is introduced for theories capturing i) neither anisotropic cross-section shapes nor initial curvatures (=nonlinear Euler-Bernoulli), ii) anisotropic cross-section shapes but no initial curvatures or iii) both, anisotropic cross-section shapes and initial curvatures. The supplementation by shear deformation modes is covered by the Simo-Reissner theory. Euler-Bernoulli or Kirchhoff-Love formulations that neglect the mode of axial tension are denoted as inextensible Euler-Bernoulli or Kirchhoff-Love variants. Recently, sheardeformable and shear-free beam formulations have been proposed that also neglect the mode of torsion [121, 105]. These formulations are capable of accurately modeling ropes and cables (providing a mechanically consistent bending stabilization), quasi-continua such as chains but also general 1D continua with full bending and torsional stiffness if some restrictions concerning external loads (no torsional moment loads) and initial geometry (I2 = I3 ,κ0 = 0) are fulfilled. Eventually, the restriction of shear-free or shear-deformable theories to the geometrically linear regime yields the linear Euler-Bernoulli and Timoshenko beam models [144]. An overview of these beam models is given in Table 1. By identifying the configuration space underlying the geometrically exact beam theory as nonlinear, differentiable manifold with Lie group structure and by pointing out important algorithmic consequences resulting from the nonadditivity and non-commutativity of the associated group elements, the original work by Simo [132] and the subse3 quent work by Simo and Vu-Quoc [134] laid the foundation for abundant research work on this topic in the following years. The static beam theory [132, 134] has been extended to dynamics by Cardona and Geradin [34, 35] and by Simo and Vu-Quoc [135]. The contributions of Kondoh et al. [88], Dvorkin et al. [50] as well as Iura and Atluri [78] can be regarded as further pioneering works in this field. These contributions mark the starting point for the development of a large variety of geometrically exact beam element formulations [44, 71, 74, 137, 110, 81, 79, 124] which basically differ in the type of rotation interpolation (e.g. interpolation of incremental, iterative or total rotational vectors), the choice of nodal rotation parametrization (via rotation vectors, quaternions etc.), the type of iterative rotation updates (multiplicative or additive), or the time integration scheme applied to the rotational degrees of freedom (e.g. based on additive or multiplicative rotation increments). Also extensions of the geometrically exact beam theory to arbitrary cross-section shapes with shear centers differing from the cross-section centroid can be found [65]. An overview of the most important developments at that time is exemplarily given in the text books of Crisfield [40] as well as Geradin and Cardona [58]. An break in this development is given by the works of Crisfield and Jelenić [43, 80], who have shown that none of the rotation field discretizations of the formulations existent at that time could preserve both of the important properties objectivity and path-independence (see also [76] for a discussion of this topic). Furthermore, in [43] and [80], a new, objective and path-independent orthogonal interpolation scheme was proposed that directly acts on the rotation manifold and not on any of its rotation vector parametrizations as done in the works before. This formulation was the starting point for the development of many alternative rotation interpolation strategies for geometrically exact beams that also preserve these properties. Among others, orthogonal interpolations of relative rotation vectors (see e.g. [60, 122]) or quaternions (see e.g. [59, 117, 158]), non-orthogonal interpolation strategies in combination with modified beam models (see e.g. [120, 22, 51]) and non-orthogonal interpolation strategies with subsequent orthogonalization (see e.g. [117]) can be identified. As reported in the original work [43, 80], the rotation interpolation scheme proposed by Crisfield and Jelenić can exactly represent the state of constant curvature. Thus, it can be interpreted as geodesic, i.e. shortest, connection between two configurations on the rotation manifold. Consequently, these geodesic rotation interpolation schemes represent the counterpart to linear interpolations of translational quantities. The works [24, 25] as well as the recent contributions [122, 145, 139, 138] can be identified as further geometrically exact beam element formulations based on geodesic interpolations of the rotational (and translational) primary variable fields. A 2D extension of these so-called helicoidal interpolations to higher-order elements is given in [48]. A formulation with smooth centerline representation based on an isogeometric collocation scheme is proposed in [149]. Besides these purely displacement-based elements, also interpolation schemes directly acting at the strain level combined with a subsequent derivation of the position and rotation field via integration (see e.g. [156, 157, 145]) as well as mixed formulations [125] have been proposed. Furthermore, a variety of contributions considering time integration of rotational variables can be found in this context [136, 26, 61, 14, 21, 75, 98, 119, 83, 46]. While all the formulations presented above have been based on the finite element method (FEM), also discrete representatives of Simo-Reissner beam formulations based on finite difference schemes can be found in the literature [93, 92, 100, 82]. These are often denoted as discrete elastic rods and based on the concept of discrete differential geometry (DDG). In the context of finite element formulations for geometrically nonlinear beam problems, again, a variety of alternatives to the geometrically exact formulations considered in the last two paragraphs can be found. The maybe most prominent representatives of these alternatives are the corotational method [39, 40, 42, 53, 57] as well as Absolute Nodal Coordinate (ANC) [129, 128] and solid beam element [11, 55] formulations. The corotational technique was initially introduced by Wempner [152] as well as Belytschko et al. [17, 18] and shows strong similarities to the ”natural approach” of Argyris et al. [4]. The basic idea is to split the overall non-linear deformation into a contribution stemming from large rotations and a part stemming from local deformations expressed in a local, ”corotated” frame. Often, the local deformation can be modeled on the basis of first- (or second-) order theories such that the entire degree of nonlinearity is represented by the rotation of the local frame. The basic idea of ANC beam element formulations is to employ standard shape functions as known from solid finite element formulations in order to interpolate the 3D displacement field within the beam. Instead of introducing a kinematic constraint and deriving a resultant 1D model, different polynomial degrees are typically applied for the interpolation in beam length direction and in transverse directions. Numerical comparisons as performed e.g. by Romero [117, 118] and Bauchau et al. [15] advocate geometrically exact beams in general, and orthogonal triad interpolation schemes (see e.g. [43]) in particular, with regard to computational accuracy and efficiency. Especially the arguments I-III stated below in terms of possible benefits of shear-free as compared to shear-deformable beam element formulations in the range of high beam 4 slenderness ratios are pronounced even stronger when comparing geometrically exact Kirchhoff-Love beam element formulations with ANC beam element formulations, with the latter additionally exhibiting highly stiff in-plane deformation modes when dealing with very slender beams. On the other hand, a clear distinction between corotational and geometrically exact formulations will not always be possible. For example, the interpolation scheme of the geometrically exact formulation proposed by Crisfield and Jelenić [43, 80] is also based on the definition of an element-local, corotated reference triad and can consequently be interpreted as corotational formulation at the same time. All in all, it can be stated that geometrically exact finite element formulations have become well-established in the meantime and can arguably be regarded as state-of-the-art methods for the computational treatment of geometrically nonlinear beam problems. An overview of the different FEM discretiation techniques is given in Figure 1. Figure 1: Overview of different discretization techniques for nonlinear problems of slender continua based on the finite element method. In the context of the geometrically nonlinear Kirchhoff-Love beam theory, several discrete realizations based on finite difference schemes have recently been proposed [62, 19, 20, 95, 1]. In contrast to the Simo-Reissner theory, also several works based on an analytic treatment of Kirchhoff-Love beam problems exist in the modern literature [130, 94]. Interestingly, most approaches of these two categories can be found in the field of bio- or molecular physics. Although, the theoretical basis of shear-free Kirchhoff-Love beam formulations has a much longer tradition than the Simo-Reissner theory of shear-deformable beams, there are only a few geometrically nonlinear shear-free finite element representations, which have not reached the excellent properties of geometrically exact Simo-Reissner formulations so far. In his recent works [5] and [6], Armero and Valverde gave a historic overview of existing Kirchhoff finite elements and pointed out their drawbacks. Accordingly, the first Kirchhoff type element formulations have applied different interpolations (C 0 -continuous Lagrange polynomials for the axial displacements and C 1 -continuous Hermite polynomials for the transversal displacements) to the different displacement-components, which led to a loss of objectivity [5]. In later works, the objectivity could be preserved by employing e.g. trigonometric shape functions, but the corresponding formulations were limited to the investigation of plane circular arches (see e.g. [8] or [9]). A different approach was the development of framework or corotational shear-free beams [41, 66, 67, 68, 96], a category of formulations, which naturally preserves the objectivity of the continuous problem. As pointed out in [5], these types of Kirchhoff type formulations often exhibit a comparatively poor accuracy; a fact, which can directly be traced back to the lack of an exact representation of the kinematic quantities. A further critical issue relevant in the context of thin Kirchhoff beams is membrane locking, a locking phenomenon given distinction to by Stolarski and Belytschko [141]. In general, membrane locking denotes the inability of curved structural elements, e.g. beams or shells, to represent the inextensibility constraint of vanishing membrane / axial strains. For thin Kirchhoff beams, [54] was one of the first contributions in which this effect was investigated by relating the beam slenderness ratio to the condition number of the stiffness matrix, but without explicitly using the term locking. Diverse methods have been proposed in the literature in order to avoid membrane locking of Kirchhoff rods. Amongst others, these are the approaches of reduced / selective 5 integration (see e.g. [109, 111, 112]), assumed strains based on the Hu-Washizu functional (see e.g. [36, 85, 97]), assumed stresses based on the Hellinger-Reissner functional (see e.g. [33, 109]) or penalty relaxation / stabilization techniques in combination with membrane correction factors (see e.g. [102, 143]). Most of these works are limited to 2D beam problems. A historic overview concerning the development of Kirchhoff beam elements in general and the key issues of objectivity and membrane locking in particular is given in the recent works of Armero and Valverde [5, 6]. The shear-free beam elements presented by now are typically based on additional kinematic assumptions, thus not being consistent with the concept of geometrically exact beams. Besides these contributions considered so far, also finite element and finite difference discretization approaches for Kirchhoff beams can be found in the literature which are in fact geometrically exact, but which rely on global interpolation strategies [153, 20, 52]. These are typically based on a rotation or curvature interpolation strategy and a subsequent integration of the rotation field along the entire beam length in order to yield an explicit beam centerline representation. Unfortunately, these global approaches typically rely on a serial finite element evaluation and yield dense system matrices and not the very desirable sparse system matrices with small bandwidths as typical for standard FEM approaches. Consequently, these approaches are not suitable for high-performance computing and will not further be considered in the following. The number of existing geometrically exact (locally supported) finite element formulations on the basis of the Kirchhoff-Love theory is very limited. For example, the recent contribution of Sansour [123] proposes an energy-momentum method for 2D, initially straight geometrically exact elements based on the nonlinear Euler-Bernoulli theory. On the other hand, Armero and Valverde developed plane and three-dimensional locking-free Kirchhoff-Love beam element formulations accounting for arbitrarily curved initial geometries as well as anisotropic cross-section shapes that guarantee the fundamental properties of objectivity and geometrical exactness [5, 6]. However, these beam elements only cover the geometrically linear case of infinitesimal deformations, but not the general large-deformation case. Only a few geometrically exact, 3D, large-deformation, shear-free beam elements can be found in the literature. Arguably the first formulations of this kind have been proposed by Boyer [28] and Weiss [150, 151]. In his recent work [27], Boyer extended the original formulation [28] for the modeling of undersea cables. Also the essential requirement of objectivity and path-independence ar fulfilled by the approaches of Boyer and Weiss. However, these geometrically nonlinear Euler-Bernoulli formulations only treat the special case of beams with circular cross-sections and a straight initial configuration, i.e. the case of beams with rotationally symmetric reference geometry in the following denoted as isotropic case (see first column of Table 2). This limitation simplifies the theory considerably, and already the modeling of simple piecewise straight frames is difficult since no variables are available that determine the cross-section orientation required for kinematic constraints at beam-to-beam joints. The more recent contributions of Zhang and Zhao [154, 155] allow for anisotropic cross-sections but still focus on initially straight beams (denoted as straight case in the second column of Table 2). However, later it will become clear that the first-order twist angle interpolation underlying these formulations might in general not allow for optimal spatial convergence rates considering the employed third-order centerline interpolation. In the very recent works of Greco et al. [63, 64], first steps towards geometrically nonlinear isogeometric Kirchhoff-Love beam elements accounting for initial curvature and anisotropic cross-sections have been made. However, the formulation has only been applied to geometrically linear examples. Bauer et al. [16] adapted the ideas of Greco and facilitated an application to geometrically nonlinear examples. These formulations are denoted as anisotropic case in Table 2. Unfortunately, important properties such as objectivity and path-independence have not been considered in the works of Greco and Bauer. Also the question of membrane locking has not yet been consistently treated within the geometrically nonlinear realm by the textitisotropic, straight and anisotropic Kirchhoff-Love formulations considered in this paragraph. Nevertheless, they can be considered as the most elaborate geometrically exact Kirchhoff-Love beam element formulations from the literature, since being the only ones accounting for the numerical treatment of general 3D, large-deformation problems. Consequently, these formulations will be in the focus of detailed evaluations and comparisons performed throughout this work. All in all, it can be concluded that none of the existing geometrically exact shear-free beam elements of Kirchhoff-Love type is comparable to the existing shear-deformable formulations of Simo-Reissner type in terms of generality and fulfillment of essential properties so far. Also detailed comparisons of shear-free and shear-deformable geometrically exact beam elements in the range of high slenderness ratios are still missing. This backlog is the motivation for the development of novel geometrically exact Kirchhoff-Love beam elements fulfilling the following essential requirements: 6 1) Geometrical exactness: As already mentioned above, the proposed beam element formulations have to be geometrically exact in the sense that the derived deformation measures are consistent with the virtual work principle and the equilibrium equations at any deformed state independent of the magnitude of displacements, rotations and strains. 2) Representability of general geometries and external loads: The most general case of 3D, large-deformation problems of thin beams with a) anisotropic cross-section shapes as well as b) arbitrary initial geometries and curvatures have to be represented. c) The proposed rotation interpolation schemes have to be capable of representing such general scenarios without exhibiting any singularities for practically relevant configurations. 3) Fulfillment of essential mechanical principles: The essential mechanical principles of objectivity, i.e. observer or frame invariance, as well as path-independence have to be preserved by the employed discretization schemes. 4) Fulfillment of general requirements on spatial finite element discretization: For all finite element formulations presented in this work, accuracy will be verified in terms of convergence towards proper reference solutions. Furthermore, the following criteria have to be fulfilled: a) Optimal spatial convergence rates measured in appropriate error norms have to be achieved. b) Furthermore, effective methods for the avoidance of membrane locking are required such that no remaining locking-related deterioration of the spatial convergence behavior will be observed for the resulting finite elements, even in the range of very high slenderness ratios. c) Further properties such as conservation of linear momentum, conservation of angular momentum and conservation of energy for arbitrarily rough spatial discretizations are very desirable for the proposed spatial interpolation schemes. d) It can also be beneficial for beam element formulations to fulfill simple patch tests, e.g. to exactly represent the states of constant axial tension, torsion and bending. e) It may be preferable that the finite element solution is independent from the chosen node numbering. 5) Fulfillment of general requirements on temporal discretization: The main focus of this work lies on the development and evaluation of spatial finite element discretizations for geometrically nonlinear beam problems. Nevertheless, it is at least required that a) dynamics can be represented in general, and that b) energy-stable time integration can be achieved. c) Often, energy-momentum conserving time integration schemes may be favorable. 6) Simple realization of essential boundary conditions and joints: Choices of nodal primary variables, especially with respect to the rotation parametrization, are demanded that enable the formulation of practically relevant Dirichlet boundary conditions but also of node-wise joints between several beams without the need of additional constraint equations. This is not standard for most of the existing geometrically exact shear-free beam element formulations. 7) Avoidance of Lagrange multipliers and saddle point systems: Also existing geometrically exact beam elements of Simo-Reissner type can be subjected to the Kirchhoff constraint via additional Lagrange multiplier fields. Such a procedure typically results in saddle point systems and the need of a special class of linear solvers or requires global condensation strategies. The shear-free beam elements considered here should neither rely on Lagrange multipliers nor should they yield in saddle point systems. All required calculations have to be feasible in an element-local manner. 8) Suitability for high-performance computing: In the literature, several finite difference and finite element discretizations of Kirchhoff-Love beams have been proposed that rely on global strategies for rotation field construction. Even though, these schemes show otherwise desirable properties, they typically suffer from two elementary drawbacks: Mostly, these schemes result in dense discrete system matrices and depend on a successive, i.e. serial, evaluation of the individual finite elements within a discretization. These two properties make such formulations virtually impossible for high-performance computing. From the finite elements considered here, it is required to result in sparse system matrices with small bandwidths and to be suitable for parallel computing element evaluation routines. In the authors’ recent contribution [104], the first 3D large-deformation geometrically exact Kirchhoff-Love beam element formulation that fulfills the essential properties of objectivity and path-independence and that is capable of representing arbitrary initial curvatures and anisotropic cross-section shapes has been proposed. In the subsequent work [105], also the important question of membrane locking has successfully been addressed. The current con7 Type Source Formulation 1) Geometrically Exact 2a) Initial Curvature 2b) Anisotropic Cross-Sections 2c) Singularity-Free 3) Objective & Path-Independent 4a) Optimal Convergence Order 4b) Locking Avoided 4c) Conservation Properties (FE) 4d) Patch Test Passed 4e) Symmetric Discretization 5a) Suitable for Dynamics 5b) Energy-Stable (FD) 5c) Conservation Properties (FD) 6) Realization of DBCs & Joints 7) Lagrange Multipliers Avoided 8) High-Performance Computing Kirchhoff-Love Isotropic + + + + o + + o o + + Literature Authors Straight Anisotropic [104, 105] Current + + + + + + + + + + + + + + + + + + + + ? o + + + + o + + + ? ? ? + ? ? + + + + + + + + + + Simo-R. Literature [43, 80] + + + + + + + + o + + + + + Table 2: Fulfillment of essential requirements on geometrically exact beam elements: Comparison of existing and proposed formulations. tribution extends these methodologies by providing considerable improvements in terms of accuracy and practical applicability, a generalization to dynamic problems as well as theoretical and numerical comparisons to existing formulations. In Table 2, the fulfillment of the essential requirements stated above is verified for the existing categories of 3D, large-deformation geometrically exact Kirchhoff-Love beam elements identified so far, i.e. for the isotropic, straight and anisotropic formulations from the literature, the author’s recent contributions [104, 105] as well as the formulations proposed in the current work. Of course, not all of the stated requirements have explicitly been investigated in the mentioned references. However, the evaluation results presented in Table 2 have been derived on the best of the authors’ knowledge. Explanations and Derivations required for the evaluation of the individual categories can be found in Sections 5-10 in form of paragraphs beinning with the expression ”Review: ...”. In general, the symbols ”+”, ”o” and ”-” in Table 2 mean that a requirement is fully, partly or not fulfilled. The question mark ”?” indicates that the required information could not definitely be extracted from the literature. According to Table 2, the formulations newly proposed in the current work can indeed close most of the gaps left by existing geometrically exact Kirchhoff-Love formulations. However, several existing Simo-Reissner beam element formulations already fulfill most of the stated requirements, a fact that might indicate the increased complexity of consistently incorporating the additional constraint of vanishing shear strains in Kirchhoff-Love formulations. In order to underline this statement, also the well-known Simo-Reissner type formulation proposed by Crisfield and Jelenić [43, 80], the first one of this type preserving objectivity and path-independence, is represented as one possible example in Table 2 (right column). Given the excellent properties of existing geometrically exact shear-deformable finite element formulations, the question arises which benefits can be gained from applying Kirchhoff-Love instead of Simo-Reissner beam element formulations. It is quite obvious, that the range of low beam slenderness ratios, where shear-deformation is not negligible, requires the application of beam element formulations taking this fact into account. Also the underlying continuum theory, based on an unconstrained 1D Cosserat continuum with pointwise six degrees of freedom, and the resulting discrete problem statement seem to be easier to be formulated for the Simo-Reissner case. However, in the range of high beam slenderness ratios, thus, exactly in scenarios prevalent in many of the practically relevant applications mentioned in the beginning of this contribution, shear-free beam element formulations of Kirchhoff-Love type may exhibit considerable advantages. In the following, some of these potential benefits shall be outlined: I) Lower discretization error level: The most essential difference between the proposed Kirchhoff-Love and exist8 ing Simo-Reissner beam element formulations lies in the neglect of shear deformation in the beam theory underlying the former category. This property is independent from the chosen discretization strategy. Consequently, if otherwise comparable interpolation strategies are applied, it can be assumed that the Kirchhoff type formulations require less degrees of freedom in order to yield the same polynomial approximation quality, and eventually the same discretization error level, since no additional primary variables are required in order to represent shear deformation. II) Numerical benefits in the range of high slenderness ratios: In the range of very high slenderness ratios, the influence of the shear modes on the overall beam deformation is not only negligible, it can also be very beneficial to abstain from these high stiffness contributions from a numerical point of view: Mechanical problems of slender beams typically lead to stiff differential equations and ill-conditioned numerical problems deteriorating the performance of time integration schemes, nonlinear solvers and linear solvers. The avoidance of the stiff shear mode contributions can considerably improve the situation. Concretely, detailed numerical investigations on several numerical test cases involving highly slender beams will be considered. These test cases will reveal a considerably improved performance of nonlinear solution schemes when Kirchhoff type instead of Reissner type discretizations are employed. Similar trends will be predicted - at least theoretically - for the behavior of linear solvers and time integration schemes. III) Smooth geometry representation: The proposed Kirchhoff-Love beam elements will be based on C 1 -continuous centerline interpolations. These interpolations will eventually result in smooth beam-to-beam contact kinematics, a property that is highly desirable in order to yield efficient and robust contact algorithms (see e.g. [106, 107]). IV) Derivation of reduced models: In [105], a special reduced model, denoted as torsion-free beam theory, has been derived from the general Kirchhoff-Love theory. This reduced model has been shown to only be valid for special problem classes concerning beam geometry and external loads, which are, however, present in many fields of application. The finite elements resulting from such a reduced model typically feature a simplified numerical implementation and an increased computational efficiency. Although this torsion-free theory does not lie in the focus of this work, it has to be emphasized1 that the proposed Kirchhoff-Love formulations lie the foundation for such reduced models. These possible benefits will be further detailed in Section 8 and verified numerically in Section 11. After having motivated the intention of the current work, its main scientific contributions shall briefly be highlighted: • Two novel rotation interpolation strategies for geometrically exact Kirchhoff-Love beam element formulations are proposed: i) The first represents an orthonormal interpolation scheme that fulfills the Kirchhoff constraint in a strong manner. It can be regarded as generalization of the scheme proposed in [104] that allows for an exact conservation of energy and momentum and for alternative sets of nodal degrees of freedom that simplify the prescription of essential boundary conditions. ii) The space-continuous theory of the second variant is based on a weak enforcement of the Kirchhoff constraint. The discrete realization of the Kirchhoff constraint relies on a properly chosen collocation strategy. In combination with the employed smooth centerline interpolation, also this strategy can completely avoid any additional Lagrange multipliers. For each of these two element formulations, two different sets of nodal rotation parametrizations are proposed. One is based on nodal rotation vectors and one on nodal tangent vectors. While these different choices are shown to yield identical FEM solutions, they differ in the resulting performance of nonlinear solvers and the effort required to prescribe essential boundary conditions and joints. The four finite element formulations resulting from a combination of the two interpolation schemes and the two choices of nodal primary variables are subject to detailed comparisons with respect to resulting discretization error levels and the performance of nonlinear solution schemes. • The resulting finite element formulations are combined with a finite difference time integration scheme for large rotations recently proposed in the literature by Brüls and Cardona [31]. This implicit scheme allows for energy-stable, second-order accurate time integration on the basis of optimized numerical dissipation and can be identified as a Lie-group extension of the well-known generalized-α scheme. Up to the best of the author’s knowledge, the current work represents the first application of a Lie group time integration scheme based on optimized numerical dissipation to geometrically exact Kirchhoff-Love beam elements, and one of the first applications of such a scheme to geometrically nonlinear beam element formulations at all. 9 • Furthermore, the current work intends to review and evaluate existing geometrically exact beam element formulations and to compare these with the formulations newly proposed in this work. Concretely, the fulfillment of the essential requirements according to Table 2 will be studied analytically for the three identified categories of isotropic, straight and anisotropic formulations, which can be identified as the most general and elaborated 3D, large-deformation geometrically exact Kirchhoff-Love formulations previously proposed in the literature, for one exemplary representative of Simo-Reissner formulations from the literature as well as for the KirchhoffLove formulations presented in the current and former works of the authors. A further original contribution of this work is given by the detailed and systematic numerical comparison performed between the proposed geometrically exact Kirchhoff-Love and two representative Simo-Reissner beam element formulations from the literature. Specifically, resulting spatial convergence rates, discretization error levels as well as the performance of nonlinear solution schemes are compared for different beam slenderness ratios. Eventually, the organization of the remainder of this contribution shall briefly be given. One distinctive property of geometrically exact beam formulations is the presence of large rotations within the associated configuration space. In order to provide the theoretical basis for subsequent derivations, in the following Section 2, the SO(3) group of large rotations as well as possible parametrizations will be introduced. In Section 3, the most general type of geometrically exact beam formulations considered in this work, the Simo-Reissner theory of thick (shear-deformable) beams, will be presented. Subsequently, in Section 4, the general theory will be restricted to the Kirchhoff-Love theory of thin (shearfree) beams. There, the different methodologies of imposing the Kirchhoff constraint of vanishing shear strains in a strong or weak sense will be investigated. Afterwards, the space-time-continuous beam problem will be discretized. In Section 5, a recently proposed extension of the generalized-α method from vector spaces to Lie groups [7, 31, 32], will be applied to the beam formulations proposed in this work. Afterwards, in Section 6, spatial discretization is performed, which represents the core topic in the development of geometrically exact Kirchhoff beam elements considered in this work. In Sections 6.1 and 6.2, specific finite element interpolations employed to the translational and rotational primary variable fields considered in this work will be proposed. In Section 6.3, the already stated essential requirements on the employed spatial discretizations and the resulting finite element formulations will be further detailed. Also detailed explanations and derivations for the evaluation results of Table 2 will be presented in Sections 5 and 6. In the subsequent Sections 7-10, different finite element realizations resulting from the proposed interpolation schemes and rotation parametrizations will be presented and the fulfillment of the basic requirements stated above will be confirmed analytically. Concretely, Section 7 presents the basics of the geometrically exact SimoReissner type formulation proposed in [43, 80], which will serve as reference for several numerical comparisions performed in Section 11. In the subsequent Section 8, the benefits of applying Kirchhoff-Love instead of SimoReissner element formulations in the range of high slenderness ratios will be further quantified. Afterwards, the two major developments of this work, a Kirchhoff-Love element formulation based on strong constraint enforcement as well as a Kirchhoff-Love element formulation based on weak constraint enforcement, will be proposed in Sections 9 and 10. For each formulation, two different variants of nodal rotation parametrization, one based on nodal rotation vectors and one based nodal tangent vectors will be derived. Eventually, in Section 11, all the proposed concepts and the resulting finite element formulations will be verified by means of proper numerical test cases. The reader who is primarily interested in the practical implementation of the newly proposed geometrically exact Kirchhoff-Love beam element formulations is referred to Sections 5, 9, 10 as well as to the appendices of this work. 2. The Rotation Group SO(3) The category of beam theories considered in this contribution assumes the beam cross-sections to be rigid. Consequently, the cross-section kinematics are point-wise uniquely defined by six degrees of freedom, three translational ones representing the position vector of the cross-section centroid and three rotational ones describing the crosssection orientation. Thereto, an orthonormal triad consisting of the base vectors g1 , g2 , g3 ∈ <3 is attached on the beam cross-sections. Furthermore, a right-handed inertial Cartesian frame E1 , E2 , E3 ∈ <3 associated with the material configuration and a corresponding right-handed inertial Cartesian frame e1 , e2 , e3 ∈ <3 of the spatial configuration are introduced. Nevertheless, for simplicity, it is assumed that both frames coincide, thus ei = Ei for i = 1, 2, 3. Now, 10 the rotation from the global frame Ei onto the local frame gi is described via the orthogonal transformation Λ ∈ SO(3): gi = ΛEi with Λ = g j ⊗ E j = (g1 , g2 , g3 )E j for i, j = 1, 2, 3. (1) Here and in the following, the summation convention over repeated indices holds. Throughout this work, the index near a matrix (for example the index (.)Ei in equation (1)) denotes the basis in which the associated tensor is represented. In the context of geometrically exact beam theories, the two-point tensor Λ acts as push-forward operator (see e.g. [103]) between material and spatial objects. From a rather mathematical point of view, the rotation tensor Λ can be identified as an element of the Special Orthogonal group SO(3) of orthogonal transformations according to SO(3) := {Λ ∈ <3×3 |ΛTΛ = I3 , det(Λ) = 1}, (2) under the action of non-commutative multiplication SO(3)×SO(3) → SO(3), Λ3 = Λ1 Λ2 , Λ2 Λ1 with inverse element Λ−1 =ΛT and identity element I3 . Here, det(.), (.)T and (.)−1 are the determinant, transpose and inverse. I3 is a 3×3 identity matrix. The nonlinear manifold SO(3) can be classified as Lie group with tangent space δΛ ∈ T Λ SO(3) := {S(a)Λ|S(a) ∈ so(3)}. (3) Here, so(3) denotes the set of skew symmetric tensors with S(a)b = a× b for a, b ∈ <3 . The isomorphism between so(3) and <3 enables a unique expression of S(a) ∈ so(3) by the vector a ∈ <3 denoted as axial vector. By inserting the special choice Λ = I3 into (3) it can easily be verified that so(3) represents the tangent space to SO(3) at the identity: so(3) := T I SO(3) = {S(a)|S(a) = −S(a)T ∀ a ∈ <3 }. (4) The Lie group SO(3) and its Lie algebra so(3) are related by the exponential map exp (.): so(3) → SO(3) according to: exp(S(a)) := I3 +S(a)+ S(a)2 S(a)3 + +... . 2! 3! (5) Up to now, the rotation group SO(3) has been introduced without stating any specific parametrization of the rotation tensor Λ. In the following sections, two possible parametrizations, which will be useful in the development of beam element formulations according to the Simo-Reissner and Kirchhoff-Love theory, will be presented. 2.1. SO(3) parametrization via rotation vectors There exist various parametrizations of the rotation tensor such as rotation (pseudo-) vectors, Euler angles or Rodrigues parameters that are based on a minimal set of three parameters. Also four-parametric representations of the rotation tensor such as quaternions have proven to be very useful for practical purposes. Within this work, two different parameterizations will be employed: The one presented in this section is based on rotation vectors ψ ∈ <3 . In Section 2.2, an alternative parametrization especially suited for Kirchhoff formulations is presented. The rotation vector parametrization can explicitly be given via the well-known Rodrigues formula: h i Λ(ψ) = exp(S(ψ)) = I + sin ψS(eψ ) + (1 − cos ψ)S(eψ )S(eψ ) . (6) Here, ψ = ||ψ|| represents the scalar rotation angle and eψ = ψ/||ψ|| the axis of rotation. Throughout this work, ||(.)|| denotes the Euclidean norm in <3 . As indicated by the notation exp(S(ψ)), equation (6) represents a closed-form representation of the exponential map initially introduced in (5) of the last section. The rotation vector of a given rotation tensor can for example be extracted by employing Spurrier’s algorithm [140]. The infinitesimal spatial quantity δθ, denoted as multiplicative rotation vector variation or spin vector, allows to express the variation of Λ: δΛ := d d =0 exp (S(δθ))Λ = S(δθ)Λ or δgi = δθ×gi . (7) Alternatively, the variation δΛ can be expressed by the material spin vector δΘ = ΛT δθ via right translation: δΛ := d d =0 Λ exp (δΘ) = ΛS(δΘ). 11 (8) Expressing the spin vectors δΘ and δθ in the associated frames Ei and gi , respectively, yields: δΘ = δΘi Ei , δθ = δΘi gi . (9) Thus, the components of the spatial spin vector expressed in the local basis gi are identical to the components of the material spin vector expressed in the global basis Ei . This relation also holds for all the other pairs of spatial / material quantities considered in this work (see e.g. [132]). Based on the defining equation (8) and the representation of skew-symmetric tensors by means of the Levi-Civita-Symbol i jk , the components of S(δΘ) can be determined: S(δΘ) = ΛTδΛ = (Ei ⊗gi )·(δg j ⊗E j ) = gTiδg j Ei ⊗E j with S i j (δΘ) = −i jk δΘk . |{z} (10) =:S i j (δΘ) For later use, the components δΘi shall be expressed by gi and δgi . From the previous equation (10), it follows: δΘ1 = gT3δg2 = −gT2δg3 , δΘ2 = gT1δg3 = −gT3δg1 , δΘ3 = gT2δg1 = −gT1δg2 . (11) A relation between infinitesimal additive and multiplicative increments is given by the tangent operator T defined as ! 1 1 ψ/2 1 I − 2 S(ψ)S(ψ)T − S(ψ). (12) δψ =: Tδθ, T = 2 S(ψ)S(ψ)T + tan (ψ/2) 2 ψ ψ The inversion of the previous equation (12), expressing multiplicative by means of additive increments, is given by: ! 1 sin (ψ) sin (ψ) 1−cos (ψ) δθ = T−1 δψ, T−1 = 2 1− S(ψ)S(ψ)T + I+ S(ψ). (13) ψ ψ ψ ψ2 For details on the derivation of the transformations T and T−1 , the interested reader is e.g. referred to [135, 34, 74, 40]. While the rotation vector parametrization presented so far represents a well-known tool in the formulation of geometrically exact beam elements of Simo-Reissner type, in the following section, an alternative parametrization of large rotations will be proposed which offers some advantages in the description of Kirchhoff type beam elements. 2.2. SO(3) parametrization via ”smallest rotation” triads The alternative parametrization considered in this section consists of four degrees of freedom (t, ϕ) with t ∈ <3 and ϕ ∈ <. In the context of Kirchhoff beam elements presented later in this work, t will be the non-unit tangent vector aligned to the space curve representing the beam centerline. Due to the Kirchhoff constraint of vanishing shear strains, the first base vector g1 of the cross-section triad Λ = (g1 , g2 , g3 )Ei , can be expressed by this tangent vector: g1 = t . ||t|| (14) Based on the tangent vector t and an arbitrary given triad ḡi , one can determine a triad g Mi , in the following denoted as interMediate or Medium triad (index M), that results when the triad ḡi is rotated onto the tangent vector t via the “Smallest Rotation” (SR) (see e.g. [40, 104]. The resulting base vectors can be represented by the expressions g M1 = g1 = ḡT g1 ḡT g1 t , g M2 = ḡ2 − 2 T (g1 + ḡ1 ) , g M3 = ḡ3 − 3 T (g1 + ḡ1 ) ||t|| 1+ ḡ1 g1 1+ ḡ1 g1 → Λ M =: sr(Λ̄, g1 ). (15) In order to shorten notation, the abbreviation sr(.) has been introduced for the SR mapping of (15). Practical choices for the triad Λ̄ will be presented in Section 6.2 (see also [105] for a discussion of possible singularities of the SR mapping). Subsequently to the definition of an intermediate triad Λ M according to (15), the cross-section triad gi can be defined based on a relative rotation of the intermediate triad Λ M with respect to the tangent t by an angle of ϕ: Λ = exp(S(ϕg1 ))Λ M ⇔ g1 = g M1 , g2 =g M2 cos ϕ + g M3 sin ϕ, g3 = g M3 cos ϕ − g M2 sin ϕ. (16) Equations (15) and (16) uniquely define a triad Λ parametrized by the four degrees of freedom (t, ϕ). Evidently, one of these four degrees of freedom, namely the norm ||t|| of the tangent vector, will not influence the triad orientation. 12 However, as it will turn out in the next sections, the non-unit tangent vector t is a quantity that directly results from the beam centerline description. Thus, the only additional degree of freedom introduced in order to describe the triad orientation is the relative angle ϕ and consequently, the proposed type of triad parametrization is not redundant. For later use, the spatial spin vector δθ shall be expressed by means of additive increments (δt, δϕ) of the four parameters (t, ϕ). Therefore, it is split into a component δθk parallel to g1 and a component δθ⊥ perpendicular to g1 as follows: δθ = δθk + δθ⊥ = δΘ1 g1 + δθ⊥ . (17) Throughout this work, the indices (.)k and (.)⊥ of a vector will denote the components of the vector which are parallel or perpendicular to the vector g1 , respectively. Taking advantage of (7), δθ⊥ can be easily derived (see also [105]): ! t t × δt g1 × δt t ×δ = = with δt ∈ <3 . (18) δθ⊥ = g1 × δg1 = ||t|| ||t|| ||t|| ||t||2 In a next step, (11) and (16) are exploited in order to formulate the tangential component δΘ1 of the spin vector: δΘ1 = gT3δg2 = gTM3 δg M2 + δϕ =: δΘ M1 + δϕ (19) By variation of the basis vector δg M2 defined in (15), the tangential component δΘ M1 can be determined to: δΘ M1 = ḡT1 S(g1 ) δt (g1 × ḡ1 )T δg = − =: TΘM1t δt 1 1+gT1 ḡ1 1+gT1 ḡ1 ||t|| → δΘ1 = TΘM1t δt+δϕ. (20) Inserting equations (18)-(20) into the split relation (17) yields the following expression for the spatial spin vector:   g1 ⊗ ḡT1  1  t δθ = g1 δϕ + I − (21)  S(g1 ) δt with g1 = , t := ||t||. T t t 1 + g1 ḡ1 | {z } =:Tθt So far, the four degrees of freedom (t, ϕ) have been applied in order to uniquely describe a tangent vector t, defined by its orientation and its length, as well as the orientation of a triad Λ = (g1 , g2 , g3 ) aligned parallel to this tangent vector. Next, the non-unit tangent vector t and the triad Λ shall be described by the alternative set of four degrees of freedom (ψ, t). Here, ψ represents the rotation vector associated with the triad Λ via the Rodrigues formula (6) and t := ||t|| is the norm of the tangent vector. The following transformations hold between the two sets (t, ϕ) and (ψ, t): Λ = exp(S(ψ)), g1 = ΛE1 , t = tg1 , exp(S(ϕg1 )) = Λsr(Λ̄, g1 )−1 . (22) Based on (22), the set (t, ϕ) can be calculated from (ψ, t) and the other way round. Next, also a transformation rule between the variations (δt, δϕ) and the variations (δθ, δt) associated with the set (ψ, t) shall be derived: δt = δ||t|| = tT δt = gT1 δt. t Combining equations (21) and (23) yields a transformation rule between the two sets (δθ, δt) and (δt, δϕ): ! ! ! ! ! ! (g1 + ḡ1 )T δθ Tθt g1 δt δt −tS(g1 ) g1 δθ ⇔ = with Tϕθ = . = T δt g 0 δϕ δϕ Tϕθ 0 δt 1 + gT1 ḡ1 | 1{z } | {z } (23) (24) =:T M =:T−1 M The inverse transformation in (24) has been derived in a similar manner. The mappings T M and T−1 M transform between multiplicative rotation increments and additive increments of the chosen parametrization. Thus, they represent the analogon to the transformations T and T−1 in case of a rotation vector parametrization (see Section 2.1). Since the Kirchhoff constraint of vanishing shear deformation solely influences the component δθ⊥ of the spin vector, it will in 13 the following sections often be useful to express only this component by additive increments δt, while the tangential spin vector component δΘ1 instead of the additive increment δϕ is regarded as independent primary variable: ! ! ! ! ! ! 1 δθ δt δt −tS(g1 ) g1 δθ S(g ) g1 = t T1 , = , (25) δt δΘ1 δΘ1 gT1 0 δt g1 0 | {z } | {z } =:T̃ =:T̃−1 The transformation (25) basically represents a reformulation of (17) and (18). Again, T̃ and T̃−1 represent the corresponding mappings. Since these mappings solely transform the component δθ⊥ , they are independent from the actual definition of the triad Λ M . Consequently, the index M has been omitted for the transformation matrices T̃ and T̃−1 . 3. Simo-Reissner Beam Theory In this section, the fundamentals of the geometrically exact Simo-Reissner beam theory based on the work of Reissner [114, 115] as well as Simo and Vu-Quoc [132, 134] will be briefly summarized. The results of this section will provide an essential basis for the subsequent derivation of Kirchhoff type beam formulations. Figure 2: Kinematic quantities defining the initial and deformed configuration of the geometrically exact beam. 3.1. Basic kinematic assumptions Throughout this work, prismatic beams with anisotropic cross-section shape are considered. In the initial (unstressed) configuration, the beam centerline, which is defined as the line connecting the cross-section centroids, is described by the space curve s → r0 (s) ∈ <3 . Here and in the following, the index 0 of a quantity refers to the unstressed, initial configuration. Furthermore, s ∈ [0, l] =: Ωl ⊂ < is an arc-length parametrization of the curve and l ∈ < the beam length in the initial configuration. The description of the initial configuration is completed by a field of right-handed orthonormal triads s → g01 (s), g02 (s), g03 (s) ∈ <3 , also denoted as material triads in the following. These are attached to the beam cross-sections, which are assumed to be undeformable according to the Bernoulli hypothesis. In this context, g01 (s) = r00 (s) represents the unit tangential vector to the initial centerline and the base vectors g02 (s) and d g03 (s) coincide with the principal axes of inertia of the cross-section at s. Throughout this work, the prime (.)0 = ds (.) denotes the derivative with respect to the arc-length parameter s. The rotation from the global frame Ei onto the initial local frame g0i (s) is described via the orthogonal transformation s → Λ0 (s) ∈ SO(3) as introduced in (1) leading to the following definition s → C0 := (r0 (s), Λ0 (ψ0 (s))) ∈ <3 × SO(3) of the initial configuration. Correspondingly, the deformed configuration of the beam at time t ∈ < is given by s, t → C := (r(s, t), Λ(ψ(s, t))) ∈ <3 × SO(3), where the orthogonal transformation Λ(ψ(s, t)) maps from the global frame Ei onto the current local frame gi (s) and the base vector g1 (s, t) := g2 (s, t) × g3 (s, t) is in general not tangential to the deformed centerline anymore due to shear deformation. According to Section 2, Λ(s, t) can be represented by three rotation parameters (e.g. by a rotation vector ψ(s, t)), leading to pointwise six, three translational and three rotational, degrees of freedom. The basic kinematic assumption of the geometrically exact Simo-Reissner theory considered so far can easily be summarized by the following constrained position vector field associated with the initial and deformed configuration X(s) = r0 (s) + s2 g02 (s) + s3 g03 (s), x(s, t) = r(s, t) + s2 g2 (s, t) + s3 g3 (s, t), 14 s := (s, s2 , s3 )T =: (s1 , s2 , s3 )T , (26) where (s2 , s3 ) represent convective coordinates describing the position of an arbitrary material point within the (rigid) cross-section. In order to simplify the notation for subsequent derivations, the convective coordinate vector given by s = (s1 , s2 , s3 )T as well as the redundant name s1 := s for the arc-length s has been introduced. The kinematic quantities defining the initial and deformed configuration as introduced so far are illustrated in Figure 2. In order to simplify notation, the time argument t will be dropped in the following. Later in this section, the arc-length derivative of the base vectors gi (s) will be required. Similar to equation (7), this derivative can be formulated as Λ0 (s) = S(k(s))Λ(s) or Λ0 (s) = Λ(s)S(K(s)), (27) where k(s) and K(s) := ΛT (s)k(s) are referred to as spatial and material curvature vector, which can be derived as: S(k(s)) = Λ0 (s)ΛT (s), S(K(s)) = ΛT (s)Λ0 (s) K = Ki Ei , k = Ki gi . (28) In a similar manner, the spatial and material angular velocity vectors w and W are defined according to: S(w(s)) = Λ̇(s)ΛT (s), S(W(s)) = ΛT (s)Λ̇(s) W = Wi Ei , w = Wi gi . (29) For completeness, also the spin vectors, which have been introduced in Section 2, are repeated here: S(δθ(s)) = δΛ(s)ΛT (s), S(δΘ(s)) = ΛT (s)δΛ(s) δΘ = δΘi Ei , δθ = δΘi gi . (30) ˙ = d (.) denotes the derivative with respect to time t. By applying the Young theorem Throughout this work, the dot (.) dt 0 0 (Λ˙ ) = (Λ̇) and making use of S(a)S(b)−S(b)S(a) = S(S(a)b), the following compatibility relations can be shown: k̇ = w0 + w × k, δk = δθ0 + δθ × k, K̇ = W − W × K, δK = δΘ − δΘ × K, 0 0 δw = δθ̇ + δθ × w, δW = δΘ̇ − δΘ × W. (31) In the following sections, stress resultants mechanical equilibrium and proper constitutive relations will be presented. 3.2. Stress resultants, mechanical equilibrium and objective deformation measures With f̃ and m̃ denoting distributed external forces and moments per unit length and fρ and mρ representing the force and moment contributions due to inertia effects, the strong form of equilibrium reads (see e.g. [3, 115, 132]): f 0 + f̃ + fρ = 0, m0 + r0 × f + m̃ + mρ = 0. (32) In (32), f and m are the force and moment stress resultants acting on the beam cross-section area A. A material form of the 1D equilibrium equations can be derived by inserting the material stress resultants F:=ΛTf and M:=ΛTm into the balance equations (32). Following the principle of virtual work, the admissible variations, i.e. infinitesimal small and arbitrary (additive or multiplicative) changes of the current configuration s → δC := (δr(s), δθ(s)) ∈ <3 ×<3 that are compatible with the employed boundary conditions are introduced in a next step. Here, δr(s) ∈ <3 represents the vector of (additive) virtual displacements and δθ(s) ∈ <3 the vector of (multiplicative) virtual rotations, also denoted as spin vector. By multiplication of (32) with δr and δθ and integration by parts, the spatial weak form is derived: G= Zl  0  h i h i 0 0 T T T T T 0T =˙ 0. δθ m + (δr − δθ × r ) f −δθ ( m̃ + m ) − δr ( f̃ + f ) ds − δr f − δθ m ρ ρ σ σ | {z } | Γσ Γσ {z } δo ωT m δo (33) γT f Here, fσ and mσ denote external forces and moments at the Neumann boundary Γσ of the considered beam. Based on the principle of virtual work, the following objective spatial deformation measures can be identified: γ = r0 −g1 , S(ω) = Λ0 ΛT−ΛΛT0Λ00 ΛT = S(k)−S(ΛΛT0 k0 ) → ω = k−ΛΛT0 k0 . 15 (34) If the material counterpart of equation (32) is chosen as starting point (see e.g [43]), the material deformation measures Γ and Ω being work-conjugated to the material stress resultants F and M can be determined in an analogous manner: Γ = ΛTr0 −E1 , S(Ω) = ΛTΛ0 −ΛT0Λ00 = S(K)−S(K0 ) → Ω = K− K0 . (35) The “objective variation” δo of an arbitrary vector a ∈ <3 appearing in (33) is defined as δo a := δa−δθ ×a (see e.g. [132]). It is easy to verify that all of these deformation measures vanish for the stress-free initial configuration, i.e. when the relations Λ = Λ0 , r0 = r00 and g1 = g01 = r00 = Λ0 E1 are valid, and that the following variations can be derived: δo γ = δr0 − δθ × r0 ,  δΓ = ΛT δr0 + r0 × δθ , δo ω = δθ0 , δΩ = ΛT δθ0 . (36) The components of Γ represent axial tension and shear, the components of Ω represent torsion as well as bending. 3.3. Constitutive relations Finally, constitutive relations between the stress resultants M and F and the deformation measures Ω and Γ are required. The simplest constitutive law of this type is given by the length-specific hyperelastic stored energy function: 1 1 Π̃int (Ω, Γ) = ΩTC M Ω+ ΓT CF Γ, 2 2 M= ∂Π̃int = C M ·Ω, ∂Ω F= ∂Π̃int = CF ·Γ. ∂Γ Here, the material constitutive tensors C M and CF have the following diagonal structure:     C M = diag GIT , EI2 , EI3 Ei and CF = diag EA, G Ā2 , G Ā3 Ei . (37) (38) Here, E and G are the Young’s modulus and the shear modulus, A, Ā2 and Ā3 are the cross-section and the two reduced cross-sections, I2 and I3 are the two principal moments of inertia and IT is the torsional moment of inertia. In a similar manner to (37), the length-specific kinetic energy Π̃kin of the beam can be formulated: 1 1 Π̃kin (w, ṙ) = wTcρ w+ ρAṙTṙ, 2 2   Cρ = diag ρ(I2 +I3 ), ρI2 , ρI3 Ei . |{z} cρ = ΛCρ ΛT , (39) =:IP Here, ρ is the mass density, Cρ the material inertia tensor and w the spatial angular velocity vector, which has already been introduced in (29). From (39), the length-specific linear momentum l̃ and angular momentum h̃ can be derived: l̃ := ∂Π̃kin = ρAṙ, ∂ṙ h̃ := ∂Π̃kin = cρ w = ΛCρ ΛTw = ΛCρ W. ∂w (40) Similar to the length-specific external forces f̃ and m̃, also the length-specific energies Π̃int , Π̃kin and momenta l̃, h̃ have ˜ been furnished with the (.)-symbol. The total counterparts fext , mext , Πint , Πkin , l and h are obtained by integration: Zl h i fext := f̃ds+ fσ , Γσ Zl   h i mext := r × f̃ + m̃ ds+ r × fσ +mσ , Γσ 0 Zl Πint := Π̃int ds, 0 0 Zl Πkin := Π̃kin ds, 0 Zl l := l̃ds, 0 Zl h := (h̃+r× l̃)ds. (41) 0 These definitions will be required subsequently. Based on (40), the inertia forces fρ and moments mρ yield: h i −fρ = ˙l̃ = ρAr̈, −mρ = h̃˙ = Λ S(W)Cρ W+Cρ A = S(w)cρ w+cρ a, a := ẇ, A := Ẇ. (42) Similar to w = ΛW, also the angular accelerations are related via the push-forward operator: a := ẇ = d (ΛW) = ΛS(W)W + ΛẆ = ΛẆ =: ΛA, since S(W)W = 0. dt 16 (43) When the beam problem has to be discretized in time (see Section 5 for details), the vectors w and a can either be directly employed in a time integration scheme [135, 136, 80] or, alternatively, they can be expressed via the (additive) rate of the primary variable ψ [34]. Similar to (12), the following relations between w and a can be formulated: w = T−1 ψ̇, a = Ṫ−1 ψ̇ + T−1 ψ̈. (44) Finally, the problem setup presented in Sections 3.1-3.3 has to be completed by boundary and initial conditions in order to end up with a well-defined initial boundary value problem: r = ru , ψ = ψu on Γu , f = fσ , m = mσ on Γσ , Γσ ∩ Γu = ∅, Γσ ∪ Γu = {0, L} (45) r = r0 , ṙ = v0 , Λ = Λ0 , w = w0 at t = 0. Based on a trial space (r(s, t), Λ(ψ(s, t))) ∈ U of functions with square-integrable first derivatives satisfying (45) and an weighting space (δr(s), δθ(s)) ∈ V of functions with square-integrable first derivatives satisfying δr = 0, δθ = 0 on Γu , the weak form (33) is equivalent to the strong form (32) supplemented by the boundary conditions (45). The following two Sections 3.4 and 3.5 are intended to supplement the geometrically exact beam theory sdsd so far. However, the provided information is not necessarily required for the derivation of the space-continuous problem statement of the Simo-Reissner and Kirchhoff-Love beam theory and the subsequent discretization procedures. Thus, the reader may alternatively skip these content and proceed with Section 4. Concretely, in Section 3.4, the alternative procedure of deriving the weak and strong form of the balance equations presented in Section 3.2 on the basis of a variational problem statement and properly defined Lagrangian is undertaken. Section 3.5 is meant to confirm the constitutive relations presented above based on a derivation from 3D continuum mechanics. There, the consistency of the 1D and 3D continuum model in the sense of a fully induced beam theory will be verified for the case of locally small strains. Remark: Two possible time integration schemes can be derived from the variants of either employing W and A directly or expressing them via additive rates given by (44): 1) (ṙ, r̈, w, a)n+1 = f((r, Λ)n+1 , (r, Λ)n , (ṙ, w)n , (r̈, a)n ), 2) (ṙ, r̈, ψ̇, ψ̈)n+1 = f((r, ψ)n+1 , (r, ψ)n , (ṙ, ψ̇)n , (r̈, ψ̈)n ). (46) Here, the indices (.)n and (.)n+1 refer to two successive time steps of the time-discrete problem and f(.) represents a typical finite difference time integration scheme (e.g. a Newmark scheme). The first variant (see Section 5) can be considered as being more flexible since it does not require any specific rotation parametrization. It can directly be applied to Reissner type beam formulations as well as to Kirchhoff type beam formulations with strong or weak Kirchhoff constraint enforcement without the need for further adaptions. Due to this flexibility and the very simple and compact time integrator resulting from this procedure, this will be the method of choice employed throughout this work. 3.4. Interlude: Variational problem formulation of Simo-Reissner beam theory For the case that no external forces act on the beam, i.e. fσ = f̃ = mσ = m̃ = 0, the strong and weak forms (32) and (33) shall equivalently be formulated on the basis of the well-known Hamilton principle: δ ZT L dt = 0 with [δr = δθ = 0]t=T t=0 . (47) t=0 The Lagrangian L occurring in (47) is defined as the difference of kinetic and potential energy: L= Zl (Π̃kin − Π̃int ) ds. s=0 17 (48) Based on the kinetic energy (39) and the hyper-elastic energy (37), the variation (47) reads: δ ZT L dt = ZT Zl   δo wTcρ w + δo ṙTρAṙ − δo ωTcm ω − δo γTc f γ ds dt t=0 s=0 t=0 = ZT Zl     δθ̇T h̃ + δṙT l̃ − δθ0Tm − δr0 −δθ×r0 Tf ds dt (49) t=0 s=0 ZT Zl     =− −δθTmρ − δrTfρ + δθ0Tm + δr0 −δθ×r0 Tf ds dt = 0. t=0 s=0 From the first to second line, the objective variations δo w = δθ̇, δo ω = δθ0 and δo γ = [δr0 −δθ×r0 ] (see (31) and (36)) have been inserted. Furthermore, the additional relation δo ṙT ṙ = (δṙ − δθ × ṙ)T ṙ = δṙT ṙ has been applied. From the second to the third line, partial integration of the inertia terms together with the boundary conditions in (47) have been applied. Since no external forces and moments are considered, i.e. fσ = mσ = 0, partial integration of (49) yields: ZT ZT Zl     δθT m0 + r0 × f + mρ + δrT f 0 + fρ ds dt = 0. δ L dt = | {z } |{z} t=0 t=0 s=0 =0 ˙ (50) =0 ˙ The arbitrariness of δθ(s, t) and δr(s, t) directly yields the strong form (32). Inverting the last step from (49) to (50), by partial integration of the weighted strong form (32), this time only along the beam length l, yields the weak form of the balance equations (33). The terms occurring in this weak form for an unloaded beam can already be identified in the third line of (49). While conservative external forces could also be included into the Lagrangian (48), for a consideration of non-conservative external forces and 3D external moments, which are known to be non-conservative (see e.g. [134]), the starting point has to be the strong form of the mechanical balance equations (32). 3.5. Interlude: Relation between 1D and 3D constitutive laws The aim of the following considerations is to derive the constitutive laws (37) and (38) in a consistent manner from the 3D continuum theory. Thereto, the deformation gradient F of the 3D position field subject to the kinematic constraints (26) of the geometrically exact beam theory shall be derived. Subsequently, also the Cauchy-Green deformation tensor E is required. These two objects can be formulated based on the following definitions: E :=  1 T F F − I3 2 with F := ∂x ∂x ∂s = = gi ⊗ Gi . ∂X ∂s ∂X (51) The (non-orthonormal) covariant basis vectors gi = ∂x(s)/∂si and Gi = ∂X(s)/∂si have to be determined from (26): g1 = r0 + k × (s2 g2 + s3 g3 ) , g2 = g2 , g3 = g3 , G1 = g01 + k0 × (s2 g02 + s3 g03 ) , G2 = g02 , G3 = g03 . (52) Also the contravariant base vectors Gi can be determined from the second line of (52) via the definition GiT G j = δi j : G1 = 1 K01 s3 K01 s2 g01 , G2 = g02 + g01 , G3 = g03 − g01 , C := 1−K03 s2 +K02 s3 . C C C (53) Making use of the relation r0 = g1 +γ (34) and inserting the first line of (52) as well as (53) into (51) yields: F=    1 K01 s3  K01 s2  g1 +γ+k×(s2 g2 + s3 g3 ) ⊗g01 +g2 ⊗ g02 + g01 +g3 ⊗ g03 − g01 . C C C (54) Finally, by inserting (54) into (51), the individual components of the Cauchy-Green deformation tensor can be determined. However, in order to gain further insight into the underlying structure of the deformation gradient, the very 18 ellegant procedure suggested by Geradin and Cardona [58] (for initially straight beams) as well as Linn et al. [100] (for initially curved beams) is employed by slightly reformulating the expression (54) on the basis of the relative rotation tensor Λ̃ := ΛΛT0 . By applying the auxiliary relation 1/C = 1+(1−C)/C to the pre-factor of g1 and solving all the products in (54), the deformation gradient can eventually be reformulated according to: F = Λ̃ (I3 + H⊗g01 ) with H := Hi g0i , I3 = g0i ⊗g0i , Λ̃ = gi ⊗g0i . (55) The components of the vector H identified in (55), denoted as material strain vector in [58] and [100], read: 1 [Γ1 +(K2 −K02 )s3 −(K3 −K03 )s2 ] , C 1 1 H2 = [Γ2 −(K1 −K01 )s3 ] , H3 = [Γ3 −(K1 −K01 )s2 ] . C C H1 = (56) Based on the deformation gradient (55), the Cauchy-Green deformation tensor can be derived according to: E=  H TH 1  H⊗ g01 + g01 ⊗ H + g01 ⊗ g01 . 2C 2C 2 (57) The result (57) has been consistently derived from the basic kinematic assumptions (26) without any additional approximations. However, in order to finally end up with the simple constitutive laws of the geometrically exact beam theory based on the quadratic form (37), the following well-known assumption of small local strains is made: Γi  1 and R · Ki  1, R · K0i  1 for i = 1, 2, 3. (58) The assumptions (58) state that small local axial and shear strains are considered and that the radii of initial and deformed centerline curvature have to be small as compared to the cross-section radius R. In the following, a firstorder approximation in these small quantities is considered by setting C ≈ 1 and neglecting the last, quadratic term in (57). Based on these small-strain assumptions, the approximated Cauchy-Green deformation tensor reads E ≈ Ē =  1 H⊗ g01 + g01 ⊗ H =: Ēi j g0i ⊗ g0 j . 2 (59) The components Ēi j of the approximated Cauchy-Green deformation tensor Ē resulting from this procedure yield: Ē11 = Γ1 + (K2 − K02 )s3 − (K3 − K03 )s2 , 1 Ē12 = Ē21 = (Γ2 − (K1 − K01 )s3 ) , 2 1 Ē13 = Ē31 = (Γ3 + (K1 − K01 )s2 ) , 2 Ē22 = Ē33 = Ē23 = Ē32 = 0. (60) By applying a Saint-Venant-Kirchhoff material with constitutive tensor C = Ci jkl g0i ⊗ g0 j ⊗ g0k ⊗ g0l , the 2. PiolaKirchhoff stress tensor S̄ = S̄ i j g0i ⊗ g0 j can be formulated based on the approximated Cauchy-Green tensor Ē: S̄ 11 = Ē(Γ1 + (K2 − K02 )s3 − (K3 − K03 )S 2 ), S̄ 22 = S̄ 33 = −νE11 , S̄ 12 = S̄ 21 = G (Γ2 − (K1 − K01 )s3 ) , S̄ 13 S̄ 23 = S̄ 31 = G (Γ3 + (K1 − K01 )s2 ) , = S̄ 32 = 0. (61) Here, the scaled Young’s modulus Ē and the shear modulus G have been introduced in (61) according to Ē := (1 − ν)E , (1 + ν)(1 − 2ν) 19 G := E , 2(1 + ν) (62) where E is Young’s modulus and ν is Poisson’s ratio. From (61), it gets obvious that the standard relations known in the geometrically exact beam theory in terms of vanishing in-plane stress components S̄ 22 = S̄ 33 = 0 and of a constitutive parameter E in front of the normal stress S̄ 11 , only holds for the special case ν = 0. This is a consequence of the kinematic assumption of rigid cross-sections, which requires the existence of in-plane reaction forces in general. In order to resolve these two putative contradictions for general cases ν , 0, the constraint of rigid cross-sections can be weakened by allowing for a uniform lateral contraction of the cross-section with in-plane strain components Ē22 = Ē33 = −νE11 and for a proper in-plane warping field (see [100] or [150] for further details). Alternatively, the approximation ν = 0 can be employed in the first two lines of (61). In praxis, this slight inconsistency is often taken into account, which is not unusual in the field of structural theories (see e.g. [3] or [87]). In a last step, the material force and moment stress resultants are determined by integration of the stress vector t1 = S · g01 acting on a beam cross-section with material normal vector g01 according to the definition proposed in the original work [132]: Z Z  F̃ := t1 dA = E(Γ1 +(K2 −K02 )s3 −(K3 −K03 )s2 )g01 A A  + G (Γ2 −(K1 −K01 )s3 ) g02 +G(Γ3 +(K1 −K01 )s2 )g03 dA (63)      EA 0 0   Γ1    ·  Γ2  = C̃F Γ̃. =  0 GA     0 0 GA g0i Γ3 g0i Z Z  M̃ := xA × t1 dA = (s2 g02 + s3 g03 )× E(Γ1 +(K2 −K02 )s3 −(K3 −K03 )s2 )g01 A A  +G (Γ2 −(K1 −K01 )s3 ) g02 + G (Γ3 +(K1 −K01 )s2 ) g03 dA (64)      GIP 0 0   K1 − K01      EI2 =  0  ·  K2 − K02  = C̃ M Ω̃.  0 0 EI3 g K3 − K03 g 0i 0i R R R R Here, the defintions of the moments of inertia of area I2 := A s23 dA and I3 := A s22 dA as well as A s3 dA = A s2 dA = R s s dA = 0 have been applied. As expected, (63) and (64) yield a constitutive law that is identical to the one posA 2 3 tulated in (37). Comparable derivations based on similar small-strain assumptions can e.g. be found in the original works of Kirchhoff [86] and Love [101] in the context of shear-free beam formulations as well as in the current contributions [58, 84, 100] in the context of geometrically exact Simo-Reissner type formulations. It has to be mentioned that the presented derivation yields alternative material objects F̃, C̃F and Γ̃ as well as M̃, C̃ M and Ω̃ that are pulledback to the curved, initial reference configuration and not to the straight reference configuration as it was the case for the material objects considered so far (see also the remark in [104], page 452). However, the components of the alternative material objects, e.g. F̃ = Fi g0i , when expressed with respect to the ”curved”, local basis g0i are identical to the components of the original material objects, e.g. F = Fi Ei , when expressed with respect to the ”straight”, global basis Ei . Via push-forward, also the 1. Piola-Kirchhoff stress tensor P and the Cauchy stress tensor σ can be determined. P = FS, σ= 1 FSFT . detF (65) Starting with the 1. Piola-Kirchhoff stress tensor or with the Cauchy stress tensor, the spatial stress resultants, e.g. f = Fi gi , can be derived similarly to (63) and (64). Since again only first-order terms of the small strains (58) are relevant, it is sufficient to approximate the deformation gradient, required for the push-forward, according to: F ≈ Λ̃ = gi ⊗ g0i , detF ≈ 1. (66) Consequently, as already postulated in the sections before, the relevant pull-back / push-forward operator is given by a rotation tensor Λ̃. If for the derivations above a 3D continuum formulation with material strain and stress measures based on a straight reference configuration had been applied, the resulting 1D material objects would be based on the global basis Ei and the total rotation tensor Λ could be identified as the relevant pull-back / push-forward operator. 20 4. Kirchhoff-Love Beam Theory The configuration space of Reissner type beams is described by pointwise six degrees of freedom, namely the three translational components of r(s) and three rotational degrees of freedom ψ(s) parametrizing Λ(s). In this section, the assumption of vanishing shear strains is made, which can be assumed as a sensible approximation for highly slender beams (see e.g. [101]). Thus, the cross-sections spanned by g2 and g3 have to remain perpendicular to t(s) := r0 (s): g2 (s) · t(s) ≡ 0 and g3 (s) · t(s) ≡ 0 or g1 (s) ≡ t(s) . ||t(s)|| (67) Principally, this so-called Kirchhoff constraint of vanishing shear deformations can be enforced in a strong or in a weak manner. If the same parametrization (r(s), ψ(s)) as in the Reissner case is chosen, additional fields of Lagrange multipliers λ2 (s) and λ3 (s) are necessary, in order to integrate (67) into a constrained variational problem in a weak sense (see Section 4.4). In the following Sections 4.1-4.3, the concept of developing a parametrization with 4 degrees of freedom (r(s), ϕ(s)) that fulfills the Kirchhoff constraint in a strong manner as already derived in [104] will be briefly repeated and extended to the dynamic case. As already introduced in Section 2.2, the scalar-valued quantity ϕ(s) will describe the relative rotation between the material frame gi (s) and an intermediate frame g Mi (s) with respect to the tangent vector t(s) according to (16). By means of (15), one example for a suitable intermediate frame g Mi (s) has already been given, the ”Smallest Rotation” intermediate frame. Nevertheless, the following derivations are presented in a rather general manner, which allows to insert arbitrary alternative intermediate frame definitions g Mi (s). 4.1. Kinematics Within the following three sections, the Kirchhoff constraint (67) is strongly enforced (see also (16)) according to g1 (s) =g M1 (s) = t(s) ||t(s)|| with t(s) = r0 (s) and Λ = exp(S(ϕg1 ))Λ M with Λ M = (g M1 , g M2 , g M3 )Ei , (68) where the centerline-aligned intermediate triad base vectors g Mi (s) = g Mi (r0 (s)) are completely defined by the centerline field r(s) but not further specified for now (a possible example is given by (15)). Now, the Kirchhoff constraint is incorporated by expressing the current configuration s, t → C := (r(s, t), Λ(r(s, t), ϕ(s, t))) ∈ <3 × SO(3) via the new set of primary variables (r(s, t), ϕ(s, t)). Inserting (68) in the definition of the curvature vectors (28) yields (see [104]): k = kk + k⊥ = K1 g1 + S(g1 )g01 = (K M1 + ϕ0 )g1 + S(r0 )r00 ||r0 ||2 | {z } with K M1 := gTM3 g0M2 . (69) =:κ Here, K M1 represents the torsion of the (arbitrary) intermediate triad field and κ is the Frenet-Serret curvature of the beam centerline r(s). In components, the spatial as well as the material curvature vector read:  T  T k = K M1 +ϕ0 , gT2 κ, gT3 κ and K = K M1 +ϕ0 , gT2 κ, gT3 κ . (70) gi Ei The intermediate torsion K M1 is the only term in (70) that depends on the specific choice of the intermediate triad. Besides the curvature vectors, also the spin vector δθ has to be adapted to the Kirchhoff constraint (see also (25)): δθ = δθk + δθ⊥ = δΘ1 g1 + S(g1 )δg1 = (δΘ M1 + δϕ)g1 + S(r0 )δr0 . ||r0 ||2 (71) In analogy to Reissner beam formulations, the first component δΘ1 of the spin vector, representing a multiplicative increment, will directly be employed in the weak form and not further expressed via additive increments according to δΘ1 = δΘ M1 +δϕ. Consequently, the admissible variations are s → δC := (δr(s),δθ(δr(s), δΘ1 (s), r(s, t))) ∈ <3 ×<3 with the new set of variational primary variables (δr(s), δΘ1 (s)) defining the Kirchhoff case. Again, compatibility conditions similar to (31) can be stated. Due to the Kirchhoff constraint, these conditions are only required for the tangential vector components. Left-multiplication of the relations in the second line of (31) with ET1 = (ΛT g1 )T yields: K̇1 = W10 + ġT1(g1 ×g01 ), δK1 = δΘ01 +δgT1(g1 ×g01 ), δW1 = δΘ̇1 +δgT1(g1 × ġ1 ). 21 (72) 4.2. Deformation measures and stress resultants Having defined kinematics that are compatible with the Kirchhoff constraint according to (67), the deformation measures, constitutive relations and stress resultants presented in Section 3 can be adapted to the shear-free case. Inserting the constrained curvature vectors from (70) into the deformation measures Ω and ω according to (34) and (35) yields  T  T Ω = K M1 +ϕ0 −K M01 −ϕ00 , gT2 κ−gT02 κ0 , gT3 κ−gT03 κ0 , ω = K M1 +ϕ0 −K M01 −ϕ00 , gT2 κ−gT02 κ0 , gT3 κ−gT03 κ0 . (73) Ei gi The objective variation of (73) is still given by δΩ = Λ δθ , δo ω = δθ , but now the spin vector is constrained according to (71). By construction, the shear components of Γ and γ in (34) and (35), vanish due to the Kirchhoff constraint (67): T 0 0 Γ = E1 , γ = g1 → δΓ = δE1 , δo γ = δg1 with  := ||r0 || − 1, δ = δr0T g1 . (74) Here, the abbreviation  has been introduced for the remaining component representing the axial tension. Based on the force split f = fk +f⊥ = F1 g1 +f⊥ , also the constitutive relations simply as consequence of the Kirchhoff constraint : 1 ∂Π̃int ∂Π̃int 1 = C M Ω = ΛTm, F1 = = EA. Π̃int (Ω, ) = ΩTC M Ω+ EA 2 , M = 2 2 ∂Ω ∂ (75) The inertia forces fρ as well as the inertia moments mρ are identical to (42) and (43). Like in the Reissner case, the spatial or material angular velocities w and W as well as the spatial or material angular accelerations a and A can either be directly used in the employed time integration scheme or they can be expressed via the (additive) rate of the primary variables (r(s), ϕ(s)). For the latter approach, transformation matrices depending on the definition of the employed intermediate triad (see e.g. T−1 M in (24) in the case of the SR intermediate triad) as well as their time-derivatives are required in order to formulate relations similar to (44). w = Tθt ṫ + ϕ̇g1 , a = Ṫθt ṫ + Tθt ẗ + ϕ̇ġ1 + ϕ̈g1 . (76) In the Kirchhoff case, a third variant can be advantageous: Similar to the curvature vector k (see (69)) and the spin vector δθ (see (71) or (25)), also the angular velocity w can be split into the following two components w = wk +w⊥ = W1 g1 +S(g1 )ġ1 = W1 g1 + S(r0 )ṙ0 , ||r0 ||2 a = Ẇ1 g1 +W1 ġ1 +S(g1 )g̈1 . (77) While w⊥ is determined by r(s), W1 is not specified any further, i.e. it is not expressed via r(s) and ϕ(s) as done in (76). Remark: Three possible time integration schemes result from the different variants given above: 1) (ṙ, r̈, w, a)n+1 = f((r, Λ)n+1 , (r, Λ)n , (ṙ, w)n , (r̈, a)n ), 2) (ṙ, r̈, ϕ̇, ϕ̈)n+1 = f((r, ϕ)n+1 , (r, ϕ)n , (ṙ, ϕ̇)n , (r̈, ϕ̈)n ), (78) 3) (ṙ, r̈, W1 , Ẇ1 )n+1 = f((r, Λ)n+1 , (r, Λ)n , (ṙ, W1 )n , (r̈, Ẇ1 )n ). sd Remark: From the tangent transformations (69), (71) and (77), the following similarities become obvious:  1  δt !  1  t0 !  1  ṫ ! S(g ) g S(g ) g S(g ) g sdδθ = ||t|| , k = ||t|| , w = ||t|| . (79) 1 1 1 1 1 1 δΘ1 K1 W1 4.3. Strong and weak form In this section, the spatial representation of mechanical equilibrium will be considered. In the following, the notation will be simplified by summarizing external forces and moments as well as inertia forces and moments according to f̃ρ := f̃ +fρ and m̃ρ := m̃+mρ . The shear forces f⊥ , which provide no work contribution in the Kirchhoff case, can be eliminated from the strong form of mechanical equilibrium yielding the following set of four differential equations:   gT1 m0 + m̃ρ = 0, " 0 (80)  #0 r 0 0 (F1 g1 ) + × m + m̃ + f̃ = 0. ρ ρ ||r0 ||2 22 The set (80) is sufficient in order to solve for the four primary variables r and ϕ as soon as the stress resultants fk and m are expressed by kinematic and constitutive relations from Section 4.2. Multiplying (80) with the admissible translational and rotational variations δr and δΘ1 and integrating by parts gives the equivalent weak form of equilibrium: Zl h i h i 0T G = δθ m + δr0Tg1 F1 −δrT f̃ρ − δθTm̃ρ ds − δrTfσ +δθTmσ =˙ 0, |{z} Γσ | {z } 0 δo ωTm δθ = δΘ1 g1 + r0 ×δr0 . ||r0 ||2 (81) δF1 In (81), the constrained spatial spin vector according to (71) has been identified and already substituted with the symbol δθ. As indicated by the curly brackets in (81), the pre-factors of the stress resultants m and F1 are represented by the objective variations δo ω and δ, underlining the geometrical exactness of the proposed Kirchhoff beam formulation. Finally, the problem setup has to be completed by proper boundary and initial conditions: r = ru , g1 = g1u , ϕ = ϕu on Γu , f = fσ , m = mσ on Γσ , Γσ ∩ Γu = ∅, Γσ ∪ Γu = {0, l} r = r0 , ṙ = v0 , ϕ = ϕ0 , w = w0 at t = 0. (82) Here g1u prescribes the orientation of the tangent vector and ϕu the orientation of the cross-section with respect to a rotation around the tangent vector. How these conditions can be modeled in practice is shown in Appendix B. By introducing the trial space (r, Λ(r, ϕ)) ∈ U satisfying (82) and the weighting space (δr, δθ(δr, δΘ1 , r)) ∈ V, with δr = 0, δΘ1 = 0 on Γu , the beam problem is fully defined. It should be emphasized that only the concrete analytic expressions for g M2 (r(s)) and g M3 (r(s)) in (68) depend on the specific choice of the intermediate triad definition. Remark: In [104], a special choice of intermediate triad field in (68) has been proposed, the Frenet-Serret triad of the beam centerline. It has been argued in this work, that this choice is not favorable for numerical purposes as consequence of singularities occurring on straight beam segments. However, the Frenet-Serret frame is very beneficial for the analytical treatment of Kirchhoff-Love beam problems and has e.g. been applied in order to derive analytical reference solutions for the numerical examples of Section 11. Remark: As shown in [105], the Kirchhoff-Love beam theory presented so far provides an ideal basis for the derivation of reduced beam models, i.e. beam models that are valid under certain restrictions concerning initial geometry and external loads and will eventually yield considerably simplified finite element formulations. On this basis, a special torsion-free beam element formulation could be derived that completely abstains from any rotational degrees of freedom, a distinct property that drastically simplifies many standard procedures in the numerical treatment of geometrically exact beam element formulations. 4.4. Weak enforcement of Kirchhoff constraint In the last sections, the set of primary variable fields (r(s), ϕ(s)) has been chosen in a way such that the Kirchhoff constraint (67) of vanishing shear strains is strongly fulfilled by construction. However, more flexibility in the subsequent discretization process (see e.g. Section 6) could be gained by formulating a Reissner type beam problem, which allows for two independent interpolations for the centerline field r(s) as well as the triad field Λ(s), and by weakly enforcing the Kirchhoff constraint of vanishing shear strains by means of additional constraint equations: Γ j (s) ≡ gTj (s)r0 (s) ≡ 0 for j = 2, 3. (83) In order to integrate these constraints into a variational framework, an additional Lagrange multiplier potential ΠλΓ23 = Zl (λΓ2 (s)Γ2 (s) + λΓ3 (s)Γ3 (s))ds (84) 0 is required. The Lagrange multiplier fields λΓ2 (s) and λΓ3 (s) in (84) can be interpreted as the shear force components F2 (s) and F3 (s), i.e. reaction forces which enforce the constraint of vanishing shear strains. Variation of the Lagrange multiplier potential (84) leads to the contribution of the Kirchhoff constraint to the weak form: δΠλΓ23 = Zl Zl (δλΓ2 (s)Γ2 (s)+δλΓ3 (s)Γ3 (s))ds+ 0 (λΓ2 (s)δΓ2 (s)+λΓ3 (s)δΓ3 (s))ds. 0 23 (85) The first term in (85) represents the weak statement of the Kirchhoff constraint (83) while the second term can be interpreted as the work contribution of the shear reaction forces. Similar to the displacement primary fields, a proper trial space (λΓ2 , λΓ3 ) ∈ UλΓ23 and a proper weighting space (δλΓ2 , δλΓ3 ) ∈ VλΓ23 have to be introduced which uniquely define the resulting mixed beam formulation. The discrete realization of (85) will be presented in Section 10. 5. Temporal Discretization of Primary Fields In this and the next section, the space-time-continuous beam problems presented so far will be discretized. While spatial discretization as discussed in Section 6 will be based on the finite element method (FEM), a recently proposed extension of the well-known generalized-α method [37] from vector spaces to Lie groups [7, 31, 32], which is directly applicable to the beam element formulations proposed in this work, will be presented in this section. This time integrator represents an implicit, one-step finite difference scheme that inherits most of the desirable properties of the standard generalized-α variant. In the context of finite element methods for solid mechanics, it is often more convenient to perform time discretization on the semi-discrete problem setting resulting from spatial discretization. Here, just the opposite succession, i.e. the initial time discretization is followed by a subsequent spatial discretization, is chosen. This second variant is often applied in the development of geometrically exact beam finite element formulations and will lead to simpler discrete expressions. In the following, the considered total time interval t ∈ [0, T ] is subdivided into equidistant subintervals [tn , tn+1 ] with constant time step size ∆t, where n ∈ N0 is the time step index. Consequently, the solution for the primary variable fields describing the current configuration C(s, t) := (r(s, t), Λ(s, t)) is computed at a series of discrete points in time with associated configurations C(s, tn ) := (r(s, tn ), Λ(s, tn )) =: (rn (s), Λn (s)). In order to simplify notation required for subsequent derivations, the weak form G (see e.g. (33) or (81)) is split into the contributions Gint of internal forces, Gkin of kinetic forces and Gext of external forces: G =Gint +Gkin −Gext . (86) In a next step, the basics of the Lie group generalized-α method originally proposed by [7, 31, 32] will be presented. This method will be applied for time discretization of the Reissner and Kirchhoff type beam element formulations presented in subsequent sections, whose configuration space C(s, t) = (r(s, t), Λ(s, t)) ∈ <3 × SO(3) is defined by the position field r(s, t) and the rotation field Λ(s, t). It is emphasized that the following procedure is independent from the rotation parametrization of Λ(s) employed to these different beam element formulations. In order to express the (material) angular velocities and accelerations Wn+1 and An+1 at the end of a time interval [tn , tn+1 ] in terms of known quantities at time tn and the unknown rotation field Λn+1 (s), the vectors θ̃n+1 and Θ̃n+1 , representing the spatial and material multiplicative rotation increment between the time steps tn and tn+1 , are introduced: exp(S(Θ̃n+1 )) = ΛTn Λn+1 , Θ̃n+1 = ΛTn θ̃n+1 = ΛTn+1 θ̃n+1 . (87) Besides the distinctions that can be made for vector space time integrators (e.g. implicit or explicit scheme, onestep or multi-step scheme, employed methodology in order to guarantee stability and/or conservation properties) two further classifications can be made for time integration schemes applied to rotational variables: First, depending on the type of spatial rotation interpolation, the succession of spatial and temporal discretization will in most cases influence the resulting discrete solution. Secondly, it can be distinguished between approaches that apply a time integration scheme directly to the vectors (Θ̃, W, A) and approaches that express angular velocities and accelerations by means of (additive) rates of the primary variables, i.e. (ψ, ψ̇, ψ̈) (see also (44)). The axial vectors Θ̃, W and A are associated with elements of the Lie algebra so(3). Consequently, time integration schemes of the former type are commonly denoted as Lie group time integration schemes. In this context, it can be further distinguished between Lie group schemes that are based on the material vectors (Θ̃, W, A) and schemes that are based on their spatial counterparts (θ̃, w, a). Only the former variant will be considered in this work. Arguably, one of the first Lie group time integration schemes, at least in the context of geometrically exact beam formulations, has been proposed by Simo and Vu-Quoc [135] and represents the Lie group extension of the classical Newmark scheme. On the contrary, the scheme of [7, 31, 32], which will be presented in the following, is the Lie group extension of the standard generalized-α method. Also this scheme is based on the four parameters β, γ, αm and α f and simplifies to the variant of Simo and Vu-Quoc [135] for 24 the special choice αm = α f = 0. A distinctive feature of the Lie group generalized-α scheme lies in the fact that all terms of the weak form are evaluated at the end point tn+1 of the considered time interval: Gn+1 =G(rn+1 , ṙn+1 , r̈n+1 , Λn+1 , Wn+1 , An+1 , f̃n+1 , m̃n+1 , fσ,n+1 , mσ,n+1 )=0. ˙ (88) In a next step, the update formulas for translational quantities are given by a standard Newmark scheme ũn+1 := rn+1 − rn , ũn+1 = ∆tṙn + +∆t2 [(0.5 − β)r̈mod,n + βr̈mod,n+1 ], (89) ṙn+1 = ṙn + ∆t[(1 − γ)r̈mod,n + γr̈mod,n+1 ]. This update scheme is slightly changed in form of a multiplicative configuration update for the rotations: exp(S(Θ̃n+1 )) = ΛTn Λn+1 , Θ̃n+1 = ∆tWn + +∆t2 [(0.5 − β)Amod,n + βAmod,n+1 ], (90) Wn+1 = Wn + ∆t[(1 − γ)Amod,n + γAmod,n+1 ]. The modified acceleration vectors r̈mod occuring in (89) are related to the physical acceleration vectors r̈ according to: (1 − αm )r̈mod,n+1 + αm r̈mod,n = (1 − α f )r̈n+1 + α f r̈n with r̈mod,0 = r̈0 . (91) In a similar manner, the modified as well as the real / physical angular accelerations are related according to: (1 − αm )Amod,n+1 + αm Amod,n = (1 − α f )An+1 + α f An with Amod,0 = A0 . For later use, it is favorable to express the vectors ṙn+1 and r̈n+1 in terms of the primary unknown rn+1 : ! ! γ γ γ ṙn + ∆t 1 − r̈mod,n , ũn+1 + 1 − ṙn+1 = β∆t β 2β 1 − αm 1 − αm r̈n+1 = ũn+1 − ṙn β∆t(1 − α f ) β∆t2 (1 − α f ) " # αf (1 − αm )(0.5 − β) αm + − r̈mod,n − + r̈n . β(1 − α f ) 1 − αf 1 − αf A similar relation can be formulated for the material vectors of angular velocity Wn+1 and acceleration An+1 : ! ! γ γ γ Θ̃n+1 + 1 − Wn + ∆t 1 − Amod,n , Wn+1 = β∆t β 2β 1 − αm 1 − αm An+1 = Θ̃n+1 − Wn β∆t(1 − α f ) β∆t2 (1 − α f ) " # αf (1 − αm )(0.5 − β) αm + − + Amod,n − An . β(1 − α f ) 1 − αf 1 − αf (92) (93) (94) In [31] and [32], it has been proven that the integration scheme given by equations (88)-(94) yields the same favorable properties as the standard generalized-α method, which are second-order accuracy, unconditional stability (within the linear regime), controllable damping of the high-frequency modes and minimized damping of the lowfrequency modes. Remarkably, the parameter choice leading to this optimal behavior is identical to that of the standard generalized-α scheme. Furthermore, it has been shown that this scheme can consistently treat non-constant mass matrix contributions, such as the term ΛCρ A occurring in geometrically exact Reissner and Kirchhoff type beam formulations. It has to be stated that the extended generalized-α scheme cannot guarantee for exact conservation of energy, linear and angular momentum. In the field of Lie group time integration schemes, a large variety of methods aiming to guarantee these conservation properties has been proposed [136, 26, 61, 14, 21, 75, 98, 119, 83, 46]. 25 However, the perhaps most essential advantage of the extended generalized-α scheme as compared to these alternatives lies again in its simplicity and flexibility. Independent of the beam theory (Reissner or Kirchhoff type), the employed spatial interpolation schemes as well as the chosen set of nodal primary variables (e.g. in terms of rotation parametrization), this time integration scheme can directly be applied without the need for any further adaptions. Review: As mentioned in Section 5, a large number of scientific contributions considers the development of energy-momentum schemes for Simo-Reissner type formulations. However, this does not hold true for Kirchhoff-Love beam element formulations. For example, the formulations of anisotropic type (see requirements 5a)-5c) in Table 2) haven’t considered dynamics so far. In [151], a energy-momentum scheme is proposed, but only for temporal discretization of the beam centerline. The torsional problem associated with the rotational degree of freedom is only considered in a static manner, i.e. arbitrary dynamic problems containing also rigid body rotations with respect to the beam axis are not accessible by this approach. The temporal discretization applied in the present work encompasses both, the translational and the rotational fields. As verified numerically in Section 11, the numerical dissipation provided by the extended generalized-α scheme will enable energy-stable time integration for highly nonlinear problems. Concretely, in the well-known ellbow-cantilever example of Section 11.7, a considerably improved energy stability can be observed as compared to [80], where a Lie-group extension of the standard Newmark scheme [135] has been employed. Nevertheless, a supplementation of the proposed Kirchhoff-Love beam elements by energymomentum schemes for temporal discretization seems to be a interesting direction of future research. 6. Spatial Discretization Methods for Primary Fields Spatial discretization is exclusively considered in the context of finite element methods within this work. It represents the core topic in the development of geometrically exact Kirchhoff beam elements considered in this work. 6.1. Discretization of beam centerline First, the spatial discretization of the beam centerline r(s) will be conducted. Thereto, an elementwise parameter space ξ ∈ [−1; 1]. is introduced with the element Jacobian J(ξ) := ||r0h,ξ (ξ)|| mapping between infinitesimal increments in the parameter space and the arc-length space according to ds = J(ξ)dξ. In the following two sections, two different interpolation schemes based on Lagrange polynomials or Hermite polynomials respectively will be presented. 6.1.1. Discretization of beam centerline based on Lagrange polynomials The highest derivative of the primary variable r(s) occurring in the weak form (33) of the Simo-Reissner beam theory is the first derivative r0 (s) of the centerline curve. Consequently, a C 0 -continuous interpolation of the beam centerline r(s) is sufficient in this case. Thus, the standard choice of trial functions is given by Lagrange polynomials, yielding rh (ξ) = nr X Li (ξ)d̂i =: Ld̂ and r0h (ξ) = nr X Li (ξ)d̂i0 =: Ld̂0 . (95) i=1 i=1 In (95), the vectors d̂i , d̂i0 ∈ <3 represent the nodal positions, whereas Li (ξ) are standard Lagrange polynomials satisfying the interpolation property Li (ξ j ) = δi j at the element node coordinates ξ j as well as proper completeness conditions. Here, δi j represents the Kronecker delta symbol. The matrix L and the vector d̂ represent element-wise assemblies of the shape functions Li and the position vectors d̂i for i = 1, ..., nr , which are given by L := (L1 (ξ)I3 , ..., Lnr (ξ)I3 ) as well as d̂ := (d̂1T , ..., d̂nr T )T . Following a Bubnov-Galerkin approach, the interpolation of the trial functions δr(s) reads: δrh (ξ) = nr X Li (ξ)δd̂i =: Lδd̂. i=1 26 (96) 6.1.2. Discretization of beam centerline based on Hermite polynomials The highest derivative of the primary variable r(s) occurring in the weak form (81) of the Kirchhoff beam is given by the second derivative r00 (s). Consequently, for the interpolation of the centerline r(s) shape functions are required that fulfill C 1 -continuity at the element boundaries. Besides this requirement, a C 1 -continuous centerline representation can be very beneficial for problem class requiring a smooth geometry representation such as beam-to-beam contact problems (see e.g. [106, 107]). In order to guarantee for C 1 -continuity, Hermite shape functions are employed: 2 2 2 2 X X cX i cX i Ht (ξ)t̂i =: Hd̂, r0h (ξ) = Hdi (ξ)d̂i0 + Ht (ξ)t̂i0 =: Hd̂0 . rh (ξ) = Hdi (ξ)d̂i + 2 2 i=1 i=1 i=1 i=1 (97) In (97), the vectors d̂i , d̂i0 ∈ <3 and t̂i , t̂i0 ∈ <3 represent nodal position and nodal tangent vectors at the two boundary nodes of the resulting finite elements. Again, the matrix H and the vector d̂ represent proper element-wise assemblies of the shape functions Hti and Hdi as well as the nodal position and tangent vectors d̂i and t̂i for i = 1, 2. The explicit expressions are H := (Hd1 (ξ)I3 , 0.5cHt1 (ξ)I3 , Hd2 (ξ)I3 , 0.5cHt2 (ξ)I3 ) as well as d̂ := (d̂1T , t̂1T , d̂2T , t̂2T )T . In [104], it has already been shown that the Hermite shape functions in (97) fulfill the interpolation property for the nodal positon and tangent vectors as well as proper completeness conditions for third-order polynomials and that the optimal choice for the constant c = lele,h is given by the element length lele,h of the discretized initial geometry, which can be determined in an iterative manner. On the basis of (97), the first and second arc-length derivative can be determined as r0h (ξ) = 1 rh,ξ (ξ), J(ξ) J,ξ (ξ) 1 rh,ξξ (ξ) − rh,ξ (ξ), 2 J(ξ) J(ξ)3 r00h (ξ) = (98) where the Jacobi factor J(ξ) and its parameter derivative J,ξ (ξ) appearing in (98) are given by the following relations: J(ξ) := ||r0h,ξ (ξ)|| and rT0h,ξ r0h,ξξ d . J,ξ (ξ) = ||r0h,ξ || = dξ ||r0h,ξ || (99) Finally, also the variations δr(s) have to be discretized by properly chosen test functions. Following a BubnovGalerkin approach, also the interpolation of δr(s) is based on Hermite polynomials and given by the expression: δrh (ξ) = 2 X i=1 2 Hdi (ξ)δd̂i + cX i H (ξ)δt̂i =: Hδd̂. 2 i=1 t (100) In an analogous manner, the procedure presented here can also be extended to Hermite polynomials of higher order. 6.2. Discretization of rotation field In Section 2.1, two parametrizations of rotation tensors have been investigated: a parametrization via rotation vectors ψ and a parametrization via the SR mapping on the basis of the set (t, ϕ). In the following two sections, these two variants will be employed in order to parametrize the rotation tensors Λi at the element nodes i = 1, ..., nΛ . In the subsequent Sections 6.2.3 and 6.2.4, also two possible approaches for the interpolation of these nodal triads in the elements interior, one based on rotation vectors and one based on the SR mapping, will be presented. 6.2.1. Parametrization of nodal triads via rotation vectors According to Section 2.1, rotation vectors ψ̂1n , ..., ψ̂nnΛ can be employed as primary variables describing the nodal triads Λin = Λin (ψ̂in ), i = 1, 2, ..., nΛ , at time step tn . The update from iteration k to k + 1 of a nonlinear solution scheme might either be based on additive rotation increments ∆ψ̂i,k+1 or on multiplicative rotation increments ∆θ̂ni,k+1 given by: n i,k i,k+1 ) Λi,k+1 (ψ̂i,k+1 ) = Λi,k n (ψ̂n +∆ψ̂n n n i,k ) = exp(S[∆θ̂ni,k+1 ])Λi,k or Λi,k+1 (ψ̂i,k+1 n n (ψ̂n ). n (101) Only for rotations with a magnitude smaller than 180◦ a unique rotation vector can be extracted from a given triad (by applying e.g. Spurrier’s algorithm, see [140]). Within this work, rotation vectors are always extracted in a manner such that ψ ∈] − π; π]. Within this range, the transformation matrix T between additive and multiplicative rotation vector increments (see (12)) and its inverse, which do not exist at ψ = 2π, are always well-defined. 27 6.2.2. Parametrization of nodal triads via smallest rotation mapping Alternatively, the nodal triads can be defined via a relative rotation of nodal intermediate triads ΛiMϕ̂ by a relative angle ϕ̂i with respect to the tangent (see (16)). The nodal intermediate triads are defined by the smallest rotation mapping of the nodal intermediate triad Λ̄iMϕ̂ ,n := ΛiMϕ̂ ,n−1 of the last time step onto the basis vector gi1,n of the current step tn : Λin = exp(S[ϕ̂in gi1,n ])ΛiMϕ̂ ,n , ΛiMϕ̂ ,n = sr(Λ̄iMϕ̂ ,n , gi1,n ) with Λ̄iMϕ̂ ,n := ΛiMϕ̂ ,n−1 . (102) This variant will be used for Kirchhoff type beam element formulations in combination with the Hermite centerline interpolation (97), where the first base vector gi1 is defined via the tangent vector to the beam centerline, i.e. gi1 = t(ξi )/||t(ξi )||. All in all, the nodal triad is defined by the nodal relative angle ϕ̂i and the tangent vector t(ξi ) at the node i, i.e. Λi = Λi (ϕi , t(ξi )). However, it has to be emphasized that in contrary to ϕ̂i , the vector t(ξi ) does not necessarily have to be a nodal primary variable. If the considered node i coincides with one of the two element boundary nodes employed in the Hermite interpolation (97), this tangent vector indeed represents a nodal primary variable, i.e. t(ξi ) = t̂i for i = 1, 2, otherwise the tangent vector simply represents the interpolated centerline derivative at this position, i.e. t(ξi ) = r0 (ξi ). Based on (additive) increments ∆ϕ̂i,k+1 of the nodal relative angles, the configuration n update from iteration k to iteration k + 1 of the Newton-Raphson scheme at time step tn reads: i,k+1 i,k+1 i,k+1 i,k+1 i i,k i,k+1 i,k+1 Λi,k+1 (ϕ̂i,k+1 n n , g1,n ) = exp(S[ϕ̂n +∆ϕ̂n , g1,n ])Λ Mϕ̂ ,n , Λ Mϕ̂ ,n = sr(Λ̄ Mϕ̂ ,n , g1,n ). (103) 0 k+1 i , d̂2,k+1 (ξ )/||r0nk+1 (ξi )|| are fully defined by the centerline r0nk+1 = r0 (d̂1,k+1 , t̂n1,k+1 , t̂2,k+1 The base vectors gi,k+1 ) n n n 1,n = rn i,k+1 i,k i,k+1 i,k+1 i,k i,k+1 based on the additive updates d̂n = d̂n +∆d̂n as well as t̂n = t̂n +∆t̂n . Remark: Within this work, intermediate triads Λ M based on the SR mapping are used for two different purposes: Firstly, they are used for the definition of nodal material triads Λi based on nodal relative angles ϕ̂i and associated nodal intermediate triads ΛiMϕ̂ (SR mapping ”in time” from Λ̄iMϕ̂ ,n = ΛiMϕ̂ ,n−1 to ΛiMϕ̂ ,n , see (102)). Secondly, they are used for the definition of an interpolated material triad field Λ(ξ) based on a relative angle field ϕ(ξ) and an associated intermediate triad field Λ Mϕ ,n (ξ) (SR mapping ”in space” from a reference triad Λr,n = Λn (ξr ) to Λ Mϕ ,n (ξ), see (113)). In order to distinguish these two applications, the additional index ϕ̂ or ϕ of Λ M refers to the associated relative angle. Review: In Appendix Appendix B it is shown that a rotation vector-based parametrization of the nodal triads according to the last section will considerably simplify the modeling of complex Dirichlet boundary conditions and joints as compared to the tangent vector-based variant considered in this section. Only the straight formulations from the literature (see requirement 6) of Table 2) employ a rotation vector-based triad parametrization, which supports a simple prescription of such conditions. In Section 11, it will turn out that the tangent vector-based parametrization of nodal triads on the other hand will lead to a better nonlinear solver performance. Thus, in practice one might combine the advantage of these to approaches by employing a rotation vector-based parametrization only at nodes where complex Dirichlet or constraint conditions have to be modeled and the tangent vector-based variant to all the remaining nodes. 6.2.3. Triad interpolation based on local rotation vectors In this section, a triad interpolation is presentented that has originally been proposed by Shoemake [131] and for the first time employed to geomerically exact beam element formulations by Crisfield and Jelenić [43, 80]. On each of the considered nΛ nodes, a triad Λi , with i = 1, 2, ..., nΛ , is defined by primary degrees of freedom either according to Section 6.2.1 or to Section 6.2.2. The interpolation strategy presented in this section is independent from the specific choice of nodal primary variables. First, a reference triad Λr based on the triads at nodes I and J is defined: Λr = ΛI exp(S(ΦI J /2)) with exp(S(ΦI J )) = ΛITΛ J . (104) The nodes I and J are chosen as the two middle triads for elements with an even number nΛ of nodes and as the one middle triad (i.e. I = J) for elements with an odd number nΛ of nodes (see also equation (6.2) in [43], which is based 28 on a sightly different node numbering). Based on the definition Λr , the interpolated triad field is defined as follows: Λh (ξ) = Λr exp(S(Φlh (ξ))), Φlh (ξ) = nΛ X Li (ξ)Φil , exp(S(Φil )) = ΛTrΛi . (105) i=1 Again, Li (ξ) represent the standard Lagrange polynomials of order nΛ − 1 and Φil the (material) rotation vectors associated with the relative rotation between the triad Λi at node i and the reference triad Λr . The interpolation (105) represents an orthonormal interpolation scheme. Thus, the interpolated triad field is still an element of the rotation group, i.e. Λh (ξ) ∈ SO(3) ∀ ξ ∈ [−1; 1]. Furthermore, the interpolation scheme (105) preserves the objectivity of the space-continuous deformation measures (see [43]). The curvature vector (see (28)) resulting from (105) reads Kh (ξ) = T−T (Φlh (ξ))Φ0lh (ξ), (106) and can exactly represent the state of constant curvature Kh = const . Thus, the two-noded variant of (105) can be identified as a geodesic interpolation scheme, since it connects two points on the nonlinear manifold SO(3) via the ”shortest distance”. Consequently, the two-noded variant of this interpolation represents the SO(3)-counterpart to the linear interpolation (95) of quantities in <3 . In contrast to the interpolations (95) and (97) of the beam centerline, the rotation interpolation (105) is nonlinear in the nodal degrees of freedom. Thus, if e.g. the field of rotation vectors ψh (ξ) with nodal values ψh (ξi ) = ψ̂i is employed for triad parametrization, the rotation vector interpolation resulting from (105) can be written in an abstract manner in the form ψh (ξ) = nl(ψ̂1 , ..., ψ̂nΛ , ξ). While an explicit interpolation rule for the rotation vectors ψh (ξ) is not needed for practical purposes - the triad field is already given by (105) - the discrete version of the spin vector field δθh (ξ) and the field of (multiplicative) rotation vector increments ∆θh (ξ) will be required in the next sections for the spatially discretized weak form of the balance equations and its linearization. In [43], these discretized fields have consistently been derived from the triad interpolation (105), leading to: ∆θh (ξ) = nΛ X Ĩi (ξ)∆θ̂i =: Ĩ∆θ̂θ , δθh (ξ) = i=1 nΛ X Ĩi (ξ)δθ̂i =: Ĩδθ̂θ . (107) i=1 The arc-length derivatives of the interpolations (107) follow in a straightforward manner and are given by: ∆θh0 (ξ) = nΛ X 1 i Ĩ,ξ (ξ)∆θ̂i , J(ξ) i=1 δθh0 (ξ) = nΛ X 1 i Ĩ,ξ (ξ)δθ̂i . J(ξ) i=1 (108) The generalized shape function matrices Ĩi (ξ) ∈ <3 × <3 as well as their derivatives Ĩi,ξ (ξ) have been derived in the original work [43] (see also Appendix A). Again, assembly matrices and vectors Ĩ := (Ĩ1 , ..., ĨnΛ ) as well as ∆θ̂θ := (∆θ̂1T , ..., ∆θ̂nΛ T )T and δθ̂θ := (δθ̂1T , ..., δθ̂nΛ T )T have been introduced. These shape functions depend on the rotational primary variables in a nonlinear manner, e.g. Ĩi (ξ) = nl(ψ̂1 , ..., ψ̂n , ξ) if nodal rotation vectors according to Section 6.2.1 are employed. Consequently, they have to be re-calculated for every new configuration and this dependency on the rotational primary variables would have to be considered within a consistent linearization procedure in case the spin vector interpolation δθh (ξ) given in (107) is used in the weak form according to a Bubnov-Galerkin procedure. In order to avoid this additional linearization, it can be sensible to follow a Petrov-Galerkin approach based on an interpolation of δθh (ξ) via Lagrange polynomials. This strategy is also applied within this work and leads to: δθh (ξ) = nΛ X Li (ξ)δθ̂i =: Lδθ̂θ , δθh0 (ξ) = i=1 nΛ X 1 i L,ξ (ξ)δθ̂i =: L0 δθ̂θ . J(ξ) i=1 (109) Nevertheless, the interpolation ∆θh (ξ) is still based on (107) in order to end up with a consistent linearization. As emphasized in [80], the generalized shape functions fulfill the following interpolation and completeness properties Ĩi (ξ j ) = δi j I3 , nΛ X Ĩi (ξ) ≡ I3 , i=1 nΛ X Ĩi,ξ (ξ) ≡ 0, (110) i=1 i.e. these shape functions can exactly represent constant rotation vector increment fields. Since these properties are also fulfilled by the Lagrange polynomials, both the Bubnov-Galerkin interpolation (107) as well as the PetrovGalerkin interpolation (109) of the spin vector field δθh (ξ) can exactly represent a constant distribution δθh (ξ) = const. in an element. This property is important with respect to conservation of angular momentum (see e.g. Sections 6.3.5). 29 6.2.4. Triad interpolation based on ”Smallest Rotation” mapping In this section, again, a triad interpolation with nΛ nodes is considered. On each of these nodes, a triad Λi , with i = 1, 2, ..., nΛ , is defined by primary degrees of freedom either according to Section 6.2.1 or to Section 6.2.2. Similar to the last section, the interpolation strategy presented in the following is independent from the specific choice of nodal primary variables. Concretely, a novel interpolation scheme is proposed that defines an orthonormal triad field Λh (ξ) ∈ SO(3) ∀ ξ ∈ [−1; 1] based on a given tangent vector field t(ξ) = r0 (ξ) and nodal triads Λi = (gi1 , gi2 , gi3 ) with i = 1, 2, ..., nΛ . In the following, this tangent vector field is defined by a Hermite interpolation of the beam centerline according to (97) based on two nodes at the element boundary with six degrees of freedom d̂ j , t̂ j and j = 1, 2, respectively. It has to be emphasized that the number of nodes of the triad interpolation can in general differ from the number of nodes of the Hermite centerline interpolation, i.e. nΛ , 2 (see Figure 3(b)). (a) Node numbering applied to Simo-Reissner elements. (b) Node numbering applied to Kirchhoff-Love elements. Figure 3: Element-local node numbering of translational and rotational primary fields. The nodal triads are oriented tangential to the beam centerline curve. Thus, the first base vectors yield: g1 (ξ) = r0 (ξi ) r0 (ξ) → gi1 = 0 i . 0 ||r (ξ)|| ||r (ξ )|| (111) Similarly to Section 6.2.3, one nodal triad ΛI initially has to be chosen as reference triad of the interpolation scheme: Λr = Λ I with I ∈ {1, 2, ..., nΛ }. (112) Based on the reference triad Λr and the nodal triads Λi the interpolation procedure is defined according to: Λh (ξ) = exp(S[ϕh (ξ)g1 (ξ)]) Λ Mϕ (ξ), nΛ X ϕh (ξ) = Li (ξ)ϕi , Λ Mϕ (ξ) = sr(Λr , g1 (ξ)), exp(S[ϕi gi1 ]) = Λi ΛTMϕ (ξi ). (113) i=1 The general curvature vector Kh (ξ) for interpolations that fulfill the Kirchhoff constraint in a strong manner is given by (70). The total torsion resulting from (113) can be derived in a straight-forward manner to: K1 = K Mϕ 1 + ϕ0h , K Mϕ 1 = gTMϕ 3 g0Mϕ 2 = − κTg1I 1+gT1 g1I . Remark: Ihe nodal relative angles ϕi = ϕh (ξi ) in (113) are different from the nodal primary variables ϕ̂i in (102) of Section 6.2.2 for parametrization of nodal triads. For both quantities, the symbol ϕ has been chosen since in both cases the relative angle between the material triad Λ(ξi ) and an intermediate triad Λ Mϕ (ξi ) in case of ϕi (stemming from a SR mapping ”in space”) or an intermediate triad ΛiMϕ̂ in case of ϕ̂i (stemming from a SR mapping ”in time”) is measured. The difference becomes clear by realizing that the intermediate triad Λ Mϕ (ξi ) resulting from the smallest rotation of Λr onto g1 (ξi ) (see (113)) will in general differ from the intermediate triad ΛiMϕ̂ resulting from the smallest rotation of Λ̄iMϕ̂ onto g1 (ξi ) (see (102)). 30 (114) Review: In [104], it has been argued that the SR mapping exhibits a singularity for ḡT1 g1 = −1 in (15). For the proposed finite element formulations this can only occur for rotation increments per time step that are larger than 180◦ or large element deformations exhibiting relative rotations between the element center and boundary nodes that are larger than 180◦ (see [104]). Consequently, these singularities are not practically relevant for reasonable spatial and temporal discretizations. In [104], it has also been argued that these singularities occurring at relative rotations of 180◦ represent the optimum that can be achieved for mappings on the tangent vector. The approach employed by the anisotropic formulations from the literature is sightly different (see requirement 2c) in Table 2). There, only one spatially fixed reference triad at the beam endpoint is used for the initial SR mapping in space, and only one temporarily fixed reference triad at every centerline position s for the SR mapping in time. Consequently, for these formulations, singularities could occur for practically relevant configurations in case the relative rotation between the cross-sections at the beam end point and at an arbitrary centerline position s exceeds 180◦ or in case the total cross-section rotation from the initial to the current configuration exceeds 180◦ at any centerline position s. Review: In the literature, the smallest rotation mapping defined in (15) of Section 2.2 is often denoted as ”rotation without twist”. Thus, sometimes it is mistakenly assumed that an intermediate triad field as employed in (113) would exhibit a vanishing torsion (see e.g. [63], where the slightly different interpolation scheme (128) has been employed). However, according to (114), the torsion of the intermediate triad field (113) constructed via the SR mapping does not vanish for general curved 3D configurations. It can easily be shown that the torsion vanishes in the limit of fine discretizations lele := s(e),2 − s(e),1 → 0. In this limit, the intermediate triad field becomes identical to an elementwise Bishop frame [23] and the relation lim K Mϕ 1 (ξ) = − lim I ξ →ξ lele →0 κTg1I 1+gT1 g1I = − lim I ξ →ξ (g1 (ξ) × g01 (ξ))Tg1 (ξ I ) 1+gT1 (ξ)g1 (ξ I ) = 0. (115) holds true. However, as verified numerically in Section 11.5, a neglecting of K Mϕ 1 in the range of finite element lengths will in general lead to a decline in the spatial convergence rate. On the contrary, the arclength derivatives (and variations) derived in the alternative anisotropic Kirchhoff-Love formulation [16] (see requirement 4a) in Table 2), contain the required terms stemming from the SR mapping. Again, the discrete version of the spin vector field δθh (ξ) has to be determined. Following a Petrov-Galerkin approach, the spin vector of (71) can be discretized as follows: δθh (ξ) = δΘ1h (ξ)g1 + S(r0 )δr0 ||r0 ||2 with δΘ1h (ξ) = nΛ X Θ1 , Li (ξ)δΘ̂i1 =: Lk δΘ̂ (116) i=1 where the interpolation of r0 as well as δr0 follows (97) and (100). The matrix Lk := (L1 , ..., LnΛ ) as well as the vector Θ1 := (δΘ̂11 , ..., δΘ̂n1Λ )T represent assemblies of the Lagrange shape functions Li and the nodal twist components δΘ̂i1 . δΘ̂ Alternatively, it can be discretized in a Bubnov-Galerkin manner based on (113). In this case, it reads: δθh (ξ) = δΘ1h (ξ)g1 + nΛ X S(r0 )δr0 , δΘ (ξ) = δΘ (ξ)+δϕ (ξ), δϕ (ξ) = Li (ξ)δϕi . 1h M 1 h h ϕ ||r0 ||2 i=1 (117) Θ1 and δd̂, i.e. via assemblies of The spin vector δθh (ξ) in (117) shall be completely expressed via nodal variations δΘ̂ nodal primary variables. Thereto, δΘ Mϕ 1 (ξ) and δϕi are expressed as δΘ Mϕ 1 (ξ) = δΘ1I + δϕ i gT1 (g1I ×δg1I )−g1I T (g1 ×δg1 ) 1+gT1 g1I , gi T (gI ×δg1I )−g1I T (gi1 ×δgi1 ) = δΘi1 −δΘiMϕ 1 = δΘi1 −δΘ1I − 1 1 , 1+gi1T g1I 31 (118) which directly follows from interpolation (113). Inserting the relations (118) into the spin vector (117) yields: nΛ X giT(gI ×δg1I )−g1IT(gi1 ×δgi1 ) gT1(g1I ×δg1I )−g1IT(g1 ×δg1 ) Θ 1 − Li 1 1 . δΘ1h (ξ) = Lk δΘ̂ + I 1+gT1 g1I 1+giT 1 g1 i=1 | {z } (119) =:δΘ1,di f f (ξ) In (119), the notion δΘ1,di f f (ξ) has been introduced for the term distinguishing the Petrov-Galerkin (116) and the Bubnov-Galerkin variant (117). By making use of the abbreviations xb = x(ξb ), xa = x(ξa ) and the relations gT1a (g1b ×δg1b ) = gT1a (t̃b ×δr0b ) = (g1a × t̃b )T H0 (ξb )δd̂, t̃ := g1 r0 = , ||r0 || ||r0 ||2 (120) the Bubnov-Galerkin interpolation of the spin vector given in equation (117) can finally be formulated as: T T T Θ1vθkΘ +δd̂ vθ⊥ +δd̂ vθkd vθkΘ = LTk ⊗gT1 , vθ⊥ = −H0T S(t̃), δθhT (ξ) = δΘ̂  nΛ  X i  H0T (ξ)(g1I × t̃) − H0T (ξI )(g1 × t̃I )  , vθkd =  L v1i − v1  ⊗gT1 , v1 = 1+g1T g1I i=1 v1i = v1 (ξi ) = H0T (ξi )(g1I × t̃i ) − H0T (ξI )(gi1 × t̃I ) 1+gi1T g1I (121) . Comparing equations (116) and (121) leads to the conclusion that the difference between the Bubnov-Galerkin and the Petrov-Galerkin variant is expressed by one additional term involving vθkd . The arc-length derivative of (121) reads: T T T Θ1 v0θkΘ+δd̂ v0θ⊥+δd̂ v0θkd , δθh0T (ξ) = δΘ̂ 00T 0T T 0 0 0T 0 T v0θkΘ = L0T k ⊗g1 + Lk ⊗g1 , vθ⊥ = −H S(t̃)− H S(t̃ ), t̃ = v0θkd = nΛ X nΛ  X  Li v1i − v1 ⊗g0T Li0 v1i − v01 ⊗gT1 + 1 , (122) i=1 i=1 v01 = r00 2(r0T r00 )r0 − 0 2 ||r || ||r0 ||4 H0T (ξ)(g1I × t̃0 )+ H00T (ξ)(g1I × t̃)− H0T (ξI )(g01 × t̃I ) 1+gT1g1I − I (g0T 1 g1 )v1 1+g1T g1I . It shall be investigated if the variants (116) and (117) can represent a constant distribution δθhT (ξ) = w0 = const. and δθh0T (ξ) = 0, as it is the case for their counterparts (107) and (109). Thereto, the nodal variations are chosen as δd̂ j = w0 × d̂ j , δt̂ j = w0 × t̂ j , δΘ̂i1 = gT1 (ξi )w0 for j = 1, 2; i = 1, ..., nΛ . (123) Inserting δd̂ j and δt̂ j according to (123) into (100) gives the desired result δrh (ξ) = w0 ×rh (ξ). With this result and by inserting (123) into the spin vector interpolations (116) and (117), which both fulfill the interpolation property for the tangential spin vector components δΘ̂i1 , it can be shown that w0 is at least represented correctly at the element nodes: δθh (ξi ) = (gT1 (ξi )w0 )g1 (ξi ) + r0 (ξi )×(w0 ×r0 (ξi )) = w0 for i = 1, ..., nΛ . ||r0 (ξi )||2 (124) Here, the Grassmann identity for cross-products a×(b×c) = (aT c)b−(aT b)c with a, b, c ∈ <3 as well as g1 = r0 /||r0 || have been employed. Next, it will be investigated for the variants (116) and (117), if the choice (123) leads to a constant spin vector field along the beam element. Inserting (123) into (116) and using the Grassmann identity yields:  nΛ  X i  r0 (ξ)×(w0 ×r0 (ξ)) i T δθh (ξ) =  L (ξ)g1 (ξ )w0  g1 (ξ) + ||r0 (ξ)||2 i=1 " !# nΛ X (125) = I3 − g1 (ξ) ⊗ gT1 (ξ) − Li (ξ)gT1 (ξi ) w0 , w0 . i=1 | {z ,0 32 } Thus, the Petrov-Galerkin variant (116) cannot represent a constant spin vector field. Since (116) and (117) solely differ in δΘ1,di f f (ξ) (see (119)), only this term has to be further investigated. Inserting (123) in δΘ1,di f f (ξ) yields: nΛ nΛ X X δΘ1,di f f (ξ) = − Li (ξ)(gT1(ξi )w0 )+ Li (ξ)(gT1(ξ I )w0 )+(gT1 (ξ)w0 )−(gT1(ξ I )w0 ) i=1 |i=1{z } (126) =1 = gT1 (ξ) − nΛ X ! Li (ξ)gT1 (ξi ) w0 . i=1 Thus, adding the term δΘ1,di f f (ξ)g1 (ξ) to the Petrov-Galerkin variant (125) yields the desired result δθh (ξ) = w0 = const. for the Bubnov-Galerkin spin vector interpolation in case the nodal variations are given by (123). Alternatively, this result can be obtained by considering that (117) represents the consistent variation of the objective triad interpolation (113) (see also Section 6.3.2). Since this interpolation is objective, the variation of the discrete internal energy has to vanish for infinitesimal rigid body rotations. For an arbitrary stress resultant m, this is only possible if δθh0 (ξ) ≡ 0 and consequently δθh (ξ) ≡ const. can be displayed exactly (see also the weak form (81)). Recapitulatory, the interpolation (117) can represent arbitrary constant spin vector distributions w0 , while for the interpolation (116) this is only possible for 2D problems or in the special case w0 = 0. This result will be important in order to investigate the conservation properties of the resulting finite element formulations (see e.g. Sections 6.3.5 and 9.4). Finally, the field of (multiplicative) rotation vector increments ∆θh (ξ) and the derivative ∆θh0 (ξ), required for a consistent linearization of the discretized weak form, follow from equations (121) and (122) by simply replacing the variations δ(.) by increments ∆(.). The spin vector considered above is expressed via multiplicative nodal increments δΘ̂i1 as nodal primary variables. In case a rotation parametrization of the nodal triads via nodal rotation vectors according to Section 6.2.1 is employed, the nodal vector of multiplicative iterative rotation increments given by ∆Θ̂i = (∆Θ̂i1 , ∆Θ̂i2 , ∆Θ̂i3 )Tgi can be directly used for triad update as shown in (101). However, if a rotation parametrization of the nodal triads via the SR mapping and nodal relative angles ϕ̂i according to Section 6.2.2 is employed, the rotation vector increments shall be expressed by means of additive increments ∆ϕ̂i of the nodal primary variables ϕ̂i as shown in (103). A relation between ∆Θ̂i1 and ∆ϕ̂i can easily be derived on the basis of equations (19) and (20): ∆Θ̂i1 = ∆ΘiMϕ̂ 1 + ∆ϕ̂i = − i i ḡiT 1 S(g1 ) ∆t + ∆ϕ̂i , iT i ||ti || 1 + g1 ḡ1 ∆ti = ∆r0 (ξi ) = H0 (ξi )∆d̂. (127) At the element boundary nodes, the last term in (127) can be simplified: ∆t j = ∆r0 (ξ j ) = H0 (ξ j )∆d̂ = ∆t̂ j if j = 1 or j = 2. Review: The triad interpolation scheme presented in this section is very similar to the approach proposed in the authors’ earlier contributions [104] (see Section 3.5.2). There, an intermediate triad field has been constructed in a manner similar to (113), but with the choice Λr = Λ1Mϕ̂ . While the most essential properties of these two approaches are comparable, there are some slight advantages of the procedure presented here: Choosing a material triad Λi as reference triad Λr makes the interpolation scheme independent from the choice of the nodal primary variables (according to Section 6.2.1 or according to Section 6.2.2). Furthermore, locating the reference triad at the element middle node makes the element formulation symmetric and extends the maximal orientation difference of the material triads at the element boundary nodes that can be represented from 180◦ to 360◦ . The latter property results from the maximal orientation difference of 180◦ allowed for two tangent vectors in order to yield a unique SR mapping (see also Section 2.2). Besides the authors’ earlier work [104], also the straight and anisotropic Kirchhoff-Love formulations from the literature exhibit the mentioned lack of symmetry (see requirement 4e) in Table 2). 33 Review: In [104], an alternative triad interpolation (see Section 3.5.1 of [104]) has been investigated, which defines an intermediate triad field Λ Mϕ (ξ) directly via the smallest rotation from the intermediate triad field Λ̄ Mϕ (ξ) of the last time step onto the current tangent vector field g1 (ξ) according to: Λh (ξ) = exp(S[ϕh (ξ)g1 (ξ)]) Λ Mϕ (ξ), nΛ X ϕh (ξ) = Li (ξ)ϕ̂i , Λ Mϕ (ξ) = sr(Λ̄ Mϕ (ξ), g1 (ξ)), Λ̄ Mϕ ,n+1 (ξ) = Λ Mϕ ,n (ξ). (128) i=1 At first glance, this interpolation seems to be more straightforward than (113) since no nodal triads are required for constructing the intermediate triad field. However, as shown in [104], an interpolation of this kind is neither objective nor path-independent. This non-objective and path-dependent interpolation has e.g. been applied by the anisotropic formulations from the literature (see requirement 3) of Table 2). 6.3. Requirements on spatial discretization methods In this section, essential requirements on the spatial discretizations of translational and rotational fields will be stated. Subsequently, different beam elements will be presented and the fulfillment of these requirements investigated. 6.3.1. Differentiability of discrete fields The first requirement for spatial discretization methods concerns differentiability. On the one hand, this requirement is related to the weak form of the balance equations: The highest arc-length derivative occurring in the weak form of the Simo-Reissner beam theory is of order one, leading to the requirement of at least C 0 -continuous discrete centerline and triad fields. Such a continuity at the element boundaries is provided by the Lagrange centerline interpolation (95) as well as by the two discussed approaches of triad interpolation according to Sections 6.2.3 and 6.2.4. The second arc-length derivative of the beam centerline in the weak form of the balance equations is a distinctive property of the Kirchhoff-Love beam theory and requires the interpolation of the centerline to be at least C 1 -continuous as guaranteed by (97). On the other hand, certain applications such as beam-to-beam contact formulations (see e.g. [106, 107]) benefit considerably from a smooth geometry representation and the existence of a well-defined tangent vector field along the entire beam centerline, which can conveniently be furnished by the Hermite interpolation (97). 6.3.2. Objectivity and path-independence The properties of objectivity and path-independence play a central role in the development of (geometrically exact) beam finite element formulations. The importance of these properties can be traced back to the nonlinear nature of the configuration space (resulting from the occurrence of large rotations) which complicates the interpolation of rotational quantities. Furthermore, it can be explained by the historic background that none of the early geometrically exact beam formulations fulfilled both of these properties (see [43]). As already explained in [43], the path-independence of the employed discretizations can directly be concluded from the fact that none of these interpolation schemes is based on any history values of interpolated quantities. Only the nodal primary variables depend on history values. However, the corresponding nodal displacements can always arise in a way such that the finite element solution is independent from the actual load path in case the considered physical problem is path-independent. In other words, the arising nodal displacements yield the path-independent solution to the discrete optimization problem (based on a proberly defined Lagrangian) which is associated with the path-independent physical problem. In the numerical investigations performed at the end of this chapter, this property will be verified. However, throughout this section, the fundamental property of objectivity, i.e. the invariance of the applied deformation measures under rigid body motions, will be investigated. Thereto, a rigid body translation rR and a rigid body rotation ΛR are superimposed onto the beam centerline curve r(ξ) and the triad field Λ(ξ). A rigid body motion is characterized by constant fields rR and ΛR along the beam, thus r0R ≡ 0 and Λ0R ≡ 0. In the following, the subscript (.)∗ denotes quantities that result from the superimposed rigid body motion, thus r∗ (ξ) = ΛR (r(ξ)+rR ) and Λ∗ (ξ) = ΛR Λ(ξ). A formulation is denoted as being objective if such a rigid body motion does not affect the material deformation measures Ω and Γ. It is straightforward to show that the space-continuous versions of the deformation measures Ω and Γ are objective, i.e. Ω∗ = Ω and Γ∗ = Γ (see e.g. [43]). The question of interest is if this objectivity is preserved by the employed spatial discretization 34 schemes. In [43], it is shown that the fulfillment of the following requirement guarantees for the objectivity of a geometrically exact beam formulation based on the Simo-Reissner theory as introduced in Section 3: r∗h (ξ)=Λ ˙ R (rh (ξ)+rR ) , Λ∗h (ξ)=Λ ˙ R Λh (ξ) → Ω∗h = Ωh , Γ∗h = Γh . (129) The following investigations will exclusively be applied to discretized quantities. In order to shorten notation, the subscript (.)h will be omitted throughout this section. First, it shall be shown that the validity of (129) is also sufficient for the invariance of the deformation measures (73) and (74) of the Kirchhoff beam theory. If (129) is valid, it follows: r∗0 (ξ) = ΛR r0 (ξ), r∗00 (ξ) = ΛR r00 (ξ), g∗i (ξ) = ΛR gi (ξ), 0 g∗0 i (ξ) = ΛR gi (ξ). (130) Based on (130), the axial tension, the Frenet-Serret curvature vector as well as the total torsion read:  0.5 ||r∗0 || = r0T ΛTR ΛR r0 = ||r0 || →  ∗ = ||r∗0 || − 1 = ||r0 || − 1 = , r∗0 × r∗00 ΛR (r0 × r00 ) ∗ T T T = = ΛR κ → g∗T i κ = gi ΛR ΛR κ = gi κ, ||r∗0 ||2 ||r0 ||2 ∗ ∗ 0T T 0T 0 K1∗ = K M1 + ϕ∗0 = g∗0T 2 g3 = g2 ΛR ΛR g3 = g2 g3 = K M1 + ϕ = K1 . κ∗ = (131) The identities Ω∗ = Ω and Γ∗ = Γ for the original and the rotated deformation measures (73) and (74) are a direct consequence of (131). Thus, also for Kirchhoff beam elements, the requirements (129) are sufficient in order to ensure objectivity. In the following, the validity of (129) will be investigated for the interpolations in Sections 6.1 and 6.2. 6.3.2.1. Objectivity of centerline interpolations. Due to the linear dependence of the centerline interpolations (95) or (97) on the nodal vectors, the proof of the first part of (129) is independent from the intermediate triad field:  r∗ (ξ) = ΛR (r(ξ)+rR ) for d̂∗i = ΛR d̂i +rR and t̂∗i = ΛR d̂i .  (132) 6.3.2.2. Objectivity of triad interpolation based on local rotation vectors. The fulfillment of (129), i.e. the objectivity of interpolation (105) has been shown in the original work [43]. The interested reader is referred to this reference. 6.3.2.3. Objectivity of triad interpolation based on ”Smallest Rotation” mapping. Based on the relations (130)-(132) and the strong fulfillment of the Kirchhoff constraint, the base vector g∗1 (ξ) resulting from the rigid body rotation yields: g∗1 (ξ) = ΛR r0 (ξ) r∗0 (ξ) = 0 = ΛR g1 (ξ). ∗0 ||r (ξ)|| ||r (ξ)|| (133) In a next step, the nodal primary variables are chosen such that the nodal triads are also rigidly rotated: Λi∗ = ΛR Λi . (134) Using (133), (134) and (15), the following relation between the vectors g Mϕ 2 (ξ) and g Mϕ 3 (ξ) of the intermediate triad Λ Mϕ (ξ) (see (113)) and their counterparts g∗Mϕ 2 (ξ) and g∗Mϕ 3 (ξ) resulting from the rigid body motion can be derived: g∗Mϕ i (ξ) = g∗ri − = ∗ g∗T ri g1 (ξ)  g∗1 (ξ)+g∗r1 ∗T ∗ 1+gr1 g1 (ξ) gT ΛT ΛR g1 (ξ) (ΛR g1 (ξ)+ΛR gr1 ) = ΛR g Mϕ i (ξ), ΛR gri − ri T R T 1+gr1 ΛR ΛR g1 (ξ) (135) i = 2, 3. From (133) and (135), it can be concluded that the intermediate triad field is rigidly rotated: Λ∗Mϕ (ξ) = ΛR Λ Mϕ (ξ). 35 (136) If the transformation property Λexp(S[a])ΛT =exp(ΛS[a]) ∀ Λ ∈ SO(3), a ∈ <3 together with (133), (134) and (136) is considered, the following result can be derived from the fourth equation of the triad interpolation scheme (113): i∗ i i exp(S[ϕi∗ gi∗ ˙ i∗ Λ∗T Mϕ (ξ ) = 1 ]) = exp(S[ϕ ΛR g1 ])=Λ ΛR Λi ΛTMϕ (ξi )ΛTR = ΛR exp(S[ϕi gi1 ])ΛTR = exp(S[ϕi ΛR gi1 ]) → ϕi∗ = ϕi . (137) Thus, the interpolation ϕ(ξ) in (113) is unchanged by the rigid body motion, i.e. ϕ∗ (ξ) = ϕ(ξ). Together with equations (133) and (136), the desired result for Λ∗ (ξ) as already stated in (129) can be derived: Λ∗ (ξ) = exp(S[ϕ∗ (ξ)g∗1 (ξ)]) Λ∗Mϕ (ξ) = exp(S[ϕ(ξ)ΛR g1 (ξ)])ΛR Λ Mϕ (ξ) =ΛR exp(S[ϕ(ξ)g1 (ξ)])ΛTR ΛR Λ Mϕ (ξ) = ΛR exp(S[ϕ(ξ)g1 (ξ)])Λ Mϕ (ξ) = ΛR Λ(ξ).  (138) In the reformulations made in (138), again use has been made of the transformation property from above and (113). According to (138), the triad interpolation proposed in Section 6.2.4 fulfills the requirement of objectivity. As mentioned above and derived in the third line of (131), the fulfillment of (129) guarantees for objective deformation measures, provided that these are consistently derived from the triad interpolation. In order to verify this latter restriction, the two individual contributions K M1 and ϕ0 appearing in the third line of (131) shall be subject to a closer investigation. Besides the relation ϕ∗ (ξ) = ϕ(ξ) → ϕ∗0 (ξ) = ϕ0 (ξ), which has already been deduced above, also the ∗ torsion K M1 of the intermediate system can be calculated for the configuration resulting from the rigid body motion: ∗ KM =− ϕ1 κ∗Tg1I∗ =− I∗ 1+g∗T 1 g1 κT ΛTR ΛR g1I 1+gT1 ΛTR ΛR g1I =− κTg1I 1+gT1 g1I = K Mϕ 1 .  (139) ∗ As expected, K Mϕ 1 is not affected by the rigid body motion and the torsion K1∗ = K M1 +ϕ∗0 = K M1 +ϕ0 = K1 remains unchanged. This underlines the objectivity of the interpolation (113) and the consistency of the torsion measure. 6.3.3. Avoidance of locking effects It is well-known that purely displacement-based finite elements are prone to locking. Locking effects particularly relevant for geometrically exact beam formulations are shear locking as well as membrane locking. While shear locking can - by definition - only appear in beam formulations of Simo-Reissner type, membrane locking has already been observed for geometrically linear Kirchhoff beams (see e.g. [5] or [6]). In general, membrane locking refers to the inability of elements to exactly reproduce inextensibility, viz. a vanishing axial strain  ≡ 0, for curved structures such as shells or beams. This behavior can be traced back to a coupling between the kinematic quantities describing the axial tension mode and the curved geometry. While the focus of the subsequent investigations lies on membrane locking, at least some remarks concerning shear locking will be made at the end of this section. 6.3.3.1. Characterization of locking. One possible definition of locking is the deterioration of the spatial convergence rate in dependence of a certain key parameter. Subsequent investigations will reveal that the element slenderness ratio ζele := lele /R plays the role of such a key parameter associated with the membrane locking effect of slender beams. One question of interest is how the liability of a finite element formulation to locking can be assessed in a quantitative manner. From a mathematical point of view, this question can be answered by investigating the stability of the finite element formulation. For example, for mixed finite element formulations, a stability criterion is given by the wellknown Ladyshenskaya-Babuska-Brezzi (LBB) condition, also denoted as inf-sup condition (see [29, 30]). Since a direct and general analysis of such conditions can often be intricate, also numerical inf-sup tests have been suggested in the literature (see e.g. [77, 12]). From a mechanical point of view, locking is typically explained by the occurrence of parasitic stresses, viz. the occurrence of modes in the discrete solution that are not part of the analytical solution. Consequently, the question if a formulation is prone to locking or not can also be answered by investigating proper representative test cases for parasitic stresses. Besides these mathematical and mechanical interpretations of locking, a third, namely a numerical perspective (see [89]) can be helpful. From a numerical point of view, locking can be seen as the consequence of an over-constrained system of equations. As introduced in [69], the so-called constraint ratio 36 allows for some, at least heuristic, evaluation of the locking behavior of a finite element formulation. The constraint ratio is defined as the ratio of the total number of equilibrium equations neq to the total number of constraints neq,c : r := neq . neq,c (140) In order to analyze the locking behavior, the constraint ratio r of the continuous problem and the constraint ratio rh of the discretized problem evaluated for an infinite number of elements have to be compared. The underlying proposition is that elements with rh < r (especially rh < 1, which means that more constraints than degrees of freedom are present) have a tendency to lock, whereas values rh > r of the constraint ratio indicate that not enough constraint equations are available in order to reproduce the constraint in an accurate manner. Following this hypothesis, the case rh = r has to be regarded as the optimal constraint ratio. Throughout this contribution, the relevant locking phenomena will be analyzed based on a mechanical as well as a numerical perspective. The corresponding concepts are applicable in a straightforward manner. In future work, the stability of the most promising element formulations also has to be investigated in a mathematically rigorous manner, either based on direct analysis or on numerical stability tests. 6.3.3.2. Membrane locking. In [105], the effect of membrane locking in the context of geometrically exact Kirchhoff beam elements based on a Hermite centerline interpolation according to Section 6.1.2 has been investigated in detail. Here, only the main results shall be recaptulated. In [105], it has been found that the state of (exactly) vanishing axial strains can only be represented for straight configurations but not for abritariy curved configurations. Furthermore, the amount of parasitic axial strain energy occuring in states of pure pending has been shown to increase quadratically with the beam element slenderness ratio leading to a progressively (over-) stiff system answer. The constraint ratios of the space-continuous and discrete 2D Kirchhoff-Love beam problem have been determined to r = 2 > rh = 1, indicating that the considered element formulation is prone to membrane locking. Different solution strategies exist in order to get rid of these locking effects. In [105], the approach of Assumed Natural Strains (ANS, see e.g. [70]), Reduced Integration (RI, see e.g. [109]) and an alternative procedure proposed in [105] and denoted as Minimally Constrained Strains (MCS), have been compared. The proposed MCS scheme can be characterized as an assumed strain/B-bar approach (see e.g. [133]), and it can be derived in a variationally consistent manner. Concretely, the contribution G of the axial tension to the weak form of the mechanical equilibirum equations is replaced by G¯ :  G = δr0Tg1 EA ||r0 ||−1 |{z} | {z } ¯ (ξ) = G¯ = δ¯ EA¯ ,  δ nCP X → i i L (ξ)(ξ ), i=1 δ¯ (ξ) = nCP X k=1 i i L (ξ)δ(ξ ), 1 Π̃int, = EA¯ 2 . 2 (141) In (141), ξi denotes the parameter coordinate and nCP the number of Collocation Points (CPs) where the ”original“ strains are evaluated. Moreover, Li (ξ) are Lagrange shape functions of polynomial order nCP −1. Linearizing (141) at the undeformed, straight configuration C0 , yields the B-bar structure typical for geometrically linear finite elements: nCP X T T T L(G )|C0 := δd̂ H0Tt0 K tT0 H0 ∆d̂, L(G¯ )|C0 = δd̂ B̄ K B̄∆d̂, B̄(ξ) = Li(ξ)B(ξi ). |{z} |{z} BT i=1 B In the last equation, the additional abbreviation K := EA has been introduced in order to shorten the notation. Remark: Actually, the residual vector stated in (161) consists of functional expressions that cannot be integrated exactly by Gauss integration. However, in numerical simulations, the deviations in the results for a number of Gauss points nG > 4 turned out to be very small as compared to the discretization error. Therefore, the notion ”exact integration“ will be used whenever four or more Gauss points are applied. 37 (142) Remark: In the last section, it has been shown that the strain field (ξ) is objective and path-independent, meaning that the strain field does not change as a consequence of a rigid body motion and that its value at a certain configuration is independent from the deformation path leading to that configuration. Since the assumed strain field ¯ (ξ) represents a pure re-interpolation of the original strain field (ξi ) evaluated at fixed collocation points ξi , the former will also fulfill objectivity and path-independence. In [105], the number and location of CPs has been chosen according to nCP = 1 and ξ1 = −1, ξ2 = 1, ξ3 = 0. In order to motivate this choice, the constraint ratio resulting from the MCS method and different sets of CPs as well as for the alternative methods RI and ANS will be presented in the following. In case of a strain re-interpolation such as given by (141), it is sufficient that the constraint of vanishing axial strains is fulfilled at the collocation points in order to end up with a vanishing axial strain energy. Since the Hermite interpolation (97) provides a C 1 -continuous centerline curve, the first derivative r0 and consequently also the axial tension  is C 0 -continuous at the element boundaries. Thus, exactly one constraint equation ||r0 (ξi )||=1 ˙ results from each (interior and element boundary) CP. Remark: The chosen CPs are motivated by strain-continuity: If the axial strains were not C 0 -continuous at the element boundaries, each element boundary node would provide two constraint equations, one for the previous element (e) and one for the subsequent element (e+1), i.e. ||r0 (ξ(e) = 1)||=1 ˙ and ||r0 (ξ(e+1) = −1)||=1. ˙ In the following table, the constraint ratios resulting from the three methods ANS, RI and MCS are compared for different choices concerning number and locations of collocation or Gauss points. As shown in [105], the ANS approach has to be based on CPs with vanishing axial strain values for a pure bending state, which requires four CPs. neq,c rh /r MCS-3b 2nele +1 1 MCS-2b nele +1 2 MCS-3i 3nele 2/3 MCS-2i 2nele 1 ANS-4i 4nele 0.5 RI-3i 3nele 2/3 RI-2i 2nele 1 Table 3: Quantitative comparison of different ”anti-locking” methods. The index i in Table 3 indicates that all collocation or Gauss points lie in the elements interior while variants that are marked by an index b also employ the element boundary nodes ξ = ±1. According to the statements made above, the variants with rh /r = 1 represent the constraints associated with the axial tension in an optimal manner, whereas variants with rh /r < 1 have a tendency to lock. Consequently, at first glance, the variants MCS-3b, MCS-2i and RI-2i seem to be equally suitable. However, as derived in [105], the variants MCS-2i and RI-2i will lead to an underconstrained system of equations, allowing for zero-energy modes and yielding a singular system of equations and a rank deficient stiffness matrix in the straight configuration, while the variant MCS-3b exactly provides the minimal number of constraint equations required in order to avoid such zero-energy modes in the straight configuration. For that reason, this method has been denoted as method of Minimally Constrained Strains. Similarly, an optimal constraint ratio of rh = r = 4 and the avoidance of zero-energy modes can be verified for this choice CPs in the general 3D case. Remark: Of course, locking would be avoided if the beam elements could exactly represent the internal energy associated with pure bending. According to [105], the MCS method fulfills this requirement only for straight configurations while arbitrary curved configurations will yield a slightly over-constrained system of equations. Thus, the state of constant curvature and vanishing axial tension cannot be displayed exactly. However, it has been shown numerically that membrane locking is avoided. This result is reasonable, since the variant MCS-3i still fulfills the optimal constraint ratio r/rh = 1 for arbitrarily curved configurations. Remark: As an alternative to the variant MCS-3i, also a reduced Gauss-Lobatto integration scheme with integration points ξ1 = −1, ξ2 = 1 and ξ3 = 0 could be applied to the axial tension term of the weak form, yielding the same number of constraint equations neq,c = 2nele +1 as the MCS approach. However, within this contribution, the MCS method will be preferred due to its arguably more consistent variational basis and the uniform integration scheme resulting for the individual work contributions of the weak form. All in all, it can be concluded that the choice of the element boundary nodes and the element midpoint as CPs of the MCS method leads to the minimal possible number of constraint equations and to an optimal constraint ratio. Con38 sequently, a successful avoidance of locking effects could be confirmed for this approach. A similar effectiveness can be expected for a reduced Gauss-Lobatto integration of the axial tension terms with integration points ξ1 = −1, ξ2 = 1 and ξ3 = 0. On the contrary, the minimal number of three integration points possible for a reduced Gauss-Legendre integration scheme leads to an increased constraint ratio of rh = 3 > r and consequently to a suboptimal locking behavior. While the MCS and RI methodologies aim at a reduction of the number of constraint equations, the functional principle of the ANS approach is different: There, parameter coordinates have to be determined where the constraint is already correctly fulfilled by the original element formulation (when applying the latter to a representative test case). These parameter coordinates are typically chosen as CPs for the ANS approach. Such a procedure can avoid locking effects in a manner that is independent of the number of constraint equations. The drawback of the ANS method is that the positions of these points may change for general deformation states in the geometrically nonlinear regime, which might considerably deteriorate the effectiveness of this approach. All these theoretical considerations recommend the proposed MCS approach as method of choice in order to avoid locking effects for the Kirchhoff beam elements considered in this contribution. The numerical results presented in [105] have confirmed this prediction. Review: In all the three categories isotropic, straight and anisotropic large-deformation geometrically exact Kirchhoff-Love finite elements available in the literature (see requirement 4b) in Table 2), the consequences of membrane locking have been observed. However, a rigorous treatment seems to be missing in these works. For example, in [151], oscillations of the membrane forces have been observed and cured by means of a special force averaging procedure. However, this procedure seems to be rather a post-processing step than an invasion in the actual finite element formulation that would also improve the final displacement solution. In [154], the axial tension term of the weak form is replaced by an averaged element-wise constant approximation of (ξ) in order to be able of exactly representing the solution of a straight beam under axial load. However, the influence of this procedure on membrane locking effects in curved configurations, i.e. configurations that are actually relevant for membrane locking, has not been investigated. Finally, [64] proposes a mixed finite element formulation in combination with a multi patch B-spline approach in order to treat the locking effects. Interestingly, the third-order variant of these B-spline patches could be identified as Hermite interpolation comparable to (97), which turned out to be favorable for the avoidance of locking as compared to single B-spline patches due to the lower inter-element continuity enforced by the former approach. However, the geometrical compatibility equations of the multi patch approach as well as the considered numerical examples seem only to cover the geometrically linear regime. In contrast, the numerical examples in [105] and Section 11 of this work confirm that this gap could be closed by the proposed MCS method, which successfully cures membrane locking in 3D large-deformation problems. 6.3.3.3. Shear locking. The phenomenon of shear locking does not lie in the focus of the current work. Nevertheless, the cause for such locking effects shall at least be briefly compared with the situation already discussed for membrane locking. Shear locking denotes the inability of a finite element to exactly represent the state of vanishing shear strains. This situation can again be illustrated by means of a pure bending example. It is assumed that the beam centerline is discretized either by Lagrange polynomials according to (95) or by Hermite polynomials according to (97) and that the triad interpolation is given by (105). It has already been stated that the triad interpolation (105) can exactly represent constant curvatures. On the other hand, it has been shown that the Hermite centerline representation (and also its counterpart based on Lagrange polynomials) cannot exactly display the state of constant curvature. This means, the state r0T(ξ)g2 (ξ) ≡ r0T(ξ)g3 (ξ) ≡ 0 cannot be displayed exactly in combination with a constant curvature. In other words, the interpolation spaces applied to the translation (i.e. to the beam centerline) and to the rotation field (i.e. to the triad field) do not optimally match in the sense that a state of constant curvature and vanishing shear deformation cannot be represented exactly. Similar to membrane locking, the ratio of the shear stiffness to the bending stiffness increases quadratically with the beam element slenderness ratio. Thus, again the element slenderness ratio represents the key parameter for this locking effect. Further 2D investigations on membrane and shear locking effects in geometrically linear and nonlinear shear-deformable beam element formulations can for example be found in [73]. 39 Review: At the end of this section, also a view considerations shall be made concerning element patch tests (requirement 4d) in Table 2). Such a patch test for geometrically exact beams could for example require the exact representability of a state of constant 3D curvature (bending and torsion) and constant axial tension (as well as constant shear-deformation in case of Simo-Reissner formulations). The beam centerline curve associated with such a configuration is given by a helix with constant slope as investigated in the numerical example of Section 11.3. In the following, it will be distinguished, if only the strain energy associated with such a state can exactly be represented or if additionally also the beam geometry in terms of centerline and triad field of such a state can exactly be represented. In Sections 9 and 11.3, it will be verified theoretically and numerically that the SK element formulations based on strong enforcement of the Kirchhoff constraint and proposed in Section 9 can in general neither represent the strain energy nor the beam geometry associated with such a state. Due to the identical measure κ of centerline curvature and the comparable centerline discretizations employed by the isotropic, straight and anisotropic Kirchhoff-Love formulations from the literature, it can directly be concluded that also none of these formulations can fulfill this patch test, neither in the energetic nor in the geometrical sense (see again Table 2). On the other hand, it will be verified theoretically and numerically that the WK element formulations based on weak enforcement of the Kirchhoff constraint (see Section 10) as well as the Simo-Reissner formulation proposed by Crisfield and Jelenić [43, 80] (denoted as CJ element in Section 7) can represent the exact energy state of the patch test due to the employed geodesic triad interpolation (and an appropriate collocation scheme such as MCS or reduced integration for coupling the centerline and the triad field), but not the exact geometry. There exist a few very recent 3D Simo-Reissner beam element formulations that can exactly represent such a patch case in the energetic but also in the geometrical sense. Unfortunately, an explicite analytic representation of the discretization underlying these formulations in form of a helicoidal interpolation applied to the triad and to the centerline field is only possible for first-order interpolations [145, 139, 138]. As emphasized in [99], such a helicoidal scheme can be identified as one geodesic interpolations on the semidirect product manifold SE(3) := <3 o SO(3), denoted as Special Euclidean group, while e.g. the formulation of Crisfield and Jelenić [43, 80] consists of two individual geodesic interpolations, a linear one with constant slope on the Euclidean vector space <3 as well as a spherical interpolation with constant curvature on the Special Orthogonal group SO(3), together composing a interpolation scheme on the direct product manifold <3 × SO(3). An extension of these helicoidal interpolations to higher-order schemes is e.g. given by [156, 157]. There, a closed-form representation of the interpolation has not been possible anymore and the triad and centerline field have been generated out of the strain field in an implicit manner via numerical integration. In contrast to Simo-Reissner formulations, Kirchhoff-Love element formulations should typically be of higher-order in order to guarantee for C 1 -continuity and reasonable convergence orders (see also Section 6.3.4). It is not clear if the increased numerical effort required for implicitly defining higher-order helicoidal fields via numerical integration could overcompensate possible advantages in terms of higher approximation quality when developing comparable Kirchhoff-Love element formulations that exactly fulfill the patch test in the energetic and geometrical sense. At least, it seems to be a promising direction of future research to compare formulations of this kind with the Kirchhoff-Love elements proposed here. 6.3.4. Optimal convergence orders In order to compare the convergence behavior of different finite element formulations, a well-defined error measure is required. Thereto, the following relative L2 -error ||e||2rel will be considered in the numerical examples of Section 11: s ||e||2rel = 1 umax 1 l Z l ||rh − rre f ||2 ds. (143) 0 In (143), rh denotes the numerical solution of the beam centerline for a certain discretization. For all examples without analytic solution, the standard choice for the reference solution rre f is a numerical solution via the WK-TAN element (see Section 10.2) employing a spatial discretization that is by a factor of four finer than the finest discretization shown in the convergence plot. The normalization with the element length l makes the error independent of the length of the considered beam. The second normalization leads to a more convenient relative error measure, which relates the 40 L2 -error to the maximal displacement umax of the load case. For some examples, also the relative energy error ||e||e,rel = Πint,h − Πint,re f , Πint,re f (144) will be considered. Here, Πint,h and Πint,re f represent the stored energy functions (see e.g. 75) associated with a certain discretization and with the reference solution. Before the convergence plots of selected numerical examples will be considered, the optimal convergence rates in the norms (143) and (144) expected for the different beam element formulations shall be briefly discussed. The convergence in the energy error (which is minimized by the finite element method) is dominated by the highest derivative m of the primary variable fields r(ξ) and Λ(ξ) occurring in the energy (see e.g. 75) and consequently in the weak form. Since the employed hyperelastic stored energy functions represent quadratic forms in the derivatives of these primary variable fields, the convergence rate in the energy error yields: ||e||e = O(h2(k−m+1) ). (145) Here, h := lele is the element length and k the polynomial degree completely represented by the trial functions. In [142], the convergence rate of the L2 -error for the Ritz solution to a variational problem of order m is shown to be: ||e||2 = O(hk+1 + h2(k−m+1) ). (146) The second term in (146) represents the dependence of the L2 -error convergence rate on the energy error convergence, reflecting the variational basis of the finite element method. The first term represents the pure polynomial approximation of the trial functions with respect to the considered primary variable field, e.g. r(ξ). In most cases, e.g. when displacement-based solid elements are considered, the first exponent is smaller than the second one and dominates the overall discretization error. For this reason, only the first term is considered by many authors. However, in the following, it will be shown that especially for Kirchhoff type beam elements also the second term of (146) is important. Thereto, the expected convergence rates for Reissner and Kirchhoff type beam elements shall briefly be discussed. 6.3.4.1. Element formulations of Simo-Reissner type. The highest derivative of primary variable fields occurring in the weak form associated with the Simo-Reissner beam problem is m = 1. Thus, for the third-order (k = 3) Reissner beam elements considered in this work, a convergence rate of six is expected in the energy error (144), while the L2 -error is dominated by the first term of (146) leading to a corresponding optimal convergence rate of four. 6.3.4.2. Element formulations of Kirchhoff-Love type. The subsequently proposed Kirchhoff beam elements will lead to the values k = 3 for the polynomial degree of the triad functions and m = 2 for the highest arc-length derivative in the weak form. Consequently, the convergence of the energy error is of order four. Furthermore, the exponents of both terms in (146) take on a value of four, also leading to an expected convergence rate of four for the L2 -error. Thus, also the second, energy-related term has to be considered for Kirchhoff problems of this kind. For that reason, at least polynomials of order three should be chosen as trial functions for Kirchhoff beam elements: Reducing the polynomial degree from k = 3 to k = 2 would lead to an undesirable decline in the L2 -convergence rate from four to two. Thus, the third-order Kirchhoff beam elements proposed in this work can be regarded as approximations of the lowest order that is reasonable from a numerical point of view. However, the fact that both exponents of (146) take on the same value for k = 3 also means that in some cases, usually for examples involving complex deformation states and strain distributions, the second, energy-related term might determine the overall error-level. Thus, in order to fully exploit the approximation power of the employed discretization, it can often be sensible to apply trial functions of increased polynomial degree k > 3. In this case, the first term of (146) will determine the overall error level for sufficiently fine discretizations (since the second term converges faster) and consequently the discretization error is exclusively limited by the approximation power of the applied polynomial order. The extension of the proposed Kirchhoff beam elements to Hermite interpolations of order k > 3 is possible in a straightforward manner and will be treated in future research work. In the numerical example of Section 11.2, a first proof of concept will be given for such an extension. 41 Remark: Based on these considerations the question arises, which trial function orders kS R and kKL of formulations based on the Simo-Reissner and the Kirchhoff-Love theory have to be chosen in numerical examples in order to perform a reasonable comparison of their convergence behavior. The answer to this question depends on the primary interest, which might either lie in the L2 - or in the energy convergence. Here, the third-order Kirchhoff elements are compared to third-order Reissner elements, leading to equal L2 - but to different energy error rates. Alternatively, one could compare the third-order Kirchhoff elements with second-order Reissner elements, leading to equal energy error rates but to different L2 -error rates. Review: Later in Section 9, a quadratic interpolation will be applied to the relative angle field ϕh (ξ) of the interpolation scheme (113). Since the orientation of the material triad field is determined by the relative angle ϕh (ξ) as well as the tangent vector field r0h (ξ), with the latter being a polynomial of order two, this second-order interpolation is sufficient for triad field discretization. Even a higher polynomial degree for ϕh (ξ) could not further improve the exact polynomial representation of rotational strains, which is of first order. On the other hand, if ϕh (ξ) was only interpolated linearly, only the constant term of rotational strains could be exactly represented and the second term in (146) would dominate the L2 -convergence leading to a decline in the expected optimal order to two. In Meier et al. [104], these considerations have been confirmed numerically. The Kirchhoff-Love formulations of straight type (see requirement 4a) in Table 2) also apply only a first-order interpolation for the relative angle ϕh (ξ) and a comparable intermediate triad definition. Thus, also for these formulations a decline in the optimal convergence order from for to two is expected. 6.3.5. Conservation properties Since the finite element solution converges towards the corresponding analytic solution in the limit of fine spatial discretizations, elementary properties of the analytic solution such as conservation of linear momentum (or rather equilibrium of forces in statics), conservation of angular momentum (or rather equilibrium of moments in statics) as well as conservation of energy (or rather balance of external and internal work for non-conservative problems) will also be fulfilled by the numerical solution for lele → 0. However, often it is desirable to provide such properties already for arbitrarily rough spatial discretizations. The question, if these properties of the space-continuous problem are inherited by the spatially discretized problem, will later be investigated for the different beam element formulations proposed in subsequent sections. Thereto, use will be made of the fact that the discretized weak form of the balance equations is fulfilled for arbitrary values of the nodal primary variable variations. Choosing the nodal primary variable variations such that the associated virtual motion represents a rigid body translation given by (δrh (ξ), δθh (ξ)) ≡ (u0 , 0) ∈ Vh with u00 = 0, (147) allows to investigate the conservation of linear momentum. The special choice (147) leads to δr0h (ξ) ≡ δθh0 (ξ) ≡ 0 and to vanishing contributions of the internal forces and moments in the discretized weak forms (33) and (81) associated with the Simo-Reissner and the Kirchhoff-Love beam theory. Inserting (147) into these weak forms yields l̇ = fext Zl with l := l̃ds, fext = 0 Zl h i f̃ds + fσ , (148) Γσ 0 and to exact conservation of linear momentum l = const. for the unloaded system, viz. if fext = 0. Since reaction forces at Dirichlet supports are also included in fext , (148) is equivalent to the equilibrium of forces in the static case, i.e. if l = 0. Similarly, a choice of the nodal primary variable variations representing a rigid body rotation given by (δrh (ξ), δθh (ξ)) ≡ (w0 × rh (ξ), w0 ) ∈ Vh with w00 = 0, (149) allows to investigate the angular momentum. Relation (149) leads to δr0h (ξ) ≡ w0 ×r0h (ξ) as well as δθh0 (ξ) ≡ 0 and again to vanishing contributions of the internal forces and moments in the discrete versions of the weak forms (33) and (81) associated with the Simo-Reissner and the Kirchhoff-Love beam theory. Inserting (149) into these weak forms yields: Zl Zl   h i ḣ = mext , h := (h̃+r× l̃)ds, mext = r × f̃ + m̃ ds+ r × fσ +mσ , Γσ 0 0 42 (150) and to exact conservation of angular momentum h = const. for the unloaded system, viz. if mext = 0. Since possible reaction moments at Dirichlet supports are also included in mext , relation (150) is equivalent to the equilibrium of moments in the static case, i.e. if h = 0. Finally, a choice of the nodal primary variable variations according to (δrh (ξ), δθh (ξ)) ≡ (ṙh (ξ), wh (ξ)) ∈ Vh , (151) allows to investigate the mechanical power balance. Inserting (151) into the discrete versions of the weak forms (33) ˙ = and (81) associated with the Simo-Reissner and the Kirchhoff-Love theory, and making use of the relations Π̃ int ˙ w0T m+(ṙ0 −w×r0 )T f and Π̃kin = wTcρ a (see Section 3.4) as well as wT S(w)cρ w = 0, yields the following relation Π̇kin + Π̇int = Pext with Pext # " # Zl " = ṙT f̃ + wTm̃ ds + ṙTfσ + wTmσ , 0 (152) Γσ and consequently to exact energy conservation Πkin + Πint = const. for the unloaded system, viz. if Pext = 0. So far, it has been shown that exact conservation of linear momentum, angular momentum and energy (see equations (148), (150) and (153)) can be guaranteed for the spatially discretized (and time-continuous) problem, provided the special choices (147), (149) and (151) for the translational and rotational variation fields are contained in the discrete weighting space Vh of the considered finite element formulation. In the following sections, the question if (147), (149) and (151) can indeed be represented by the discrete weighting functions, will be investigated for the proposed beam element formulations. Of course, also the time integration scheme influences the conservation properties of the fully discrete system considerably. However, the investigation of this factor does not lie within the scope of this work. In general, it can be stated that the three conservation properties considered above will be fulfilled by a finite element formulation if i) the formulation is objective and path-independent and ii) the test functions are consistently derived in a Bubnov-Galerkin manner. The first pre-requisite ensures that a unique potential exists in form of a discrete storedenergy function that is path-independent and invariant under rigid body motions. The second pre-requisite ensures that the corresponding contribution to the weak form represents exact increments of this potential, which fulfills the third requirement (153) per definition, but also the first and second requirement (148) and (150), since infinitesimal rigid body translations and rotations according to (147) and (149) will lead to vanishing increments of this objective potential. However, the opposite conclusion does obviously not hold true: Also Petrov-Galerkin formulations can at least fulfill the first and second requirement (148) and (150) if the chosen test functions can represent rigid body translations and rotations (147) and (149) (see e.g. CJ element of Section 7 or WK element of Section 10). Review: Following the argumentation from above, it can be expected that the objective and pathindependent Bubnov-Galerkin FEM discretizations employed in the formulations of the straight type (see requirement 4) of Table 2) will in general fulfill the above conservation properties as long as the variation and discretization process required to derive the test functions is conducted in a consistent manner and no additional approximations (e.g. small tension assumptions according to ||r|| ≈ 1 as discussed in [155]) are applied that could spoil this consistency. The situation is slightly different for the anisotropic formulations: The non-objective and path-dependent character of the employed discrete deformation measures might in general lead to non-vanishing energy increments for infinitesimal rigid body translations and rotations according to (147) and (149). The exact representation of these non-vanishing energy increments resulting from consistently derived Bubnov-Galerkin test functions may in this case exactly be the reason that the conservation properties (148) and (150) will be spoiled. Eventually, also the existing Kirchhoff-Love formulations of the straight type in Table 2 shall be discussed. There, a standard polynomial interpolation based on Lagrange shape functions is applied to the tangential spin vector component δΘ1 similar to the Petrov-Galerkin variant (116). Consequently, as shown in equation (125), also these formulations cannot represent constant spin vector distributions and exact conservation of angular momentum (150). 43 It can be shown that these straight formulations indeed represent Petrov-Galerkin formulations, which in turn can also not guarantee for the conservation of energy (153). To verify this statement, the following considerations are made: If the discrete spin vector field employed in [28] is consistent with the underlying triad interpolation in a Bubnov-Galerkin sense is not straight-forward to be answered, since no explicit triad interpolation scheme is given (and required) by the considered isotropic formulations. However, at least the arc-length derivative of the discrete triad field is defined by the employed torsion interpolation, which is based on Lagrange polynomials in [28] or [151]. The consistent Bubnov-Galerkin interpolation can then be identified based on the second compatibility condition in (72) an reads: δΘ01h (ξ) = δK1h (ξ)−δg1h (ξ)T(g1h (ξ)×g01h (ξ)), (153) Since K1h (ξ) has been interpolated via Lagrange polynomials, r0h (ξ) has been interpolated via Hermite polynomials and the relation g01h (ξ) = r0h (ξ)/||r0h (ξ)|| holds, a consistent Bubnov-Galerkin interpolation of the tangential spin vector component δΘ1h (ξ) fulfilling (153) cannot be based on a pure polynomial interpolation as done in the mentioned references. Consequently, these interpolations are of Petrov-Galerkin type. 7. Simo-Reissner Beam Element Throughout this work, the Reissner type beam element formulation proposed by Crisfield and Jelenić [43, 80], in the following referred to as CJ element, will serve as reference formulation for numerical comparisons. In the next section, the main constituents required to derive the element residual vector will be presented. In the subsequent Sections 7.2 and 7.3, this element formulation will be investigated with respect to possible locking effects and the fulfillment of mechanical conservation properties as introduced in Sections 6.3.3 and 6.3.5. 7.1. Element residual vector In this section, the element residual vector of the CJ element will be derived from the general, space-continuous Simo-Reissner beam problem. First, all trial and weighting functions are replaced by their discrete counterparts taken from the finite-dimensional trial subspace (rh , Λh ) ∈ Uh ⊂ U and the weighting subspace (δrh , δθh ) ∈ Vh ⊂ V. In the following, nn -noded finite elements with the vectors of nodal primary variables x̂CJ := (d̂1T, ψ̂1T, ..., d̂nn T, ψ̂nn T )T and δx̂CJ := (δd̂1T, δθ̂1T, ..., δd̂nn T, δθ̂nn T )T are considered. The centerline interpolation is based on Lagrange polynomials of order nn −1 according to Section (6.1.1), i.e. nr = nn . Furthermore, the rotation field interpolation follows equation (105) of Section 6.2.3 based on nΛ = nn nodes, in combination with a Petrov-Galerkin approach for the spin vector discretization given by (109). In contrast to the original works [43, 80], here the modified generalized-α scheme of Section 5 is employed for time integration, defining the velocities and accelerations required for the inertia forces fρ and moments mρ as stated in (42). Inserting these interpolation schemes as presented in the previous sections into the weak form of the balance equations (33) yields the element residual vector contributions rCJ,d̂ and rCJ,θ̂ according to rCJ,d̂ Z1   h i = L0T f − LT f̃ρ J(ξ)dξ − LT fσ , Γσ −1 rCJ,θ̂ = Z1  (154)  h i L0T m − LT S(t)f − LT m̃ρ J(ξ)dξ − LT mσ = 0. Γσ −1 The subscripts (.)d̂ and (.)θ̂ distinguish the residual vector contributions associated with the variations δd̂i and δθ̂i . Within this work, a linearization ∆rCJ = kCJ ∆x̂CJ based on multiplicative rotation increments ∆θ̂i according to ∆x̂CJ := (∆d̂1T, ∆θ̂1T, ..., ∆d̂nn T, ∆θ̂nn T )T as given in [80] is employed. In dynamics, the element residual vector rCJ and stiffness matrix kCJ slightly differ from the original work [80] due to the applied time integration scheme. 44 7.2. Avoidance of locking effects In [43] and [80], the authors proposed a reduced Gauss integration scheme in order to avoid shear locking and membrane locking in the range of high beam slenderness ratios. Thereto, nn − 1 integration points have been employed for the integration of the internal force contribution of a nn -noded element. The effectiveness of this procedure will be verified in subsequent numerical examples and shall be briefly motivated by the following considerations: The 3D Simo-Reissner beam problem is based on neq = 6 differential equations (32) describing the beam problem and pointwise neq,c = 3 constraint equations in order to represent the state of vanishing axial strains r0T g1 ≡ 1 and vanishing shear strains r0T g2 ≡ r0T g3 ≡ 1 prevalent in a pure bending problem. Consequently, the constraint ratio of the space-continuous problem yields r = neq /neq,c = 2. As consequence of the reduced integration, the discrete number of constraint equations takes on a value of neq,c = 3 · (nn −1) · nele . Given the total number of equations neq = 6(nn −1) · nele after application of proper Dirichlet conditions, the constraint ratio of the discrete problem results in: rh = lim nele →∞ 3 · (nn −1) · nele = 2 = r. 6(nn −1) · nele (155) Relation (155) yields the optimal constraint ratio for this element formulation. Consequently, no locking effects are expected. The investigations made so far can be further refined by realizing that the CJ element can exactly represent the internal energy associated with a 3D pure bending state. In order to understand this statement, the internal energy is split into contributions stemming from torsion and bending and into contributions stemming from axial tension and shear deformation, i.e. Πint,h = Πint,Ω,h +Πint,Γ,h . For a pure bending state, the energy contribution Πint,Γ,h has to vanish, and thus the total internal energy of a pure bending state is given by Πint,Ω,h , which in turn is uniquely defined by the curvature vector field Kh (ξ) = const. In order to represent the desired (constant) distribution of the curvature vector field Kh (ξ), which is possible for the employed triad interpolation (105), only (nn − 1) · nele of the (nn − 1) · nele + 1 nodal rotation vectors have to arise properly, while the one remaining nodal rotation vector describes rotational rigid body modes of the beam. Since the curvature vector field is defined via the arc-length derivative of the rotation field, this one remaining nodal rotation vector can also be interpreted as integration constant resulting from an integration of the curvature field. Additionally, the nodal position vectors have to arise in a way such that Πint,Γ,h = 0. While the requirement Γh (ξ) ≡ 0 cannot be fulfilled exactly for the employed triad trial function spaces, the reduced Gauss integration scheme applied for the CJ element yields a finite number of 3·(nn −1)·nele constraint equations in order to satisfy Πint,Γ,h = 0. Thus, similar to the rotation field, only (nn−1) · nele of the (nn−1) · nele+1 nodal position vectors have to arise properly in order to fulfill these constraint equations, while the one remaining nodal position vector describes translational rigid body modes of the beam. All in all, the (nn−1)·nele+1 nodal position and rotation vectors can always arise in a way such that a 3D pure bending case can be represented, which consists of a constant curvature vector field Kh (ξ) =const., a vanishing (reduced integrated) energy contribution Πint,Γ,h of axial and shear strains as well as six superposed rigid body modes. Consequently, the torsion and bending modes represented by Ωh (ξ) as well as the axial tension and shear values at the Gauss points represented by Γh (ξGP ) are non-competing and no locking effects are expected. These considerations can easily be extended to arbitrary curvature fields Kh (ξ) that are representable by the employed triad interpolation and arbitrary fields Γh (ξ) for which the term ΓTh Γh as occurring in the energy integral can be integrated exactly by the reduced Gauss integration scheme. In Sections 11.2 and 11.3, the expected result that the discrete hyperelastic energies associated with pure bending states in 2D and in 3D can be represented exactly by this beam element formulation will be verified by means of corresponding numerical test cases. 7.3. Conservation properties In the following, it will be investigated if the Simo-Reissner beam element formulation proposed by Crisfield and Jelenić and repeated in the section above can represent the variational fields (147), (149) and (151) required in order to guarantee conservation of linear momentum, conservation of angular momentum as well as conservation of energy. The representation of a rigid body translation (147) is trivial and given by the nodal primary variable variations δd̂i = u0 , δθ̂i = 0 for i = 1, ..., nn . (156) Similarly, a rigid body rotation (149) can be displayed by the nodal primary variable variations δd̂i = w0 × d̂i , δθ̂i = w0 for i = 1, ..., nn . 45 (157) It follows from (156) and (157), that conservation of linear and angular momentum can be guaranteed. This statement holds for both spin-vector discretizations (107) and (109) and for the discretized centerline variation (96) since all of these variants fulfill proper completeness conditions and can exactly represent a constant vector field δθ = w0 . If the nodal velocities and angular velocities of the time-continuous problem are chosen as primary variable variations δd̂i = ḋi , δθ̂i = wi for i = 1, ..., nn , (158) only the Bubnov-Galerkin variant (107) leads (per definition) to an exact representation of the rates of the spatially discretized hyperelastic and kinetic energy and consequently to exact energy conservation for the spatially discretized, time-continuous problem. On the contrary, the Petrov-Galerkin variant (109), which has been employed in (154), is not variationally consistent with the triad interpolation (105) occurring in the discrete internal and kinetic energies. Consequently, the weak form (154) does not represent exact energy rates of the spatially discretized problem. 8. Motivation for ”shear-free” beam theories Geometrically exact Simo-Reissner beam elements unify high computational efficiency and accuracy. In fields of application where thick beams are involved and the effect of shear deformation is important, they are favorable as compared to the Kirchhoff type counterparts. However, with increasing beam slenderness ratio ζ = l/R, the shear contribution to the overall beam deformation decreases. Furthermore, it is exactly the avoidance of the high stiffness contributions of the shear modes which makes the Kirchhoff-Love theory of thin beams not only applicable, but also favorable in the range of high beam slenderness ratios. In this brief section, possible benefits of applying Kirchhoff type beam elements in the range of high slenderness ratios will be illustrated and, at least approximately, quantified. In Section 11, most of these effects will also be investigated and verified by means of numerical examples. 1: Improved stability properties of time integration scheme: The dynamic equations of motion of highly slender beams typically result in very stiff Partial Differential Equations (PDEs). With increasing beam slenderness ratio, the ratio between high eigenfrequencies (associated with shear modes), intermediate eigenfrequencies (associated with axial tension and twisting modes) and low eigenfrequencies (associated with bending modes) increases considerably. As a consequence, the stability requirement of explicit time integration schemes leads to very small critical time step sizes as compared to the large oscillation periods of the bending modes. On the contrary, implicit time integration schemes can provide unconditional stability in the linear regime of small deformations. However, in the large deformation regime, also their performance is considerably deteriorated by such high-frequency contributions. Despite the stability aspect, high-frequent modes are strongly affected by the time discretization error and should be avoided as long as no high-frequency analysis is required by a specific application. In order to illustrate the relevant frequency spectrum, in the following, the proportionalities of the eigenfrequencies resulting from pure bending ωb , pure torsion ωt , pure axial tension ωa and pure shearing ω s are given for the linearized beam problem: s s s s s s s EI E GIT E E GA E 1 ∼ , ωt ∼ ∼ , ωa ∼ , ωs ∼ ∼ζ . (159) ωb ∼ 4 2 2 2 2 ζ ρl ρI ρAl ρIP l ρl ρl ρl2 According to the relations (159), the ratio of axial and torsional eigenfrequencies to bending eigenfrequencies increases linearly with increasing slenderness ratio. The ratio of shear eigenfrequencies to bending eigenfrequencies increases quadratically with increasing slenderness ratio. Thus, from a theoretical point of view, the avoidance of shear modes could already improve the numerical behavior considerably. Since the numerical examples of Section 11 mainly focus on static analysis and only present a brief outlook on possible dynamic investigations, a numerical verification of these theoretical considerations does not lie within the scope of this work. However, numerical investigations of this question available in the literature confirm the predicted trend: Lang and Arnold [92] investigated the geometrically nonlinear oscillations of a slender beam, which has been modeled by means of the geometrically exact Simo-Reissner theory and discretized via finite differences (see also [93]). In order to measure the influence of high-frequency modes on time integration stability, the maximal possible time step sizes of the applied explicit time integration scheme have been determined for three different mechanical beam models: The full shear-deformable and extensible Simo-Reissner beam formulation, a beam formulation subject to the Kirchhoff constraint of vanishing shear 46 deformation, and a beam formulation subject to the Kirchhoff constraint and an additional inextensibility constraint enforcing vanishing axial tension. For the roughest discretization considered in this numerical experiment and an investigated slenderness ratio of ζ = 100, a rather moderate slenderness ratio as compared to many applications as mentioned in Section 1, the time step size could be increased by a factor of ≈ 100 when abstaining from the shear mode and by a further factor of ≈ 5 when additionally abstaining from the axial tension mode. These results indicate the potential of the Kirchhoff type beam formulations. Furthermore, they suggest that the first step towards an extensible Kirchhoff beam formulation might already represent the essential one with respect to numerical savings. 2: Improved performance of (iterative) linear solvers: According to the previous argumentation, a high ratio of the highest to the lowest dynamical eigenfrequencies, measured by the dynamic spectral radius, deteriorates the performance of time integration schemes. In a similar manner, the performance of iterative linear solvers (see e.g. [113]) decreases with increasing ratio of the highest to the lowest eigenvalue of the tangent stiffness matrix, a measure for the condition number of this matrix. Furthermore, even if direct linear solvers are applied, very high condition numbers might considerably limit the achievable numerical accuracy. Especially in dynamics, where such round-off errors tend to accumulate, these effects are undesirable. In the following, the influence of the different deformation modes on the condition number is investigated. For simplicity, the physical units of the considered beam problem are chosen such that the element length lies in the range of lele ≈ 1. Since the element length, or better the element Jacobian, typically enters the element formulation with different exponents occurring in different stiffness matrix entries, an element length of lele ≈ 1 seems to be a reasonable choice with respect to conditioning. In this case, the resulting contributions to the element stiffness matrix of a Simo-Reissner beam element formulation that has been linearized with respect to the straight configuration, typically obeys the following proportionalities: kb ∼ EI ∼ ER4 , kt ∼GIT ∼ ER4 , ka ∼ EA ∼ ER2 , k s ∼GA ∼ ER2 . (160) Again, kb , kt , ka and k s denote stiffness contributions from bending, torsion, axial tension and shear modes. As long as lele ≈ 1 holds and the discretization is kept fixed, the cross-section radius R decreases linearly with increasing slenderness ratio ζ. According to (160), it is expected that the ratio of high stiffness contributions (from shear and axial tension modes) to low stiffness contributions (from torsional and bending modes), and also the condition number, increases quadratically with the beam slenderness ratio ζ. Furthermore, it is expected that a pure neglect of shear modes is not sufficient in order to improve conditioning. Thus, the supplementation of the proposed Kirchhoff-Love formulations by an additional inextensibility constraint seems to be beneficial in order to get also rid of the axial stiffness contributions and to improve also the performance of linear solvers. However, the formulation of an additional inextensibility constraint does not lie in the focus of this contribution (see also the remark at the end of this section). 3: Improved performance of nonlinear solvers: The relation between the performance of a nonlinear solver, e.g. of a Newton-Raphson scheme, and the conditioning of the considered problem, e.g. measured via the condition number of the tangent stiffness matrix, is not that clear as in the case of linear solvers. Nevertheless, typically, it is at least expected that the performance of tangent-based nonlinear solvers also deteriorates for ill-conditioned problems showing slope differences of the target function by several orders of magnitude when stepping in different directions (e.g. in directions that activate shear and axial tension modes or in directions that activate bending and torsional modes). Interestingly, all numerical examples investigated in this work will confirm the trend that the nonlinear solver performance of the considered Reissner type beam elements deteriorates drastically with increasing slenderness ratio while the total number of Newton iterations required by the Kirchhoff type formulations remains almost unchanged. 4: Reduced system size: Kirchhoff type beam element formulations do not require any degrees of freedom for representing the mode of shear deformation. It can be expected that, at least as long as no convergence deteriorating phenomena such as locking occur, the same polynomial approximation and the same discretization error level can be guaranteed with fewer degrees of freedom. This prediction will be confirmed by the numerical examples in Section 11. 5: Smooth geometry representation: The proposed Kirchhoff-Love beam elements will be based on C 1 -continuous centerline interpolations. These interpolations will eventually result in smooth beam-to-beam contact kinematics, a property that is highly desirable in order to yield efficient and robust contact algorithms (see e.g. [106, 107]). 47 6: Abstaining from algorithmic treatment of large rotations: It has already been mentioned earlier in this work that the proposed Kirchhoff-Love beam formulations provide an ideal basis for the derivation of reduced beam models which are valid under certain restrictions concerning external loads and initial geometry. For example in [105], a torsion-free beam element formulation could be derived (and extended to dynamic problems in [106]) that is based on a pure centerline representation and can consequently avoid the treatment of large rotations and associated degrees of freedom. Thus, many steps within a nonlinear finite element algorithm that are typically complicated by the presence of large rotations (e.g. spatial interpolation, time discretization, non-symmetric tangent stiffness matrix, non-constant and non-symmetric mass matrix, incremental and iterative configuration updates) are comparable to those of standard solid finite elements for this torsion-free formulation. For further details, the reader is referred to [105, 106]. These sources of potential benefits were the motivation for the development of shear-free element formulations based on the Kirchhoff-Love theory of thin beams. Different realizations of such element formulations, e.g. based on a weak or on a strong enforcement of the Kirchhoff constraint, will be presented in the next sections. The influence of the aforementioned aspects on the resulting numerical behavior will be verified in Section 11 via proper test cases. Remark: As discussed above, the performance of iterative linear solvers could be improved by supplementing the proposed Kirchhoff type element formulations by an additional inextensibility constraint. Unfortunately, in contrast to the Kirchhoff constraint, there is no straightforward way to enforce the inextensibility constraint directly through a special choice of the primary variables or by a collocation approach that would allow for Lagrange multiplier elimination on element level, as long as the interpolation property r(xi ) = d̂i with i = 1, 2 has to be fulfilled for the position vector field r(s) at the element boundary nodes. This statement can easily be illustrated by considering a straight beam element of arbitrary order. In order to avoid zero-energy modes, inextensibility means in such a case that the solution for the nodal position vectors at the two boundary nodes cannot arise independently, but have to fulfill a constraint (e.g. ||dˆ1 − dˆ2 ||=l ˙ ele ). 9. Kirchhoff-Love Beam Element Based on Strong Constraint Enforcement In this section, a finite element formulation based on a strong enforcement of the Kirchhoff constraint is presented. In Section 9.1, a variant based on nodal triads parametrized via tangent vectors according to Section 6.2.2 is investigated. In Section 9.2, the transition to a rotation vector-based parametrization as in Section 6.2.1 is conducted. Similar to the CJ element presented in the previous section, also for this element formulation, the avoidance of possible membrane locking effects as well as the fulfillment of mechanical conservation properties will be verified in Sections 9.3 and 9.4. In Appendix B the suitability of the tangent-based and rotation vector-based nodal triad parametrizations for the modeling of practically relevant Dirichlet boundary conditions and joints is evaluated. 9.1. Residual vector of tangent-based parametrization Similar to the Simo-Reissner case, the trial and weighting functions are replaced by their discrete counterparts taken from the finite-dimensional trial subspace (rh , ϕh ) ∈ Uh ⊂ U and the weighting subspace (δrh , δΘ1h ) ∈ Vh ⊂ V. In the following, 3-noded elements with the nodal primary variables x̂T AN := (d̂1T, t̂1T, ϕ̂1 , d̂2T, t̂2T, ϕ̂2 , ϕ̂3 )T as well as the set of nodal primary variable variations δx̂T AN := (δd̂1T, δt̂1T, δΘ̂11 , δd̂2T, δt̂2T, δΘ̂21 , δΘ̂31 )T are considered (see also Figure 3(b)). The centerline interpolation is based on Hermite polynomials according to Section 6.1.2 and completely defined by the two element boundary nodes. The rotation field interpolation follows equation (113). Concretely, a quadratic rotation interpolation based on three nodes, thus also involving the element center node, is considered. Since the orientation of the material triad field is determined by the relative angle ϕh (ξ) as well as the tangent vector field r0h (ξ), with the latter being a polynomial of order two, this second-order interpolation is sufficient for triad field discretization. In Meier et al. [104], it has been confirmed that a higher interpolation order nΛ > 3 will not further improve the approximation quality while a lower interpolation order nΛ < 3 will lead to a decline in the convergence rate. The time integration of Section 5 is employed, thus leading to the inertia forces fρ and moments mρ given in (42). Inserting these discretizations into equation (81) and taking advantage of the spin vector interpolation given by (117) 48 eventually yields the element residual vector of the Bubnov-Galerkin variant of this element formulation: Z1h h i i  v0θ⊥+ v0θkd m+ v F1 − HT f̃ρ − vθ⊥+ vθkd m̃ρ J(ξ)dξ rS K−T AN+CS ,d̂ = −1 " # h i T − H fσ + vθ⊥+ vθkd mσ , (161) Γσ " # Z1  H0T t . rS K−T AN+CS ,Θ̂1 = v0θkΘ m − vθkΘ m̃ρ J(ξ)dξ − vθkΘ mσ with v = ||t|| Γσ −1 The Bubnov-Galerkin formulation (161) can be transformed into a Petrov-Galerkin variant based on the spin interpolation scheme (116) by simply omitting the terms vθkd , which yields: " # Z1  T T 0 rS K−T AN,d̂ = vθ⊥m+ v F1 − H f̃ρ − vθ⊥m̃ρ J(ξ)dξ− H fσ + vθ⊥ mσ , Γσ −1 (162) Z1 rS K−T AN,Θ̂1 =  "  0T # v0θkΘ m − vθkΘ m̃ρ J(ξ)dξ − vθkΘ mσ −1 with v = Γσ H t ||t|| . In order to avoid membrane locking in the range of high element slenderness ratios, the following re-interpolation of the axial tension  and its variation δ based on the MCS procedure (141) (see also [105]) is applied: 3 3 X X F̄1 = EA¯ , ¯ (ξ) = Li (ξ)(ξi ), δ¯ (ξ) = Li (ξ)δ(ξi ), i=1 i=1 3 X  r (ξi ) = ||r0 || − 1 (ξi ) , δ(ξi ) = δr0T 0 , v̄ = Li (ξ)v (ξi ). ||r || (ξi ) i=1 0 (163) ! Thus, a locking-free finite element formulation can be obtained by simply replacing the axial force F1 by F̄1 and the discrete axial tension variation operator v by v̄ in the discrete weak form (161). The discrete expression for the internal energy associated with the modified axial tension ¯ eventually reads: Π̃int,¯ = 1 EA¯ 2 . 2 (164) The element formulation based on the degrees of freedom x̂T AN and δx̂T AN , the residual (162) and (163) will be denoted as SK-TAN element, which stands for ”Strong Kirchhoff constraint enforcement combined with nodal triad parametrization via nodal TANgents”. Correspondingly, the combination of the degrees of freedom x̂T AN and δx̂T AN , the residual (161) and (163) will be denoted as SK-TAN+CS element, referring to the Consistent Spin vector interpolation underlying the Bubnov-Galerkin variant. It has to be emphasized that the replacement of the original axial tension terms with the corresponding MCS terms according to (163) is standard for all Kirchhoff type beam element formulations considered in this work. Only in examples where for comparison reasons also variants without MCS method are considered, an additional abbreviation ...-MCS, e.g. SK-TAN-MCS, is employed. For the SK-TAN element, a linearization ∆rS K−T AN = kS K−T AN ∆x̂T AN based on the increment vector ∆x̂T AN := (∆d̂1T, ∆t̂1T, ∆ϕ̂1 , ∆d̂2T, ∆t̂2T, ∆ϕ̂2 , ∆ϕ̂3 )T will be employed (see Appendix C). In contrary to the multiplicative rotation variations δΘ̂i1 occurring in δrS K−T AN , the quantities ∆ϕ̂i represent additive rotation increments of the nodal relative angles ϕ̂i . 9.2. Residual vector of rotation vector-based parametrization In some scenarios, e.g. applications where complex rotational Dirichlet or coupling conditions should be prescribed at the element boundary, it can be beneficial to employ the alternative parametrization of the triads Λ1 and Λ2 at the 49 element boundary nodes via rotation vectors according to Section 6.2.1. In such a case, an alternative set of nodal primary variables given by x̂ROT := (d̂1T, ψ̂1T, tˆ1 , d̂2T, ψ̂2T, tˆ2 , ϕ̂3 )T and δx̂ROT := (δd̂1T, δθ̂1T, δtˆ1 , δd̂2T, δθ̂2T, δtˆ2 , δΘ̂31 )T can be employed. Here, ψ̂1 and ψ̂2 represent the rotation vectors associated with these boundary triads, δθ̂1 and δθ̂2 are the corresponding spin vectors and tˆ1 and tˆ2 represent the magnitudes of the nodal tangents, i.e. tˆ1 := ||t1 || and tˆ2 := ||t2 ||, as introduced in Section 2.2. In this case, the nodal tangents of the Hermite interpolation (97) are no primary variables anymore, but have to be expressed by ψ̂1 and tˆ1 as well as ψ̂2 and tˆ2 (see also the transformation rule (22)): t̂i → ti = tˆi exp(S(ψ̂i ))E1 for i = 1, 2. (165) The transformation between the variations (δθ̂i , δtˆi ) as well as (δt̂i , δΘ̂i1 ) for i = 1, 2 is given by the transformation matrices T̃ and T̃−1 according to (22) and leads to the following relation:    I3    T̃1    , I3 (166) δx̂T AN = T̃x̂ δx̂ROT with T̃x̂ =    2  T̃   1 where all blank entries are zero. The required transformation matrices T̃1 as well as T̃2 follow from equation (22) as: ! ! −tˆ1 S(g11 ) g11 −tˆ2 S(g21 ) g21 1 2 T̃ = , T̃ = with gi1 = exp(S(ψ̂i ))E1 . (167) g1T 0 g2T 0 1 1 In order to simplify the transformation between the sets of degrees of freedom considered in Sections 9.1 and 9.2, the residual rT AN,d̂ and rT AN,Θ̂1 according to (161) are slightly reordered and the sought-after residual rROT is introduced: rT AN,d̂ := (rTT AN,d̂1 , rTT AN,t̂1 , rTT AN,d̂2 , rTT AN,t̂2 )T , rT AN,Θ̂1 := (rT AN,Θ̂1 , rT AN,Θ̂2 , rT AN,Θ̂3 )T , 1 1 1 rT AN := (rTT AN,d̂1 , rTT AN,t̂1 , rT AN,Θ̂1 , rTT AN,d̂2 , rTT AN,t̂2 , rT AN,Θ̂2 , rT AN,Θ̂3 )T , 1 1 1 rROT := (rTROT,d̂1 , rTROT,θ̂1 , rROT,tˆ1 , rTROT,d̂2 , rT (168) T ˆ2 , rROT,tˆ2 , rROT,Θ̂3 ) . ROT,θ 1 Inserting relation (166) into the virtual work contribution resulting from one beam element yields: T δx̂TT AN rT AN = δx̂TROT T̃x̂ rT AN =˙ δx̂TROT rROT → T rROT = T̃x̂ rT AN . (169) According to (167) and (25), the matrix T̃ and its inverse T̃−1 are well-defined as long as tˆ1 , 0 and tˆ2 , 0. The physical interpretation of tˆi = 0 is that an arc-segment on the beam centerline at the position of the node i with initial length ds would be compressed to a length of zero. Since such a scenario is impossible from a physical point of view, these requirements are assumed to be fulfilled. Consequently, the transformation from the residual vector rT AN to the residual vector rROT is based on a non-singular matrix T̃x̂ . The same statement holds for the transformation of the global residual vectors RT AN and RROT via the matrix T̃X which represents an assembly of the element matrices T̃x̂ . Based on these considerations, the following relation can be established: T RROT = T̃X RT AN , T̃X ∈ <nX×<nX , rank(T̃X ) = nX → RT AN = 0 ⇔ RROT = 0. (170) As long as a unique solution of RT AN = 0 exists, the solution of RROT = 0 will lead to the same mechanical equilibrium configuration. In other words, the pure re-parametrization performed from Section 9.1 to Section 9.2 will not change the results of the discretized beam problem. Nevertheless, the transformation matrix T̃X depends on the primary degrees of freedom in a nonlinear manner and has to be considered within a consistent linearization procedure. Throughout this work, the element formulation based on the degrees of freedom x̂ROT and δx̂ROT , the residual (162) transformed via (169) together with the MCS approach (163) will be denoted as SK-ROT element, which stands for 50 ”Strong Kirchhoff constraint enforcement combined with nodal triad parametrization via nodal ROTation vectors”. Correspondingly, the combination of the degrees of freedom x̂ROT and δx̂ROT , the residual (162) transformed via (169) together with the MCS approach (163) will be denoted as SK-ROT+CS element. Since the SK-ROT and the SKTAN element yield the same finite element solution (expressed via different nodal primary variables), the following theoretical investigations concerning locking behavior and conservation properties will only be performed for the SKTAN element. For the SK-ROT element, a linearization ∆rS K−ROT = kS K−ROT ∆x̂ROT based on the increment vector ∆x̂ROT := (∆d̂1T, ∆θ̂1T, ∆tˆ1 , ∆d̂2T, ∆θ̂2T, ∆tˆ2 , ∆ϕ̂3 )T will be employed (see Appendix E). Here, ∆θ̂1 and ∆θ̂2 represent multiplicative increments while ∆ϕ̂3 can be identified as an additive increment. 9.3. Avoidance of locking effects In order to investigate the locking behavior of the SK-TAN element, the investigations already made in Section 6.3.3 only have to be extended from 2D to the general 3D case. In 3D, the Kirchhoff beam problem is described by neq = 4 differential equations (80) and constrained by neq,c = 1 constraint equation in case a pure bending state shall be represented. Thus, the constraint ratio of the space-continuous problem yields r = neq /neq,c = 4. Due to the employed MCS method, the discrete number of constraint equations takes on a value of neq,c = 2nele+1. Given the total number of equations neq = 8nele +1 after application of proper Dirichlet boundary conditions, the discrete constraint ratio yields: rh = lim nele →∞ 8nele +1 = 4 = r. 2nele +1 (171) Relation (171) yields the optimal constraint ratio for this element formulation. Consequently, no locking effects are expected. Furthermore, it has been shown in Section 6.3.3 that the requirement of representing a straight beam configuration with arbitrary distribution of ¯h (ξ) yields a number of independent equations that equals the number of degrees of freedom. Consequently, such a state can be represented exactly and no zero-energy modes associated with this state have to be expected. The extension of this statement to 3D is straightforward and will not be further investigated here. Moreover, it has also been stated in Section 6.3.3 that the discrete hyperelastic energy Πint,h associated with a pure 2D bending case cannot be displayed exactly by the SK-TAN element. Of course, this statement still holds in 3D. In Sections 11.2 and 11.3, the expected result that the discrete hyperelastic energies associated with pure bending states in 2D and in 3D cannot be represented in an exact manner by this beam element formulation will be verified by means of corresponding numerical test cases. There, it will also be shown that this property leads to a slightly increased discretization error level as compared to the subsequently derived WK-TAN element. However, this observation is independent from the element slenderness ratio and cannot be attributed to membrane locking. 9.4. Conservation properties Also for the proposed SK-TAN beam element with strong enforcement of the Kirchhoff constraint, it shall be investigated if the variational fields (147), (149) and (151) required for conservation of linear momentum, conservation of angular momentum and conservation of energy can be represented by the corresponding discrete weighting subspace Vh . The representation of a rigid body translation (147) is given by the nodal primary variable variations δd̂ j = u0 , δt̂ j = 0, δΘ̂i1 = 0 for j = 1, 2; and i = 1, 2, 3. (172) This result can be verified by inserting the choices for δd̂ j and δt̂ j made in (172) into the Hermite interpolation (100) and making use of the completeness conditions underlying the Hermite polynomials (see [104]), which yields δrh (ξ) = u0 = const. as well as δr0h (ξ) = δg01h (ξ) = 0. Inserting these relations together with δΘ̂i1 = 0 into either (116) or (117) results in the required vanishing of the discrete spin vector field. Thus, both the Petrov-Galerkin as well as the BubnovGalerkin variant for the spin vector interpolation lead to an exact conservation of the linear momentum. Next, a rigid body rotation (149) has to be displayed by the following choice of nodal primary variable variations δd̂ j = w0 × d̂ j , δt̂ j = w0 × t̂ j , δΘ̂i1 = gT1 (ξi )w0 for j = 1, 2; and i = 1, 2, 3. (173) Inserting δd̂ j and δt̂ j according to (157) into (100) gives the desired result δrh (ξ) = w0 × rh (ξ). In Section 6.2.4 (see (123)-(126)), it has been shown that based on the nodal values (173) the Bubnov-Galerkin interpolation (117) can exactly represent such a ”virtual” rigid body rotation, while the Petrov-Galerkin variant (116) cannot. Thus, only 51 the Bubnov-Galerkin interpolation can guarantee for exact conservation of angular momentum. This result will be confirmed by subsequent numerical examples. Finally, the conservation of energy has to be investigated. If the nodal velocities and angular velocities of the time-continuous problem are chosen as nodal primary variable variations, δd̂ j = ḋ j , δt̂ j = ṫ j , δΘ̂i1 = gT1 (ξi )wi for j = 1, 2; and i = 1, 2, 3, (174) again, only the Bubnov-Galerkin variant (117) leads (per definition) to an exact representation of the rates of the discrete internal and kinetic energy and to exact energy conservation for the spatially discretized, time-continuous problem. In contrast, the Petrov-Galerkin variant (116) is not variationally consistent with the triad interpolation (113) underlying the discrete energies and cannot guarantee for energy conservation of the time-continuous problem. 10. Kirchhoff-Love Beam Element Based on Weak Constraint Enforcement As alternative to the formulation presented in the last section, a beam element will now be presented that is based on the weak fulfillment of the Kirchhoff constraint. Thus, the basis for the intended element formulation is provided by the Simo-Reissner beam theory. In a first step, a finite element formulation of Simo-Reissner type with a C 1 continuous centerline representation will be derived in Section 10.1. Afterwards, the Kirchhoff constraint of vanishing shear strains will be enforced in order to end up with a finite element formulation of Kirchhoff type. Following the derivations in Section 4.4, the weak statement of the Kirchhoff constraint (85) can be realized by introducing spatial interpolations for the Lagrange multipliers and their variations, i.e. by choosing a proper discrete trial space (λΓ,2,h , λΓ,3,h ) ∈ UλΓ23 ,h ∈ UλΓ23 and a proper discrete weighting space (δλΓ,2,h , δλΓ,3,h ) ∈ VλΓ23 ,h ∈ VλΓ23 . The resulting nonlinear system of discrete equilibrium equations will contain discrete Lagrange multipliers as additional nodal primary variables and exhibit a saddle point type structure. In order to avoid the additional effort of solving a large system of equations with saddle point structure, a slightly different approach is chosen here. In the next section, a modified Reissner type beam element formulation will be presented, which is based on a smooth Hermite centerline interpolation and a MCS type strain re-interpolation not only of the axial strain h (ξ) but also of the shear strains Γ2,h (ξ) and Γ3,h (ξ). Applying the constraint of vanishing shear strains in a consistent manner directly on the reinterpolated strain fields Γ̄2,h (ξ) and Γ̄3,h (ξ) yields a collocation point type approach of constraint enforcement which does not require additional Lagrange multipliers (see Section 10.2). Throughout this contribution, this variant will be preferred since it does neither yield additional Lagrange multiplier degrees of freedom nor a saddle point type system of equations. Also for this element formulation, the two variants concerning nodal rotation parametrization according to Sections 6.2.1 and 6.2.2 will be presented in the following Sections 10.2 and 10.3. 10.1. Basic formulation: Hermitian Simo-Reissner element The Reissner type beam element formulated in this section represents an intermediate step in the derivation of a corresponding Kirchhoff type beam element formulation in the next section. The discrete beam centerline representation is given by the Hermite interpolation (97) based on the position and tangent vectors d̂i and t̂i at the two element boundary nodes. Furthermore, the rotation interpolation is given by a three-noded representation of (105) with nodal triads Λ1 , Λ2 and Λ3 . Again, a finite element formulation will be considered on the basis of a strain re-interpolation similar to the MCS method (163). While in the Kirchhoff case (163), only the axial strain has been treated, now the entire deformation measure Γ will be re-interpolated in order to avoid membrane as well as shear locking: Γ̄(ξ) = 3 X i=1 Li (ξ)Γ(ξi ), δΓ̄(ξ) = 3 X Li (ξ)δΓ(ξi ) ξ1 = −1, ξ2 = 1, ξ3 = 0. (175) i=1 On the basis of (175), also the hyper-elastic stored energy function Π̃int (Ω, Γ) given in (37) has to be replaced by Π̃int (Ω, Γ̄). Now, one can introduce the following set of degrees of freedom x̂HS R := (d̂1T, t̂1T, ψ̂1T, d̂2T, t̂2T, ψ̂2T , ψ̂3T )T as well as the associated variation vector δx̂HS R := (δd̂1T, δt̂1T, δθ̂1T, δd̂2T, δt̂2T, δθ̂2T, δθ̂3T )T . Based on the weak form (33), 52 (175), the definitions (36) and (35), (97) and (105), the element residual vector can be derived as follows: rHS R,d̂ = Z1   h vΓ1 F̄ − LT f̃ρ J(ξ)dξ − LT fσ i Γσ −1 rHS R,θ̂ = Z1   h (176) i L0T m + vΓ2 F̄ − LT m̃ρ J(ξ)dξ − LT mσ = 0, Γσ −1 3 X   F̄ = CF Γ̄, vΓ1 = Li (ξ) H0TΛ (ξi ) 3 X   , vΓ2 = Li (ξ) LTS(t)Λ i=1 (ξi ) . i=1 This element formulation could e.g. be applied to problems of thick beams with higher continuity requirements (e.g. beam contact). However, here, the formulation (176) solely represents an intermediate step in the derivation of Kirchhoff beam elements with weak enforcement of the Kirchhoff constraint as performed in the next two sections. 10.2. Residual vector of tangent-based parametrization Due to (175), the general weak constraint enforcement of Section (4.4) can be simplified: Γ̄2 (ξ) ≡ Γ̄3 (ξ) ≡ 0 → r0T(ξi )g2 (ξi ) =˙ r0T(ξi )g3 (ξi ) =˙ 0 for i = 1, 2, 3. (177) According to (177), the Kirchhoff constraint is exactly fulfilled at the three collocation points. In the following, a parametrization is chosen that directly fulfills these constraints without the need for additional Lagrange multipliers. Thereto, the same set of nodal degrees of freedom x̂T AN = (d̂1T, t̂1T, ϕ̂1 , d̂2T, t̂2T, ϕ̂2 , ϕ̂3 )T as well as the set of nodal primary variable variations δx̂T AN = (δd̂1T, δt̂1T, δΘ̂11 , δd̂2T, δt̂2T, δΘ̂21 , δΘ̂31 )T as in Section 9.1 are chosen. In case of a Bubnov-Galerkin approach, the following discrete spin vector field results from the triad interpolation (105) in combination with the Kirchhoff constraint according to (177) (see also (107)): 3 X δθh (ξ) = Ĩi (ξ)δθi with δθi = δΘ̂i1 g1 (ξi ) + i=1 ! S[r0 (ξi )]δr0 (ξi ) . ||r0 (ξi )||2 (178) Since the Kirchhoff constraint is exactly fulfilled at the three element nodes, the constrained variant (71) of the nodal spin vectors δθi has been combined with (107). Based on the alternative Petrov-Galerkin approach (109), the Kirchhoff constraint given by the relations (177) yields the following expression for the spin vector field: 3 X δθh (ξ) = Li (ξ)δθi with δθ = i δΘ̂i1 g1 (ξi ) i=1 ! S[r0 (ξi )]δr0 (ξi ) + . ||r0 (ξi )||2 (179) Similar to the CJ element, only the latter version (179) will be employed throughout this contribution. The final finite element residual vector resulting from the discretized counterparts of these fields reads: " # " # Z1   T T 0 rWK−T AN,d̂ = v̄θ⊥ m + v̄ F̄1 − H f̃ρ − v̄θ⊥ m̃ρ J(ξ)dξ − H fσ − v̄θ⊥ mσ , Γσ −1 Γσ " # Z1   rWK−T AN,Θ̂1 = v̄0θkΘ m − v̄θkΘ m̃ρ J(ξ)dξ − v̄θkΘ mσ , Γσ −1 v̄θ⊥ =− 3 X Li (ξ)vθ⊥ (ξi ), i=1 3 X v̄θkΘ = i=1 Li (ξ)vθkΘ (ξi ) 3 X v̄ = Li (ξ)v (ξi ), i=1 3 Li (ξ) X ,ξ with v̄0...= v... (ξ i ). J(ξ) i=1 53 (180) In the following, the formulation based on the degrees of freedom x̂T AN and δx̂T AN and on the residual (180) will be denoted as WK-TAN element, which stands for ”Weak Kirchhoff constraint enforcement combined with nodal triad parametrization via nodal TANgents”. For the WK-TAN element, a linearization ∆rWK−T AN = kWK−T AN ∆x̂T AN based on the increment vector ∆x̂T AN := (∆d̂1T, ∆t̂1T, ∆ϕ̂1 , ∆d̂2T, ∆t̂2T, ∆ϕ̂2 , ∆ϕ̂3 )T is employed (see Appendix D). Remark: Actually, a collocation type approach has been applied in order to enforce the Kirchhoff constraint. Nevertheless, the notion ”weak constraint enforcement” is kept throughout this work since such a procedure still represents the basis of the space-continuous formulation. Moreover, the difference to the formulation based on ”strong constraint enforcement” of Section 9 shall be emphasized by this naming. 10.3. Residual vector of rotation vector-based parametrization Also for the element formulation of Section 10.2 based on weak Kirchhoff constraint enforcement, a coordinate transformation from x̂T AN and δx̂T AN to the alternative primary variables x̂ROT := (d̂1T, ψ̂1T, tˆ1 , d̂2T, ψ̂2T, tˆ2 , ϕ̂3 )T and δx̂ROT := (δd̂1T, δθ̂1T, δtˆ1 , δd̂2T, δθ̂2T, δtˆ1 , δΘ̂31 )T can be performed. The transformation rule for the element residual T vector rROT = T̃x̂ rT AN is identical to (169) in Section 9.2. Throughout this work, the element formulation based on the degrees of freedom x̂ROT and δx̂ROT and on the element residual vector (180) transformed via (169) will be denoted as WK-ROT element, which stands for ”Weak Kirchhoff constraint enforcement combined with nodal triad parametrization via nodal ROTation vectors”. For the WK-ROT element, a linearization ∆rWK−ROT = kWK−ROT ∆x̂ROT based on the increment vector ∆x̂ROT := (∆d̂1T, ∆θ̂1T, ∆tˆ1 , ∆d̂2T, ∆θ̂2T, ∆tˆ1 , ∆ϕ̂3 )T will be employed (see Appendix E). 10.4. Avoidance of locking effects In the investigation of the locking behavior of the proposed WK-TAN element, many results already derived in Section 7.2 and 9.3 can be re-used. Since the numbers neq and neq,c for the space-continuous as well as for the discrete problem are identical to the SK-TAN element, it can readily be concluded that also the WK-TAN element formulation shows an optimal constraint ratio of r = rh = 4 and that no membrane locking effects are expected for this element. Similar to Section 7.2, it shall be shown that also the WK-TAN/-ROT elements can exactly represent the internal energy associated with a 3D pure bending state. This time, the internal energy is split into contributions stemming from torsion and bending and into contributions stemming from axial tension, i.e. Πint,h = Πint,Ω,h +Πint,,h . For a pure bending state, the energy contribution Πint,,h has to vanish, and thus the total internal energy of a pure bending state is given by Πint,Ω,h , which is uniquely defined by the curvature vector field Kh (ξ) = const. In order to represent the desired (constant) distribution of the curvature vector field Kh (ξ), which is possible for the employed triad interpolation (105), only 2nele of the 2nele +1 nodal triads have to arise properly, while the one remaining nodal triad describes rotational rigid body modes of the beam. Although the nodal triads are not necessarily parametrized by nodal rotation vectors, still three conditions result from each of these 2nele nodal triads, thus resulting in a total of neq,Ω = 6nele conditions. Additionally, the axial strains at the collocation points have to vanish in order to yield a vanishing contribution Πint,,h = 0. This requirement results in neq, = 2nele +1 additional conditions that have to be fulfilled at the collocation points. If again six further conditions are considered in order to superpose arbitrary rigid body modes (representing the minimally required number of Dirichlet boundary conditions in static problems), the total number of neq = 8nele +7 equations equals the total number of nuk = 7(nele+1)+nele unknowns contained in the global vector X for the considered WK-TAN/ROT elements. Thus, in case a unique FEM solution is existent, a 3D pure bending case can be represented exactly. Similar to the CJ element, the torsion and bending modes represented by Ωh (ξ) as well as the axial tension values at the collocation points represented by (ξCP ) are non-competing and no locking effects are expected. Again, these considerations can easily be extended to arbitrary curvature fields Kh (ξ) that are representable by the employed triad interpolation and arbitrary second-order polynomials ¯ (ξ) according to (163). In Sections 11.2 and 11.3, the expected result that the discrete hyperelastic energies associated with pure bending states in 2D and in 3D can exactly be represented by the WK-TAN/ROT elements will be verified by means of corresponding numerical test cases. 10.5. Conservation properties Since the WK-TAN beam element proposed above basically combines the triad interpolation and the spin vector interpolation δθh (ξ) of the CJ element (see Section 7) with the centerline interpolation and its variation δr0h (ξ) applied 54 to the SK-TAN element of Section 9, the corresponding conservation properties can directly be concluded from the investigations of Sections 7.3 and 9.4. Consequently, this element will exactly fulfill conservation of linear and angular momentum. Conservation of energy can only be guaranteed for the spatially discretized, time-continuous problem in case the Petrov-Galerkin spin vector interpolation (179) is replaced by its Bubnov-Galerkin counterpart (178). 11. Numerical Examples In this section, the previously proposed beam element formulations will be investigated numerically by means of proper test cases. All simulations results presented in the following rely on a software implementation of the proposed finite element formulations and numerical algorithms within the in-house finite element research code BACI (cf. Wall and Gee [147]), developed jointly at the Institute for Computational Mechanics at the Technical University of Munich. While most of the numerical examples (see Sections 11.1-11.6) are considered as quasi-static problems, eventually, in Section 11.7, also a dynamic test case is investigated. In a first step, these numerical examples aim to verify the principle applicability and accuracy of the proposed general and reduced Kirchhoff-Love beam elements in the range of different beam slenderness ratios. This verification crucially relies on detailed comparisons with analytic reference solutions, benchmark tests known form the literature as well as numerical reference solutions generated by means of well-established geometrically exact beam element formulations of Simo-Reissner type. More specifically, also the essential requirements formulated in Section 6.3 such as objectivity and path-independence, avoidance of locking effects, consistent spatial convergence behavior as well as the fulfillment of conservation properties will be verified for the different beam element formulations presented in Sections 7-10. Finally, based on the arguments given in Section 8, the focus will also lie on detailed comparisons of Reissner and Kirchhoff type beam element formulations for example with respect to the resulting discretization error level or the performance of the Newton-Raphson scheme. Since the Kirchhoff type beam element formulations based on a tangent-based triad parametrization and the formulations based on a rotation vector-based triad parametrization (compare e.g. Sections 9.1 and 9.2 or Sections 10.2 and 10.3) have been shown to yield identical FEM solutions, only the former category will be investigated with respect to spatial discretization errors. Furthermore, for all examples without analytic solution, the standard choice for the reference solution rre f (see also (143) of Section 6.3.4) is a numerical solution via the WK-TAN element (see Section 10.2) employing a spatial discretization that is by a factor of four finer than the finest discretization shown in the corresponding convergence plot. In order to achieve a good comparability among the different geometries and load cases, a standard set of geometrical and constitutive parameters has been applied in all simulations unless stated otherwise. This standard set consists of a beam with initial length l = 1000 and square cross-section with side length R. These parameters lead to a cross-section area of A = R2 and to moments of inertia of area of I2 = I3 =: I = R4 /12 and IT = R4 /6. Different beam slenderness ratios ζ := l/R are generated by varying the value R = 0.1, 1.0, 10, 100 of the cross-section side length. The standard choice for the constitutive parameters is E = 1.0 and G = 0.5, thus leading to EI =GIP = R4 /12. For all numerical examples considered in the following sections, a Newton-Raphson scheme based on consistent linearization has been applied in order to solve the set of nonlinear equations resulting from the temporally and spatially discretized weak form of the balance equations. As convergence criteria, the Euclidean norms k+1 of the displacement increment vector ∆Xk+1 n+1 and of the residual vector R(Xn+1 ) are checked. For convergence, these k+1 k+1 norms have to fall below prescribed tolerances δR and δX , i.e. ||R(Xn+1 )|| < δR and ||∆Xn+1 || < δX . Typical convergence −8 tolerances chosen for the subsequent examples are in the range of δX = 10 as well as δR = 10−7 , 10−9 , 10−11 , 10−13 for the slenderness ratios ζ = 10, 100, 1000, 10000. For the (quasi-)static problems presented in the following sections, the external loads are applied on the basis of an incremental procedure, where N shall denote the number of load steps and ∆t the load step size. As long as nothing is stated to the contrary, the following simple procedure is applied in order to adapt the load step size during the static simulation in an efficient manner: Initially, a comparatively small load step size ∆t0 is chosen, e.g. according to N0 = 1. If the Newton-Raphson scheme has not converged within a prescribed number of niter,max iterations, the step size is halved and the load step is repeated. This procedure is repeated until convergence can be achieved. Then, after four converging load steps on the low step size level, the step size is doubled again. Also this procedure of successively doubling the step size after four converging load steps at the current step size level is repeated until the original step size ∆t0 is reached again. This procedure will not only drastically increase the overall computational efficiency, it also allows for comparatively objective and fair comparisons of the 55 performance of the Newton-Raphson scheme for different element formulations. In subsequent numerical examples, such comparisons will be made on the basis of the accumulated number of Newton iterations niter,tot := N X niter,n , (181) n=1 required to solve the entire problem. Here, niter,n is the number of iterations required for load step tn . In ”load step adaption scheme” above, non-converging steps are considered in the total number of iterations with niter,n = niter,max . 11.1. Example 1: Verification of objectivity The objectivity of the Kirchhoff beam element formulations proposed in Sections 9 and 10 has already been proven theoretically. In order to verify these results numerically, the following test case will be investigated (see Figure 4(a)): At the clamped end of an initially curved beam with slenderness ratio ζ = 10, whose stress-free centerline configuration equals a quarter circle, a Dirichlet rotation with respect to the global x-axis is imposed. For the presented quasi-static example, a total rotation angle of 20π, increasing linearly over 100 load steps, is prescribed. In order to investigate objectivity, the normalized internal (hyperelastic) energy is plotted over the total number of rotations (see Figure 4(b)) for the WK-TAN and SK-TAN element as well as for the Bubnov-Galerkin variant of the SK-TAN element formulation with Consistent Spin (SK-TAN+CS) vector interpolation according to (161). For comparison reasons, also the non-objective SR Kirchhoff beam element formulation investigated in Meier et al. [104] will be considered (see also the last remark at the end of Section 6.2.4). For clearness, the internal energy Πint is normalized by the factor Πint,r = 0.5EIπ2 /(4l), which is equal to the amount of mechanical work that is required to bend the initially stress-free quarter circle into a straight beam by means of a discrete, external end-moment. Of course, the internal energy should vanish for a beam that is merely rotated out of its stress-free initial configuration. (a) Problem setup. (b) Internal energy due to imposed rigid body rotation. Figure 4: Objectivity test: Rigid body rotation of an initially stress-free quarter circle. From Figure 4(b), it becomes obvious, however, that the internal energy of the SR formulation increases over the number of rotations, which is a clear indication for the already theoretically predicted non-objectivity. Within 10 rotations, the normalized energy reaches a value of almost Πint,r /4, which results in a clearly visible deformation of the initial quarter circle. On the contrary, the internal energy of all the other investigated element formulations results in a value that is zero up to machine precision. Finite element formulations based on such interpolation schemes as the investigated SR element might show reasonable results for static test cases (see e.g. [104]). However, especially in dynamic problems involving considerable rigid body motions, non-physical results as well as a drastic deterioration of the conservation properties investigated in Section 6.3.5 can follow from the application of such element formulations. 56 11.2. Example 2: Pure bending in 2D The examples shown in this section exclusively focus on 2D geometries and load cases. The section is sub-divided into two subsections: In Section 11.2.1, two load cases, a pure pending case as well as a combined moment-and-force load case, yielding geometrically nonlinear, but still moderate centerline deformations, are considered. This section aims at the investigation of membrane locking effects and at the comparison of different anti-locking tools, especially of the MCS method proposed in Section 6.3.3. In Section 11.2.2, again a pure bending and a combined moment-andforce load case will be considered. However, due to higher load factors, the resulting degree of deformation is further increased as compared to the examples of Section 11.2.1. This higher degree of deformation reveals clear differences in the approximation quality of the WK and SK Kirchhoff beam element variants. Besides the comparison of these two variants, also a first proof of concept for the development of higher-order Hermitian Kirchhoff elements is given. 11.2.1. Comparison of different anti-locking methods An initially straight beam is clamped at one end. Two different load cases will be analyzed: The first load case M is identical to the example analyzed in Section 6.3.3 and solely consists of a discrete end-moment M = (0, 0, M)T applied in one load step. The moment M = EIπ/(2l) exactly bends the beam into a quarter-circle shaped arc. In the second load case M+F, the end-moment and an additional tip force F = (0, F, 0)T in global y-direction are applied in one load step. The initial and deformed geometries for these load cases are illustrated in Figure 5. (a) Straight beam bent by end-moment. (b) Straight beam bent by end-moment and -force. Figure 5: Initial and deformed configuration of an initially straight beam for two load cases. While the standard parameters and the slenderness ratios ζ = 10, 100, 1000, 10000 have been chosen for the load case M, only the highest and therefore most critical slenderness ratio ζ = 10000 in combination with an external force of F = 1.0 · 10−10 ≈ 10M/l has been investigated for the load case M+F. In a first step, the SK-TAN element formulation according to (162) is applied in combination with a full Gauss-Legendre integration (”SK-TAN-FI“) with nG = 4, a reduced Gauss-Legendre integration (”SK-TAN-RI“) with nG = 3, a classical assumed natural strain approach (”SK-TAN-ANS“) as well as the MCS method according to (163) based on nG = 4 integration points (”SKTAN-MCS“) (see Section 6.3.3 and [105] for further details on these variants). In Figure 6(a), the relative L2 -error of the load case M and different slenderness ratios is plotted with respect to an analytic reference solution. For spatial discretization, the variant SK-TAN-FI based on meshes with 1, 2, 4, 8, 16, 32 and 64 elements has been applied. Accordingly, the convergence is slowed down dramatically with increasing slenderness ratio. If the beam is e.g. discretized by one finite element (lele = 1000), the relative error increases almost by two orders of magnitude when enhancing the slenderness ratio from ζ = 10 to ζ = 10000. However, Figure 6(a) also reveals that this effect decreases with decreasing element sizes and almost completely disappears for discretizations with more than 32 elements. 57 10 0 10 10 -2 10 -2 -4 2 rel 10 10 -6 10 -8 10 -10 ||e|| ||e|| 2 rel 10 SK-TAN-FI, SK-TAN-FI, SK-TAN-FI, SK-TAN-FI, 4 10 th 10 -6 10 -10 10 -12 10 2 10 3 element length 10 4 10 2 rel 10 10 -12 10 1 ||e|| 2 rel ||e|| -4 -10 10 2 10 3 element length 10 4 0 10 -2 10 -6 10 10 1 (b) Reference: Analytic, different slenderness ratios. 0 10 -8 ζ=10 ζ=100 ζ=1000 ζ=10000 4 th order 10 -2 10 SK-TAN-MCS, SK-TAN-MCS, SK-TAN-MCS, SK-TAN-MCS, order (a) Reference: Analytic, different slenderness ratios. 10 -4 10 -8 ζ=10 ζ=100 ζ=1000 ζ=10000 -12 10 1 0 10 -6 ζ=10000, SK-TAN-MCS ζ=10000, SK-TAN-ANS ζ=10000, SK-TAN-RI ζ=10000, SK-TAN-FI ζ=10000, WK-TAN-MCS 4 th order 10 -8 ζ=10000, SK-TAN-MCS ζ=10000, SK-TAN-ANS ζ=10000, SK-TAN-RI ζ=10000, WK-TAN-MCS 4 th order 10 2 10 3 element length -4 10 10 4 (c) Reference: Analytic, ζ = 10000. -10 10 -12 10 1 10 2 10 3 element length 10 4 (d) Reference: WK-TAN-MCS, ζ = 10000. Figure 6: Straight beam subject to the load cases M and M+F: Relative L2 -error. The reason for this behavior lies in the fact that the element slenderness ratio ζele = lele /R is the key-parameter for the observed locking effect and that the latter also decreases with decreasing element sizes. However, for typical engineering applications with relative error bounds in the range of 1%, the effect is by no means negligible. For sufficiently fine discretizations the expected convergence order of four is reached. In Figure 6(b), the relative L2 error is plotted for the same slenderness ratios as before, but for the variant SK-TAN-MCS, which is supplemented by the MCS method according to (163). As expected, the locking effect completely disappears for all investigated slenderness ratios. However, as shown in Figure 6(c), for the load case M and the highest investigated slenderness ratio of ζ = 10000, the same effect can alternatively be achieved by applying a simple reduced integration procedure (variant SK-TAN-RI) or a classical ANS approach (variant SK-TAN-ANS). On the contrary to load case M, Figure 6(d) reveals that no distinctive improvement of the locking behavior can be obtained by these alternative methods for the load case M+F: Both the ANS approach as well as the reduced integration scheme can only slightly alleviate the locking effect in the range of rather coarse discretizations as compared to the variant SK-TAN-FI. The MCS approach, however, completely eliminates the error offset due to membrane locking also for this load case. The explanation for this observation is obvious and in agreement with the statements of Section 6.3.3: Similar to the working principle of the MCS method, the reduced integration scheme can alleviate locking by reducing the number of constraint equations. Yet, as shown in Section 6.3.3, the MCS method leads to a lower number of constraint equations as compared to the simple reduced integration scheme, which makes the latter method less effective. While 58 the reduced integration scheme seems to be sufficient for the load case M, a special case yielding symmetric curvature distributions within the elements, the more general deformed configurations resulting from the load case F+M already demonstrate the limits of this simple method. On the other hand, the working principle of the standard ANS method does not aim at a reduction of the number of constraint equations, but rather at an evaluation of the critical axial tension term at selected collocation points with vanishing parasitic strains. In the geometrically nonlinear regime of large deformations, the parameter space positions of these optimal collocation points are deformation-dependent. Obviously, the load case M+F already leads to a change in these positions up to an extent that almost completely destroys the working principle and impact of the ANS method. Summing up, it is to say that based on these two examples the proposed MCS method seems to be superior to standard methods such as reduced integration or ANS in terms of locking avoidance when combined with the considered geometrically exact Kirchhoff beam elements. In example 8 of Section 11.6, a further comparison of these different anti-locking methodologies on the basis of a very general problem setting involving 3D deformation states and an initially curved geometry will be presented, which will confirm this result. For completeness, in Figures 6(c) and 6(d), also the L2 -error of the WK-TAN-MCS element based on a weak enforcement of the Kirchhoff constraint according to (180) has been plotted. For the load cases M and M+F, this formulation yields a comparable convergence behavior and discretization error level as the SK-TANMCS element. Next, it will be shown that this behavior will change with increasing deformation. In the following, the MCS method will be employed per default and the abbreviation ...-...-MCS omitted. 11.2.2. Comparison of different element formulations In the convergence plots investigated for the two load cases M and M+F, no noteworthy differences between the SK and WK element could be observed. In order to investigate the difference in the two general approaches of enforcing the Kirchhoff constraint in a strong or in a weak manner further in detail and to perform first comparisons with geometrically exact beam element formulations of Simo-Reissner type, two additional load cases will be considered (see Figure 7): The first load case considered in this section, in the following denoted as M̃, simply increases the magnitude of the external moment by a factor of eight as compared to the previous load case M, i.e. M̃ = 8M, thus leading to a deformed geometry that is represented by a double circle (see Figure 7(a)). Since the contribution of Simo and Vu-Quoc [134], this load case has been established as a standard test case for geometrically exact beam element formulations. Finally, in a fourth load case, denoted as M̃+F̃, the end-moment M̃ = 8M is supplemented by a tip force F = (0, F̃, 0)T in global y−direction, whose magnitude is this time exactly chosen as F̃ = 10 M̃/l = 0.08M. The initial geometry as well as the final configuration of this last load case is illustrated are Figure 7(b). (a) Straight beam bent by end-moment. (b) Straight beam bent by end-moment and -force. Figure 7: Initial and deformed configuration of an initially straight beam for two load cases. In Figure 8(a), the L2 -error resulting from the load case M̃ has been plotted for the WK-TAN and the SK-TAN element as well as for the Reissner type CJ beam element formulation proposed by Crisfield and Jelinic [43, 80] and presented in Section 7. Here, discretizations with 8, 16, 32, 64, 128 and 256 elements have been employed. These discretizations 59 10 10 0 10 -2 10 -4 10 -4 -6 10 -8 10 -10 ||e|| 10 e,rel 10 -2 2 rel ||e|| 0 10 -6 10 -8 Crisfield & Jelenic WK-TAN SK-TAN SK-TAN, L/8 10 -10 4 th order 10 -12 10 1 10 2 10 3 degrees of freedom 10 4 (a) Reference: Analytic, L2 -error. 10 -12 10 1 SK-TAN SK-TAN, L/8 4 th order 10 2 10 3 degrees of freedom 10 4 (b) Reference: Analytic, energy error. Figure 8: Straight beam and load case M̃: convergence of L2 - and energy error. are comparable to the load case M since similarly to that example, also here, the roughest discretization is based on one finite element per 90◦ -arc segment of the analytic solution. In order to enable a reasonable comparison of different element formulations, here and in the following, the discretization error will be plotted over the total number of degrees of freedom resulting from the respective finite element discretization. Since no shear deformation is present for this example, the Reissner and Kirchhoff type elements converge towards the same analytic solution. All element formulations exhibit the expected optimal convergence order of four, indicated by the black dashed line. The WK-TAN element shows the expected result that Kirchhoff element formulations can represent the same discretization error level with less degrees of freedom as compared to the Reissner type element formulation (see Section 8). Furthermore, for this example, it can even be shown that the lines representing the discretization error of the WK-TAN element and of the CJ element formulation would be almost identical if the discretization error was plotted solely over the degrees of freedom associated with the centerline interpolation. Thus, the observable difference in Figure 8(a) is a pure result of the additional rotational degrees of freedom required for Reissner type element formulations in order to represent shear deformation. Such a behavior is expected for this pure bending example since the two considered element formulations can exactly represent the internal energy associated with a pure bending state (see Sections 7.2 and 10.4). Consequently, the discretization error contribution stemming from the second term in (146) vanishes, the finite element problem degenerates to a pure problem of polynomial curve approximation represented by the first term in (146) and, thus, the discretization error plotted over the number of centerline DoFs yields similar results for the Lagrange centerline interpolation of the Reissner type element and the Hermite centerline interpolation of the Kirchhoff type element. The situation is completely different for the SKTAN element, which cannot exactly represent the internal energy associated with a pure bending state. A closer investigation would confirm the expected result that the SK-TAN element exhibits a remaining error in the lengthspecific hyperelastic stored energy (75), which is more or less constant along the beam length. Based on this finding, it can easily be answered why the discretization error level of the SK-TAN element applied to the load case M̃ is considerably increased as compared to the first load case M (while an identical level of the length-specific L2 -error has been observed for the WK-TAN and the CJ element): By the FEM, solely the distribution of the second centerline derivative r00 is optimized in order to yield a minimal energy error within the beam domain Ωl , while the centerline field r itself is only constrained at the clamped end of the beam. Thus, with increasing distance from the clamped end, the discretization error in the centerline field r, resulting from a two-fold integration of the (more or less) constant error in the second derivative r00 along an increasing arc-length segment, also increases. Consequently, by assuming comparable errors in the length-specific energy for comparable discretizations (i.e. the same number of finite elements representing the same angle segment of the analytic solution), a higher length-specific discretization error is expected for the load case M̃ as compared to the load case M. Figure 8(b) confirms the expected result that the energy error of the SK-TAN element does not vanish for this example and exhibits a convergence order of four. Furthermore, it is 60 10 0 10 Crisfield & Jelenic SK-TAN 4 th order 10 -2 2 rel -6 10 -8 10 6 th order 10 -4 ||e|| 2 rel ||e|| 10 Crisfield & Jelenic SK-TAN 4 th order 10 -2 6 th order 10 -4 0 10 -6 10 -8 -10 10 10 -12 10 1 10 2 10 3 degrees of freedom 10 4 (a) Reference: Analytic, third-order elements. -10 10 -12 10 1 10 2 10 3 degrees of freedom 10 4 (b) Reference: Analytic, fifth-order elements. Figure 9: Straight beam and load case M̃: convergence of third- and fifth-order elements. shown that the length-specific energy error ”averaged” along the entire beam length is identical to the length-specific energy error ”averaged” only along the first eighth of the beam (representing a quarter circle). As consequence of the error accumulation described above, the length-specific L2 -error is lower (and similar to load case M) if it is only ”averaged” along the first eighth of the beam (see Figure 8(a)). From a rather mathematical point of view, the increased discretization error level of the SK-TAN element can be explained by a high level of the second, energy-related term in (146) that dominates the overall discretization error. This behavior, in turn, is a pure consequence of the fact that the two exponents k+1 and 2(k−m+1) in (146) are identical for trial functions of polynomial degree k = 3. However, for polynomial degrees k > 3, the second term in (146) is expected to converge with a higher rate and consequently, for sufficiently fine discretizations, the first term reflecting the pure polynomial approximation power will determine the overall discretization error level. In this range, a lower discretization error per DoF can be expected for the Kirchhoff type beam element formulations independently of the beam length, the complexity of the deformation state or the type of boundary conditions. For a first proof of principle, in Figure 9(b), the L2 -error resulting from the CJ element with fifth-order Lagrange interpolation as well as from the SK-TAN element based on a fifth-order Hermite interpolation are depicted: While for very rough discretizations, the energy-related error contribution with higher convergence rate still seems to dominated the overall discretization error of the SK-TAN element, the expected optimal gap between the Reissner discretization error (higher level) and the Kirchhoff discretization error (lower level) can be observed. For comparison reasons, in Figure 9(a), the results of the corresponding third-order variants of Figure 8(a) are repeated. Since this work focuses on the development of third-order Kirchhoff beam elements, no further details on the construction of higher-order Hermite polynomials (either by introducing additional nodes or by considering higher-order derivatives) will be given at this point. However, it is expected that a comparable behavior as illustrated in Figure 9(b), can also be achieved for the other test cases considered in the following, if fifth-order SK and WK elements are employed. A detailed investigation of general geometrically exact beam element formulations of Kirchhoff-Love type with polynomial degree k > 3 will be considered in future research work. Eventually, also the convergence behavior of the fourth load case shall be investigated. In Figures 10(a) and 10(b) the L2 -error of the CJ, the WK-TAN and the SK-TAN element is plotted for the two beam slenderness ratios ζ = 100 and ζ = 10000. Since no closed-form analytic solution has been available for this example, a numerical reference solution based on the element formulation of Crisfield and Jelenić has been employed. As a consequence of shear deformation induced by the tip force F̃, the result derived from the Reissner and Kirchhoff type beam element formulations will differ in the limit of very fine discretizations h → 0. This ”model error” of the shear-free Kirchhoff elements becomes visible in form of a kink in the convergence diagram and a certain cutoff error level that remains constant even for arbitrarily fine discretizations. As expected, the model difference between the Simo-Reissner and the Kirchhoff-Love beam theory decreases with increasing beam slenderness ratio, a property that is reflected by a lower cutoff error level for the higher slenderness ratio ζ = 10000. For the lower slenderness ratio ζ = 100, the relative error distinguishing the 61 10 10 0 10 -2 10 -4 10 -4 -6 ||e|| 10 2 rel 10 -2 2 rel ||e|| 0 10 -8 10 -10 10 -6 10 -8 Crisfield & Jelenic WK-TAN SK-TAN 10 Crisfield & Jelenic WK-TAN SK-TAN -10 4 th order 10 -12 10 1 4 th order 10 2 10 3 degrees of freedom 10 -12 10 1 10 4 (a) Reference: Crisfield & Jelenić, ζ = 100. 10 2 10 3 degrees of freedom 10 4 (b) Reference: Crisfield & Jelenić, ζ = 10000. Figure 10: Load case M̃+F̃: L2 -error for different element formulations. 0 10 0 10 -2 10 -4 10 10 e,rel 10 -2 -6 ||e|| ||e|| e,rel 10 10 -8 10 -10 10 -12 10 1 -4 10 -6 10 -8 WK-TAN SK-TAN 4 th order 10 10 2 10 3 degrees of freedom 10 4 (a) Reference: WK-TAN, ζ = 100. -10 10 -12 10 1 WK-TAN SK-TAN 4 th order 10 2 10 3 degrees of freedom 10 4 (b) Reference: WK-TAN, ζ = 10000. Figure 11: Load case M̃+F̃: Energy-error for different element formulations. Kirchhoff from the Reissner solution lies below 10−3 , which can be assumed as reasonable approximation for many engineering applications. For the high slenderness ratio ζ = 10000, the relative error between these two models is smaller than 10−7 . For the investigated cases of ζ = 100 and ζ = 10000, the cutoff error scales almost quadratically with the slenderness ratio, which would be the expected result for the solution of the geometrically linear theory. This result is remarkable for this highly nonlinear example. From Figures 10(a) and 10(b), it can again be observed that all element formulations exhibit the expected convergence rate of four, that the error level of the SK-TAN element lies slightly above and that the error level of the WK-TAN element lies below the error level of the CJ element. Despite the fact that the Simo-Reissner formulations yield the more general solutions, which also contain the effects of shear deformation, the Kirchhoff type WK-TAN element formulation will be considered as numerical reference solution for all remaining examples throughout this work. Such a procedure seems to be sensible, since within this contribution, the convergence behavior of the Kirchhoff type elements and not of the Reissner type elements shall be studied. Nevertheless, the model error of the Kirchhoff type beam elements is still observable, but this time in form of a kink and a remaining cutoff error level in the convergence plots of the Reissner type formulation. While the WK-TAN element was able to exactly represent the internal energy of the load case M̃, now, for the load case M̃+F̃, the energy 62 2000 2000 Crisfield & Jelenic WK-TAN SK-TAN WK-ROT SK-ROT 1500 Newton iterations Newton iterations 1500 Crisfield & Jelenic WK-TAN SK-TAN WK-ROT SK-ROT 1000 500 0 1000 500 0 0 20 40 60 80 100 number of elements 120 140 0 (a) Moderate slenderness ratio: ζ = 100. 20 40 60 80 100 number of elements 120 140 (b) High slenderness ratio: ζ = 10000. Figure 12: Load case M̃+F̃: Total number of Newton iterations. convergence of the formulations WK-TAN and SK-TAN can be compared (see Figures 11(a) and 11(b) for the two slenderness ratios ζ = 100 and ζ = 10000). Both element formulations exhibit the expected convergence order of four, and similar to the load case M̃, the WK-TAN element yields a better approximation of the internal energy than the SK-TAN element. This is observable in form of a lower energy error level in Figures 11(a) and 11(b) and the reason for the lower L2 -error level visible in Figures 10(a) and 10(b). A possible explanation for the better performance of the WK-TAN element may be found by considering the interaction of the employed translational and rotational interpolation schemes: As shown in Section 10.4, the number of unknowns equals the number of equations required for the WK-TAN element to (energetically) represent a pure bending state. This means that an exact representation of the internal energy associated with states of constant axial tension, bending curvature and torsion is possible. This property does not hold for the SK-TAN element (see e.g. Section 9.3), where the corresponding system of equations that has to be fulfilled for representing a pure bending state is slightly over-constrained. While the difference between the WK and the SK elements in the L2 -error level is expected to vanish with higher-order trial functions, such an effect can in general not be predicted for the energy error. Eventually, it has to be mentioned that for both the L2 -error as well as the energy error plots of the load case M̃+F̃, no difference between the slenderness ratios ζ = 100 and ζ = 10000 is evident, which again underlines the successful avoidance of membrane locking and the effectiveness of the MCS method. Finally, also the performance of the Newton-Raphson scheme shall be investigated and compared between Kirchhoff and Reissner type element formulations (see Figure 12). Since the computationally expensive steps of solving a nonlinear system of equations and evaluating the tangent stiffness matrix have to be conducted in every Newton iteration, a reduction in the total number of Newton iterations niter,tot as defined in (181) would considerably increase the overall efficiency of the numerical algorithm. In Figures 12(a) and 12(b), the total number of Newton iterations niter,tot of the load case M̃+F̃ in combination with slenderness ratios of ζ = 100 and ζ = 10000 has been plotted for the element formulations CJ, WK-TAN, SK-TAN, WK-ROT and SK-ROT and different spatial discretizations. While the final FEM solutions have been shown to be independent from the choice of nodal rotation parametrization, the number of Newton iterations required for the SK/WK-ROT and SK/WK-TAN variants might differ considerably. Therefore, also the Newton performance of these variants has been investigated. For solving the highly nonlinear beam problem, the load step adaption scheme mentioned above based on an initial number of N0 = 2 load steps has been employed. By comparing Figures 12(a) and 12(b), one realizes that the Newton performance of the Kirchhoff type element formulations is rarely influenced by the considered slenderness ratio, while the number of Newton iterations required by the Reissner element increases drastically with increasing slenderness ratio. Furthermore, it seems that the SK/WK-TAN variants require fewer Newton iterations than the SK/WK-ROT variants. These trends will be confirmed, and even more pronounced, in more general 3D examples presented in subsequent sections. In summary, the following conclusions can be drawn from the 2D examples considered in this section: 1) The proposed Kirchhoff elements yield accurate results with acceptable model errors for slenderness ratios of ζ ≥ 100 and a model 63 error that decreases quadratically with increasing beam slenderness ratio. 2) The expected convergence orders of four in the L2 - as well as in the energy error could be confirmed for all investigated Kirchhoff elements. 3) In combination with the MCS method, none of the considered element formulations exhibited an influence of the element slenderness ratio on the resulting discretization error. This result confirms the effectiveness of the MCS method in the avoidance of membrane locking. 4) The discretization error level of the WK-TAN element lies below the error level of the Reissner type element and also below the error level of the SK-TAN element. The increased error level of the SK-TAN element has been shown to vanish with higher polynomial degree k > 3 of the trial functions. 5) While the total number of Newton iterations required by the Reissner type element formulations considerably increases with increasing beam slenderness ratio, the number of iterations remains more or less constant for the Kirchhoff type formulations. These conclusions drawn from these 2D tests will be confirmed by the 3Dl examples investigated in the following sections. 11.3. Example 3: Pure bending in 3D In this section, the 3D extension of the pure bending examples (load cases M and M̃) of the last section will be considered. Again, the focus lies on an initially straight, clamped beam of standard length l = 1000 investigated for the two slenderness ratios ζ = 100 and ζ = 10000. However, this time, the beam is loaded by a 3D end-moment M1 := (M, 0, M)T , with M = 10 for ζ = 100 and M = 10−7 for ζ = 10000, which contains an additional moment component in beam length direction inducing torsion. The initial and deformed configuration are illustrated in Figure 13(a). 10 0 10 -2 ||e|| 2 rel 10 -4 10 -6 10 -8 10 -10 10 -12 10 1 Cri. & Jel., ζ=10 2 Cri. & Jel., ζ=10 4 WK-TAN, ζ=10 2 WK-TAN, ζ=10 SK-TAN, ζ=10 SK-TAN, ζ=10 4 th order 4 2 4 10 2 10 3 degrees of freedom 10 4 (b) reative L2 -error, reference: analytic. (a) Initial and deformed geometry Figure 13: Straight beam loaded with a 3-dimensional discrete end-moment. As argued in [105], the analytic solution of this example is given by the following space curve representation:  1   √2 (sin β + β)  s EI   r(s) = R0  (1 − cos β)  with R0 = and β = √ . (182) 2M  √1 (β − sin β)  2R0 2 This solution represents a helix whose mid-axis points into the (1, 0, 1)T -direction, viz. in the direction of the applied external moment. The special parameter choice of this example leads to a radius R0 of the enveloping cylinder that is identical to the slope of the helix. In Figure 13(b), the relative L2 -error resulting from the two investigated slenderness ratios is plotted for the element formulations CJ, WK-TAN and SK-TAN as well as spatial discretizations based on 8, 16, 32, 64, 128 and 256 elements. Again, all element formulations exhibit the expected convergence order of four and the discretization error level of the WK-TAN element is lower, whereas the discretization error of the SK-TAN element is slightly higher than for the CJ element. Furthermore, no visible difference can be observed between the discretization error levels associated with the two different slenderness ratios. Due to the choice GIT = EI2 = EI3 , it can easily be verified that this example results in an analytic solution exhibiting vanishing axial tension and shear 64 15000 Crisfield & Jelenic Simo & Vu Quoc WK-TAN SK-TAN WK-ROT SK-ROT 10000 Newton iterations Newton iterations 15000 5000 0 10000 Crisfield & Jelenic Simo & Vu Quoc WK-TAN SK-TAN WK-ROT SK-ROT 5000 0 0 20 40 60 80 100 120 140 0 number of elements 20 40 60 80 100 120 140 number of elements (a) Moderate slenderness ratio: ζ = 100. (b) High slenderness ratio: ζ = 10000. Figure 14: Load case ”straight to helix“: Total number of Newton iterations. deformation as well as a constant spatial and material curvature vector along the entire beam pointing into the direction of the external moment vector, i.e. k = K = M/(EI)(1, 0, 1)T = const. Thus, already the roughest discretizations of the CJ and WK-TAN elements can exactly represent the hyperelastic stored energy function for this pure bending case, which can be interpreted as a simple 3D patch test for geometrically exact beams. Finally, also the number of Newton iterations shall be investigated (see Figure 14). In order to enable more general conclusions, this time, a second Reissner type beam element formulation, which is based on a completely different triad interpolation scheme, has additionally been included in the comparison. Concretely, this element represents an ”interpretation” formulated by Crisfield [40] (see Chapter 17.2) of the original variant proposed by Simo and Vu-Quoc [134], in the following denoted as SV element. This time, the load step adaption scheme presented above based on an initial number of N0 = 10 load steps has been employed. Similarly to the 2D case considered in the last section, the Newton performance of the Reissner type element formulations drastically deteriorates with increasing slenderness ratio whereas the performance of the Kirchhoff type elements remains unchanged (or is even slightly improved in case of the WK/SK-TAN variants). Concretely, for the slenderness ratio ζ = 10000, all investigated discretizations of the WK/SK-TAN elements exhibit a remarkably constant number of niter,tot = 140±4 iterations, while the total number of iterations required by the WK/SK-ROT elements increases from niter,tot ≈ 500 to niter,tot ≈ 2000 with increasing number of elements and the total number of iterations required by the Reissner type formulations is almost by two orders of magnitude higher than for the WK/SK-TAN elements and lies constantly above a value of niter,tot > 12000. Seemingly, the considerable difference between the WK/SK-TAN elements and the Reissner type element formulations can be attributed to two different effects: Firstly, the parametrization of nodal triads via tangent vectors seems to be more good-natured than the parametrization based on nodal rotation vectors. This effect already gets visible as difference between the WK/SK-TAN and the WK/SK-ROT variants and seems to be more or less independent from the beam slenderness ratio. Secondly, the high stiffness contributions resulting from the shear mode seem to considerably deteriorate the Newton convergence in the range of high slenderness ratios: This effect becomes obvious as difference between the WK/SK-ROT elements and the Reissner type elements. The linearizations of all of these four elements are based on multiplicative updates of nodal rotation vectors. This observation is emphasized by the two elements types WK-ROT and CJ, which additionally exhibit the same triad interpolation. These two elements only differ in the centerline interpolation (based on Lagrange or Hermite polynomials), which is not expected to influence the Newton convergence in such a drastic manner, and the fact that the WK-ROT element additionally enforces the constraint of vanishing shear strains. Consequently, the avoidance of shear modes seems to be the main reason for the considerably improved performance of the Kirchhoff type element formulations. Finally, the observation that the total number of Newton iterations required by the WK/SK-ROT variants increases with increasing number of elements is only of secondary practical interest since the discretizations relevant for practical applications are located in the range of small element numbers (on the left of Figure 14(b)). The observations made so far, will be confirmed by the subsequent 3D examples. 65 Remark: For some of the discretizations investigated in Figure 14, solutions of the SK-TAN element could already be found in one load step. However, since in these cases no convergence could be achieved for simulations based on two or three load steps, the solution of the problem by means of one load step can rather be regarded as a ”lucky shot” than as a representative convergence behavior. In order to avoid a biased comparison resulting from such effects, the initial number of load steps has been increased to N0 = 10. By this means and the mentioned load step adaption scheme, an evaluation and comparison process is intended that is as fair and objective as possible. Nevertheless, this example shows that an absolute statement concerning the robustness of the nonlinear solution scheme based on a single example / discretization and a deliberately chosen ”good-natured” step size, as sometimes done in the literature, is questionable. Here, the degree of arbitrariness is intended to be minimized by employing an automated scheme for determining the optimal load step size, by comparing the results of different test cases, different discretizations, different element types (here Reissner and Kirchhoff type beam elements) as well as different representatives for each element type. In order to avoid biased results as consequence of incorrect linearizations, the results of the Reissner type elements derived on the basis of an analytic representation of the consistent tangent stiffness matrix have been verified by simulations on the basis of a consistent tangent stiffness matrix derived via an automatic differentiation tool. 11.4. Example 4: Verification of path-independence In Section 6.3.2, the fundamental property of objectivity has already been verified for the proposed Kirchhoff beam elements. In this section, it will be shown that these element formulations are also path-independent, i.e. for beam problems whose analytic solution is independent from a specific loading path, these beam element formulations also yield a discrete solution that is independent from a specific loading path. As numerical test case for path independence, an initially straight clamped beam with initial length l = 1000 and slenderness ratio ζ = 100 (thus R = 10) is considered that is loaded by an end-moment M = (0, 0, M)T , with the moment M = 4EIπ/l ≈ 10.47 being defined such that it exactly bends the beam into a ”double-circle“, and an additional end-force F = (0, 0, F)T , with F = 0.01 ≈ M/l. Again, for comparison reasons, also the case of an increased slenderness ratio ζ = 10000 with correspondingly adapted loads M = 4EIπ/l ≈ 1.047 · 10−7 and F = 10−10 ≈ M/l will be investigated. The problem setup as well as the deformed configuration for this example are shown in Figure 15. In the following, two different possibilities how to apply these tip loads are investigated: In a first load case, the moment and the force are applied simultaneously (load case ”sim“), while, in a second load case, the moment and the force are applied successively (load case ”suc“). In the latter case, the external moment is increased linearly from zero to M within the pseudo-time interval t ∈ [0; 0.5], whereas the external force is increased linearly from zero to F within the pseudo-time interval t ∈ [0.5; 1.0]. Figure 15: Problem setup: Initially straight beam bent by a discrete end-moment and -force. The deformed shapes of both load cases have been plotted for the pseudo-time steps t = 0.25, t = 0.5, t = 0.75 and t = 1.0 in Figure 16. Apparently, the two load cases lead to different deformation paths, but to an identical final configuration. It contradicts intuition that this final deformed configuration lies completely in the half space with z ≤ 0, although the tip force points into the positive z-direction. For the case of small forces F, this observation has been verified by deriving an analytical solution based on a linearization of the equilibrium equations with respect to the double-circle configuration resulting from the end-moment M (see also [105]). Furthermore, this observation 66 (a) Step t=0.25 (sim). (b) Step t=0.50 (sim). (c) Step t=0.75 (sim). (d) Step t=1.0 (sim). (e) Step t=0.25 (suc). (f) Step t=0.50 (suc). (g) Step t=0.75 (suc). (h) Step t=1.0 (suc). Figure 16: Deformed configurations for simultaneous (sim) and successive (suc) loading of an straight beam with a moment M and a force F. is in agreement with the results obtained in [72] and [13], where a similar example based on a slightly modified parameter choice has been analyzed. In order to investigate possible path dependence effects also in a quantitative manner, the relative L2 -error has been calculated between the solution rh,suc of the load case ”suc“ for a certain discretization and the solution rh,sim of the load case ”sim“ for the same centerline discretization. Thus, basically the relative L2 -error definition of equation (143) has been applied, with rh = rh,suc and rre f = rh,sim . The results obtained for the two different slenderness ratios and the investigated element formulations CJ, SK-TAN and WKTAN are illustrated in Figure 17. Accordingly, for all investigated element types, discretizations and slenderness ratios, this error vanishes up to machine precision, which verifies the path independence of these formulations. For completeness, Figure 18 represents the discretization error resulting from the CJ, SK-TAN and WK-TAN elements for the considered slenderness ratios of ζ = 100 and ζ = 10000. There, the observations already made in earlier examples 10 10 0 10 Crisfield & Jelenic WK-TAN SK-TAN -2 10 -4 -6 10 2 rel 10 -8 -6 10 -8 10 -10 10 -12 10 -12 10 -14 10 -14 10 -16 10 -18 10 10 0 20 40 60 80 100 number of elements Crisfield & Jelenic WK-TAN SK-TAN -2 10 -4 ||e|| ||e|| 2 rel 10 10 0 120 -10 -16 10 -18 140 (a) Moderate slenderness ratio: ζ = 100. 0 20 40 60 80 100 number of elements (b) High slenderness ratio: ζ = 10000. Figure 17: L2 -error between the load cases ”Simultaneously” and ”Successively”. 67 120 140 10 0 10 -2 ||e|| 2 rel 10 -4 10 -6 10 -8 10 -10 Crisfield & Jelenic WK-TAN SK-TAN Isotropic 4 th order 10 -12 10 1 10 2 10 3 degrees of freedom 10 4 (a) Reference: WK-TAN, ζ = 100. (b) Reference: WK-TAN, ζ = 10000. Figure 18: Path independence: L2 -error for different element formulations. with respect to convergence rate, discretization error level and cutoff error between Kirchhoff and Reissner type element formulations are confirmed. For comparison reasons, also the L2 -error resulting from the reduced isotropic beam element formulation proposed in [105] has been plotted. The result is very similar to the SK-TAN element. The only reason why the discretization error level is slightly lower for the isotropic than for the SK-TAN element lies in the twist interpolation, which only requires two DoFs for the isotropic element but three DoFs for the SKTAN element. In Section 6.2.4, the importance of a consistent torsion (114) of the intermediate triad field has been emphasized. Now, in Figure 18(b), the discretization error for a variant (SK-TAN no K M1 ) has been plotted, where exactly this torsion term has been neglected. Surprisingly, the resulting discretization error level is identical to the ”correct” SK-TAN element formulation. How can this contradiction be explained? In order to answer this question, it has to be realized that the actual triad orientation is not important for isotropic examples in order to yield a consistent centerline convergence. It can easily be verified that only the mechanical torsion has to be represented correctly, which is also the functional principle of the isotropic beam element. If the torsion of the intermediate triad field is neglected, the total torsion is solely represented by the derivative of the relative angle field ϕ(ξ). Consequently, the relative angle arises in a way such that the total torsion is represented exactly, which in turn results in an inconsistent triad orientation. However, since for isotropic beams, only the torsion, but not the triad orientation, enters the weak form, the final result for the beam centerline is correct. Later in Section 11.5, it will be shown that the situation changes for anisotropic beams, i.e. beams with initial curvature or with anisotropic cross-section shapes. There, the neglect of the intermediate triad torsion will indeed lead to an inconsistent centerline solution resulting in a decreased spatial convergence rate. Furthermore, this investigation explains why certain Kirchhoff element formulations available in the literature, which accidentally neglect this torsion term, nevertheless produce correct results and consistent convergence rates for the centerline solution as long as isotropic beam problems are considered. Finally, in Figure 19, the total number of Newton iterations required by the different finite element formulations is plotted for the load case ”sim” and the two investigated slenderness ratios. Here, the load step adaption scheme based on N0 = 10 has been employed. The obtained results are very similar to the last section: The Newton performance of the Reissner type element formulations drastically deteriorates with increasing slenderness ratio whereas the performance of the Kirchhoff type elements remains unchanged. For the slenderness ratio ζ = 10000, all investigated discretizations of the WK/SK-TAN elements exhibit a remarkably constant number of niter,tot = 107 ± 1 iterations, while the total number of iterations required by the WK/SK-ROT elements increases from niter,tot ≈ 800 to niter,tot ≈ 2500 with increasing number of elements. Again, the total number of iterations required by the Reissner type beam element formulations is almost by two orders of magnitude higher than for the WK/SK-TAN elements and lies constantly above a value of niter,tot > 6000 for the CJ element formulation and niter,tot > 7000 for the SV element formulation. 68 8000 8000 Crisfield & Jelenic Simo & Vu Quoc WK-TAN SK-TAN WK-ROT SK-ROT Newton iterations 6000 5000 7000 6000 Newton iterations 7000 4000 3000 2000 1000 Crisfield & Jelenic Simo & Vu Quoc WK-TAN SK-TAN WK-ROT SK-ROT 5000 4000 3000 2000 1000 0 0 0 20 40 60 80 100 120 140 0 number of elements 20 40 60 80 100 120 140 number of elements (a) Moderate slenderness ratio: ζ = 100. (b) High slenderness ratio: ζ = 10000. Figure 19: Load case ”Simultaneously“: Total number of Newton iterations. 11.5. Example 5: Arc-segment with out-of-plane load Besides the objectivity test in Section 11.1, all examples investigated in the previous sections were based on isotropic geometries, i.e. straight beams with quasi-circular cross-sections EI2 = EI3 . Now, an initially curved beam will be considered. The initial geometry is represented by a 45◦ -degree circular arc-segment with curvature radius r0 = 100 that lies completely in the global x-y-plane and that is clamped at one end. The section constitutive parameters of the beam result from a quadratic cross-section shape with side length R = 1 and a Young’s modulus of E = 107 as well as a shear modulus of G = 0.5 · 107 . This initial geometry is loaded by an out-of-plane force f = (0, 0, fz )T in global z-direction with magnitude fz = 600. This example has initially been proposed by Bathe and Bolourchi [11] and can meanwhile be considered as standard benchmark test for geometrically exact beam element formulations that has been investigated by many authors (see e.g. [134, 34, 71, 50, 39, 80, 44, 127, 51, 117, 118, 10]). While the original definition of the slenderness ratio yields a value of ζ = l/R = 100π/4 for this example, a slightly modified definition of the slenderness ratio according to ζ̃ = r0 /R = 100 is employed in the following. For comparison reasons, also a second variant of this example with increased slenderness ratio ζ̃ = r0 /R = 10000, i.e. R = 0.01, and adapted Figure 20: Arc-segment with out-of-plane force: Initial (red) and final (green) configuration. 69 Formulation Crisfield & Jelenić Crisfield & Jelenić Simo & Vu-Quoc WK-TAN WK-TAN SK-TAN # Elements 32 8 8 32 8 8 u x (l) 47.15044 47.15044 47.14634 47.15215 47.15178 47.15201 uy (l) 15.68480 15.68480 15.69146 15.68535 15.68510 15.68557 uz (l) 53.47486 53.47486 53.47362 53.47176 53.47225 53.47216 Table 4: Case ζ̃ = 100: tip displacement and relative error for different formulations. Formulation Crisfield & Jelenić Crisfield & Jelenić Simo & Vu-Quoc. WK-TAN WK-TAN SK-TAN # Elements 32 8 8 32 8 8 u x (l) 47.15129 47.15129 47.14719 47.15129 47.15093 47.15115 uy (l) 15.68508 15.68508 15.69174 15.68508 15.68482 15.68530 uz (l) 53.46860 53.46860 53.46736 53.46860 53.46908 53.46900 Table 5: Case ζ̃ = 10000: tip displacement and relative error for different formulations. force fz = 6 · 10−6 will be investigated. The initial and deformed geometry are illustrated in Figure 20. In Tables 4 and 5, the tip displacements resulting from the two slenderness ratios and different discretizations with WK-TAN and SK-TAN Kirchhoff type elements as well as with Reissner type elements of Crisfield and Jelenić and Simo and VuQuoc are plotted. Due to rough spatial discretizations, and in some cases also due to additional model simplifications, the corresponding values derived in the literature for the case ζ̃ = 100 show a comparatively large variation. On the contrary, the deviation in the results displayed in Table 4 is smaller than 0.1% for all investigated formulations. The fact that these results have been derived by representatives of different beam theories, i.e. of the Simo-Reissner and of the Kirchhoff-Love theory, indicates their correctness. While the Reissner and Kirchhoff values resulting from a discretization with 32 elements coincide up to the fourth significant digit for the case ζ̃ = 100, the corresponding values are identical in all seven significant digits displayed for the case of the high slenderness ratio ζ̃ = 10000. The observations described above are also confirmed by the convergence plots in Figure 21. All formulations yield the expected convergence orders, and, similar to the last example, the SK-TAN element exhibits an identical discretization 10 0 10 -2 ||e|| 2 rel 10 -4 10 -6 10 -8 10 -10 Crisfield & Jelenic WK-TAN SK-TAN 4 th order 10 -12 10 1 10 2 10 3 degrees of freedom 10 4 (a) Reference: WK-TAN, ζ̃ = 100. (b) Reference: WK-TAN, ζ̃ = 10000. Figure 21: Arc-segment with out-of-plane force: L2 -error for different formulations. 70 500 500 Crisfield & Jelenic Simo & Vu Quoc WK-TAN SK-TAN WK-ROT SK-ROT 300 400 Newton iterations Newton iterations 400 200 100 300 Crisfield & Jelenic Simo & Vu Quoc WK-TAN SK-TAN WK-ROT SK-ROT 200 100 0 0 0 5 10 15 0 number of elements 5 10 15 number of elements (a) Number of Newton iterations for ζ̃ = 100. (b) Number of Newton iterations for ζ̃ = 10000. (c) Number of load steps for ζ̃ = 100. (d) Number of load steps for ζ̃ = 10000. Figure 22: Arc-segment with out-of-plane force: Number of Newton iterations and load steps. error level as the WK-TAN element, since again no multiple centerline loops are involved for this example. Furthermore, similar to the example of Section 11.3, also a variant (SK-TAN no K M1 ) has been investigated where the torsion of the intermediate triad field has been omitted. While the omission of this term did not influence the convergence order observed in Section 11.3, this inconsistency yields a decline in the convergence rate from four to two for the anisotropic example considered here. This underlines the importance of consistently considering this term (see also Section 11.3 for further explanation). Also for this example, the performance of the Newton-Raphson scheme will be evaluated. However, in order to enable a comparison with the values available in the literature, this time, no load step adaption scheme is employed, but the following alternative procedure in order to determine the maximal constant load step size ∆t =const.: Starting with a scheme based on one load step N0 = 1, the number of load steps is increased by one, i.e. Nnew = Nold +1, in the range N = 1, ..., 10 and increased by increments of 10, i.e. Nnew = Nold +10, in the range N > 10, until Newton convergence is achieved for all load steps. In order to avoid ”lucky shots” (see the remark at the end of this section and also the remark in Section 11.3), a maximal load step size and an associated minimal number of load steps Nmin is accepted only if also the next incrementation step of the load step size according to the procedure described above leads to Newton convergence for all load steps. In Figure 22, the total number of Newton iterations as well as the minimal number of load steps Nmin resulting from the maximal constant load step size are plotted for the two different slenderness ratios. The results are similar to the observations made in previous sections, however, with a smaller difference between the SK/WK-TAN elements and the SK/WK-ROT elements. Concretely, 71 Reference [44] [134] [34] [127] [127] [11] [39] [80] CJ CJ SV SV SK-TAN WK-TAN SK-ROT WK-ROT Elements 8 first-order 8 first-order 8 first-order 8 first-order 8 first-order 8 first-order 8 first-order 8 first-order 8 first-order 8 third-order 8 first-order 8 third-order 8 third-order 8 third-order 8 third-order 8 third-order Nmin 6 3 6 3 2 60 3 1 7 7 7 7 1 1 1 2 niter,tot 27 47 30 11 16 4 59 58 52 58 8 8 24 30 Remark Number of iterations has not been reported. Application of a standard Newton scheme. Application of an accelerated Newton scheme. Number of iterations has not been reported. Non-objective variant proposed in [81]. Objective variant proposed in [80]. Objective variant proposed in [80]. Interpretation of the formulation of [134]. Interpretation of the formulation of [134]. Kirchhoff type beam element formulation. Kirchhoff type beam element formulation. Kirchhoff type beam element formulation. Kirchhoff type beam element formulation. Table 6: Case ζ̃ = 100: Number of load steps and Newton iterations from the literature (top) and from this work (bottom). the beam problem with slenderness ratio ζ̃ = 100 is solved in 1 load step and a total of 8 iterations for the SK/WKTAN discretizations, in 1-3 load steps and a total of 10-40 iterations for the SK/WK-ROT discretizations and in 7 load steps and a total of 57-58 iterations for the discretizations based on Reissner type elements. For the slenderness ratio ζ̃ = 10000, the problem is again solved in 1 load step and a total of 8 iterations for the SK/WK-TAN discretizations, in 1-4 load steps an a total of 10-50 iterations for the SK/WK-ROT discretizations and in 30-60 load steps and a total of 350-450 iterations for the Reissner discretizations. In Table 6, the corresponding values reported in the literature for the slenderness ratio ζ̃ = 100 are summarized. As already mentioned earlier, a direct comparison of these results is difficult since it is not clear which procedure has been applied by the different authors in order to determine the minimal number of Newton iterations (e.g. if it was required that also ”subsequent refinement steps” have to be convergent or if, on the contrary, also singular occurrences of convergence for special, good-natured loading paths were accepted). Nevertheless, the numbers summarized in Table 6 should at least give a first impression on the behavior of the NewtonRaphon scheme resulting from different finite element formulations. Accordingly, only a few formulations can solve the problem in less than 20 iterations. Furthermore, for the case ζ̃ = 100, only the Reissner type formulation proposed in [81] and investigated in [80] yields a lower number of Newton iterations than the SK/WK-TAN elements. However, as shown in [80], this beam element formulation is non-objective and path-dependent. Moreover, for all examples investigated so far, the real advantage of the Kirchhoff type formulations occurred especially for the high slenderness ratio ζ̃ = 10000, which has not been investigated in the literature. For the range of moderate and high slenderness ratios, it can be concluded that the proposed Kirchhoff beam elements can be considered as very robust and efficient formulations as compared to many (Reissner type) alternatives from the literature. Remark: Maybe the reader is wondering why the SV element formulation, which is an interpretation of the element formulation proposed in [134], based on an identical discretization with eight first-order elements as investigated in [134], required more Newton iterations than reported in that reference. Actually, also in the numerical tests performed here, the nonlinear problem resulting from a discretization with eight firstorder SV elements could be solved in three load steps. However, since a subsequent simulation based on four load steps was not convergent, the procedure for the avoidance of ”lucky shots” as explained above has been applied, thus leading to a total of 7 load steps and 52 Newton iterations. 72 11.6. Example 6: Helix loaded with axial force In this example, the generality of the initial geometry shall be further increased: A helix with linearly increasing slope, clamped at one of its ends, is loaded with a end-force F = (0, 0, F)T (see Figure 23 for illustration). Figure 23: Helix with varying slope loaded with discrete force: Problem setup. The space curve representing initial geometry of the helix can be described via the following analytic representation:    sin β  l   r0 (β) = R0  cos β−1 , R0 = q  (183) q   ! ≈ 34.36.  6 2  2 27π2 4 4 2 β 6 3π +1+ ln + 1+ 81π2 4 8 3π 3π The radius R0 of the enveloping cylinder of the helix is chosen such that the helix exactly consists of 4.5 loops, i.e. β ∈ [0; 9π], along the standard length of l = 1000. Also this example is investigated for two different slenderness ratios ζ = 100 and ζ = 10000 with associated axial forces F = 2 · 10−1 as well as F = 2 · 10−9 . The ratio of these forces is chosen identical to the ratio of the bending stiffnesses of the cases ζ1 = 100 and ζ2 = 10000 leading to the comparable values uz,max,1 ≈ 267 and uz,max,2 ≈ 266 for the maximal tip-displacement in z-direction. In Figure 24, the resulting relative L2 -error of the CJ, SK-TAN and WK-TAN element is plotted for discretizations with 16, 32, 64, 128, 256 and 512 elements. All element formulations show the expected convergence rate of four, the discretization error level of the WK-TAN element is slightly lower than the discretization error level of the SK-TAN element. However, both discretization error levels lie below the error level of the Reissner type CJ element. In the authors’ former contribution, also the different anti-locking approaches already investigated for the 2D case in Section 11.2.1 have been compared for this 3D helix example. The derived results and the drawn conclusion are similar as for this 2D example. For further details on this comparison, the interested reader is referred to this reference. Finally, the helix problem shall be even 10 10 0 10 -2 10 -4 10 -6 ||e|| 10 2 rel 10 -2 2 rel ||e|| 0 10 -8 10 -10 -4 10 -6 10 -8 Crisfield & Jelenic WK-TAN SK-TAN 10 -10 10 -12 4 th order 10 4 th order -12 10 1 Crisfield & Jelenic WK-TAN SK-TAN 10 2 10 3 degrees of freedom 10 4 (a) Reference: WK-TAN, ζ = 100. 10 1 10 2 10 3 degrees of freedom (b) Reference: WK-TAN, ζ = 10000. Figure 24: Helix loaded with axial force: L2 -error for different formulations. 73 10 4 Figure 25: Twisted helix with axial force: Initial and final shape for ζ = 100 and ζ = 1000 (visualization based on ζ = 1000). more generalized by not only accounting for 3D initial curvatures but also for anisotropic cross-section shapes with initial twist as illustrated in Figure 25. Again, the two slenderness ratios ζ = 100 and ζ = 10000 have been investigated. The square cross-section of the last example is extended to a rectangular cross-section shape with dimensions b = 10 and h = 5 and an assumed torsional moment of inertia IT ≈ 3.2875·10−2 for the case ζ = 100. The case ζ = 10000 is defined by b = 0.1 and h = 0.05 and an assumed torsional moment of inertia IT ≈ 3.2875·10−6 . The external forces have been chosen as F = 5·10−2 for ζ = 100 and F = 5 · 10−10 for ζ = 10000 and the initial twist as one twist rotation per helix loop. The resulting L2 -error plotted in Figure 26 again shows a consistent convergence behavior similar to Figure 24. Additionally, in Figure 25, also the Bubnov-Galerkin variant (SK-TAN+CS) of the SK-TAN element with consistent spin vector interpolation has been plotted. Accordingly, no visible difference compared to the Petrov-Galerkin (SKTAN) variant can be observed. In a last step, also the balances of forces and moments are investigated for this most general example of Figure 25. In Table 7, the reaction forces and moments at the clamped end of the helix at s = 0 and the force and moment contributions (with respect to the point s = 0) resulting from the external load applied at s = l are plotted for discretizations with eight elements. It can easily be verified that the balance of forces and moments is exactly fulfilled by the variants CJ, WK-TAN and SK-TAN+CS, while the Petrov-Galerkin variant SK-TAN only fulfills the balance of forces but not the balances of moments. This confirms the prediction made in Section 9.4. 74 10 10 -2 10 -2 -4 2 rel 10 10 -6 10 10 -8 -10 ||e|| 2 rel 10 ||e|| 0 10 0 -4 10 -6 10 -8 Crisfield & Jelenic WK-TAN SK-TAN SK-TAN+CS 10 -10 4 th order 4 th order 10 -12 10 1 Crisfield & Jelenic WK-TAN SK-TAN SK-TAN+CS 10 2 10 3 degrees of freedom 10 4 (a) Reference: WK-TAN, ζ = 100. 10 -12 10 1 10 2 10 3 degrees of freedom 10 4 (b) Reference: WK-TAN, ζ = 10000. Figure 26: Twisted helix loaded with axial force: L2 -error for different formulations. F1 (0) F1 (l) F2 (0) F2 (l) F3 (0) F3 (l) M1 (0) M1 (l) M2 (0) M2 (l) M3 (0) M3 (l) Cri. & Jel. 0.0 0.0 0.0 0.0 5.00000000E-6 5.00000000E-6 -1.64350142E-4 -1.64350142E-4 -4.41005618E-5 -4.41005617E-5 0.0 0.0 WK-TAN 0.0 0.0 0.0 0.0 5.00000000E-6 5.00000000E-6 -1.54617971E-4 -1.54617971E-4 -8.55776851E-6 -8.55776851E-6 0.0 0.0 SK-TAN 0.0 0.0 0.0 0.0 5.00000000E-6 5.00000000E-6 -1.51929992E-4 -1.52158798E-4 -1.13519642E-5 -2.30787384E-5 0.0 0.0 SK-TAN+CS 0.0 0.0 0.0 0.0 5.00000000E-6 5.00000000E-6 -1.65509346E-4 -1.65509346E-4 -5.43051999E-6 -5.43051999E-6 0.0 0.0 Table 7: Slenderness ζ = 10000: Reaction forces and moments for different formulations. 11.7. Example 7: Free oscillations of an elbow cantilever The final example represents a dynamic test case. The example has initially been investigated in [135] and subsequently been considered in several contributions in the field of geometrically nonlinear beam element formulations (see e.g. [80] and [32]). A right-angle elbow cantilever beam consists of two straight beam segments of length l = 10 being rigidly connected at one of their ends. In the initial configuration, the first segment points into global y-direction and the second segment into global x-direction. The first segment of the cantilever is clamped at the position s = 0. In the original work, the cross-section of the beam is described by the section parameters EA = GA2 = GA3 = 106 , GIT = EI2 = EI3 = 103 as well as ρA = 1 and ρIP /2 = ρI2 = ρI3 = 10. It can easily be verified that these section parameters can for example be represented by a quadratic cross-section with radius R ≈ 0.1, thus resulting in a slenderness ratio of ζ ≈ 100 for each of the two segments, for which the rotational inertia contributions are additionally scaled by a factor of 104 . This artificial scaling has been applied in order to emphasize (and properly verify) the rotational inertia contributions, which would otherwise be comparatively small for the chosen slenderness ratio. This cantilever beam is loaded by a discrete force F = (0, 0, Fz )T pointing in global z-direction and acting at the rigid corner of the elbow. The magnitude of the force is linearly increased from Fz = 0 at t = 0 to Fz = 50 at t = 1 and then linearly decreased to Fz = 0 at t = 2. In the remaining simulation time until T = 50, the cantilever executes geometrically nonlinear free oscillations in 3D space with amplitudes being in the range of the segment lengths. The initial and deformed configurations at different time steps are illustrated in Figure 27. For time integration, the modified generalized-α scheme 75 (a) Step 0. (b) Step 5. (c) Step 10. (d) Step 15. (e) Step 20. (f) Step 25. (g) Step 30. (h) Step 35. (i) Step 40. (j) Step 45. Figure 27: Free oscillations of an elbow cantilever: Initial and deformed configurations. of Section 5 with ρ∞ = 0.95 has been employed. As spatial discretizations, the CJ element, the WK-ROT element as well as the Petrov-Galerkin variant SK-ROT and the Bubnov-Galerkin variant SK-ROT+CS with consistent spin vector interpolation according to (161) have been applied. This example yields a further complexity that has not been present in the previous test cases: The modeling of a rigid beam connection occurring at the corner of the elbow. As already mentioned in earlier sections, the modeling of such kinks in the beam centerline is easier to be realized by the SK/WK-ROT variants. Nevertheless, the resulting solutions are identical as for the SK/WK-TAN variants. In Figure 28, the internal, kinetic and total system energy is plotted for different time step sizes and spatial discretizations. For discretizations with 8 WK-ROT and SK-ROT elements per elbow segment and a time step size of ∆t = 0.01 as illustrated in Figures 28(a) and 28(b), no visible oscillations in the total system energy and no visible differences in the energy contributions of the Reissner and Kirchhoff type elements can be observed. In Figures 28(c)- 28(f), the energy contributions resulting from a larger time step size of ∆t = 0.25 and a rougher spatial discretization based on one beam element per elbow segment has been plotted. Accordingly, also for these rough discretizations, the overall system energy is preserved very well. The fact that the total system energy approximation resulting from the (energetically consistent) Bubnov-Galerkin discretization SK-ROT+CS is rarely improved as compared to the Petrov-Galerkin variants CJ, WK-ROT and SK-ROT indicates that for the chosen spatial and temporal discretizations, the influence of the temporal discretization error might dominate the error in the total system energy. As compared to reference [80], where an identical time step size of ∆t = 0.25 and a comparable spatial discretization consisting of one second-order CJ element per elbow segment has been applied, the oscillations of the total system energy could be considerably decreased and the instability observed there at the end of the considered time interval could be completely avoided. This improvement can be attributed to the applied Lie group extension of the generalized-α scheme of Section 5, whereas in reference [80] the Lie group extension of a Newmark time integration scheme as proposed in [134] has been considered. Based on (simplified) Reissner type beam element formulation (see [98]), similar observations have already been made in reference [32], where the Lie group extension of the generalized-α scheme has been proposed. 76 (a) WK-ROT, 16 elements, ∆t = 0.01. (b) SK-ROT, 16 elements, ∆t = 0.01. (c) Cri. & Jel., 2 elements, ∆t = 0.25. (d) WK-ROT, 2 elements, ∆t = 0.25. (e) SK-ROT, 2 elements, ∆t = 0.25. (f) SK-ROT+CS, 2 elements, ∆t = 0.25. Figure 28: Free oscillations of an elbow cantilever: Energy conservation. 77 12. Conclusion The current work focused on geometrically exact finite elements for highly slender beams. It aimed at the proposal of novel formulations of Kirchhoff-Love type, a detailed review of existing formulations of Kirchhoff-Love and SimoReissner type and a careful evaluation and comparison of the proposed and existing formulations. In the authors’ recent contribution [104], the first 3D large-deformation geometrically exact Kirchhoff-Love beam element formulation that fulfills the essential properties of objectivity and path-independence and that is capable of representing arbitrary initial curvatures and anisotropic cross-section shapes has been proposed. The developed beam element formulation incorporates the modes of axial tension, torsion and anisotropic bending. In the subsequent work [105], also the important question of membrane locking has successfully been addressed. The current contribution has extended these methodologies by providing considerable improvements in terms of accuracy and practical applicability as well as a generalization to dynamic problems. Thereto, two alternative interpolation schemes have been proposed: i) The first scheme is based on a strong enforcement of the Kirchhoff constraint (SK) enabled by a novel orthonormal rotation interpolation scheme. ii) The space-continuous theory of the second scheme is based on a weak enforcement of the Kirchhoff constraint (WK). The discrete realization of the Kirchhoff constraint relies on a properly chosen collocation strategy which can entirely abstain from the use of additional Lagrange multipliers. While this second formulation allows for arbitrary rotation interpolations, the investigated numerical realization has employed the well-known orthonormal, geodesic triad interpolation scheme proposed in [43]. Furthermore, for each of these two interpolation schemes, two different sets of nodal rotation parametrizations are proposed, one based on nodal rotation vectors (ROT) and one on nodal tangent vectors (TAN). While these different choices have been shown to yield identical FEM solutions, they differ in the resulting performance of nonlinear solvers and in the effort required for prescribing essential boundary and transition conditions such as rigid joints. The four finite element formulations resulting from a combination of the two interpolation schemes and the two choices of nodal primary variables have been denoted as SK-TAN, SK-ROT, WK-TAN and WK-ROT elements, respectively. Taking advantage of a third-order Hermite interpolation, both element formulations provide a C 1 -continuous centerline representation. In order to avoid membrane locking effects in the regime of high beam slenderness ratios, the concept of Minimally Constrained Strains (MCS) recently proposed in [105] has been employed for re-interpolation of the axial tension field. Eventually, the proposed beam elements are supplemented by an implicit, second-order accurate time integration scheme recently proposed in the literature for time discretization of large rotations. This integration scheme can be identified as Lie group extension of the well-known generalized-α method with comparable properties. The generality and flexibility of this scheme allow for a straightforward combination with the different element formulations considered in this work. The review of existing geometrically exact Kirchhoff-Love beam elements revealed that there are only a few approaches of this kind that are suitable for general 3D, large-deformation problems. These approaches have been categorized in isotropic, straight and anisotropic Kirchhoff-Love formulations. A detailed evaluation of these formulations led to the result that typically only a few of the essential requirements summarized in Table 2 are fulfillled. On the contrary, for the finite elements proposed in this work, the fulfillment of these essential properties such as objectivity and path-independence, consistent spatial convergence behavior, the avoidance of locking in the high slenderness regime or the conservation of energy and momentum by the spatial discretization scheme have been shown theoretically and verified by means of representative numerical examples. In the context of conservation properties, especially, the influence of applying either Bubnov-Galerkin or Petrov-Galerkin discretizations has been in the focus. Concerning locking behavior, the recently proposed MCS method has been compared with alternative methods known from the literature such as Assumed Natural Strains (ANS) or Reduced Integration (RI) schemes (see also [105]). In contrast to these alternative methods, the MCS method could effectively avoid any evidence of membrane locking for all investigated load cases and slenderness ratios. In contrast to previously existing Kirchhoff-Love formulations, Simo-Reissner formulations fulfilling the requirements of Table 2 can be found in the literature very well. However, it has been argued that the shear-free Kirchhoff-Love formulations can provide considerable numerical advantages such as lower spatial discretization error level, improved performance of time integration schemes as well as linear and nonlinear solvers or smooth geometry representation as compared to shear-deformable Simo-Reissner formulations when applied to highly slender beams. On the basis of several numerical examples, detailed and systematic numerical comparisons of the resulting discretization error levels and performance of the nonlinear solver have been performed between the four variants of the proposed geometrically exact Kirchhoff-Love beam elements and two well-established geometrically 78 exact Simo-Reissner beam element formulations known from the literature. Most of the examples have been investigated for the two different slenderness ratios ζ = 100 and ζ = 10000. For the low slenderness ratio ζ = 100, the general model difference between the shear-free Kirchhoff-Love theory and the Simo-Reissner theory of shear-deformable beams, measured in form of the relative L2 -error remaining in the limit of arbitrarily fine spatial discretizations, typically lay below 0.1%. Also the quadratic decrease of this model difference with increasing slenderness ratio could be confirmed numerically. In all investigated examples, the proposed WK elements have shown a lower discretization error level than the investigated Simo-Reissner beam element formulation. These results confirm the theoretical prediction that Kirchhoff type formulations can achieve the same discretization error level as Reissner type formulations with less degrees of freedom, since no shear deformation has to be represented. Compared to the excellent results of the WK elements, the SK elements showed an increased discretization error level, in some examples even higher as for the Simo-Reissner elements. Based on the underlying convergence theory, this phenomenon could be attributed to the polynomial degree k = 3 of the employed trial functions and predicted to vanish for higher-order elements with k > 3. This prediction has been confirmed by means of a first numerical test case employing Hermite polynomials of order k = 5 which resulted in the expected optimal discretization error level lying below the error level of the Simo-Reissner reference formulation. While most of the investigated examples have been conducted in a quasi-static manner, also one well-known dynamic benchmark test from the literature has been conducted. There, the accuracy of the inertia contributions as well as the energy stability of the employed time integration scheme could be confirmed. Besides the resulting discretization error level, also the total number of Newton-Raphson iterations required to solve the considered test cases by means of the different element formulations and for different slenderness ratios has been analyzed in a systematic manner. For all investigated examples and slenderness ratios, the proposed SK-TAN and WK-TAN elements required less Newton iterations to solve the problem as compared to the two well-established Simo-Reissner formulations chosen as reference. In the small slenderness range ζ = 100, the results of the four proposed Kirchhoff-Love variants and the two investigated Simo-Reissner formulations lay at least in the same order of magnitude. While the behavior of the Kirchhoff-Love formulations remained more or less unchanged, the number of Newton iterations required by the two different Simo-Reissner formulations increased considerably with increasing slenderness ratio. In the investigated examples with slenderness ratio ζ = 10000, this number was up to two orders of magnitude(!) higher for the Simo-Reissner elements as compared to the proposed SK-TAN and WK-TAN elements. Also the number of iterations required by the SK-ROT and WK-ROT elements, which are based on nodal rotation vectors for triad parametrization, has been independent from the considered slenderness ratio, higher as for the SK-TAN and WK-TAN elements but still considerably lower as for the Reissner type elements. Recapitulatory, out of the four proposed Kirchhoff variants, the WK-TAN element, based on a weak enforcement of the Kirchhoff constraint and a triad parametrization via nodal tangent vectors, can be recommended in terms of a low discretization error level and an excellent performance of the Newton-Raphson scheme. Of course, further factors could be considered in a comprehensive comparison. For example, the SK-ROT and WK-ROT elements based on nodal rotation vectors simplify the prescription of Dirichlet conditions. The flexibility of the proposed beam element variants allows to combine the advantages of the two different rotation parametrizations by choosing e.g. the WK-TAN element as basic formulation that provides an excellent Newton Raphson performance and by replacing the nodal tangents by nodal rotation vectors at nodes where complex boundary or coupling conditions have to be prescribed. This can be realized by a simple transformation applied to the residual and stiffness contributions of the relevant node. The abstaining from stiff shear mode contributions underlying the proposed Kirchhoff-Love element formulations may not only yield an improved Newton-Raphson performance. Also the highest eigenfrequency band of slender beams, which is associated with the shear modes, can be avoided by this means. The theoretical considerations made in this work give hope for considerably improved stability properties of numerical time integration schemes when combined with the developed shear-free elements. A future numerical investigation of this topic seems to provide a considerable scientific potential. 79 Appendix A. Definition of rotational shape function matrices In this appendix, the shape functions Ĩi (ξ) required for the multiplicative rotation increments ∆θ(ξ) = nΛ X Ĩi (ξ)∆θ̂i , ∆θ0 (ξ) = i=1 nΛ X Ĩi0 (ξ)∆θ̂i . (A.1) i=1 associated with the triad interpolation 105 and originally derived in [80] shall be presented: Ĩi (ξ) = Li (ξ)Λr T−1 (Φlh (ξ))T(Φil )ΛTr      nΛ     X   I T  j  j L (ξ)T(Φ ) + δiI Λr I3 − T−1 (Φlh (ξ))   v Λr   l      j=1      nΛ     X    J T  j  j −1 iJ  L (ξ)T(Φl ) + δ Λr I3 − T (Φlh (ξ))   v Λr .       j=1 In (A.2), no summation over double indices is applied. The vectors vI and v J are defined as ! ! ! ! 1 1 ΦI J 1 1 ΦI J I IJ J IJ v = I3 + I J tan S(Φ ) , v = I3 − I J tan S(Φ ) , 2 Φ 4 2 Φ 4 (A.2) (A.3) with the common abbreviation ΦI J = ||ΦI J ||. Moreover, the arc-length derivative Ĩi0 (ξ) reads: i T Ĩi (ξ) = Li0 (ξ)Λr T−1 (Φlh (ξ))T(Φil )ΛTr + Li (ξ)Λr T−1 ,s (Φlh (ξ))T(Φl )Λr          nΛ nΛ       X X         I T j j  j j0 iI  −1 −1 L (ξ)T(Φ ) L (ξ)T(Φ ) − δ Λr T,s (Φlh (ξ)) +T (Φ (ξ)) v Λr    lh     l l      j=1   j=1           nΛ nΛ       X X         J T j j j j0 −1 − δiJΛr T−1 L (ξ)T(Φ ) L (ξ)T(Φ ) +T (Φ (ξ))    lh ,s (Φlh (ξ)) v Λr .   l  l       j=1   j=1  (A.4) Finally, the required arc-length derivative T−1 ,s (Φlh (ξ)) is given by (see also [79, 40]): 1 − cos Φlh Φlh sin Φlh − 2(1 − cos Φlh ) S(Φlh ) + S(Φ0lh ) 4 Φlh Φ2lh !  sin Φlh  1− S(Φlh )S(Φ0lh ) + S(Φ0lh )S(Φlh ) Φlh T 0 T−1 ,s (Φlh (ξ)) = Φlh Φlh + 1 Φ2lh + ΦTlh Φ0lh (A.5) 3 sin Φlh − Φlh (2 + cos Φlh ) S(Φlh )S(Φlh ). Φ5lh Here, the abbreviations Φlh = Φlh (ξ) as well as Φlh = ||Φlh (ξ)|| have been applied. As mentioned in the original 0 work [80], the limit T−1 ,s (Φlh (ξ)) → 0.5S(Φlh (ξ)) can be derived for small angles Φlh (ξ) → 0. Appendix B. Modeling of Dirichlet boundary conditions and joints For many applications, the formulation of proper Dirichlet boundary conditions or joints between the nodes of different beam elements are of a high practical relevance. This appendix represents a brief summary, where the possibility of formulating some basic constraint conditions will be investigated for the SK-ROT and the SK-TAN element. 80 Appendix B.1. SK-ROT element Since the SK-ROT element simplifies the formulation of Dirichlet boundary conditions and kinematic constraints in many practically relevant cases, it will be considered first. i) Dirichlet boundary conditions: A simple support at element node a can be realized via d̂a = d̂au = d̂a0 → ∆d̂a = 0. (B.1) If a clamped end should be modeled, also the cross-section orientation has to be fixed, i.e. Λa = Λau = Λa0 , and ψ̂a = ψ̂a0 → ∆θ̂a = 0. (B.2) Thus, the modeling of Dirichlet boundary conditions for the employed translational and rotational degrees of freedom is similar to standard finite elements that are purely based on translational degrees of freedom. This procedure can also be extended to inhomogeneous conditions. However, the determination of ∆θ̂a requires special care in this case: d̂a = d̂au (t) → ∆d̂an+1 = d̂au,n+1 − d̂au,n , (B.3) a Λa = Λau (t) → exp(S(∆θ̂n+1 )) = Λau,n+1 ΛaT u,n . The multiplicative procedure of the second line simplifies to the additive procedure according to the first line if the prescribed rotation is additive, which only holds for 2D rotations. ii) Connections: A simple (moment-free) joint between the two nodes a and b of two connected elements reads: d̂b = d̂a , δd̂b = δd̂a , ∆d̂b = ∆d̂a . (B.4) Thus, the degrees of freedom d̂b can be eliminated from the global system of equations in a standard manner by simply assembling the corresponding lines and columns of the global residual vector and stiffness matrix properly. A rigid joint between two elements prescribed at the nodes a and b additionally requires to suppress any relative rotation between the associated nodal triads. It is assumed that these nodal triads differ by some fixed relative rotation Λ0 : Λa = Λb Λ0 exp(S(∆θ̂a )) = exp(S(∆θ̂b ))Λ0 or → Λ0 = ΛbT Λa . (B.5) From (B.5), the following relations between the associated rotation increments can be derived: δΛa = δΛb Λ0 → S(δθ̂a )Λa = S(δθ̂b )Λb Λ0 → δθ̂b = δθ̂a → ∆θ̂b = ∆θ̂a . (B.6) Consequently, also the rotational degrees of freedom ψ̂ can be eliminated in a standard manner by simply assembling the corresponding lines and columns of the global residual vector and of the global stiffness matrix properly. b Remark: It is emphasized that a rigid joint according to (B.5) is formulated via right-translation of the rotation tensor Λ0 . This is mandatory since a rigid joint represents a fixed orientation difference between material quantities, i.e. a fixed relative rotation with respect to material axes. A left-translation via Λa = Λ0 Λb → Λ0 = Λa ΛbT → δθ̂b = ΛT0 δθ̂a , δθ̂a , (B.7) i.e. a fixed relative rotation with respect to spatial axes, has a different physical meaning. Remark: If additive increments ∆ψ̂a and ∆ψ̂b of the rotation vectors ψ̂a and ψ̂b instead of the multiplicative increments ∆θ̂a and ∆θ̂b were applied in the linearization process, equation (B.6) has to be replaced by: ∆θ̂b = ∆θ̂a → ∆ψ̂b = T(ψ̂b )T−1 (ψ̂a )∆ψ̂a , ∆ψ̂a . (B.8) In this case, a direct elimination of the degrees of freedom ψ̂b via a proper assembly of the global stiffness matrix is not possible. Instead, the corresponding columns have to be scaled with the matrix T(ψ̂b )T−1 (ψ̂a ). Remark: Physically reasonable boundary conditions can be completely defined by the cross-section orientation and centroid position. For all considered types of boundary conditions, the degrees of freedom tˆa and tˆb , which are a measure for the nodal axial force, are part of the FEM solution and must not be prescribed. 81 Appendix B.2. SK-TAN element The treatment of the translational degrees of freedom required for the subsequently considered boundary conditions is identical to the last section and will therefore be omitted here. i) Dirichlet boundary conditions: In order to model a clamped end with the SK-TAN element, the simplest case of a tangent vector that is parallel to a global base vector, e.g. t̂a k e1 , is considered. Then, (B.1) has to be supplemented by t̂aT e2 = t̂aT e3 = 0 → ∆tˆ2a = ∆tˆ3a = 0 and ϕ̂a = ϕ̂a0 → ∆ϕ̂a = 0. (B.9) Here, the representation t̂a = tˆia ei of the tangent in the global frame ei has been exploited. In order to prescribe boundary conditions with arbitrary triad orientation, the tangent has to be expressed in the basis of the prescribed triad: Λa = Λau = Λa0 , t̂a = T̂ ia gai → T̂ 2a = T̂ 3a = 0 → ∆T̂ 2a = ∆T̂ 3a = 0, ϕ̂a = ϕ̂a0 → ∆ϕ̂a = 0. (B.10) Consequently, in this case, the equations of the linearized residual vector that are associated with the degrees of freedom t̂a have to be transformed by the rotation tensor Λa0 and the Dirichlet conditions have to be formulated in this rotated coordinate system. Again, the first component T̂ 1 of the tangent vector, when expressed in the material frame, represents its magnitude and must not be prescribed. If the Dirichlet conditions are time-dependent, the prescribed evolution of the relative angle has to be adapted, since now the intermediate frame ΛaMϕ̂ might change in time: a a a exp(S[ϕ̂an+1 ga1,n+1 ]) = Λan+1 ΛaT Mϕ̂ ,n+1 with Λ Mϕ̂ ,n+1 = sr(Λ Mϕ̂ ,n , g1,n+1 ). (B.11) Thus, the required value ϕ̂an+1 has to be determined based on the prescribed current triad Λan+1 and the intermediate triad ΛaMϕ̂ ,n of the last step (see also Section 6.2.2). The remaining conditions remain unchanged as compared to (B.10). ii) Connections: Based on (B.5), (B.6) and (25), the following relations between (t̂a , ϕ̂a ) and (t̂b , ϕ̂b ) can be stated: ! 1 a a a a b b b b b b b b δt̂ = −t S(g1 ) |{z} δθ +g1 δt = −t S(g1 ) a S(g1 )δt̂ + g1 δΘ̂1 + gb1 δtˆb , t =δθ ˙ a ! (B.12) b bT b bT 1 a a a a δΘ̂1 = g1 |{z} δθ = g1 a S(g1 )δt̂ + g1 δΘ̂1 . t a =δθ ˙ Combining these two relations eventually yields the following total transformation matrix:   ! !  δt̂a  1 b b b a b b a b   δt̂ −t S(g1 ) ta S(g1 ) −t S(g1 )g1 g1   δΘ̂a1  . = bT 1 a bT a b g1 ta S(g1 ) g g 0  b  δΘ̂1 | {z 1 1 } δtˆ (B.13) =:TRC A similar relation can also be formulated for the iterative increments. Since the multiplicative rotation increment components ∆Θ1 = TΘM1t ∆t + ∆ϕ (see (20)) have to be expressed by additive increments ∆t and ∆ϕ for the chosen linearization scheme, an additional transformation is required as compared to (B.13):  a   ! !  ∆t̂   I3 0 0  b I3 0 ∆t̂     = T̃RC1 TRC T̃RC2 ∆ϕ̂a1 , T̃RC1 := , T̃RC2 := TΘM1t 1 0 . (B.14) −TΘM1t 1 ∆ϕ̂b  ˆb   T  0 0 1 ∆t Equations (B.13) and (B.14) allow to transform the corresponding lines and columns of the global residual vector and of the global tangent stiffness matrix properly and to eliminate the degrees of freedom (t̂b , ϕ̂b ) from the global system of equations. Again, the magnitude of the tangent vector tˆb is not influenced by the rigid joint and enters the system of equations as new degree of freedom. While in the last section, the motion of the rigid joint was completely determined by the set (d̂a , ψ̂a , tˆa , tˆb ), in this section the alternative set (d̂a , t̂a , ϕ̂a , tˆb ) is employed. 82 All in all, it can be concluded that the realization of clamped ends with arbitrary orientation or of rigid joints between beams is simpler for the SK-ROT formulation based on nodal rotation vectors. While for these elements such conditions can directly be formulated in the global coordinate system, the tangent vector-based SK-TAN formulation requires an additional transformation of the corresponding lines and columns of the global residual vector and stiffness matrix. In Section 11, some properties of the tangent vector-based variant will become apparent which make this type of formulation favorable for many applications. If certain element nodes require Dirichlet conditions of the type considered here, it is still possible to apply a hybrid approach, and to replace the nodal tangents by nodal rotation vectors as primary variables only at the specific nodes where such conditions are required. All the results derived so far apply in a similar manner to the WK-TAN and WK-ROT elements that will be derived in the next section. Appendix C. Linearization of SK-TAN element Before deriving the linearization of the SK-TAN element, some former definitions are repeated: t := r0 , g1 := r0 , ||r0 || t̃ := r0 , ||r0 ||2 g01 = r00 (r0T r00 )r0 − , ||r0 || ||r0 ||3 t̃0 = r00 2(r0T r00 )r0 − . 0 2 ||r || ||r0 ||4 (C.1) These quantities will be required for later derivations. Linearization of (C.1) yields:   1  1  I3 −g1 ⊗gT1 H0 ∆d̂, ∆t̃ = 0 2 I3 −2g1 ⊗gT1 H0 ∆d̂, 0 ||r || ||r || 0T 00     (r r ) 1 0 ∆g01 = − 0 3 I3 −g1 ⊗gT1 H0 ∆d̂ − 0 g01 ⊗gT1 +g1 ⊗g0T 1 H ∆d̂ ||r || ||r ||  1  + 0 I3 −g1 ⊗gT1 H00 ∆d̂, ||r ||   2  2(r0T r00 )  0 ∆t̃0 = − I3 −2g1 ⊗gT1 H0 ∆d̂ − 0 2 g01 ⊗gT1 +g1 ⊗g0T 1 H ∆d̂ 0 4 ||r || ||r ||  1  + 0 2 I3 −2g1 ⊗gT1 H00 ∆d̂. ||r || ∆g1 = (C.2) In the following, the linearization of the SK-TAN element will be derived. For completeness, the underlying residual vector (162) with inserted strain re-interpolation (163) is repeated here: " # Z1  T T 0 rd̂ = vθ⊥m+ v̄ F̄1 − H f̃ρ − vθ⊥m̃ρ J(ξ)dξ− H fσ + vθ⊥ mσ , Γσ −1 (C.3) " # Z1  rΘ̂1 = v0θkΘ m − vθkΘ m̃ρ J(ξ)dξ − vθkΘ mσ . Γσ −1 The linearization of the element residual vector (C.3) obeys the following general form: Z1  ∆rd̂ = ∆v0θ⊥m+ v0θ⊥∆m+∆v̄ F̄1 + v̄ ∆F̄1 J(ξ)dξ −1 − Z1  " # HT ∆fρ +∆vθ⊥m̃ρ + vθ⊥∆mρ J(ξ)dξ− ∆vθ⊥mσ , (C.4) Γσ −1 " # Z1  ∆rΘ̂1 = ∆v0θkΘ m+ v0θkΘ ∆m − ∆vθkΘ m̃ρ − vθkΘ ∆mρ J(ξ)dξ − ∆vθkΘ mσ . Γσ −1 83 In order to identify the element stiffness matrix kS K−T AN , (C.4) has to be brought in the form ∆rS K−T AN =: kS K−T AN ∆x̂T AN . (C.5) The vector ∆x̂T AN has already been defined in Section 9.1. The moment-related terms yield: ∆v0θ⊥m = H00T S(m)∆t̃+ H0T S(m)∆t̃0 , ∆m = −S(m)∆θ+cm ∆θ0 , ∆vθ⊥m̃ρ = H0T S(m̃ρ )∆t̃, ∆vθ⊥mσ = H0T S(mσ )∆t̃, ∆vθkΘ m̃ρ = (LTk ⊗ m̃Tρ )∆g1 , ∆vθkΘ mσ = (LTk ⊗mTσ )∆g1 , (C.6) T T T 0 ∆v0θkΘ m = (L0T k ⊗m )∆g1 +(Lk ⊗m )∆g1 . Here, many of the relations already derived in Section 6.2.4 could be re-used. The field of multiplicative rotation vector increments ∆θ follows directly from equation (121): Θ1+(vTθ⊥ + vTθkd )∆d̂, ∆θ = vTθkΘ ∆Θ̂ vθkΘ = LTk ⊗gT1 , vθ⊥ = −H0T S(t̃),  nΛ  X i  H0T (ξ)(g1I × t̃) − H0T (ξI )(g1 × t̃I ) , vθkd =  L v1i − v1  ⊗gT1 , v1 = 1+g1T g1I i=1 v1i = v1 (ξi ) = H0T (ξi )(g1I × t̃i ) − H0T (ξI )(gi1 × t̃I ) 1+gi1T g1I (C.7) . In a similar manner, the associated arc-length derivative ∆θ0 follows from equation (122): 0T Θ1+(v0T ∆θ0 = v0T θ⊥+ vθkd )∆d̂, θkΘ ∆Θ̂ 00T 0T T 0 0 0T 0 T v0θkΘ = L0T k ⊗g1 + Lk ⊗g1 , vθ⊥ = −H S(t̃)− H S(t̃ ), t̃ = v0θkd = nΛ X r00 2(r0T r00 )r0 − , ||r0 ||2 ||r0 ||4 nΛ  X  Li0 v1i − v01 ⊗gT1 + Li v1i − v1 ⊗g0T 1 , (C.8) i=1 0T v01 = H i=1 00T I 0 I (ξ)(g1 × t̃ )+ H (ξ)(g1I × t̃)− H0T (ξI )(g01 × t̃I ) (g0T 1 g1 )v1 − . 1+gT1g1I 1+g1T g1I The remaining linearizations required in equation (C.6) have already been derived in (C.2). In contrast to the spin vector field δθ, the increment field ∆θ has to be expressed via additive relative angle increments ∆ϕ̂i . The required relation is given by (127) and repeated here: Θ1 = (Θ̂11 , Θ̂21 , Θ̂31 )T , ∆Θ̂ ∆Θ̂i1 = − i 0 i ḡiT 1 S(g1 ) H (ξ )∆d̂ + ∆ϕ̂i . i i || ||t 1 + giT ḡ 1 1 The linearization of the element residual terms associated with axial tension results in: 3 X H0T ∆F̄1 = EA∆¯ = EAv̄T ∆d̂, ∆v̄ = Li (ξ)∆v (ξi ), ∆v = 0 (I3 +g1 ⊗gT1 )H0 ∆d̂. ||r || i=1 (C.9) (C.10) Based on equation (93), the linearization of the inertia forces can be written as: −HT∆fρ = ρAcr̈1 HT H∆d̂, cr̈1 = 1−αm . (1−αm )β∆t2 (C.11) The time integration factor cr̈1 of the modified generalized-α scheme according to Section 5 slightly differs from the corresponding factor of the standard generalized-α scheme. The linearization of the inertia moments yields: −∆mρ = S(mρ )∆θ + [cW {S(W)Cρ − S(Cρ W)} + cA Cρ ]∆Θ̃n+1 , 1−αm γ cA = , cW = , ∆Θ̃n+1 = ΛTn ∆θ̃n+1 = ΛTn T(θ̃n+1 )∆θ. 2 β∆t (1−αm )β∆t 84 (C.12) For clarity, the indices n + 1 and n of the current and previous time step have explicitly been noted for some of the quantities occurring in (C.12). All the other quantities are evaluated at tn+1 . As already introduced in Section 5, the fields Θ̃n+1 and θ̃n+1 are the material and spatial multiplicative rotation increments relating the current configuration and the converged configuration of the previous time step tn . The two vectors are related by the transformation Θ̃n+1 = ΛTn+1 θ̃n+1 = ΛTn θ̃n+1 → ∆Θ̃n+1 = ΛTn ∆θ̃n+1 . (C.13) The second step in (C.13) is valid since θ̃n+1 is an eigenvector with eigenvalue one of the rotation tensor Λn+1 ΛTn between the configurations n and n+1, thus Λn+1 ΛTn θ̃n+1 = θ̃n+1 . Furthermore, ∆Θ̃n+1 and ∆θ̃n+1 represent the fields of additive increments of Θ̃n+1 and θ̃n+1 between two successive Newton iterations, whereas ∆θ as given by (C.7) represents the field of multiplicative rotation increments between two successive Newton iterations. Appendix D. Linearization of WK-TAN element The residual vector of the WK-TAN element is given in equation (180) and repeated here: " # Z1  rd̂ = v̄0θ⊥m+ v̄ F̄1 − HT f̃ρ − v̄θ⊥m̃ρ J(ξ)dξ− HT fσ + v̄θ⊥ mσ , Γσ −1 (D.1) " # Z1  rΘ̂1 = v̄0θkΘ m − v̄θkΘ m̃ρ J(ξ)dξ − v̄θkΘ mσ . Γσ −1 The linearization of the element residual vector (D.1) obeys the following general form: Z1  ∆rd̂ = ∆v̄0θ⊥m+ v̄0θ⊥∆m+∆v̄ F̄1 + v̄ ∆F̄1 J(ξ)dξ −1 − Z1 " # H ∆fρ +∆v̄θ⊥m̃ρ + v̄θ⊥∆mρ J(ξ)dξ− ∆v̄θ⊥mσ ,  T (D.2) Γσ −1 " # Z1  0 0 ∆rΘ̂1 = ∆v̄θkΘ m+ v̄θkΘ ∆m − ∆v̄θkΘ m̃ρ − v̄θkΘ ∆mρ J(ξ)dξ − ∆v̄θkΘ mσ . Γσ −1 In order to identify the element stiffness matrix kWK−T AN , (D.2) has to be brought in the form ∆rWK−T AN =: kWK−T AN ∆x̂T AN . (D.3) The linearization of the vectors v̄... and v̄0... originally defined in (180) follows to: ∆v̄θ⊥ =− 3 X Li (ξ)∆vθ⊥ (ξi ), 3 X ∆v̄ = Li (ξ)∆v (ξi ), i=1 i=1 3 X ∆v̄θkΘ = Li (ξ)∆vθkΘ (ξi ) i=1 3 X Li , ξ(ξ) ∆v... (ξi ). with ∆v̄0...= J(ξ) i=1 (D.4) The linearization of the vectors v... and v0... has already been stated in the last section. Also the linearization of the moment stress resultant has the same form as in the last section: ∆m = −S(m)∆θ+cm ∆θ0 . 85 (D.5) However, the fields ∆θ and ∆θ0 originally defined in Section 6.2.3 are this time given by ∆θ = 3 X i=1 3 X 1 i Ĩ (ξ)∆θ(ξ ), ∆θ = Ĩ,ξ (ξ)∆θ(ξi ). J(ξ) i=1 i 0 i (D.6) Due to the Kirchhoff constraint, the nodal increments ∆θ(ξi ) can be expressed according to: ∆θ(ξi ) = ∆Θ̂i1 g1 (ξi )+ vTθ⊥ (ξi )∆d̂, ∆Θ̂i1 = − i 0 i ḡiT 1 S(g1 ) H (ξ )∆d̂ + ∆ϕ̂i . i ||ti || 1 + giT 1 ḡ1 (D.7) The linearization of the inertia forces is identical to the corresponding results of the last section: −HT∆fρ = ρAcr̈1 HT H∆d̂, cr̈1 = 1−αm . (1−αm )β∆t2 (D.8) This statement also holds for the linearization of the inertia moments, which reads: −∆mρ = S(mρ )∆θ + [cW {S(W)Cρ − S(Cρ W)} + cA Cρ ]∆Θ̃n+1 , 1−αm γ , ∆Θ̃n+1 = ΛTn ∆θ̃n+1 = ΛTn T(θ̃n+1 )∆θ. cA = , cW = β∆t (1−αm )β∆t2 (D.9) However, for the WK-TAN element, the rotation increment field ∆θ is given by equation (D.6). Appendix E. Linearization of SK-ROT and WK-ROT elements The nodal primary variable variations of the SK/WK-TAN and the SK/WK-ROT elements read: δx̂T AN := (δd̂1T, δt̂1T, δΘ̂11 , δd̂2T, δt̂2T, δΘ̂21 , δΘ̂31 )T , (E.1) δx̂ROT := (δd̂1T, δθ̂1T, δtˆ1 , δd̂2T, δθ̂2T, δtˆ1 , δΘ̂31 )T . In a similar manner, the set of iterative nodal primary variable increments have been defined as: ∆x̂T AN := (∆d̂1T, ∆t̂1T, ∆ϕ̂1 , ∆d̂2T, ∆t̂2T, ∆ϕ̂2 , ∆ϕ̂3 )T , (E.2) ∆x̂ROT := (∆d̂1T, ∆θ̂1T, ∆tˆ1 , ∆d̂2T, ∆θ̂2T, ∆tˆ1 , ∆ϕ̂3 )T . The transformations between these primary variable variations and increments is given by: δx̂T AN = T̃x̂ δx̂ROT and ∆x̂T AN = T Mx̂ ∆x̂ROT . (E.3) The transformation matrices T̃x̂ , originally defined in (166), and T Mx̂ have the following form:   I3   T̃x̂ =    T̃1 I3 T̃2 1         and   I3   T Mx̂ =    T1M I3 T2M 1      .   (E.4) These two different matrices are required, since the primary variable variations of the SK/WK-TAN elements are based on the multiplicative quantities δΘ̂i1 , whereas the corresponding iterative primary variable increments are based on the additive quantities ∆ϕ̂i . The matrices T̃i and TiM ((25) and (24)) are evaluated at the element boundary nodes: T̃i := T̃(ξi ) and TiM := T M (ξi ) 86 for i = 1, 2. (E.5) In Section 9.2, it has already been shown that the following residual transformation is valid: T rROT = T̃x̂ rT AN . (E.6) In a similar manner, also the linearized element residual vector can be transformed:   T T T ∆rROT = ∆T̃x̂ rT AN + T̃x̂∆rT AN =: H̃x̂ (rT AN )+ T̃x̂ kT AN T Mx̂ ∆x̂ROT . |{z} | {z } =kT AN ∆x̂T AN (E.7) :=kROT Here, the matrix H̃x̂ (rT AN ) has been introduced, in order to represent the linearization of T̃x̂ : T H̃x̂ (rT AN )∆x̂ROT := ∆T̃x̂ rT AN   0   with H̃x̂ (rT AN ) =    1 H̃ 0 2 H̃ 0      .    (E.8) i After calculating the derivative of T̃x̂ and re-ordering the result, the submatrices H̃ can be stated:    S(rT AN,t̂i )S(gi1 ) − rT AN,Θ̂i1 S(gi1 ) S(gi1 )rT AN,t̂i  i  , i = 1, 2.  H̃ =  −rTT AN,t̂i S(gi1 ) 0 (E.9) From (E.7), the following transformation rule for the the element stiffness matrix can be stated: ∆rROT = kROT ∆x̂ROT T kROT = H̃x̂ (rT AN )+ T̃x̂ kT AN T Mx̂ . with (E.10) In order to apply this transformation, the components of the element stiffness matrices kT AN and kROT have to be arranged in the same order as the components of the element residual vectors: rT AN := (rTT AN,d̂1 , rTT AN,t̂1 , rT AN,Θ̂1 , rTT AN,d̂2 , rTT AN,t̂2 , rT AN,Θ̂2 , rT AN,Θ̂3 )T , 1 1 1 rROT := (rTROT,d̂1 , rTROT,θ̂1 , rROT,tˆ1 , rTROT,d̂2 , rT T ˆ2 , rROT,tˆ2 , rROT,Θ̂3 ) . ROT,θ (E.11) 1 References [1] L. X. Ademir. Static Kirchhoff rods under the action of external forces: Integration via Runge-Kutta method. Journal of Computational Methods in Physics, 2014:650365, 2014. [2] S. S. Antman. Kirchhoff’s problem for nonlinearly elastic rods. Quarterly of Applied Mathematics, 32(3):221–240, 1974. [3] S. S. Antman. Nonlinear problems of elasticity. Springer, 1995. [4] J. H. Argyris, H. Balmer, J. St. Doltsinis, P. C. Dunne, M. Haase, M. Kleiber, G. A. Malejannakis, H.-P. Mlejnek, M. Müller, and D. W. Scharpf. Finite element method–the natural approach. Computer Methods in Applied Mechanics and Engineering, 17-18(Part 1):1–106, January 1979. [5] F. Armero and J. Valverde. Invariant Hermitian finite elements for thin Kirchhoff rods. I: The linear plane case. Computer Methods in Applied Mechanics and Engineering, 213-216:427–457, 2012. [6] F. Armero and J. Valverde. Invariant Hermitian finite elements for thin Kirchhoff rods. II: The linear three-dimensional case. Computer Methods in Applied Mechanics and Engineering, 213-216:458–485, 2012. [7] M. Arnold and O. Brüls. Convergence of the generalized-α scheme for constrained mechanical systems. Multibody System Dynamics, 18(2):185–202, 2007. [8] D. G. Ashwell and A. B. Sabir. Limitations of certain curved finite elements when applied to arches. International Journal of Mechanical Sciences, 13(2):133–139, 1971. [9] D. G. Ashwell, A. B. Sabir, and T. M. Roberts. Further studies in the application of curved finite elements to circular arches. International Journal of Mechanical Sciences, 13(6):507–517, 1971. [10] A. Avello, J. G. de Jaln, and E. Bayo. Dynamics of flexible multibody systems using cartesian co-ordinates and large displacement theory. International Journal for Numerical Methods in Engineering, 32(8):1543–1563, 1991. [11] K.-J. Bathe and S. Bolourchi. Large displacement analysis of three-dimensional beam structures. International Journal for Numerical Methods in Engineering, 14(7):961–986, 1979. [12] K.-J. Bathe, A. Iosilevich, and D. Chapelle. An inf-sup test for shell finite elements. Computers & Structures, 75(5):439–456, 2000. 87 [13] J.-M. Battini and C. Pacoste. Co-rotational beam elements with warping effects in instability problems. Computer Methods in Applied Mechanics and Engineering, 191(17–18):1755–1789, 2002. [14] O. A. Bauchau and C. L. Bottasso. On the design of energy preserving and decaying schemes for flexible, nonlinear multi-body systems. Computer Methods in Applied Mechanics and Engineering, 169(12):61–79, 1999. [15] O. A. Bauchau, S. Han, A. Mikkola, and M. K. Matikainen. Comparison of the absolute nodal coordinate and geometrically exact formulations for beams. Multibody System Dynamics, 32(1):67–85, 2014. [16] A. M. Bauer, M. Breitenberger, B. Philipp, R. Wüchner, and K.-U. Bletzinger. Nonlinear isogeometric spatial Bernoulli beam. Computer Methods in Applied Mechanics and Engineering, 303:101–127, 2016. [17] T. Belytschko and B. J. Hseih. Nonlinear transient finite element analysis with convected coordinates. International Journal for Numerical Methods in Engineering, 7:255–271, 1973. [18] T. Belytschko and W. G. Lawrence. Applications of higher order corotational stretch theories to nonlinear finite element analysis. Computers & Structures, 10(1):175–182, 1979. [19] M. Bergou, M. Wardetzky, S. Robinson, B. Audoly, and E. Grinspun. Discrete elastic rods. ACM Transactions on Graphics, 27(3):63:1– 63:12, August 2008. [20] F. Bertails, B. Audoly, M.-P. Cani, B. Querleux, F. Leroy, and J.-L. Lévêque. Super-helices for predicting the dynamics of natural hair. ACM Transactions on Graphics, 25(3):1180–1187, July 2006. [21] P. Betsch and P. Steinmann. Constrained integration of rigid body dynamics. Computer Methods in Applied Mechanics and Engineering, 191(35):467–488, 2001. [22] P. Betsch and P. Steinmann. Frame-indifferent beam finite elements based upon the geometrically exact beam theory. International Journal for Numerical Methods in Engineering, 54(12):1775–1788, 2002. [23] R. L. Bishop. There is more than one way to frame a curve. The American Mathematical Monthly, 82(3):246–251, 1975. [24] M. Borri and C. Bottasso. An intrinsic beam model based on a helicoidal approximation - Part I: Formulation. International Journal for Numerical Methods in Engineering, 37(13):2267–2289, 1994. [25] M. Borri and C. Bottasso. An intrinsic beam model based on a helicoidal approximation - Part II: Linearization and finite element implementation. International Journal for Numerical Methods in Engineering, 37(13):2291–2309, 1994. [26] C. L. Bottasso and M. Borri. Integrating finite rotations. Computer Methods in Applied Mechanics and Engineering, 164(34):307–331, 1998. [27] F. Boyer, G. De Nayer, A. Leroyer, and M. Visonneau. Geometrically exact Kirchhoff beam theory: Application to cable dynamics. Journal of Computational and Nonlinear Dynamics, 6:1–14, 2011. [28] F. Boyer and D. Primault. Finite element of slender beams in finite transformations: A geometrically exact approach. International Journal for Numerical Methods in Engineering, 59(5):669–702, 2004. [29] F. Brezzi. On the existence, uniqueness and approximation of saddle-point problems arising from lagrangian multipliers. ESAIM: Mathematical Modelling and Numerical Analysis - Modélisation Mathématique et Analyse Numérique, 8(R2):129–151, 1974. [30] F. Brezzi and M. Fortin. Mixed and hybrid finite elements. Springer, 1991. [31] O. Brüls and A. Cardona. On the use of Lie group time integrators in multibody dynamics. Journal of Computational and Nonlinear Dynamics, 5:031002, 2010. [32] O. Brüls, A. Cardona, and M. Arnold. Lie group generalized-α time integration of constrained flexible multibody systems. Mechanism and Machine Theory, 48:121–137, 2012. [33] M. Cannarozzi and L. Molari. A mixed stress model for linear elastodynamics of arbitrarily curved beams. International Journal for Numerical Methods in Engineering, 74(1):116–137, 2008. [34] A. Cardona and M. Géradin. A beam finite element non-linear theory with finite rotations. International Journal for Numerical Methods in Engineering, 26(11):2403–2438, 1988. [35] A. Cardona, M. Géradin, and D. B. Doan. Rigid and flexible joint modelling in multibody dynamics using finite elements. Computer Methods in Applied Mechanics and Engineering, 89(1):395–418, 1991. [36] J. K. Choit and J. K. Lim. General curved beam elements based on the assumed strain fields. Computers & Structures, 55(3):379–386, 1995. [37] J. Chung and G. M. Hulbert. A time integration algorithm for structural dynamics with improved numerical dissipation: The generalized-α method. Journal of Applied Mechanics, 60:371–375, 1993. [38] E. Cosserat and F. Cosserat. Théorie des Corps Déformables. Traité de Physique. Paris, second ed. edition, 1909. [39] M. A. Crisfield. A consistent co-rotational formulation for non-linear, three-dimensional, beam-elements. Computer Methods in Applied Mechanics and Engineering, 81(2):131–150, 1990. [40] M. A. Crisfield. Non-linear finite element analysis of solids and structures, Volume 2: Advanced topics. Wiley & Sons, 1997. [41] M. A. Crisfield. Non-linear finite element analysis of solids and structures, Volume 1: Essentials. Wiley & Sons, 2003. [42] M. A. Crisfield, U. Galvanetto, and G. Jelenić. Dynamics of 3-D co-rotational beams. Computational Mechanics, 20(6):507–519, 1997. [43] M. A. Crisfield and G. Jelenić. Objectivity of strain measures in the geometrically exact three-dimensional beam theory and its finite-element implementation. Proceedings of the Royal Society of London. Series A: Mathematical, Physical and Engineering Sciences, 455(1983):1125– 1147, 1999. [44] L. A. Crivelli and C. A. Felippa. A three-dimensional non-linear Timoshenko beam based on the core-congruential formulation. International Journal for Numerical Methods in Engineering, 36(21):3647–3673, 1993. [45] C. J. Cyron and W. A. Wall. Numerical method for the simulation of the Brownian dynamics of rod-like microstructures with threedimensional nonlinear beam elements. International Journal for Numerical Methods in Engineering, 90(8):955–987, 2012. [46] F. Demoures, F. Gay-Balmaz, S. Leyendecker, S. Ober-Blöbaum, T. S. Ratiu, and Y. Weinand. Discrete variational Lie group formulation of geometrically exact beam dynamics. Numerische Mathematik, 130(1):73–123, 2015. [47] E. H. Dill. Kirchhoff’s theory of rods. Archive for History of Exact Sciences, 44(1):1–23, 1992. [48] E. P. Dukić, G. Jelenić, and M. Gaćeša. Configuration-dependent interpolation in higher-order 2D beam finite elements. Finite Elements in Analysis and Design, 78:47–61, 2014. 88 [49] D. Durville. Simulation of the mechanical behaviour of woven fabrics at the scale of fibers. International Journal of Material Forming, 3(2):1241–1251, 2010. [50] E. N. Dvorkin, E. Oñate, and J. Oliver. On a non-linear formulation for curved Timoshenko beam elements considering large displacement/rotation increments. International Journal for Numerical Methods in Engineering, 26(7):1597–1613, 1988. [51] S. R. Eugster, C. Hesch, P. Betsch, and Ch. Glocker. Director-based beam finite elements relying on the geometrically exact beam theory formulated in skew coordinates. International Journal for Numerical Methods in Engineering, 97(2):111–129, 2014. [52] W. W Fan and W. D. Zhu. An accurate singularity-free formulation of a three-dimensional curved EulerBernoulli beam for flexible multibody dynamic analysis. Journal of Vibration and Acoustics, 138(5):051001, 2016. [53] C. A. Felippa and B. Haugen. A unified formulation of small-strain corotational finite elements: I. Theory. Computer Methods in Applied Mechanics and Engineering, 194(21–24):2285–2335, 2005. [54] I. Fried. Shape functions and the accuracy of arch finite elements. American Institute of Aeronautics and Astronautics Journal, 11:287–291, 1973. [55] J. Frischkorn and S. Reese. A solid-beam finite element and non-linear constitutive modelling. Computer Methods in Applied Mechanics and Engineering, 265:195–212, 2013. [56] B. Gadot, O. R. Martinez, S. R. du Roscoat, D. Bouvard, D. Rodney, and L. Orgéas. Entangled single-wire NiTi material: A porous metal with tunable superelastic and shape memory properties. Acta Materialia, 96:311–323, 2015. [57] M. Géradin and A. Cardona. Kinematics and dynamics of rigid and flexible mechanisms using finite elements and quaternion algebra. Computational Mechanics, 4(2):115–135, 1989. [58] M. Géradin and A. Cardona. Flexible multibody dynamics - a finite element approach. Wiley, 2001. [59] S. Ghosh and D. Roy. Consistent quaternion interpolation for objective finite element approximation of geometrically exact beam. Computer Methods in Applied Mechanics and Engineering, 198(3–4):555–571, 2008. [60] S. Ghosh and D. Roy. A frame-invariant scheme for the geometrically exact beam using rotation vector parametrization. Computational Mechanics, 44(1):103–118, 2009. [61] O. Gonzalez. Time integration and discrete Hamiltonian systems. Journal of Nonlinear Science, 6(5):449–467, 1996. [62] S. Goyal, N. C. Perkins, and C. L. Lee. Nonlinear dynamics and loop formation in Kirchhoff rods with implications to the mechanics of DNA and cables. Journal of Computational Physics, 209(1):371–389, 2005. [63] L. Greco and M. Cuomo. B-Spline interpolation of Kirchhoff-Love space rods. Computer Methods in Applied Mechanics and Engineering, 256:251–269, 2013. [64] L. Greco and M. Cuomo. An isogeometric implicit mixed finite element for Kirchhoff space rods. Computer Methods in Applied Mechanics and Engineering, 298:325–349, 2016. [65] F. Gruttmann, R. Sauer, and W. Wagner. A geometrical nonlinear eccentric 3D-beam element with arbitrary cross-sections. Computer Methods in Applied Mechanics and Engineering, 160(34):383–400, 1998. [66] K. M. Hsiao, J. Y. Lin, and W. Y. Lin. A consistent co-rotational finite element formulation for geometrically nonlinear dynamic analysis of 3-D beams. Computer Methods in Applied Mechanics and Engineering, 169(1–2):1–18, 1999. [67] K. M. Hsiao and R. T. Yang. A co-rotational formulation for nonlinear dynamic analysis of curved Euler beam. Computers & Structures, 54(6):1091–1097, 1995. [68] K. M. Hsiao, R. T. Yang, and A. C. Lee. A consistent finite element formulation for non-linear dynamic analysis of planar beam. International Journal for Numerical Methods in Engineering, 37(1):75–89, 1994. [69] T. J. R. Hughes. The finite element method - linear static and dynamic finite element analysis. Dover, 2000. [70] T. J. R. Hughes, R. L. Taylor, and W. Kanoknukulchai. A simple and efficient finite element for plate bending. International Journal for Numerical Methods in Engineering, 11(10):1529–1543, 1977. [71] A. Ibrahimbegović. On finite element implementation of geometrically nonlinear Reissner’s beam theory: Three-dimensional curved beam elements. Computer Methods in Applied Mechanics and Engineering, 122(1–2):11–26, 1995. [72] A. Ibrahimbegović. On the choice of finite rotation parameters. Computer Methods in Applied Mechanics and Engineering, 149(1–4):49–71, 1997. [73] A. Ibrahimbegović and F. Frey. Finite element analysis of linear and non-linear planar deformations of elastic initially curved beams. International Journal for Numerical Methods in Engineering, 36(19):3239–3258, 1993. [74] A. Ibrahimbegović, F. Frey, and I. Kozar. Computational aspects of vector-like parametrization of three-dimensional finite rotations. International Journal for Numerical Methods in Engineering, 38(21):3653–3673, 1995. [75] A. Ibrahimbegović and S. Mamouri. Energy conserving/decaying implicit time-stepping scheme for nonlinear dynamics of threedimensional beams undergoing finite rotations. Computer Methods in Applied Mechanics and Engineering, 191(3738):4241–4258, 2002. [76] A. Ibrahimbegović and R. L. Taylor. On the role of frame-invariance in structural mechanics models at finite rotations. Computer Methods in Applied Mechanics and Engineering, 191(45):5159–5176, 2002. [77] A. Iosilevich, K.-J. Bathe, and F. Brezzi. On evaluating the infsup condition for plate bending elements. International Journal for Numerical Methods in Engineering, 40(19):3639–3663, 1997. [78] M. Iura and S. N. Atluri. Dynamic analysis of finitely stretched and rotated three-dimensional space-curved beams. Computers and Structures, 29:875–889, 1988. [79] G. Jelenić and M. A. Crisfield. Interpolation of rotational variables in nonlinear dynamics of 3D beams. International Journal for Numerical Methods in Engineering, 43(7):1193–1222, 1998. [80] G. Jelenić and M. A. Crisfield. Geometrically exact 3D beam theory: Implementation of a strain-invariant finite element for statics and dynamics. Computer Methods in Applied Mechanics and Engineering, 171(1–2):141–171, 1999. [81] G. Jelenić and M. Saje. A kinematically exact space finite strain beam model - finite element formulation by generalized virtual work principle. Computer Methods in Applied Mechanics and Engineering, 120(12):131–161, 1995. [82] P. Jung, S. Leyendecker, J. Linn, and M. Ortiz. A discrete mechanics approach to the Cosserat rod theory - Part 1: Static equilibria. International Journal for Numerical Methods in Engineering, 85(1):31–60, 2011. 89 [83] C. Kane, J. E. Marsden, M. Ortiz, and M. West. Variational integrators and the Newmark algorithm for conservative and dissipative mechanical systems. International Journal for Numerical Methods in Engineering, 49(10):1295–1325, 2000. [84] R. K. Kapania and J. Li. A formulation and implementation of geometrically exact curved beam elements incorporating finite strains and finite rotations. Computational Mechanics, 30(5):444–459, April 2003. [85] D. Karamanlidis and R. Jasti. Curved mixed beam elements for the analysis of thin-walled free-form arches. Ingenieur-Archiv, 57(5):361– 367, 1987. [86] G. Kirchhoff. Ueber das Gleichgewicht und die Bewegung eines unendlich dünnen elastischen Stabes. Journal für die reine und angewandte Mathematik, 56:285–313, 1859. [87] W. T. Koiter. On the nonlinear theory of thin elastic shells. In Proceedings of the Koninklijke Nederlandse Akademie van Wetenschappen, volume 69, 1966. [88] K. Kondoh, K. Tanaka, and S. N. Atluri. An explicit expression for the tangent-stiffness of a finitely deformed 3-D beam and its use in the analysis of space frames. Computers & Structures, 24(2):253–271, 1986. [89] F. Koschnick. Geometrische Locking-Effekte bei Finiten Elementen und ein allgemeines Konzept zu ihrer Vermeidung. PhD thesis, Lehrstuhl für Statik, Technische Universität München, 2004. [90] A. Kulachenko, T. Denoyelle, S. Galland, and S. B. Lindström. Elastic properties of cellulose nanopaper. Cellulose, 19(3):793–807, 2012. [91] A. Kulachenko and T. Uesaka. Direct simulations of fiber network deformation and failure. Mechanics of Materials, 51:1–14, 2012. [92] H. Lang and M. Arnold. Numerical aspects in the dynamic simulation of geometrically exact rods. Applied Numerical Mathematics, 62(10):1411–1427, 2012. [93] H. Lang, J. Linn, and M. Arnold. Multi-body dynamics simulation of geometrically exact Cosserat rods. Multibody System Dynamics, 25(3):285–312, 2010. [94] J. Langer and D. A. Singer. Lagrangian aspects of the Kirchhoff elastic rod. SIAM Review, 38(4):605–618, December 1996. [95] A. Lazarus, J. J. T. Miller, and P. M. Reis. Continuation of equilibria and stability of slender elastic rods using an asymptotic numerical method. Journal of the Mechanics and Physics of Solids, 61(8):1712–1736, 2013. [96] T.-N. Le, J.-M. Battini, and M. Hjiaj. A consistent 3D corotational beam element for nonlinear dynamic analysis of flexible structures. Computer Methods in Applied Mechanics and Engineering, 269:538–565, 2014. [97] P. G. Lee and H. C. Sin. Locking-free straight beam element based on curvature. Communications in Numerical Methods in Engineering, 9(12):1005–1011, 1993. [98] E. V. Lens and A. Cardona. A nonlinear beam element formulation in the framework of an energy preserving time integration scheme for constrained multibody systems dynamics. Computers & Structures, 86(12):47–63, 2008. [99] J. Linn. Discrete kinematics of Cosserat rods based on the difference geometry of framed curves. In The 4th Joint International Conference on Multibody System Dynamics, Montréal, Canada, 2016. [100] J. Linn, H. Lang, and A. Tuganov. Geometrically exact Cosserat rods with Kelvin-Voigt type viscous damping. Mechanical Sciences, 4(1):79–96, 2013. [101] A. E. H. Love. A treatise on the mathematical theory of elasticity. Dover, 1944. [102] M. Lyly, R. Stenberg, and T. Vihinen. A stable bilinear element for the Reissner-Mindlin plate model. Computer Methods in Applied Mechanics and Engineering, 110(3–4):343–357, 1993. [103] J. E. Marsden and T. J. R. Hughes. Mathematical foundations of elasticity. Dover, 1994. [104] C. Meier, A. Popp, and W. A. Wall. An objective 3D large deformation finite element formulation for geometrically exact curved Kirchhoff rods. Computer Methods in Applied Mechanics and Engineering, 278:445–478, 2014. [105] C. Meier, A. Popp, and W. A. Wall. A locking-free finite element formulation and reduced models for geometrically exact Kirchhoff rods. Computer Methods in Applied Mechanics and Engineering, 290:314–341, 2015. [106] C. Meier, A. Popp, and W. A. Wall. A finite element approach for the line-to-line contact interaction of thin beams with arbitrary orientation. Computer Methods in Applied Mechanics and Engineering, accepted for publication. [107] C. Meier, A. Popp, and W. A. Wall. A unified approach for beam-to-beam contact. Computer Methods in Applied Mechanics and Engineering, submitted for publication. [108] K. W. Müller, C. Meier, and W. A. Wall. Resolution of sub-element length scales in Brownian dynamics simulations of biopolymer networks with geometrically exact beam finite elements. Journal of Computational Physics, 303:185–202, 2015. [109] A. K. Noor and J. M. Peters. Mixed models and reduced/selective integration displacement models for nonlinear analysis of curved beams. International Journal for Numerical Methods in Engineering, 17(4):615–631, 1981. [110] E. Petrov and M. Géradin. Finite element theory for curved and twisted beams based on exact solutions for three-dimensional solids Part 1: Beam concept and geometrically exact nonlinear formulation. Computer Methods in Applied Mechanics and Engineering, 165(1–4):43–92, 1998. [111] G. Prathap. The curved beam/deep arch/finite ring element revisited. International Journal for Numerical Methods in Engineering, 21(3):389–407, 1985. [112] G. Prathap and B. P. Naganarayana. Analysis of locking and stress oscillations in a general curved beam element. International Journal for Numerical Methods in Engineering, 30(1):177–200, 1990. [113] A. Quarteroni, R. Sacco, and S. Fausto. Numerical mathematics. Springer, 2000. [114] E. Reissner. On one-dimensional finite-strain beam theory: The plane problem. Zeitschrift für Angewandte Mathematik und Physik (ZAMP), 23(5):795–804, 1972. [115] E. Reissner. On finite deformations of space-curved beams. Zeitschrift für Angewandte Mathematik und Physik (ZAMP), 32(6):734–744, 1981. [116] D. Rodney, B. Gadot, O. R. Martinez, S. R. Roscoat, and L. Orgéas. Reversible dilatancy in entangled single-wire materials. Nature Materials, 15:72–77, 2016. [117] I. Romero. The interpolation of rotations and its application to finite element models of geometrically exact rods. Computational Mechanics, 34:121–133, 2004. 90 [118] I. Romero. A comparison of finite elements for nonlinear beams: The absolute nodal coordinate and geometrically exact formulations. Multibody System Dynamics, 20(1):51–68, 2008. [119] I. Romero. Formulation and performance of variational integrators for rotating bodies. Computational Mechanics, 42(6):825–836, 2008. [120] I. Romero and F. Armero. An objective finite element approximation of the kinematics of geometrically exact rods and its use in the formulation of an energymomentum conserving scheme in dynamics. International Journal for Numerical Methods in Engineering, 54(12):1683– 1716, 2002. [121] I. Romero, M. Urrecha, and C. J. Cyron. A torsion-free non-linear beam model. International Journal of Non-Linear Mechanics, 58:1–10, 2014. [122] O. Sander. Geodesic finite elements for Cosserat rods. International Journal for Numerical Methods in Engineering, 82(13):1645–1670, 2010. [123] C. Sansour, T. L. Nguyen, and M. Hjiaj. An energy-momentum method for in-plane geometrically exact Euler-Bernoulli beam dynamics. International Journal for Numerical Methods in Engineering, 102(2):99–134, 2015. [124] C. Sansour and W. Wagner. Multiplicative updating of the rotation tensor in the finite element analysis of rods and shells - a path independent approach. Computational Mechanics, 31(1):153–162, May 2003. [125] H. A. F. A. Santos, P. M. Pimenta, and J. P. M. Almeida. A hybrid-mixed finite element formulation for the geometrically exact analysis of three-dimensional framed structures. Computational Mechanics, 48(5):591–613, 2011. [126] M. G. Schmidt, A. E. Ismail, and R. A. Sauer. A continuum mechanical surrogate model for atomic beam structures. International Journal for Multiscale Computational Engineering, 13(5):413–442, 2015. [127] M. Schulz and F. C. Filippou. Non-linear spatial Timoshenko beam element with curvature interpolation. International Journal for Numerical Methods in Engineering, 50(4):761–785, 2001. [128] A. A. Shabana, H. A. Hussien, and J. L. Escalona. Application of the absolute nodal coordinate formulation to large rotation and large deformation problems. Journal of Mechanical Design, 120(2):188–195, 1998. [129] A. A. Shabana and R. Y. Yakoub. Three dimensional absolute nodal coordinate formulation for beam elements: Theory. Journal of Mechanical Design, 123(4):606–613, December 2001. [130] Y. Shi and J. E. Hearst. The Kirchhoff elastic rod, the nonlinear Schrödinger equation, and DNA supercoiling. The Journal of Chemical Physics, 101(6):5186–5200, 1994. [131] K. Shoemake. Animating rotation with quaternion curves. ACM SIGGRAPH Computer Graphics, 19(3):245–254, July 1985. [132] J. C. Simo. A finite strain beam formulation. The three-dimensional dynamic problem. Part I. Computer Methods in Applied Mechanics and Engineering, 49:55–70, 1985. [133] J. C. Simo and T. J. R. Hughes. On the variational foundations of assumed strain methods. Journal of Applied Mechanics, 53:51–54, 1986. [134] J. C. Simo and L. Vu-Quoc. A three-dimensional finite strain rod model. Part II: Computational aspects. Computer Methods in Applied Mechanics and Engineering, 58:79–116, 1986. [135] J. C. Simo and L. Vu-Quoc. On the dynamics in space of rods undergoing large motions - a geometrically exact approach. Computer Methods in Applied Mechanics and Engineering, 66(2):125–161, 1988. [136] J. C. Simo and K. K. Wong. Unconditionally stable algorithms for rigid body dynamics that exactly preserve energy and momentum. International Journal for Numerical Methods in Engineering, 31(1):19–52, 1991. [137] W. M. Smolenski. Statically and kinematically exact nonlinear theory of rods and its numerical verification. Computer Methods in Applied Mechanics and Engineering, 178(1–2):89–113, 1998. [138] V. Sonneville, A. Cardona, and O. Brüls. Geometric interpretation of a non-linear beam finite element on the Lie group SE(3). Archive of Mechanical Engineering, 61:305–329, 2014. [139] V. Sonneville, A. Cardona, and O. Brüls. Geometrically exact beam finite element formulated on the special Euclidean group. Computer Methods in Applied Mechanics and Engineering, 268:451–474, 2014. [140] R. A. Spurrier. Comment on ”singularity-free extraction of a quaternion from a direction-cosine matrix”. Journal of Spacecraft and Rockets, 15:255–255, 1978. [141] H. Stolarski and T. Belytschko. Membrane locking and reduced integration for curved elements. Journal of Applied Mechanics, 49:172–176, 1982. [142] G. Strang and G. Fix. An analysis of the finite elment method. Wellesley-Cambrigde Press, 2008. [143] A. Tessler and L. Spiridigliozzi. Curved beam elements with penalty relaxation. International Journal for Numerical Methods in Engineering, 23(12):2245–2262, 1986. [144] S. P. Timoshenko. On the correction for shear of the differential equation for transverse vibrations of prismatic bars. Philosophical Magazine Series 6, 41(245):744–746, 1921. [145] P. Češarek, M. Saje, and D. Zupan. Kinematically exact curved and twisted strain-based beam. International Journal of Solids and Structures, 49(13):1802–1817, 2012. [146] T. D. Vu, D. Durville, and P. Davies. Finite element simulation of the mechanical behavior of synthetic braided ropes and validation on a tensile test. International Journal of Solids and Structures, 58:106–116, 2015. [147] W. A. Wall and M. W. Gee. BACI: A multiphysics simulation environment. Technical report, Technical University of Munich, 2016. [148] Q. Wang and C. M. Wang. The constitutive relation and small scale parameter of nonlocal continuum mechanics for modelling carbon nanotubes. Nanotechnology, 18(7):075702, 2007. [149] O. Weeger, S.-K. Yeung, and M. L. Dunn. Isogeometric collocation methods for Cosserat rods and rod structures. Computer Methods in Applied Mechanics and Engineering, page http://dx.doi.org/10.1016/j.cma.2016.05.009, 2016. [150] H. Weiss. Dynamics of geometrically nonlinear rods: I. Mechanical models and equations of motion. Nonlinear Dynamics, 30(4):357–381, 2002. [151] H. Weiss. Dynamics of geometrically nonlinear rods: II. Numerical methods and computational examples. Nonlinear Dynamics, 30(4):383– 415, 2002. [152] G. Wempner. Finite elements, finite rotations and small strains of flexible shells. International Journal of Solids and Structures, 5(2):117– 91 153, 1969. [153] Y. Yang, I. Tobias, and W. K. Olson. Finite element analysis of DNA supercoiling. The Journal of Chemical Physics, 98(2):1673–1686, 1993. [154] Z. Zhang, Z. Qi, Z. Wu, and H. Fang. A spatial Euler-Bernoulli beam element for rigid-flexible coupling dynamic analysis of flexible structures. Shock and Vibration, 2015:208127, 2015. [155] Z. Zhao and G. Ren. A quaternion-based formulation of Euler–Bernoulli beam without singularity. Nonlinear Dynamics, 67(3):1825–1835, 2012. [156] D. Zupan and M. Saje. Finite-element formulation of geometrically exact three-dimensional beam theories based on interpolation of strain measures. Computer Methods in Applied Mechanics and Engineering, 192(49–50):5209–5248, 2003. [157] D. Zupan and M. Saje. The linearized three-dimensional beam theory of naturally curved and twisted beams: The strain vectors formulation. Computer Methods in Applied Mechanics and Engineering, 195(33–36):4557–4578, 2006. [158] E. Zupan, M. Saje, and D. Zupan. On a virtual work consistent three-dimensional Reissner–Simo beam formulation using the quaternion algebra. Acta Mechanica, 224(8):1709–1729, 2013. 92
5cs.CE
arXiv:1802.06259v1 [cs.CV] 17 Feb 2018 Exact and Consistent Interpretation for Piecewise Linear Neural Networks: A Closed Form Solution Lingyang Chu Xia Hu Juhua Hu Simon Fraser University Burnaby, Canada [email protected] Simon Fraser University Burnaby, Canada [email protected] Simon Fraser University Burnaby, Canada [email protected] Lanjun Wang Jian Pei Huawei Technology Co. Ltd Beijing, China [email protected] JD.com and Simon Fraser University Beijing/Burnaby, China/Canada [email protected] ABSTRACT Strong intelligent machines powered by deep neural networks are increasingly deployed as black boxes to make decisions in risksensitive domains, such as finance and medical. To reduce potential risk and build trust with users, it is critical to interpret how such machines make their decisions. Existing works interpret a pretrained neural network by analyzing hidden neurons, mimicking pre-trained models or approximating local predictions. However, these methods do not provide a guarantee on the exactness and consistency of their interpretation. In this paper, we propose an elegant closed form solution named OpenBox to compute exact and consistent interpretations for the family of Piecewise Linear Neural Networks (PLNN). The major idea is to first transform a PLNN into a mathematically equivalent set of linear classifiers, then interpret each linear classifier by the features that dominate its prediction. We further apply OpenBox to demonstrate the effectiveness of nonnegative and sparse constraints on improving the interpretability of PLNNs. The extensive experiments on both synthetic and real world data sets clearly demonstrate the exactness and consistency of our interpretation. KEYWORDS Deep neural network, exact and consistent interpretation, closed form. ACM Reference Format: Lingyang Chu, Xia Hu, Juhua Hu, Lanjun Wang, and Jian Pei . 2018. Exact and Consistent Interpretation for Piecewise Linear Neural Networks: A Closed Form Solution. In Proceedings of ACM (arXiv version). ACM, New York, NY, USA, 9 pages. https://doi.org/10.1145/nnnnnnn.nnnnnnn 1 INTRODUCTION More and more machine learning systems are making significant decisions routinely in important domains, such as medical practice, autonomous driving, criminal justice, and military decision making [15]. As the impact of machine-made decisions increases, the demand on clear interpretations of machine learning systems is growing ever stronger against the blind deployments of decision machines [17]. Accurately and reliably interpreting a machine learning model is the key to many significant tasks, such as identifying Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the owner/author(s). arXiv version, 2017, Canada © 2018 Copyright held by the owner/author(s). ACM ISBN 978-x-xxxx-xxxx-x/YY/MM. https://doi.org/10.1145/nnnnnnn.nnnnnnn failure models [1], building trust with human users [36], discovering new knowledge [35], and avoiding unfairness issues [46]. The interpretation problem of machine learning models has been studied for decades. Conventional models, such as Logistic Regression and Support Vector Machine, have all been well interpreted from both practical and theoretical perspectives [4]. Powerful nonnegative and sparse constraints are also developed to enhance the interpretability of conventional models by sparse feature selection [21, 27]. However, due to the complex network structure of a deep neural network, the interpretation problem of modern deep models is yet a challenging field that awaits further exploration. As to be reviewed in Section 2, the existing studies interpret a deep neural network in three major ways. The hidden neuron analysis methods [9, 29, 32, 45] analyze and visualize the features learned by the hidden neurons of a neural network; the model mimicking methods [2, 3, 7, 20] build a transparent model to imitate the classification function of a deep neural network; the local explanation methods [11, 38, 40, 42] study the predictions on local perturbations of an input instance, so as to provide decision features for interpretation. All these methods gain useful insights into the mechanism of deep models. However, there is no guarantee that what they compute as an interpretation is truthfully the exact behavior of a deep neural network. As demonstrated by Ghorbani [13], most existing interpretation methods are inconsistent and fragile, because two perceptively indistinguishable instances with the same prediction result can be easily manipulated to have dramatically different interpretations. Can we compute an exact and consistent interpretation for a pretrained deep neural network? In this paper, we provide an affirmative answer, as well as an elegant closed form solution for the family of piecewise linear neural networks. Here, a piecewise linear neural network (PLNN) [18] is a neural network that adopts a piecewise linear activation function, such as MaxOut [16] and the family of ReLU [14, 19, 31]. The wide applications [26] and great practical successes [25] of PLNNs call for exact and consistent interpretations on the overall behaviour of this type of neural networks. We make the following technical contributions. First, we prove that a PLNN is mathematically equivalent to a set of local linear classifiers, each of which being a linear classifier that classifies a group of instances within a convex polytope in the input space. Second, we propose a method named OpenBox to provide an exact interpretation of a PLNN by computing its equivalent set of local linear classifiers in closed form. Third, we interpret the classification result of each instance by the decision features of its local linear classifier. Since all instances in the same convex polytope share the same local linear classifier, our interpretations are consistent per convex polytope. Fourth, we also apply OpenBox arXiv version, 2017, Canada to study the effect of non-negative and sparse constraints on the interpretability of PLNNs. We find that a PLNN trained with these constraints selects meaningful features that dramatically improve the interpretability. Last, we conduct extensive experiments on both synthetic and real-world data sets to verify the effectiveness of our method. The rest of this paper is organized as follows. We review the related works in Section 2. We formulate the problem in Section 3 and present OpenBox in Section 4. We report the experimental results in Section 5, and conclude the paper in Section 6. 2 RELATED WORKS How to interpret the overall mechanism of deep neural networks is an emergent and challenging problem. 2.1 Hidden Neuron Analysis Methods The hidden neuron analysis methods [9, 29, 32, 45] interpret a pre-trained deep neural network by visualizing, revert-mapping or labeling the features that are learned by the hidden neurons. Yosinski et al. [45] visualized the live activations of the hidden neurons of a ConvNet, and proposed a regularized optimization to produce a qualitatively better visualization. Erhan et al. [10] proposed an activation maximization method and a unit sampling method to visualize the features learned by hidden neurons. Cao et al. [5] visualized a neural network’s attention on its target objects by a feedback loop that infers the activation status of the hidden neurons. Li et al. [28] visualized the compositionality of clauses by analyzing the outputs of hidden neurons in a neural model for Natural Language Processing. To understand the features learned by the hidden neurons, Mahendran et al. [29] proposed a general framework that revert-maps the features learned from an image to reconstruct the image. Dosovitskiy et al. [9] performed the same task as Mahendran et al. [29] did by training an up-convolutional neural network. Zhou et al. [47] interpreted a CNN by labeling each hidden neuron with a best aligned human-understandable semantic concept. However, it is hard to get a golden dataset with accurate and complete labels of all human semantic concepts. The hidden neuron analysis methods provide useful qualitative insights into the properties of each hidden neuron. However, qualitatively analyzing every neuron does not provide much actionable and quantitative interpretation about the overall mechanism of the entire neural network [12]. 2.2 Model Mimicking Methods By imitating the classification function of a neural network, the model mimicking methods [2, 3, 7, 20] build a transparent model that is easy to interpret and achieves a high classification accuracy. Ba et al. [2] proposed a model compression method to train a shallow mimic network using the training instances labeled by one or more deep neural networks. Hinton et al. [20] proposed a distillation method that distills the knowledge of a large neural network by training a relatively smaller network to mimic the prediction probabilities of the original large network. To improve the interpretability of distilled knowledge, Frosst and Hinton [12] extended the distillation method [20] by training a soft decision tree to mimic the prediction probabilities of a deep neural network. Che et al. [7] proposed a mimic learning method to learn interpretable phenotype features. Wu et al. [43] proposed a tree regularization method that uses a binary decision tree to mimic and regularize the classification function of a deep time-series model. Lingyang Chu, Xia Hu, Juhua Hu, Lanjun Wang, and Jian Pei The mimic models built by model mimicking methods are much simpler to interpret than deep neural networks. However, due to the reduced model complexity of a mimic model, there is no guarantee that a deep neural network with a large VC-dimension [18, 24, 41] can be successfully imitated by a simpler shallow model. Thus, there is always a gap between the interpretation of a mimic model and the actual overall mechanism of the target deep neural network. 2.3 Local Interpretation Methods The local interpretation methods [11, 38, 40, 42] compute and visualize the important features for an input instance by analyzing the predictions of its local perturbations. Simonyan et al. [39] generated a class-representative image and a class-saliency map for each class of images by computing the gradient of the class score with respect to an input image. Ribeiro et al. [36] proposed LIME to interpret the predictions of any classifier by learning an interpretable model in the local region around the input instance. Zhou et al. [48] proposed CAM to identify discriminative image regions for each class of images using the global average pooling in CNNs. Selvaraju et al. [37] generalized CAM [48] by Grad-CAM, which identifies important regions of an image by flowing classspecific gradients into the final convolutional layer of a CNN. Koh et al. [23] used influence functions to trace a model’s prediction and identify the training instances that are the most responsible for the prediction. The local interpretation methods generate an insightful individual interpretation for each input instance. However, the interpretations for perspectively indistinguishable instances may not be consistent [13], and can be purposefully manipulated by a simple transformation of the input instance without affecting the prediction result [22]. 3 PROBLEM DEFINITION For a PLNN N that contains L layers of neurons, we write the l-th layer of N as Ll . Hence, L1 is the input layer, LL is the output layer, and the other layers Ll , l ∈ {2, . . . , L−1} are hidden layers. A neuron in a hidden layer is called a hidden neuron. Let nl represent the number of neurons in Ll , the total number of hidden Í neurons in N is computed by N = lL−1 n . =2 l (l ) (l −1) Denote by ui the i-th neuron in Ll , by bi its bias, by (l ) (l ) ai its output, and by zi the total weighted sum of its inputs. For all the nl neurons in Ll , we write their biases as a vector (l −1) (l −1) b(l −1) = [b1 , . . . , bnl ]⊤ , their outputs as a vector a(l ) = (l ) (l ) (l ) (l ) [a1 , . . . , anl ]⊤ , and their inputs as a vector z(l ) = [z1 , . . . , znl ]⊤ . Neurons in successive layers are connected by weighted edges. (l ) Denote by Wi j the weight of the edge between the i-th neuron in Ll +1 and the j-th neuron in Ll , that is, W (l ) is an nl +1 -by-nl matrix. For l ∈ {1, . . . , L − 1}, we compute z(l +1) by z(l +1) = W (l ) a(l ) + b(l ) (1) Denote by f : R → R the piecewise linear activation function (l ) (l ) for each neuron in the hidden layers of N . We have ai = f (zi ) for all l ∈ {2, . . . , L − 1}. We extend f to apply to vectors in an (l ) (l ) element-wise fashion, such that f (z(l ) ) = [f (z1 ), . . . , f (znl )]⊤ . (l ) Then, we compute a for all l ∈ {2, . . . , L − 1} by a(l ) = f (z(l ) ) (2) Exact and Consistent Interpretation for Piecewise Linear Neural Networks: A Closed Form Solution Table 1: Frequently used notations. arXiv version, 2017, Canada 4.1 The Configuration of a PLNN (l ) Notation (l ) ui nl N (l ) zi (l ) ci Ch Ph Fh (·) Qh Description The i-th neuron in layer Ll . The number of neurons in layer Ll . The total number of hidden neurons in N. The input of the i-th neuron in layer Ll . The configuration of the i-th neuron in layer Ll . The h-th configuration of the PLNN N. The h-th convex polytope determined by Ch . The h-th linear classifier that is determined by Ch . The set of linear inequalities that define Ph . For a hidden neuron ui , the piecewise linear activation function (l ) f (zi ) is in the following form. (l ) (l )  r 1 zi + t 1 , if zi ∈ I 1      (l ) (l )    r 2 zi + t 2 , if zi ∈ I 2  (l ) f (zi ) = ..    .      r z(l ) + t , if z(l ) ∈ I  k i k k i (3) (l ) An input instance of N is denoted by x ∈ X, where X ⊆ Rd is a d-dimensional input space. x is also called an instance for short. Denote by xi the i-th dimension of x. The input layer L1 contains (1) n 1 = d neurons, where ai = xi for all i ∈ {1, . . . , d}. That is, (1) a = x. The output of N is a(L) ∈ Y, where Y ⊆ Rn L is an n L dimensional output space. The output layer LL adopts the softmax function to compute the output by a(L) = softmax(z(L) ). A PLNN works as a classification function F : X → Y that maps an input x ∈ X to an output a(L) ∈ Y. It is widely known that F (·) is a piecewise linear function [30, 34]. However, due to the complex network of a PLNN, the overall behaviour of F (·) is hard to understand. Thus, a PLNN is usually regarded as a black box. How to interpret the overall behavior of a PLNN in a humanunderstandable manner is an interesting problem that has attracted much attention in recent years. Following a principled approach of interpreting a machine learning model [4], we regard an interpretation of a PLNN N as the decision features that define the decision boundary of N . We call a model interpretable if it explicitly provides its interpretation (i.e., decision features) in closed form. Definition 3.1. Given a fixed PLNN N with constant structure and parameters, our task is to interpret the overall behaviour of N by computing an interpretable model M that satisfies the following requirements. • Exactness: M is mathematically equivalent to N such that the interpretations provided by M truthfully describe the exact behaviour of N . • Consistency: M provides similar interpretations for classification of similar instances. Table 1 summarizes a list of frequently used notations. 4 THE OPENBOX METHOD In this section, we describe the OpenBox method, which produces an exact and consistent interpretation of a PLNN by computing an interpretation model M in a piecewise linear closed form. We first define the configuration of a PLNN N , which specifies the activation status of each hidden neuron in N . Then, we illustrate how to interpret the classification result of a fixed instance. Last, we illustrate how to interpret the overall behavior of N by computing an interpretation model M that is mathematically equivalent to N . where k ≥ 1 is a constant integer, f (zi ) consists of k linear functions, {r 1 , . . . , r k } are constant slopes, {t 1 , . . . , tk } are constant intercepts, and {I 1 , . . . , Ik } is a collection of constant real intervals that partition R. Given a fixed PLNN N , an instance x ∈ X determines the value (l ) (l ) of zi , and further determines a linear function in f (zi ) to apply. (l ) According to which linear function in f (zi ) is applied, we encode the activation status of each hidden neuron by k states, each of which uniquely corresponds to one of the k linear functions of (l ) (l ) (l ) (l ) f (zi ). Denote by ci ∈ {1, . . . , k} the state of ui , we have zi ∈ (l ) (l ) Iq if and only if ci = q (q ∈ {1, . . . , k }). Since the inputs zi ’s are different from neuron to neuron, the states of different hidden neurons may differ from each other. (l ) (l ) Denote by a vector c(l ) = [c1 , . . . , cnl ] the states of all hidden neurons in Ll . The configuration of N is an N -dimensional vector, denoted by C = [c(2) , . . . , c(L−1) ], which specifies the states of all hidden neurons in N . The configuration C of a fixed PLNN is uniquely determined by the instance x. We write the function that maps an instance x ∈ X to a configuration C ∈ {1, . . . , k} N as conf : X → {1, . . . , k} N . (l ) (l ) (l ) For a neuron ui , denote by variables ri and ti the slope and intercept, respectively, of the linear function that corresponds to (l ) (l ) (l ) (l ) the state ci . ri and ti are uniquely determined by ci , such that (l ) (l ) (l ) ri = rq and ti = tq , if and only if ci = q (q ∈ {1, . . . , k }). For all hidden neurons in Ll , we write the variables of slopes and (l ) (l ) (l ) (l ) intercepts as r(l ) = [r1 , . . . , rnl ]⊤ and t(l ) = [t1 , . . . , tnl ]⊤ , respectively. Then, we rewrite the activation function for all neurons in a hidden layer Ll as f (z(l ) ) = r(l ) ◦ z(l ) + t(l ) (4) where r(l ) ◦ z(l ) is the Hadamard product between r(l ) and z(l ) . Next, we interpret the classification result of a fixed instance. 4.2 Exact Interpretation for the Classification Result of a Fixed Instance Given a fixed PLNN N , we interpret the classification result of a fixed instance x ∈ X by deriving the closed form of F (x) as follows. Following Equations 2 and 4, we have, for all l ∈ {2, . . . , L − 1} a(l ) = f (z(l ) ) = r(l ) ◦ z(l ) + t(l ) By plugging a(l ) into Equation 1, we rewrite z(l +1) as z(l +1) = W (l ) (r(l ) ◦ z(l ) + t(l ) ) + b(l ) = W̃ (l ) z(l ) + b̃(l ) (5) arXiv version, 2017, Canada Lingyang Chu, Xia Hu, Juhua Hu, Lanjun Wang, and Jian Pei where b̃(l ) = W (l ) t(l ) + b(l ) , and W̃ (l ) = W (l ) ◦ r(l ) is an extended version of Hadamard product, such that the entry at the i-th row (l ) (l ) (l ) and j-th column of W̃ (l ) is W̃i j = Wi j rj . By iteratively plugging Equation 5 into itself, we can write z(l +1) for all l ∈ {2, . . . , L − 1} as z(l +1) = l −2 Ö W̃ (l −h) z(2) + l l −h−1 Õ Ö Algorithm 1: OpenBox(N, D train ) Input: N B a fixed PLNN, D train ⊂ X the set of training instances used to train N . Output: M B a set of active LLCs 1: 2: 3: 4: 5: 6: 7: 8: W̃ (l −q) b̃(h) h=2 q=0 h=0 By plugging z(2) = W (1) a(1) + b(1) and a(1) = x into the above equation, we rewrite z(l +1) , for all l ∈ {2, . . . , L − 1}, as z(l +1) = l −2 Ö W̃ (l −h)W (1) x + h=0 l −2 Ö h=0 W̃ (l −h) b(1) + l l −h−1 Õ Ö W̃ (l −q) b̃(h) h=2 q=0 = Ŵ (1:l ) x + b̂(1:l ) (6) Î −2 (l −h) (1) where Ŵ (1:l ) = lh=0 W̃ W is the coefficient matrix of x, and b̂(1:l ) is the sum of the remaining terms. The superscript (1 : l) indicates that Ŵ (1:l ) x + b̂(1:l ) is equivalent to PLNN’s forward propagation from layer L1 to layer Ll . Since the output of N on an input x ∈ X is F (x) = a(L) = softmax(z(L) ), the closed form of F (x) is F (x) = softmax(Ŵ (1:L−1) x + b̂(1:L−1) ) (7) For a fixed PLNN N and a fixed instance x, Ŵ (1:L−1) and b̂(1:L−1) are constant parameters uniquely determined by the fixed configuration C = conf (x). Therefore, for a fixed input instance x, F (x) is a linear classifier whose decision boundary is explicitly defined by Ŵ (1:L−1) x + b̂(1:L−1) . Inspired by the interpretation method widely used by conventional linear classifiers, such as Logistic Regression and linear SVM [4], we interpret the prediction on a fixed instance x by the decision features of F (x). Specifically, the entries of the i-th row of Ŵ (1:L−1) are the decision features for the i-th class of instances. Equation 7 provides a straightforward way to interpret the classification result of a fixed instance. However, individually interpreting the classification result of every single instance is far from the understanding of the overall behavior of a PLNN N . Next, we describe how to interpret the overall behavior of N by computing an interpretation model M that is mathematically equivalent to N . 4.3 Initialization: M = ∅, C = ∅. for each x ∈ D train do Compute the configuration by Ch ← conf (x). if Ch < C then C ← C ∪ Ch and M ← M ∪ (Fh (x), Ph ). end if end for return M. Exact Interpretation of a PLNN A fixed PLNN N with N hidden neurons has at most k N configurations. We represent the h-th configuration by Ch ∈ C, where C ⊆ {1, . . . , k } N is the set of all configurations of N . Recall that each instance x ∈ X uniquely determines a configuration conf (x) ∈ C. Since the volume of C, denoted by |C|, is at most k N , but the number of instances in X can be arbitrarily large, it is clear that at least one configuration in C should be shared by more than one instances in X. Denote by Ph = {x ∈ X | conf (x) = Ch } the set of instances that have the same configuration Ch . We prove in Theorem 4.1 that for any configuration Ch ∈ C, Ph is a convex polytope in X. Theorem 4.1. Given a fixed PLNN N with N hidden neurons, ∀Ch ∈ C, Ph = {x ∈ X | conf(x) = Ch } is a convex polytope in X. Proof. We prove by showing that conf (x) = Ch is equivalent to a finite set of linear inequalities with respect to x. When l = 2, we have z(2) = W (1) x + b(1) . For l ∈ {3, . . . , L − 1}, it follows Equation 6 that z(l ) = Ŵ (1:l −1) x + b̂(1:l −1) , which is a linear function of x, because Ŵ (1:l ) and b̂(1:l ) are constant parameters when Ch is fixed. In summary, given a fixed Ch , z(l ) is a linear function of x for all l ∈ {2, . . . , L − 1}. We show that Ph is a convex polytope by showing that conf (x) = Ch is equivalent to a set of 2N linear inequalities with respect to (l ) (l ) x. Recall that zi ∈ Iq if and only if ci = q (q ∈ {1, . . . , k }). Denote by ψ : {1, . . . , k } → {I 1 , . . . , Ik } the bijective function that (l ) maps a configuration ci to a real interval in {I 1 , . . . , Ik }, such (l ) (l ) that ψ (ci ) = Iq if and only if ci = q (q ∈ {1, . . . , k}). Then, conf (x) = Ch is equivalent to a set of constraints, denoted by (l ) (l ) (l ) Qh = {zi ∈ ψ (ci ) | i ∈ {1, . . . , nl }, l ∈ {2, . . . , L − 1}}. Since zi (l ) is a linear function of x and ψ (ci ) is a real interval, each constraint (l ) (l ) zi ∈ ψ (ci ) in Qh is equivalent to two linear inequalities with respect to x. Therefore, conf (x) = Ch is equivalent to a set of 2N linear inequalities, which means Ph is a convex polytope. □ According to Theorem 4.1, all instances sharing the same configuration Ch form a unique convex polytope Ph that is explicitly defined by 2N linear inequalities in Qh . Since Ch also determines the linear classifier for a fixed instance in Equation 7, all instances in the same convex polytope Ph share the same linear classifier determined by Ch . Denote by Fh (·) the linear classifier that is shared by all instances in Ph , we can interpret N as a set of local linear classifiers (LLCs), each LLC being a linear classifier Fh (·) that applies to all instances in a convex polytope Ph . Denote by a tuple (Fh (·), Ph ) the h-th LLC, a fixed PLNN N is equivalent to a set of LLCs, denoted by M = {(Fh (·), Ph ) | Ch ∈ C}. We use M as our final interpretation model for N . For a fixed PLNN N , if the states of the N hidden neurons are independent, the PLNN N has k N configurations, which means M contains k N LLCs. However, due to the hierarchical structure of a PLNN, the states of a hidden neuron in Ll strongly correlate with the states of the neurons in the former layers Lq (q < l). Therefore, the volume of C is much less than k N , and the number of local linear classifiers in M is much less than k N . We discuss this phenomenon later in Table 3 and Section 5.4. In practice, we do not need to compute the entire set of LLCs in M all at once. Instead, we can first compute an active subset of M, that is, the set of LLCs that are actually used to classify the available set of instances. Then, we can update M whenever a new LLC is used to classify a newly coming instance. Exact and Consistent Interpretation for Piecewise Linear Neural Networks: A Closed Form Solution (l ) are the coefficients of x in zi . We also discover that some linear inequalities in Qh are redundant whose hyperplanes do not intersect with Ph . To simplify our interpretation on the polytope boundaries, we remove such redundant inequalities by Caron’s method [6] and focus on studying the PBFs of the non-redundant ones. The advantages of OpenBox are three-fold as follows. First, our interpretation is exact, because the set of LLCs in M are mathematically equivalent to the classification function F (·) of N . Second, our interpretation is group-wise consistent. It is due to the reason that all instances in the same convex polytope are classified by exactly the same LLC, and thus the interpretations are consistent with respect to a given convex polytope. Last, our interpretation is easy to compute, since OpenBox computes M by a one-time forward propagation through N for each instance in D train . Data Sets SYN FMNIST-1 FMNIST-2 1 https://github.com/marcotcr/lime PLNN-NS ✓ × LR × × LR-F × ✓ LR-NS ✓ × LR-NSF ✓ ✓ # Neurons (n 1, n 2, . . . , n L ) (2, 4, 16, 2, 2) (784, 8, 2, 2) (784, 8, 2, 2) PLNN |C| kN 266 222 78 210 23 210 PLNN-NS |C| kN 41 222 3 210 18 210 Table 4: Detailed description of data sets. Training Data # Positive # Negative 6,961 13,039 4,000 4,000 4,000 4,000 Data Sets SYN FMNIST-1 FMNIST-2 1.5 x2 EXPERIMENTS In this section, we evaluate the performance of OpenBox, and compare it with the state-of-the-art method LIME [36]. In particular, we address the following questions: (1) What are the LLCs look like? (2) Are the interpretations produced by LIME and OpenBox exact and consistent? (3) Are the decision features of LLCs easy to understand, and can we improve the interpretability of these features by non-negative and sparse constraints? (4) How to interpret the PBFs of LLCs? (5) How effective are the interpretations of OpenBox in hacking and debugging a PLNN model? Table 2 shows the details of the six models we used. For both PLNN and PLNN-NS, we use the same network structure described in Table 3, and adopt the widely used activation function: ReLU [14]. We apply the non-negative and sparse constraints proposed by Chorowski et al. [8] to train PLNN-NS. Since our goal is to comprehensively study the interpretation effectiveness of OpenBox rather than achieving state-of-the-art classification performance, we use relatively simple network structures for PLNN and PLNNNS, which are still powerful enough to achieve significantly better classification performance than Logistic Regression (LR). The decision features of LR, LR-F, LR-NS and LR-NSF are used as baselines to compare with the decision features of LLCs. The Python code of LIME is published by its authors1 . The other methods and models are implemented in Matlab. PLNN and PLNNNS are trained using the DeepLearnToolBox [33]. All experiments are conducted on a PC with a Core-i7-3370 CPU (3.40 GHz), 16GB main memory, and a 5,400 rpm hard drive running Windows 7 OS. We use the following data sets. Detailed information of the data sets is shown in Table 4. Synthetic (SYN) Data Set. As shown in Figure 1(a), this data set contains 20,000 instances uniformly sampled from a quadrangle in PLNN × × Table 3: The network structures (n 1 , n 2 , . . . , n L ) and the number of configurations |C| of PLNN and PLNN-NS. The neurons in successive layers are initialized to be fully connected. k = 2 is the number of linear functions of ReLU, N is the number of hidden neurons. Testing Data # Positive # Negative N/A N/A 3,000 3,000 3,000 3,000 1.5 1 1 0.5 0.5 0 -0.5 0 -0.5 -1 -1 -1.5 -1.5 -1.5 -1 -0.5 0 0.5 1 1.5 -1.5 -1 -0.5 x1 0 0.5 1 1.5 x1 (a) training data of SYN (b) prediction results of PLNN 1.5 x2 5 Models NS Flip x2 (l ) By Equation 6, zi is a linear function with respect to x. The PBFs Table 2: The models to interpret. LR is Logistic Regression. NS means non-negative and sparse constraints. Flip means the model is trained on the instances with flipped labels. 1.5 1 1 0.5 0.5 x2 Algorithm 1 summarizes the OpenBox method, which computes M as the active set of LLCs that are actually used to classify the set of training instances, denoted by D train . Now, we are ready to introduce how to interpret the classification result of an instance x ∈ Ph , h ∈ {1, . . . , |C|}. First, we interpret the classification result of x using the decision features of Fh (x) (Section 4.2). Second, we interpret why x is contained in Ph using the polytope boundary features (PBFs), which are the decision features of the polytope boundaries. More specifically, a polytope (l ) (l ) boundary of Ph is defined by a linear inequality zi ∈ ψ (ci ) in Qh . arXiv version, 2017, Canada 0 -0.5 0 -0.5 -1 -1 -1.5 -1.5 -1.5 -1 -0.5 0 0.5 1 1.5 -1.5 x1 (c) convex polytopes -1 -0.5 0 0.5 1 1.5 x1 (d) LLCs Figure 1: The LLCs of the PLNN trained on SYN. 2-dimensional Euclidean space. The red and blue points are positive and negative instances, respectively. We use all instances in SYN as training data to visualize the LLCs of a PLNN. FMNIST-1 and FMNIST-2 Data Sets. Each of these data sets contains two classes of images in the Fashion MNIST data set [44]. FMNIST-1 consists of the images of Ankle Boot and Bag. FMNIST-2 consists of the images of Coat and Pullover. All images in FMNIST1 and FMNIST-2 are 28-by-28 grayscale images. We represent an image by cascading the 784 pixel values into a 784-dimensional feature vector. The Fashion MNIST data set is available online2 . 2 https://github.com/zalandoresearch/fashion-mnist arXiv version, 2017, Canada 5.2 Are the Interpretations Exact and Consistent? Exact and consistent interpretations are naturally favored by human minds. In this subsection, we systematically study the exactness and consistency of the interpretations of LIME and OpenBox on FMNIST-1 and FMNIST-2. Since LIME is too slow to process all instances in 24 hours, for each of FMNIST-1 and FMNIST-2, we uniformly sample 600 instances from the testing set, and conduct the following experiments on the sampled instances. We first analyze the exactness of interpretation by comparing the predictions computed by the local interpretable model of LIME, the LLCs of OpenBox and PLNN, respectively. The prediction of an instance is the probability of classifying it as a positive instance. In Figure 2, since LIME does not guarantee zero approximation error on the local predictions of PLNN, the predictions of LIME are not exactly the same as PLNN on FMNIST-1, and are dramatically different from PLNN on FMNIST-2. The difference of predictions is more significant on FMNIST-2, because the images in FMNIST-2 are more difficult to distinguish, which makes the decision boundary of PLNN more complicated and harder to approximate. We can also see that the predictions of LIME exceed [0, 1]. This is because the output of the interpretable model of LIME is not a probability at all. As a result, it is arguable that the interpretations computed by LIME may not truthfully describe the exact behavior of PLNN. In contrast, since the set of LLCs computed by OpenBox is mathematically equivalent to F (·) of PLNN, the predictions of OpenBox are exactly the same as PLNN on all instances. Therefore, the decision features of LLCs exactly describe the overall behavior of PLNN. Next, we study the interpretation consistency of LIME and OpenBox by analyzing the similarity between the interpretations of similar instances. In general, a consistent interpretation method should provide similar interpretations for similar instances. For an instance x, denote by x ′ the nearest neighbor of x by Euclidean distance, by γ , γ ′ ∈ Rd the decision features for the classification of x and x ′ , respectively. We measure the consistency of interpretation by the cosine similarity between γ and γ ′ , where a larger cosine similarity indicates a better interpretation consistency. PLNN,OpenBox LIME Prediction LIME Prediction 1 0.5 0 0 200 400 PLNN,OpenBox 1 0.5 0 600 0 200 400 Index of Instance Index of Instance (a) FMNIST-1 (b) FMNIST-2 600 Figure 2: The predictions of LIME, OpenBox and PLNN. We sort the results by PLNN’s predictions in descending order. LIME OpenBox LIME 1 0.5 0 OpenBox 1 CS What Are the LLCs Look Like? CS 5.1 We demonstrate our claim in Theorem 4.1 by visualizing the LLCs of the PLNN trained on SYN. Figures 1(a)-(b) show the training instances of SYN and the prediction results of PLNN, respectively. Since all instances are used for training, the prediction accuracy is 99.9%. In Figure 1(c), we plot all instances with the same configuration in the same colour. Clearly, all instances with the same configuration are contained in the same convex polytope. This demonstrates our claim in Theorem 4.1. Figure 1(d) shows the LLCs whose convex polytopes cover the decision boundary of PLNN and contain both positive and negative instances. As it is shown, the solid lines show the decision boundaries of the LLCs, which capture the difference between positive and negative instances, and form the overall decision boundary of PLNN. A convex polytope that does not cover the boundary of PLNN contains a single class of instances. The LLCs of these convex polytopes capture the common features of the corresponding class of instances. As to be analyzed in the following subsections, the set of LLCs produce exactly the same prediction as PLNN, and also capture meaningful decision features that are easy to understand. Lingyang Chu, Xia Hu, Juhua Hu, Lanjun Wang, and Jian Pei 0 200 400 600 0.5 0 0 200 400 Index of Instance Index of Instance (a) FMNIST-1 (b) FMNIST-2 600 Figure 3: The cosine similarity (CS) between the decision features of each instance and its nearest neighbour. The results of LIME and OpenBox are separately sorted by cosine similarity in descending order. As shown in Figure 3, the cosine similarity of OpenBox is equal to 1 on about 50% of the instances, because OpenBox consistently gives the same interpretation for all instances in the same convex polytope. Since the nearest neighbours x and x ′ may not belong to the same convex polytope, the cosine similarity of OpenBox is not always equal to 1 on all instances. In constrast, since LIME computes individual interpretation based on the unique local perturbations of every single instance, the cosine similarity of LIME is significantly lower than OpenBox on all instances. This demonstrates the superior interpretation consistency of OpenBox. In summary, the interpretations of OpenBox are exact, and are much more consistent than the interpretations of LIME. 5.3 Decision Features of LLCs and the Effect of Non-negative and Sparse Constraints Besides exactness and consistency, a good interpretation should also have a strong semantical meaning, such that the “thoughts” of an intelligent machine can be easily understood by a human brain. In this subsection, we first show the meaning of the decision features of LLCs, then study the effect of the non-negative and sparse constraints in improving the interpretability of the decision features. The decision features of PLNN and PLNN-NS are computed by OpenBox. The decision features of LR, LR-F, LR-NS and LR-NSF are used as baselines. Table 5 shows the accuracy of all models. Figure 4 shows the decision features of all models on FMNIST-1. Interestingly, the decision features of PLNN are as easy to understand as the decision features of LR and LR-F. All these features clearly highlight meaningful image parts, such as the ankle and heel of Ankle Boot, and the upper left corner of Bag. A closer look at the the average images suggests that these decision features describe the difference between Ankle Boot and Bag. The decision features of PLNN capture more detailed difference between Ankle Boot and Bag than the decision features of LR and LR-F. This is because the LLCs of PLNN only capture the difference between a subset of instances within a convex polytope, however, LR and LR-F capture the overall difference between all instances Exact and Consistent Interpretation for Piecewise Linear Neural Networks: A Closed Form Solution arXiv version, 2017, Canada 1 Table 5: The training and testing accuracy of all models. 0.5 Data Set Accuracy LR LR-F PLNN LR-NS LR-NSF PLNN-NS 0 -0.5 -1 (a) Avg. Image (b) LR (c) LR-NS (d) PLNN (e) PLNN-NS 1 0.5 0 FMNIST-1 Train Test 0.998 0.997 0.998 0.997 1.000 0.999 0.772 0.776 0.989 0.989 1.000 0.999 FMNIST-2 Train Test 0.847 0.839 0.847 0.839 0.907 0.868 0.711 0.698 0.782 0.791 0.894 0.867 -0.5 -1 (f) Avg. Image (g) LR-F (h) LR-NSF (i) PLNN (j) PLNN-NS Figure 4: The decision features of all models on FMNIST-1. (a)-(e) and (f)-(j) show the average image and the decision features of all models for Ankle Boot and Bag, respectively. For PLNN and PLNN-NS, we show the decision features of the LLC whose convex polytope contains the most instances. 1 0.5 0 -0.5 easier to understand than the decision features of PLNN. In particular, as shown in Figure 5, the decision features of PLNN-NS clearly highlight the collar and breast of Coat, and the shoulder of Pullover, which are much easier to understand than the cluttered features of PLNN. These results demonstrate the effectiveness of non-negative and sparse constraints in selecting meaningful features. Moreover, the decision features of PLNN-NS capture more details than LR-NS and LR-NSF, thus PLNN-NS achieves a comparable accuracy with PLNN, and significantly outperforms the accuracy of LR-NS and LR-NSF on FMNIST-2. In summary, the decision features of LLCs are easy to understand, and the non-negative and sparse constraints are highly effective in improving the interpretability of the decision features of LLCs. -1 (a) Avg. Image (b) LR (c) LR-NS (d) PLNN 5.4 (e) PLNN-NS 1 0.5 0 -0.5 -1 (f) Avg. Image (g) LR-F (h) LR-NSF (i) PLNN (j) PLNN-NS Figure 5: The decision features of all models on FMNIST-2. (a)-(e) and (f)-(j) show the average image and the decision features of all models for Coat and Pullover, respectively. For PLNN and PLNN-NS, we show the decision features of the LLC whose convex polytope contains the most instances. of Ankle Boot and Bag. The accuracies of PLNN, LR and LR-F are comparable because the instances of Ankle Boot and Bag are easy to distinguish. However, as to be shown in Figure 5, when the instances are hard to distinguish, PLNN captures much more detailed features than LR and LR-F, and achieves a significantly better accuracy. Figure 5 shows the decision features of all models on FMNIST-2. As it is shown, LR and LR-F capture decision features with a strong semantical meaning, such as the collar and breast of Coat, and the shoulder of Pullover. However, these features are too general to accurately distinguish between Coat and Pullover. Therefore, LR and LR-F do not achieve a high accuracy. Interestingly, the decision features of PLNN capture much more details than LR and LR-F, which leads to the superior accuracy of PLNN. The superior accuracy of PLNN comes at the cost of cluttered decision features that may be hard to understand. Fortunately, applying non-negative and sparse constraints on PLNN effectively improves the interpretability of the decision features without affecting the classification accuracy. As shown in Figures 4 and 5, the decision features of PLNN-NS highlight similar image parts as LR-NS and LR-NSF, and are much Are PBFs of LLCs Easy to Understand? The polytope boundary features (PBFs) of polytope boundaries (PBs) interpret why an instance is contained in the convex polytope of a LLC. In this subsection, we systematically study the semantical meaning of PBFs. Limited by space, we only use the PLNN-NS models trained on FMNIST-1 and FMINST-2 as the target model to interpret. The LLCs of PLNN-NS are computed by OpenBox. (l ) (l ) Recall that a PB is defined by a linear inequality zi ∈ ψ (ci ), (l ) where the PBFs are the coefficients of x in zi . Since the activation (l ) zi (l ) ∈ ψ (ci ) (l ) (l ) (l ) zi (l ) function is ReLU, is either > 0 or zi ≤ 0. Since the values of PBFs are non-negative for PLNN-NS, for a convex (l ) polytope Ph , if zi > 0, then the images in Ph strongly correlate with the PBFs of zi ; if zi ≤ 0, then the images in Ph are not (l ) strongly correlated with the PBFs of zi . The above analysis of PBs and PBFs is demonstrated by the results in Tables 6 and 7, and Figure 6. Take the first convex polytope (2) (3) in Table 6 as an example, the PBs are z11 > 0 and z2 > 0, whose PBFs in Figures 6(b)-(c) show the features of Ankle Boot and Bag, respectively. Therefore, the convex polytope contains images of both Ankle Boot and Bag. A careful study of the other results suggests that the PBFs of the convex polytopes are easy to understand and accurately describe the images in each convex polytope. We can also see that the PBFs in Figure 6 look similar to the decision features of PLNN-NS in Figures 4 and 5. This shows the strong correlation between the features learned by different neurons of PLNN-NS, which is probably caused by the hierarchy network structure. Due to the strong correlation between neurons, the number of configurations in C is much less than k N , as shown in Table 3. Surprisingly, as shown in Table 7, the top-1 convex polytope on FMNIST-2 contains more than 98% of the training instances. On these instances, the training accuracy of LLC is much higher than the training accuracies of LR-NS and LR-NSF. This means that the arXiv version, 2017, Canada Lingyang Chu, Xia Hu, Juhua Hu, Lanjun Wang, and Jian Pei Table 6: The PBs of the top-3 convex polytopes (CP) containing the most instances in FMNIST-1. “/” indicates a redundant linear inequality. Accuracy is the training accuracy of LLC on each CP. 1 0.5 0 -0.5 -1 (2) (2) (a) z6 (3) (b) z11 (3) (c) z2 CP 1 2 3 (d) z4 1 0.5 (2) z6 / ≤0 / (2) z11 >0 >0 ≤0 (3) z2 >0 / / (3) z4 / ≤0 >0 #Ankle Boot 3,991 9 0 #Bag 3,997 0 3 Accuracy 0.999 1.000 1.000 0 -0.5 Table 7: The PBs of the top-3 convex polytopes (CP) containing the most instances in FMNIST-2. Accuracy is the training accuracy of LLC on each CP. -1 (e) (2) z4 (f) (2) z5 (g) (2) z8 (h) (3) z2 CP 1 2 3 Figure 6: (a)-(d) show the PBFs of the PLNN-NS on FMNIST-1. (e)-(h) show the PBFs of the PLNN-NS on FMNIST-2. 600 450 300 150 0 LIME Avg. CPP OpenBox 0 50 100 150 200 1 0.75 0.5 0.25 0 5 10 15 # Hacked Features (a) FMNIST-1 (b) FMNIST-2 LIME 0 0 OpenBox 50 100 150 200 600 450 300 150 0 LIME 0 5 20 OpenBox 10 15 # Hacked Features # Hacked Features (c) FMNIST-1 (d) FMNIST-2 20 Figure 7: The hacking performance of LIME and OpenBox. (a)(b) show the average (Avg.) CPP. (c)-(d) show the NLCI. training instances in the top-1 convex polytope are much easier to be linearly separated than all training instances in FMNIST-2. From this perspective, the behavior of PLNN-NS is like a “divide and conquer” strategy, which set aside a small proportion of instances that hinder the classification accuracy such that the majority of the instances can be better separated by a LLC. As shown by the top-2 and top-3 convex polytopes in Table 7, the set aside instances are grouped in their own convex polytopes, where the corresponding LLCs also achieve a very high accuracy. Table 6 shows similar phenomenon on FMNIST-1. However, since the instances in FMNIST-1 are easy to be linearly separated, the training accuracy of PLNN-NS marginally outperforms LR-NS and LR-NSF. 5.5 (2) z5 >0 ≤0 ≤0 (2) z8 >0 >0 ≤0 (3) z2 >0 >0 >0 #Coat 3,932 32 18 #Pullover 3,942 10 0 Accuracy 0.894 0.905 0.944 OpenBox # Hacked Features NLCI NLCI Avg. CPP LIME 1 0.75 0.5 0.25 0 (2) z4 >0 >0 >0 Can We Hack a Model Using OpenBox? Knowing what an intelligent machine “thinks” provides us the privilege to “hack” it. Here, to hack a target model is to significantly change its prediction on an instance x ∈ X by modifying as few features of x as possible. In general, the biggest change of prediction is achieved by modifying the most important decision features. A more precise interpretation on the target model reveals the important decision features more accurately, thus requires to modify less features to achieve a bigger change of prediction. Following this idea, we apply LIME and OpenBox to hack PLNN-NS, and compare the quality of their interpretations by comparing the change of PLNN-NS’s prediction when modifying the same number of decision features. For an instance x ∈ X, denote by γ ∈ Rd the decision features for the classification of x. We hack PLNN-NS by setting the values of a few top-weighted decision features in x to zero, such that the prediction of PLNN-NS on x changes significantly. The change of prediction is evaluated by two measures as follows. First, the change of prediction probability (CPP) is the absolute change of the probability of classifying x as a positive instance. Second, the number of label-changed instance (NLCI) is the number of instances whose predicted label changes after being hacked. Again, due to the inefficiency of LIME, we use the sampled data sets in Section 5.2 for evaluation. In Figure 7, the average CPP and NLCI of OpenBox are always higher than LIME on both data sets. This demonstrates that the interpretations computed by OpenBox are more effective than LIME when they are applied to hack the target model. Interestingly, the advantage of OpenBox is more significant on FMNIST-1 than on FMNIST-2. This is because, as shown in Figure 2(a), the prediction probabilities of most instances in FMNIST-1 are either 1.0 or 0.0, which provides little gradient information for LIME to accurately approximate the classification function of the PLNN-NS. In this case, the decision features computed by LIME cannot describe the exact behavior of the target model. In summary, since OpenBox produces the exact and consistent interpretations for a target model, it achieves an advanced hacking performance over LIME. 5.6 Can We Debug a Model Using OpenBox? Intelligent machines are not perfect and predictions fail occasionally. When such failure occurs, we can apply OpenBox to interpret why an instance is mis-classified. Figure 8 shows some images that are mis-classified by PLNN-NS with a high probability. In Figures 8(a)-(c), the original image is a Coat, however, since the scattered mosaic pattern on the cloth hits more features of Pullover than Coat, the original image is classified as a Pullover with a high probability. In Figures 8(d)-(f), the original image is a Pullover, however, it is mis-classified as a Coat because the white collar and breast hit the typical features of Coat, and the dark shoulder and sleeves miss the most significant features of Pullover. Similarly, the Ankle Boot in Figure 8(g) highlights more features on the upper left corner, thus it is mis-classified as a Bag. Exact and Consistent Interpretation for Piecewise Linear Neural Networks: A Closed Form Solution (a) CO (b) CO: 0.04 (c) PU: 0.96 (d) PU (e) CO: 1.00 (f) PU: 0.00 (g) AB (h) AB: 0.16 (i) BG: 0.84 (j) BG (k) AB: 1.00 (l) BG: 0.00 Figure 8: The mis-classified images of (a) Coat (CO), (d) Pullover (PU), (g) Ankle Boot (AB), and (j) Bag (BG). (a), (d), (g) and (j) show the original images. For the rest subfigures, the caption shows the prediction probability of the corresponding class; the image shows the decision features supporting the prediction of the corresponding class. The Bag in Figure 8(j) is mis-classified as an Ankle Boot because it hits the features of ankle and heel of Ankle Boot, however, misses the typical features of Bag on the upper left corner. In conclusion, as demonstrated by the mis-classified examples in Figure 8, OpenBox accurately interprets the mis-classifications, which is potentially useful in debugging abnormal behaviors of the interpreted model. 6 CONCLUSIONS AND FUTURE WORK In this paper, we tackle the challenging problem of interpreting PLNNs. By studying the states of hidden neurons and the configuration of a PLNN, we prove that a PLNN is mathematically equivalent to a set of LLCs, which can be efficiently computed by the proposed OpenBox method. Extensive experiments show that the decision features and the polytope boundary features of LLCs provide exact and consistent interpretations on the overall behavior of a PLNN. Such interpretations are highly effective in hacking and debugging PLNN models. As future work, we will extend our work to interpret more general neural networks that adopt smooth activation functions, such as sigmoid and tanh. REFERENCES [1] Aishwarya Agrawal, Dhruv Batra, and Devi Parikh. 2016. Analyzing the behavior of visual question answering models. arXiv:1606.07356 (2016). [2] Jimmy Ba and Rich Caruana. 2014. Do deep nets really need to be deep?. In NIPS. 2654–2662. [3] Osbert Bastani, Carolyn Kim, and Hamsa Bastani. 2017. Interpreting Blackbox Models via Model Extraction. arXiv:1705.08504 (2017). [4] C Bishop. 2007. Pattern Recognition and Machine Learning (Information Science and Statistics). Springer, New York (2007). [5] C. Cao, X. Liu, Y Yang, Y. Yu, J. Wang, Z. Wang, Y. Huang, L. Wang, C. Huang, et al. 2015. Look and think twice: Capturing top-down visual attention with feedback convolutional neural networks. In ICCV. 2956–2964. [6] RJ Caron, JF McDonald, and CM Ponic. 1989. A degenerate extreme point strategy for the classification of linear constraints as redundant or necessary. JOTA 62, 2 (1989), 225–237. [7] Z. Che, S. Purushotham, R. Khemani, and Y. Liu. 2015. Distilling knowledge from deep networks with applications to healthcare domain. arXiv:1512.03542 (2015). [8] Jan Chorowski and Jacek M Zurada. 2015. Learning understandable neural networks with nonnegative weight constraints. TNNLS 26, 1 (2015), 62–69. [9] Alexey Dosovitskiy and Thomas Brox. 2016. Inverting visual representations with convolutional networks. In CVPR. 4829–4837. [10] D. Erhan, Yoshua Bengio, A. Courville, and P. Vincent. 2009. Visualizing higherlayer features of a deep network. University of Montreal 1341 (2009), 3. [11] Ruth Fong and Andrea Vedaldi. 2017. Interpretable Explanations of Black Boxes by Meaningful Perturbation. arXiv:1704.03296 (2017). arXiv version, 2017, Canada [12] Nicholas Frosst and Geoffrey Hinton. 2017. Distilling a Neural Network Into a Soft Decision Tree. arXiv:1711.09784 (2017). [13] Amirata Ghorbani, Abubakar Abid, and James Zou. 2017. Interpretation of Neural Networks is Fragile. arXiv:1710.10547 (2017). [14] Xavier Glorot, Antoine Bordes, and Yoshua Bengio. 2011. Deep sparse rectifier neural networks. In ICAIS. 315–323. [15] Ian Goodfellow, Yoshua Bengio, and Aaron Courville. 2016. Deep Learning. MIT Press. http://www.deeplearningbook.org. [16] Ian J Goodfellow, David Warde-Farley, Mehdi Mirza, Aaron Courville, and Yoshua Bengio. 2013. Maxout networks. arXiv:1302.4389 (2013). [17] B. Goodman and S. Flaxman. 2016. European Union regulations on algorithmic decision-making and a" right to explanation". arXiv:1606.08813 (2016). [18] Nick Harvey, Chris Liaw, and Abbas Mehrabian. 2017. Nearly-tight VC-dimension bounds for piecewise linear neural networks. arXiv:1703.02930 (2017). [19] K. He, X. Zhang, S. Ren, and J. Sun. 2015. Delving deep into rectifiers: Surpassing human-level performance on imagenet classification. In ICCV. 1026–1034. [20] Geoffrey Hinton, Oriol Vinyals, and Jeff Dean. 2015. Distilling the knowledge in a neural network. arXiv:1503.02531 (2015). [21] Patrik O Hoyer. 2002. Non-negative sparse coding. In WNNSP. 557–565. [22] Pieter-Jan Kindermans, Sara Hooker, Julius Adebayo, Maximilian Alber, Kristof T Schütt, Sven Dähne, Dumitru Erhan, and Been Kim. 2017. The (Un) reliability of saliency methods. arXiv:1711.00867 (2017). [23] Pang Wei Koh and Percy Liang. 2017. Understanding black-box predictions via influence functions. arXiv:1703.04730 (2017). [24] Pascal Koiran and Eduardo D Sontag. 1996. Neural networks with quadratic VC dimension. In NIPS. 197–203. [25] Alex Krizhevsky, Ilya Sutskever, and Geoffrey E Hinton. 2012. Imagenet classification with deep convolutional neural networks. In NIPS. 1097–1105. [26] Yann LeCun, Yoshua Bengio, and Geoffrey Hinton. 2015. Deep learning. nature 521, 7553 (2015), 436. [27] Honglak Lee, Alexis Battle, Rajat Raina, and Andrew Y Ng. 2007. Efficient sparse coding algorithms. In NIPS. 801–808. [28] Jiwei Li, Xinlei Chen, Eduard Hovy, and Dan Jurafsky. 2015. Visualizing and understanding neural models in NLP. arXiv:1506.01066 (2015). [29] Aravindh Mahendran and Andrea Vedaldi. 2015. Understanding deep image representations by inverting them. In CVPR. 5188–5196. [30] Guido F Montufar, Razvan Pascanu, Kyunghyun Cho, and Yoshua Bengio. 2014. On the number of linear regions of deep neural networks. In NIPS. 2924–2932. [31] Vinod Nair and Geoffrey E Hinton. 2010. Rectified linear units improve restricted boltzmann machines. In ICML. 807–814. [32] Jiquan Ngiam, Aditya Khosla, Mingyu Kim, Juhan Nam, Honglak Lee, and Andrew Y Ng. 2011. Multimodal deep learning. In ICML. 689–696. [33] R. B. Palm. 2012. Prediction as a candidate for learning deep hierarchical models of data. (2012). [34] Razvan Pascanu, Guido Montufar, and Yoshua Bengio. 2013. On the number of response regions of deep feed forward networks with piece-wise linear activations. arXiv:1312.6098 (2013). [35] Nadeem N Rather, Chintan O Patel, and Sharib A Khan. 2017. Using Deep Learning Towards Biomedical Knowledge Discovery. IJMSC 3, 2 (2017), 1. [36] Marco Tulio Ribeiro, Sameer Singh, and Carlos Guestrin. 2016. Why should i trust you?: Explaining the predictions of any classifier. In KDD. ACM, 1135–1144. [37] R. R Selvaraju, A. Das, R. Vedantam, M. Cogswell, D. Parikh, and D. Batra. 2016. Grad-cam: Why did you say that? visual explanations from deep networks via gradient-based localization. arXiv:1610.02391 (2016). [38] A. Shrikumar, P. Greenside, and A. Kundaje. 2017. Learning important features through propagating activation differences. arXiv:1704.02685 (2017). [39] Karen Simonyan, Andrea Vedaldi, and Andrew Zisserman. 2013. Deep inside convolutional networks: Visualising image classification models and saliency maps. arXiv:1312.6034 (2013). [40] D. Smilkov, N. Thorat, B. Kim, F. Viégas, and M. Wattenberg. 2017. SmoothGrad: removing noise by adding noise. arXiv:1706.03825 (2017). [41] Eduardo D Sontag. 1998. VC dimension of neural networks. NATO ASI Series F Computer and Systems Sciences 168 (1998), 69–96. [42] Mukund Sundararajan, Ankur Taly, and Qiqi Yan. 2017. Axiomatic Attribution for Deep Networks. arXiv:1703.01365 (2017). [43] M. Wu, M. C Hughes, S. Parbhoo, M. Zazzi, V. Roth, and F. Doshi-Velez. 2018. Beyond Sparsity: Tree Regularization of Deep Models for Interpretability. AAAI (2018). [44] Han Xiao, Kashif Rasul, and Roland Vollgraf. 2017. Fashion-MNIST: a Novel Image Dataset for Benchmarking Machine Learning Algorithms. (2017). arXiv:cs.LG/cs.LG/1708.07747 [45] J. Yosinski, J. Clune, A. Nguyen, T. Fuchs, and H. Lipson. 2015. Understanding neural networks through deep visualization. arXiv:1506.06579 (2015). [46] Rich Zemel, Yu Wu, Kevin Swersky, Toni Pitassi, and Cynthia Dwork. 2013. Learning fair representations. In ICML. 325–333. [47] Bolei Zhou, David Bau, Aude Oliva, and Antonio Torralba. 2017. Interpreting Deep Visual Representations via Network Dissection. arXiv:1711.05611 (2017). [48] Bolei Zhou, Aditya Khosla, Agata Lapedriza, Aude Oliva, and Antonio Torralba. 2016. Learning deep features for discriminative localization. In CVPR. 2921–2929.
1cs.CV
Higher-order compatible discretization on hexahedrals arXiv:1304.7018v1 [math-ph] 25 Apr 2013 Jasper Kreeft and Marc Gerritsma Abstract We derive a compatible discretization method that relies heavily on the underlying geometric structure, and obeys the topological sequences and commuting properties that are constructed. As a sample problem we consider the vorticityvelocity-pressure formulation of the Stokes problem. We motivate the choice for a mixed variational formulation based on both geometric as well as physical arguments. Numerical tests confirm the theoretical results that we obtain a pointwise divergence-free solution for the Stokes problem and that the method obtains optimal convergence rates. 1 Introduction As sample problem we consider the Stokes flow problem in its vorticity-velocitypressure formulation, ω − curl u = 0 in Ω , (1a) curl ω + grad p = f in Ω , (1b) div u = 0 in Ω . (1c) In this article we consider prescribed velocity boundary conditions, u = 0 on ∂ Ω , but the method holds for all admissible types of boundary conditions, see [8]. Despite the simple appearance of Stokes flow model, there exists a large number of numerical methods to simulate Stokes flow. They all reduce to two classes, that is, Jasper Kreeft Shell Global Solutions, Grasweg 31, 1031 HW, Amsterdam, e-mail: jasper.kreeft@shell. com Marc Gerritsma Delft University of Technology, Kluyverweg 2, 2629 HT, Delft, e-mail: m.i.gerritsma@ tudelft.nl 1 2 Jasper Kreeft and Marc Gerritsma either circumventing the LBB stability condition, like stabilized methods, e.g. [7], or satisfying this condition, as in compatible or mixed methods, e.g. [4]. The last requires the construction of dedicated discrete vector spaces. Best known are the curl conforming Nédélec and divergence conforming Raviart-Thomas spaces. Here, we consider a subclass of compatible methods, i.e. mimetic methods. Mimetic methods do not solely search for appropriate vector spaces, but aim to mimic structures and symmetries of the continuous problem, see [2, 3, 10, 11]. As a consequence of this mimicking, mimetic methods automatically preserve most of the physical and mathematical structures of the continuous formulation, among others the LBB condition and, most important, a pointwise divergence-free solution, [8, 9]. At the heart of the mimetic method there are the well-known integral theorems of Newton-Leibniz, Stokes and Gauss, which couple the operators grad, curl and div, to the action of the boundary operator on a manifold. Therefore, obeying geometry and orientation will result in satisfying exactly the mentioned theorems, and consequently performing the vector operators exactly in a finite dimensional setting. In 3D we distinguish between four types of sub-manifolds, that is, points, lines, surfaces and volumes, and two types of orientation, namely, outer- and inner-orientation. Examples of sub-manifolds are shown in Figure 1 together with the action of the boundary operator. Outer Orientation ∂ ∂ ∂ ∂ ∂ ∂ Inner Orientation Fig. 1 The four geometric objects possible in R3 , point, line, surface and volume, with outer(above) and inner- (below) orientation. The boundary operator, ∂ , maps k-dimensional objects to (k − 1)-dimensional objects. By creating a quadrilateral or hexahedral mesh, we divide the physical domain in a large number of these geometric objects, and to each geometric object we associate a discrete unknown. This implies that these discrete unknowns are integral quantities. Since the three earlier mentioned theorems are integral equations, it follows for example that taking a divergence in a volume is equivalent to taking the sum of the integral quantities associated to the surrounding surface elements, i.e. the fluxes. So using integral quantities as degrees of freedom to perform a grad, Higher-order compatible discretization on hexahedrals 3 curl or div, is equivalent to taking the sum of the degrees of freedom located at its boundary. These relations are of purely topological nature. They form a topological sequence or complex. This sequence is fundamental. It has a direct connection with the complexes that are related to the physical domain, the computational domain, the physical problem and the discretization. Although the original work, [9, 10], was presented in terms of differential geometry and algebraic topology, here we will use vector calculus because it is the more common mathematical language. Nevertheless, we will put emphasis on the distinction between topology and metric, on complexes and on commuting diagrams, which drives the former two languages. We make use of spectral element interpolation functions as basis functions. In the past nodal spectral elements were mostly used in combination with Galerkin projection (GSEM). The GSEM satisfies the LBB condition by lowering the polynomial degree of the pressure by two with respect to the velocity. This results in a method that is only weakly divergence-free, meaning that the divergence of the velocity field only convergence to zero with mesh refinement. The present study uses mimetic spectral element interpolation or basis functions, [10]. The mixed mimetic spectral element method (MMSEM) satisfies the LBB condition and gives a pointwise divergence-free solution for all mesh sizes. 2 Can we really discretize exactly? Since the Stokes flow model (1) should hold on a certain physical domain, we will include geometry by means of integration. In that case we can relate every physical quantity to a geometric object. Starting with the incompressibility constraint (1c) we have due to Gauss’ divergence theorem, Z Z div u dV = V u · n dS = 0, ∂V and using Stokes’ circulation theorem the relation (1a) can be written as Z S ω × n dS = Z S curl u × n dS = Z u · t dl. ∂S From the first relation it follows that div u is associated to volumes. The association to a geometric object for velocity u is less clear. In fact it can be associated to two different types of geometric objects. A representation of velocity compatible with the incompressibility constraint is given in terms of the velocity flux, u · n, through a surface that bounds the volume, while in the circulation relation velocity, u · t, is represented along a line that bounds the surface. We will call the velocity vector through a surface outer-oriented and the velocity along a line segment inneroriented. A similar distinction can be made for vorticity, see [9]. 4 Jasper Kreeft and Marc Gerritsma The last equation to be considered is (1b). This equation shows that classical Newton-Leibniz, Stokes circulation and Gauss divergence theorems tell only half the story. From the perspective of the classical Newton-Leibniz theorem, the gradient acting on the pressure relates line values to their corresponding end point, while the Stokes circulation theorem shows that the curl acting on the vorticity vector relates surface values to the line segment enclosing it. So how does this fit into one equation? In fact, from a geometric perspective, there exists two gradients, two curls and two divergence operators. One of each is related to the mentioned integral theorems as explained above. The others are their formal adjoint operators. Let grad, curl and div be the original differential operators associated to the mentioned integral theorems, then the formal Hilbert adjoint operators grad∗ , curl∗ and div∗ are defined as,       a, −grad∗ b Ω := div a, b Ω , a, curl∗ b Ω := curl a, b Ω , a, −div∗ b Ω := grad a, b Ω . From a geometric interpretation, the adjoint operators detours via the opposite type of orientation. Where div relates a vector quantity associated to surfaces to a scalar quantity associated to a volume enclosed by these surfaces. Its adjoint operator, grad∗ , relates a scalar quantity associated with a volume to a vector quantity associated with its surrounding surfaces. This is illustrated in Figure 2. Following Figure 2, the adjoint operator grad∗ consists of three consecutive steps: First, switch from an outer oriented scalar associated to volumes to an inner oriented scalar associated to points, then take the derivative and finally switch from an inner oriented vector associated to lines to an outer oriented vector associated to surfaces. In a similar way we can describe the derivatives curl∗ and div∗ . Outer Orientation grad ∂ div * curl div ∂ ∂ curl * grad* Inner Orientation Fig. 2 Geometric interpretation of the action of the boundary operators, vector differential operators and their formal Hilbert adjoint operators. Higher-order compatible discretization on hexahedrals 5 Since the horizontal relations are purely topological and the vertical relations purely metric, the operators grad, curl and div are purely topological operators, while grad∗ , curl∗ and div∗ are metric. This makes them much harder to discretize. Now (1b) could then either be associated to an inner-oriented line segment by rewriting it as curl∗ ω + grad p = f, or be associated to an outer-oriented surface by rewriting it as curl ω + grad∗ p = f. Without geometric considerations we could never make a distinction between grad, curl and div and their associated Hilbert adjoints div∗ , curl∗ and grad∗ . Since our focus is on obtaining a pointwise divergence-free discretization, we decide to use the expression where the equations are associated to outer-oriented geometric objects, ω − curl∗ u = 0 in Ω , (2a) curl ω + grad p = f in Ω , (2b) div u = 0 in Ω , (2c) ∗ where the first equation is associated to outer-oriented line segments, the second to outer-oriented surfaces and the third to outer-oriented volumes. 3 Complexes Figure 2 reveals already a number of sequence or complex structures. Starting from geometry, we consider points, P, lines, L, surfaces, S, and volumes, V . They possess a sequence in combination with the boundary operator, ∂ . The boundary of a volume is a surface, the boundary of a surface is a line and the boundary of a line are its two end points. This results in the following complex, ∂ ∂ ∂ ∂ 0 ←− P ←− L ←− S ←− V. (3) An important property of the complex is that if we apply the boundary operator twice, we always find an empty set, e.g. if S = ∂V , then ∂ S = 0. / As follows directly from the previously mentioned integral theorems, it follows, as a consequence of ∂ ∂ = 0, / that curl grad = 0 and div curl = 0. The derivatives themselves also form a complex. In a Hilbert setting this becomes, grad curl div H 1 (Ω ) −→ H(Ω , curl) −→ H(Ω , div) −→ L2 (Ω ), (4) and using the Hilbert adjoint relations we also obtain the adjoint complex with properties curl∗ grad∗ = 0 and div∗ curl∗ = 0, 6 Jasper Kreeft and Marc Gerritsma −div∗ −grad∗ curl∗ L02 (Ω ) ←− H0 (Ω , div∗ ) ←− H0 (Ω , curl∗ ) ←− H01 (Ω ) (5) In the Hilbert setting, the variables of the Stokes problem are in the following spaces, ω ∈ H(Ω , curl) ∩ H0 (Ω , div∗ ), u ∈ H(Ω , div) ∩ H0 (Ω , curl∗ ) and p ∈ L2 (Ω )∩H0 (Ω , grad∗ ). It is hard, if even possible at all, to find discrete vector spaces that are subsets of these function spaces and simultaneously satisfy the complex properties. Instead, the Stokes problem can be cast into an equivalent variational or mixed formulation where we make use of the Hilbert adjoint properties. This simplifies the function spaces of the flow variables. The mixed formulation reads; Find (ω, u, p) ∈ {H(Ω , curl)×H(Ω , div)×L2 (Ω )} with f ∈ H(Ω , div) given, for all (σ , v, q) ∈ {H(Ω , curl) × H(Ω , div) × L2 (Ω )}, such that,   σ , ω Ω − curl σ , u Ω = 0, (6a)    v, curl ω Ω − div v, p Ω = v, f Ω , (6b)  q, div u Ω = 0. (6c) With the formulation and corresponding function spaces, we are able to construct compatible discrete vector spaces. Note that we now completely avoid the metric dependent derivatives grad∗ and curl∗ , and their corresponding complex. 4 Discretization of Stokes problem Degrees of freedom. In many numerical methods, especially in finite difference and finite element methods, the discrete coefficients are point values. In the proposed mimetic structure, the discrete unknowns represent integral values on k-dimensional submanifolds, ranging from points to volumes, so 0 ≤ k ≤ 3. These k-dimensional submanifolds are oriented, constitute the computational domain and span the physical domain. The concept of orientation shown in Figures 1 and 2 gave rise to the boundary operator, ∂ , which can be represented by connectivities consisting only of -1, 0 and 1, see also [9]. The space of degrees of freedom are given by P, L , S and V . These spaces form a duality pairing with the geometric spaces P, L, S and V . The degrees of freedom are integral values, i.e. Z l w · t dl ∈ L , Z S u · n dS ∈ S , Z V p dV ∈ V . (7) By the definition of the degrees of freedom spaces and the previously mentioned integral theorems, we can define the formal adjoint of the boundary operator, i.e. the coboundary operator, δ . The coboundary operator is the discrete representation of the topological derivatives grad, curl and div. Since ∂ ∂ = 0, / it follows from a discrete Newton-Leibniz, Stokes and Gauss theorem that applying the coboundary Higher-order compatible discretization on hexahedrals 7 operator twice is always zero, δ δ = 0/ (see [2, 9]). The coboundary operator also has matrix representations, G, C and D, that are the transpose of the connectivity matrices. We obtain the following topological sequence, G C D P −→ L −→ S −→ V , (8) where CG = 0 and DC = 0. These matrices will explicitly appear in the final matrix system. An illustration of DC = 0 is given in Figure 3. More details on the structure ω DC ω Cω Fig. 3 The action of twice the coboundary operator δ on a vorticity d.o.f. has a zero net result on its surrounding volumes, because they all have both a positive and a negative contribution from its neighboring velocity faces. of geometry, orientation and degrees of freedom can be found in Gerritsma et al, [6]. Mimetic Operators. Let W = H(Ω , curl), V = H(Ω , div) and Q = L2 (Ω ). The discretization of the flow variables involves a projection operator, πh , from the complete vector spaces W , V and Q, to the discrete vector spaces Wh , Vh and Qh . Here the flow variables are expressed in terms of d.o.f. defined on k-cells, and corresponding interpolation functions (also called basis-functions). The projection operator actually consists of two steps, a reduction operator, R, that integrates the flow variables on k-cells, and a reconstruction operator, I , that interpolates the d.o.f. using the appropriate basis-functions. These mimetic operators were defined in [2, 10]. A composition of the two operators gives the projection operator πh = I ◦ R 1 . Reduction operator R is simply defined by integration. It possesses the following commutation relations, Rgrad = GR, Rcurl = CR, Rdiv = DR. (9) The treatment of the reconstruction operator leaves some freedom, as long as it satisfies the following properties: be the right inverse of the reduction, RI = Id, be the approximate left inverse of the reduction, I R = Id + O(h p ), and it should possess the following commutation relations, grad I = I G, 1 curl I = I C, div I = I D. (10) For completeness, in a Hilbert setting the projection needs an additional smoothing argument. This step is ignored here to increase readibility. See [8] for more details. 8 Jasper Kreeft and Marc Gerritsma When both the reduction and reconstruction operators commute with continuous and discrete differentiation, than also the projection operator πh possesses a commutation relation with differentiation. In case of the divergence operator, which is relevant to obtain a pointwise divergence-free solution, the commutation relation is given by, div πh = div I R = I DR = I Rdiv = πh div . (11) The commutation relations in case of divergence are illustrated below, div V −−−−→   yR D Q   + yR S −−−−→ V . D S −−−−→   yI V   yI div = div Vh −−−−→ Qh . V −−−−→  π y h Q  π y h div Vh −−−−→ Qh . Since property (11) also holds for the grad and curl, we obtain the following complex for discrete vector spaces, grad curl div Φh −→ Wh −→ Vh −→ Qh . (12) In practice we use I DR from (11) in computations. Relation (11) implies among others that it satisfies the discrete LBB condition,  qh , div vh Ω βh := inf sup > β > 0, (13) qh ∈Qh vh ∈Vh kqh kQ kvh kV where β is the inf-sup constant of the continuous problem, (1). Whereas the LBB condition is a measurement for numerical stability, the commutation relation indicates physical correctness of the numerical method. This last is a much stronger statement, which includes also the former. The conditions on the reconstruction operator have led to the construction of mimetic spectral element basis-functions, [5, 10]. Since we use a tensor-based construction of point, line, surface and volume corresponding basis-functions, we only need nodal and edge interpolation functions. The nodal interpolation functions are the well-known Lagrange polynomials. The edge polynomials were derived from the Lagrange polynomials, based on the given conditions. For a set of Lagrange polynomials, li (x), i = 0, . . . , N, the edge polynomials, ei (x), i = 1, . . . , N, are given by, i−1 dlk (x) ei (x) = − ∑ . (14) k=0 dx The Lagrange and edge polynomials possess the condition RI = Id, i.e., Higher-order compatible discretization on hexahedrals 9 Z xj li (x j ) = δi, j , x j−1 ei (x) dx = δi, j , (15) where δi, j is the Kronecker delta. The interpolation function for a variable associated  to a surface, for example, is given by, si, j,k (x, y, z) = li (x)e j (y)ek (z), ei (x)l j (y)ek (z), ei (x)e j (y)lk (z) . Example 1 (Divergence operator in 2D). One of the most interesting properties of the mimetic method presented in this paper, is that within our weak formulation, the divergence-free constraint is satisfied pointwise. Let uh ∈ Vh be the velocity flux defined as   N ∑i=0 ∑Nj=1 ui, j li (x)e j (y) . (16) uh = ∑Ni=1 ∑Nj=0 vi, j ei (x)l j (y) Then the change of mass, mh ∈ Qh , is equal to the divergence of uh , N N mh = div uh = ∑ ∑ (ui, j − ui−1, j + vi, j − vi, j−1 )ei (x)e j (y). i=1 j=1 N N = ∑ ∑ mi, j ei (x)e j (y), (17) i=1 j=1 where mi, j = ui, j − ui−1, j + vi, j − vi, j−1 can be compactly written as m = Du. Note that if the mass production is zero, as in our model problem (1c), the incompressibility constraint can already be satisfied at the discrete level. Interpolation using ei (x)e j (y) then results in a solution of velocity uh that is pointwise divergence-free. 5 A priori error estimates By standard interpolation theory it follows that we obtain the following h-convergence rates for the interpolation errors of the flow variables, kω − πh ωkH(curl) = O(hN ), ku − πh ukH(div) = O(hN ), kp − πh pkL2 = O(hN ), (18) and that kdiv u − div πh ukL2 = 0 due to the commuting property. In cases with empty harmonic vector spaces, we have that the discrete vector spaces are conforming, i.e., Wh ⊂ W , Vh ⊂ V and Qh ⊂ Q. Moreover, due to the commuting property, it follows that these spaces are compatible, i.e., curlWh ⊂ Vh and divVh = Qh . Finally they possess a Helmholtz-Hodge decomposition, σ = grad φ + 10 Jasper Kreeft and Marc Gerritsma ⊥ curl∗ v and v = curl σ + grad∗ q. In terms of vector spaces, this is, Wh = ZWh ⊕ ZW h and Vh = ZVh ⊕ ZV⊥h , where Z refers to the kernel or nullspace and Z ⊥ to its orthogonal complement. Having all these properties, a priori error estimates are derived in [8] that show optimal convergence rates for all admissible boundary conditions, including the no-slip boundary condition, which is non-trivial in mixed finite element methods. The a priori error estimates are given by kω − ω h kW ≤ C inf kω − σ h kW , (19) ku − uh kV ≤ C inf ku − vh kV +C inf kω − σ h kW , (20) σ h ∈Wh vh ∈Vh σ h ∈Wh kp − ph kQ ≤ C inf kp − qh kQ +C inf ku − vh kV +C inf kω − σ h kW , qh ∈Qh vh ∈Vh σ h ∈Wh (21) where the constants C will differ in each case and are independent of h. It shows that the rate of convergence of the approximation errors are the same as those of the interpolation errors. 6 Numerical Results For many years, the lid-driven cavity flow was considered one of the classical benchmark cases for the assessment of numerical methods and the verification of incompressible (Navier)-Stokes codes. The 3D lid-driven cavity test case deals with a flow in a unit box with five solid boundaries and moving lid as the top boundary, moving with constant velocity equal to minus one in x-direction. Especially the two line singularities make the lid-driven cavity problem a challenging test case. The left plot in Figure 4 shows slices of the magnitude of the velocity field in a three dimensional lid-driven cavity Stokes problem, obtained on a 2 × 2 × 2 element mesh, where each element contains a Gauss-Lobatto mesh of N = 8. The slices are taken at 10%, 50% and 90% of the y-axis. The right plot in Figure 4 shows slices of divergence of the velocity field. Figure 4 confirms that the mixed mimetic spectral element method leads to an accurate result with a divergence-free solution. The second testcase shows the optimal convergence behavior for a 2D Stokes problem with no-slip boundary conditions. The testcase originates from a recent paper by Arnold et al [1], where sub-optimal convergence is shown and proven for no-slip boundary conditions when using Raviart-Thomas elements. Since RaviartThomas elements are the most popular H(div, Ω) conforming elements, we compare our method to these results. Figure 5 shows the results of the Stokes problem on a unit square with velocity and pressure fields given by u = − 2x2 (x − 1)2 y(2y − 1)(y − 1), 2y2 (y − 1)2 x(2x − T 1)(x − 1) , p = (x − 21 )5 + (y − 21 )5 . While for velocity both methods show optimal convergence, for pressure a difference of 12 is noticed in the rate of convergence and for vorticity a difference in rate of convergence of 32 is revealed. Higher-order compatible discretization on hexahedrals Z 11 Z Y X Y X div u -14 5x10 3 1 -1 -3 -5 Fig. 4 Left: slices of magnitude of the velocity field of a three dimensional lid-driven cavity Stokes problem obtained on a 2 × 2 × 2 element mesh with N = 8. Right: slices of the divergence of velocity. Is confirms a divergence-free velocity field. 0 10 −2 ||u-uh ||H(div) ||u-uh ||L 2 ||ω-ωh||H(curl) Raviart−Thomas, N=2 Mimetic Spectral, N=2 Mimetic Spectral, N=3 0 10 1 _ 2 10 −4 10 3 −6 10 −3 −2 10 −4 10 2 10 −2 10 −1 10 h 2 −6 10 0 10 −3 10 −1 10 10 −2 h 3 −1 10 0 10 0 10 −2 ||p-ph ||L2 10 3 _ 2 −4 10 2 3 −6 10 −3 10 −2 10 h 10 0 Fig. 5 Comparison of the h-convergence between Raviart-Thomas and Mimetic spectral element projections for the 2D Stokes problem with no-slip boundary conditions. 12 Jasper Kreeft and Marc Gerritsma References 1. D. Arnold, R. Falk, and J. Gopalakrishnan. Mixed finite element approximation of the vector Laplacian with Dirichlet boundary conditions. Mathematical Models & Methods in Applied Sciences, 22(9):1250024, 2012. 2. P. Bochev and J. Hyman. Principles of mimetic discretizations of differential operators. In D. Arnold, P. Bochev, R. Lehoucq, R. Nicolaides, and M. Shashkov, editors, Compatible Discretizations, volume 142 of IMA Volumes in Mathematics and its Applications, pages 89–119. Springer, 2006. 3. F. Brezzi and A. Buffa. Innovative mimetic discretizations for electromagnetic problems. Journal of computational and applied mathematics, 234:1980–1987, 2010. 4. F. Brezzi and M. Fortin. Mixed and hybrid finite element methods, volume 15 of Springer Series in Computational Mathematics. Springer-Verlag, New York, 1991. 5. M. Gerritsma. Edge functions for spectral element methods. In J. Hesthaven and E. Rønquist, editors, Spectral and High Order Methods for Partial Differential Equations, pages 199–208. Springer, 2011. 6. M. Gerritsma, R. Hiemstra, J. Kreeft, A. Palha, P. Rebelo, and D. Toshniwal. The geometric basis of mimetic spectral approximations. In (this issue), 2013. 7. T. Hughes, P. Franca, and M. Balestra. A new finite element formulation for computational fluid dynamics: V. Circumventing the Babuška-Brezzi condition: A stable Petrov-Galerkin formulation of the Stokes problem accomodating equal-order interpolations. Computer Methods in Applied Mechanics and Engineering, 59:85–99, 1986. 8. J. Kreeft and M. Gerritsma. A priori error estimates for compatible spectral discretization of the Stokes problem for all admissible boundary conditions. submitted, arXiv:1206.2812, 2013. 9. J. Kreeft and M. Gerritsma. Mixed mimetic spectral element method for Stokes flow: a pointwise divergence-free solution. Journal Computational Physics, 240:284–309, 2013. 10. J. Kreeft, A. Palha, and M. Gerritsma. Mimetic framework on curvilinear quadrilaterals of arbitrary order. submitted, arXiv:1111.4304, 2013. 11. J. B. Perot. Discrete conservation properties of unstructured mesh schemes. Annual review of fluid mechanics, 43:299–318, 2011.
5cs.CE
> REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < 1 A Novel Pre-processing Scheme to Improve the Prediction of Sand Fraction from Seismic Attributes using Neural Networks Soumi Chaki, Student Member, IEEE, Aurobinda Routray, Member, IEEE, William K. Mohanty  Abstract— This paper presents a novel pre-processing scheme to improve the prediction of sand fraction from multiple seismic attributes such as seismic impedance, amplitude and frequency using machine learning and information filtering. The available well logs along with the 3-D seismic data have been used to benchmark the proposed pre-processing stage using a methodology which primarily consists of three steps: preprocessing, training and post-processing. An Artificial Neural Network (ANN) with conjugate-gradient learning algorithm has been used to model the sand fraction. The available sand fraction data from the high resolution well logs has far more information content than the low resolution seismic attributes. Therefore, regularization schemes based on Fourier Transform (FT), Wavelet Decomposition (WD) and Empirical Mode Decomposition (EMD) have been proposed to shape the high resolution sand fraction data for effective machine learning. The input data sets have been segregated into training, testing and validation sets. The test results are primarily used to check different network structures and activation function performances. Once the network passes the testing phase with an acceptable performance in terms of the selected evaluators, the validation phase follows. In the validation stage, the prediction model is tested against unseen data. The network yielding satisfactory performance in the validation stage is used to predict lithological properties from seismic attributes throughout a given volume. Finally, a post-processing scheme using 3-D spatial filtering is implemented for smoothing the sand fraction in the volume. Prediction of lithological properties using this framework is helpful for Reservoir Characterization. Index Terms— Artificial Neural Network (ANN), wavelets, Empirical Mode Decomposition (EMD), entropy, Fourier Transform, Normalized Mutual Information (NMI), preprocessing, regularization, Reservoir Characterization (RC), sand fraction, 3-D median filtering. I. INTRODUCTION H YDROCARBONS migrate from source rock through porous medium to reach reservoir rock for temporary preservation [1]. Finally, the mobile hydrocarbons get seized in the cap rocks. As such, the identification of hydrocarbon– enriched–formations by characterization of each layer in the borehole is of enormous importance to the explorers. Soumi Chaki and Aurobinda Routray are with the Department of Electrical Engineering, Indian Institute of Technology Kharagpur, Kharagpur- 721302, India (e-mail: [email protected], [email protected]). Recognition of potential hydrocarbon–enriched zones in a prospective oil exploration field can be carried out using well logs which can categorize layers into different sections such as dry, water containing, and hydrocarbon bearing layers. The lithological properties in the neighborhood of a borehole can be estimated from well logs, whereas their distributions become difficult to predict away from the wells. In such cases, available seismic attributes can be used as a guidance to predict lithological information at all traces of the area of interest [2]. Well logs and seismic attributes are integrated at available well locations to design a reservoir model with the least uncertainty. However, mapping between well logs and seismic attributes is governed by nonlinear relationship and characterized by mismatch in information content. Such nonlinear problems can be approached using state-of-art computer–based methods like hybrid systems [3], [4], multiple regression, neural networks [5], Neuro-fuzzy Systems [6] etc. It has been found from literature that ANN has been widely used by researchers and engineers from diverse backgrounds to model single or multiple target properties from predictor variables in different research problems because of its accurate prediction and generalization capability. For example, ANN has been used in climatological studies [7], ocean engineering [8], telecommunications [9], text recognition [10], financial time series [11], reservoir characterization [12]–[17], etc. A diverse dataset containing information assembled from multiple domains can be used for learning and validation of ANN. However, it has some inherent limitations. Firstly, performance of ANN is dependent on the selection of network structure and associated parameters. Secondly, training a complex multilayered network is a time intensive process. Furthermore, a complex network trained with relatively smaller number of learning patterns may lead to over fitting. It is equally important to assess the possibility of modelling the target property from predictor variables using ANN or any other nonlinear modelling approach. Sometimes the model performance can be improved by applying suitable filtering techniques to the predictor/target variables in the pre-processing stage. Several studies have contributed to the performance analysis of ANN along with other machine learning algorithms to model a target variable from single or multiple predictors with respect to RC William K. Mohanty is with the Department of Geology and Geoscience, Indian Institute of Technology Kharagpur, Kharagpur- 721302, India (e-mail: [email protected]). > REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < II. STUDY AREA AND WORKFLOW A. Study Area In this study, the working dataset has been acquired from a western onshore hydrocarbon field in India. The hydrocarbon field is located at an intra-cratonic basin, spread along the western periphery of central India. It is surrounded by the Aravalli range. Deccan craton and Saurashtra craton are located in the east-west direction along the basin. Structurally, the field is located as a broad nosing feature; thus, housing the hydrocarbons between two major synclines. The hydrocarbon is present within a series of vertically stacked sandstone reservoirs individually separated by intervening shale. The average thickness of a sand layer is in the order of 5-6 m. Due to the discrete sand depositions in thin layers, imaging of the seismic data and obtaining a mapping between seismic and borehole dataset are challenging tasks. A spatial database containing seismic attributes and well logs has been acquired from the study area in .sgy and .las format respectively. The SEG-Y file format is one of the numerous standards developed by the Society of Exploration Geophysicists (SEG) for storing geophysical data [18]. The Log ASCII Standard (LAS) format has been developed by the Canadian Well Logging Society to standardize the organization of digital log curves information in 1989 [19]. As the workflow is developed on MATLAB platform, the .sgy data files are converted in .mat format (MATLAB platform compatible format) for MATLAB compatibility. Fig. 1 represents the placements of the four wells across the study area. These wells will be hereafter referred as A, B, C, and D in terms of inlines and crosslines (xlines). Additionally, well A (XXX3645, XXX7387), well B (XXX2107, XXX7285), well C (XXX2768, XXX7073), and well D (XXX0916, XXX7807) are the locations in terms of Universal Transverse Mercator (UTM) coordinates. The depth of the each well is around 3000 meter from ground, whereas the zone of interest is from 2750 meter to 2975 meter in subsurface for well A. The zone of interests are 2720 meter – 2950 meter for well B, C, and D. 150 140 Inline problem; however, the following aspects still remain unexplored:  Design of an appropriate pre-processing stage for effectiveness of machine learning algorithms  Proper choice of structure and parameters associated with selected machine learning algorithms (here, ANN model parameters- e.g. activation function type, number of hidden layers etc.)  Suitable post-processing methods for the predicted output This paper proposes a novel pre-processing scheme and demonstrates the use of the said scheme in an appropriately designed framework, consisting of three stages- pre-processing, modelling, and post-processing, to estimate sand fraction (SF) from multiple seismic attributes. Here the target variable SF represents per unit sand volume within the rock. The workflow starts with pre-processing stage, which uses three alternative approaches for target variable regularization based on Fourier Transform (FT), Wavelet Decomposition (WD), and Empirical Mode Decomposition (EMD). Next, a functional relationship between the regularized target sand fraction and the seismic attributes is calibrated using ANN. In this study, a simple network structure consisting a single hidden layer is selected over relatively complex networks. The network parameters and training algorithm are decided empirically. The results obtained, are evaluated in terms of four performance indicators– Correlation Coefficient (CC), Root Mean Square Error (RMSE), Absolute Error Mean (AEM) and Scatter Index (SI) [7]. The inclusion of the pre-processing stage in the workflow is found to produce remarkable improvement in the prediction results as opposed to use of the original sand fraction using the same ANN structure. After learning and validation, post processing is carried out to improve the prediction result over the study area. In this way, a complete workflow is devised for modelling a lithological property (here, sand fraction) from given seismic attributes. The paper is organized as follows. Section II describes the study area and the complete workflow adopted in this paper. Section III explains the pre-processing steps. Section IV illustrates the ANN model building and validation. In Section V, the post-processing is described. Finally, Section VI concludes the paper with a discussion on achievements in this study and possible future directions of research. 2 D 130 B 120 C A 110 100 250 300 350 Xline 400 450 Fig. 1. Location of four wells in the study area in terms of inlines and crosslines (xlines) The borehole dataset contains basic logs such as gamma ray, resistivity, density along with derived geo-scientific logs such as sand fraction, permeability, porosity, water saturation, etc. These well logs are treated as one dimensional signals for further processing in this study. On the other hand, the seismic dataset contains seismic impedance, amplitude, and instantaneous frequency throughout the volume. B. Workflow The systematic workflow consisting three stages e.g. preprocessing, model building–validation and post-processing is demonstrated in Fig. 2. The workflow is implemented on a 64bit MATLAB platform installed in Dell Precision M6800 with Intel® core™ i7-4700MQ CPU @2.40 GHz having 32GB RAM. The regularization approach in the pre-processing stage is highlighted using a small dotted rectangle in Fig. 2. > REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < 3 Fig. 2. The proposed workflow to model sand fraction from multiple seismic attributes Three alternative regularization methods based on FT, WD, and EMD are implemented in this study. In the model building stage, training, testing, and validation are carried out consecutively. If the validation performance does not improve as expected even after implementing either of the three regularization techniques, then the parameters associated with the selected regularization method are modified before carrying out training, testing, and validation again. This tuning is carried out using a trade-off between loss of high frequency information from target attribute and acceptable performance evaluators. The improvement in the ANN performance with the regularization technique is quantified using the performance evaluators presented in Tables-III and IV later. First, the ANN is trained with the original sand fraction as target variable without involving any pre–processing. The same procedure is repeated with the regularized sand fraction as target variable of the ANN. This is helpful to reassure the improvement in ANN performance while using the regularized target variables. The validated network is used to obtain sand fraction over the study area from the three seismic attributes. The post-processing stage includes further smoothing and filtering of the estimated output to remove unwanted predictions. III. PRE-PROCESSING Pre-processing plays a crucial role on the performance of a machine learning algorithm. In this paper, an efficient preprocessing approach is proposed as part of the adopted methodology to obtain a functional relationship between seismic attributes and lithological properties. A. Signal Reconstruction The borehole data are recorded at specific well locations along depth with a high vertical resolution. Conversely, the seismic data are collected spatially in time domain with a sampling interval of two milliseconds. Signal reconstruction is an important pre-processing step and has been discussed in existing literature. In [20], the up-scaling of an acoustic impedance log has been carried out by a wavelet transform based method as well as a geostatistical technique. The acoustic impedance log is computed from the recorded logs of the Pwave velocity and the density at the corresponding welllocation. The reconstructed acoustic impedance logs obtained from the raw impedance log by wavelet transform and geostatistical methods have turned out to be similar. In [21], the seismic attributes and well logs have been integrated to predict facies using a data-driven methodology. The complexities regarding resolution of individual datasets (seismic and well logs) and difference in the individual sampling intervals have been discussed in detail in [21]. For the present work, the well logs are converted from depth to time domain at 0.15 milliseconds sampling interval using the given velocity profile obtained from well-seismic-tie. It can be noted that the sampling intervals of the two datasets (seismic attributes and well logs) are different. Hence in order to integrate the two, the band limited seismic attributes are reconstructed at each time instant corresponding to the well logs by a sinc interpolator while adhering to the Nyquist–Shannon sampling theorem [22]. Fig. 3 shows the three seismic attributes and the sand fraction, along well A. The red dots on the seismic attributes represent their original values at time interval of two milliseconds and the green curves represent the corresponding reconstructed signals at the time instants marked on the well logs. The blue high frequency curve in Fig. 3(d) represents sand fraction along the same well. Time(ms) > REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < 2240 2240 2240 2240 2260 2260 2260 2260 2280 2280 2280 2280 2300 2300 2300 2300 2320 2320 2320 2320 2340 2340 2340 2340 2360 2360 2360 2360 2380 6 2380 0 5000 2380 10 -5000 0 Seismic 6 Seismic x 10 Impedance Amplitude 8 Reconstructed seismic attributes (a) (b) 100 200 Inst. Frequency 2380 0 0.5 Sand Fraction 1 Original seismic attributes (c) (d) Fig. 3. Seismic attributes and sand fraction along well A (The red dots on the seismic attributes are the original values, the green line is the reconstructed signal) B. Signal Regularization It can again be observed from Fig. 3 that the frequencies present in seismic signals are much lower compared to that of the sand fraction. In other words, the sand fraction carries much more information as compared to the seismic attributes. According to laws of information theory, a higher informationcarrying signal cannot be modelled using single or multiple lower information-carrying predictor signals [23]. Only a part of the target variable that is dependent on the predictor variables can be modelled. For the present case, the spatially distributed seismic attributes have low vertical resolution; whereas the high resolution borehole data are recorded at the specific well locations and carry high information content [24]. Hence, the estimation of subsurface lithological properties from seismic attributes deals with uncertainty due to the mismatch in the information content. In order to circumvent this disparity, the seismic attributes are re-sampled at each time instants corresponding to the well logs to integrate with the lithological properties. However, this re-sampling does not contribute any additional information [23]. The seismic information would not be able to successfully delineate the rock properties completely, which is a key step for RC. As no new information can be added to the seismic attributes, some amount of information has to be filtered from the high information carrying SF signal in order to calibrate a functional relationship between them. Thus, the necessity of information filtering for the SF prediction through regularization is established. In this paper, three different signal processing approaches are selected and implemented in order to filter the target signal. The parameters belonging to this stage are tuned following the changes in entropy before and after filtering along with visual inspection of the output signal with respect to that of the original target signal. The entropy has been computed from the Power Spectral Density (PSD) of the signal. The average amount of information gained from a measurement that specifies X is defined to be the entropy H ( X ) of a system. It can be formally defined as (1) H ( X )   p( xi ) log 2 p( xi ) i i th where p ( x i ) is the probability of X having the value x i in the dataset. This is known as Shannon entropy [23], [25]. If 4 A is another random variable described on the same dataset then the mutual information between the two can be expressed as (2) I ( X ; A)  H ( X )  H ( X | A) where, H ( X | A) is the conditional entropy of X after A has been observed. A reservoir property (SF for the present case) can be represented by X and seismic attribute e.g. seismic impedance can be represented by A . The statistical property of I ( X ; A ) can be interpreted as the reduction in the uncertainty of the reservoir property, due to observation of attribute A . In [26], Normalized Mutual Information (NMI) is defined as the mutual information normalized by minimum entropy of both the variables. (3) NMI ( X ; A )  I ( X ; A ) / min( H ( X ), H ( A)) In this study, the NMI computed between predictor and target signal has been used to adjust the parameters of the information filtering algorithms. Before starting the regularization, the seismic inputs and sand fraction values are normalized by Z-score and min-max methods respectively using the data from all four wells taken together. In this paper, the modelling of the target SF from the three seismic attributes is carried out by a single hidden layer ANN trained using a back propagation algorithm. The network structure and training procedure are discussed in detail in the following section. The target variable is normalized within the range of output activation function keeping some offset from limiting value of the activation function. Otherwise, the back propagation algorithm tends to drive the free network parameters to infinity. As a result, the learning process may slow down [27]. Hence, the target variables are normalized between 0.1 and 0.9 so that it does not overlap with the saturation region of the log-sigmoid function. 1) Fourier Transform (FT) The first regularization approach is based on Fourier transform (Algorithm I). Here, the spectrums of target and predictor variables are compared and higher frequency components of the target signal are truncated. Then, the target signal is reconstructed using Inverse Fourier transform (IFT). ALGORITHM I: SF regularization Based on Fourier Transform Task : Regularizing target sand fraction based on Fourier Transform Input : Predictor signal x (t ) and target signal y(t ) a) The sand fraction y(t ) extracted from a well-log by proper depth to time conversion using the given velocity profile. Let the seismic amplitude along the same well-log be x (t ) . N b) Compute Fourier Transform of x (t ) : X (k )  ( j 1)( k 1) N  x( j)ω j 1 where, ω N  e  2 πi / N is an N th root of unity N Similarly, FT of target y(t ) is computed as: Y ( k )  ( j 1)( k 1) N  y ( j )ω j 1 where, ω N  e  2 πi / N is an N th root of unity c) Compare the spectrums of target and predictor signals d) Select the bandwidth parameter ξ max Hz > REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < e) The part of the target spectrum exceeding ξ max Hz is truncated to zero. Modified Target : Ymod (k ) f) Construct regularized target signal y r ( t ) by carrying out IFT of the truncated spectrum : yr (t )  1 N N Y ( j 1)( k 1) mod ( k )ωN , where, k 1 th ω N  e  2 πi / N is an N root of unity g) Calculate entropies of predictors (seismic attributes here) as well as original and regularized target signals (sand fraction here). h) If entropy of regularized target is comparable with that of the predictor signal and the regularization result is satisfactory, then regularization is completed else go to step d). Output : Regularized target signal y r (t ) Comparison between the spectrums of the sand fraction (Fig. 4 (a)) and that of the seismic impedance (Fig. 4 (b)), reveals the presence of higher order frequencies in the former. 5 research to find the prediction capability of a given nonlinear mapping process. The original and regularized SF signals are presented in Fig. 4(c) by the blue and red curves respectively. The FT based regularization method is more sophisticated than bandpass filtering in the time domain. In order to carry out bandpass filtering, two cut-off frequencies of the ideal bandpass filter are defined beyond which all frequency components are removed. In case of ideal bandpass filters, zero phase shift is an important requirement. However, ideal bandpass filter is not realizable while working with practical datasets having finite number of samples. Moreover, in case of practical time-domain bandpass filtering, a transition takes place between the pass band and the stop band i.e. the frequency component beyond the cut-off frequencies does not diminish abruptly. In case of FT based regularization, the frequency components of the SF spectrum beyond the selected parameter range (-0.2:+0.2 Hz) are completely truncated before reconstruction of regularized SF log. Additionally, the phase shift resulting from bandpass filtering can yield lead-lag relationships between actual and filtered logs [28]. On the other hand, FT based regularization does not incur phase shift between actual and regularized logs as shown in Fig. 4(c). TABLE I ENTROPY ( IN BIT) OF PSD OF SIGNALS FOR WELL A Variables Entropy Value 0.15 Seismic Amplitude 0.16 Inst. frequency 0.12 Original SF 0.28 Regularized SF Seismic Impedance FT 0.17 WD 0.20 EMD 0.24 TABLE II NORMALIZED MUTUAL INFORMATION (NMI) AMONG PREDICTORS AND TARGET SAND FRACTION FOR WELL A Seismic Seismic Inst. Predictor Variable Impedance Amplitude Frequency Regularized SF Original Sand Fraction Fig. 4. Regularization based on FT to reconstruct target signal along Well A; (a) SF spectrum, (b) seismic impedance spectrum, and (c) superimposed plot of actual and regularized SF It can be observed from Fig. 4(b) that the spectrum of bandlimited seismic impedance diminishes beyond a certain frequency range (-0.2: +0.2 Hz). Then, the part of the sand fraction spectrum belonging to a slightly wider frequency range (green curve, Fig. 4(a)) is reconstructed to obtain the regularized target. The wider range of frequency is chosen with the assumption that ANN as a nonlinear predictor is capable of mapping input signals of lower frequencies to output signals with higher frequencies. Of course it needs an entirely different 0.12 0.11 0.09 FT 0.16 0.16 0.14 WD 0.15 0.14 0.11 EMD 0.14 0.14 0.12 As shown in Table I, the information content of the original sand fraction is higher as compared to that of the seismic predictor variables which makes it difficult to model the target (sand fraction) from predictor attributes. The regularization process decreases the information content in the sand fraction as seen in Table I. The dependency between predictor and target variables in terms of NMI (Table II) also improves as a result of regularization. 2) Wavelet Decomposition (WD) Wavelet decomposition has been extensively used in different fields of research. For example, it is applied in EEG signal for artifact removal [29], [30] and study of geomagnetic > REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < signals [31]–[33] etc. A time-frequency representation of a one dimensional non-stationary signal is obtained using wavelet analysis. Wavelets are oscillating functions localized in time and frequency [29], [34], [35]. A finite energy time domain signal can be decomposed and expressed in terms of scaled and shifted versions of a mother wavelet  ( t ) and a corresponding scaling function  ( t ) after decomposition. The scaled and shifted form of the mother wavelet  l , k (t ) and the corresponding scaling function  l , k ( t ) are mathematically represented as  l , k (t )  2l / 2 (2l t  k ), l , k  R (4) l/2 initial levels of original target signal are made zero and regularized signal is constructed by performing Inverse Discrete Wavelet Transform (IDWT) from the modified coefficients. Signal G(k) H(k) 2 2 Level 1 G(k) H(k) 2 2 l l , k (t )  2  (2 t  k ), l , k  R (5) The original signal X (t ) is first decomposed into high frequency and low frequency components using high pass and low pass filters. After each filtering step, the output time series is down-sampled by two. The low frequency part approximates the signal while the high frequency part denotes residuals between original and approximate signal. At successive levels the approximate component is further decomposed using the same set of high-pass and low-pass filters. A time domain signal X (t ) can be expressed in terms of the aforementioned mother wavelet  l , k (t ) and corresponding scaling function  l , k ( t ) at level l as X (t )   al (k )l , k (t )   dl (k ) l , k (t ) k 6 k (6) where al (k) and d l ( k ) are the approximate and detailed coefficients at level l . These coefficients are computed using filter bank approach as in [36]. Fig. 5 describes the steps of wavelet decomposition for three levels. Here, a signal is decomposed into approximate and detailed coefficients using low pass H (k ) and high pass G(k ) filters respectively. After decomposition, the coefficients can be modified. In case of signal reconstruction, the modified approximate and detailed coefficients are up sampled by two and then convolved with respective synthesis filters and then the resulting pair is summed. Finally, modified signal is acquired following l level synthesis. The performance of wavelet analysis is dependent on the mother wavelet selection and decomposition level. The Daubechies family of wavelets has a compact support with relatively more number of vanishing moments [34]. Therefore, in most of the cases different variants of Daubechies family wavelets are used for signal analysis. The initial choice for mother wavelet and decomposition level can be db4 and six respectively for this kind of study. However, the initial choice of wavelet and decomposition level can be modified if the regularization results are not satisfactory. In this paper, the choice of mother wavelet and decomposition level has been carried out empirically based on the regularization result and performance of the ANN. Algorithm II describes the steps associated with WD based regularization. Fig. 6(a)-(b) represent the results of WD–based regularization of target sand fraction with predefined wavelet type, and decomposition level. The first three detailed coefficients of original sand fraction signal are demonstrated in Fig. 6 (a). After the decomposition, detailed coefficients of Level 2 G(k) H(k) 2 2 Level 3 Fig. 5. Demonstration of wavelet decomposition of a signal for level 3 Algorithm II: SF Regularization Based on WD Task : Regularizing target SF based on Wavelet Decomposition Input : Predictor signal x (t ) and target signal y(t ) a) Same as Algorithm-I. b) Select the wavelet type and number of decomposition levels. c) Apply the procedure as in Fig. 5 to the target signal. d) Decide: detailed coefficients to be truncated for regularization e) The selected detailed coefficients are made zero. f) The regularized target signal is reconstructed from the modified coefficients. g) Calculate entropies of predictors as well as original and regularized target signals. h) If entropy of regularized target is comparable with that of the predictor signal and the regularization result is satisfactory, then regularization is completed, else go to step d). Output : Regularized target signal y r (t ) Fig. 6. Regularization based on WD to reconstruct the sand fraction along Well A; (a) decomposition result of the actual SF (d1-d3), (b) superimposed plot of actual and regularized SF For Well A, first five detailed coefficients are truncated and regularized target is reconstructed from approximate and detailed coefficients of the sixth level by IDWT. The > REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < regularization result for Well A is presented in Fig. 6 (b), where blue and red curves represent original and regularized target sand fraction signals respectively. Table I-II reveal the changes in information content of the original and regularized sand fraction by WD and increase of dependency between target and predictor variables as a result of regularization. 3) Empirical Mode Decomposition (EMD) Seismic and well log signals are non-stationary signals. Reports suggest that in most of the cases the frequency analysis of signals are carried out in selected windows with respect to a given orthogonal basis [37]–[39]. The disadvantage of basis decomposition techniques is the mismatch between signal trend and constant basis functions. These necessitate a new decomposition method, namely Empirical Mode Decomposition (EMD). EMD is an algorithmic decomposition method which decomposes the input signal into a set of Intrinsic Mode Functions (IMFs) and a residue signal [40]. There are two properties associated with IMFs such that (1) the numbers of zero–crossings and extrema present in IMFs are same, and (2) IMFs are symmetric with respect to the local mean [40]. In other words, EMD detects and extracts the highest frequency component in the signal [34], [41]–[47]; such that, in step (k+1), the extracted IMF contains lower frequency component compared to that extracted in step k. Moreover, being an adaptive data-driven method, EMD decomposes an input signal into a variable number of components. Thus, EMD overcomes the inherent limitation of deciding a priori the number of decomposition levels as in WD. Algorithm III describes the detailed steps associated with EMD based regularization of target SF. 7 g) The number of IMFs and distribution of IMFs are observed for target y(t ) and predictor x (t ) : p  n h) Decide p1 : number of IMFs truncated from the EMD of y(t ) for regularization where, p1  p i) Construct regularized target signal y r ( t ) : p1 yr (t )   imf (t )  r (t) i p i 1 j) Calculate entropies of predictors as well as original and regularized target signals. k) If entropy of regularized target is comparable with that of the predictor signal and the regularization result is satisfactory, then regularization is completed else go to step h). Output : Regularized target signal y r (t ) In Fig. 7 (a)-(b), the first four IMFs of the sand fraction log and the IMFs and residue of the decomposed seismic impedance along the Well A are plotted. Algorithm III SF Regularization Based on EMD Task : Regularizing target sand fraction based on EMD Input : Predictor signal x (t ) and target signal y(t ) a) Same as Algorithm I. b) Initialize: r0 (t )  x(t ) , i  1 c) Extract the ith IMF: i. Initialize: h0 (t )  ri (t ) , j  1 ii. Extract the local minima and maxima of h j 1 ( t ) iii. Create upper envelope emax (t ) and lower envelope emin (t ) of h j 1 ( t ) by interpolating local maxima and minima e (t )  emin (t ) iv. Calculate mean envelope: m j 1 (t )  max 2 v. h j (t )  h j 1 (t )  m j 1(t ) vi. If h j ( t ) is an IMF, then, imf i (t )  h j (t ) else go to step- (ii). with j  j  1 d) ri (t )  ri 1(t )  imfi (t ) e) If ri (t) has at least two extrema, then, go to c) with i  i  1 n else, x (t )   imf (t )  r (t ) is decomposed into n numbers of IMFs i n i 1 and residue signal. f) EMD of target signal y(t ) is carried out following steps b)-e) p y (t )   imf (t )  r (t ) i i 1 p Fig. 7. EMD–based regularization to reconstruct sand fraction signal along Well A; (a) IMF1-IMF4 of the decomposed SF, (b) IMF1-residue of the decomposed seismic impedance (c) superimposed plot of actual and regularized SF The comparison between Fig. 7 (a)-(b) reveals that the number of IMFs obtained is higher in case of target signal (sand fraction) than its predictor counterpart (seismic-impedance). The first IMF component is suppressed and the other IMFs are used to reconstruct the regularized sand fraction. The superimposed plots of actual (blue curve) and regularized sand fraction (red curve) signals are presented in Fig. 7 (c). The user decides the regularization result is satisfactory or not based on visual inspection of original and regularized target variables. The regularized target is smoother compared to original signal; > REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < nevertheless, the trend of the original signal is preserved even after information filtering based on either of the three proposed regularization methods. The number p1 is selected such that it is less than that of the decomposed IMFs of the original signal to be regularized. It is usually selected as one less than the number of decomposed IMFs of the original signal. If the regularization result is satisfactory in terms of entropy criterion and superimposed plots of actual and regularized SF, the initial p1 value is retained as in Algorithm III. Otherwise, the value of p1 is to be modified. The initial selection of p1 would be one less than the number of decomposed IMFs of the original target signal for the working datasets. Table I represents the entropies of predictor and target attributes for Well A. The improvement in mutual dependency between predictor and target variables in terms of NMI is evident from Table II. The FT is a linear transform where the frequency spectrum of a time-domain signal is obtained. Based on the comparison between the frequency spectrums of the predictor seismic impedance and target SF, the regularization parameter is selected. The result of FT based regularization changes according to the value of the selected regularization parameter. If the value of the selected regularization parameter were very small, then the regularized signal would become smooth by shedding the finer trends of the original target signal. Again, regularization with large parameter value would not carry out sufficient information filtering to enable effective modelling of the target variable. The basic assumption in FT is stationarity of a signal. However, seismic and SF signals are non-stationary. Therefore, the next two approaches based on WD and EMD are opted to cross-validate the performance of FT based regularization. The selection of the mother wavelet and the decomposition level determines the granularity of the decomposed target signal. The regularized target signal is reconstructed from the modified coefficients. These parameters (wavelet type, decomposition level, and detailed coefficients to be truncated) are finalized empirically based on the regularization result. However, in case of EMD, the number of parameters is less. Only, the number of IMFs to be used for reconstruction of the target property needs to be decided. In all the three cases, it is ensured that the regularized target signal retains the trend of the original signal. In case of FT based approach, the regularization parameter is decided based on the FT results of both the predictor as well as the target signal. The number of IMFs of the seismic attributes is less compared to those of SF in case of EMD. While in both the cases of WD and EMD based regularization, the number of detailed coefficients and IMFs are decided irrespective of the decomposition results of the predictor seismic signals. Instead these parameters are decided based on the regularization results and entropy criterion as mentioned in Algorithm II and Algorithm III respectively. IV. MODEL BUILDING AND VALIDATION In order to establish the efficacy of the proposed regularization method, the task of model building and validation stage is carried out using both the original and regularized sand fraction as target variable. The training dataset is created by aggregating 70% sample patterns from each of the wells. The training patterns are scrambled to remove any 8 possible trend along the depths. The remaining 30% samples from each of the four wells are combined and then divided into two parts to create the testing and the validation datasets. First, the network is trained using training patterns with initial parameter values. Then, the network structure and activation functions are tuned using testing patterns. The testing phase is important for evaluating the generalization capability of the trained network [11]. The network which performs satisfactorily in terms of CC, RMSE, AEM and SI is then selected for use in the validation stage. The statistical analysis of the errors involved in the model are important for proper understanding of the performance. The initial network structure is decided intuitively depending on nature of the problem and amount of available training patterns. In this study several runs of training, testing and validation of neural network structures with varying number of neurons, layers, activation functions and learning methods have been carried out to decide the best structure as well as the most effective learning algorithm. Finally in the hidden layer, hyperbolic tangent sigmoid transfer function has been used. The tangent sigmoid transfer function is an automatic choice for researchers for use in hidden layer to achieve the bi-directional swing [48], [49]. The activation function used in the output layer is log-sigmoid which is nonsymmetric in nature and facilitates faster learning rate [27]. The number of nodes in the input layer is same as the number of predictor attributes to be used to model the ANN. For example, in case of predicting sand fraction from three predictor attributes– namely, seismic impendence, instantaneous frequency and amplitude, the number of input and output nodes will be three and one respectively. Finally, a network with single hidden layer is trained using the Scaled Conjugate Gradient (SCG) Back propagation Algorithm [50]. The backpropagation learning using the SCG method is given in the Appendix. SCG proceeds in the conjugate direction of the previous step instead of following the gradient direction as in other gradient descent based algorithms. In case of the conjugate gradient algorithms, the step size can be selected by a line search without evaluating the Hessian matrix. However, the line search method is itself computationally expensive due to the evaluation of multiple error functions. Moreover, the line search deals with multiple parameters crucial for its performance. Sometimes the Hessian matrix becomes non positive definite which leads to increase in the error in weight updates due to ill conditioning in the matrix inversion. In SCG, the Hessian matrix is made positive definite. The computationally inefficient line search in every iteration is avoided using a step size scaling mechanism in SCG. Another advantage of SCG is that it does not involve any user dependent parameters. The SCG method has been used to solve problems in different research domains such as prediction of groundwater level [51], and telemarketing success [52], etc. Table II reveals that the NMIs between instantaneous frequency and SF (original/regularized) are relatively lower compared to other cases. In the first attempt, two input attributes (seismic impedance and amplitude) have been used to build the prediction model and the corresponding results are documented in Table III in terms of the performance evaluators. > REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < Though variation of instantaneous frequency is comparatively lower, it is an important attribute. Therefore, all three seismic attributes have been used as inputs to the prediction model (Table IV) in the second attempt. The performance comparison of the method of averaging and the proposed regularization procedures has been carried out. The original SF is filtered by a moving average filter with a span of nine samples, before being passed to the ANN training module. Table V represents the validation performance of the ANN in modelling the averaged SF from the seismic impedance, amplitude and instantaneous frequency. The prediction results improve in terms of performance evaluators in case of filtered SF by averaging as compared to the original SF as target. It can be observed from Table IV and Table V that the performance of the trained ANN is superior while working with the processed SF using the proposed regularization as target compared to the original and averaged SF. The results reported in Table III, Table IV, and Table V lead to the following important observations:  The performance of the trained networks is improved with the use of regularized target signals. This can be quantified in terms of higher CCs and lower error values.  In all cases, inclusion of the instantaneous frequency as the third predictor improves the prediction.  The proposed regularization technique is superior to the averaging method. Further it can be observed from Table III and Table IV that the network performance is superior in case of regularization based on WD with two predictor variables. On the other hand, with three predictors FT based regularization outperformed the other two regularization approaches in terms of performance evaluators. However, for all cases, the performance is improved while using regularized sand fraction as target instead of original log. The extent of advantage of each scheme over the others may vary among different datasets. Therefore a given scheme cannot be universally recommended. A user is provided with multiple choices among which the user can select the regularization technique that best suits with the working dataset before application of machine learning algorithm. Literature study reveals that pre-processing is an important step prior to modelling. For example, normalization, relevant attributes selection, importance sampling etc. have been part of 9 the pre-processing technique in different fields such as environmental modelling [53], chemistry [54], biomedical [55], [56], reservoir engineering [17], [57], [58]. Generally, CC values above 80%; RMSE, AEM values below 0.15 and SI value below 0.35 can be considered as good fit in such studies. If the prediction model attains the values of the respective performance indicators beyond the above mentioned limits, then the model should be retrained after adjusting associated parameters. Baziar et al. [57] has compared the performance of three machine learning techniques such as SVM, multilayer perceptron (MLP), and Co-Active Neuro-Fuzzy Inference System (CANFIS) to predict permeability from well logs. Further, the normalization has been carried out as the preprocessing technique before modelling. However, integration of seismic and borehole dataset are not required since only well logs are used as the predictor variables in [57]. The performances of the three approaches (SVM, MLP, CANFIS) have been quantified in terms of CC, average absolute error (AAE, equivalent to AEM), and mean squared error (MSE i.e. square of RMSE). The methodology used to model the original SF is almost similar to the methodology adopted for the permeability prediction using multilayer perceptron as in [57]. Comparison between the validation performance (prediction using data not part of training) reported in [57] and those achieved in this study has revealed that the regularization stage improves the prediction result in terms of CC, AEM, and RMSE. The pre-processing step involving a single ANN in [17] is similar to the case in the present paper while modelling with original SF as target. Comparison among the ANN performances with and without the regularization step reveals that the results of ANN has improved in terms of evaluators in the former case. In the case of unsatisfactory validation performance, the user may modify the ANN structures and network parameters and retrain the modified ANN. If the validation performance still does not improve, the user can modify the regularization parameters and carry out the modelling with regularized target signal. By changing the regularization parameters the information retention in the filtered/reconstructed changes e.g. by choosing a narrower bandwidth in the FT based method the well logs become smoother with a reduced entropy. Well Name A B C D TABLE III STATISTICS OF VALIDATION PERFORMANCE (TWO PREDICTORS) Original Target Sand Fraction(SF) Filtered by Fourier Filtered by EMD CC RMSE AEM SI CC RMSE AEM SI CC RMSE AEM 0.63 0.21 0.17 0.7 0.69 0.15 0.12 0.52 0.71 0.17 0.13 0.57 0.19 0.15 0.6 0.63 0.15 0.12 0.5 0.62 0.16 0.12 0.68 0.16 0.12 0.53 0.78 0.12 0.09 0.37 0.76 0.12 0.08 0.54 0.18 0.14 0.58 0.63 0.14 0.11 0.46 0.64 0.12 0.09 SI 0.64 0.49 0.37 0.41 CC 0.74 0.65 0.77 0.66 Filtered by Wavelets RMSE AEM 0.15 0.12 0.15 0.12 0.11 0.08 0.12 0.09 SI 0.53 0.5 0.36 0.39 Well Name A B C D TABLE IV STATISTICS OF VALIDATION PERFORMANCE (THREE PREDICTORS) Filtered by Fourier Filtered by EMD SI CC RMSE AEM SI CC RMSE AEM 0.62 0.94 0.07 0.05 0.23 0.92 0.09 0.06 0.56 0.86 0.09 0.07 0.30 0.88 0.09 0.06 0.45 0.91 0.07 0.05 0.24 0.87 0.08 0.06 0.49 0.83 0.1 0.07 0.33 0.80 0.09 0.06 SI 0.31 0.28 0.25 0.32 CC 0.93 0.87 0.89 0.84 Filtered by Wavelets RMSE AEM 0.08 0.06 0.10 0.08 0.08 0.05 0.08 0.06 SI 0.28 0.34 0.25 0.28 Original Target Signal CC RMSE AEM 0.76 0.17 0.13 0.65 0.17 0.13 0.76 0.14 0.11 0.68 0.15 0.12 > REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < TABLE V STATISTICS OF VALIDATION PERFORMANCE (THREE PREDICTORS, TARGET: AVERAGED SF) Filtered Sand Fraction (SF) by Averaging Well Name CC RMSE AEM SI A 0.84 0.13 0.10 0.45 B 0.77 0.14 0.10 0.44 C 0.86 0.11 0.08 0.33 D 0.73 0.13 0.10 0.43 The prediction in the entire volume along each inline and cross line has been carried out using the network selected after acceptable performance in the validation step. Fig. 8 represents the variation of the seismic amplitude at a specific inline (inline 136 containing Well D). The sand fraction variation at the same inline shown in Fig. 9 is obtained by prediction of the sand fraction over the study area from available seismic attributes using validated network parameters. The network used here for prediction has been calibrated using EMD–regularized–sand fraction as target. 10 area contained by the selected window [59], [60]. Thus, the neighborhood values of the particular pixel play an important role in the determination of the modified pixel value as a result of order filtering. In case of order statistics filtering the window size is selected to define the neighborhood around the centered pixel. Selection of window value is crucial for the degree of smoothing. The predicted sand fraction in the volume is used as input to the post-processing operation. Every element in the volume is considered as a pixel and is smoothened using 3-D median filter with respect to its neighborhood within a 3x3x3 window size. The missing values along the boundaries are ignored. In order to carry out median filtering, the values of the pixel and its neighbors within the selected window are first sorted. Then, the centered pixel value is replaced by the median value determined from the sorted pixel values. For example, in case of 3-D median filtering with a 3x3x3 window, the 14th largest value of the neighborhood replaces the pixel value at the center of the neighborhood. The SF logs over the area are predicted from seismic attributes and variation of the predicted SF at a particular inline is presented in Fig. 9. The detailing of the SF variation is revealed by the color code in Fig. 9. The smoothened SF values attained by median filtering may lose the exactness of the predicted SF logs; however, the volumetric representation of the filtered SF collectively offers better understanding of the SF variation. Fig. 10 represents the result of median filtering along inline 136. The effect of localizing different levels of sand fraction values can be observed by comparing Fig. 9 and Fig. 10. Fig. 8. Variation of the seismic amplitude at inline 136 Fig. 10. Result of 3-D median filtering with a 3x3x3 window on the predicted sand fraction variation at inline 136 Fig. 9. Variation of the predicted sand fraction at inline 136 V. POST-PROCESSING It can be observed from Fig. 8 that the variation of the seismic attributes over the study area is smooth. However, the sand fraction across the study area as shown in Fig. 9 changes abruptly. The transition of the sand fraction values should be smoother and more or less agree to the patterns of seismic data. Thereby rises the need for the post–processing stage in order to obtain a smoother sand fraction variation across the volume. To incorporate this rationale, the predicted values are filtered through a 3-D median filter. Median filter is an order statistic filter i.e. non-linear spatial filter. In case of order statistics filters, the filtered output is dependent on the ordering (ranking) of the pixels in the image Post-processing with larger window sizes (for example 5x5x5 or higher order) would further smoothen out the predicted SF volume at the cost of detailed SF variation. In our subsequent research attempts, adaptive post processing method having the potential to further improve the prediction result will be worked out. This would help in subsurface characterization. Different types of spatial filters would be experimented to observe the changes in filtered SF. Thus, the complete framework including pre-processing, learning and validation, and finally post-processing, successfully carries out mapping between seismic attributes and the sand fraction. VI. DISCUSSION AND CONCLUSION This paper brings out a complete workflow consisting of an elegant regularization step in pre-processing to enhance the > REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < learning capability of ANN in carrying out mapping between seismic attributes and lithological property (sand fraction) successfully. The improvement in mapping with introduction of the regularization step is observed from the performance analysis. The comparison among the results achieved in this work and existing literatures [17], [57] reveals the superiority of the proposed regularization step to obtain improved performance in terms of the performance evaluators. In the present study, synthetic SF logs are generated over the study area from available seismic information using the validated network parameters. After obtaining SF volume, postprocessing is carried out to improve visualization by means of median filtering. Similarly, other important petrophysical properties such as porosity, permeability can be modelled from seismic attributes following the proposed workflow. The volume-wise prediction results of SF and other petrophysical properties (i.e. porosity, permeability) enables the user to identify zones with high sand content and porosity, and higher probability of hydrocarbon presence. Thus, this study would help to identify potential drilling locations of a new well in a study area. The present work differs from the work done in [17] in terms of pre-processing stage, division of training-testing dataset, adopted machine learning technique, and post-processing algorithm. In addition the well tops and horizon information are used [17] to carry out zone wise division of the overall dataset and modular ANN is applied to model SF from multiple seismic attributes. The performance attained in [17] would be improved with the use of regularized SF log as target instead of original one. The selection of initial parameters are crucial for achieving acceptable performance of ANN. In the present work, the ANN structure and activation functions in hidden and output layers have been empirically adjusted. Also the initial values of weight and bias matrices have been chosen randomly. As a possible future extension, the domain of metaheuristic algorithms can be explored in order to automate such selections to further strengthen the framework. Additionally, while in the postprocessing stage, the use of spatial filtering has provided a significant improvement in the sand fraction variation over the study area; adaptive post–processing method can be investigated in future. APPENDIX THE BACK-PROPAGATION LEARNING OF AN ANN USING SCALED C ONJUGATE GRADIENT LEARNING The back-propagation learning of a multilayer perceptron is carried out in two phases. The synoptic weights of the network are constant and the input signal is propagated through the hidden layers to the output layer in the forward phase. The changes only take place in the activation potentials and output of the neurons [27]. In contrast, an error signal is computed as the difference between network output and actual (desired) target (response). The error signal is propagated through layers in backward direction from output layer to input layer in the backward phase. The training procedure is described in details as follows. Assume,   {x(n), d (n)}nN1 11 (7)  to be the set of training samples used for learning of a back propagation multilayer perceptron. The input vector x ( n ) is applied to the input layer nodes and the desired output vector d (n) is present at the output node to compute the error between the desired and the actual output. The forward signal is propagated from the input layer to the output layer through single or multiple hidden layers. The induced local field for neuron j in layer l can be computed from the output of neuron i in the previous layer (l  1) at iteration n i.e. yil 1 (n) and the synaptic weight wlji (n) that is connected from neuron i in ( l  1) layer and is expressed as v (jl ) (n)   w(jil ) (n) yi(l 1) (n) (8) i In case of output layer (here, l  L and L is the network depth), the output of neuron j is written as y(jL) (n)  o j (n) Therefore, the error is computed as e j ( n)  d j ( n )  o j ( n) (9) (10) The supervised learning of a multilayer ANN can be viewed as a problem of numerical optimization. The error surface of a multilayer ANN is a nonlinear function of weight vector w . Assume that, the error energy averaged over the training samples or the empirical risk be  avg . Using (10),  avg can be computed as 1 N 2   e j (n) (11) 2 N n 1 jC where, the set C contains all the neurons in the output layer. The second derivative of the cost function  avg with respect to avg  the weight vector w is called the Hessian matrix and denoted by H so that,  2 avg (12) H w2 The Hessian matrix is considered as positive definite unless mentioned otherwise. There are several algorithms to train an ANN. In case of conjugate gradient methods, the computational complexity and memory usage are large because of calculation and storage of the Hessian matrix at each stage. The indefiniteness of H is handled by a scaling coefficient k  0 in case of the scaled conjugate gradient (SCG). The other parameters r k and p k represent the search direction and the steepest descent direction respectively. Different training algorithms have been experimented to train the single layer ANN to model SF from multiple seismic attributes. Finally, the SCG algorithm is selected over other algorithms to train the ANN due to its superiority in terms of obtained performances evaluators. The steps associated with the SCG can be presented as follows [50]: > REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < Algorithm IV: Scaled Conjugate Gradient (SCG) to train a network Task: Obtain weight vector after training Input : Training dataset, weight vector, and parameters associated with training 1 and 0    104 , a) Selection of parameters: Weight vector w 1  0 . Assume, 0  1  10 4 ,  [5] [6] [7] p  r   E '(w 1 ), k  1 and success = true 1 1 b) If success = true , then compute the second-order information:    / p k [8] k  k   p )  E '( w  k )) /  s k  ( E '( w k k k [9] T  k  p k s k  k ) p 2 c) Modify  k :  k  k  (k   k [10] d) If k  0 , then make the Hessian matrix positive definite 2  k  2(k  k / pk ) 2  k  k  k p k    k [11] [12] k T   pk r k e) Evaluate step size: k  k  k /  k f) Compute the comparison parameter: [13] [14] 2  k )  E (w k    k  2  k [ E ( w k p k )] /  k g) If k  0 , then error can be reduced:  k 1  w  k   p w k k  k 1 ) r k 1   E '( w  k  0, success = true [15] [16] [17] If k mod N  0 then p  k 1  r k 1 2 else: T  k  ( r k 1  r k 1 r k ) / k p   k 1  r k 1   k p k If k  0.75 , modify the scale parameter, k  0.25k else  k  k , success = false h) If k  0.25 , increase the scale parameter 2 k  k  (k (1 k ) / pk )  k 1 as the i) Check: If the steepest descent direction r k  0, then w desired minimum. Otherwise, k  k  1 and go to b).  k 1 Output: Trained weight vector w REFERENCES [18] [19] [20] [21] [22] [23] [24] [1] [2] [3] [4] G. Álvarez, B. Sansó, R. J. Michelena, and J. R. Jiménez, “Lithologic Characterization of a Reservoir Using Continuous-Wavelet Transforms,” IEEE Trans. Geosci. Remote Sens., vol. 41, no. 1, pp. 59–65, Jan. 2003. M. Bosch, T. Mukerji, and E. F. Gonzalez, “Seismic inversion for reservoir properties combining statistical rock physics and geostatistics: A review,” Geophysics, vol. 75, no. 5, pp. 75A165–75A176, Sep. 2010. M. Ali Ahmadi, S. Zendehboudi, A. Lohi, A. Elkamel, and I. Chatzis, “Reservoir permeability prediction by neural networks combined with hybrid genetic algorithm and particle swarm optimization,” Geophys. Prospect., vol. 61, no. 3, pp. 582–598, May 2013. S. Yu, X. Guo, K. Zhu, and J. Du, “A neuro-fuzzy GA-BP method of seismic reservoir fuzzy rules extraction,” Expert Syst. with Appl., vol. 37, no. 3, pp. 2037–2042, Mar. 2010. [25] [26] [27] [28] 12 D. P. Hampson, J. S. Schuelke, and J. a. Quirein, “Use of multiattribute transforms to predict log properties from seismic data,” Geophysics, vol. 66, no. 1, pp. 220–236, Jan. 2001. P. M. Wong, A. G. Bruce, and T. T. D. Gedeon, “Confidence bounds of petrophysical predictions from conventional neural networks,” IEEE Trans. Geosci. Remote Sens., vol. 40, no. 6, pp. 1440–1444, 2002. N. Sharma and M. M. Ali, “A neural network approach to improve the vertical resolution of atmospheric temperature profiles from geostationary satellites,” IEEE Geosci. Remote Sens. Lett., vol. 10, no. 1, pp. 34–37, Jan. 2013. M. M. Ali, P. S. V. Jagadeesh, I.-I. Lin, and J.-Y. Hsu, “A neural network approach to estimate tropical cyclone heat potential in the Indian ocean,” IEEE Geosci. Remote Sens. Lett., vol. 9, no. 6, pp. 1114–1117, Nov. 2012. E. Ostlin, H.-J. Zepernick, and H. Suzuki, “Macrocell path-loss prediction using artificial neural networks,” IEEE Trans. Veh. Technol., vol. 59, no. 6, pp. 2735–2747, Jul. 2010. S. España-Boquera, M. J. Castro-Bleda, J. Gorbe-Moya, and F. ZamoraMartinez, “Improving offline handwritten text recognition with hybrid HMM/ANN models.,” IEEE Trans. Pattern Anal. Mach. Intell., vol. 33, no. 4, pp. 767–779, Apr. 2011. I. Kaastra and M. Boyd, “Designing a neural network for forecasting financial and economic time series,” Neurocomputing, vol. 10, pp. 215– 236, 1996. C. C. Fung, K. W. Wong, and H. Eren, “Modular artificial neural network for prediction of petrophysical properties from well log data,” IEEE Trans. Instrum. Meas., vol. 46, no. 6, pp. 1295–1299, Dec. 1997. P. M. Wong, T. D. Gedeon, and I. J. Taggart, “An improved technique in porosity prediction: a neural network approach,” IEEE Trans. Geosci. Remote Sens., vol. 33, no. 4, pp. 971–980, Jul. 1995. J.-S. Lim, “Reservoir properties determination using fuzzy logic and neural networks from well data in offshore Korea,” J. Pet. Sci. Eng., vol. 49, no. 3–4, pp. 182–192, Dec. 2005. M. Nikravesh and F. Aminzadeh, “Past, present and future intelligent reservoir characterization trends,” J. Pet. Sci. Eng., vol. 31, no. 2–4, pp. 67–79, Nov. 2001. M. Nikravesh and M. Hassibi, “Intelligent reservoir characterization ( IRESC),” in Proc. IEEE Int. Conference on Ind. Informatics, 2003, pp. 369–373. S. Chaki, A. K. Verma, A. Routray, W. K. Mohanty, and M. Jenamani, “Well tops guided prediction of reservoir properties using modular neural network concept: a case study from western onshore, India,” J. Pet. Sci. Eng., vol. 123, pp. 155 – 163, Jul. 2014. K. M. Barry, D. A. Cavers, and C. W. Kneale, “Report on recommended standard for digital tape formats,” Geophysics, vol. 40, no. 2, pp. 344– 352, 1975. J. R. Victorine, “Kansas Geological Survey,” http://www.kgs.ku.edu/stratigraphic/PROFILE/HELP/Help-PCSaveLASFile.html. . A. Douillard, D. Schlumberger, and O. Balz, “Upscaling well logs to seismic scale – comparison of a wavelet-transform based method with a geostatistical technique,” in Petrophysics meets Geophysics, 2000, no. November, pp. 1–9. L. Stright, A. Boucher, T. Mukherji, and R. Derksen, “Revisiting the use of seismic attributes as soft data for subseismic facies prediction: proportions versus probabilities,” Lead. Edge, vol. 28, no. 12, pp. 1460– 1679, 2009. A. V Oppenheim, R. W. Schafer, and J. R. Buck, Discrete-Time Signal Processing. Prentice Hall, 1999. T. M. Cover and J. A. Thomas, Elements of Information Theory. New York, NY, USA: John Wiley & Sons, Inc., 1991. T. Mukerji, P. Avseth, G. Mavko, I. Takahashi, and E. F. González, “Statistical rock physics: combining rock physics, information theory, and geostatistics to reduce uncertainty in seismic reservoir characterization,” Lead. Edge, vol. 20, no. 3, pp. 313–319, Mar. 2001. G. Balasis, R. Donner, S. Potirakis, J. Runge, C. Papadimitriou, I. Daglis, K. Eftaxias, and J. Kurths, “Statistical Mechanics and InformationTheoretic Perspectives on Complexity in the Earth System,” Entropy, vol. 15, no. 11, pp. 4844–4888, Nov. 2013. P. a Estévez, M. Tesmer, C. a Perez, and J. M. Zurada, “Normalized mutual information feature selection,” IEEE Trans. Neural Netw., vol. 20, no. 2, pp. 189–201, Feb. 2009. S. Haykin, Neural networks: a comprehensive foundation. New Jersey, USA: Prentice hall, 1999. H. Steehouwer and K. M. Lee, “A Zero Phase Shift Band Pass Filter,” 2012. > REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < [29] S. Kar, A. Routray, and B. P. Nayak, “Functional network changes associated with sleep deprivation and fatigue during simulated driving: validation using blood biomarkers.,” Clin. Neurophysiol., vol. 122, no. 5, pp. 966–974, May 2011. [30] A. Chaudhuri, A. Routray, and S. Kar, “Effect of sleep deprivation on estimated distributed sources for scalp EEG signals : A case study on human drivers,” in IEEE 4th Int. Conf. Intelligent Human Comput. Interaction, 2012. [31] G. Balasis, I. A. Daglis, M. Georgiou, C. Papadimitriou, and R. Haagmans, “Magnetospheric ULF wave studies in the frame of Swarm mission: a time-frequency analysis tool for automated detection of pulsations in magnetic and electric field observations,” Earth, Planets Sp., vol. 65, no. 11, pp. 1385–1398, Nov. 2013. [32] G. Balasis, I. a. Daglis, E. Zesta, C. Papadimitriou, M. Georgiou, R. Haagmans, and K. Tsinganos, “ULF wave activity during the 2003 Halloween superstorm: multipoint observations from CHAMP, Cluster and Geotail missions,” Ann. Geophys., vol. 30, no. 12, pp. 1751–1768, Dec. 2012. [33] N. Zaourar, M. Hamoudi, M. Mandea, G. Balasis, and M. Holschneider, “Wavelet-based multiscale analysis of geomagnetic disturbance,” Earth, Planets Sp., vol. 65, no. 12, pp. 1525–1540, Dec. 2013. [34] S. Mallat, A Wavelet Tour of Signal Processing, 2nd Ed. New York, NY, USA: Academic Press, 1999. [35] I. Daubechies, “The wavelet transform, time-frequency localization and signal analysis,” IEEE Trans. Inf. Theory, vol. 36, no. 5, pp. 961–1005, Sep. 1990. [36] O. Rioul and M. Vetterli, “Wavelets and Signal Processing,” IEEE Signal Processing Mag., pp. 14–38, 1991. [37] L. Cohen, Time-frequency analysis theory and applications. Prentice Hall, 1995. [38] P. Flandrin, Temps-frequence. Hermes, 1993. [39] I. Daubechies, Ten lectures on wavelets. SIAM, 1992. [40] I. Magrin-chagnolleau and R. G. Baraniuk, “Empirical mode decomposition based time-frequency attributes,” in 69th Annual International Meeting, SEG, Expanded Abstracts, 1999, pp. 1949–1953. [41] N. E. Huang, Z. Shen, S. R. Long, M. C. Wu, H. H. Shih, Q. Zheng, N.C. Yen, C. C. Tung, and H. H. Liu, “The empirical mode decomposition and the Hilbert spectrum for non-linear and non-stationary time series analysis,” in Proc. R. Soc. London. Ser. A Math. Phys. Eng. Sci., vol. 454, no. 1971, pp. 903–995, 1998. [42] D. Labate, F. La Foresta, G. Occhiuto, F. C. Morabito, A. Lay-ekuakille, and P. Vergallo, “Empirical Mode Decomposition vs . Wavelet Decomposition for the Extraction of Respiratory Signal from SingleChannel ECG : A Comparison,” IEEE Sensors J., vol. 13, no. 7, pp. 2666– 2674, Jul. 2013. [43] N. Mammone, F. La Foresta, F. C. Morabito, and S. Member, “Automatic artifact rejection from multichannel scalp EEG by wavelet ICA,” IEEE Sensors J., vol. 12, no. 3, pp. 533–542, Mar. 2012. [44] D. B. Perciva and A. T. Walden, Wavelet Methods for Time Series Analysis. U.K.: Cambridge Univ. Press, 2000. [45] N. ur Rehman and D. P. Mandic, “Filter Bank Property of Multivariate Empirical Mode Decomposition,” IEEE Trans. Signal Process., vol. 59, no. 5, pp. 2421–2426, May 2011. [46] N. Rehman and D. P. Mandic, “Multivariate empirical mode decomposition,” Proc. R. Soc. London. Ser. A Math. Phys. Eng. Sci., vol. 466, no. 2117, pp. 1291–1302, 2010. [47] C. D. Blakely, A Fast Empirical Mode Decomposition Technique for Nonstationary Nonlinear Time Series, New York, NY, USA: Elsevier, 2005. [48] B. L. Kalman and S. C. Kwasny, “Why Tanh : chossing a sigmoidal function,” in Int. Joint Conf. on Neural Networks, 1992, vol. 4, pp. 578– 581. [49] M. Leshno, V. Y. Lin, A. Pinkus, and S. Schocken, “Multilayer feedforward networks with a nonpolynomial activation function can approximate any function,” Neural Networks, vol. 6, pp. 861–867, 1993. [50] M. F. Moller, “A scaled conjugate gradient algorithm for fast supervised learning,” Neural Networks, vol. 6, pp. 525–533, 1993. [51] S. Maiti and R. K. Tiwari, “A comparative study of artificial neural networks, Bayesian neural networks and adaptive neuro-fuzzy inference system in groundwater level prediction,” Environ. Earth Sci., vol. 71, no. 7, pp. 3147 –3160, 2014. [52] S. Moro, P. Cortez, and P. Rita, “A data-driven approach to predict the success of bank telemarketing,” Decis. Support Syst., vol. 62, pp. 22–31, 2014. 13 [53] H. R. Maier and G. C. Dandy, “Neural networks for the prediction and forecasting of water resources variables : a review of modelling issues and applications,” Environ. Model. Softw., vol. 15, pp. 101–124, 2000. [54] Å. Rinnan, F. Van Den Berg, and S. B. Engelsen, “Review of the most common pre-processing techniques for near-infrared spectra,” Trends Anal. Chem., vol. 28, no. 10, pp. 1201–1222, Nov. 2009. [55] A. Smolinska, A.-C. Hauschild, R. R. R. Fijten, J. W. Dallinga, J. Baumbach, and F. J. van Schooten, “Current breathomics--a review on data pre-processing techniques and machine learning in metabolomics breath analysis.,” J. Breath Res., vol. 8, no. 2, p. 027105, Jun. 2014. [56] M. Rathi and C. Gupta, “An approach to predict breast cancer and drug suggestion using machine learning techniques,” ACEEE Int. J. Inf. Technol., vol. 4, no. 1, pp. 23 – 31, 2014. [57] S. Baziar, M. Tadayoni, M. Nabi-Bidhendi, and M. Khalili, “Prediction of permeability in a tight gas reservoir by using three soft computing approaches: A comparative study,” J Nat. Gas Sci. Eng., vol. 21, pp. 718– 724, Nov. 2014. [58] S. Chaki, A. K. Verma, A. Routray, W. K. Mohanty, and M. Jenamani, “A one-class classification framework using SVDD : application to an imbalanced geological dataset,” in Proc. IEEE Students’ Technology Symp. (TechSym), 2014, pp. 76–81. [59] R. Gonzalez and R. Woods, Digital image processing, Second. New Jersey, USA: Prentice hall, 2002. [60] T. S. Huang, G. J. Yang, and G. Y. Tang, “A Fast Two-Dimensional Median Filtering Algorithm,” IEEE Trans. Acoust., Speech, Signal Process., vol. ASSP-27, no. 1, pp. 13–18, Feb. 1979. Soumi Chaki (S’2014) received the B.E. degree from IIEST Shibpur (formerly BESU, Shibpur), India in 2010. She is currently working toward the M.S. degree in Electrical Engineering from Indian Institute of Technology Kharagpur in India. Her research interests include signal processing, machine learning algorithms. Aurobinda Routray (M’2012) is a Professor with the Department of Electrical Engineering, IIT Kharagpur in India. His research interests include nonlinear and statistical signal processing, real-time and embedded signal processing, numerical lineal algebra and data-driven diagnostics. William K. Mohanty is a Professor with the Department of Geology and Geophysics, IIT Kharagpur in India. His research interests include seismology, reservoir characterization.
5cs.CE
LOVÁSZ-SAKS-SCHRIJVER IDEALS AND COORDINATE SECTIONS OF DETERMINANTAL VARIETIES arXiv:1801.07916v1 [math.AC] 24 Jan 2018 ALDO CONCA AND VOLKMAR WELKER Abstract. Motivated by questions in algebra and combinatorics we study two ideals associated to a simple graph G: • the Lovász-Saks-Schrijver ideal defining the d-dimensional orthogonal representations of the graph complementary to G and • the determinantal ideal of the (d + 1)-minors of a generic symmetric with 0s in positions prescribed by the graph G. In characteristic 0 these two ideals turn out to be closely related and algebraic properties such as being radical, prime or a complete intersection transfer from the Lovász-Saks-Schrijver ideal to the determinantal ideal. For Lovász-Saks-Schrijver ideals we link these properties to combinatorial properties of G and show that they always hold for d large enough. For specific classes of graphs, such a forests, we can give a complete picture and classify the radical, prime and complete intersection Lovász-Saks-Schrijver ideals. Introduction Let k be a field, n ≥ 1 be an integer and set [n] := {1, . . . , n}. For a simple graph G = ([n], E) with vertex set [n] and edge set E we study the following two classes of ideals associated to G. • Lovász-Saks-Schrijver ideals: For an integer d ≥ 1 we consider the polynomial ring k[yi,` | i ∈ [n], ` ∈ [d]]. For every  edge e = {i, j} ∈ [n] we set 2 fe(d) = d X yi` yj` . `=1 The ideal LkG (d) = ( fe(d) | e ∈ E ) ⊆ k[yi,` | i ∈ [n], ` ∈ [d]] is called the Lovász-Saks-Schrijver ideal, LSS-ideal for short, of G with respect to k. The ideal LkG (d) defines the variety of orthogonal representations of the graph complementary to G (see [28, 27]). • Coordinate sections of generic (symmetric) determinantal ideals: Consider the polynomial ring k[xij | 1 ≤ i ≤ j ≤ n] and let X be the generic n × n symmetric matrix, that is, the (i, j)-th entry of X is xij if i ≤ j and xji if i > j. Let sym XG be the matrix obtained from X by replacing the entries in positions (i, j) and (j, i) sym for {i, j} ∈ E with 0. For an integer d let Idk (XG ) ⊆ k[xij | 1 ≤ i ≤ j ≤ n] be the ideal sym sym k of d-minors of XG . The ideal Id (XG ) defines a coordinate hyperplane section of the generic symmetric determinantal variety. Similarly, we consider ideals defining coordinate hyperplane sections of the generic determinantal varieties and the generic skew-symmetric Pfaffian varieties. sym k We observe in Section 7 that the ideal Id+1 (XG ) and the ideal LkG (d) are closely related. Indeed, if k has characteristic 0 classical results from invariant theory can be employed to show sym k that Id+1 (XG ) is radical (resp. is prime, resp. has the expected height) provided LkG (d) is Date: January 25, 2018. 2010 Mathematics Subject Classification. Primary . Key words and phrases. The work on this paper was partly supported by a DAAD Vigoni project and by INdAM. 1 2 A. CONCA AND V. WELKER radical (resp. is prime, resp. is a complete intersection). We also exhibit similar relations between variants of LkG (d) and ideals defining coordinate sections of determinantal and Pfaffian ideals. These facts turn the focus on algebraic properties of the LSS-ideals LkG (d). In particular, we analyze the questions: when is LkG (d) a radical ideal? when is it a complete intersection? when is it a prime ideal? We show that for d large enough all three properties hold for LkG (d). Among others, we are able to give necessary conditions that lead to a full classification of graphs for which LkG (d) is a complete intersection or prime in case of small d. In characteristic 0 we deduce sym k sufficient conditions for Id+1 (XG ) to be radical, prime or of expected height. To our knowledge coordinate sections of determinantal varieties have been systematically studied only in the case of maximal minors, for example the results in [5, 17, 18]. The study of the properties of LSS-ideals has its roots in the work Lovász on orthogonal graph embeddings (see [27] for references, motivation and an overview) and we think it is interesting in its own. An orthogonal embedding of a graph G in Rd is a map φ : V → Rd where φ(i) ⊥ φ(j) if {i, j} is an edge in the edge set Ē of the graph Ḡ complementary to G. Thus by definition the real variety associated to the LSS-ideal LRḠ (d) of the complementary graph Ḡ coincides with the set of all orthogonal graph embeddings of G in Rd . Note that the variety includes degenerate embeddings that are not injective or send vertices to the zero vector. Since the geometry of the variety of orthogonal graph embeddings was first studied in [28] the ideals LkG (d) carry the name Lovász-Saks-Schrijver ideals. Indeed, many of our algebraic results are inspired by results from [27, 28] about the geometry of the real variety of (general position) orthogonal embeddings. For d = 1, 2 LSS-ideals are well understood objects. For d = 1 the LSS-ideal LkG (1) is called edge ideal of the graph G. As a squarefree monomial ideal it is clearly a radical ideal with respect to every field. It is prime only when E is empty and a complete intersection if and only if G is a matching, i.e. any two edges in E have empty intersection. Starting from d = 2 the properties of being radical, prime and complete intersection become more subtle. For the results in this case see [22]. For d > 2 we know of no general results beyond the ones described in Section 2. In Section 1.2 we generalize LSS-ideals to hypergraphs. We are able to state a few of the results from Section 2 in this generality. But most questions on hypergraph LSS-ideals remain unanswered. Nevertheless, extending the link between LSS-ideals for graphs and ideals of minors, hypergraph LSS-ideals for uniform hypergraphs can be related to the closure of the space of symmetric tensors of bounded rank with prescribed 0s in the their expansion in the standard basis (see Proposition 8.10). The paper is organized as follows. In Section 1 we introduce basic concepts and notation from graph theory and Gröbner bases theory. Then in Section 2 we formulate our main results on LSSideals and sketch some of the proofs. In Section 3 we provide the proofs for the results showing persistence of the properties complete intersection and primeness. In particular, it follows that for fixed d there are graphs which are minimal obstructions to these properties. In Section 4 we exhibit some of these obstructions and prove their necessity. For small d we give complete characterizations of graphs with prime or complete intersection LSS-ideals. In Section 5 we define a new combinatorial invariant for graphs. We use it to prove that LkG (d) is radical, complete intersection or prime for d large enough. In Section 6 we define our notation for ideals of minors and Pfaffians of generic matrices and recall classical results about their relation to invariant theory. Then in Section 7 we use this connection to invariant theory to prove that if LkG (d) is radical or prime then same property hold for the ideal of (d + 1) minors of generic matrices with positions of 0s prescribed by a graph G. In addition, we give obstructions on G preventing the corresponding ideals of minors to be prime. Finally, in Section 8 we pose questions and state open problems. 1. Notations and generalities 1.1. Graph and Hypergraph Theory. In the following we introduce graph theory notation. We mostly follow the conventions from [12]. For us a graph G = (V, E) is a simple graph on a  finite vertex set V . In particular, E is a subset of the set of 2-element subsets V2 of V . In most of the cases we assume that V = [n] := {1, . . . , n}. A subgraph of a graph G = (V, E) is a graph G0 = (V, E 0 ) such that E 0 ⊆ E. More generally, a hypergraph H = (V, E) is a pair consisting LSS-IDEALS AND COORDINATE SECTIONS 3 of a finite set of vertices V and a set E of subsets of V . We are only interested in the situation when the sets in E are inclusionwise incomparable. Such a set of subsets is called a clutter. In particular, if G = (V, E) is a graph then G is a hypergraph and E is a clutter. For d, m, n > 0 we will use the following notations:  • Kn denotes the complete graph on n vertices ([n], [n] 2 ), • Km,n denotes the complete bipartite graph ([m] ∪ [ñ], {{i, j̃} : i ∈ [m], j̃ ∈ [ñ] } with bipartition [m] and [ñ] = {1̃, . . . , ñ}. • Bn denotes the subgraph of Kn,n obtained by removing the edges {i, ĩ} with i = 1, . . . , n. • For n > 2 we denote by Cn the n-cycle, i.e. the subgraph of Kn with edges {1, 2}, {2, 3}, . . . , {n − 1, n}, {n, 1}. • For n > 1 we denote by Pn the path of length n − 1, i.e. the subgraph of Kn with edges {1, 2}, {2, 3}, . . . , {n − 1, n}.  We denote by Ḡ = (V, Ē) with Ē = V2 \ E the graph complementary to G = (V, E). Let W ⊆ V . We write GW = (W, {e ∈ E : e ⊆ W }) for the graph induced by G on vertex set W and G − W for the subgraph induced by G on V \ W . In case W = {v} for some v ∈ V we simply write G − v for G − {v}. A graph G = (V, E) on a vertex set V of size ≥ k + 1 is called k-(vertex)connected if for every W ⊂ V with |W | = k − 1 the graph G − W is connected. By deg(v) := {e ∈ E | v ∈ e} we denote the degree of the vertex v and by ∆(G) = maxv∈V deg(v) the maximal degree of a vertex in G. Clearly, if G is k-connected then every vertex has degree at least k and ∆(Ḡ) ≤ n − k − 1, where n = |V |. Finally, we denote by ω(G) the clique number of G, i.e. the largest a such that G contains a copy of a complete subgraph Ka . The following well known fact follows directly from the definitions. Lemma 1.1. Given a graph G = ([n], E) and an integer 1 ≤ d ≤ n the following conditions are equivalent: (1) Ḡ is (n − d)-connected. (2) G does not contain a subgraph Ka,b with a + b = d + 1. 1.2. Basics on LSS-ideals and their generalization to hypergraphs. Let H = (V, E) be a hypergraph. We define for e ∈ E d Y X fe(d) = yi` . `=1 i∈e If E is a clutter we call the ideal LkH (d) = ( fe(d) | e ∈ E ) ⊆ k[yi,` | i ∈ [n], ` ∈ [d]] the LSS-ideal of the hypergraph H. It will sometimes be useful to consider LkH (d) as a multigraded ideal. For that we equip k[yi,` | (i, `) ∈ [n] × [d]] with the multigrading induced by deg(yi,` ) = ei for the i-th unit vector ei P (d) in Zn and (i, `) ∈ V × [d]. Clearly, for e ∈ E the polynomial fe is multigraded of degree i∈e ei . In particular, LkH (d) is Zn -multigraded. The following remark is an immediate consequence of (d) (d) the fact that if E is a clutter the two polynomials fe and fe0 corresponding to distinct edges e, e0 ∈ E have incomparable multidegrees. (d) Remark 1.2. Let H = ([n], E) be a hypergraph such that E is clutter. The generators fe , e ∈ E, of LkH (d) form a minimal system of generators. In particular, LkH (d) is a complete intersection if (d) and only if the polynomials fe , e ∈ E, form a regular sequence. The following alternative description of LkG (d) for a graph G turns out to be helpful in some places. Remark 1.3. Let G = ([n], E) be a graph. Consider the n × d matrix Y = (yi,` ). Then LkG (d) is the ideal generated by the entries of the matrix Y Y T in positions (i, j) with {i, j} ∈ E. Here Y T denotes the transpose of Y . 4 A. CONCA AND V. WELKER Similarly, for a bipartite graph G, say a subgraph of Km,n , one considers two sets of variables yij with (i, j) ∈ [m] × [d], yĩj with (i, j) ∈ [ñ] × [d] and the matrices Y = (yij ) and Ye = (yĩj ). Then LkG (d) coincides with the ideal generated by the entries of the product matrix Y Ye T . in positions (i, j) for {i, j̃} ∈ E 1.3. Gröbner Bases. We use the following notations and facts from Gröbner bases theory, see for example [4] for proofs and details. Consider the polynomial ring k[yij | (i, j) ∈ [n] × [d]]. For a vector w = (wij )(i,j)∈[n]×[d] ∈ Rnd and a polynomial X f (y) = aα yα α∈N[n]×[d] we set mw (f ) = maxaα 6=0 {α · w} and inw (f ) = X aα · yα . α·w=mw (f ) The latter is called the initial term of f with respect to w. For a fixed term order ≺ and w ∈ R[n]×[d] we set yα ≺ω yβ if and only if either α · w < β · w or α · w = β · w and yα ≺ yβ . The following will allows us to deduce properties of ideals from properties of their initial ideals. Proposition 1.4. Let I be a homogeneous ideal in the polynomial ring S, ≺ a term order on S and w ∈ Rnd . If in≺ (I) or inw (I) is radical (resp. a complete intersection, prime) then so is I. Moreover, if for generators f1 , . . . , fr of I the initial terms in≺ (f1 ), . . . , in≺ (fr ) (resp. inw (f1 ), . . . , inw (fr )) form a regular sequence then f1 , . . . , fr form a regular sequence and are a Gröbner basis for I. 2. Results and counterexamples for Lovász-Saks-Schrijver ideals For the first part of this section let G = (V, E) be a graph. We start by studying radicality of LkG (d). As mentioned in the Introduction LkG (1) is always radical for trivial reasons. For d = 2 the following result from [22] gives a complete answer. Theorem 2.1 (Thm. 1.1 [22]). Let G = ([n], E) be a graph. If char k 6= 2 then the ideal LkG (2) is radical. If char k = 2 then LkG (2) is radical if and only if G is bipartite. The next examples show that LkG (3) need not be radical. In the examples we assume that k has characteristic 0 but we consider it very likely that the ideals are not radical over any field. A quick criterion implying that an ideal J in a polynomial ring S is not radical is to identify an element g ∈ S such that J : g 6= J : g 2 . We call such a g a witness (of the fact that J is not radical). Of course the potential witnesses must be sought among the elements that are somehow “closely related” to J. Alternatively, one can try to compute the radical of J or even its primary decomposition directly and read off whether J is radical. But these direct computations are extremely time consuming for LSS-ideals and did not terminate on our computers in the examples below. Nevertheless, in all examples we have quickly identified witnesses. Example 2.2. We present three examples of graphs G such that LkG (3) is not radical over any field k of characteristic 0. The first example has 6 vertices and 9 edges and it is the smallest example we have found (both in terms of edges and vertices). The second example has 7 vertices and 10 edges and it is a complete intersection. This shows that LkG (3) can be a complete intersection without being radical. The third example is bipartite, a subgraph of K5,4 with 12 edges, and is the smallest bipartite example we have found. In all cases, since the LSS-ideal LkG (3) has integral coefficients, we may assume that k = Q and exhibit a witness g, i.e. a polynomial g such that LkG (3) : g 6= LkG (3) : g 2 . The latter inequality can be checked with the help of CoCoA [1] or Macaulay 2 [19]. (1) Let G be the graph with 6 vertices and 9 edges depicted in Figure 1(1), i.e. with edges E = {{1, 2}, {1, 3}, {1, 4}, {1, 5}, {2, 3}, {2, 4}, {2, 6}, {3, 5}, {4, 6}}. LSS-IDEALS AND COORDINATE SECTIONS 1 2 5 1 6 4 3 (1) 2 5 6 5 1 2 3 4 5 7 4 3 1̃ (2) 2̃ 3̃ 4̃ (3) Figure 1. Graphs G with non-radical LkG (3) Here the witness can be chosen as follows. Denote by Y = (yij ) a generic 6 × 3 T matrix. As discussed in Remark 1.3 the ideal LQ G (3) is generated by the entries of Y Y corresponding to the positions in E. Now g can be taken as the 3-minor of Y with row indices 1, 5, 6. (2) Let G be the graph with 7 vertices and 10 edges depicted in Figure 1(2), i.e. with edges E = {{1, 2}, {1, 4}, {1, 5}, {2, 3}, {2, 7}, {3, 4}, {3, 7}, {4, 5}, {5, 6}, {6, 7}}. Here the witness can be chosen as follows. Denote by Y = (yij ) a generic 7 × 3 matrix. T Again as discussed in Remark 1.3 the ideal LQ G (3) is generated by the entries of Y Y corresponding to the positions in E. Now g can be taken as the 3-minor of Y with row indices 1, 2, 4. The fact that LQ G (3) is a complete intersection can be checked quickly with CoCoA [1] or Macaulay 2 [19]. (3) Let G be the subgraph of the complete bipartite graph K5,4 depicted in Figure 1(3), i.e. with edges E = {{1, 1̃}, {1, 2̃}, {1, 3̃}, {1, 4̃}, {2, 1̃}, {2, 2̃}, {3, 2̃}, {3, 3̃}, {4, 3̃}, {4, 4̃}, {5, 1̃}, {5, 4̃}}. Denote by X = (xij ) a generic 5 × 3 matrix and by Y = (yij ) a generic 3 × 4 matrix. As explained in Remark 1.3 the ideal LQ G (3) is generated by the entries of XY corresponding to the positions in E. Now the witness g can be taken to be the 3-minor of X corresponding to the column indices 1, 2, 4. The following result shows that the properties complete intersection and prime for LkG (d) are closely linked and persist once they occur. Theorem 2.3. Let G = ([n], E) be a graph. Then: (1) If LkG (d) is prime then LkG (d) is a complete intersection. (2) If LkG (d) is a complete intersection then LkG (d + 1) is prime. (3) If LkG (d) is prime then LkG (d + 1) is prime. (4) If LkG (d) is a complete intersection then LkG (d + 1) is a complete intersection. (5) If LkG (d) is a complete intersection then LkG0 (d) is a complete intersection for every subgraph G0 of G. (6) If LkG (d) is a prime then LkG0 (d) is prime for every subgraph G0 of G. The proof of the theorem consists of several steps that we first briefly sketch and then present in full detail in Section 3. Sketch of the proof. To prove (1) and (2) we interpret LkG (d) as the defining ideal of the symmetric algebra of a module over the quotient of the polynomial ring by LkG−n (d). Then we show that the statement follows by induction on n employing a result of Avramov [2, Prop. 3] characterizing complete intersection symmetric algebras and a result of Huneke [24, Thm 1.1] characterizing symmetric algebras that are domains. 6 A. CONCA AND V. WELKER To prove (3) and (4) we consider the vector v = (vij )(i,j)∈[n]×[d+1] ∈ Rn(d+1) with entries vij = 1 (d+1) (d) if (i, j) ∈ [n] × [d] and vi,d+1 = 0 for every i ∈ [n]. Observe that inv (fe ) = fe for all e ∈ E. Therefore, inv (LkG (d + 1)) ⊆ LkG (d). Either LkG (d) is a complete intersection by assumption or by (1) in case the assumption is that LkG (d) is prime. This implies that inv (LkG (d+1)) = LkG (d). Then the assertions follow by the transfer of properties from inv (J) to J as recalled in Proposition 1.4. Assertion (5) is obvious. For (6) one observes that by (1) LkG (d) is also a complete intersection. It is a general fact that if a regular sequence of homogeneous polynomials generates a prime ideal then so does every subsequence.  Remark 2.4. There is no persistence result for the property of being radical. Indeed, we already have seen that LkG (1) is always radical and LkG (2) is always radical in case char k 6= 2. On the other hand Example 2.2 gives examples of a non-radical LkG (3). Simple examples also show that radicality is not inherited by subgraphs. On the other hand radicality is inherited by induced subgraphs. This follows from the fact that for every subset W ⊆ V one has LkGW (d) = LkG (d) ∩ k[yij : i ∈ W, j ∈ [d]]. as can be checked using the multigraded structure. We will now see that LkG (d) is a complete intersection and prime (and hence radical) for d large enough. We prove this fact in Section 5. Indeed, more generally we show that for d  1 and a hypergraph H = (V, E), where E is a clutter, the hypergraph LSS-ideals LkH (d) is radical and a complete intersection. As a vehicle we define a purely (hyper)graph theoretic invariant pmd(H) ∈ N called the positive matching decomposition of H and show the following. Theorem 2.5. Let H = (V, E) be a hypergraph for a clutter E. Then: (1) For all d ≥ pmd(H) the ideal LkH (d) has a radical complete intersection initial ideal. (2) For all d ≥ pmd(H) the ideal LkH (d) is a radical complete intersection. (3) If G = (V, E) is graph then for all d ≥ pmd(G) + 1 the ideal LkG (d) is prime. (4) If G = (V, E) is a graph then pmd(G) ≤ min{2|V |−3, |E|} Furthermore, if G is a bipartite graph then pmd(G) ≤ min{|V | − 1, |E|}. The proof of the theorem consists of several steps that we first briefly sketch and then present in full details in Section 5. Sketch of the proof. We show that for every d ≥ pmd(G) there exists a vector v = (vij )(i,j)∈[n]×[d] ∈ (d) Rnd such that the set {inv (fe ) : e ∈ E} consists of pairwise coprime monomials. It follows that (d) inv (LkG (d)) = (inv (fe ) : e ∈ E) and hence inv (LkG (d)) is radical and a complete intersection. This complete the proof of (1). By Proposition 1.4 then (2) is implied. Therefore, in the graph case Theorem 2.3(2) implies (3). The claim (4) is derived by simple estimates using the combinatorial structure of the graph.  For complete graphs G = Kn and char k = 0 we provide asymptotic (in terms of n) results on Kn when LG (d) is radical, complete intersection or prime in Proposition 7.6 and Corollary 7.7 using sym k n the transfer of properties from LK G (d) to Id+1 (XG ) and bounds derived using Gröbner basis arguments in Corollary 5.5. For the case of complete bipartite graphs Km,n results by De Concini and Strickland [13] or Musili and Seshadri [31] imply (1)-(3) of the following theorem. Theorem 2.6. Let G = Km,n . Then: (1) LkG (d) is radical for every d. (2) LkG (d) is a complete intersection if and only if d ≥ m + n − 1. (3) LkG (d) is prime if and only if d ≥ m + n. (4) pmd(G) = m + n − 1. LSS-IDEALS AND COORDINATE SECTIONS 7 Proof. Taking into account Remark 1.3, the assertions (1), (2), and (3) follow form general results on the variety of complexes proved from [13] and, with different techniques, from [31]. It has been observed by Tchernev [33] that the assertions in [13] that refer to the so-called Hodge algebra structure of the variety of complexes in [13] are not correct. However, those assertions can be replaced with statements concerning Gröbner bases as it is done, for example, in a similar case in [33]. Hence, (1),(2) and (3) can still be deduced from the arguments in [13]. Alternative proofs of (2) and (3) are given also in Section 4. Assertion (4) is proved in Section 5.  Seeing Theorem 2.6(2) and (3) one may wonder if the assertion (2) in Theorem 2.3 can be reversed. The next example shows that in general this is not the case: Example 2.7. Let G = Cn be the n-cycle. If n is even and n 6= 4 then the ideal LkG (d) is prime if and only if it is a complete intersection if and only if d ≥ 3. These assertions are special cases of the subsequent Theorem 2.9. In view of Theorem 2.3 for fixed d and k the graphs G for which LkG (d) is a complete intersection or prime define (downward) monotone graph properties. Thus by persistence there are graphs G and numbers d such that LkG (d) is not prime, LkG0 (d) is prime for each proper subgraph G0 of G and LkG (d + 1) is prime. Such a pair G and d can be considered as a “minimal obstruction” to primeness. Similarly, we have minimal obstructions to being a complete intersection. The next results are first steps towards a classification of minimal obstructions. The results are partly inspired by theorems from Lovász’s book [27, Ch. 9.4]. Proposition 2.8. Let G = ([n], E). Then we have: (1) If LkG (d) is prime then G does not contain a subgraph isomorphic to Ka,b with a+b = d+1, i.e. Ḡ is (n − d)-connected. Furthermore, if d > 3 and char k = 0 then G does not contain a subgraph isomorphic to Bd . (2) If LkG (d) is a complete intersection then G does not contain a subgraph isomorphic to Ka,b with a + b = d + 2, i.e. Ḡ is (n − d + 1)-connected. Furthermore, if d > 2 and char k = 0 then G does not contain a subgraph isomorphic to Bd+1 . Further obstructions are derived from Proposition 7.6 in Corollary 7.8. For example, in characteristic 0, if LkG (6) is prime then G cannot contain K6 . But for small values of d the implications of Proposition 2.8 are actually equivalences. Theorem 2.9. Let G be a graph. (1) For d ≤ 3 then the following are equivalent: (a) LkG (d) is prime. (b) G does not contain a subgraph isomorphic to Ka,b with a + b = d + 1. (c) Ḡ is (n − d)-connected. (2) For d ≤ 2 the following conditions are equivalent: (a) LkG (d) is a complete intersection (b) G does not contain a subgraph Ka,b with a + b = d + 2 and when d = 2 the graph G does not contain an even cycle. (c) Ḡ is (n − d + 1)-connected and when d = 2 the graph G does not contain an even cycle. For forests (i.e. graphs without cycles) we can give a quite complete picture. Theorem 2.10. (1) LkG (d) is (2) LkG (d) is (3) LkG (d) is Let G be a forest and k any field. Then: radical for all d. a complete intersection if and only if d ≥ ∆(G). prime if and only if d ≥ ∆(G) + 1. The main tool in the proof of Theorem 2.10 is the notion of Cartwright-Sturmfels ideals developed in [9, 10, 11] and inspired by [7, 8]. Indeed it turns out that for a forest G the ideal LkG (d) is a Cartwright-Sturmfels ideal. 8 A. CONCA AND V. WELKER 3. Stabilization of algebraic properties of LkG (d) In this section we prove Theorem 2.3 and state some of its consequences. Before embarking in the proofs we need to recall important results on properties of the symmetric algebra of a module. We will state the results in the way that suit our needs best. Recall that, given a ring R and an R-module M presented as the cokernel of an R-linear map f : Rm → Rn the symmetric algebra SymR (M ) of M is (isomorphic to) the quotient of SymR (Rn ) = R[x1 , . . . , xn ] by the ideal J generated by the entries of A (x1 , . . . , xn )T where A is the m×n matrix representing f . Vice versa every quotient of R[x1 , . . . , xn ] by an ideal J generated by homogeneous elements of degree 1 in the xi ’s is the symmetric algebra of an R-module. Part (1) of the following is a special case of [2, Prop. 3] and part (2) a special case of [24, Thm 1.1]. Here and in the rest of the paper we denote for a matrix A with entries in a ring R and a number t by It (A) the ideal generated by the t-minors of A in R. Theorem 3.1. Let R be a complete intersection. Then (1) SymR (M ) is a complete intersection if and only if height It (A) ≥ m − t + 1 for all t = 1, . . . , m. (2) SymR (M ) is a domain and Im (A) 6= 0 if and only if R is a domain, and height It (A) ≥ m − t + 2 for all t = 1, . . . , m. The equivalent conditions of (2) imply those of (1). Remark 3.2. Let G = ([n], E) be a graph. The (multigraded) ideal LkG (d) ⊆ S = k[yi,j : i ∈ [n], j ∈ [d]] is generated by elements that have degree at most one in each block of variables. Hence LkG (d) can be seen as an ideal defining a symmetric algebra in various ways. For example, set G1 = G − n, U = {i ∈ [n − 1]|{i, n} ∈ E}, u = |U |, S 0 = k[yi,j : i ∈ [n − 1], j ∈ [d]] and R = S 0 /LkG1 (d). Then S/LkG (d) is the symmetric algebra of the cokernel of the R-linear map Ru → Rd associated to the u × d matrix A = (yij ) with i ∈ U and j = 1, . . . , d. Remark 3.3. In order to apply Theorem 3.1 to the case described in Remark 3.2 it is important to observe that for every G no minors of the matrix (yij )(i,j)∈[n]×[d] vanish modulo LkG (d). This is because LkG (d) is contained in the ideal J generated by the monomials yik yjk and the terms in the minors of (yij ) do not belong to J for obvious reasons. We will formulate our next results in terms of the following algebraic invariants. Given an algebraic property P of ideals and a graph G we set asymk (P, G) = inf{d : LkG (d0 ) has property P for all d0 ≥ d}. Here we are of course interested in the properties P ∈ {radical, c.i., prime}. Other properties of ideals such as defining a normal ring or a UFD are interesting as well but will not be treated here. Before we use this new notation we provide the proof of Theorem 2.3(4) and (5). Proof of Theorem 2.3(4) and (5). Assume LkG (d) is a complete intersection. Then each minimal (d) generating set is a regular sequence. By Remark 1.2 the fe for e ∈ E form a minimal generating set and hence a regular sequence. In particular, each subset is a regular sequence as well. From this (5) follows. For (4) we consider the vector w assigning weight 1 to all variables yi` for (i, `) ∈ V × [d] and (d0 ) (d) weight 0 to all other variables. Then inw (fe ) = fe for every d0 ≥ d and e ∈ E. Hence the (d0 ) initial forms of the generators of LG (d0 ) form a regular sequence. It follows that the fe , e ∈ E, form a regular sequence and hence LkG (d0 ) is a complete intersection.  In terms of asymk (c.i., G) Theorem 2.3(4) yields the following corollary. LSS-IDEALS AND COORDINATE SECTIONS 9 Corollary 3.4. Let G = (V, E) be a graph. Then asymk (c.i., G) = inf{d : LkG (d) is c.i.}. Now we are in position to prove Theorem 2.3 (1) and (6). Proof of Theorem 2.3 (1) and (6). First we show that (1) implies (6). From Remark 1.2 we know (d) that the fe , e ∈ E, form a minimal system of generators. Thus if LkG (d) is a complete intersection then these generators form a regular sequence. If a regular sequence generates a prime ideal in a standard graded algebra or in a local ring then so does every subset of the sequence. Now (6) follows. To prove (1) we argue by induction on the number n of vertices. As usual we assume V = [n]. The case n ≤ 2 is trivial. We use the notation from Remark 3.2. Note, that S 0 /LkG1 (d) is an algebra retract of S/LkG (d). Therefore LkG1 (d) = LkG (d) ∩ S 0 and so LkG1 (d) is prime. By induction it follows that LkG1 (d) is a complete intersection. Since u is the degree of the vertex n in G we have that K1,u ⊂ G and hence, by Proposition 2.8, 1 + u < d + 1, i.e. u < d. By virtue of Remark 3.3 we have that the minors of the matrix A are non-zero in S 0 /LkG1 (d). In particular, Iu (A) 6= 0 in S 0 /LkG1 (d) and hence (2) in Theorem 3.1 holds. Then (1) in Theorem 3.1 holds as well, i.e. LkG (d) is a complete intersection.  As an immediate corollary of Theorem 2.3(1) we obtain. Corollary 3.5. Let G = (V, E) be a graph. Then asymk (c.i., G) ≤ asymk (prime, G). Before we can proceed to the proof of Theorem 2.3(2), we need another technical lemma. Lemma 3.6. Let A be an m × n matrix with entries in a Noetherian ring R. Assume m ≤ n. Let S = R[x] = R[x1 , . . . , xm ] be a polynomial ring over R and let B be the m × (n + 1) matrix with entries in S obtained by adding the column (x1 , . . . , xm )T to A. Then we have height I1 (B) = height I1 (A) + m and height It (B) ≥ min{height It−1 (A), height It (A) + m − t + 1} for all 1 < t ≤ m. Proof. Set u = min{height It−1 (A), height It (A)+m−t+1}. Let P be a prime ideal of S containing It (B). We have to prove that height P ≥ u. If P ⊇ It−1 (A) then height P ≥ height It−1 (A) ≥ u. If P 6⊇ It−1 (A) then we may assume that the (t−1)-minor F corresponding to the first (t −1) rows and column of A is not in P . Hence, height P = height P RF [x] and P RF [x] contains It (A)RF [x] and (xj − F −1 Gj : j = t, . . . , m) with Gj ∈ R[x1 , . . . , xt−1 ]. Since the elements xj − F −1 Gj are algebraically independent over RF we have height P RF [x] ≥ height It (A)RF + (m − t + 1) ≥ height It (A) + (m − t + 1).  Now we turn to the proof of Theorem 2.3(2) and (3). Proof or Theorem 2.3 (2) and (3). First, we show that (2) implies (3). If LkG (d) is prime then by (1) LkG (d) is a complete intersection. Now by (2) it follows that LkG (d+1) is prime. This completes the proof of (3). For the proof of (2) we argue by induction on the number n of vertices. If n ≤ 2 the assertion is obvious. Assume n > 2. Set G1 = G − n, U = {i ∈ [n]|{i, n} ∈ E}, u = |U |, Y = (yij )(i,j)∈U ×[d+1] , S = k[yij : i ∈ [n], j ∈ [d + 1]], S 0 = k[yij : i ∈ [n − 1], j ∈ [d + 1]] and R = S 0 /LkG1 (d + 1). By construction, S/LkG (d + 1) is the symmetric algebra of the R-module presented as the cokernel of the map Ru → Rd+1 associated to Y . By assumption LkG (d) is a complete intersection and hence LkG1 (d) is a complete intersection as well. It then follows by induction that LkG1 (d + 1) is prime and hence R is a domain. By Proposition 2.8 we have u ≤ d and by Remark 3.3 Iu (Y ) 6= 0 in R. Therefore, by Theorem 3.1(2) we have LkG (d + 1) is prime ⇔ heightIt (Y ) ≥ u − t + 2 in R for every t = 1, . . . , u. 10 A. CONCA AND V. WELKER Equivalently, we have to prove that   height It (Y ) + LkG1 (d + 1) ≥ u − t + 2 + g in S 0 for every t = 1, . . . , u where g = height LkG1 (d + 1) = |E| − u. Consider the weight vector w ∈ Rn×d+1 defined by wij = 1 and wi d+1 = 0 for all j ∈ [d] and i ∈ [n]. By construction the initial terms of the standard generators of inw (LkG1 (d + 1)) are the standard generators of LkG1 (d). Since the standard generators of It (Y ) coincide with their initial terms with respect to inw it follows that inw (It (Y )) ⊇ It (Y ) (indeed equality holds but we do not need this fact). Therefore, inw (It (Y ) + LkG1 (d + 1)) ⊇ It (Y ) + LkG1 (d) and it is enough to prove that   height It (Y ) + LkG1 (d) ≥ u − t + 2 + g in S 0 for every t = 1, . . . , u or, equivalently, heightIt (Y ) ≥ u − t + 2 in R0 for every t = 1, . . . , u where R0 = S 0 /LkG1 (d). The variables y1 d+1 , . . . , yn−1 d+1 do not appear in the generators of LkG1 (d). Hence R0 = 00 R [y1 d+1) , . . . , yn−1 d+1 ] with R00 = k[yij : (i, j) ∈ [n − 1] × [d]]/LkG−n (d). Let Y 0 be the matrix Y with the d + 1-st column removed. Then S/LkG (d) can be regarded as the symmetric algebra of the R00 -module presented as the cokernel of 0 → (R00 )u (1) Y0 −→ (R00 )d . By assumption S/LkG (d) is a complete intersection. Hence by Theorem 3.1(1) we know height It (Y 0 ) ≥ u − t + 1 in R00 for every t = 1, . . . , u Since Y is obtained from Y 0 by adding a column of variables over R00 by Lemma 3.6 we have: height, It (Y ) ≥ min{height, It−1 (Y 0 ), height, It (Y 0 ) + u − t + 1} ≥ u − t + 2 in R0 and for all t = 1, . . . , m.  Theorem 2.3(2) and (3) together with Corollary 3.5 directly imply the following. Corollary 3.7. Let G = (V, E) be a graph. Then asymk (prime, G) = inf{d : LkG (d) is prime} and asymk (c.i., G) ≤ asym(prime, G) ≤ asymk (c.i., G) + 1. The following proposition is an immediate consequence of Theorem 2.3 and Theorem 2.5. Proposition 3.8. Let G = (V, E) be a graph. Then asymk (radical, G) ≤ 2 |V | − 3, asymk (c.i., G) ≤ 2 |V | − 3 and asymk (prime, G) ≤ 2 |V | − 2. If G is bipartite then asymk (radical, G) ≤ |V | − 1, asymk (c.i., G) ≤ |V | − 1 and asymk (prime, G) ≤ |V |. These bounds are not tight in general as the following example shows. Example 3.9. Using CoCoA [1] or Macaulay 2 [19] one can check for fields k of characteristic 0 that LkK4 (2) is not a complete intersection while LkK4 (3) is. Hence by Theorem 2.3 (4) we have asymk (c.i., K4 ) = 3. Similarly, one can check that LkK4 (d) is not prime for d = 3 and hence Theorem 2.3 implies that asymk (prime, K4 ) = 4. Finally, one checks that LkK4 (d) is radical for all 1 ≤ d ≤ 3 and hence asymk (radical, K4 ) = 1. In Corollary 7.7 we will be able to analyze the asymptotic behavior of asymk (prime, Kn ) for n → ∞. LSS-IDEALS AND COORDINATE SECTIONS 11 4. Obstructions to algebraic properties In this section we prove Theorem 2.9 and study necessary and sufficient conditions for LkG (d) to be radical, complete intersections or prime. First, we turn to necessary conditions which yield lower bounds on asymk (radical, G), asymk (prime, G) and asymk (c.i., G). We start with the proof of Proposition 2.8. Proof of Proposition 2.8. First, we show that (1) implies (2). If LkG (d) is complete intersection then by Theorem 2.3 (2) it follows that LkG (d + 1) is prime. Hence if G contains Ka,b with a + b > d + 1 or Bd+1 (in case char k = 0 and d > 2) then G violates the conditions from (1) for primeness of LkG (d + 1). This implies (2). For (1) we first prove that if LkG (d) is prime then G does not contain Ka,b for a+b > d. Suppose for contradiction that LkG (d) is prime and G contains Ka,b for some a + b > d. We may decrease either a or b or both and assume right away that a + b = d + 1, a, b ≥ 1. In particular a, b ≤ d. We assume that V = [n] and that Ka,b is a subgraph of G, where after renaming vertices here Ka,b is the complete bipartite graph with edges {i, a + j} for i ∈ [a] and j ∈ [b]. Set R = S/LkG (d) and Y = (yi ` ) ∈ Ra×d and Z = (z`,i ) ∈ Rd×b with z`,i = yi+a,` . Since Ka,b is a subgraph of G we have Y Z = 0 in R By assumption R is a domain and Y Z = 0 can be seen as a matrix identity over the field of fractions of R. Hence rank(Y ) + rank(Z) ≤ d. From a + b = d + 1 it follows that rank(Y ) < a or rank(Z) < b. This implies that any a-minor of Y or any b-minor of Z is zero, i.e., Ia (Y ) = 0 or Ib (Z) = 0 as ideals of R. But by Remark 3.3 none of the minors of Y and Z are in LkG (d). This is a contradiction and hence LkG (d) is not prime. It remains to be shown that if char k = 0 and d > 3 then G does not contain a copy of Bd . Here, we unfortunately have to resort to Proposition 7.4 and Lemma 7.13(iii) from Section 7. But it is easily seen that its derivation is independent of results from preceding sections. By Theorem 2.3(6) we know that if LkG (d) is prime then so is LkBd (d). Then Proposition 7.4 gen implies that Id+1 (XG ) is prime for a generic matrix X of arbitrary size and this contradicts Lemma 7.13(iii).  Next we provide the proof of Theorem 2.9. Proof of Theorem 2.9 part (1). By Lemma 1.1 conditions (b) and (c) in Theorem 2.9(1) are equivalent. Hence it suffices to prove the equivalence of (a) and (b). For d = 1 the statements are obvious: LkG (1) is prime if and only if G has no edges set which is equivalent to not containing K11 . For d = 2 we know by Proposition 2.8 that (a) implies (b). When (b) holds then the edges of G are pairwise disjoint. It follows that the monomial ideal LkG (1) is a complete intersection. Then by Theorem 2.3 (2) assertion (a) follows. For d = 3 again by Proposition 2.8 condition (a) implies (b). To prove that (b) implies (a) we may assume that k is algebraically closed. Then, since the tensor product over k of k-algebras that are domains is a domain (see Corollary to Proposition 1 in Bourbaki’s Algebra [6, Chapter v, 17] or [30, Prop. 5.17]) we may assume that the graph is connected. A connected graph satisfying (b) is either an isolated vertex or a path Pn with n ≥ 2 vertices or a cycle Cn of length n 6= 4. Hence we have to prove that LkG (3) is prime when G = Pn with n ≥ 2 or G = Cn with n ≥ 3 and n 6= 4. If G = Pn then pmd(Pn ) ≥ 2 (indeed pmd(Pn ) ≥ 2 for n > 2). This can be seen easily form the definition or by using Lemma 5.2(iv) to check that a maximal matching and its complement form a positive matching decomposition. Hence by Theorem 2.5(3) it follows that LkPn (3) is prime. Now let G = Cn be the n-cycle for n ≥ 3 and n 6= 4 and set m = n − 1. To prove that LkCn (3) is prime we use the symmetric algebra perspective. Observe that Cn − n is Pm for m = n − 1. Set J = LkPm (3), S = k[yij : i ∈ [m] j ∈ [3]] and R = S/J. We have already proved that J is a 12 A. CONCA AND V. WELKER prime complete intersection of height m − 1. We have to prove that the symmetric algebra of the cokernel of the R-linear map:   y11 y12 y13 2 Y 3 R → R with Y = ym1 ym2 ym3 is a domain. Since by Remark 3.3 I2 (Y ) 6= 0 in R, taking into consideration Remark 3.2 we may apply Theorem 3.1. Therefore, it is enough to prove that height I1 (Y ) ≥ 3 and height I2 (Y ) ≥ 2 in R. Equivalently, it is enough to prove that (2) height I1 (Y ) + J ≥ m + 2 and (3) height I2 (Y ) + J ≥ m + 1 in S. We prove first (2). Since height I1 (Y ) = 6 in S then (2) is obvious for m ≤ 4. For m > 4 observe that I1 (Y ) + J can be written as I1 (Y ) + H where H is the LSS-ideal of the path of length m − 2 on vertices 2, 3, . . . , m − 1. Because I1 (Y ) and H use disjoint set of variables, we have height I1 (Y ) + H = 6 + m − 3 = m + 3 and this proves (2). Now we note, en passant, that the condition height I2 (Y ) ≥ 1 holds in R because R is a domain and I2 (Y ) 6= 0. Hence we deduce from Theorem 3.1(1) that LkCn (3) is a complete intersection for all n ≥ 3. It remains to prove (3). Since height I2 (Y ) = 3 in S the assertion in obvious for m = 2, i.e. n = 3. Hence we may assume m ≥ 4 (here we use n 6= 4). Then let P be a prime ideal of S containing I2 (Y ) + J. We have to prove that height P ≥ m + 1. If P contains I1 (Y ) then height P ≥ m+2 by (2). So we may assume that P does not contain I1 (Y ), say y11 6∈ P , and prove that height P Sx ≥ m + 1 where x = y11 . Since I2 (Y )Sx = (ym2 − x−1 ym1 y12 , ym3 − x−1 ym1 y13 ) we have (3) fm−1,m = ym−1,1 ym1 + ym−1,2 ym2 + ym−1,3 ym3 = ym−1,1 ym1 + ym−1,2 x−1 ym1 y12 + ym−1,3 x−1 ym1 y13 (3) = x−1 ym1 f1,m−1 Since (3) fm−1,m ∈ J, we have (3) ym1 f1,m−1 mod I2 (Y )Sx ∈ P Sx . Then we have that either ym1 ∈ P Sx or (3) f1,m−1 ∈ P Sx . In the first case P Sx contains ym1 , ym2 , ym3 and the LSS-ideal associated to the path of length m − 2 with vertices 1, . . . , m − 1. Hence height P Sx ≥ 3 + m − 2 = m + 1 as (3) desired. Finally, if f1,m−1 ∈ P Sx we have that P Sx contains the ideal LkCm−1 (3) associated to the (m − 1)-cycle with vertices 1, . . . , m − 1 and we have already observed that this ideal is a complete intersection. Since ym2 − x−1 ym1 y12 , ym3 − x−1 ym1 y13 are in P Sx as well it follows that height P Sx ≥ 2 + m − 1 = m + 1.  Proof of Theorem 2.9 part (2). By Lemma 1.1 conditions (b) and (c) in Theorem 2.9 (2) are equivalent. Hence it suffices to prove the equivalence of (a) and (b). We prove first that (a) implies (b). By Proposition 2.8 that (a) implies that G does not contain Ka,b with a + b = d + 1. Suppose then by contradiction that G does contain C2m . Hence LkC2m (2) is a complete intersection of height 2m. But the generators of LkC2m (2) are (up to sign) among the 2-minors of the matrix:   y11 −y22 y31 . . . y2m−1,1 −y2m,2 y12 y21 y32 . . . y2m−1,2 y2m,1 and the ideal of 2-minors of such a matrix has height 2m − 1, a contradiction. Now we prove that (b) implies (a). We may assume that k is algebraically closed. Since the tensor product over a perfect field k of reduced k-algebras is reduced [6, Thm 3, Chapter V, 15], we may assume that G is connected. A connected graph satisfying (b) is either an isolated vertex, or a path or an odd cycle. We have already observed that pmd(Pn ) ≤ 2. By Theorem 2.5 it LSS-IDEALS AND COORDINATE SECTIONS 13 follows that LkPn (2) is a complete intersection. It remains to prove that LkC2m+1 (2) is a complete intersection (of height 2m + 1). Note that LkP2m+1 (2) ⊂ LkC2m+1 (2) and we know already that (2) LkP2m+1 (2) is a complete intersection of height 2m. Hence it remains to prove that f1,2m+1 does not belong to any minimal prime of LkP2n+1 (2). The generators of LkP2n+1 (2) are (up to sign) the adjacent 2-minors of the matrix:  Y = y11 y12 −y22 y21 y31 y32 ... ... y2m−1,1 y2m−1,2 −y2m,2 y2m,1 y2m+1,1 y2m+1,2  The minimal primes of LkP2n+1 (2) are described in the proof of [15, Thm.4.3], see also [23] and [21]. By the description given in [15] it is easy to see that all minimal primes of LkP2n+1 (2) with the exception of I2 (Y ) are contained in the ideal Q = (yij : 2 < i < 2m + 1 1 ≤ j ≤ 2). Clearly (2) (2) f1,2m+1 6∈ Q. Finally one has f1,2m+1 6∈ I2 (Y ) since the monomial y11 y2m+1,1 is divisible by no monomials in the support of the generators of I2 (Y ).  We proceed with the proof of Theorem 2.10. For the proof we first formulate a result that is a special case of a more general statement. For this we need to introduce the concept of SturmfelsCartwright ideals. This concept was coined in [9] inspired by earlier work in [8] and [7]. It was further developed and applied to various classes of ideals in [10] and [11]. Consider for d1 , . . . , dn ≥ 1 the polynomial ring S = k[yij : i ∈ [n], j ∈ [di ]] with multigrading degyij = ei ∈ Zn . The group G = GLd1 (k) × · · · × GLdn (k) acts naturally on S as the group of Zn -graded K-algebra automorphism. The Borel subgroup of G is B = Ud1 (k) × · · · × Udn (k) where Ud (k) denotes the subgroup of GLd (k) of the upper triangular matrices. A Zn -graded ideal J is Borel fixed if g(J) = J for every g ∈ B. A Zn -graded ideal I of S is called a Cartwright-Sturmfels ideal if there exists a radical Borel fixed ideal J with the same multigraded Hilbert-series. Theorem 4.1. For d1 , . . . , dn ≥ 1 let S = k[yij : i ∈ [n], j ∈ [di ]] be the polynomial ring with Zn multigrading induced by degyij = ei ∈ Zn . and G = (V, E) be a forest (i.e. a graph without cycles). For each e = {i, j} ∈ E let fe ∈ S be a Zn -graded polynomial of degree ei + ej . Then I = (fe : e ∈ E) is a Cartwright-Sturmfels ideal. In particular, I and all its initial ideals are radical. Proof. First, we observe that we may assume that the generators fe of I form a regular sequence. To this end we introduce new variables and add to each fe a monomial me in the new variables of degree e so that me and me0 are coprime if e 6= e0 . The new polynomials fe + me with e ∈ E form a regular sequence by Proposition 1.4 since their initial terms with respect to an appropriate term order are the pairwise coprime monomials me . The ideal I arises as a multigraded linear section of the ideal (fe + me : e ∈ E) by setting all new variables to 0. By [8, Thm. 1.16(5)] the family of Cartwright-Sturmfels ideals is closed under any multigraded linear section. Hence it is enough to prove the statement for the ideal (fe + me : e ∈ E). Equivalently we may assume right away that the generators fe of I form a regular sequences. The multigraded Hilbert series of a multigraded S-module M can by written as KM (z1 , . . . , zn ) Qn . di i=1 (1 − zi ) The numerator KM (z1 , . . . , zn ) is a Laurent polynomial polynomial with integral coefficients called the K-polynomial of M . Since the fe ’s form a regular sequence the K-polynomial of S/I is the polynomial: Y F (z) = F (z1 , . . . , zn ) = (1 − zi zj ) ∈ Q[z1 , . . . , zn ]. {i,j}∈E To prove that I is Cartwright-Sturmfels we have to prove that there is a Borel-fixed radical ideal J such that the K-polynomial of S/J is F (z). Taking into consideration the duality between Cartwright-Sturmfels ideals and Cartwright-Sturmfels∗ ideals discussed in [9], it is enough to exhibit a monomial ideal J whose generators are in the polynomial ring S 0 = k[y1 , y2 , . . . , yn ] 14 A. CONCA AND V. WELKER equipped with the (fine) Zn -grading deg yi = ei ∈ Zn such that the K-polynomial of J regarded as an S 0 -module is F (1 − z1 , . . . , 1 − zn ), that is, Y (zi + zj − zi zj ). {i,j}∈E We claim that, under the assumption that ([n], E) is a forest, the ideal Y J= (yi , yj ) {i,j}∈E has the desired property. In other words, we have to prove that the tensor product O TE = T{i,j} {i,j}∈E of the truncated Koszul complexes: T{i,j} : 0 → S 0 (−ei − ej ) → S 0 (−ei ) ⊕ S 0 (−ej ) → 0 associated to yi , yj resolves the ideal J. Consider a leaf {a, b} of E. Set E 0 = E \ {{a, b}}, Y J0 = (yi , yj ) {i,j}∈E 0 and J 00 = (ya , yb ). Then by induction on the number of edges we have that TE 0 resolves the 0 ideal J 0 . Then the homology of TE is TorS∗ (J 0 , J 00 ). Since since {a, b} is a leaf one of the two variables ya , yb does not appear at all in the generators of J 0 . Hence ya , yb forms a regular J 0 0 sequence. Then TorS≥1 (J 0 , J 00 ) = 0 and hence TE resolves J 0 ⊗ J 00 . Finally, J 0 ⊗ J 00 = J 0 J 00 0 since TorS1 (J 0 , S/J 00 ) = 0. This concludes the proof that the ideal I is a Cartwright-Sturmfels ideal. Every initial ideal of a Cartwright-Sturmfels ideal is a Cartwright-Sturmfels ideal as well because the property just depends on the Hilbert series. In particular, every initial ideal of a Cartwright-Sturmfels ideal is radical.  Now we are ready to prove Theorem 2.10: (d) Proof of Theorem 2.10. (1) Setting d1 = · · · = dn = d and fe = fe in Theorem 4.1 we have that LkG (d) is a Cartwright-Sturmfels ideal and hence radical. (2) If LkG (d) is a complete intersection then, by Proposition 2.8, G does not contain a copy of K1,d+1 as a subgraph, that is, ∆(G) ≤ d. Vice versa if d ≥ ∆(G) one proves that LkG (d) is a complete intersection by using induction on the number of vertices of G and the symmetric algebra point of view. As G is a forest we may assume that {n − 1, n} is a leaf. Then G1 = G − n is a forest with ∆(G1 ) ≤ ∆(G) ≤ d. Hence by induction LkG1 (d) is a complete intersection. Set R = k[yi,j : i ∈ [n − 1], j ∈ [d]]/LkG1 (d). We may interpret LkG (d) as the ideal defining the symmetric algebra of the R-module defined as the cokernel of the R-linear map R → Rd associated to the matrix A = (yn−1,1 , . . . , yn−1,d ). Hence, by virtue of Theorem 3.1(1), it is enough to prove that height (yn−1,1 , . . . , yn−1,d ) ≥ 1 in R equivalently, height (yn−1,1 , . . . , yn−1,d ) + LkG1 (d) > height LkG1 (d) which is true because at most ∆(G) − 1 of the generators of LkG1 (d) are contained in (yn−1,1 , . . . , yn−1,d ). (3) If LkG (d) is prime then, by Proposition 2.8, G does not contain a copy of K1,d as a subgraph, that is, ∆(G) ≤ d − 1. Vice versa, we know by (2) that LkG (d) is a complete intersection for d ≥ ∆(G). Hence by Theorem 2.3 LkG (d) is prime for d ≥ ∆(G) + 1.  LSS-IDEALS AND COORDINATE SECTIONS 15 Hence for a forest G we have a complete picture of asymptotic behaviour: Corollary 4.2. Let G be a forest and k any field. Then: asymk (radical, G) = 1, asymk (c.i., G) = ∆(G) and asymk (prime, G) = ∆(G) + 1. 5. Positive matching decompositions In this section we introduce the concepts of positive matchings and positive matching decomposition and prove Theorem 2.5. Definition 5.1. Given a hypergraph H = (V, E) a positive matching of G is a subset M ⊂ E of pairwise disjoint sets (i.e., a matching) such that there exists a weight function w : V → R satisfying: X w(i) > 0 if A∈M i∈A (4) X w(i) < 0 if A ∈ E \ M. i∈A We illustrate the definition for subgraphs of K4 . The edge set M = {{1, 2}, {3, 4}} is a matching in K4 but it is not positive. Nevertheless, the matching M is positive in the graph with edge set {{1, 2}, {1, 3}, {2, 3}, {3, 4}} with respect to the weight function w(1) = 0, w(2) = 1, w(3) = −2 and w(4) = 3. The next lemma summarizes some elementary properties of positive matchings. S Lemma 5.2. Let H = (V, E) be a hypergraph such that E is a clutter, M ⊆ E and VM = A∈M A. (i) M is a positive matching for H if and only if M is a positive matching for the induced hypergraph HVM = (VM , {A ∈ E | A ⊆ VM }). (ii) If M is a positive matching on H and A ∈ E is such that M ∪ {A} is a matching and there is no B ∈ M with B ∩ VM 6= ∅ = 6 B ∩ A then M ∪ {A} is a positive matching on H. (iii) If H is a bipartite graph with bipartition V = V1 ∪ V2 then M is a positive matching if and only if M is a matching and directing the edges e ∈ E from V1 to V2 if e ∈ M and from V2 to V1 if e ∈ E \ M yields an acyclic orientation. Proof. (i) Clearly a weight function on V for which M is a positive matching restricts to VM making M a positive matching on HVM . Conversely, setting w(i) = − max{|A| : A ∈ M } · max{w(j) : j ∈ VM } for i ∈ V \ VM extends a weight function on VM to V and shows that M is a positive matching on H. (ii) Let w we a weight function for which M is positive. Set T = max{1, w(`) : ` ∈ VM } > 0. We define w0 : V → R as follow. If ` ∈ VM we set w0 (`) = w(`). If ` ∈ A we set w0 (`) = T and for ` ∈ V \ (VM ∩ A) we set w0 (`) = −| max{|A|, |B| : B ∈ M } · T − 1. One easily checks that M ∪ {A} is a positive matching with respect to w0 . (iii) We change the coordinates w(i) to −w(i) for i ∈ V2 in the inequalities defining a positive matchings. As a simple reformulation of (4) we get that in these coordinates a matching M is positive if and only if there is a weight function such that for {i, j} ∈ E, i ∈ V1 , j ∈ V2 we have (5) w(i) > w(j) if {i, j} ∈ M, w(i) < w(j) if {i.j} ∈ E \ M. This is equivalent to the existence of a region in the arrangement of hyperplanes w(i) = w(j) for {i, j} ∈ E in RV satisfying (5). But it is well known that the regions in this arrangement are in one to one correspondence with the acyclic orientations of G (see [20, Lemma 7.1]).  Now we are in position to introduce the key concept of this section. 16 A. CONCA AND V. WELKER Definition 5.3. Let H = (V, E) be a hypergraph for whichSE is a clutter. A positive matching p decomposition (or pm-decomposition) of G is a partition E = i=1 Ei into pairwise disjoint subsets such that Ei is a positive matching on (V, E \ ∪i−1 j=1 Ej ) for i = 1, . . . , p. The Ei are called the parts of the pm-decomposition. The smallest p for which G admits a pm-decomposition with p parts will be denoted by pmd(H). S Note that by definition one has pmd(H) ≤ |E| because of the obvious pm-decomposition A∈E {A}. On the other hand pmd(G) is smaller than |E| for most clutters. Next we prove the bound from Theorem 2.5(4). Proof of Theorem 2.5(4). First, consider the case when G = (V, E) is an arbitrary graph. Set n = |V |. We may assume that G is the complete graph Kn because any pm-decomposition of Kn induces a pm-decomposition on its subgraphs. For ` = 1, . . . , 2n − 3 we set E` = {{i, j} : i + j = ` + 2}. For example, for n = 7 we have E1 = {12}, E2 = {13}, E3 = {14, 23}, E4 = {15, 24}, E5 = {16, 25, 34}, E6 = {17, 26, 35}, E7 = {27, 36, 45}, E8 = {37, 46}, E9 = {47, 56}, E10 = {57}, E11 = {67} where for simplicity we have written ij for the edge {i, j}. Clearly one has E = ∪2n−3 `=1 E` and this is a pm-decomposition of Kn since when a new edge is inserted the smallest index involved in that edge satisfies the condition of Lemma 5.2 (ii) with respect to the current data. For example for n = 7 when we insert the edge 27 in E7 the vertex 2 satisfies the condition of Lemma 5.2 (ii) with respect to the matching {36, 45}, i.e. the edges 23, 24, 25, 26 are already used in an earlier step of the construction. Now consider the case when G = (V, E) is a bipartite graph. Let V = V1 ∪ V2 be a the bipartition for G. We may assume V1 = [m] and V2 = [ñ] = Sp{1̃, . . . , ñ} for numbers m, n ≥ 1 and we may assume that G = Km,n . We show that E = `=1 E` with p = m + n − 1 and E` = {{i, j̃} : i + j = ` + 1} is positive matching decomposition of Km,n . That is, we show that S`−1 E` is a positive matching on E \ k=1 Ek for ` = 1, . . . , m + n − 1. For ` = 1 the assertion is obvious since E1 contains a single edge. Now assume ` ≥ 2. By Lemma 5.2(iii) it suffices to show that directing the edges in E` from [m] to [ñ] and the edges in S` E \ k=1 Ek in the other direction yields an acyclic orientation. Assume the resulting directed graph has a cycle. As a cycle in a bipartite graph is of even length this cycle must contain at least two edges of type i → j̃ for {i, j̃} ∈ E` or equivalently i + j = ` + 1. We assume {i, j̃} ∈ E` is chosen with this property so that j is maximal. The next edge in the directed cycle is an edge j̃ → i0 . We must have i0 < i or i0 > i. If i0 < i then the following edge in the cycle i0 → j˜0 must again satisfy i0 + j 0 = ` + 1. But by i0 < i and i + j = ` + 1 it follows that j 0 > j a contradiction. Analogously, consider the edge j˜00 → i preceding i → j̃. Again by construction j 00 + i > ` + 1. But then j 00 > j again a contradiction. Hence there is no cycle and E` is a positive matching on S`−1 E \ k=1 Ek .  In the bipartite case, Theorem 2.6(4) shows that pmd(Km,n ) = m + n − 1 and computer experiments show that pmd(Kn ) = 2n − 3 holds for small value of n. Next we connect positive matching decompositions to algebraic properties of LSS-ideals. Lemma Sp 5.4. Let H = (V, E) be a hypergraph such that E is a clutter, d ≥ p := pmd(H) and E = `=1 E` a positive matching decomposition. Then there exists a term order < on S such that for every ` and every A ∈ E` we have Y (d) (6) in< (fA ) = yi` . i∈A Proof. To define < we first define weight vectors w1 , . . . , wp ∈ RV ×[d] . For that purpose we use the weight functions w` : V → R, associated to each matching E` , ` = 1, . . . , p. The weight vector w` is defined as follows: • w` (yik ) = 0 if k 6= ` and LSS-IDEALS AND COORDINATE SECTIONS 17 • w` (yi` ) = w` (i). Q P By definition the weight of the monomial i∈A yik withQrespect to w` is 0 if k 6= ` and i∈A w` (i) if k = `. Hence, by definition, the weight of i∈A yi` is positive if A ∈ E` and negative if A ∈ E \ ∪`v=1 Ev . It follows that: (7) (d) inw1 (fA ) =  Q   di∈A yi1 XY yik   if A ∈ E1 if A ∈ E \ {E1 }. k=2 i∈A We define the term order < as follows: y α < y β if (1) |α| < |β| or (2) |α| = |β| and w` (y α ) < w` (y β ) for the smallest ` such that w` (y α ) 6= w` (y β ) or (3) |α| = |β| and w` (y α ) = w` (y β ) for all ` and y α <0 y β for an arbitrary but fixed term order <0 . (d) Q A simple induction using (7) now shows that for all ` and for all A ∈ E we have in< (fA ) =  i∈A yi` . We conclude this section with the proofs of Theorem 2.5(1)-(3) and Theorem 2.6(4) and a simple corollary. Sp Proof of Theorem 2.5. Let p = pmd(H) and E = `=1 E` a pm-decomposition of H. Hence by Lemma 5.4 there is a term order < satisfying (6). Since each E` , ` = 1, . . . , p, is (d) a matching (6) implies that the initial monomials of the generators fA , A ∈ E, of LH (d) are (d) pairwise coprime. Hence in< (LkH (d)) = (in< (fe : e ∈ E) is a radical complete intersection. This prove (1). Then (2) follows from (1) and Proposition 1.4 and (3) follows from Theorem 2.3.  Now we can also complete the proof of Theorem 2.6(4). Proof of Theorem 2.6(4). From Theorem 2.5(4) we know that pmd(Km,n ) ≤ m + n − 1. From Theorem 2.5(3) we know that LkKm,n (d) is prime for d ≥ pmd(Km,n ) + 1. From Theorem 2.9(3) we know that if LkKm,n (d) is prime then Km,n does not contain a subgraph Ka,b with a + b = d + 1. The latter then implies d ≥ n + m. Hence pmd(Km,n ) ≥ m + n − 1 and therefore pmd(Km,n ) = m + n − 1.  Using the fact Theorem 2.3(6) that primeness is inherited by subgraphs the following is an immediate consequence of Theorem 2.5. Corollary 5.5. (i) Let G be a subgraph of Kn then LK G (d) is a radical complete intersection for d ≥ min{2n − 3, |E|} and prime for d ≥ min{2n − 3, |E|} + 1. (ii) Let G be a subgraph of Km,n then LK G (d) is a radical complete intersection for d ≥ min{m+ n − 1, |E|} and prime for d ≥ min{m + n − 1, |E|} + 1. 6. Determinantal rings from the point of view of invariant theory The goal of this section is to recall some classical results in invariant theory (see for example [34]) that have been treated in modern terms by De Concini and Procesi in [14]. In particular, we recall how determinantal/Pfaffian rings arise as invariant ring of group actions. We assume throughout that the base field k is of characteristic 0. 6.1. Generic determinantal rings as rings of invariants (gen). We take an n × m matrix gen k gen of variables Xm,n = (xij )(i,j)∈[m]×[n] and consider the ideal Id+1 (Xm,n ) of S gen = k[xij : (i, j) ∈ gen [m] × [n]] generated by the (d + 1)-minors of Xm,n . Consider two matrices of variables Y and Z of size m × d and d × n and the following action of G = GLd (k) on the polynomial ring k[Y, Z]: The matrix A ∈ G acts by the k-algebra automorphism of k[Y, Z] that sends Y → Y A and Z → A−1 Z. The entries of the product matrix Y Z are clearly invariant under this action. Hence the ring of 18 A. CONCA AND V. WELKER invariants k[Y, Z]G contains the subalgebra k[Y Z] generated by the entries of the product Y Z. The First Main Theorem of Invariant Theory for this action says that k[Y, Z]G = k[Y Z]. We have a surjective k-algebra map: φ : S gen → k[Y, Z]G = k[Y Z] Pd sending X to Y Z, that is xij to (Y Z)ij = `=1 yi ` z` j . Clearly the product matrix Y Z has k gen rank d and hence we have Id+1 (Xm,n ) ⊆ Ker φ. The Second Main Theorem of Invariant Theory k gen says that Id+1 (Xm,n ) = Ker φ. Hence k gen S/Id+1 (Xm,n ) ' k[Y Z] (8) 6.2. Generic symmetric determinantal rings as rings of invariants (sym). We take an n × n symmetric matrix of variables  Xnsym x11 x12 x13 .. . .. . .. .        =       x1n−1 x1n x12 x22 x23 .. . .. . .. . x13 x23 x33 .. . .. . .. . ··· ··· ··· .. . .. . .. . x1 n−1 x2 n−1 x3 n−1 .. . .. . .. . x1n x2n x3n .. . .. . .. . x2n−1 x2n x3n−1 x3n ··· ··· xn−1 n−1 xn−1 n xn−1 n xnn                k and consider the ideal Id+1 (Xnsym ) generated by the (d + 1)-minors of Xnsym in the polynomial sym ring S = k[xij : 1 ≤ i ≤ j ≤ n]. Consider a matrix of variables Y of size n×d and the following action of the orthogonal group G = Od (k) = {A ∈ GLt (k) : A−1 = AT } on the polynomial ring k[Y ] = k[yij |Yij : (i, j) ∈ [n] × [t]]: Any A ∈ G acts by the k-algebra automorphism of k[Y ] that sends Y to Y A. The entries of the product matrix Y Y T are invariant under this action and hence the ring of invariants contains the subalgebra k[Y Y T ] generated by the entries of Y Y T . The First Main Theorem of Invariant Theory for this action asserts that k[Y ]G = k[Y Y T ]. Then we have a surjective presentation: φ : S sym → k[Y Y T ] sending X to Y Y T . Since the product matrix Y Y T has rank t we have Id+1 (X) ⊆ Ker φ. The Second Main Theorem of Invariant Theory then says that Id+1 (X) = Ker φ. Hence k S sym /Id+1 (Xnsym ) ' k[Y Y T ]. (9) 6.3. Generic Pfaffian rings as rings of invariants (skew). We take an n × n skew-symmetric matrix of variables  Xnskew 0 −x12 −x13 .. . .. . .. .        =       −x1n−1 −x1n x12 0 −x23 .. . .. . .. . x13 x23 0 .. . .. . .. . ··· ··· ··· .. . .. . .. . x1 n−1 x2 n−1 x3 n−1 .. . .. . .. . x1n x2n x3n .. . .. . .. . −x2n−1 −x2n −x3n−1 −x3n ··· ··· 0 −xn−1 n −xn−1 n 0                LSS-IDEALS AND COORDINATE SECTIONS 19 and consider the ideal Pf k2t+2 (X) generated by the Pfaffians of size (2d + 2) in k[xij | 1 ≤ i < j ≤ n] of Xnskew in the polynomial ring S skew = k[xij : 1 ≤ i ≤ j ≤ n]. Consider a matrix of variables Y of size n × 2d and let J2t be the 2d × 2d block matrix with d blocks  0 −1 1 0  on the diagonal and 0 in the other positions. The sympletic group G = Sp2d (k) = {A ∈ GL2t (k) : AJAT = J} acts on the polynomial ring k[Y ] = k[yij ] as follows: an A ∈ G acts on k[Y ] by the automorphism that sends Y → Y A. The entries of the product matrix Y J2d Y T are invariant under this action and hence the ring of invariants contains the subalgebra k[Y J2t Y T ] generated by the entries of Y J2d Y T . The First Main Theorem of Invariant Theory for the current action says that k[Y ]G = k[Y J2t Y T ]. Then we have a surjective presentation: φ : S skew → k[Y Y T ] sending X to Y JY T . The product matrix Y JY T has rank 2d and hence we have Pf k2d+2 (X) ⊆ Ker φ. The Second Main Theorem of Invariant Theory for this action says that Pf k2d+2 (X) = Ker φ. Hence (10) S skew / Pf k2d+2 (Xnskew ) ' k[Y JY T ]. 7. Determinantal ideals of matrices with 0’s and their relation to LSS-ideals The classical invariant theory point of view described in Section 6 shows that the generic determinantal and Pfaffian ideals are prime as they are kernels of ring maps whose codomains are integral domains. Their height is also well know (see for example [3] and the references given there): gen ) of d-minors of a m × n matrix of variables is (n + 1 − (gen) The height of the ideal Idk (Xm,n d)(m + 1 − d). (sym) The height of the ideal Idk (Xnsym ) of d-minors of a symmetric n × n matrix of variables is  n−d+2 . 2 (skew) The height of the ideal of Pfaffians Pf k2d (Xnskew  ) of size 2d (and degree d) of an n × n skew-symmetric matrix of variables is n−2d+2 . 2 If one replaces the entries of the matrices with general linear forms in, say, u variables, then Bertini’s theorem in combination with the fact that the generic determinantal/Pfaffian rings are Cohen-Macaulay implies that the determinantal/Pfaffian ideals remain prime as long as u ≥ 2+height and radical if u ≥ 1+height. But what about the case of special linear sections of determinantal ideals of matrices? And what about the case of coordinate sections? Are the corresponding ideals prime or radical? To describe coordinate sections we employ the following notation. (gen) In the generic case we take – as described in the introduction – a bipartite graph G = gen ([m] ∪ [ñ], E) where E ⊆ [m] × [ñ] and denote by XG the matrix obtained from the m × n matrix of variables X = (xij )(i,j)∈[m]×[n] by replacing the entries in position (i, j) with 0 for {i, j̃} ∈ E. (sym) In the generic symmetric case we take a subgraph G = ([n], E) of Kn and denote by sym XG the matrix obtained from the generic symmetric matrix Xnsym by replacing for all {i, j} ∈ E the entries in row i, column j and row j, column i with 0. (skew) In the generic skewsymmetric case where we take a subgraph G = ([n], E) of Kn and skew denote by XG the matrix obtained from the generic skewsymmetric matrix Xnskew by replacing for all {i, j} ∈ E the entries in row i, column j and row j, column i with 0. gen sym gen sym In this terminology Idk (XG ) (resp. Idk (XG )) is the ideal of d-minors of XG resp. XG ) in k gen sym skew skew skew S (resp. S ). We write Pf 2d (XG ) for the ideal of Pfaffians of size 2d of XG in S . gen sym skew We ask for conditions on G that imply that Idk (XG ) (resp. Idk (XG ) or Pf k2d (XG )) is radical or prime. 20 A. CONCA AND V. WELKER Simple examples show that special linear sections of relatively small height of generic determinantal ideals can give non-prime and non-radical ideals. On the positive side, for maximal minors, we have the following results: Remark 7.1. (1) Eisenbud [17] proved that the ideal of maximal minors of a 1-generic m × n matrix of linear forms is prime and remains prime even after modding out any set of ≤ m − 2 linear forms. In particular, the ideal of maximal minors of an m × n matrix of linear forms is prime provided the ideal generated by the entries of the matrix has at least m(n − 1) + 2 generators. (2) Giusti and Merle in [18] studied the ideal of maximal minors of coordinate sections in the generic case. One of their main results, [18, Thm.1.6.1] characterizes, in combinatorial terms, the subgraph graphs G of Km,n , m ≤ n, such that the variety associated to gen gen k k Im (XG ) is irreducible, i.e. the radical of Im (XG ) is prime. gen k (3) Boocher proved in [5] that for any subgraph G of Km,n , m ≤ n, the ideal Im (XG ) is radical. Combining his result with the result of Giusti and Merle, one obtains a characgen k ) is prime. terization of the graphs G such that Im (XG (4) Generalizing the result of Boocher, in [8] and [9] it is proved that ideals of maximal minors of a matrix of linear forms that is either row or column multigraded is radical. gen In the generic case every non-zero minor of a matrix of type XG has no multiple factors gen might because its multidegree is square-free. This suggests that the determinantal ideals of XG always be radical. The following example shows that this is not the case: gen Example 7.2. Let XG be the 6 × 6 matrix associated to the graph from Example 2.2(3). That is, in the 6 × 6 generic matrix we set to 0 the entries in positions (1, 1), (1, 2), (1, 3), (1, 4), (2, 1), (2, 2), (3, 2), (3, 3), (4, 3), (4, 4), (5, 1), (5, 4). gen I4k (XG ) Then is not radical over a field of characteristic 0 and very likely over any field. Here gen gen the “witness” is g = x1,5 , i.e. I4k (XG ) : g 6= I4k (XG ) : g 2 . Since G is contained in K5,4 one can gen k consider as well I4 (XG ) in the 5 × 5 matrix but that ideal turns out to be radical. Similarly for symmetric matrices we have: sym Example 7.3. Let XG be the 7 × 7 generic symmetric matrix associated to the graph from Example 2.2(1). That is, in the 7 × 7 generic symmetric matrix we set to 0 the entries in positions {1, 2}, {1, 3}, {1, 4}, {1, 5}, {2, 3}, {2, 4}, {2, 6}, {3, 5}, {4, 6} sym as well as in the symmetric positions. Then I4k (XG ) is not radical over a field of characteristic sym 0 The witness here is g = x1,6 . Since G is contained in K6 one can consider as well I4k (XG ) in the 6 × 6 matrix but that ideal turns out to be radical. The examples Example 2.2, Example 7.2 and Example 7.3 are indeed closely related as we now explain. Let G = ([m] ∪ [ñ], E) be a subgraph of the complete bipartite graph Km,n . In view of the isomorphism (8) we have that   gen k S gen / Id+1 (XG ) + (xij | {i, j̃} ∈ E) ' k[Y Z]/JG (d) where Y = (yij ), Z = (zij ) are respectively m × d and d × n matrices of variables and JG (d) is the ideal of k[Y Z] generated by (Y Z)i,j with {i, j̃} ∈ E. The LSS-ideal LkG (d) ⊂ k[Y, Z] is indeed equal to JG (d)k[Y, Z]. Now it is a classical result in invariant theory, (derived from the fact that linear groups are reductive in characteristic 0) that k[Y Z] is a direct summand of k[Y, Z] in characteristic 0. This implies that JG (d) = LkG (d) ∩ k[Y Z]. The next proposition is an immediate consequence. LSS-IDEALS AND COORDINATE SECTIONS 21 Proposition 7.4. Let k be a field of characteristic 0, d ≥ 1 and G = ([m] ∪ [ñ], E) be a subgraph of Km,n . If the LSS-ideal LkG (d) is radical (resp. is a complete intersection, resp. is prime) then gen k the coordinate section Id+1 (XG ) of the generic determinantal ideal is radical (resp. has maximal height, resp. is prime). Now we start from a subgraph E ⊆ {{i, j} : 1 ≤ i < j ≤ n} of Kn . For d + 1 ≤ n we may sym k k consider the coordinate section Id+1 (XG ) of Id+1 (Xnsym ). Using the isomorphism (9) we obtain: Proposition 7.5. Let k be a field of characteristic 0 and G = ([n], E) a subgraph of Kn . If the LSS-ideal LkG (d) is radical (resp. is a complete intersection, resp. is prime) then the coordinate sym k section Id+1 (XG ) of the generic determinantal ideal is radical (resp. has maximal height, resp. is prime). Now we can go back to LSS-ideals. Proposition 7.6. Let  k be a field of characteristic 0 and n ∈ N. Let wn be the largest positive integer such that w2n ≤ n. Then:  (a) LkKn (d) is not prime for d = n + wn2−2 − 1.  −2 (b) LkKn (d) is not a complete intersection for d = n + wn+1 − 2. 2  Proof. (a) We set hn = w2n and mn = wn + d − 1. The numbers are chosen so that, using the formulas mentioned at the beginning of the section, the ideal Id+1 (X) of (d + 1)-minors of a generic  symmetric mn × mn matrix X has height hn . Consider Kn as the graph ([mn ], [n] 2 ) on mn vertices where the vertices n + 1, . . . , mn do not appear in an edge. If, sym k by contradiction, the ideal LkKn (d) is prime then by Proposition 7.5 the ideal Id+1 (XK ) n is prime and of height hn . But one has sym k Id+1 (XK ) ⊂ (x11 , x22 , . . . , xhn hn ) n (11) which is a contradiction. To check (11) it is enough to prove that the rank of the matrix sym XK n mod (x11 , x22 , . . . , xhn hn ) is at most d. That is, we have to check that the rank of an (mn × mn )-matrix with block decomposition   0 A B C where 0 is the zero matrix of size (hn × n), is at most d. Since d = mn − n + mn − hn the latter is obvious.  (b) We set hn = wn+1 and mn = wn+1 + d − 1. As above, the numbers are chosen so that 2 the ideal Id+1 (X) of (d + 1)-minors of a generic symmetric mn × mn matrix X has height hn . Assume, by contradiction, that LkKn (d) is a complete intersection. From Proposition 7.5 sym k it follows that Id+1 (XK ) has height hn . But n sym k Id+1 (XK ) ⊂ (x11 , x22 , . . . , xhn −1,hn −1 ) n (12) which is a contradiction. As above (12) boils down to an obvious statement about the rank of a matrix with a zero submatrix of a certain size.  Using this result we can now analyze the asymptotic behavior of both asymk (c.i., Kn ) and asymk (prime, Kn ). Corollary 7.7. Let k be a field of characteristic 0. Then (13) asymk (prime, Kn ) asymk (c.i., Kn ) = lim = 2. n→∞ n→∞ n n lim 22 A. CONCA AND V. WELKER Proof. By Corollary 5.5(i) we have asymk (prime, Kn ) ≤ 2n − 2. By Proposition 7.6 we have   wn+1 − 2 (14) n+ − 1 ≤ asymk (c.i., Kn ) ≤ asymk (prime, Kn ) 2 Hence the equalities in (13) follow from the fact that  wn+1 −2 lim n→∞ 2 n = 1.  Using Proposition 7.6 and Theorem 2.3 we obtain further obstructions. Corollary 7.8. Let G be a graph on n vertices and k a field of characteristic 0. Then LkG (d) wω(G)+1  − 2 and LkG (d) is not prime for d ≤ is not a complete intersection for d ≤ ω(G) + 2 wω(G)  − 1 where wω(G) is defined as in Proposition 7.6. ω(G) + 2 To get an actual feeling of the obstruction. We list a few explicit example of new obstructions derived from Corollary 7.8. d d≤2 d≤3 d≤4 d≤5 d≤6 d≤7 d≤8 d ≤ 10 d ≤ 11 d ≤ 12 obstruction to complete intersection K4 obstruction to primeness K3 K4 K5 K6 K7 K8 K5 K6 K7 K8 K9 K11 K12 K12 K13 skew ) of Pf k2d+2 (Xnskew ). We For 2d + 2 ≤ n we may consider the coordinate section Pf k2d+2 (XG may as well consider the same graph G = ([n], E) and the associated twisted LSS-ideal L̂kG (d) defined as follows. For every i ∈ [n] we consider 2d indeterminates yi 1 , . . . , yi 2d . For e = {i, j}, (d) 1 ≤ i < j ≤ n we set fˆe to be the entry of the matrix Y JY T in row i and column j, i.e. fˆe(d) = d  X  yi 2k−1 yj 2k − yi 2k yj 2k−1 . k=1 Then we call L̂kG (d) = (fˆe(d) : e ∈ E). the twisted LSS-ideal associated to G. For d = 1 the twisted LSS-ideal coincides with the so-called binomial edge ideal defined and studied in [21, 25, 29, 32]. √ Remark 7.9. Assume −1 ∈ k and G is bipartite with bipartition [n] = V1 ∪ V2 then the coordinate transformation √ • yi 2k−1 7→ √ yi 2k−1 and yi 2k 7→ −1yi 2k−1 for i ∈ V1 , • yj 2k 7→ −1 · yi 2k−1 and yj 2k−1 7→ yi 2k for j ∈ V2 , sends L̂kG (d) to LkG (2d). In particular, for a bipartite graph G we have that L̂kG (d) is radical (resp. prime) if and only if LkG (2d) radical (resp. prime). Using the isomorphism (10) we obtain: Proposition 7.10. Let k be a field of characteristic 0 and G = ([n], E) a subgraph of Kn . If the twisted LSS-ideal L̂kG (d) is radical (resp. is c.i., resp. is prime) then the coordinate section skew Pf k2d+2 (XG ) of the generic Pfaffian ideal is radical (resp. has maximal height, resp. is prime). LSS-IDEALS AND COORDINATE SECTIONS 23 We have: Theorem 7.11. Let k be a field of characteristic 0. gen gen (gen) If G is a subgraph of Km,n then the ideals I2k (XG ) and I3k (XG ) are radical. sym sym (sym) If G is a subgraph of Kn then the ideals I2k (XG ) and I3k (XG ) are radical. skew (skew) If G is a subgraph of Kn then the ideal Pf k4 (XG ) is radical. Furthermore if G is a forest then gen sym skew (1) Idk (XG ), Idk (XG ) and Pf k2d (XG ) are radical for all d. gen sym k k (2) Id (XG ) and Id (XG ) have maximal height if d ≥ ∆(G) + 1. gen sym (3) Idk (XG ) and Idk (XG ) are prime if d ≥ ∆(G) + 2. Proof. The statements for ideals of 2-minors in the cases (gen) and (sym) follow from Proposition 7.4 and Proposition 7.5 using the fact that the edge ideal of a graph is radical. Indeed these results hold over a field of arbitrary characteristic as the corresponding ideals are “toric.” By [22, Thm. 1.1] the ideal LkG (2) is radical for all graphs G. Using Proposition 7.4 and gen sym Proposition 7.5 this implies that I3k (XG ) is radical for bipartite graphs G and I3k (XG ) is radical for arbitrary graphs. By [21, Cor. 2.2] the ideal L̂kG (1) is radical for all graphs G. Using Proposition 7.10 this implies skew ) is radical for arbitrary graphs. the Pf k4 (XG Finally, for a forest G the results in the case of minors are derived from Proposition 7.4, Proposition 7.5 and Theorem 2.10. In the Pfaffian case they follows using Theorem 4.1 and Proposition 7.10.  The following corollary is an immediate consequence of the assertion (skew) in Theorem 7.11. Corollary 7.12. Let G(2, n) be the coordinate ring of the Graßmannian of 2-dimension subspaces in kn equipped in its standard Plücker coordinates. Then any subset of the Plücker coordinates generates a radical ideal in G(2, n). We note that there are subsets of 2-minors of a generic matrix that define non-radical ideals. For example the ideal generated by the four 2-minors [12|12], [12|23], [23|12], [23|23] of a generic 3 × 3 is not radical. A statement analogous to Corollary 7.12 for higher order Graßmannians is not true. Indeed, the point is that a set of m-minors of a generic matrix m×n does not generate a radical ideal in general (as it does for m = 2). For example in the Graßmannian G(3, 6) modulo [123], [124], [135], [236] the class of [125][346] is a non-zero nilpotent. gen sym Next we look into necessary conditions for Idk (XG ) and Idk (XG ) to be prime. The condition tie in with Proposition 2.8. Lemma 7.13. Let G = ([n], G) be a graph. sym k (i) If Id+1 (XG ) is prime then G does not contain a subgraph isomorphic to Ka,b for a+b > d (i.e. Ḡ is (n − d)-connected). gen k (ii) Assume G is bipartite with bipartition [n] = V1 ∪ V2 and d + 1 ≤ |V1 |, |V2 |. If Id+1 (XG ) is prime then deleting any |V1 | − d − 1 vertices from V1 and |V2 | − d − 1 vertices from V2 yields a connected graph. gen k (iii) If G = Bd with d ≥ 4 and X is the generic (d + 2) × (d + 2) matrix then Id+1 (XG ) is not prime. (i) Assume Ḡ is not (n − d)-connected. Then there are n − d − 1 vertices such that the graph obtained from Ḡ by deleting the vertices is disconnected. This implies that sym selecting in XG the rows and columns corresponding to the remaining d + 1 vertices yields a matrix which after reordering the vertices is block-diagonal with at least two blocks. Hence its determinant is non-zero and reducible. Since the determinant is among sym k a minimal generating set, it follows that Id+1 (XG ) cannot be prime. (ii) One easily checks that similar arguments as for the proof of the first part of (i) verify the assertion. Proof. 24 A. CONCA AND V. WELKER gen (iii) Set Yd = XB , i.e., d  x11 0 .. .     Yd =    0   xd+1,1 xd+2,1 0 x22 .. . ··· ··· .. . 0 0 .. . ··· xd+1,2 xd+2,2 0 ··· ··· xdd ··· ··· x1,d+1 x2,d+1 .. . .. . xd+1,d+1 xd+2,d+1 x1,d+2 x2,d+2 .. . .. . xd+1,d+2 xd+2,d+2      .     and J = Id+1 (Yd ) and let S be the polynomial ring whose indeterminates are the non-zero entries of Yd . First, we prove that for every d ≥ 1 the ideal J has the expected height, i.e. height J = 4. For d = 1, 2, 3 the ideal J is indeed prime of height 4: for d = 1 this is obvious because Y1 is the generic 3 × 3 matrix while for d = 2 and d = 3 it follows from the fact that the corresponding LSS-ideal is prime by virtue of Proposition 7.4. For d > 3 let P be a prime containing J. If P contains (x11 , x22 , x33 , x44 ) then height P ≥ 4. If P does not contain (x11 , x22 , x33 , x44 ) we may assume x11 6∈ P . Inverting x11 and using the standard localization trick for determinantal ideals one sees that P Sx11 contains, up to a change of variables, Id (Yd−1 ). Hence height P = height P Sx ≥ 4. Now that we know that J has height 4 to prove that J is not prime for d ≥ 4 it is enough to observe that J ⊂ (x11 , x22 , x33 , x44 ). The latter is straightforward since mod (x11 , x22 , x33 , x44 ) the submatrix of Y consisting of the first 4-rows as rank 2.  8. Questions and open problems In Corollary 3.4 and Corollary 3.4 we have seen that for the properties c.i. and prime of LkG (d) there is persistence along the parameter d but Example 2.2 shows persistence need not to hold for the property of being radical. Question 8.1. What patterns {d < asymk (radical, G) : LkG (d) radical } can occur for graphs G? We expect that erratic behavior can occur. For example we believe that there exists a graph G and a number d ≥ 3 such that LkG (d) and LkG (d + 2) are non-radical while LkG (d + 1) is radical. We have seen in Theorem 2.9, [22, Cor. 1.4] and [22, Thm 1.1] that for certain fixed d we can combinatorially classify the graphs G for which LkG (d) is radical, complete intersection or prime. These classifications are based on rather simple graph theoretic properties of G. Question 8.2. Fix a number d. Are there a (simple) combinatorially defined classes Gradical,d , Gc.i.,d and Gprime,d such that (say for fields k of characteristic 0): LkG (d) is radical ⇔ G ∈ Gradical,d and LkG (d) is a complete intersection ⇔ G ∈ Gc.i.,d and LkG (d) is prime ⇔ G ∈ Gprime,d ? As said above, we expect that the pattern of numbers d for which LkG (d) is radical can be quite erratic. Therefore, let us concentrate on the properties prime and complete intersection. Here the fact that the property is inherited by subgraphs supports hope for the classifications asked for in Question 8.2. After Theorem 2.9 d = 3 for complete intersection and d = 4 for primeness are the first parameters for which the classification is open. For d = 3 we do not even have a conjecture when LkG (d) is a complete intersection. The graph G from Figure 1(1) gives a graph G for which it can be checked that LkG (3) is not a complete LSS-IDEALS AND COORDINATE SECTIONS 25 intersection for char k = 0 while G still satisfies the necessary conditions from Proposition 2.8, i.e. has no subgraphs Ka,b with a + b = 5 and B4 . For d = 4 geometric results from Lovász’s [27, Ch 9.4] book indicate that Proposition 2.8 still carries the essential obstacles for LkG (4) being prime. Question 8.3. Is it true that LkG (4) is prime if and only if G does not contain a subgraph isomorphic to Ka,b for a + b = 5 and no subgraph isomorphic to B4 ? k Via the fact that primeness of LkG (d) implies primeness of Id+1 (XG ) a result by Giusti and Merle [18, Thm. 1.6.1] guides the intuition behind the following question. Question 8.4. Let G be a subgraph of Km,n graph and assume m ≤ n. Is it true that LkG (m − 1) is prime if and only if G does not contain a subgraph isomorphic to Ka,b for a + b ≥ m? By Proposition 7.4 and Proposition 7.5 we know if LkG (d) is radical or prime then so are sym k and Id+1 (XG ) respectively. But our general bounds for asymk (radical, G) and asymk (prime, G) from Corollary 5.5 are not good enough to make use of this implication. Indeed, Corollary 7.7 shows that for the properties complete intersection and prime and n large enough there are graphs G for which Proposition 7.5 does not prove primality of an interesting ideal. On the other hand the use of Theorem 2.10 in Theorem 7.11 shows that one can take advantage of this connection in some cases. It would be interesting to exhibit classes different from forests where this is possible. gen k Id+1 (XG ) Question 8.5. Are there more interesting classes of graphs G = ([n], E) for which asymk (c.i., G) ≤ n or asymk (prime, G) ≤ n − 1 ? Despite the fact that Proposition 7.6 destroys the hope for using Theorem 7.11 for general graphs, it would be interesting replace the asymptotic result by an actual value. By Corollary 7.7 for n large we have asymk (prime, Kn ) = 2n −  cn for some numbers cn ∈ o(n) which using the notation of Proposition 7.6 satisfy n − wn2−2 + 1 ≥ cn ≥ 2. But we have no conjecture for an actual formula for cn . Question 8.6. What is the value of asymk (prime, Kn )? For radicality we have a concrete conjecture in the case G = Kn . Conjecture 8.7. We conjecture that asymk (radical, Kn ) = 1 (at least if char k = 0). In other words, given a matrix of variables X of size n×d we conjecture the ideal of the off-diagonal entries of XX T is radical for all n, d. It would also be interesting to study the ideal generated by all the entries of XX T . We note that the symplectic version of this problem has been investigated by De Concini in [12]. Next we turn to open problems about hypergraph LSS-ideals. We know from Theorem 2.5(2) that for a hypergraph H = (V, E) for which E is a clutter the ideal LkH (d) is a radical complete intersection for d ≥ pmd(G). But we prove in Theorem 2.5(3) that LH (k ) is prime for d ≥ pmd(H) + 1 only in the case that H is a graph. Question 8.8. Is it true that for a hypergraph H = (V, E), where E is a clutter, we have LkH (d) is prime for d ≥ pmd(H) + 1? Similarly, the persistence results from Theorem 2.3 ask for generalizations. Question 8.9. Let H = (V, E) be a hypergraph, where E is a clutter. Is it true that if LkH (d) is a complete intersection (resp. prime) then so is LkH (d + 1)? For a number r ≥ 1 we call a hypergraph H = (V, E) an r-uniform graph if every element of E has cardinality r. In particular, E then it is a clutter. For example, graphs are 2-uniform graphs. We say that an r-uniform graph H = (V, E) is r-partite if there is a partition V = V1 ∪ · · · ∪ Vk such that #(A ∩ Vi ) = 1 for all i ∈ [r]. For r = 2 a 2-uniform hypergraph is 2-partite if and only if the hypergraph considered as a graph is bipartite. Now we connect the study of ideal LkH (d) for r-uniform (r-partite) graphs with the study of coordinate sections of the space of tensors with a given rank. We consider two mappings: 26 A. CONCA AND V. WELKER (φ) Let e1 , . . . , en be the standard basis vectors of kn . For vectors vi = (vi,j )j∈[d] ∈ kd , i ∈ [r], consider the map φ that sends (v1 , . . . , vr ) ∈ (kd )n to the tensor d X X j=1 σ∈Sr vσ(i),j · · · vσ(r),j eσ(1) ⊗ · · · ⊗ eσ(r) ∈ kn ⊗ · · · ⊗ kn . | {z } r We take the sums over the different tensors arising from ei1 ⊗ · · · ⊗ eir , for numbers 1 ≤ i1 ≤ · · · ≤ ir ≤ n, by permuting the positions as standard basis of the space of symmetric tensors. (j) (ψ) Let n = n1 + · · · + nr for natural numbers n1 , . . . , nr ≥ 1. Let ei ∈ knj be the i-th (j) standard basis vector of knj , i ∈ [nj ] and j ∈ [r]. For vectors vi = (vi,j )j∈[d] ∈ kd for (j) i ∈ [nj ] and j ∈ [r] consider the map ψ that sends (vi )(i,j)∈[nj ]×[r] to X (1) (r) (1) (r) vi1 · · · vir ei1 ⊗ · · · ⊗ eir ∈ kn1 ⊗ · · · ⊗ knr . (i1 ,...,ir )∈[n1 ]×···×[nr ] (r) (1) We take the tensors ei1 ⊗ · · · ⊗ eir for numbers ij ∈ [nj ], j ∈ [r] as the standard basis of k n1 ⊗ · · · ⊗ k nr . Recall that a (symmetric) tensor has (symmetric) rank ≤ d it can written as a sum of ≤ d decomposable (symmetric) tensors. For more details on tensor rank and the geometry of bounded rank tensors we refer the reader to [26]. Let H = (V, E) be a hypergraph. We write V(LkH (d)) for the vanishing locus of LkH (d). The the definition of the maps φ and ψ immediately implies the following proposition. Proposition 8.10. Let H = ([n], E) be an r-uniform hypergraph and k an algebraically closed field. (i) Then the restriction of the map φ to V(LkH (d)) is a parametrization of the space of symmetric tensors in kn ⊗ · · · ⊗ kn of rank ≤ d which when expanded in the standard basis has zero {z } | r coefficient for the basis elements indexed by 1 ≤ i1 < · · · < ir ≤ n and {i1 , . . . , ir } ∈ E. In particular, the Zariski-closure of the image of the restriction is irreducible if LkH (d) is prime. (ii) If H is r-partite with respect to the partition V = V1 ∪· · ·∪Vr where |Vi | = ni , i ∈ [r]. Then the restriction of the map ψ to V(LkH (d)) is a parametrization of the space of tensors in kn1 ⊗ · · · ⊗ knr of rank ≤ d which when expanded in the standard basis have zero coefficient for the basis elements indexed by i1 , . . . , ir where {i1 , . . . , ir } ∈ E. In particular, the Zariski-closure of the image of the restriction is irreducible if LkH (d) is prime. Proposition 8.10 gives further motivation to Question 8.8. Indeed, it suggests to strengthen Question 8.5. Question 8.11. Let k be an algebraically closed field. Can one describe classes of r-uniform hypergraphs H for which LkH (d) is prime for some d bounded from above by the maximal symmetric rank of a symmetric sensor in kn ⊗ · · · ⊗ kn . | {z } r An analogous question can be asked for r-partite r-uniform hypergraphs and tensors of bounded rank. References [1] J.Abbott, A.M.Bigatti, G.Lagorio, CoCoA-5: a system for doing Computations in Commutative Algebra, Available at http://cocoa.dima.unige.it. [2] L.L.Avramov, Complete intersections and symmetric algebras, J. Algebra 73 (1981) 248–263. [3] W.Bruns, U.Vetter, Determinantal rings, Lecture Notes in Math. 1327, Springer-Verlag, Berlin, 1988. [4] W.Bruns, A.Conca, Gröbner bases and determinantal ideals, in: Commutative Algebra, Singularities and Computer Algebra (Sinaia, 2002), 9–66, NATO Sci. Ser. II Math. Phys. Chem. 115, Kluwer Acad. Publ., Dordrecht, 2003. LSS-IDEALS AND COORDINATE SECTIONS 27 [5] A.Boocher, Free resolutions and sparse determinantal ideals, Math. Res. Lett. 19 (2012) 805–821. [6] Bourbaki, Algebra II, Chapters 4–7, Springer-Verlag, Berlin, 2003. [7] D. Cartwright, B.Sturmfels, The Hilbert scheme of the diagonal in a product of projective spaces, Int. Math. Res. Not., no. 9, (2010) 1741–1771. [8] A.Conca, E. De Negri, E.Gorla, Universal Gröbner bases for maximal minors, Int. Math. Res. Not. IMRN, no. 11, (2015) 3245–3262. [9] A.Conca, E.De Negri, E.Gorla, Universal Gröbner bases and Cartwright-Sturmfels ideals, arXiv:1608.08942. [10] A.Conca, E.De Negri, E.Gorla, Multigraded generic initial ideals of determinantal ideals, in: Homological and Computational Methods in Commutative Algebra, A. Conca, J. Gubeladze, Joseph, T. Römer (Eds.), 81–96, INdAM Series 20, Springer-Verlag, Heidelberg, 2017. [11] A.Conca, E.De Negri, E.Gorla, Cartwright-Sturmfels ideals associated to graphs and linear spaces, arXiv:1705.00575. [12] C.De Concini, Symplectic standard tableaux, Adv. Math. 34 (1979) 1–27. [13] C.De Concini, E.Strickland, On the variety of complexes, Adv. Math. 41 (1981) 57–77. [14] C.De Concini, C.Procesi, A characteristic free approach to invariant theory, Adv. Math. 21 (1976) 330–354. [15] P.Diaconis, D.Eisenbud, B.Sturmfels, Lattice walks and primary decomposition, in: Mathematical Essays in Honor of Gian-Carlo Rota, 173–93, Prog. Math. 161, Birkhäuser Boston, Boston, MA, 1998. [16] R.Diestel, Graph Theory, 3rd Ed., Graduate Texts in Math. 173, Springer-Verlag, Heidelberg, 2000. [17] D.Eisenbud, Linear sections of determinantal varieties, Amer. J. Math. 110 (1988) 541–575. [18] M.Giusti, M.Merle, Singularités isolées et sections planes de variétés déterminantielles. II. Sections de variétés déterminantielles par les plans de coordonnées. Algebraic geometry (La Rábida, 1981), 103118, Lecture Notes in Math. 961, Springer-Verlag, Berlin, 1982. [19] D.R.Grayson, M.E.Stillman, Macaulay2, a software system for research in algebraic geometry, Available at http://www.math.uiuc.edu/Macaulay2/. [20] C.Greene, T.Zaslavsky, On the interpretation of Whitney numbers through arrangements of hyperplanes, zonotopes, non-Radon partitions, and orientations of graphs, Trans. Amer. Math. Soc. 280 (1983) 97–126. [21] J.Herzog, T.Hibi, F.Hreinsdóttir, T.Kahle, J.Rauh, Binomial edge ideals and conditional independence statements, Adv. in Appl. Math. 45 (2010) 317–333. [22] J.Herzog, A. Macchia, S.Madani, V.Welker, On the ideal of the orthogonal representations of a graph in R2 , Adv. in Appl. Math. 71 (2015) 146–173. [23] S.Hoşten, S.Sullivant, Ideals of adjacent minors. J. Algebra 277 (2004) 615–642. [24] C.Huneke, On the symmetric algebra of a module, J. Algebra 69 (1981) 113-119. [25] D.Kiani, S.Saeedi Madani, The Castelnuovo-Mumford regularity of binomial edge ideals, J. Combin. Theory Ser. A 139 (2016) 80–86. [26] J.M. Landsberg, Tensors: geometry and applications, Graduate Studies in Mathematics 128, American Mathematical Society, Providence, RI, 2012 [27] L.Lovász, Geometric Representations of Graphs, http://www.cs.elte.hu/˜lovasz/geomrep.pdf, 2016. [28] L.Lovász, M.Saks, A.Schrijver, Orthogonal representations and connectivity of graphs, Linear Alg. Appl. 114/115 (1989) 439–454. [29] K.Matsuda, S.Murai, Regularity bounds for binomial edge ideals, J. Commut. Algebra 5 (2013) 141–149. [30] J.S. Milne, Algebraic Geometry, Version 6.02, http://www.jmilne.org/math/CourseNotes/AG.pdf, 2017. [31] C.Musili, C.S.Seshadri, Schubert varieties and the variety of complexes, in: Arithmetic and Geometry, Vol. II, 329–359, Progr. Math. 36, Birkhäuser Boston, Boston, MA, 1983. [32] M.Ohtani, Graphs and ideals generated by some 2-minors, Comm. Alg. 39 (2011) 905–917. [33] A.Tchernev, Universal complexes and the generic structure of free resolutions, Michigan Math. J. 49 (2001) 65–96. [34] H.Weyl, The Classical Groups, their Invariants and Representations, Princeton Univ. Press, Princeton, N.J., 1939. Dipartimento di Matematica, Università di Genova, Via Dodecaneso 35, I-16146 Genova, Italy E-mail address: [email protected] Philipps-Universität Marburg, Fachbereich Mathematik und Informatik, D-35032 Marburg, Germany E-mail address: [email protected]
0math.AC
Link Adaptation Algorithms for Dual Polarization Mobile Satellite Systems Anxo Tato1 , Pol Henarejos2 , Carlos Mosquera1 , and Ana Pérez-Neira2,3 arXiv:1803.07318v1 [eess.SP] 20 Mar 2018 1 2 Universidade de Vigo [email protected], [email protected] www.gpsc.uvigo.es Centre Tecnològic de Telecomunicacions de Catalunya Castelldefels, Barcelona [email protected], [email protected] www.cttc.cat 3 Universitat Politècnica de Catalunya, Barcelona Abstract. The use of dual polarization in mobile satellite systems is very promising as a means for increasing the transmission capacity. In this paper we study a system which uses simultaneously two orthogonal polarizations in order to communicate with the users. The application of MIMO signal processing techniques along with Adaptive Coding and Modulation in the forward link can provide remarkable throughput gains up to 100 % when compared with the single polarization system. The gateway is allowed to vary the MIMO and Modulation and Coding Schemes for each frame. The selection is done by means of a link adaptation algorithm which uses a tunable margin to achieve a predefined target Frame Error Rate. Key words: link adaptation, Adaptive Coding and Modulation, MIMO, Dual-polarization, Satellite communications, Mobile Satellite Systems 1 Introduction In recent years, the spectrum saturation and the increasing demand for higher data rates in a ubiquitous way encourages the engineers to design new techniques in order to increase the capacity of communication systems without resorting to expand the occupied bandwidth. Two of these techniques are the leverage of multiple antennas at both transmitter and receiver by means of MIMO (Multiple Input Multiple Output) signal processing techniques and also the so-called Adaptive Coding and Modulation (ACM) or link adaptation. Both are part of many current terrestrial wireless communication standards such as LTE [1] and IEEE 802.16 [2] for cellular technologies and IEEE 802.11 [3] for wireless local area networks. In this paper we propose to apply MIMO techniques to mobile satellite communication systems by exploiting the polarization domain. Satellite links operating at low frequency bands such as L- and S-bands, usually rely on a single circular polarization, either RHCP (Right Hand Circular Polarization) or LHCP 2 Anxo Tato, Pol Henarejos,Carlos Mosquera, Ana Pérez-Neira (Left Hand Circular Polarization), to avoid the effects of the Faraday rotation [4]. Here we propose the simultaneous use of both orthogonal polarizations within the same beam to communicate with the users following up some preliminary studies presented in [5] within the framework of SatNEx-IV, the European Satellite Network of Experts. An algorithm to switch among different MIMO schemes will be presented. In particular, SISO, Orthogonal Polarization-Time Block Codes (OPTBC), Polarization Modulation (PMod) or V-BLAST (Vertical Bell Laboratories Layer Space-Time) will be chosen as a function of a set of effective Signal to Noise Ratio (SNR) metrics. On the other hand, the use of ACM techniques allows the system to adapt its instantaneous rate to the current channel capacity without designing the system for the channel worst case. In this paper, following our previous works [6], [7] and [8], we propose the use of a link adaptation algorithm with an adaptive margin for selecting the Modulation and Coding Scheme of each frame (MODCOD or MCS). This algorithm operates together with the MIMO mode selection scheme to increase the spectral efficiency whilst trying to maintain the Frame Error Rate (FER) at a level specified by the Quality of Service (QoS) parameter of the connection. The remainder of the article is structured as follows. Section 2 provides a description of the satellite communication system, including the link adaptation algorithms, an overview of the channel model and how the channel series are generated. Section 3 describes the link adaptation algorithms for selecting both MIMO mode and MCS. Section 4 provides the simulation results of the algorithms in a maritime mobile scenario. Lastly, in Section 5 we collect the main conclusions and note the future work on this topic. 2 System model We consider a satellite communications system which serves mobile users operating in L- or S-band. A link adaptation algorithm is proposed for the forward link from the gateway towards the mobile terminal (MT). Typically, at these bands only one polarization is used to protect from high cross-polarization leakage. For example, the service BGAN (Broadband Global Area Network), standardized by the ETSI as TS 102 744, only employs RHCP [9]. In higher frequency bands, like Ku and Ka, the high XPD (cross polar discrimination) would make it possible to use two independent streams in both polarizations. The system we propose here, and for which we develop the adaptive algorithms, uses simultaneously both polarizations, yielding a 2x2 MIMO system. The system that we analyse is narrow-band and single-carrier, and to some extent it is inspired by BGAN. The baseline Single Input Single Output (SISO) system is complemented by additional MIMO modes, namely OPTBC, Polarization Modulation (PMod) and V-BLAST: – OPTBC (Orthogonal Polarization-Time Block Code) is based on Alamouti space-time coding, used for achieving transmit diversity and introduced in Link Adaptation Algorithms for Dual Polarization Mobile Satellite Systems 3 [10]. The spatial components in Alamouti are replaced by the two available polarizations in OPTBC. – PMod is analogous to Spatial Modulation (SM) techniques [11], with only one polarization per channel use transmitting the symbols from a given constellation. One extra bit of information is conveyed indicating which polarization is chosen. For a QPSK constellation this implies a 50 % gain in spectral efficiency. – In V-BLAST [12] two independent symbols are transmitted per channel use and the receiver is in charge of reducing the cross-stream interference to perform the detection. All these three MIMO schemes do not require Channel State Information (CSI) at the transmitter and therefore are suitable for the satellite scenario where the CSIT is outdated due to the long round trip time. In addition to the forward link, where our algorithms operate, we assume that there is a feedback channel in the return link used by the Mobile Terminal (MT) to inform the gateway about the CSI, the result of the frames decoding (in the form of ACK/NACK) and the optimum transmission mode (which is calculated by the receiver). All these information is used by the gateway, our transmitter, in the selection of the preferred MCS by the link adaptation algorithm we propose. The signal model for a given time instant n is √ (1) yn = P Hn xn + wn where P is the transmitted power, Hn ∈ C2x2 is the channel matrix, yn ∈ C2 is the vector of the received signal which has a component per each polarization, xn ∈ C2 is the transmitted signal and wn ∼ CN (0, σ 2 I2 ) represents the additive complex white Gaussian noise (AWGN). Therefore, the resultant Signal to Noise Ratio is SNR = P/σ 2 . The transmitted symbols are grouped into blocks or packets (codewords) which span N = 2560 symbols, transmitted with a baud rate of 33600 symbols/s, which gives a frame length of 80 ms. As we use frames of just one block length, hereafter we will employ the term frame for referring to a codeword. In order to speed up the simulations, we do not implement the entire signal processing block chain and thus, we use Physical Layer Abstraction techniques, in particular the Mutual-Information Effective SNR [6]. The comparison of the effective SNR of a received frame with a threshold SNR of the MCS used to transmit that frame allows us to decide if the frame can be decoded (the effective SNR is higher than the corresponding threshold) or not. The effective SNR of a frame, SNRef f , given the set of the N SNRs of each symbol γn can be obtained with ! N 1 X −1 SNRef f = Φ Φ(γn ) , (2) N n=1 procedure called SNR compression in [13]. The SNR γn for each symbol period is calculated for the different MIMO modes as: 4 Anxo Tato, Pol Henarejos,Carlos Mosquera, Ana Pérez-Neira – SISO: γn = SNR|[Hn ]11 |2 – OPTBC: γn = (3) SNR kHn k2F 2 (4) – PMod: |[Hn ]11 |2 + |[Hn ]22 |2 2 – V-BLAST (MMSE (Minimum Mean Square Error) receiver): (5) γn = SNR γn,k = 1 −1 SNR H [(I2 + Hn Hn )−1 ]k,k 2 (6) In the previous equations [Hn ]ij denotes the coefficient (i, j) of the channel matrix for time instant n, k indicates the number of the stream (1 or 2), I2 is the 2 × 2 identity matrix and kHn kF denotes the Frobenius norm of the matrix. We should say that in the case of V-BLAST the SNR expression depends on the type of receiver. Throughout this work we assume the MMSE receiver is used for V-BLAST reception, given its simplicity and robustness against noise. Table 1 collects all the available transmission modes and MCS, including the required effective SNR for correct decoding (obtained from the curve of SNR vs Mutual Information) and corresponding spectral efficiency in bps/Hz. Table 1. Coding rate options for the F80T1Q-1B bearer [9], QPSK constellation. L8 L7 L6 L5 L4 L3 L2 L1 R Coding rate 0.34 0.40 0.48 0.55 0.63 0.70 0.77 0.83 0.87 Threshold SNR (SNRth ) (dB) -2.15 -1.21 -0.09 0.83 1.84 2.74 3.67 4.54 5.19 Spectral efficiency SISO/OPTBC 0.68 0.80 0.96 1.10 1.26 1.40 1.54 1.66 1.74 Spectral efficiency PMod 1.02 1.20 1.44 1.65 1.89 2.10 2.31 2.49 2.61 Spectral efficiency V-BLAST 1.36 1.60 1.92 2.20 2.52 2.80 3.08 3.32 3.48 2.1 Channel model The simulation of the mobile satellite dual polarized channel has been done following the work of [14]. The channel is obtained as the sum of three different components: the Line-of-Sight (LoS), the specular reflected signal and the diffuse components, produced by the scatterers near the MT. LoS and specular components are modelled as Rice random variables whereas the diffuse component, which causes the fast fading, is Rayleigh distributed. These three components are grouped into the following channel matrix: Link Adaptation Algorithms for Dual Polarization Mobile Satellite Systems H = βejφ KL + ξejφ KS + DKD 5 (7) KL , KS and KD are the K-factor matrices which collect the Rice factors of each polarization for the LoS, specular and diffuse components, respectively. The two matrices β and ξ are related to how the channel mixes the two polarizations and matrix D entries are complex Gaussian random variables with a given covariance matrix. The parameters for building all these matrices depend on the considered environment and can be found in [14]. 2.2 Channel generation Fig. 1 shows the block diagram of the channel time series generator. One important aspect of the generated channel series is the time correlation and the Doppler spread. Assuming the Clarke’s model, the coherence time can be approximated by 3λ (8) τc = √ , 4v π being λ the wavelength and v the mobile terminal speed. We first generate Q = dN/(τc fs )e independent realizations of the channel matrices from the uniformly distributed random phases and the complex Gaussian random matrix D. Then we make a linear interpolation to obtain the N channel matrices and a low-passfilter with cut-off frequency equal to the Doppler spread, Ds = v/λ, is applied. Lastly, the channel matrices are scaled to yield the given average SNR of the simulation. Fig. 1. Block diagram of the channel time series generator 3 Algorithm for mode and MCS selection In this paper, the link adaptation procedure has to select the MCS and the MIMO mode (SISO, OPTBC, PMod or V-BLAST). We split these tasks between 6 Anxo Tato, Pol Henarejos,Carlos Mosquera, Ana Pérez-Neira the gateway and the MT. On the one hand, the MT selects the MIMO mode that achieves the highest throughput given the current SNR. The receiver needs to compute the effective SNR for all modes to choose the most efficient. This task is performed by the receiver to reduce the feedback load. In addition, the transmitter (gateway) is informed by the MT of the ACK/NACK, the preferred MIMO mode and the effective SNR for that mode, and selects consequently the MCS of the following frame. In order to formalize the procedure let us define the following matrices. S is the matrix with the spectral efficiency of each combination of MIMO mode - MCS. For example, the element Sij is the spectral efficiency of MIMO mode i and MCS number j. We also define the vector SNRef f , which represents the CSI and whose elements are the effective SNR for each one of the transmission modes. Lastly, we have the vector with the threshold SNR of each MCS SNRth ; note that this threshold is the same for all MIMO modes. The optimization problem to choose the optimum mode T̂ can be written as T̂ = i s. to Rij = max{Rij }, i,j (9) with the corresponding matrix of rates given by Rij = Sij [SNRef f,i ≥ SNRth,j ]. If no MCS verifies the required effective SNR, i.e., all Rij are zero, or in case of a tie, the MIMO mode with the highest effective SNR is chosen and reported back to the gateway. The choice of the MCS at the gateway follows our previous work in [7], which exploits an adaptive margin. Here, for lack of space, we do not replicate the derivation of the algorithm; those interested readers are referred to [6],[7]. The gateway selects an MCS mi using a Lookup Table (LUT), represented by means of a function Π(·) which maps SNR intervals to MCSs: mi = Π (SNRi−d + ci ). All this is shown graphically in the diagram of Fig. 2. The value of the SNR reported back by the MT, SNRi−d , plus a margin ci is introduced in the LUT for selecting the MCS; this margin is updated when new feedback comes in. We assume a round trip time which amounts to the duration of d frames. The recursive equation for updating the value of the margin is ci+1 = ci − µ (i−d − p0 )θ. θ2 + SNR2i−2d (10) This recursion is derived in [6] to solve the following optimization problem 2 min J(c) = min |E[] − p0 | . c c (11) The involved variables are SNRi−2d , the effective SNR used by the LUT to decide the MCS of frame i−d, and the acknowledgement i−d (1 for ACK, 0 for NACK). µ and θ are two constants which take the values 1 and 10, respectively. In this work we suppose the objective FER, p0 , has a fixed value, although there are some studies like [15] which show the benefits of having a variable p0 in order to maximize the throughput. Link Adaptation Algorithms for Dual Polarization Mobile Satellite Systems 7 Fig. 2. Block diagram of the MCS selection algorithm with the LUT. 4 Simulation results Several simulations are performed to evaluate the spectral efficiency gain from the use of two polarizations simultaneously, and also to understand the potential robustness coming from the use of an adaptive margin in the link adaptation algorithm. All the simulations results presented here are obtained for a maritime scenario with a vessel moving at a constant speed of 50 km/h. The parameters of the channel generator were taken from [14]. The carrier frequency in the simulations is 1.6 GHz, a typical frequency of some Mobile Satellite Systems operating in the L-band. QPSK modulation with frames of 80 ms and 2560 symbols (baud rate of 33600 symbols/s) are used in the physical layer, similarly to the bearer F80T1Q-1B of BGAN [9]. Each simulation comprises the transmission and reception of N = 60, 000 frames for a specific average SNR, ranging from -5 dB to 25 dB in steps of 2.5 dB. Average spectral efficiency, defined as (1 − i )rmi /N , and cumulative FER during the whole transmission is also computed for each simulation. In the previous expression rj is the rate of the jth MCS, mi is the MCS selected for frame i and i is the corresponding ACK. Lastly, the RTT is set to 7 frames (560 ms) to approximate the feedback delay for GEO satellites. Contrary to other publications which assume instantaneous feedback, here it has a reasonable value and the proposed scheme is robust even with this delay. The objective of the first set of simulations is to show the benefits of using two orthogonal polarizations simultaneously to serve a mobile user in low bands of the spectrum. Despite the XPD being lower in these bands than in Ku and Ka bands, it provides a significant throughput gain even with the available power split between the two polarizations. In these simulations the SISO case (transmit only in one polarization) is compared with the use of the two polarizations (MIMO) based on the algorithm for choosing dynamically the MIMO mode of Equation (9). In both cases ACM is employed with a fixed margin c = −1 dB in the LUT (see Fig. 2). The results collected in Table 2 show that use of dual polarization provides a gain higher than 50% for most cases. Interestingly, OPTBC makes it possible to extend the operation range at low SNR below SISO. As the SNR increases the selected mode turns to be PMod instead of OPTBC with gains of up to 8 Anxo Tato, Pol Henarejos,Carlos Mosquera, Ana Pérez-Neira Table 2. Results of the comparison of single polarization (SISO) and adaptive dual polarization (MIMO). Average SNR Selected modes -5 dB OPTBC Efficiency (SISO) Efficiency (MIMO) 0 bps/Hz 0.68 bps/Hz Gain Inf -2.5 to 7.5 dB PMod 0.68 - 1.50 bps/Hz 1.02 - 2.32 bps/Hz 50 - 55 % 10 dB PMod (30 %), BLAST (70 %) 1.69 bps/Hz 2.47 bps/Hz 47 % 12.5 to 25 dB BLAST 1.73 - 1.74 bps/Hz 2.77 - 3.48 bps/Hz 60 - 100 % 55%. At an average SNR of 10 dB both PMod and V-BLAST are employed and for higher SNRs V-BLAST is mainly used. The V-BLAST MIMO mode, which sends two simultaneous streams of symbols, offers up to 100% gain in terms of throughput, i.e., it can double the capacity. Next we let the margin to adapt in an effort to match a target FER. Figure 3 shows the results obtained in terms of average spectral efficiency and FER. An ACM scheme with a fixed margin of -1 dB is compared with a link adaptation algorithm with adaptive margin for two different values of target FER, 10% and 1%. 0 10 3 −1 10 2.5 −2 10 FER Spectral Efficiency (bps/Hz) 3.5 2 −3 10 1.5 −4 0.5 −5 10 Fixed margin (−1 dB) Adaptive margin (target FER 10 %) Adaptive margin (target FER 1 %) 1 Fixed margin (−1 dB) Adaptive margin (target FER 10 %) Adaptive margin (target FER 1 %) −5 0 5 10 15 Average SNR (dB) 20 25 10 −5 0 5 10 15 20 25 Average SNR (dB) Fig. 3. Average spectral efficiency (left) and FER (right) In Fig. 3 we observe the behaviour of the algorithm in terms of spectral efficiency and FER for a wide range of LOS SNRs. The spectral efficiency grows linearly with the SNR in dB until it reaches its maximum value of 3.48 bps/Hz. When looking only at the throughput there are not significant differences between using a fixed and an adaptive margin. Furthermore, we can observe how the target FER p0 influences the final spectral efficiency. For example, the simulations with the target FER 1 % have a slightly better efficiency than those with target FER 10 %. This dependence of the spectral efficiency with the target error rate was already studied in [15] where the authors show that there is an optimal FER which maximizes the throughput. Link Adaptation Algorithms for Dual Polarization Mobile Satellite Systems 9 In general, the margin ci converges to a value and oscillates around it, except for the three higher SNRs where it grows indefinitely. We have observed that the value of the final margin depends on the operation point (LOS SNR), the target FER p0 , the channel conditions and the mobile speed. This last fact is exemplified in [7] where we show the evolution of the margin in an Intermediate Tree Shadow environment for several MT speeds. On the other side, the FER behaves very differently when adapting the margin with respect to the fixed case; as shown on the right plot in Figure 3, a fixed margin cannot guarantee a prescribed FER for different SNR values. As opposed to this, the adaptive algorithm exposed earlier matches the target FER, 0.1 and 0.01 in the example, for a wide range of LOS SNRs. Therefore, the combination of the transmission mode selection and the adaptive margin achieves remarkable throughput gains when compared with the SISO case, whilst guaranteeing a physical layer FER suited to the prescribed QoS. 5 Conclusions and future work The simultaneous use of dual orthogonal circular polarizations in L/S-bands for mobile satellite communication systems is proposed in this paper. The application of MIMO techniques to this satellite scenario, by switching among several MIMO modes, generates significant increments in the spectral efficiency that can get close to 100% for high values of SNR, without using extra bandwidth or power. Moreover, we have proposed link adaptation algorithms to select the MIMO mode and the MCS of each frame based on an adaptive margin. This helps the system to adapt itself to the channel conditions and guarantee a prefixed target Frame Error Rate for a wide range of SNRs. Lastly, in the future we plan to improve the algorithm through the online calculation of the optimal FER which maximizes the spectral efficiency. 6 Acknowledgements This work was partially funded by the Agencia Estatal de Investigación (Spain) and the European Regional Development Fund under project MYRADA (TEC201675103-C2-2-R). Also funded by the Xunta de Galicia (Secretarı́a Xeral de Universidades) under a predoctoral scholarship (co-funded by the European Social Fund) and under Agrupación Estratéxica Consolidada de Galicia accreditation 2016-2019 (co-funded by the European Regional Development Fund - ERDF). Part of the research was done during a stay at the Centre Tecnològic de Telecomunicacions de Catalunya (CTTC) supported by the project SatNEx-IV, cofunded by the European Space Agency (ESA). This work has also received funding from the Spanish Ministry of Economy and Competitiveness (Ministerio de Economı́a y Competitividad) under project TEC2014-59255-C3-1-R and from the Catalan Government (2014SGR1567). 10 Anxo Tato, Pol Henarejos,Carlos Mosquera, Ana Pérez-Neira References 1. “LTE; evolved universal terrestrial radio access (E-UTRA); physical layer procedures,” ETSI TS 136 213 V8.8.0 (2009-10). 2. “IEEE standard for air interface for broadband wireless access systems,” IEEE Std 802.16-2012 (Revision of IEEE Std 802.16-2009), pp. 1 –2542, 17 2012. 3. “IEEE standard for information technology–telecommunications and information exchange between systems local and metropolitan area networks–specific requirements part 11: Wireless lan medium access control (MAC) and physical layer (PHY) specifications,” IEEE Std 802.11-2012 (Revision of IEEE Std 802.11-2007), pp. 1–2793, 29 2012. 4. M. Richharia, Mobile Satellite Communications: Principles and Trends, 2nd ed. Wiley, 2014. 5. P. Henarejos, A. Perez-Neira, N. Mazzali, and C. Mosquera, “Advanced signal processing techniques for fixed and mobile satellite communications,” in 2016 8th Advanced Satellite Multimedia Systems Conference and the 14th Signal Processing for Space Communications Workshop (ASMS/SPSC), Sept 2016, pp. 1–8. 6. A. Rico-Alvariño, J. Arnau, and C. Mosquera, “Link adaptation in mobile satellite links: schemes for different degrees of csi knowledge,” International Journal of Satellite Communications and Networking, vol. 34, no. 5, pp. 679–694, 2016, sat.1164. [Online]. Available: http://dx.doi.org/10.1002/sat.1164 7. A. Rico-Alvariño, A. Tato, and C. Mosquera, “Robust adaptive coding and modulation scheme for the mobile satellite forward link,” in Signal Processing Advances in Wireless Communications (SPAWC), 2015 IEEE 16th International Workshop on, June 2015, pp. 530–534. 8. A. Tato, C. Mosquera, and I. Gomez, “Link adaptation in mobile satellite links: field trials results,” in 2016 8th Advanced Satellite Multimedia Systems Conference and the 14th Signal Processing for Space Communications Workshop (ASMS/SPSC), Sept 2016, pp. 1–8. 9. “Satellite component of UMTS (S-UMTS); family SL satellite radio interface,” ETSI TS 102 744, Oct. 2015. 10. S. M. Alamouti, “A simple transmit diversity technique for wireless communications,” IEEE Journal on Selected Areas in Communications, vol. 16, no. 8, pp. 1451–1458, Oct 1998. 11. P. Henarejos and A. I. Perez-Neira, “Dual polarized modulation and reception for next generation mobile satellite communications,” IEEE Transactions on Communications, vol. 63, no. 10, pp. 3803–3812, Oct 2015. 12. P. W. Wolniansky, G. J. Foschini, G. D. Golden, and R. A. Valenzuela, “V-blast: an architecture for realizing very high data rates over the rich-scattering wireless channel,” in 1998 URSI International Symposium on Signals, Systems, and Electronics. Conference Proceedings (Cat. No.98EX167), Sep 1998, pp. 295–300. 13. F. Kaltenberger, I. Latif, and R. Knopp, “On scalability, robustness and accuracy of physical layer abstraction for large-scale system-level evaluations of LTE networks,” in 2013 Asilomar Conference on Signals, Systems and Computers, Nov 2013, pp. 1644–1648. 14. M. Sellathurai, P. Guinand, and J. Lodge, “Space-time coding in mobile satellite communications using dual-polarized channels,” IEEE Transactions on Vehicular Technology, vol. 55, no. 1, pp. 188–199, Jan 2006. 15. S. Park, R. C. Daniels, and R. W. Heath, “Optimizing the target error rate for link adaptation,” in 2015 IEEE Global Communications Conference (GLOBECOM), Dec 2015, pp. 1–6.
7cs.IT
arXiv:1508.07552v1 [math.RA] 30 Aug 2015 Canonical and n-canonical modules on a Noetherian algebra Mitsuyasu Hashimoto Department of Mathematics, Okayama University Okayama 700–8530, JAPAN [email protected] Dedicated to Professor Shiro Goto on the occasion of his 70th birthday Abstract We define canonical and n-canonical modules on a module-finite algebra over a Noether commutative ring and study their basic properties. Using n-canonical modules, we generalize a theorem on (n, C)-syzygy by Araya and Iima which generalize a well-known theorem on syzygies by Evans and Griffith. Among others, we prove a non-commutative version of Aoyama’s theorem which states that a canonical module descends with respect to a flat local homomorphism. We also prove the codimension two-argument for modules over a coherent sheaf of algebras with a 2-canonical module, generalizing a result of the author. Contents 1 Introduction 2 2 Preliminaries 5 3 Xn,m -approximation 10 2010 Mathematics Subject Classification. Primary 16E05; Secondary 16E65. Key Words and Phrases. canonical module; n-canonical module; (n, C)-syzygy; n-C-spherical approximation. 1 4 (n, C)-TF property 17 5 Canonical module 22 6 n-canonical module 26 7 Non-commutative Aoyama’s theorem 34 8 Evans–Griffith’s theorem for n-canonical modules 37 9 Symmetric and Frobenius algebras 40 10 Codimension-two argument 46 1. Introduction (1.1) In [EvG], Evans and Griffith proved a criterion of a finite module over a Noetherian commutative ring R to be an nth syzygy. This was generalized to a theorem on (n, C)-syzygy for a semidualizing module C over R by Araya and Iima [ArI]. The main purpose of this paper is to prove a generalization of these results in the following settings: the ring R is now a finite R-algebra Λ, which may not be commutative; and C is an n-canonical module. (1.2) The notion of n-canonical module was introduced in [Has] in an algebrogeometric situation. The criterion for a module to be an nth syzygy for n = 1, 2 by Evans–Griffith was generalized using n-canonical modules there, and the standard ‘codimension-two argument’ (see e.g., [Hart4, (1.12)]) was also generalized to a theorem on schemes with 2-canonical modules [Has, (7.34)]. We also generalize this result to a theorem on modules over noncommutative sheaves of algebras (Proposition 10.5). (1.3) Let (R, m) be a complete semilocal Noetherian ring, and Λ 6= 0 a module-finite R-algebra. Let I be a dualizing complex of R. Then RHomR (Λ, I) is a dualizing complex of Λ. Its lowest non-vanishing cohomology is denoted by KΛ , and is called the canonical module of Λ. If (R, m) is semilocal but not complete, then a Λ-bimodule is called a canonical module if it is the canonical module after completion. An n-canonical module is defined using the canonical module. A finite right (resp. left, bi-)module C of Λ is said to be ncanonical over R if (1) C satisfies Serre’s (Sn′ ) condition as an R-module, that is, for any P ∈ Spec R, depthRP CP ≥ min(n, dim RP ). (2) If P ∈ SuppR C 2 cP is isomorphic to K c as a right (left, bi-) module with dim RP < n, then C ΛP c c of ΛP , where ΛP is the P RP -adic completion of ΛP . (1.4) In order to study non-commutative n-canonical modules, we study some non-commutative analogue of the theory of canonical modules developed by Aoyama [Aoy], Aoyama–Goto [AoyG], and Ogoma [Ogo] in commutative algebra. Among them, we prove an analogue of Aoyama’s theorem [Aoy] which states that the canonical module descends with respect to flat homomorphisms (Theorem 7.5). (1.5) Our main theorem is the following. Theorem 8.4 (cf. [EvG, (3.8)], [ArI, (3.1)]). Let R be a Noetherian commutative ring, and Λ a module-finite R-algebra, which may not be commutative. Let n ≥ 1, and C be a right n-canonical Λ-module. Set Γ = EndΛop C. Let M ∈ mod C. Then the following are equivalent. 1 M ∈ TF(n, C). 2 M ∈ UP(n, C). 3 M ∈ Syz(n, C). 4 M ∈ (Sn′ )C . Here M ∈ (Sn′ )C means that SuppR M ⊂ SuppR C, and for any P ∈ Spec R, depth MP ≥ min(n, dim RP ), and this is a (modified) Serre’s condition. M ∈ Syz(n, C) means M is an (n, C)-syzygy. M ∈ UP(n, C) means existence of an exact sequence 0 → M → C 0 → C 1 → · · · → C n−1 which is still exact after applying (?)† = HomΛop (?, C). (1.6) The condition M ∈ TF(n, C) is a modified version of Takahashi’s condition “M is n-C-torsion free” [Tak]. Under the assumptions of the theorem, let (?)† = HomΛop (?, C), Γ = EndΛop C, and (?)‡ = HomΓ (?, C). We say that M ∈ TF(1, C) (resp. M ∈ TF(2, C)) if the canonical map λM : M → M †‡ is injective (resp. bijective). If n ≥ 3, we say that M ∈ TF(n, C) if M ∈ TF(2, C), and ExtiΓ (M † , C) = 0 for 1 ≤ i ≤ n − 2, see Definition 4.5. Even if Λ is a commutative ring, a non-commutative ring Γ appears in a natural way, so even in this case, the definition is slightly different from Takahashi’s original one. We prove that TF(n, C) = UP(n, C) in general (Lemma 4.7). This is a modified version of Takahashi’s result [Tak, (3.2)]. 3 (1.7) As an application of the main theorem, we formulate and prove a different form of the existence of n-C-spherical approximations by Takahashi [Tak], using n-canonical modules, see Corollary 8.5 and Corollary 8.6. Our results are not strong enough to deduce [Tak, Corollary 5.8] in commutative case. For related categorical results, see below. (1.8) Section 2 is preliminaries on the depth and Serre’s conditions on modules. In Section 3, we discuss Xn,m -approximation, which is a categorical abstraction of approximations of modules appeared in [Tak]. Everything is done categorically here, and Theorem 3.16 is an abstraction of [Tak, (3.5)], in view of the fact that TF(n, C) = UP(n, C) in general (Lemma 4.7). In Section 4, we discuss TF(n, C), and prove Lemma 4.7 and related lemmas. In Section 5, we define the canonical module of a module-finite algebra Λ over a Noetherian commutative ring R, and prove some basic properties. In Section 6, we define the n-canonical module of Λ, and prove some basic properties, generalizing some constructions and results in [Has, Section 7]. In Section 7, we prove a non-commutative version of Aoayama’s theorem which says that the canonical module descends with respect to flat local homomorphisms (Theorem 7.5). As a corollary, as in the commutative case, we immediately have that a localization of a canonical module is again a canonical module. This is important in Section 8. In Section 8, we prove Theorem 8.4, and the related results on n-C-spherical approximations (Corollary 8.5, Corollary 8.6) as its corollaries. Before these, we prove non-commutative analogues of the theorems of Schenzel and Aoyama–Goto [AoyG, (2.2), (2.3)] on the Cohen–Macaulayness of the canonical module (Proposition 8.2 and Corollary 8.3). In section 9, we define and discuss non-commutative, higher-dimensional symmetric, Frobenius, and quasi-Frobenius algebras and their non-Cohen–Macaulay versions. In commutative algebra, the non-Cohen–Macaulay version of Gorenstein ring is known as quasi-Gorenstein rings. What we discuss here is a non-commutative version of such rings. Scheja and Storch [SS] discussed a relative notion, and our definition is absolute in the sense that it is independent of the choice of R. If R is local, our quasi-Frobenius property agrees with Gorensteinness discussed by Goto and Nishida [GN], see Proposition 9.7 and Corollary 9.8. In Section 10, we show that the codimension-two argument using the existence of 2-canonical modules in [Has] is still valid in non-commutative settings. (1.9) Acknowledgments: Special thanks are due to Professor Osamu Iyama for valuable advice and discussion. Special thanks are also due to Professor Tokuji Araya. This work was motivated by his advice, and Proposition 8.2 is 4 an outcome of discussion with him. The author is also grateful to Professor Kei-ichiro Iima, Professor Takesi Kawasaki, Professor Ryo Takahashi, Professor Kohji Yanagawa, and Professor Yuji Yoshino for valuable advice. 2. Preliminaries (2.1) Unless otherwise specified, a module means a left module. Let B be a ring. HomB or ExtB mean the Hom or Ext for left B-modules. B op denotes the opposite ring of B, so a B op -module is nothing but a right B-module. Let B Mod denote the category of B-modules. B op Mod is also denoted by Mod B. For a left (resp. right) Noetherian ring B, B mod (resp. mod B) denotes the full subcategory of B Mod (resp. Mod B) consisting of finitely generated left (resp. right) B-modules. (2.2) For derived categories, we employ standard notation found in [Hart]. For an abelian category A, D(A) denotes the unbounded derived category of A. For a plump subcategory (that is, a full subcategory which is closed under kernels, cokernels, and extensions) B of A, DB (A) denotes the triangulated subcategory of D(A) consisting of objects F such that H i (F) ∈ B for any i. For a ring B, We denote D(B Mod) by D(B), and DB mod (B Mod) by Dfg (B) (if B is left Noetherian). (2.3) Throughout the paper, let R denote a commutative Noetherian ring. If R is semilocal (resp. local) and m its Jacobson radical, then we say that (R, m) is semilocal (resp. local). We say that (R, m, k) is semilocal (resp. local) if (R, m) is semilocal (resp. local) and k = R/m. (2.4) We set R̂ := R ∪ {∞, −∞} and consider that −∞ < R < ∞. As a convention, for a subset Γ of R̂, inf Γ means inf(Γ ∪ {∞}), which exists uniquely as an element of R̂. Similarly for sup. (2.5) For an ideal I of R and M ∈ mod R, we define depthR (I, M) := inf{i ∈ Z | ExtiR (R/I, M) 6= 0}, and call it the I-depth of M [Mat, section 16]. It is also called the M-grade of I [BS, (6.2.4)]. When (R, m) is semilocal, we denote depth(m, M) by depthR M or depth M, and call it the depth of M. Lemma 2.6. The following functions on M (with valued in R̂) are equal for an ideal I of R. 5 1 depthR (I, M); 2 inf P ∈V (I) depthRP MP , where V (I) = {P ∈ Spec R | P ⊃ I}; 3 inf{i ∈ Z | HIi (M) 6= 0}; 4 ∞ if M = IM, and otherwise, the length of any maximal M-sequence in I. 5 Any function φ such that a φ(M) = ∞ if M = IM. b φ(M) = 0 if HomR (R/I, M) 6= 0. c φ(M) = φ(M/aM) + 1 if a ∈ I is a nonzerodivisor on M. Proof. We omit the proof, and refer the reader to [Mat, section 16], [BS, (6.2.7)]. (2.7) For a subset F of X = Spec R, we define codim F = codimX F , the codimension of F in X, by inf{ht P | P ∈ F }. So ht I = codim V (I) for an ideal I of R. For M ∈ mod R, we define codim M := codim SuppR M = ht ann M, where ann denotes the annihilator. For n ≥ 0, we denote the set ht−1 (n) = {P ∈ Spec R | ht P = n} by Rhni . For a subset Γ of Z, RhΓi means S ht−1 (Γ) = n∈Γ Rhni . Moreover, we use notation such as Rh≤3i , which stands for Rh{n∈Z|n≤3}i . For M ∈ mod R, the set of minimal primes of M is denoted by Min M. We define M [n] := {P ∈ Spec R | depth MP = n}. Similarly, we use notation such as M [<n] (= {P ∈ Spec R | depth MP < n}). (2.8) Let M, N ∈ mod R. We say that M satisfies the (SnN )R -condition or (SnN )-condition if for any P ∈ Spec R, depthRP MP ≥ min(n, dimRP NP ). The (SnR )R -condition or (SnR )-condition is simply denoted by (Sn′ )R or (Sn′ ). We say that M satisfies the (Sn )R -condition or (Sn )-condition if M satisfies the (SnM )condition. (Sn ) (resp. (Sn′ )) is equivalent to say that for any P ∈ M [<n] , MP is a Cohen–Macaulay (resp. maximal Cohen–Macaulay) RP -module. That is, depth MP = dim MP (resp. depth MP = dim RP ). We consider that (SnN )R is a class of modules, and also write M ∈ (SnN )R (or M ∈ (SnN )). Lemma 2.9. Let 0 → L → M → N → 0 be an exact sequence in mod R, and n ≥ 1. 6 1 If L, N ∈ (Sn′ ), then M ∈ (Sn′ ). ′ 2 If N ∈ (Sn−1 ) and M ∈ (Sn′ ), then L ∈ (Sn′ ). Proof. 1 follows from the depth lemma: ∀P depthRP MP ≥ min(depthRP LP , depthRP NP ), and the fact that maximal Cohen–Macaulay modules are closed under extensions. 2 is similar. Corollary 2.10. Let 0 → M → Ln → · · · → L1 be an exact sequence in mod R, and assume that Li ∈ (Si′ ) for 1 ≤ i ≤ n. Then M ∈ (Sn′ ). Proof. This is proved using a repeated use of Lemma 2.9, 2. Lemma 2.11 (Acyclicity Lemma, [PS, (1.8)]). Let (R, m) be a Noetherian local ring, and (1) ∂ ∂s−1 ∂ s 1 L : 0 → Ls − → Ls−1 −−→→ · · · → L1 − → L0 be a complex of mod R such that 1 For each i ∈ Z with 1 ≤ i ≤ s, depth Li ≥ i. 2 For each i ∈ Z with 1 ≤ i ≤ s, Hi (L) 6= 0 implies that depth Hi (L) = 0. Then L is acyclic (that is, Hi (L) = 0 for i > 0). Lemma 2.12 (cf. [IW, (3.4)]). Let (1) be a complex in mod R such that 1 For each i ∈ Z with 1 ≤ i ≤ s, Li ∈ (Si′ ). 2 For each i ∈ Z with 1 ≤ i ≤ s, codim Hi (L) ≥ s − i + 1. Then L is acyclic. Proof. Using induction on s, we may assume that Hi (L) = 0 for i > 1. Assume that L is not acyclic. Then H1 (L) 6= 0, and we can take P ∈ AssR H1 (L). By assumption, ht P ≥ s. Now localize at P and considering the complex LP over RP , we get a contradiction by Lemma 2.11. 7 Example 2.13. Let f : M → N be a map in mod R. 1 If M ∈ (S1′ ) and fP is injective for P ∈ Rh0i , then f is injective. Indeed, consider the complex f 0→M − → N = L0 and apply Lemma 2.12. 2 ([LeW, (5.11)]) If M ∈ (S2′ ), N ∈ (S1′ ), and fP is bijective for P ∈ Rh≤1i , then f is bijective. Consider the complex f 0→M − → N → 0 = L0 this time. Lemma 2.14. Let (R, m) be a Noetherian local ring, and N ∈ (Sn )R . If P ∈ Min N with dim R/P < n, then we have dim R/P = depth N = dim N < n. If, moreover, N ∈ (Sn′ )R , then depth N = dim R. Proof. Ischebeck proved that if M, N ∈ mod R and i < depth N − dim M, then ExtiR (M, N) = 0 [Mat, (17.1)]. As Ext0R (R/P, N) 6= 0, we have that depthR N ≤ dim R/P < n. The rest is easy. Corollary 2.15. Let M ∈ (Sn )R and N ∈ (Sn′ )R . If Min M ⊂ Min N, then M ∈ (Sn′ )R . Proof. Let P ∈ M [<n] . As M ∈ (Sn ), depth MP = dim MP . Take Q ∈ Min M such that Q ⊂ P and dim RP /QRP = dim MP < n. As Min M ⊂ Min N, we have that QRP ∈ Min NP . By Lemma 2.14, dim RP = dim RP /QRP = depth MP , and hence M ∈ (Sn′ ). Corollary 2.16. Let n ≥ 1, and R ∈ (Sn ). Then for M ∈ mod R, we have that (Sn′ )R = (Sn )R ∩ (S1′ ). Proof. Obviously, (Sn′ )R ⊂ (Sn )R ∩(S1′ ). For the converse, apply Corollary 2.15 for N = R. 8 (2.17) Let M, N ∈ mod R. We say that M satisfies the (Sn′ )N -condition, or ′ M ∈ (Sn′ )N = (Sn′ )R N , if M ∈ (Sn ) and SuppR M ⊂ SuppR N. Lemma 2.18. Let n ≥ 1, N ∈ (Sn′ ), and M ∈ mod R. Then the following are equivalent. 1 M ∈ (Sn′ )N . 2 M ∈ (Sn ) and Min M ⊂ Min N. Proof. 1⇒2. As (Sn′ ) ⊂ (Sn ), M ∈ (Sn ). As M ∈ (Sn′ ) with n ≥ 1, Min M ⊂ Min R. By assumption, Min M ⊂ Supp N. So Min M ⊂ Min R ∩ Supp N ⊂ Min N. 2⇒1. M ∈ (Sn′ ) by Corollary 2.15. Supp M ⊂ Supp N follows from Min M ⊂ Min N. (2.19) There is another case that (Sn ) implies (Sn′ ). An R-module N is said to be full if SuppR N = Spec R. A finitely generated faithful R-module is full. Lemma 2.20. Let M, N ∈ mod R. If N is a full R-module, then M satisfies (Sn′ ) condition if and only if M satisfies (SnN ) condition. If annR N ⊂ annR M, then M satisfies the (SnN )R condition if and only if M satisfies the (Sn′ )R/ annR N condition. Proof. The first assertion is because dim NP = dim RP for any P ∈ Spec R. The second assertion follows from the first, because for an R/ annR N-module, (SnN )R and (SnN )R/ annR N are the same thing. Lemma 2.21. Let I be an ideal of R, and S a module-finite commutative R-algebra. For M ∈ mod S, we have that depthR (I, M) = depthS (IS, M). In particular, if R is semilocal, then depthR M = depthS M. i Proof. Note that HIi (M) ∼ (M) by [BS, (4.2.1)]. By Lemma 2.6, we get = HIS the lemma immediately. Lemma 2.22. Let ϕ : R → S be a finite homomorphism of rings, M ∈ mod S, and n ≥ 0. 1 If M ∈ (Sn′ )R , then M ∈ (Sn′ )S . 2 Assume that for any Q ∈ Min S, ϕ−1 (Q) ∈ Min R (e.g., S ∈ (S1′ )R ). If M ∈ (Sn′ )S , and RP is quasi-unmixed for any P ∈ R[<n] , then M ∈ (Sn′ )R . 9 Proof. 1. Let Q ∈ M [<n] . Then depthRP MP = depthSP MP ≤ depthSQ MQ < n by Lemma 2.21 and Lemma 2.6, where P = ϕ−1 (Q). So MP is a maximal Cohen–Macaulay RP -module by the (Sn′ )R -property, and hence ht Q ≤ ht P = depthRP MP ≤ depthSQ MQ , and hence MQ is a maximal Cohen–Macaulay SQ -module, and M ∈ (Sn′ )S . 2. Let P ∈ Spec R, and depthRP MP < n. Then by Lemma 2.21 and Lemma 2.6, there exists some Q ∈ Spec S such that ϕ−1 (Q) = P and depthSQ MQ = inf ϕ−1 (Q′ )=P depthSQ′ MQ′ = depthSP MP = depthRP MP < n. Then ht Q = depth RP MP . So it suffices to show ht P = ht Q. By assumption, RP is quasi-unmixed. So RP is equi-dimensional and universally catenary [Mat, (31.6)]. By [Gro4, (13.3.6)], ht P = ht Q, as desired. (2.23) We say that R satisfies (Rn ) (resp. (Tn )) if RP is regular (resp. Gorenstein) for P ∈ Rh≤ni . Lemma 2.24. Let ϕ : R → S be a flat morphism between Noetherian rings, and M ∈ mod R. 1. If M ∈ (Sn′ )R and the ring SP /P SP satisfies (Sn ) for P ∈ Spec R, then S ⊗R M ∈ (Sn′ )S . 2. If ϕ is faithfully flat and S ⊗R M ∈ (Sn′ )S , then M ∈ (Sn′ )R . 3. If R satisfies (Sn ) (resp. (Tn ), (Rn )) and SP /P SP satisfies (Sn ) (resp. (Tn ), (Rn )) for P ∈ Spec R, then S satisfies (Sn ) (resp. (Tn ), (Rn )). Proof. Left to the reader (see [Mat, (23.9)]). 3. Xn,m -approximation (3.1) Let A be an abelian category, and C its additive subcategory closed under direct summands. Let n ≥ 0. We define ⊥n C := {a ∈ A | ExtiA (a, c) = 0 1 ≤ i ≤ n}. Let a ∈ A. A sequence (2) C : 0 → a → c0 → c1 → · · · → cn−1 10 is said to be an (n, C)-pushforward if it is exact with ci ∈ C. If in addition, C† : 0 ← a† ← (c0 )† ← (c1 )† ← · · · ← (cn−1 )† is exact for any c ∈ C, where (?)† = HomA (?, c), we say that C is a universal (n, C)-pushforward. If a ∈ A has an (n, C)-pushforward, we say that a is an (n, C)-syzygy, and we write a ∈ Syz(n, C). If a ∈ A has a universal (n, C)-pushforward, we say that a ∈ UPA (n, C) = UP(n, C). Obviously, UPA (n, C) ⊂ SyzA (n, C). (3.2) We write Xn,m (C) = Xn,m := a 6= 0, we define ⊥n C ∩ UP(m, C) for n, m ≥ 0. Also, for Cdim a = inf{m ∈ Z≥0 | there is a resolution 0 → cm → cm−1 → · · · → c0 → a → 0}. We define Cdim 0 = −∞. We define Yn (C) = Yn := {a ∈ A | Cdim a < n}. A sequence E is said to be C-exact if it is exact, and A(E, c) is also exact for each c ∈ C. Letting a C-exact sequence an exact sequence, A is an exact category, which we denote by AC in order to distinguish it from the abelian category A (with the usual exact sequences). (3.3) Let C0 ⊂ A be a subset. Then ⊥n C0 , UP(n, C0 ), Xn,m (C0 ), C0 dim, and Yn (C0 ) = Yn mean ⊥n C, UP(n, C), Xn,m (C), Cdim, and Yn (C), respectively, where C = add C0 , the smallest additive subcategory containing C0 and closed under direct summands. If c ∈ C, ⊥n c, UP(n, c) and so on mean ⊥n add c, UP(n, add c) and so on. A C0 -exact sequence means an add C0 -exact sequence. A sequence E in A is C0 -exact if and only if for any c ∈ C0 , A(E, c) is exact. (3.4) By definition, any object of C is an injective object in AC . (3.5) Let E be an exact category, and I an additive subcategory of E. Then for e ∈ E, we define PushE (n, I) := {e ∈ E | There exists an exact sequence 0 → e → c0 → c1 → · · · → cn−1 with ci ∈ I}. Note that PushE (0, I) is the whole E. Thus PushAC (n, C) = UPA (n, C). If a ∈ E is a direct summand of an object of I, then a ∈ Push(∞, I). 11 Lemma 3.6. Let E be an exact category. Let I be an additive subcategory of E consisting of injective objects. Let f g 0→a− → a′ − → a′′ → 0 be an exact sequence in E and m ≥ 0. Then 1 If a ∈ Push(m, I) and a′′ ∈ Push(m, I), then a′ ∈ Push(m, I). 2 If a′ ∈ Push(m + 1, I) and a′′ ∈ Push(m, I), then a ∈ Push(m + 1, I). 3 If a ∈ Push(m + 1, I), a′ ∈ Push(m, I), then a′′ ∈ Push(m, I). Proof. Let i : E ֒→ A be the Gabriel–Quillen embedding [TT]. We consider that E is a full subcategory of A closed under extensions, and a sequence in E is exact if and only if it is so in A. We prove 1. We use induction on m. The case that m = 0 is trivial, and so we assume that m > 0. Let 0→a→c→b→0 be an exact sequence such that c ∈ I and b ∈ Push(m − 1, I). Let 0 → a′′ → c′′ → b′′ → 0 be an exact sequence such that c′′ ∈ I and b′′ ∈ Push(m − 1, I). As C(a′ , c) → C(a, c) is surjective, we can form a commutative diagram with exact rows and columns 0 0 0 0  a /  0 / c 0 / b  f a′ /   1 0  / c ⊕ c′′ g (1 0)  a′′ /  c′′ /    / b′  0 / 0 /  / b′′  / 0 0 0 0 in A. As E is closed under extensions in A, this diagram is a diagram in E. By induction assumption, b′ ∈ Push(m − 1, I). Hence a′ ∈ Push(m, I). 12 We prove 2. Let 0 → a′ → c → b′ → 0 be an exact sequence in E such that c ∈ I and b′ ∈ Push(m, I). Then we have a commutative diagram in E with exact rows and columns 0 0 0 0 / f  a /   / / a′′ /  c / 0 / 0 / 0   a′′ g a′ / 1c c / . 0 b / b′   0 0 Applying 1, which we have already proved, b ∈ Push(m, I), since a′′ and b′ lie in Push(m, I). So a ∈ Push(m + 1, I), as desired. We prove 3. Let 0 → a → c → b → 0 be an exact sequence in E such that c ∈ I and b ∈ Push(m, I). Taking the push-out diagram 0 0  /a 0 f  a′ / . g / a′′ / 0 / 0 1a′′ 0 /  c  b  0  u / 1b  / a′′  / b  0 Then u ∈ Push(m, I) by 1, which we have already proved. Since c ∈ I, the middle row splits. Then by the exact sequence 0 → a′′ → u → c → 0 and 2, we have that a′′ ∈ Push(m, I), as desired. Corollary 3.7. Let E and I be as in Lemma 3.6. Let m ≥ 0, and a, a′ ∈ E. Then a ⊕ a′ ∈ Push(m, I) if and only if a, a′ ∈ Push(m, I). 13 Proof. The ‘if’ part is obvious by Lemma 3.6, 1, considering the exact sequence 0 → a → a ⊕ a′ → a′ → 0. (3) We prove the ‘only if’ part by induction on m. If m = 0, then there is nothing to prove. Let m > 0. Then by induction assumption, a′ ∈ Push(m − 1, I). Then applying Lemma 3.6, 2 to the exact sequence (3), we have that a ∈ Push(m, I). a′ ∈ Push(m, I) is proved similarly. Corollary 3.8. Let f g 0→a− → a′ − → a′′ → 0 be a C-exact sequence in A and m ≥ 0. Then 1 If a ∈ UP(m, C) and a′′ ∈ UP(m, C), then a′ ∈ UP(m, C). 2 If a′ ∈ UP(m + 1, C) and a′′ ∈ UP(m, C), then a ∈ UP(m + 1, C). 3 If a ∈ UP(m + 1, C), a′ ∈ UP(m, C), then a′′ ∈ UP(m, C). (3.9) We define ⊥ C = ⊥∞ C := Obviously, C ⊂ UP(∞, C). T i≥0 ⊥i C and UP(∞, C) := T j≥0 UP(j, C). Lemma 3.10. We have UP(∞, C) = {a ∈ A | There exists some C-exact sequence 0 → a → c0 → c1 → c2 → · · · with ci ∈ C for i ≥ 0}. Proof. Let a ∈ UP(∞, C), and take any C-exact sequence 0 → a → c0 → a1 → 0 with c0 ∈ C. Then a1 ∈ UP(∞, C) by Corollary 3.8, and we can continue infinitely. S (3.11) We define Y∞ := i≥0 Yi . We also define Xi,j := ⊥i C ∩ UP(j, C) for 0 ≤ i, j ≤ ∞. (3.12) Let 0 ≤ i, j ≤ ∞. We say that a ∈ A lies in Zi,j if there is a short exact sequence 0→y→x→a→0 in A such that x ∈ Xi,j and y ∈ Yi . 14 (3.13) We define ∞ ± r = ∞ for r ∈ R. Lemma 3.14. Let 0 ≤ i, j ≤ ∞ with j ≥ 1. Assume that C ⊂ ⊥i+1 C. Let f g 0 → z − → x − → z ′ → 0 be a short exact sequence in A with z ∈ Zi,j and x ∈ Xi+1,j−1 . Then z ′ ∈ Zi+1,j−1 . Proof. By assumption, there is an exact sequence j ϕ 0→y− → x′ − →z→0 such that Cdim y < i and x′ ∈ Xi,j . As j ≥ 1, there is an C-exact sequence h 0 → x′ − → c → x′′′ → 0 such that c ∈ C. Then we have a commutative diagram with exact rows and columns 0 0 0 0 hj  0 y / / j h  fϕ ′ /  0 / z   1 0 f /x   0 0  g  / x′′ / (0 1) ϕ  y′ / c⊕x x /   c / 0  / z′ / 0  0 0 As the top row is exact, y ∈ Yi , and c ∈ C, y ′ ∈ Yi+1 . By assumption, c ∈ Xi+1,∞ and x ∈ Xi+1,j−1. So c ⊕ x ∈ Xi+1,j−1 . As the middle row is C-exact and x′ ∈ Xi,j , we have that x′′ ∈ Xi+1,j−1 by Corollary 3.8. The right column shows that z ′ ∈ Zi+1,j−1 , as desired. Lemma 3.15. Let 0 ≤ i, j ≤ ∞, and assume that i ≥ 1 and C ⊂ ⊥i C. Let (4) f g 0→z− →x− → z′ → 0 be a short exact sequence in A with z ′ ∈ Zi,j and x ∈ Xi,j+1 . Then z ∈ Zi−1,j+1 . 15 h Proof. Take an exact sequence 0 → y ′ → x′′ → − z ′ → 0 such that x′′ ∈ Xi,j ′ and y ∈ Yi . Taking the pull-back of (4) by h, we get a commutative diagram with exact rows and columns  0 j  0 z / y′ / /  1y ′ y′ / / 0 /   a x′′ / 1z 0 . 0 0 / 0 h f  z /  x  g / z′    0 0 0 / 0 By induction, we can prove easily that ⊥i C ⊂ ⊥i+1−l Yl . In particular, ⊥i C ⊂ ⊥1 Yi , and Ext1A (x, y ′) = 0. Hence the middle column splits, and we can replace a by x ⊕ y ′ . By the definition of Yi , there is an exact sequence 0 → y → c → y′ → 0 of A such that y ∈ Yi−1 and c ∈ C. Then adding 1x to this sequence, we get 0 → y → x ⊕ c → x ⊕ y′ → 0 is exact. Pulling back this exact sequence with j : z → a = x ⊕ y ′, we get a commutative diagram with exact rows and columns 0 0   0 y / 0 / x′ /  z 1y 0 /  y 0 / j  /  x⊕c   0 . / / 1x′′ x′′  x ⊕ y′  / x′′  0 0 16 0 / / 0 As x′′ ∈ ⊥1 C, the middle column is C-exact. As x′′ ∈ Xi,j and x ⊕ c ∈ Xi,j+1, we have that x′ ∈ Xi−1,j+1 . As the top row shows, z ∈ Zi−1,j+1, as desired. Theorem 3.16. Let 0 ≤ n, m ≤ ∞, and assume that C ⊂ the following are equivalent. ⊥n C. For z ∈ A, 1 z ∈ Zn,m . 2 There is an exact sequence (5) dn−1 d ε n 0 → xn −→ xn−1 −−−→ x0 − →z→0 such that xi ∈ Xn−i,m+i . If, moreover, for each a ∈ A, there is a surjection x → a with x ∈ Xn,n+m , then these conditions are equivalent to the following. 3 For each exact sequence (5) with xi ∈ Xn−i,m+i+1 for 0 ≤ i ≤ n − 1, we have that xn ∈ X0,n+m . ε Proof. 1⇒2. There is an exact sequence 0 → y → x0 − → z → 0 with x0 ∈ Xn,m and y ∈ Yn . So there is an exact sequence d dn−1 d n 2 0 → xn −→ xn−1 −−−→ · · · − → x1 → y → 0 with xi ∈ C for 1 ≤ i ≤ n. As C ⊂ Xn,∞ , we are done. 2⇒1. Let zi = Im di for i = 1, . . . , n, and z0 := z. Then by descending induction on i, we can prove zi ∈ Zn−i,m+i for i = n, n − 1, . . . , 0, using Lemma 3.14 easily. 1⇒3 is also proved easily, using Lemma 3.15. 3⇒2 is trivial. 4. (n, C)-TF property (4.1) In the rest of this paper, let Λ be a module-finite R-algebra, which may not be commutative. A Λ-bimodule means a Λ ⊗R Λop -module. Let C ∈ mod Λ be fixed. Set Γ := EndΛop C. Note that Γ is also a modulefinite R-algebra. We denote (?)† := HomΛop (?, C) : mod Λ → (Γ mod)op , and (?)‡ := HomΓ (?, C) : Γ mod → (mod Λ)op . (4.2) We denote Syzmod Λ (n, C), UPmod Λ (n, C), and Cdimmod Λ M respectively by SyzΛop (n, C), UPΛop (n, C), and CdimΛop M. 17 (4.3) Note that for M ∈ mod Λ and N ∈ Γ mod, we have standard isomorphisms HomΛop (M, N ‡ ) ∼ = HomΓ (N, M † ). = HomΓ⊗R Λop (N ⊗R M, C) ∼ (6) The first isomorphism sends f : M → N ‡ to the map (n ⊗ m 7→ f (m)(n)). Its inverse is given by g : N ⊗R M → C to (m 7→ (n 7→ g(n ⊗ m))). This shows that (?)† has ((?)‡ )op : (Γ mod)op → mod Λ as a right adjoint. Hence ((?)† )op is right adjoint to (?)‡ . We denote the unit of adjunction Id → (?)†‡ = (?)‡ (?)† by λ. Note that for M ∈ mod Λ, the map λM : M → M †‡ is given by λM (m)(ψ) = ψ(m) for m ∈ M and ψ ∈ M † = HomΛop (M, C). We denote the unit of adjunction N → N ‡† by µ = µN for N ∈ Γ mod. When we view µ as a morphism N ‡† → N (in the opposite category (Γ mod)op ), then it is the counit of adjunction. Lemma 4.4. (?)† and (?)‡ give a contravariant equivalence between add C ⊂ mod Λ and add Γ ⊂ Γ mod. Proof. It suffices to show that λ : M → M †‡ is an isomorphism for M ∈ add C, and µ : N → N ‡† is an isomorphism for N ∈ add Γ. To verify this, we may assume that M = C and N = Γ. This case is trivial. Definition 4.5 (cf. [Tak, (2.2)]). Let M ∈ mod Λ. We say that M is (1, C)-TF or M ∈ TFΛop (1, C) if λM : M → M †‡ is injective. We say that M is (2, C)-TF or M ∈ TFΛop (2, C) if λM : M → M †‡ is bijective. Let n ≥ 3. We say that M is (n, C)-TF or M ∈ TFΛop (n, C) if M is (2, C)-TF and ExtiΓ (M † , C) = 0 for 1 ≤ i ≤ n − 2. As a convention, we define that any M ∈ mod Λ is (0, C)-TF. Lemma 4.6. Let Θ : 0 → M → L → N → 0 be a C-exact sequence in mod Λ. Then for n ≥ 0, we have the following. 1 If M ∈ TF(n, C) and N ∈ TF(n, C), then L ∈ TF(n, C). 2 If L ∈ TF(n + 1, C) and N ∈ TF(n, C), then M ∈ TF(n + 1, C). 3 If M ∈ TF(n + 1, C) and L ∈ TF(n, C), then N ∈ TF(n, C). Proof. We have a commutative diagram 0 / M h / L λM  0 / M †‡ / N λL h†‡ L†‡ 0 λN  / / /  N †‡ / Ext1Γ (M † , C) 18 / Ext1 (L† , C) Γ / ··· with exact rows. We only prove 3. We may assume that n ≥ 1. So λM is an isomorphism and λL is injective. By the five lemma, λN is injective, and the case that n = 1 has been done. If n ≥ 2, then λL is also an isomorphism and Ext1Γ (M † , C) = 0, and so λN is an isomorphism. Moreover, for 1 ≤ i ≤ n − 2, ExtiΓ (L† , C) and i † † Exti+1 Γ (M , C) vanish. so ExtΓ (N , C) = 0 for 1 ≤ i ≤ n − 2, and hence N ∈ TF(n, C). 1 and 2 are also proved similarly. Lemma 4.7 (cf. [Tak, Proposition 3.2]). UPΛop (n, C). 1 For n = 0, 1, SyzΛop (n, C) = 2 For n ≥ 0, TFΛop (n, C) = UPΛop (n, C). Proof. If n = 0, then SyzΛop (n, C) = TFΛop (0, C) = UPΛop (0, C) = mod Λ. So we may assume that n ≥ 1. Let M ∈ SyzΛop (1, C). Then there is an injection ϕ : M → N with N ∈ add C. Then  ϕ / M N  ∼ = λN λM M †‡ ϕ†‡  / N †‡ is a commutative diagram. So λM is injective, and M ∈ TFΛop (1, C). This shows UPΛop (1, C) ⊂ SyzΛop (1, C) ⊂ TFΛop (1, C). So 2⇒1. We prove 2. First, we prove UPΛop (n, C) ⊂ TFΛop (n, C) for n ≥ 1. We use induction on n. The case n = 1 is already done above. Let n ≥ 2 and M ∈ UPΛop (n, C). Then by the definition of UPΛop (n, C), there is a C-exact sequence 0→M →L→N →0 such that L ∈ add C and N ∈ UPΛop (n − 1, C). By induction hypothesis, N ∈ TFΛop (n − 1, C). Hence M ∈ TFΛop (n, C) by Lemma 4.6. We have proved that UPΛop (n, C) ⊂ TFΛop (n, C). Next we show that TFΛop (n, C) ⊂ UPΛop (n, C) for n ≥ 1. We use induction on n. Let n = 1. Let ρ : F → M † be any surjective Γ-linear map with F ∈ add Γ. Then the map ρ′ : M → F ‡ which corresponds to ρ by the adjunction (6) is ρ‡ λ → M †‡ − ρ′ : M −−M → F ‡, 19 which is injective by assumption. Then ρ is the composite (ρ′ )† µF ρ : F −→ F ‡† −−→ M † , which is a surjective map by assumption. So (ρ′ )† is also surjective, and hence ρ′ : M → F ‡ gives a (1, C)-universal pushforward. Now let n ≥ 2. By what we have proved, M has a (1, C)-universal pushforward h : M → L. Let N = Coker h. Then we have a C-exact sequence 0→M →L→N →0 with L ∈ add C. As M ∈ TF(n, C), N ∈ TF(n − 1, C) by Lemma 4.6. By induction assumption, N ∈ UP(n − 1, C). So by the definition of UP(n, C), we have that M ∈ UP(n, C), as desired. Lemma 4.8. For any N ∈ Γ mod, N ‡ ∈ Syz(2, C). Proof. Let h F1 − → F0 → N → 0 be an exact sequence in Γ mod such that Fi ∈ add Γ. Then h‡ 0 → N ‡ → F0‡ −→ F1‡ is exact, and Fi‡ ∈ add C. This shows that N ‡ ∈ Syz(2, C). op (4.9) We denote by (Sn′ )C = (Sn′ )ΛC ,R the class of M ∈ mod Λ such that M viewed as an R-module lies in (Sn′ )R C , see (2.17). Lemma 4.10. Assume that C satisfies (Sn′ ) as an R-module. Then Syz(r, C) ⊂ op (Sr′ )ΛC ,R for r ≥ 1. Proof. This follows easily from Corollary 2.10. (4.11) For an additive category C and its additive subcategory X , we denote by C/X the quotient of C divided by the ideal consisting of morphisms which factor through objects of X . 20 (4.12) For each M ∈ mod Λ, take a presentation ∂ ε F(M) : F1 (M) − → F0 (M) − →M →0 (7) with Fi ∈ add ΛΛ . We denote Coker(∂ † ) = Coker(1C ⊗ ∂ t ) = C ⊗Λ Tr M by TrC M, where (?)t = HomΛop (?, Λ) and Tr is the transpose, see [ASS, (V.2)], and we call it the C-transpose of M. TrC is an additive functor from mod Λ := mod Λ/ add ΛΛ to ΓC mod := Γ mod / add C. Proposition 4.13. Let n ≥ 0, and assume that ExtiΓ (C, C) = 0 for i = 1, . . . , n. Then for M ∈ mod Λ, we have the following. 0 For 1 ≤ i ≤ n, ExtiΓ (TrC ?, C) is a well-defined additive functor mod Λ → mod Λ. 1 If n = 1, there is an exact sequence λ 0 → Ext1Γ (TrC M, C) → M −−M → M †‡ → Ext2Γ (TrC M, C). If n = 0, then there is an injective homomorphism Ker λM ֒→ Ext1Γ (TrC M, C). 2 If n ≥ 2, then i There is an exact sequence λ → M †‡ → Ext2Γ (TrC M, C) → 0. 0 → Ext1Γ (TrC M, C) → M −−M ii There are isomorphisms Exti+2 Γ(TrC M, C) ∼ = ExtiΓ (M † , C) for 1 ≤ i ≤ n − 2. iii There is an injective map ExtΓn−1 (M † , C) ֒→ Extn+1 Γ (TrC M, C). Proof. 0 is obvious by assumption. We consider that F(M) is a complex with M at degree zero. Then consider ∂† ε† Q(M) := F(M)† [2] : F1 (M)† ←− F0 (M)† ← − M† ← 0 where F1 (M)† is at degree zero. As this complex is quasi-isomorphic to TrC (M), there is a spectral sequence E1p,q = ExtqΓ (Q(M)−p , C) ⇒ Extp+q Γ (TrC M, C). 21 1,0 ⊂ E 1 . If n ≥ 1, then E10,1 = 0, and In general, Ker λM = E21,0 ∼ = E∞ 2,0 2,0 1,0 ⊂ E 2 . So 1 E∞ = E 1 . Moreover, as E10,1 = 0, Coker λM ∼ = E∞ = E2 ∼ follows. 2,0 If n ≥ 2, then E10,2 = E11,1 = 0 by assumption, so E∞ = E 2 , and i of 2 p,q p,q follows. Note that E1 = 0 for p ≥ 3. Moreover, E1 = 0 for p = 0, 1 and 1 ≤ q ≤ n. So for 1 ≤ i ≤ n − 1, we have 2,i ֒→ E i+2 , E12,i ∼ = E∞ and the inclusion is an isomorphism if 1 ≤ i ≤ n − 2. So ii and iii of 2 follow. Corollary 4.14. Let n ≥ 1. If ExtiΓ (C, C) = 0 for 1 ≤ i ≤ n, then M is (n, C)-TF if and only if ExtiΓ (TrC M, C) = 0 for 1 ≤ i ≤ n. If ExtiΓ (C, C) = 0 for 1 ≤ i < n and ExtiΓ (TrC M, C) = 0 for 1 ≤ i ≤ n, then M is (n, C)-TF. 5. Canonical module (5.1) Let R = (R, m) be semilocal, where m is the Jacobson radical of R. (5.2) We say that a dualizing complex I over R is normalized if for any maximal ideal n of R, Ext0R (R/n, I) 6= 0. We follow the definition of [Hart2]. (5.3) For a left or right Λ-module M, dim M or dimΛ M denotes the dimension dimR M of M, which is independent of the choice of R. We call depthR (m, M), which is also independent of R, the global depth, Λ-depth, or depth of M, and denote it by depthΛ M or depth M. M is called globally Cohen–Macaulay or GCM for short, if dim M = depth M. M is GCM if and only if it is Cohen–Macaulay as an R-module, and all the maximal ideals of R have the same height. This notion is independent of R, and depends only on Λ and M. M is called a globally maximal Cohen–Macaulay (GMCM for short) if dim Λ = depth M. We say that the algebra Λ is GCM if the Λ-module Λ is GCM. However, in what follows, if R happens to be local, then GCM and Cohen–Macaulay (resp. GMSM and maximal Cohen–Macaulay) (over R) are the same thing, and used interchangeably. (5.4) Assume that (R, m) is complete semilocal, and Λ 6= 0. Let I be a normalized dualizing complex of R. The lowest non-vanishing cohomology i group Ext−s R (Λ, I) (ExtR (Λ, I) = 0 for i < −s) is denoted by KΛ , and is called the canonical module of Λ. Note that KΛ is a Λ-bimodule. Hence it is also a Λop -bimodule. In this sense, KΛ = KΛop . If Λ = 0, then we define KΛ = 0. 22 (5.5) Let S be the center of Λ. Then S is module-finite over R, and IS = RHomR (S, I) is a normalized dualizing complex of S. This shows that RHomR (Λ, I) ∼ = RHomS (Λ, IS ), and hence the definition of KΛ is also independent of R. Lemma 5.6. The number s in (5.4) is nothing but d := dim Λ. Moreover, AssR KΛ = AsshR Λ := {P ∈ MinR Λ | dim R/P = dim Λ}. Proof. We may replace R by R/ annR Λ, and may assume that Λ is a faithful module. We may assume that I is a fundamental dualizing complex of R. That is, for each P ∈ Spec R, E(R/P ), the injective hull of R/P , appears exactly once (at dimension − dim R/P ). If Ext−i R (Λ, I) 6= 0, then there exists −i some P ∈ Spec R such that ExtRP (ΛP , IP ) 6= 0. Then P ∈ SuppR Λ and dim R/P ≥ i. On the other hand, Ext−d RP (ΛP , IP ) has length l(ΛP ) and is nonzero for P ∈ AsshR Λ. So s = d. The argument above shows that each P ∈ AsshR Λ = Assh R supports KΛ . So AsshR Λ ⊂ MinR KΛ . On the other hand, as the complex I starts at degree −d, KΛ ⊂ I−d , and Ass KΛ ⊂ Ass I−d ⊂ Assh R = AsshR Λ. Lemma 5.7. Let (R, m) be complete semilocal. Then KΛ satisfies the (S2Λ )R condition. Proof. It is easy to see that (KΛ )n is either zero or KΛn for each maximal ideal n of R. Hence we may assume that R is local. Replacing R by R/ annR Λ, we may assume that Λ is a faithful R-module, and we are to prove that KΛ satisfies (S2′ )R by Lemma 2.20. Replacing R by a Noether normalization, we may further assume that R is regular by Lemma 2.22, 1. Then KΛ = HomR (Λ, R). So KΛ ∈ Syz(2, R) ⊂ (S2′ )R by Lemma 4.8 (consider that Λ there is R here, and C there is also R here). (5.8) Assume that (R, m) is semilocal which may not be complete. We say that a finitely generated Λ-bimodule K is a canonical module of Λ if K̂ is isomorphic to the canonical module KΛ̂ as a Λ̂-bimodule. It is unique up to isomorphisms, and denoted by KΛ . We say that K ∈ mod Λ is a right canonical module of Λ if K̂ is isomorphic to KΛ̂ in mod Λ̂, where ˆ? is the m-adic completion. If KΛ exists, then K is a right canonical module if and only if K ∼ = KΛ in mod Λ. These definitions are independent of R, in the sense that the (right) canonical module over R and that over the center of Λ are the same thing. The right 23 canonical module of Λop is called the left canonical module. A Λ-bimodule ω is said to be a weakly canonical bimodule if Λ ω is left canonical, and ωΛ is right canonical. The canonical module KΛop of Λop is canonically identified with KΛ . (5.9) If R has a normalized dualizing complex I, then Î is a normalized dualizing complex of R̂, and so it is easy to see that KΛ exists and agrees with Ext−d (Λ, I), where d = dim Λ(:= dimR Λ). In this case, for any P ∈ Spec R, IP is a dualizing complex of RP . So if R has a dualizing complex and (KΛ )P 6= 0, then (KΛ )P , which is the lowest nonzero cohomology group of RHomRP (ΛP , IP ), is the RP -canonical module of ΛP . See also Theorem 7.5 below. Lemma 5.10. Let (R, m) be local, and assume that KΛ exists. Then we have the following. 1 AssR KΛ = AsshR Λ. 2 KΛ ∈ (S2Λ )R . 3 R/ ann KΛ is quasi-unmixed, and hence is universally catenary. Proof. All the assertions are proved easily using the case that R is complete. (5.11) A Λ-module M is said to be Λ-full over R if SuppR M = SuppR Λ. Lemma 5.12. Let (R, m) be local. If KΛ exists and Λ satisfies the (S2 )R condition, then R/ ann KΛ is equidimensional, and KΛ is Λ-full over R. Proof. The same as the proof of [Ogo, Lemma 4.1] (use Lemma 5.10, 3). (5.13) Let (R, m) be local, and I be a normalized dualizing complex. By the local duality, KΛ∨ = Ext−d (Λ, I)∨ ∼ = Hmd (Λ) (as Λ-bimodules), where ER (R/m) is the injective hull of the R-module R/m, and (?)∨ is the Matlis dual HomR (?, ER (R/m)). 24 (5.14) Let (R, m) be semilocal, and I be a normalized dualizing complex. Note that RHomR (?, I) induces a contravariant equivalence between Dfg (Λop ) and Dfg (Λ). Let J ∈ Dfg (Λ ⊗R Λop ) be RHomR (Λ, I). RHomR (?, I) : Dfg (Λop ) → Dfg (Λ) is identified with RHomΛop (?, RHomR (Λ ΛR , I)) = RHomΛop (?, J) and similarly, RHomR (?, I) : Dfg (Λ) → Dfg (Λop ) is identified with RHomΛ (?, J). Note that a left or right Λ-module M is maximal Cohen–Macaulay if and only if RHomR (M, I) is concentrated in degree −d, where d = dim Λ. (5.15) J above is a dualizing complex of Λ in the sense of Yekutieli [Yek, (3.3)]. (5.16) Λ is GCM if and only if KΛ [d] → J is an isomorphism. If so, M ∈ mod Λ is GMCM if and only if RHomR (M, I) is concentrated in degree −d if and only if ExtiΛop (M, KΛ ) = 0 for i > 0. Also, in this case, as KΛ [d] is a dualizing complex, it is of finite injective dimension both as a left and a right Λ-module. To prove these, we may take the completion, and may assume that R is complete. All the assertions are independent of R, so taking the Noether normalization, we may assume that R is local. By (5.14), the assertions follow. (5.17) For any M ∈ mod Λ which is GMCM, M∼ = RHomR (Ext−d = RHomR (RHomR (M, I), I) ∼ Λop (M, KΛ [d]), I)[−d]. Hence M † := HomΛop (M, KΛ ) is also a GMCM Λ-module, and hence HomΛ (M † , KΛ ) → RHomΛ (M † , J) = RHomR (M † , I) is an isomorphism (in other words, ExtiΛ (M † , KΛ ) = 0 for i > 0). So the canonical map (8) M → HomΛ (HomΛop (M, KΛ ), KΛ ) = HomΛ (M † , KΛ ) m 7→ (ϕ 7→ ϕm) is an isomorphism. This isomorphism is true without assuming that R has a dualizing complex (but assuming the existence of a canonical 25 module), passing to the completion. Note that if Λ = R and KR exists and Cohen–Macaulay, then KR is a dualizing complex of R. Similarly, for N ∈ Λ mod which is GMCM, N → HomΛop (HomΛ (N, KΛ ), KΛ ) n 7→ (ϕ 7→ ϕn) is an isomorphism. (5.18) In particular, letting M = Λ, if Λ is GCM, we have that KΛ = HomΛop (Λ, KΛ ) is GMCM. Moreover, Λ → EndΛop KΛ is an R-algebra isomorphism, where a ∈ Λ goes to the left multiplication by a. Similarly, Λ → (EndΛ KΛ )op is an isomorphism of R-algebras. (5.19) Let (R, m) be a d-dimensional complete local ring, and dim Λ = d. Then by the local duality, −d ∼ ∼ Hmd (KΛ )∨ ∼ = Ext−d R (KΛ , I) = ExtΛop (KΛ , J) = EndΛop KΛ , where J = HomR (Λ, I) and (?)∨ = HomR (?, ER (R/m)). 6. n-canonical module (6.1) We say that ω is an R-semicanonical right Λ-module (resp. R-semicanonical left Λ-module, weakly R-semicanonical Λ-bimodule, R-semicanonical Λ-bimodule) if for any P ∈ Spec R, RP ⊗R ω is the right canonical module (resp. left canonical module, weakly canonical module, canonical module) of RP ⊗R Λ for any P ∈ suppR ω. If we do not mention what R is, then it may mean R is the center of Λ. An R-semicanonical right Λop -module (resp. R-semicanonical left Λop -module, weakly R-semicanonical Λop -bimodule, Rsemicanonical Λop -bimodule) is nothing but an R-semicanonical left Λ-module (resp. R-semicanonical right Λ-module, weakly R-semicanonical Λ-bimodule, R-semicanonical Λ-bimodule). 26 (6.2) Let C ∈ mod Λ (resp. Λ mod, (Λ ⊗R Λop ) mod, (Λ ⊗R Λop ) mod). We say that C is an n-canonical right Λ-module (resp. n-canonical left Λ-module, weakly n-canonical Λ-bimodule, n-canonical Λ-bimodule) over R if C ∈ (Sn′ )R , and for each P ∈ Rh<ni , we have that CP is an RP -semicanonical right ΛP module (resp. RP -semicanonical left ΛP -module, weakly RP -semicanonical ΛP -bimodule, RP -semicanonical ΛP -bimodule). If we do not mention what R is, it may mean R is the center of Λ. Example 6.3. 0 The zero module 0 is an R-semicanonical Λ-bimodule. 1 If R has a dualizing complex I, then the lowest non-vanishing cohomology group K := Ext−s R (Λ, I) is an R-semicanonical Λ-bimodule. 2 By Lemma 5.10, any left or right R-semicanonical module K of Λ satisfies the (S2Λ )R -condition. Thus a (right) semicanonical module is 2canonical over R/ annR Λ. 3 If K is (right) semicanonical (resp. n-canonical) and L is a projective R-module such that LP is rank at most one, then K ⊗R L is again (right) semicanonical (resp. n-canonical). 4 If R is a normal domain and C its rank-one reflexive module of R, then C is a 2-canonical R-module (here Λ = R). 5 The R-module R is n-canonical if and only if for P ∈ R[<n] , RP is Gorenstein. This is equivalent to say that R satisfies (Tn−1 ) + (Sn ). (6.4) As in section 4, let C ∈ mod Λ, and set Γ = EndΛop C, (?)† = HomΛop (?, C), and (?)‡ = HomΓ (?, C). Moreover, we set Λ1 := (EndΓ C)op . The R-algebra map Ψ1 : Λ → Λ1 is induced by the right action of Λ on C. Lemma 6.5. Let C ∈ mod Λ be a 1-canonical Λop -module over R. Let M ∈ mod Λ. Then the following are equivalent. 1 M ∈ TF(1, C). 2 M ∈ UP(1, C). 3 M ∈ Syz(1, C). 4 M ∈ (S1′ )R C. 27 Proof. 1⇔2 is Lemma 4.7. 2⇒3 is trivial. 3⇒4 follows from Lemma 4.10 immediately. We prove 4⇒1. We want to prove that λM : M → M †‡ is injective. By Example 2.13, localizing at each P ∈ Rh0i , we may assume that (R, m) is zero-dimensional local. We may assume that M is nonzero. By assumption, C is nonzero, and hence C = KΛ by assumption. As R is zero-dimensional, Λ is GCM, and hence Λ → Γ = EndΛop KΛ is an isomorphism by (5.18). As Λ is GCM and M is GMCM, (8) is an isomorphism. As Λ = Γ, the result follows. Lemma 6.6. Let C be a 1-canonical right Λ-module over R, and N ∈ Γ mod. Then N ‡ ∈ TFΛop (2, C). Similarly, for M ∈ mod Λ, we have that M † ∈ TFΓ (2, C). Proof. Note that λN ‡ : N ‡ → N ‡†‡ is a split monomorphism. Indeed, (µN )‡ : N ‡†‡ → N ‡ is the left inverse. Assume that N ‡ ∈ / TF(2, C), then W := Coker λN ‡ is nonzero. Let P ∈ AssR W . As W is a submodule of N ‡†‡ , P ∈ AssR N ‡†‡ ⊂ AssR C ⊂ Min R. So CP is the right canonical module KΛP . So ΓP = ΛP , and (λN ‡ )P is an isomorphism. This shows that WP = 0, and this is a contradiction. The second assertion is proved similarly. Lemma 6.7. Let (R, m) be local, and assume that KΛ exists. Let C := KΛ . If Λ is GCM, Ψ1 : Λ → Λ1 is an isomorphism. Proof. As C possesses a bimodule structure, we have a canonical map Λ → Γ = EndΛop C, which is an isomorphism as Λ is GCM by (5.18). So Λ1 is identified with ∆ = (EndΛ C)op . Then Ψ1 : Λ → (EndΛ C)op is an isomorphism again by (5.18). Lemma 6.8. If C satisfies the (S1′ )R condition, then Γ ∈ (S1′ )R C and Λ1 ∈ (S1′ )R . Moreover, Ass Γ = Ass Λ = Ass C = Min C. R R 1 R R C Proof. The first assertion is by Γ = HomΛop (C, C) ∈ SyzΓ (2, C), and Λ1 = HomΓ (C, C) = SyzΛ1 (2, C). We prove the second assertion. AssR Γ ⊂ AssR EndR C = AssR C. AssR Λ1 ⊂ AssR EndR C = AssR C = MinR C. It remains to show that SuppR C = SuppR Γ = SuppR Λ1 . Let P ∈ Spec R. If CP = 0, then ΓP = 0 and (Λ1 )P = 0. On the other hand, if CP 6= 0, then the identity map CP → CP is not zero, and hence ΓP 6= 0 and (Λ1 )P 6= 0. 28 Q (6.9) Let C be a 1-canonical right Λ-module over R. Define Q := P ∈MinR C RP . If P ∈ MinR C, then CP = KΛP . Hence ΦP : ΛP → (Λ1 )P is an isomorphism by Lemma 6.7. So 1Q ⊗ Ψ1 : Q ⊗R Λ → Q ⊗R Λ1 is also an isomorphism. As AssR Λ1 = MinR C, we have that Λ1 ⊂ Q ⊗R Λ1 . Lemma 6.10. Let C be a 1-canonical right Λ-module over R. If Λ is commutative, then so are Λ1 and Γ. Proof. As Λ1 ⊂ Q ⊗R Λ1 = Q ⊗R Λ and Q ⊗R Λ is commutative, Λ1 is a commutative ring. We prove that Γ is commutative. As AssR Γ ⊂ MinR C, Γ is a subring of Q ⊗ Γ. As Y Y EndΛP (KΛP ) EndΛP CP ∼ Q ⊗R Γ ∼ = = P P ∈MinR C and ΛP → EndΛP (KΛP ) is an isomorphism (as ΛP is zero-dimensional), Q⊗R Γ is, and hence Γ is also, commutative. Lemma 6.11. Let C be a 1-canonical right Λ-module over R. Let M and N be left (resp. right, bi-) modules of Λ1 , and assume that N ∈ (S1′ )Λ1 ,R . Let ϕ : M → N be a Λ-homomorphism of left (resp. right, bi-) modules. Then ϕ is a Λ1 -homomorphism of left (resp. right, bi-) modules. Q Proof. Let Q = P ∈MinR C RP . Then we have a commutative diagram M ϕ / N iM  Q ⊗R M , iN 1⊗ϕ /  Q ⊗R N where iM (m) = 1 ⊗ m and iN (n) = 1 ⊗ n. Clearly, iM and iN are Λ1 -linear. As ϕ is Λ-linear, 1 ⊗ ϕ is Q ⊗ Λ-linear. Since Λ1 ⊂ Q ⊗ Λ1 = Q ⊗ Λ, 1 ⊗ ϕ is Λ1 -linear. As iN is injective, it is easy to see that ϕ is Λ1 -linear. Lemma 6.12. Let C be a 1-canonical right Λ-module over R. Then the restriction M 7→ M is a full and faithful functor from (S1′ )Λ1 ,R to (S1′ )Λ,R C . Simiop ,R op Λ ′ Λop ,R ′ larly, it gives a full and faithful functors (S1 ) 1 → (S1 )C and (S1′ )Λ1 ⊗R Λ1 ,R → op R Λ ,R (S1′ )Λ⊗ . C Proof. We only consider the case of left modules. If M ∈ Λ1 mod, then it is a homomorphic image of Λ1 ⊗R M. Hence suppR M ⊂ suppR Λ1 ⊂ suppR C. So the functor is well-defined and obviously faithful. By Lemma 6.11, it is also full, and we are done. 29 (6.13) Let C be a 1-canonical Λ-bimodule over R. Then the left action of Q Λ on C induces an R-algebra map Φ : Λ → Γ = EndΛop C. Let Q = P ∈MinR C RP . Then Γ ⊂ Q ⊗R Γ = Q ⊗R Λ. From this we get Lemma 6.14. Let C be a 1-canonical Λ-bimodule over R. Let M and N be left (resp. right, bi-) modules of Γ, and assume that N ∈ (S1′ )Γ,R . Let ϕ : M → N be a Λ-homomorphism of left (resp. right, bi-) modules. Then ϕ is a Γ-homomorphism of left (resp. right, bi-) modules. Proof. Similar to Lemma 6.11, and left to the reader. Corollary 6.15. Let C be as above. (?)†‡ = HomΓ (HomΛop (?, C), C) is canonically isomorphic to (?)†⋆ = HomΛ (HomΛop (?, C), C), where (?)⋆ = HomΛ (?, C). Proof. This is immediate by Lemma 6.14. Lemma 6.16. Let C be a 1-canonical Λ-bimodule over R. Then Φ induces a op ′ Λ,R ′ Γop ,R ′ Λ ,R full and faithful functor (S1′ )Γ,R → (S ) . Similarly, (S ) → (S ) 1 1 1 C C op op R Λ ,R and (S1′ )Γ⊗R Γ ,R → (S1′ )Λ⊗ are also induced. C Proof. Similar to Lemma 6.12, and left to the reader. Corollary 6.17. Let C be a 1-canonical Λ-bimodule. Set ∆ := (EndΛ C)op . Then the canonical map Λ → Γ induces an equality Λ1 = (EndΓ C)op = (EndΛ C)op = ∆. Similarly, we have Λ2 := End∆op C = EndΛop C = Γ. Proof. As C ∈ (S1′ )Γ,R , the first assertion follows from Lemma 6.16. The second assertion is proved by left-right symmetry. Lemma 6.18. Let C be a 1-canonical right Λ-module over R. Set Λ1 := (EndΓ C)op . Let Ψ1 : Λ → Λ1 be the canonical map induced by the right action of Λ on C. Then Ψ1 is injective if and only if Λ satisfies the (S1′ )R condition and C is Λ-full over R. Proof. Ψ1 : Λ → Λ1 is nothing but λΛ : Λ → Λ†‡ , and the result follows from Lemma 6.5 immediately. Lemma 6.19. Let C be a 1-canonical Λ-bimodule over R. Then the following are equivalent. 30 1 The canonical map Ψ : Λ → ∆ is injective, where ∆ = (EndΛ C)op , and the map is induced by the right action of Λ on C. 2 Λ satisfies the (S1′ )R condition, and C is Λ-full over R. 3 The canonical map Φ : Λ → Γ is injective, where the map is induced by the left action of Λ on C. Proof. By Corollary 6.17, we have that Λ1 = (EndΓ C)op = ∆. So 1⇔2 is a consequence of Lemma 6.18. Reversing the roles of the left and the right, we get 2⇔3 immediately. Lemma 6.20. Let C be a 1-canonical right Λ-module over R. Then the canonical map (9) HomΛop (Λ1 , C) → HomΛop (Λ, C) ∼ =C induced by the canonical map Ψ1 : Λ → Λ1 is an isomorphism of Γ ⊗R Λop 1 modules. Proof. The composite map C∼ =C = HomΛ1 (Λ1 , C) = HomΛ (Λ1 , C) → HomΛ (Λ, C) ∼ is the identity. The map is a Γ ⊗R Λop -homomorphism. It is also Λop 1 -linear by Lemma 6.12. (6.21) When (R, m) is local and C = KΛ , then Λ1 = ∆, and the map (9) is an isomorphism of Γ ⊗R ∆op -modules from K∆ and KΛ , where ∆ = (EndΛ KΛ )op . Indeed, to verify this, we may assume that R is complete regular local with annR Λ = 0, and hence C = HomR (Λ, R), and C is a 2-canonical Λ-bimodule over R, see (6.3). So (6.17) and Lemma 6.20 apply. Hence we have Corollary 6.22. Let (R, m) be a local ring with a canonical module C = KΛ of Λ. Then K∆ = HomΛop (∆, KΛ ) is isomorphic to KΛ as a Γ ⊗R ∆op -module, where ∆ = (EndΛ KΛ )op . Lemma 6.23. Let n ≥ 1. If C is an n-canonical right Λ-module over R, then 1 C is an n-canonical right Λ1 -module over R. 2 C is an n-canonical left Γ-module over R. 31 Proof. 1. As the (Sn′ )-condition holds, it suffices to prove that for P ∈ Rh<ni , CP ∼ = (KΛ1 )P as a right (Λ1 )P -module. After localization, replacing R by RP , we may assume that R is local and C = KΛ . Then C ∼ = KΛ1 as right = KΛ ∼ ′ Λop ,R Λ-modules. Both C and KΛ1 are in (S1 ) 1 , and isomorphic in mod Λ. So they are isomorphic in mod Λ1 by Lemma 6.12. 2. Similarly, assuming that R is local and C = KΛ , it suffices to show that ∼ C = KΓ as left Γ-modules. Identifying Γ = End∆op C = Λ2 and using the left-right symmetry, this is the same as the proof of 1. Lemma 6.24. Let C ∈ mod Λ be a 2-canonical right Λ-module over R. Let M ∈ mod Λ. Then the following are equivalent. 1 M ∈ TF(2, C). 2 M ∈ UP(2, C). 3 M ∈ Syz(2, C). 4 M ∈ (S2′ )R C. Proof. We may assume that Λ is a faithful R-module. 1⇔2⇒3⇒4 is easy. We show 4⇒1. By Example 2.13, localizing at each P ∈ Rh≤1i , we may assume that R is a Noetherian local ring of dimension at most one. So the formal , where ˆ? denotes the fibers of R are zero-dimensional, and hence M̂ ∈ (S2′ )R̂ Ĉ completion. So we may further assume that R = (R, m) is complete local. We may assume that M 6= 0 so that C 6= 0 and hence C = KΛ . The case dim R = 0 is similar to the proof of Lemma 6.5, so we prove the case that dim R = 1. Note that I = Hm0 (Λ) is a two-sided ideal of Λ, and any module op in (S1′ )Λ ,R is annihilated by I. Replacing Λ by Λ/I, we may assume that Λ is a maximal Cohen–Macaulay R-module. Then (8) is an isomorphism. As C = KΛ and Λ → EndΛop KΛ = EndΛop C = Γ is an R-algebra isomorphism, we have that λM : M → M †‡ is identified with the isomorphism (8), as desired. Corollary 6.25. Let C be a 2-canonical right Λ-module over R. Then the canonical map Φ : Λ → Λ1 is an isomorphism if and only if Λ satisfies (S2′ )R and C is full. Proof. Follows immediately by Lemma 6.24 applied to M = Λ. 32 (6.26) Let C be a 2-canonical Λ-bimodule. Let Γ = EndΛop C and ∆ = (EndΛ C)op . Then by the left multiplication, an R-algebra map Λ → Γ is induced, while Q by the right multiplication, an R-algebra map Λ → ∆ is induced. Let Q = P ∈MinR C RP . Then as Γ ⊂ Q ⊗R Γ = Q ⊗R Λ = Q ⊗R ∆ ⊃ ∆, both Γ and ∆ are identified with Q-subalgebras of Q ⊗R Λ. As ∆ = Λ1 = Λ†‡ , we have a commutative diagram Λ λΛ Λ†‡ / ν  Γ  λΓ / =∆. ν †‡ Γ†‡ As Γ = HomΛop (C, C) = C † , Γ ∈ SyzΛ (2, C) by Lemma 4.8. By Lemma 6.24, we have that Γ ∈ (S2′ )C . Hence by Lemma 6.24 again, λΓ : Γ → Γ†‡ is an isomorphism. Hence ∆ ⊂ Γ. By symmetry ∆ ⊃ Γ. So ∆ = Γ. With this identification, Γ acts on C not only from left, but also from right. As the actions of Γ extend those of Λ, C is a Γ-bimodule. Indeed, for a ∈ Λ, the left multiplication λa : C → C (λa (c) = ac) is right Γ-linear. So for b ∈ Γ, ρb : C → C (ρb (c) = cb) is left Λ-linear, and hence is left Γ-linear. Theorem 6.27. Let C be a 2-canonical right Λ-module. Then the restriction op Λop ,R M 7→ M gives an equivalence ρ : (S2′ )Λ1 ,R → (S2′ )C . Proof. The functor is obviously well-defined, and is full and faithful by Lemma 6.12. op ′ Λ ,R On the other hand, given M ∈ (S2 )C , we have that λM : M → M †‡ is an op isomorphism. As M †‡ has a Λop 1 -module structure which extends the Λ †‡ ∼ module structure of M = M , we have that ρ is also dense, and hence is an equivalence. Corollary 6.28. Let C be a 2-canonical Λ-bimodule. Then the restriction M 7→ M gives an equivalence op ,R RΓ ρ : (S2′ )Γ⊗ C RΛ → (S2′ )Λ⊗ C op ,R . Proof. ρ is well-defined, and is obviously faithful. If h : M → N is a morphism op op R Λ ,R R Γ ,R of (S2 )Λ⊗ between objects of (S2 )Γ⊗ , then h is Γ-linear Γop -linear C C by Theorem 6.27 (note that Λ1 = ∆ = Γ here). Hence ρ is full. op R Λ ,R Let M ∈ (S2 )Λ⊗ , the left (resp. right) Λ-module structure of M is C extendable to that of a left (resp. right) Γ-module structure by Theorem 6.27. It remains to show that these structures make M a Γ-bimodule. Let a ∈ Λ. 33 Then λa : M → M given by λa (m) = am is a right Λ-linear, and hence is right Γ-linear. So for b ∈ Γ, ρb : M → M given by ρb (m) = mb is left Λ-linear, and hence is left Γ-linear, as desired. Proposition 6.29. Let C be a 2-canonical opright Λ-module. Then (?)† : op ′ Λ ,R (S2 )C → (S2′ )Γ,R and (?)‡ : (S2′ )Γ,R → (S2′ )ΛC ,R give a contravariant equivalence. Proof. As we know that (?)† and (?)‡ are contravariant adjoint each other, it suffices to show that the unit λM : M → M †‡ and the (co-)unit µN : N → N ‡† are isomorphisms. λM is an isomorphism by Lemma 6.24. Note that C is a 2-canonical left Γ-module by Lemma 6.23. So µN is an isomorphism by Lemma 6.24 applied to the right Γop -module C. Corollary 6.30. Let C be a 2-canonical Λ-bimodule. Then (?)† = HomΛop (?, C) op and HomΛ (?, C) give a contravariant equivalence between (S2′ )ΛC ,R and (S2′ )Λ,R C . op ′ Λ⊗Λ ,R They also give a duality of (S2 )C . Proof. The first assertion is immediate by Proposition 6.29 and Theorem 6.27. The second assertion follows easily from the first and Corollary 6.28. 7. Non-commutative Aoyama’s theorem Lemma 7.1. Let (R, m, k) → (R′ , m′ , k ′ ) be a flat local homomorphism between Noetherian local rings. 1 Let M be a Λ-bimodule such that M ′ := R′ ⊗R M is isomorphic to Λ′ := R′ ⊗R Λ as a Λ′ -bimodule. Then M ∼ = Λ as a Λ-bimodule. 2 Let M be a right Λ module such that M ′ := R′ ⊗R M is isomorphic to Λ′ := R′ ⊗R Λ as a right Λ′ -module. Then M ∼ = Λ as a right Λ-module. Proof. Taking the completion, we may assume that both R and R′ are complete. Let 1 = e1 + · · · + er be the decomposition of 1 into the mutually orthogonal primitive idempotents of the center S of Λ. Then replacing R by Sei , Λ by Λei , and R′ by the local ring of R′ ⊗R Sei at any maximal ideal, we may further assume that S = R. This is equivalent to say that R → EndΛ⊗R Λop Λ is isomorphic. So R′ → EndΛ′ ⊗R′ (Λ′ )op Λ′ is also isomorphic, and hence the center of Λ′ is R′ . P 1. Let ψ : M ′ → Λ′ be an isomorphism. Then we can write ψ = P m i=1 ui ψi n −1 ′ op with ui ∈ R and ψi ∈ HomΛ⊗R Λ (M, Λ). Also, we can write ψi = j=1 vj ϕj 34 P with vj ∈ R′ and ϕj ∈ HomΛ⊗R Λop (Λ, M). As i,j ui vj ψi ϕj = ψψ −1 = 1 ∈ EndΛ′ ⊗R′ (Λ′ )op Λ′ ∼ = R′ and R′ is local, there exists some i, j such that ui vj ψi ϕj is an automorphism of Λ′ . Then ψi : M ′ → Λ′ is also an isomorphism. By faithful flatness, ψi : M → Λ is an isomorphism. 2. It is easy to see that M ∈ mod Λ is projective. So replacing Λ by Λ/J, where J is the radical of J, and changing R and R′ as above, we may assume that R is a field and Λ is central simple. Then there is only one simple right Λ-module, and M and Λ are direct sums of copies of it. As M ′ ∼ = Λ′ , by dimension counting, the number of copies are equal, and hence M and Λ are isomorphic. Lemma 7.2. Let (R, m, k) → (R′ , m′ , k ′ ) be a flat local homomorphism between Noetherian local rings. 1 Let C be a 2-canonical bimodule of Λ over R. Let M be a Λ-bimodule such that M ′ := R′ ⊗R M is isomorphic to C ′ := R′ ⊗R C as a Λ′ bimodule. Then M ∼ = C as a Λ-bimodule. 2 Let C be a 2-canonical right Λ-module over R. Let M be a right Λmodule such that M ′ := R′ ⊗R M is isomorphic to C ′ := R′ ⊗R C as a right Λ′ -module. Then M ∼ = C as a right Λ-module. Proof. 1. As M ′ ∼ = C ′ and C ∈ (S2′ )C , it is easy to see that M ∈ (S2′ )C . Hence M is a Γ-bimodule, where Γ = EndΛop C = EndΛ C, see (6.26) and Corollary 6.28. Note that (M † )′ ∼ = Γ′ as Γ′ -bimodules. By Lemma 7.1, = (C † )′ ∼ † ∼ 1, we have that M = Γ as a Γ-bimodule. Hence M ∼ = M †‡ ∼ = Γ‡ ∼ = C. † ′ ∼ † ′ ∼ ′ ′ † ∼ 2. As (M ) = (C ) = Γ as Γ -modules, M = Γ as Γ-modules by Lemma 7.1, 2. Hence M ∼ = C. = Γ‡ ∼ = M †‡ ∼ Proposition 7.3. Let (R, m, k) → (R′ , m′ , k ′ ) be a flat local homomorphism between Noetherian local rings. Assume that R′ /mR′ is zero-dimensional, and M ′ := R′ ⊗R M is the right canonical module of Λ′ := R′ ⊗R Λ. Then R′ /mR′ is Gorenstein. Proof. We may assume that both R and R′ are complete. Replacing R by R/ annR Λ and R′ by R′ ⊗R R/ annR Λ, we may assume that Λ is a faithful R-module. Let d = dim R = dim R′ . Then R′ ⊗R Hmd (M) ∼ = HomR′ (Γ′ , E ′ ), = Hmd ′ (KΛ′ ) ∼ = Hmd ′ (R′ ⊗R M) ∼ 35 where Λ′ = R′ ⊗R Λ, E ′ = ER′ (R′ /m′ ) is the injective hull of the residue field, Γ = EndΛop M, Γ′ = R′ ⊗R Γ ∼ = EndΛ′ KΛ′ , and the isomorphisms are those of ′ Γ -modules. The last isomorphism is by (5.19). So R′ ⊗R Hmd (M) ∈ Mod Γ′ is injective. Considering the spectral sequence E2p,q = ExtpR′ ⊗R (Γ⊗R k) (W, ExtqΓ′ (R′ ⊗R (Γ ⊗R k), R′ ⊗R Hmd (M))) ′ d ⇒ Extp+q Γ′ (W, R ⊗R Hm (M)) 1,0 for W ∈ Mod(R′ ⊗R (Γ ⊗R k)), E21,0 = E∞ ⊂ Ext1Γ′ (W, R′ ⊗R Hmd (M)) = 0 by the injectivity of R′ ⊗R Hmd (M). It follows that HomΓ′ (R′ ⊗R (Γ ⊗R k), R′ ⊗R Hmd (M)) ∼ = (R′ /mR′ ) ⊗k HomR (k, Hmd (M)) is an injective (R′ /mR′ ) ⊗k (Γ ⊗R k)-module. However, as an R′ /mR′ -module, this is a free module. Also, this module must be an injective R′ /mR′ -module, and hence R′ /mR′ must be Gorenstein. Lemma 7.4. Let (R, m, k) → (R′ , m′ , k ′ ) be a flat local homomorphism between Noetherian local rings such that R′ /mR′ is Gorenstein. Assume that the canonical module KΛ of Λ exists. Then R′ ⊗R KΛ is the canonical module of R′ ⊗R Λ. Proof. We may assume that both R and R′ are complete. Let I be the normalized dualizing complex of R. Then R′ ⊗R I[d′ − d] is a normalized dualizing complex of R′ , where d′ = dim R′ and d = dim R, since R → R′ is a flat local homomorphism with the d′ − d-dimensional Gorenstein closed fiber, see [AvF, (5.1)] (the definition of a normalized dualizing complex in [AvF] is different from ours. We follow the one in [Hart2, Chapter V]). So ′ ′ ′ −d′ ∼ ∼ R′ ⊗R KΛ ∼ = R′ ⊗R Ext−d R (Λ, I) = ExtR (R ⊗R Λ, R ⊗R I[d − d]) = KΛ′ . Theorem 7.5 ((Non-commutative Aoyama’s theorem) cf. [Aoy, Theorem 4.2]). Let (R, m) → (R′ , m′ ) be a flat local homomorphism between Noetherian local rings. 1 If M is a Λ-bimodule and M ′ = R′ ⊗R M is the canonical module of Λ′ = R′ ⊗R Λ, then M is the canonical module of Λ. 2 If M is a right Λ-module such that M ′ is the right canonical module of Λ′ , then M is the right canonical module of Λ. 36 Proof. We may assume that both R and R′ are complete. Then the canonical module exists, and the localization of a canonical module is a canonical module, and hence we may localize R′ by a minimal element of {P ∈ Spec R′ | P ∩ R = m}, and take the completion again, we may further assume that the fiber ring R′ /mR′ is zero-dimensional. Then R′ /mR′ is Gorenstein by Proposition 7.3. Then by Lemma 7.4, M ′ ∼ = R′ ⊗R KΛ . By Lemma 7.2, = KΛ ′ ∼ M∼ = KΛ . In 1, the isomorphisms are those of bimodules, while in 2, they are of right modules. The proofs of 1 and 2 are complete. Corollary 7.6. Let (R, m) be a Noetherian local ring, and assume that K is the canonical (resp. right canonical) module of Λ. If P ∈ SuppR K, then the localization KP is the canonical (resp. right canonical) module of ΛP . In particular, K is a semicanonical bimodule (resp. right module), and hence is 2-canonical over R/ annR Λ. Proof. Let Q be a prime ideal of R̂ lying over P . Then (K̂)Q ∼ = R̂Q ⊗RP KP is nonzero by assumption, and hence is the canonical (resp. right canonical) module of R̂Q ⊗R Λ. Using Theorem 7.5, KP is the canonical (resp. right canonical) module of ΛP . The last assertion follows. (7.7) Let (R, m) be local, and assume that KΛ exists. Assume that Λ is a faithful R-module. Then it is a 2-canonical Λ-bimodule over R by Corollary 7.6. Letting Γ = EndΛop KΛ , KΓ ∼ = KΛ as Λ-bimodules by Corollary6.22. So by Corollary 6.28, there exists some Γ-bimodule structure of KΛ such that KΓ ∼ = KΛ as Γ-bimodules. As the left Γ-module structure of KΛ which extends the original left Λ-module structure is unique, and it is the obvious action of Γ = EndΛop KΛ . Similarly the right action of Γ is the obvious action of Γ = ∆ = (EndΛ KΛ )op , see (6.26). 8. Evans–Griffith’s theorem for n-canonical modules Lemma 8.1 (cf. [Aoy, Proposition 2], [Ogo, Proposition 4.2], [AoyG, Proposition 1.2]). Let (R, m) be local and assume that Λ has a canonical module C = KΛ . Then we have 1 λR : Λ → EndΛop KΛ is injective if and only if Λ satisfies the (S1 )R condition and SuppR Λ is equidimensional. 2 λR : Λ → EndΛop KΛ is bijective if and ony if Λ satisfies the (S2 )R condition. 37 Proof. Replacing R by R/ annR Λ, we may assume that Λ is a faithful Rmodule. Then KΛ is a 2-canonical Λ-bimodule over R by Corollary 7.6. KΛ is full if and only if SuppR Λ is equidimensional by Lemma 5.10, 1. Now 1 is a consequence of Lemma 6.19. 2 follows from Corollary 6.25 and Lemma 5.12. Proposition 8.2 (cf. [AoyG, (2.3)]). Let (R, m) be a local ring, and assume that there is an R-canonical module KΛ of Λ. Assume that Λ ∈ (S2 )R , and KΛ is a Cohen–Macaulay R-module. Then Λ is Cohen–Macaulay. If, moreover, KΛ is maximal Cohen–Macaulay, then so is Λ. Proof. The second assertion follows from the first. We prove the first assertion. Replacing R by R/ annR Λ, we may assume that Λ is faithful. Let d = dim R. So Λ satisfies (S2′ ), and KΛ is maximal Cohen–Macaulay. As KΛ is the lowest non-vanishing cohomology of J := RHomR (Λ, I), there is a natural map σ : KΛ [d] → J which induces an isomorphism on the −dth cohomology groups. Then the diagram Λ λ / HomΛop (KΛ [d], KΛ [d]) σ∗ λ  RHomΛop (J, J) σ∗  / RHomΛop (KΛ [d], J) is commutative. The top horizontal arrow λ is an isomorphism by Lemma 8.1. Note that RHomΛop (J, J) ∼ = RHomR (J, I) = RHomR (RHomR (Λ, I), I) = Λ, and the left vertical arrow is an isomorphism. As KΛ is maximal Cohen– Macaulay, RHomΛop (KΛ [d], J) is concentrated in degree zero. As H i (J) = 0 for i < −d, we have that the right vertical arrow σ∗ is an isomorphism. Thus the bottom horizontal arrow σ ∗ is an isomorphism. Applying RHomΛ (?, J) to this map, we have that KΛ [d] → J is an isomorphism. So Λ is Cohen– Macaulay, as desired. Corollary 8.3 (cf. [AoyG, (2.2)]). Let (R, m) be a local ring, and assume that there is an R-canonical module KΛ of Λ. Then KΛ is a Cohen–Macaulay (resp. maximal Cohen–Macaulay) R-module if and only if Γ = EndΛop KΛ is so. 38 Proof. As KΛ and Γ has the same support, if both of them are Cohen– Macaulay and one of them are maximal Cohen–Macaulay, then the other is also. So it suffices to prove the assertion on the Cohen–Macaulay property. To verify this, we may assume that Λ is a faithful R-module. Note that Γ satisfies (S2′ ). By Corollary 6.22, KΛ is Cohen–Macaulay if and only if KΓ is. If Γ is Cohen–Macaulay, then KΓ is Cohen–Macaulay by (5.18). Conversely, if KΓ is Cohen–Macaulay, then Γ is Cohen–Macaulay by Proposition 8.2. Theorem 8.4 (cf. [EvG, (3.8)], [ArI, (3.1)]). Let R be a Noetherian commutative ring, and Λ a module-finite R-algebra, which may not be commutative. Let n ≥ 1, and C be a right n-canonical Λ-module. Set Γ = EndΛop C. Let M ∈ mod C. Then the following are equivalent. 1 M ∈ TF(n, C). 2 M ∈ UP(n, C). 3 M ∈ Syz(n, C). 4 M ∈ (Sn′ )C . Proof. 1⇒2⇒3⇒4 is easy. We prove 4⇒1. By Lemma 6.5, we may assume that n ≥ 2. By Lemma 6.24, M ∈ TF(2, C). Let F : 0 ← M † ← F0 ← F1 ← · · · ← Fn−1 be a resolution of M † in Γ mod with each Fi ∈ add Γ. It suffices to prove its dual ‡ F‡ : 0 → M → F0‡ → F1‡ → · · · → Fn−1 is acyclic. By Lemma 2.12, we may localize at P ∈ Rh<ni , and may assume that dim R < n. If M = 0, then F is split exact, and so F‡ is also exact. So we may assume that M 6= 0. Then by assumption, C ∼ = KΛ in mod Λ, and C is a maximal Cohen–Macaulay R-module. Hence Γ is Cohen–Macaulay by Corollary 8.3. So by (5.16) and Lemma 6.22, RHomΓ (M † , C) = RHomΓ (M † , KΓ ) = M, and we are done. Corollary 8.5. Let the assumptions and notation be as in Theorem 8.4. Let n ≥ 0. Assume further that 1 ExtiΛop (C, C) = 0 for 1 ≤ i ≤ n; 2 C is Λ-full. 39 3 Λ satisfies the (Sn′ )R condition. Then for 0 ≤ r ≤ n, ⊥r C is contravariantly finite in mod Λ. Proof. For any M ∈ mod Λ, the nth syzygy module Ωn M satisfies the (Sn′ )R Cn op condition by 2 and 3. By Theorem 8.4, Ω M ∈ TFΛ (n, C). By Theorem 3.16, M ∈ Zr,0 , and there is a short exact sequence g 0→Y →X − →M →0 with X ∈ Xr,0 = ⊥r C and Y ∈ Yr . As Ext1Λop (X, Y ) = 0, we have that g is a right ⊥r C-approximation, and hence ⊥r C is contravariantly finite. Corollary 8.6. Let the assumptions and notation be as in Theorem 8.4. Let n ≥ 0, and C a Λ-full (n + 2)-canonical Λ-bimodule over R. Assume that Λ ′ satisfies the (Sn+2 )R condition. Then ⊥n C is contravariantly finite in mod Λ. Proof. By Corollary 8.5, it suffices to show that ExtiΛop (C, C) = 0 for 1 ≤ i ≤ n. Let ∆ = (EndΛ C)op . Then the canonical map Λ → ∆ is an isomorphism by Lemma 6.25, since C is a Λ-full 2-canonical Λ-bimodule over R. As Λ ∈ ′ (Sn+2 )R and C is a Λ-full (n + 2)-canonical left Λ-module over R, applying Theorem 8.4 to Λop , we have that Exti∆op (C, C) = 0 for 1 ≤ i ≤ n. As we have Λop → ∆op is an isomorphism, we have that ExtiΛop (C, C) = 0, as desired. 9. Symmetric and Frobenius algebras (9.1) Let (R, m) be a Noetherian semilocal ring, and Λ a module-finite Ralgebra. We say that Λ is quasi-symmetric if Λ is the canonical module of Λ. That is, Λ ∼ = KΛ as Λ-bimodules. It is called symmetric if it is quasi-symmetric and GCM. Note that Λ is quasi-symmetric (resp. symmetric) if and only if Λ̂ is so, where ˆ? denotes the m-adic completion. Note also that quasi-symmetric and symmetric are absolute notion, and is independent of the choice of R in the sense that the definition does not change when we replace R by the center of Λ. (9.2) For (non-semilocal) Noetherian ring R, we say that Λ is locally quasisymmetric (resp. locally symmetric) over R if for any P ∈ Spec R, ΛP is a quasi-symmetric (resp. symmetric) RP -algebra. This is equivalent to say that for any maximal ideal m of R, Λm is quasi-symmetric (resp. symmetric). In the case that (R, m) is semilocal, Λ is locally quasi-symmetric (resp. locally symmetric) over R if it is quasi-symmetric (resp. symmetric), but the converse is not true in general. 40 Lemma 9.3. Let (R, m) be a Noetherian semilocal ring, and Λ a module-finite R-algebra. Then the following are equivalent. 1 ΛΛ is the right canonical module of Λ. 2 ΛΛ is the left canonical module of Λ. Proof. We may assume that R is complete. Then replacing R by a Noether normalization of R/ annR Λ, we may assume that R is regular and Λ is a faithful R-module. We prove 1⇒2. By Lemma 5.10, Λ satisfies (S2′ )R . As R is regular and dim R = dim Λ, KΛ = Λ∗ = HomR (Λ, R). So we get an R-linear map ϕ : Λ ⊗R Λ → R such that ϕ(ab ⊗ c) = ϕ(a ⊗ bc) and that the induced map h : Λ → Λ∗ given by h(a)(c) = ϕ(a ⊗ c) is an isomorphism (in mod Λ). Now ϕ induces a homomorphism h′ : Λ → Λ∗ in Λ mod given by h′ (c)(a) = ϕ(a ⊗ c). To verify that this is an isomorphism, as Λ and Λ∗ are reflexive R-modules, we may localize at P ∈ Rh<2i , and then take a completion, and hence we may further assume that dim R ≤ 1. Then Λ is a finite free R-module, and the matrices of h and h′ are transpose each other. As the matrix of h is invertible, so is that of h′ , and h′ is an isomorphism. 2⇒1 follows from 1⇒2, considering the opposite ring. Definition 9.4. Let (R, m) be semilocal. We say that Λ is a pseudo-Frobenius R-algebra if the equivalent conditions of Lemma 9.3 are satisfied. If Λ is GCM in addition, then it is called a Frobenius R-algebra. Note that these definitions are independent of the choice of R. Moreover, Λ is pseudo-Frobenius (resp. Frobenius) if and only if Λ̂ is so, where ˆ? is the m-adic completion. For a general R, we say that Λ is locally pseudo-Frobenius (resp. locally Frobenius) over R if ΛP is pseudo-Frobenius (resp. Frobenius) for P ∈ Spec R. Lemma 9.5. Let (R, m) be semilocal. Then the following are equivalent. 1 (KΛ̂ )Λ̂ is projective in mod Λ̂. 2 Λ̂ (KΛ̂ ) is projective in Λ̂ mod, where ˆ? denotes the m-adic completion. 41 Proof. We may assume that (R, m, k) is complete regular local and Λ is a faithful R-module. Let ¯? denote the functor k⊗R ?. Then Λ̄ is a finite dimensional k-algebra. So mod Λ̄ and Λ̄ mod have the same number of simple modules, say n. An indecomposable projective module in mod Λ is nothing but the projective cover of a simple module in mod Λ̄. So mod Λ and Λ mod have n indecomposable projectives. Now HomR (?, R) is an equivalence between add(KΛ )Λ and add Λ Λ. It is also an equivalence between add Λ (KΛ ) and add ΛΛ . So both add(KΛ )Λ and add Λ (KΛ ) also have n indecomposables. So 1 is equivalent to add(KΛ )Λ = add ΛΛ . 2 is equivalent to add Λ (KΛ ) = add Λ Λ. So 1⇔2 is proved simply applying the duality HomR (?, R). (9.6) Let (R, m) be semilocal. If the equivalent conditions in Lemma 9.5 are satisfied, then we say that Λ is pseudo-quasi-Frobenius. If it is GCM in addition, then we say that it is quasi-Frobenius. These definitions are independent of the choice of R. Note that Λ is pseudo-quasi-Frobenius (resp. quasi-Frobenius) if and only if Λ̂ is so. Proposition 9.7. Let (R, m) be semilocal. Then the following are equivalent. 1 Λ is quasi-Frobenius. 2 Λ is GCM, and dim Λ = idim Λ Λ, where idim denotes the injective dimension. 3 Λ is GCM, and dim Λ = idim ΛΛ . Proof. 1⇒2. By definition, Λ is GCM. To prove that dim Λ = idim Λ Λ, we may assume that R is local. Then by [GN, (3.5)], we may assume that R is complete. Replacing R by the Noetherian normalization of R/ annR Λ, we may assume that R is a complete regular local ring of dimension d, and Λ its maximal Cohen–Macaulay module. As add Λ Λ = add Λ (KΛ ) by the proof of Lemma 9.5, it suffices to prove idim Λ (KΛ ) = d. Let IR be the minimal injective resolution of the R-module R. Then J = HomR (Λ, IR ) is an injective resolution of KΛ = HomR (Λ, R). As the length of J is d and Extd (Λ/mΛ, KΛ ) ∼ = Extd (Λ/mΛ, R) 6= 0, R Λ we have that idim Λ (KΛ ) = d. 2⇒1. We may assume that R is complete regular local and Λ is maximal Cohen–Macaulay. By [GN, (3.6)], we may further assume that R is a field. Then Λ Λ is injective. So (KΛ )Λ = HomR (Λ, R) is projective, and Λ is quasiFrobenius, see [SkY, (IV.3.7)]. 1⇔3 is proved similarly. 42 Corollary 9.8. Let R be arbitrary. Then the following are equivalent. 1 For any P ∈ Spec R, ΛP is quasi-Frobenius. 2 For any maximal ideal m of R, Λm is quasi-Frobenius. 3 Λ is a Gorenstein R-algebra in the sense that Λ is a Cohen–Macaulay R-module, and idimΛP ΛP ΛP = dim ΛP for any P ∈ Spec R. Proof. 1⇒2 is trivial. 2⇒3. By Proposition 9.7, we have idim Λm Λm = dim Λm for each m. Then by [GN, (4.7)], Λ is a Gorenstein R-algebra. 3⇒1 follows from Proposition 9.7. (9.9) Let R be arbitrary. We say that Λ is a quasi-Gorenstein R-algebra if ΛP is pseudo-quasi-Frobenius for each P ∈ Spec R. Definition 9.10 (Scheja–Storch [SS]). Let R be general. We say that Λ is symmetric (resp. Frobenius) relative to R if Λ is R-projective, and Λ∗ := HomR (Λ, R) is isomorphic to Λ as a Λ-bimodule (resp. as a right Λ-module). It is called quasi-Frobenius relative to R if the right Λ-module Λ∗ is projective. Lemma 9.11. Let (R, m) be local. 1 If dim Λ = dim R, R is quasi-Gorenstein, and Λ∗ ∼ = Λ as Λ-bimodules ∗ ∗ ∼ (resp. Λ = Λ as right Λ-modules, Λ is projective as a right Λ-module), then Λ is quasi-symmetric (resp. pseudo-Frobenius, pseudo-quasi-Frobenius). 2 If R is Gorenstein and Λ is symmetric (resp. Frobenius, quasi-Frobenius) relative to R, then Λ is symmetric (resp. Frobenius, quasi-Frobenius). 3 If Λ is nonzero and R-projective, then Λ is quasi-symmetric (resp. pseudoFrobenius, pseudo-quasi-Frobenius) if and only if R is quasi-Gorenstein and Λ is symmetric (resp. Frobenius, quasi-Frobenius) relative to R. 4 If Λ is nonzero and R-projective, then Λ is symmetric (resp. Frobenius, quasi-Frobenius) if and only if R is Gorenstein and Λ is symmetric (resp. Frobenius, quasi-Frobenius) relative to R. Proof. We can take the completion, and we may assume that R is complete local. 43 1. Let d = dim Λ = dim R, and let I be the normalized dualizing complex of R. Then −d ∼ KΛ = Ext−d (I)) ∼ = Hom(Λ, KR ) ∼ = Hom(Λ, R) = Λ∗ R (Λ, I) = HomR (Λ, H as Λ-bimodules, and the result follows. 2. We may assume that Λ is nonzero. As R is Cohen–Macaulay and Λ is a finite projective R-module, Λ is a maximal Cohen–Macaulay R-module. By 1, the result follows. 3. The ‘if’ part follows from 1. We prove the ‘only if’ part. As Λ is R-projective and nonzero, dim Λ = dim R. As Λ is R-finite free, KΛ ∼ = HomR (Λ, KR ) ∼ = Λ∗ ⊗R KR . As KΛ is R-free and Λ∗ ⊗R KR is nonzero and is isomorphic to a direct sum of copies of KR , we have that KR is R-projective, and hence R is quasi-Gorenstein, and KR ∼ = R. Hence KΛ ∼ = Λ∗ , and the result follows. 4 follows from 3 easily. (9.12) Let (R, m) be semilocal. Let a finite group G act on Λ by R-algebra automorphisms. L Let Ω = Λ ∗ G, the twisted group algebra. That is, Ω = Λ ⊗R RG = g∈G Λg as an R-module, and the product of Ω is given by (ag)(a′ g ′) = (a(ga′ ))(gg ′) for a, a′ ∈ Λ and g, g ′ ∈ G. This makes Ω a modulefinite R-algebra. (9.13) We simply call an RG-module a G-module. We say that M is a (G, Λ)-module if M is a G-module, Λ-module, the R-module structures coming from that of the G-module structure and the Λ-module structure agree, and g(am) = (ga)(gm) for g ∈ G, a ∈ Λ, and m ∈ M. A (G, Λ)-module and an Ω-module are one and the same thing. (9.14) By the action (a⊗a′ )g)a1 = a(ga1 )a′ , we have that Λ is a (Λ⊗Λop )∗Gmodule in a natural way. So it is an Ω-module by the action (ag)a1 = a(ga1 ). It is also a right Ω-module by the action a1 (ag) = g −1(a1 a). If the action of G on Λ is trivial, then these actions make an Ω-bimodule. (9.15) Given an Ω-module M and an RG-module V , M ⊗R V is an Ωmodule by (ag)(m ⊗ v) = (ag)m ⊗ gv. HomR (M, V ) is a right Ω-module by (ϕ(ag))(m) = g −1 ϕ(a(gm)). It is easy to see that the standard isomorphism HomR (M ⊗R V, W ) → HomR (M, HomR (V, W )) is an isomorphism of right Ω-modules for a left Ω-module M and G-modules V and W . 44 (9.16) Now consider the case Λ = R. Then the pairing φ : RG ⊗R RG → R given by φ(g ⊗ g ′ ) = δgg′ ,e (Kronecker’s delta) is non-degenerate, and induces an RG-bimodule isomorphism Ω = RG → (RG)∗ = Ω∗ . As Ω = RG is a finite free R-module, we have that Ω = RG is symmetric relative to R. Lemma 9.17. If Λ is quasi-symmetric (resp. symmetric) and the action of G on Λ is trivial, then Ω is quasi-symmetric (resp. symmetric). Proof. Taking the completion, we may assume that R is complete. Then replacing R by a Noether normalization of R/ annR Λ, we may assume that R is a regular local ring, and Λ is a faithful R-module. As the action of G on Λ is trivial, Ω = Λ ⊗R RG is quasi-symmetric (resp. symmetric), as can be seen easily. (9.18) In particular, if Λ is commutative quasi-Gorenstein (resp. Gorenstein) and the action of G on Λ is trivial, then Ω = ΛG is quasi-symmetric (resp. symmetric). (9.19) In general, Ω Ω ∼ = Λ ⊗R RG as Ω-modules. Lemma 9.20. Let M and N be right Ω-modules, and let ϕ : M → N be a homomorphism of right Λ-modules. Then ψ : M ⊗ RG → N ⊗ RG given by ψ(m ⊗ g) = g(ϕ(g −1m)) ⊗ g is an Ω-homomorphism. In particular, 1 If ϕ is a Λ-isomorphism, then ψ is an Ω-isomorphism. 2 If ϕ is a split monomorphism in mod Λ, then ψ is a split monomorphism in mod Ω. Proof. Straightforward. Proposition 9.21. Let G be a finite group acting on Λ. Set Ω := Λ ∗ G. 1 If the action of G on Λ is trivial and Λ is quasi-symmetric (resp. symmetric), then so is Ω. 2 If Λ is pseudo-Frobenius (resp. Frobenius), then so is Ω. 3 If Λ is pseudo-quasi-Frobenius (resp. quasi-Frobenius), then so is Ω. Proof. 1 is Lemma 9.17. To prove 2 and 3, we may assume that (R, m) is complete regular local and Λ is a faithful module. 45 2. (KΩ )Ω ∼ = HomR (Λ ⊗R RG, R) ∼ = HomR (Λ, R) ⊗ (RG)∗ ∼ = KΛ ⊗ RG as right Ω-modules. It is isomorphic to ΛΩ ⊗ RG ∼ = ΩΩ by Lemma 9.20, 1, ∼ since KΛ = Λ in mod Λ. Hence Ω is pseudo-Frobenius. If, in addition, Λ is Cohen–Macaulay, then Ω is also Cohen–Macaulay, and hence Ω is Frobenius. 3 is proved similarly, using Lemma 9.20, 2. Note that the assertions for Frobenius and quasi-Frobenius properties also follow easily from Lemma 9.11 and [SS, (3.2)]. 10. Codimension-two argument (10.1) Let X be a locally Noetherian scheme, U its open subscheme, and Λ a coherent OX -algebra. Assume the (S2′ ) condition on Λ. Let i : U ֒→ X be the inclusion. In what follows we use the notation for rings and modules to schemes and coherent algebras and modules in an obvious manner. (10.2) Let M ∈ mod Λ. That is, M is a coherent right Λ-module. Then by restriction, i∗ M ∈ mod i∗ Λ. (10.3) For a quasi-coherent i∗ Λ-module N , we have an action u⊗1 a i∗ N ⊗OX Λ −−→ i∗ N ⊗OX i∗ i∗ Λ → i∗ (N ⊗OU i∗ Λ) − → i∗ N . So we get a functor i∗ : Mod i∗ Λ → Mod Λ, where Mod i∗ Λ (resp. Mod Λ) denote the category of quasi-coherent i∗ Λ-modules (resp. Λ-modules). Lemma 10.4. Let the notation be as above. Assume that U is large in X (that is, codimX (X \ U) ≥ 2). If M ∈ (S2′ )Λ, , then the canonical map u : M → i∗ i∗ M is an isomorphism. Proof. Follows immediately from [Has, (7.31)]. Proposition 10.5. Let the notation be above, and let U be large in X. Assume that there is a 2-canonical right Λ-module. Then we have the following. 1 If N ∈ (S2′ )i ∗ Λ,U , then i∗ N ∈ (S2′ )Λ,X . 2 i∗ : (S2′ )Λ,X → (S2′ )i each other. ∗ Λ,U and i∗ : (S2′ )i 46 ∗ Λ,U → (S2′ )Λ,X are quasi-inverse Proof. The question is local, and we may assume that X is affine. 1. There is a coherent subsheaf Q of i∗ N such that i∗ Q = i∗ i∗ N = N by [Hart2, Exercise II.5.15]. Let V be the Λ-submodule of i∗ N generated by Q. That is, the image of the composite Q ⊗OX Λ → i∗ N ⊗OX Λ → i∗ N . Note that V is coherent, and i∗ Q ⊂ i∗ V ⊂ i∗ i∗ N = i∗ Q = N . Let C be a 2-canonical right Λ-module. Let ?† := HomΛop (?, C), Γ = EndΛ C, and ?‡ := HomΓ (?, C). Let M be the double dual V †‡ . Then M ∈ (S2′ )Λ,X , and hence M∼ = i∗ i∗ M ∼ = i∗ i∗ (V †‡ ) ∼ = i∗ (i∗ V)†‡ ∼ = i∗ (N †‡ ) ∼ = i∗ N . So i∗ N ∼ = M lies in (S2′ )Λ,X . 2 follows from 1 and Lemma 10.4 immediately. References [Aoy] Y. Aoyama, Some basic results on canonical modules, J. Math. Kyoto Univ. 23 (1983), 85–94. [AoyG] Y. Aoyama and S. Goto, On the endomorphism ring of the canonical module, J. Math. Kyoto Univ. 25 (1985), 21–30. [ArI] T. Araya and K.-i. Iima, Locally Gorensteinness over Cohen– Macaulay rings, arXiv:1408.3796v1 [ASS] I. Assem, D. Simson, and A. Skowroński, Elements of the Representation Theory of Associative Algebras, Cambridge (2006). [AvF] L. L. Avramov and H.-B. Foxby, Locally Gorenstein homomorphisms, Amer. J. Math. 114 (1992), 1007–1047. [BS] M. P. Brodmann and R. Y. Sharp, Local Cohomology: An Algebraic Introduction with Geometric Applications, Cambridge (1998). [EvG] E. G. Evans and P. Griffith, Syzygies, London Math. Soc. Lecture Note Series 106, Cambridge (1985). 47 [GN] S. Goto and K. Nishida, Towards a theory of Bass numbers with applications to Gorenstein algebras, Colloq. Math. 91 (2002), 191– 253. [Gro4] A. Grothendieck, Eléments de Géométrie Algébrique IV, 3e Partie, IHES Publ. Math. 28 (1966). [Hart] R. Hartshorne, Residues and Duality, Lecture Notes in Math. 20, Springer (1966). [Hart2] R. Hartshorne, Algebraic Geometry, Graduate Texts in Math. 52, Springer Verlag (1977). [Hart4] R. Hartshorne, Generalized divisors on Gorenstein schemes, KTheory 8 (1994), 287–339. [Has] M. Hashimoto, Equivariant class group. III. Almost principal fiber bundles, arXiv:1503.02133v1 [IW] O. Iyama and M. Wemyss, On the noncommutative Bondal-Orlov conjecture, J. Reine Angew. Math. 683 (2013), 119–128. [LeW] G. J. Leuschke and R. Wiegand, Cohen–Macaulay Representations, AMS (2012). [Mat] H. Matsumura, Commutative Ring Theory, First paperback edition, Cambridge (1989). [Ogo] T. Ogoma, Existence of dualizing complexes, J. Math. Kyoto Univ. 24 (1984), 27–48. [PS] C. Peskine and L. Szpiro, Dimension projective finie et cohomologie locale, Publ. IHES 42 (1973), 47–119. [SS] G. Scheja and U. Storch, Quasi-Frobenius-Algebren und lokal vollständige Durchschnitte, Manuscripta Math. 19 (1976), 75–104. Addendum: 20 (1977), 99–100. [SkY] A. Skowroński and K. Yamagata, Frobenius Algebras. I., Basic Representation Theory, European Mathematical Society (2011). 48 [Tak] R. Takahashi, A New approximation theory which unifies spherical and Cohen–Macaulay approximations, J. Pure Appl. Algebra 208 (2007), 617–634. [TT] R. W. Thomason and T. Trobaugh, Higher algebraic K-theory of schemes and of derived categories, in The Grothendieck Festschrift. III. (Birkhäuser) (1990), pp. 247–435. [Yek] A. Yekutieli, Dualizing complexes over noncommutative graded algebras, J. Algebra 153 (1992), 41–84. 49
0math.AC
Angle-based Shape Determination Theory of Planar Graphs with Application to Formation Stabilization Gangshan Jinga , Guofeng Zhangb , Heung Wing Joseph Leeb , Long Wangc,∗ arXiv:1803.04276v1 [cs.SY] 12 Mar 2018 a Center for Complex Systems, School of Mechano-electronic Engineering, Xidian University, Xi’an 710071, China b Department of Applied Mathematics, Hong Kong Polytechnic University, Hong Kong, China c Center for Systems and Control, College of Engineering, Peking University, Beijing 100871, China Abstract This paper presents an angle-based approach for distributed formation shape stabilization of multi-agent systems in the plane. We develop an angle rigidity theory to study whether a planar framework can be determined by angles between segments uniquely up to translations, rotations, scalings and reflections. The proposed angle rigidity theory is applied to the formation stabilization problem, where multiple single-integrator modeled agents cooperatively achieve an angle-constrained formation. During the formation process, the global coordinate system is unknown for each agent and wireless communications between agents are not required. Moreover, by utilizing the advantage of high degrees of freedom, we propose a distributed control law for agents to stabilize a desired formation shape with desired orientation and scale. Two simulation examples are performed for illustrating effectiveness of the proposed control strategies. 1. Introduction A multi-agent formation stabilization problem is to design a decentralized control law for a group of mobile agents to stabilize a prescribed formation shape. An associated fundamental problem is: how to determine the geometric shape of a graph embedded in a space, based on some local constraints such as displacements, distances and bearings. A straightforward approach for determining a shape is constraining the location of each vertex in the graph. A position-based formation strategy usually takes large costs and is unnecessary when the position of each agent is ∗ Corresponding author: Long Wang Email addresses: [email protected] (Gangshan Jing), [email protected] (Guofeng Zhang), [email protected] (Heung Wing Joseph Lee), [email protected] (Long Wang ) 1 not strictly required. For reduction of information exchange and improvement of robustness of the control strategy, a displacement-constrained formation method, which determines the target formation shape by relative positions between agents, has been extensively studied [1, 2, 3, 4, 5]. This method is also called consensus-based formation since the formation problem can often be transformed into a consensus problem, which is a hot topic being widely studied [6, 7, 8, 5]. The investigations of displacement-based formation show that the shape of a graph can be determined by inter-agent displacements uniquely if the graph is connected. A disadvantage of displacement-based formation control is the requirement of the global coordinate system. During the last decade, distance-based shape control gained a lot of attention since it has no requirement of the global coordinate system for each agent [9, 10, 11, 12, 13, 14, 15, 16, 17]. Different from the displacement-based approach, for a noncomplete graph embedded in a space, it is not straightforward to answer that whether its shape can be determined by edge lengths uniquely. A tool of great utility to deal with this problem is the traditional graph rigidity theory (we will refer to this theory as distance rigidity theory in this paper) [18, 19, 20], which has been studied intensively in the area of mathematics. In more recent years, bearing-constrained formation control attracted many interests due to the low costs of bearing measurements [21, 22, 23, 24, 25]. In this issue, the formation shape is constrained by inter-agent bearings. To distinguish what kind of shapes can be uniquely determined by inter-agent bearings, the authors in [22] and [24] proposed the bearing rigidity theory. Compared to distance-constrained formation control, an advantage of bearing-constrained formation strategy is the fact that no restriction on scale of the target formation is imposed. As a result, it is simpler to control the scale of a bearing-based formation, which will benefit for obstacle avoidance, see [25]. Unfortunately, similar to the displacement-based approach, a bearing-constrained formation requires either the global coordinate system for each agent or developing observers based on inter-agent communications, [24]. Besides the above-mentioned investigations, there are some other issues associated with formation control and formation strategies, for more details, we refer the readers to [26, 27, 28, 29]. This paper studies the angle-constrained formation problem in the plane, in which the target formation shape is the shape of a planar graph, and will be encoded by angles between pair of edges joining a common vertex. Similar issues have been reported in the literature. In [21], the authors discussed the possibility of an angle-based formation approach and presented some initial results. In another relevant reference [30], the authors solved the cyclic formation problem by constraining the angle subtended at each vertex by its two neighbors. In this case, the cyclic formation can be stretched while preserving invariance of each angle, thus the target formation cannot be accurately stabilized. In contrast to [30], we study how to stabilize a formation shape via angle constraints, such that the stabilized formation is congruent to the target formation up to translations, rotations, scalings and reflections. Our contributions can be summarized as follows. (i). Enlightened by dis2 tance rigidity theory and bearing rigidity theory, we propose an angle rigidity theory to study whether the shape of a planar graph can be uniquely determined by angles only; see Section 3. (ii). We prove that for a planar framework, infinitesimal angle rigidity is equivalent to infinitesimal bearing rigidity; Theorem 3. From [31], infinitesimal angle rigidity is also a generic property of the graph. (iii). We show that for a framework embedded by a triangulated Laman graph, once it is strongly rigid, it can always be determined by angles uniquely up to translations, rotations, scalings and reflections; see Theorem 7. (iv). We propose a distributed control law for achieving formation shape stabilization based on the angle rigidity theory. It is shown that our control strategy can locally exponentially stabilize multiple agents to form an infinitesimally angle rigid formation in the plane; see Theorem 8. (v). We design a distributed control law, which can steer all agents to form a target formation shape with prescribed orientation and scale; see Theorem 9. Note that in the formation maneuver control literature [4, 16, 25], simultaneously controlling orientation and scale of a formation usually cannot be achieved. The advantages of angle-based formation approach are threefold. (i). Each agent only has to measure relative displacements from neighbors with respect to its local coordinate system. (ii). No wireless communications between agents are required. (iii). Compared to displacement-, distance- and bearing-based approaches, an angle-constrained shape has higher degrees of freedom. More precisely, angles are invariant to motions including translations, rotations and scalings, while inter-agent displacements, distances and bearings are only invariant to a subset of these motions. As a result, it is more convenient to achieve formation maneuver control by using angle constraints. The paper is structured as follows. Section 2 introduces some preliminaries of distance- and bearing rigidity theory. Section 3 presents the angle rigidity theory. Section 4 firstly proposes a distributed control law for achieving formation stabilization based on angle rigidity theory, then proposes a distributed maneuver control law for stabilizing a formation shape with prescribed orientation and scale. Section 5 presents an application example to verify validity of the formation strategy. Section 6 concludes the whole paper. Notations: Throughout this paper, R denotes the set of real numbers; Rn is the n−dimensional Euclidean space; || · || stands for the Euclidean norm; X T means the transpose of matrix X; ⊗ is the Kronecker product; range(X), null(X) and rank(X) denote the image space, null space, and the rank of matrix X; In represents the n×n identity matrix; A\B is the set of those elements of A not belonging to B; A vector p = (pT1 , · · · , pTs )T with pi ∈ R2 , i = 1, · · · , s is said to be degenerate if p1 , · · · , ps are collinear; O(n) is the orthogonal group in Rn ;  cos θ − sin θ Ro (θ) = is the 2-dimensional rotation matrix associated with sin θ cos θ   1 0 θ ∈ [0, 2π); Re (θ) = Ro (θ)I¯ with I¯ = is the 2-dimensional reflection 0 −1 matrix associated with θ ∈ [0, 2π); x⊥ = Ro ( π2 )x for x ∈ R2 . For Xi ∈ Ra×b , i = 1, · · · , q, we denote diag(Xi ) = blockdiag{X1 , · · · , Xq } ∈ Rqa×qb . 3 An undirected graph with n vertices and m edges is denoted as G = (V, E), where V = {1, · · · , n} and E ⊂ V × V denote the vertex set and the edge set, respectively. Here we do not distinguish (i, j) and (j, i) in E. The incidence matrix is represented by H = [hij ], which is a matrix with rows and columns indexed by edges and vertices of G with an orientation. hij = 1 if the ith edge sinks at vertex j, hij = −1 if the ith edge leaves vertex j, and hij = 0 otherwise. It is well-known that rank(H) = n − 1 if and only if graph G is connected. Let K denote a complete graph with n vertices. 2. Preliminaries of Graph Rigidity Theory In this section, we introduce some preliminaries of distance and bearing rigidity theory in the plane, which are taken from [18, 19, 24]. Distance rigidity theory is to answer whether p can be uniquely determined up to translations, rotations, and reflections, by partial length constraints on edges of G, while bearing rigidity theory is to answer whether p can be uniquely determined up to translations and scalings by partial bearing constraints on edges of G. In the following, we will introduce these two theories in a unified approach. We refer to a pair (G, p) as a framework, where G is a graph and p = (pT1 , · · · , pTn )T ∈ R2n is called a configuration, pi is the coordinate of vertex i, i = 1, · · · , n. To define rigidity of a framework (G, p), a smooth rigidity function rG (·) : R2n → Rs should be first given, where s is some positive integer. By the given rigidity function rG , several definitions associated with rigidity can be induced as follows. A framework (G, p) is said to be rigid if there exists a neighborhood Up −1 of p such that rG−1 (rG (p)) ∩ Up = rK (rK (p)) ∩ Up . (G, p) is globally rigid if −1 −1 rG (rG (p)) = rK (rK (p)). An infinitesimal motion is an assignment of velocities that guarantees the invariance of rG (p), i.e., ṙG (p) = ∂rG (p) v = 0, ∂p (1) where v = (v1T , · · · , vnT )T , vi = ṗi is the velocity of vertex i. We say a motion is trivial if it satisfies equation (1) for any framework with n vertices. A framework is infinitesimally rigid if every infinitesimal motion is trivial. Denote the rigidity G (p) matrix ∂r∂p by R(p). Then equation (1) is equivalent to ṙG (p) = R(p)ṗ = 0. Let T be the dimension of the space formed by all trivial motions, then a framework (G, p) is infinitesimally rigid if and only if rank(R(p)) = 2n − T . In the traditional graph rigidity theory, the above-mentioned rigidity function is commonly set by the following distance rigidity function: DG (p) = (· · · , ||eij (p)||2 , · · · )T , (i, j) ∈ E, where eij (p) = pi − pj . 4 (2) Recently, the authors in [24] developed bearing rigidity theory by using the following bearing rigidity function: T BG (p) = (· · · , gij (p), · · · )T , (i, j) ∈ E, (3) p −p where gij (p) = ||pii −pjj || . For a framework in the plane, there are totally 2 independent translations, 1 independent rotation, 1 independent scaling. The trivial motions for a framework determined by distances can only be translations and rotations, thus the dimension of trivial motion space should be TD = 2 + 1 = 3. The trivial motions for a framework determined by bearings are translations and scalings, accordingly, the dimension of trivial motion space is TB = 2 + 1 = 3. The following two lemmas will be used in our paper. Lemma 1. [24] A framework in R2 is infinitesimally bearing rigid if and only if it is infinitesimally distance rigid. Lemma 2. [16] If a framework in R2 is infinitesimally distance rigid, then for any vertex i, the relative position vectors pi − pj , j ∈ Ni cannot be all collinear. It is worth noting that infinitesimal bearing rigidity implies global bearing rigidity [24], whereas infinitesimal distance rigidity cannot induce global distance rigidity. 3. Angle rigidity In this section, we develop an angle rigidity theory to investigate how to encode geometric shapes of graphs embedded in the plane through angles only. T For a framework (G, p) in R2 , we will employ gij gik as the constraint on the angle between edges eij and eik , which is actually the cosine of this angle. Let TG = T {(i, j, k) ∈ V 3 : (i, j), (i, k) ∈ E, j < k}, then {gij gik ∈ [−1, 1] : (i, j, k) ∈ TG } is the set of constraints on all angles in (G, p). We should note that a framework often has redundant angle information for shape determination. For example, T T T in Fig. 1 (a), once g12 g13 and g21 g23 are available, it holds that g31 g32 = T T cos(π − arccos(g12 g13 ) − arccos(g21 g23 )). That is, the information of partial angles in the graph is often sufficient to recognize a framework. Therefore, by employing a subset TG∗ ⊂ TG with |TG∗ | = w, we will try to study whether (G, p) T can be uniquely determined by {gij gik ∈ [−1, 1] : (i, j, k) ∈ TG∗ } based on the angle rigidity theory to be developed in this paper. Note that although TG∗ is only a subset of TG , the elements in TG∗ should involve all vertices in G, otherwise the shape of (G, p) can never be determined. For a framework (G, p), the angle rigidity function corresponding to TG∗ can be written as T fTG∗ (p) = (· · · , gij (p)gik (p), · · · )T , (i, j, k) ∈ TG∗ . For the sake of notational simplicity, we denote fG (p) = fTG (p). 5 (4) 3 2 1 2 2 1 2 1 1 4 (a) 3 4 (b) 3 (c) (d) Figure 1: (a) A globally and infinitesimally angle rigid framework with TG∗ = {(1, 2, 3), (2, 1, 3)}. (b) A framework that is not angle rigid. (c) A globally and infinitesimally angle rigid framework with TG∗ = {(1, 2, 4), (2, 1, 4), (2, 3, 4), (3, 2, 4), (4, 1, 3)}. (d) A globally angle rigid framework with TG = {(1, 2, 3), (2, 1, 3), (2, 1, 3)}. It is easy to see that whether fTG∗ (p) can determine a unique shape congruent to p is determined by the choice of TG∗ . As a result, the definitions of angle rigidity must be associated with TG∗ . We present the following definitions. Definition 1. A framework (G, p) is angle rigid if for some TG∗ , there exists a −1 neighborhood Up of p such that fT−1∗ (fTG∗ (p)) ∩ Up = fK (fK (p)) ∩ Up . G Definition 2. A framework (G, p) is globally angle rigid if for some TG∗ , there −1 holds fT−1∗ (fTG∗ (p)) = fK (fK (p)). G Definition 3. A framework (G, p) is minimally angle rigid if (G, p) is angle rigid, and deletion of any edge will make (G, p) not angle rigid. By these definitions, the frameworks (a) and (c) in Fig. 1 are both globally angle rigid. For the framework (b), by moving the vertices along the blue arrows, fG is invariant but the shape is deformed, thus (b) is not angle rigid. For the framework (d), since the graph is complete, it obviously holds fG−1 (fG (p)) = −1 fK (fK (p)), thus (d) is globally angle rigid. Note that the shape of (d) still cannot be determined by angles uniquely. Similar to distance and bearing rigidity theory, we define the infinitesimal angle motion as a motion preserving the invariance of fTG∗ (p). The velocity v = ṗ corresponding to an infinitesimal motion should satisfy f˙TG∗ (p) = 0, which is equivalent to the following equation T T ġij gik + gij ġik = 0, (i, j, k) ∈ TG∗ . (5) ∂g ij From [24], ∂eij = ||e1ij || Pij , where Pij , P (gij ), P (·) : R2 → R2×2 is a projection matrix defined as P (x) = I2 − xxT , x ∈ R2 is a unit vector. Then we have ġij = 1 ||eij || Pij ėij . T Let g(p) = (· · · , gij (p), · · · )T , where (i, j) ∈ E, and Rg , follows from the chain rule that f˙TG∗ = ∂fTG∗ ∂g ∂e Pij ṗ = Rg (p) diag( )H̄ ṗ = RTG∗ (p)ṗ, ∂g ∂e ∂p ||eij || 6 3 ∂fT ∗ G ∂g . It P where H̄ = H ⊗ I2 , RTG∗ (p) , Rg (p) diag( ||eijij|| )H̄ = Rg (p)RB (p) ∈ Rw×2n is termed the angle rigidity matrix, RB = ∂g(p) is actually the bearing rigidity ∂p matrix. Therefore, equation (5) is equivalent to RTG∗ (p)ṗ = 0. Next we define infinitesimal angle rigidity, to do this, we should distinguish all trivial motions for an angle-constrained geometric shape. By an intuitive observation, the motions always preserving invariance of angles in the framework are translations, rotations, and scalings. Therefore, the dimension of the trivial motion space is 2 + 1 + 1 = 4. Note that the trivial motion space is always a subspace of null(RTG∗ ), implying that dim(null(RTG∗ )) ≥ 4. We present the following definition. Definition 4. A framework (G, p) is infinitesimally angle rigid if there exists a TG∗ such that every possible motion satisfying (5) is trivial, or equivalently, dim(null(RTG∗ )) = 4. By this definition, the frameworks (a) and (c) in Fig. 1 are both infinitesimally angle rigid. The frameworks (b) and (d) are not infinitesimally angle rigid since they both have nontrivial infinitesimal angle motions, which are interpreted by the arrows in blue. The following lemma gives the specific form of trivial motions preserving invariance of angles. Lemma 3. The trivial motion space for angle rigidity in R2 is S = Sr ∪Ss ∪St , where Sr = {(In ⊗ Ro ( π2 ))p} is the space formed by rotations, Ss = span{p} is the space formed by scalings, St = null(H̄) = {1n ⊗ (1, 0)T , 1n ⊗ (0, 1)T } is the space formed by translations. Proof: In [24], the authors showed that Ss and St are scaling and translational motion spaces, respectively, and always belong to null(RB (p)). Since RTG∗ (p) = Rg (p)RB (p), it is straightforward that Ss ∪ St ⊆ null(RTG∗ (p)). Next we show Sr ⊆ null(RTG∗ (p)). Let η T = T ∂gij gik ∂g be an arbitrary row of Rg . It suffices to show η T RB (p)(In ⊗ P Ro ( π2 ))p = 0. Note that η = (0, gik , 0, gij , 0)T , which follows η T diag( ||eijij|| ) = T T (0, gik Pij /||eij ||, 0, gij Pik /||eik ||, 0). Note also that H̄(In ⊗ Ro ( π2 ))p = (H ⊗ π I2 )(In ⊗ Ro ( 2 ))p = (Im ⊗ Ro ( π2 ))(H ⊗ I2 )p = (Im ⊗ Ro ( π2 ))e, where e = (· · · , eTij , · · · )T , the order of eij in the vector e is the same as the one of gij in the vector g. It follows that π Pij π η T RB (p)(In ⊗ Ro ( ))p = η T diag( )H̄(In ⊗ Ro ( ))p 2 ||eij || 2 P π P π ij ik T T = gik Ro ( )eij + gij Ro ( )eik ||eij || 2 ||eik || 2 π π T T T T = gik (I − gij gij )Ro ( )gij + gij (I − gik gik )Ro ( )gik 2 2 π π T T = gik Ro ( )gij + gij Ro ( )gik 2 2 π T T π = gik (Ro ( ) + Ro ( ))gij = 0. 2 2 7 This completes the proof. A direct consequence of Lemma 3 is the following result.  Lemma 4. A framework (G, p) is infinitesimally angle rigid if and only if null(RTG (p)) = S. −1 In [18], the authors showed that the set DK (DK (p)), which includes all configurations having inter-distance congruent to p, is always a manifold of dimension 3. In fact, since an angle-constrained shape has at least 4 degrees of −1 freedom, fK (fK (p)) is a manifold of dimension 4 when (K, p) is infinitesimally angle rigid (i.e., p is a regular point). See the following theorem. Theorem 1. Let Sp , {q ∈ R2n : q = c(In ⊗ R)p + 1n ⊗ ξ, R ∈ O(2), c ∈ −1 R \ {0}, ξ ∈ R2 }. If (K, p) is infinitesimally angle rigid, then fK (fK (p)) = Sp , and Sp is a 4-dimensional manifold. The proof will be presented in later subsections. With the aid of Theorem 1, we can derive the relationship between infinitesimal angle rigidity and angle rigidity for a given TG∗ , which is as follows. Theorem 2. If (G, p) is infinitesimally angle rigid, then (G, p) is angle rigid. Proof: By [18, Proposition 2], there is a neighborhood U of p, such that −1 fT−1∗ (fTG∗ (p)) ∩ U is a manifold of dimension 4. From Theorem 1, fK (fK (p)) is G −1 also a 4-dimensional manifold. As a result, fT−1∗ (fTG∗ (p)) and fK (fK (p)) coincide G in U , implying that (G, p) is angle rigid.  The converse of Theorem 2 is not true. A typical counter-example is the framework (K, p) with p being a degenerate configuration. In this case, (K, p) is globally angle rigid but not infinitesimally angle rigid. 3.1. The Relation to Bearing Rigidity In this subsection, we will establish some connections between angle rigidity and bearing rigidity [24, 31]. The following theorem shows the equivalence of infinitesimal angle rigidity and infinitesimal bearing rigidity in the plane, which also implies the feasibility of angle-based approach for determining a planar framework. Theorem 3. A framework (G, p) is infinitesimally angle rigid if and only if it is infinitesimally bearing rigid. Proof: Necessity. Since null(RTG∗ ) = (null(Rg )∩range(RB ))∪null(RB ), dim(null(RTG∗ )) reaches its minimum only if dim(null(RB )) is minimal. Recall that it always holds that null(RB ) ⊇ Ss ∪ St , once (G, p) is infinitesimally angle rigid, it must hold that null(RB (p)) = Ss ∪ St . That is, (G, p) is infinitesimally bearing rigid. Sufficiency. Note that RTG∗ = Rg RB , and the infinitesimal bearing rigidity implies null(RB ) = St ∪ Ss . To show null(RTG∗ ) = S, it suffices to show that for any η ∈ null(Rg ) ∩ range(RB ), we have η = RB q for some q ∈ Sr . 8 Suppose η = RB v and Rg η = Rg RB v = 0 for some v = (v1T , · · · , vnT )T ∈ R2n . T Let gij gik be a component of fG such that gij and gik are not collinear. Then RTG∗ v = 0 implies that T ∂gij gik ∂g P diag( ||eijij|| )H̄v = 0, which is equivalent to eTik Pij (vi − vj ) + eTij Pik (vi − vk ) = 0. (6) Note that for any nonzero vectors x, y ∈ R2 , P (x)y is perpendicular to x. Therefore, there always exist cij , cik ∈ R such that π π Pij (vi − vj ) = cij Ro ( )gij , Pik (vi − vk ) = cik Ro ( )gik . 2 2 (7) It follows that π π vi − vj = cij Ro ( )gij + c0ij gij , vi − vk = cik Ro ( )gik + c0ik gik 2 2 (8) for some c0ij , c0ik ∈ R. Substituting (7) into (6), we have π π cij eTik Ro ( )gij + cik eTij Ro ( )gik = 0. 2 2 Note also that RoT ( π2 ) = −Ro ( π2 ), then we have π T (cij ||eik || − cik ||eij ||)gij Ro ( )gik = 0. 2 T Since gij and gik are not collinear, gij Ro ( π2 )gik 6= 0. It follows that cij ||eik || = cik ||eij ||. That is, cij = cijk ||eij ||, cik = cijk ||eik || for some cijk ∈ R. Together with (8), we have π π vi − vj = cijk Ro ( )eij + c̄ij eij , vi − vk = cijk Ro ( )eik + c̄ik eik , 2 2 (9) where c̄ij = c0ij /||eij ||, c̄ik = c0ik /||eik ||. So far we have proved that if (i, j, k) ∈ TG∗ and gij is not collinear with gik , then (9) holds for some cijk ∈ R. In the following, by constructing a TG∗ , we will show that there exists a common constant c ∈ R such that vi − vj = cRo ( π2 )eij + c̄ij eij for all (i, j) ∈ E. Now we construct a set TG∗ ⊆ TG such that gij and gik are not collinear for all (i, j, k) ∈ TG∗ . Since (G, p) is infinitesimally bearing rigid, from Lemma 1 and Lemma 2, for any vertex i, there exist at least two neighbors j, k ∈ Ni such that gij and gik are not collinear. As a result, we can divide Ni into two sets N̂i and Ňi , such that for any j ∈ N̂i and k ∈ Ňi , gij and gik are not collinear. We construct a set i TG∗ by the following two steps: Step 1. Select a vertex j1 ∈ N̂i randomly, let (i, j1 , k)(if j1 < k) or (i, k, j1 )(if j1 > k) for all k ∈ Ňi be an element of i TG∗ . Step 2. Select a vertex k1 ∈ Ňi randomly, let (i, j, k1 )(if j < k1 ) or (i, k1 , j)(if j > k1 ) for all j ∈ N̂i \ {j1 } be an element of i TG∗ . An example of constructing i TG∗ is shown in Fig. 2. 9 › &i š &i k1 k1 j1 k2 k2 i j1 j2 j2 k3 k3 (a) (b) Figure 2: An example to illustrate how to construct i TG∗ . (a) The subgraph composed of vertex i and its neighbors j1 , j2 , k1 , k2 , k3 . Note that i, k2 , k3 are collinear, i, j1 , j2 are collinear. (b) N̂i = {j1 , j2 }, Ňi = {k1 , k2 , k3 }. If js and kl are connected by a red line, it implies that the angle between edge (i, js ) and edge (i, kl ) is selected to be an angle constraint. This also implies that (i, js , kl ) (if js < kl ) or (i, kl , js ) (if kl < js ) is an element of i TG∗ . Let TG∗ = ∪i∈V i TG∗ . It is obvious that for any i, j, k ∈ TG∗ , gij and gik are not collinear. Now we regard each edge (i, j) of G as a vertex of G 0 , (i, j) and (i, k) are adjacent if (i, j, k) or (i, k, j) belongs to TG∗ . By our approach for construction of i TG∗ , it is easy to see that for any i ∈ V and j, k ∈ Ni , (i, j) and (i, k) are either adjacent or both neighbors of (i, j1 ) or (i, k1 ). Therefore, the graph G 0 corresponding to TG∗ is connected. We regard cij as the state corresponding to (i, j) if vi − vj = cij Ro ( π2 )eij + c̄ij eij . Note that (9) implies that if (i, j) and (i, k) are adjacent, they share a common state cijk ∈ R. Since G 0 is connected, all edges in G 0 have a consensus state c ∈ R. That is, vi −vj = cRo ( π2 )eij + c̄ij eij for all (i, j) ∈ E. This implies that H̄v = c(Im ⊗ Ro ( π2 ))H̄p + C̄ H̄p, where C̄ = diag(c̄ij ) ⊗ I2 . Then Pij )H̄v ||eij || Pij π Pij = diag( )c(Im ⊗ Ro ( ))(H ⊗ I2 )p + diag( )C̄ H̄p ||eij || 2 ||eij || Pij π Pij = diag( )(H ⊗ I2 )c(In ⊗ Ro ( ))p + diag( ) diag(c̄ij eij ) ||eij || 2 ||eij || π = RB c(In ⊗ Ro ( ))p. 2 η = RB v = diag( Since c(In ⊗ Ro ( π2 ))p ∈ Sr , the proof is completed.  Remark 1. In [31], the authors proved that infinitesimal bearing rigidity is a generic property of the graph. That is, if (G, p) is infinitesimally bearing rigid, then (G, q) is infinitesimally bearing rigid for almost all configuration q. From Theorem 3, it is easy to obtain that infinitesimal angle rigidity is also a generic property of the graph, thus is primarily determined by the graph, rather than the configuration. 10 3 2 2 1 1 4 3 4 (a) (G, p) (b) (G, q) Figure 3: Both (G, p) and (G, q) are infinitesimally angle rigid for {(1, 2, 4), (4, 1, 2), (1, 3, 4), (4, 1, 3)}, globally angle rigid for T̄G∗ = {(1, 2, 3)} ∪ TG∗ . TG∗ = Remark 2. From Definition 4, we can conclude that the minimal number of angle constraints for achieving infinitesimal angle rigidity is 2n − 4. This fact has also been shown in [21]. On the other hand, it has been shown in [24] that the minimal number of edges for a framework to be infinitesimally bearing rigid is 2n − 3. By Theorem 3, the same is true for infinitesimal angle rigidity. Remark 3. In the proof of sufficiency in Theorem 3, by constructing an appropriate TG∗ , we show that if η ∈ null(Rg ) ∩ range(RB ), then η must correspond to a rotational motion, i.e., η = RB v, v ∈ Sr . Nevertheless, the TG∗ constructed by us may not be suitable to determine a unique shape. As shown in Fig. 3 (a), a TG∗ constructed by the approach in Theorem 3 is TG∗ = {(1, 2, 4), (4, 1, 2), (1, 3, 4), (4, 1, 3)}. Although (G, p) with TG∗ is infinitesimally angle rigid, fTG∗ (p) may determine an incorrect shape in Fig. 3 (b). However, if we let T̄G∗ = {(1, 2, 3)} ∪ TG∗ , then fT̄G∗ (p) can always determine a correct shape. This implies that (G, p) in Fig 3 (a) is both infinitesimally and globally angle rigid for T̄G∗ (p). Moreover, we can conclude that for given TG∗ , infinitesimal angle rigidity cannot induce global angle rigidity directly. Consider a framework (G, p) in the plane. For distance rigidity theory, it is obvious that the shape of (G, p) can be uniquely determined by DG (p) if G = K. For bearing rigidity theory, the authors of [24] showed that BG (p) uniquely determines a shape if G is infinitesimally bearing rigid. However, for angle rigidity theory, it cannot be immediately answered that whether the shape can be uniquely determined by angles between edges. On one hand, angles are only constraints on relationships between those edges joining a common vertex. Even for a complete graph, if n > 3, there always exist disjoint edges, the angle between each pair of disjoint edges cannot be constrained directly. On the other hand, it has been shown in Remark 3 that an infinitesimal angle rigid framework with specified TG∗ cannot determine a unique shape in particular cases. −1 −1 In the following theorem, the connection between fK (fK (p)) and BK (BK (p)) is established. −1 Theorem 4. Given configurations p, q ∈ R2n , q ∈ fK (fK (p)) if and only if −1 −1 (In ⊗ R) q ∈ BK (BK (p)), where R ∈ O(2). 11 1 2 1 3 6 5 4 2 5 4 6 (a) (G, p) 3 (b) (G, q) Figure 4: fG (p) = fG (q), but there does not exist R ∈ O(2) such that BG (p) = (Im ⊗R)BG (q). The angles in red are all constrained angles determined by TG . Remark 4. It is easy to see that the complete graph K in Theorem 4 can be replaced with G provided (G, p) is both globally angle rigid and globally bearing rigid. Note that once K is replaced with a general graph G, Theorem 4 will not hold any more. As shown in Fig. 4, although q ∈ fG−1 (fG (p)), there does not exist R ∈ O(2) such that q ∈ (In ⊗ R)−1 q ∈ BG−1 (BG (p)). Next we present some lemmas that are required to prove Theorem 4. In [32], the authors showed that for a positive semi-definite matrix A ∈ Rn×n with rank(A) = r, if ΠT AΠ = RT R for a specified permutation matrix Π ∈ Rn×n , where R ∈ Rr×n , then this Cholesky decomposition is unique. Here the uniqueness of Cholesky decomposition implies that if R̄T R̄ = ΠT AΠ for some R̄ ∈ Rr×n , then R = R R̄ for some R ∈ O(2). It is straightforward to obtain the following lemma. Lemma 5. For a matrix R ∈ Rr×n with rank(R) = r, if RT R = R̄T R̄ for some R̄ ∈ Rr×n , then R = R R̄ for some R ∈ O(r). Let Hx = H (x) , I − 2xxT be a Householder transformation, here x ∈ R2 is a unit vector. Geometrically, Hx y with y ∈ R2 is a reflection of y about the vector which is perpendicular to x. We list some easily checked properties of Hx in the following lemma. Lemma 6. For any given unit vectors x, y ∈ R2 , Hx has the following properties: (i) HxT = H , Hx2 = I2 ; (ii) Hx = Re (θ) for some θ ∈ [0, 2π); (iii) For any θ ∈ [0, 2π), there exists a unit vector z ∈ R2 such that Hz = Re (θ); (iv) The eigenspace of Hx associated with the eigenvalue 1 is span{x⊥ }. With the aid of Lemma 6, we can establish the following result. Lemma 7. If Aη = Bη, where A, B ∈ O(2), and η ∈ R2 is a unit vector, then A = B or A = BHη⊥ . 12 Proof: Note that a 2-dimensional orthogonal matrix is either a rotation matrix or a reflection matrix. Without loss of generality, we discuss the problem in three cases: Case 1. A = Ro (α), B = Ro (β) for some α, β ∈ [0, 2π). Then Ro (α)η = Ro (β)η, implying Ro (α − β)η = η. Hence α − β = 0. That is, A = B. Case 2. A = Re (α), B = Re (β) for some α, β ∈ [0, 2π). Following the same procedure in Case 1, one can also obtain A = B. Case 3. A = Ro (α), B = Re (β) = Ro (β)I¯ for some α, β ∈ [0, 2π). Then ¯ It follows that η = Ro (β − α)Iη ¯ = Re (β − α)η. From Ro (α)η = Ro (β)Iη. 2 Lemma 6 (iii), there exists some x ∈ R such that Hx = Re (β − α). That is, η = Hx η. Using (iv) in Lemma 6, we have η ∈ span{x⊥ }. Then x = ±η ⊥ , ¯ implying that Hx = Hη⊥ . As a result, Hη⊥ = Re (β − α) = Ro (β − α)I, Ro (α)Hη⊥ = Re (β). By (i) in Lemma 6, we have A = Ro (α) = Re (β)Hη⊥ =  BHη⊥ . Let F denote a graph with 4 vertices and 5 edges, then the following lemma holds. Lemma 8. (F, p) is infinitesimally bearing rigid if and only if p is nondegenerate. The necessity of Lemma 8 is obvious. The sufficiency of Lemma 8 can be obtained from Lemma 9 to be given in the next subsection. With Lemmas 5, 6, 7 and 8 at hand, we now give the proof for Theorem 4. −1 Proof of Theorem 4: Note that (In ⊗ R)−1 q ∈ BK (BK (p)) is equivalent to −1 BK ((In ⊗R) q) = BK (p), which is also equivalent to BK (q) = (Im ⊗R)BK (p). Therefore, it suffices to show that fK (q) = fK (p) if and only if BK (q) = (Im ⊗ R)BK (p). Sufficiency. For any i, j, k ∈ V, it is straightforward that T T T gij (q)gik (q) = gij (p)R T Rgik (p) = gij (p)gik (p). To prove the necessity, we consider the following two cases. Case 1. The configuration p is degenerate. Let g̃ be a unit vector such that g̃ is collinear with gij (p) for all i, j ∈ V, then gij (q) = Rgij (p) if and only if gij (q) = RHg̃⊥ (p) gij (p). For any i, j ∈ V, let Rij ∈ O(2) such that gij (q) = Rij gij (p). To prove the necessity, it suffices to show that for any distinct vertices i, j, k ∈ V, if gij (q) = Rij gij (p) and gik (q) = Rik gik (p), there always holds Rij = Rik or Rij = Rik Hg̃⊥ (p) . Without loss of generality, T T suppose gij (p) = gik (p). Then gij (q)gik (q) = gij (p)gik (p) = 1, which holds if and only if gij (q) = gik (q), i.e., Rij gij (p) = Rik gik (p) = Rik gij (p). By Lemma 7, Rij = Rik or Rij = Rik Hgij ⊥ (p) . Since Hg ⊥ (p) = Hg̃ ⊥ (p) , the proof ij is completed. Case 2. The configuration p is nondegenerate. Note that K is complete, hence each vertex i has at least two neighbors j and k such that gij (p) and gik (p) are not collinear. As a result, we can divide Ni into two sets N̂i and Ňi , such that for any j ∈ N̂i and k ∈ Ňi , gij (p) and gik (p) are not collinear. 13 We first show that given i ∈ V, for any j ∈ N̂i , k ∈ Ňi , l ∈ V \ {i, j, k}, it always holds that Gijkl (q) = Rijkl Gijkl (p) for some Rijkl ∈ O(2), where Gijkl = (gij , gik , gil , gjk , gjl , gkl ) ∈ R2×6 . Since K is complete, we have l ∈ Ni . Without loss of generality, we consider l ∈ Ňi . For the triangle composed of i, j, k, let Gijk = (gij , gik , gjk ) ∈ R2×3 . Since fK (q) = fK (p), we have GTijk (q)Gijk (q) = GTijk (p)Gijk (p). Note that gij (p) and gik (p) are not collinear, thus we have rank(Gijk (p)) = 2. By virtue of Lemma 5, the Cholesky decomposition of GTijk (p)Gijk (p) determines Gijk (p) up to a 2 × 2 orthogonal matrix Rijk . That is, Gijk (q) = Rijk Gijk (p). Similarly, we have Gijl (q) = Rijl Gijl (p) for Rijl ∈ O(2). For vertices j, k, l, it follows from Case 1 that Gjkl (q) = Rjkl Gjkl (p) for Rjkl ∈ O(2) no matter j, k, l are collinear or not. Since Rijk gij (p) = Rijl gij (p) = gij (q), according to Lemma 7, Rijk = Rijl or Rijk = Rijl Hgij ⊥ (p) . Suppose that Rijk 6= Rijl , then T T gjk (p)gjl (p) = gjk (q)gjl (q) T T = gjk (p)Rijk Rijl gjl (p) T = gjk (p)Hgij ⊥ (p) gjl (p) T T ⊥ ⊥T = gjk (p)gjl (p) − 2gjk (p)gij (p)gij (p)gjl (p). T ⊥ ⊥T (p)gij (p)gij (p)gjl (p) = 0. Since gij (p) and gik (p) are not This implies gjk collinear, gij (p) and gjk (p) are also not collinear. Similarly, gij (p) and gjl (p) are not collinear. Thus a contradiction arises. We then have Rijk = Rijl , Rijkl , which implies that Ḡijkl (q) = Rijkl Ḡijkl (p), where Ḡijkl = (gij , gik , gil , gjk , gjl ) ∈ R2×5 . Consider the framework (F, q), where F is a graph with vertex set {i, j, k, l} and edge set {(i, j), (i, k), (i, l), (j, k), (k, l)}. Since these four vertices are not collinear, according to Lemma 8, (F, q) is infinitesimally bearing rigid, thus is globally bearing rigid. This implies that gkl (q) can be uniquely determined by Ḡijkl (q). As a result, Gijkl (q) = Rijkl Gijkl (p). The above proof implies that given i ∈ V, it holds that R , Rijk = Rijl = Rikl = Rjkl for any j ∈ N̂i , k ∈ Ňi , l ∈ V \ {i, j, k}. Note that any edge in graph K is involved in a triangle including vertex i. Therefore, gij (q) = Rgij (p) for any (i, j) ∈ E.  It is important to note that Theorem 4 cannot induce equivalence of global angle rigidity and global bearing rigidity. Some examples show that this equivalence holds, but we still have no idea of how to prove it. Nonetheless, we are able to establish the following result. Theorem 5. If a framework (G, p) is (globally) angle rigid, then it is (globally) bearing rigid. Proof: Suppose (G, p) is angle rigid. Then there exists a neighborhood Up of p −1 such that fG−1 (fG (p)) ∩ Up = fK (fK (p)) ∩ Up . For this Up , consider any q ∈ 14 BG−1 (BG (p))∩Up . It follows from BG (p) = BG (q) that fG (p) = fG (q). Therefore, fK (p) = fK (q). By Theorem 4, BK (p) = (Im ⊗ R)BK (q) for some R ∈ O(2). Recall that BG (p) = BG (q), we have R = I2 . As a result, BK (p) = BK (q), i.e., −1 q ∈ BK (BK (p)). That is, (G, p) is bearing rigid. From [24], bearing rigidity is equivalent to global bearing rigidity. Since global angle rigidity obviously leads to angle rigidity, it can also induce global bearing rigidity.  To prove Theorem 1, we introduce the following theorem in [33]. Theorem 6. ([33] Constant-Rank Level Set Theorem) Let M and N be smooth manifolds, and let Φ : M → N be a smooth map, the Jacobian matrix of Φ has constant rank r. Each level set of Φ is a properly embedded submanifold of codimension r in M . Proof of Theorem 1: From Theorem 3, (K, p) is infinitesimally bearing rigid. −1 [24] shows that BK (BK (p)) = {q ∈ R2n : q = cp + 1n ⊗ ξ, c ∈ R \ {0}, ξ ∈ R2 }. −1 Together with Theorem 4, there must hold fK (fK (p)) = Sp . −1 Next we show Sp is a manifold. For any q ∈ fK (fK (p)), it is obvious that q = (In ⊗ R)(cp + 1n ⊗ ξ) for some R ∈ O(2), scalar c and vector ξ ∈ R2 . From the chain rule, we have rank  ∂fK (p) 1  ∂fK (p) ∂fK (q) = rank = rank (In ⊗ R −1 ) = 2n − 4. ∂q ∂c(In ⊗ R)p ∂p c Note that fK : R2n → R|TK | is a smooth map, according to Theorem 6, −1 fK (fK (p)) is a properly embedded submanifold of dimension 2n − (2n − 4) = 4.  In fact, even for a complete graph, it is possible that the geometric shape cannot be determined by angle-only or bearing-only information. A typical example is the degenerate configuration shown in Fig. 1 (d). Generally, we hope to determine a framework (G, p) by angles uniquely up to translations, rotations, scalings and reflections in the plane. That is, fG−1 (fG (p)) = Sp . In the next subsection, we will introduce a specific class of frameworks satisfying this condition. 3.2. A class of frameworks uniquely determined by angles In [17], the authors introduced a particular class of Laman graphs termed triangulated Laman graphs, which are constructed by a modified Henneberg insertion procedure. In what follows, we will show that the shape of such frameworks can always be determined by angles uniquely. Let Ln = (Vn , En ) be an n−point(n ≥ 3) triangulated Laman graph, its definition is as follows. Definition 5. Let L2 be the graph with vertex set V2 = {1, 2} and edge set E2 = {(1, 2)}. Ln (n ≥ 3) is a graph obtained by adding a vertex n and two edges (n, i), (n, j) into graph Ln−1 for some i and j satisfying (i, j) ∈ En−1 . 15 Note that the triangulated Laman graph considered here is always an undirected graph, that is, if (i, j) ∈ En , then it holds (j, i) ∈ En . For frameworks associated with triangulated Laman graphs, [17] also presents the following result. Lemma 9. [17] If (Ln , p) is strongly rigid, i.e., pi , pj and pk are not collinear for any three vertices i, j, k satisfying (i, j), (j, k), (i, k) ∈ En , then (Ln , p) is infinitesimally distance rigid. For n = 4, it is easy to see that (L4 , p) is strongly rigid if and only if p is nondegenerate. Therefore, (L4 , p) is infinitesimally distance rigid. It follows from Lemma 1 that (L4 , p) is infinitesimally bearing rigid. Note also that a graph with 4 vertices and 5 edges is always a triangulated Laman graph. The sufficiency of Lemma 8 then follows. The following theorem shows that the shape of a strongly rigid framework in the plane can always be uniquely determined by angles. Theorem 7. If (Ln , p) is strongly rigid, then (i) (Ln , p) is minimally infinitesimally angle rigid for TL∗n = {(i, j, k) ∈ Vn3 : (i, j), (j, k), (i, k) ∈ En , i, j < k}; (10) (ii) (Ln , p) is globally angle rigid for TL†n = TL∗n ∪ ∆TLn , where ∆TLn = {(i, k, l) : k = min{Ni ∩ Nj ∩ Vl−1 }, i, j ∈ Nl , i < j < l, l = 4, · · · , n} if n ≥ 4, and ∆TLn = ∅ otherwise; (iii) fL−1 (fLn (p)) = Sp . n Proof: (i) From Lemma 9, (Ln , p) is infinitesimally bearing rigid. Then null(RB ) = Ss ∪ St . It suffices to show that for any η ∈ null(Rg ) ∩ range(RB ), there always exists q ∈ Sr such that η = RB q. Suppose that RTL∗n v = Rg RB v = 0 and RB v 6= 0, where v = (v1T , · · · , vnT ) ∈ R2n . In the proof of Theorem 3, we have shown that for any (i, j, k) ∈ TL∗n , if gij is not collinear with gik , then (9) holds for some cijk . Recall that (Ln , p) is strongly rigid, then for any (i, j, k) ∈ TG∗ , (9) holds for some cijk . Without loss of generality, suppose i < j < k. Due to the definition in (10), for each triangle in Ln formed by vertices i, j and k, we have (i, j, k), (j, i, k) ∈ TL∗n . Now we regard (i, j) as a vertex of G 0 for all (i, j) ∈ En , two vertices in G 0 are adjacent if they belong to a same triangle in G. Let cij be the state of (i, j) if vi − vj = cij Ro ( π2 )eij + c̄ij eij for some c̄ij ∈ R. It is easy to see that (i, j), (i, k) and (k, j) have a common state, implying that adjacent vertices in G 0 must have a common state. Note that in every step during the generation of graph Ln , a new triangle is generated based on an existing edge. Therefore, G 0 must be connected. As a result, there exists a constant c ∈ R such that vi − vj = cRo ( π2 )eij + c̄ij eij for all (i, j) ∈ En . By similar analysis to the proof of Theorem 3, we can obtain v ∈ Sr , which implies that (Ln , p) is infinitesimally angle rigid for TG∗ . Moreover, observe that |En | = 1 + 2(n − 2) = 2n − 3, we conclude that (Ln , p) is minimally infinitesimally angle rigid. (ii). We prove the statement by induction. 16 For n = 3, it is obvious that (L3 , p) with TL†3 = TL∗3 = {(1, 2, 3), (2, 1, 3)} is globally angle rigid. For n ≥ 4, suppose that (Ln−1 , p) with TL†n−1 is globally angle rigid. Next we show that (Ln , p) is globally angle rigid with TL†n . Without loss of generality, let i and j be the neighbors of n and i < j. Note that (i, j) ∈ En−1 , and i, j must have at least one common neighbor vertex in Ln−1 , let k be minimum index among them, it is easy to see TL†n = {(i, j, n), (j, i, n), (i, k, n)} ∪ TL†n−1 . It suffices to show that for any q such that fT † (p) = fT † (q), it always holds Ln Ln fKn (p) = fKn (q). Since Ln−1 is globally angle rigid, by Theorem 4, there exists a matrix Rn−1 ∈ O(2) such that gi0 j 0 (p) = Rn−1 gi0 j 0 (q) for all i0 , j 0 ∈ T T T T Vn−1 . From gij (p)gin (p) = gij (q)gin (q), and gji (p)gjn (p) = gji (q)gjn (q), we T T T have gni (p)gnj (p) = gni (q)gnj (q). That is, Gijn (p)Gijn (p) = GTijn (q)Gijn (q), where Gijn = (gij , gnj , gni ) ∈ R2×3 . Using strong rigidity of (Ln , p), we have rank(Gijn (p)) = 2. By Lemma 5, Gijn (p) = Rijn Gijn (q) for some Rijn ∈ O(2). It follows that gij (p) = Rn−1 gij (q) = Rijn gij (q). According to Lemma 7, Rn−1 = Rijn or Rn−1 = Rijn Hgij ⊥ (q) . Suppose that Rn−1 6= Rijn , then gik (p) = Rn−1 gik (q) = Rijn Hgij ⊥ (q) gik (q), and gin (p) = Rijn gin (q). It follows that T T T T gik (p)gin (p) = gik (q)Hgij ⊥ (q) Rijn Rijn gin (q) = gik (q)Hg ⊥ (q) gin (q). ij (11) T T Recall that (i, k, n) ∈ TL†n , we have gik (p)gin (p) = gik (q)gin (q). Together T T with (11), it follows gik (q)Hgij (q)g (q), which holds if and only ⊥ (q) gin (q) = g in ik if gij (q) is collinear with either gik (q) or gin (q), i.e., either (qiT , qjT , qkT )T or (qiT , qjT , qnT )T is degenerate, implying that either (pTi , pTj , pTk )T or (pTi , pTj , pTn )T is degenerate. This conflicts with strong rigidity of (Ln , p). Therefore, Rn−1 = Rijn , Rn . That is, gi0 j 0 (p) = Rn gi0 j 0 (q) for any (i0 , j 0 ) ∈ En . It follows that fK (p) = fK (q). Hence, (Ln , p) with TL∗n is globally angle rigid. −1 (iii). By (i), (ii) and Theorem 1, fT−1 (fTLn (p)) = fK (fK (p)) = Sp .  Ln An example of strongly rigid framework embedded by a triangulated Laman graph is shown in Fig. 5 (a). The angles in red are constrained angles determined by TL†5 . The graph in Fig. 5 (b) contains a triangulated Laman graph but itself is not a triangulated Laman graph. 4. Application to formation control In this section, we will apply the angle-based approach for framework recognition to distributed formation control in the plane. The target formation will be characterized by some constraints on angles. In order to form a desired shape, the multiple mobile agents are required to meet these constraints via a distributed controller. 17 1 1 2 5 3 4 2 5 3 4 (a) (b) Figure 5: (a) A framework embedded by a triangulated Laman graph L5 . (L5 , p) is infinitesimally angle rigid for TL∗5 = {(1, 2, 3), (1, 3, 4), (1, 4, 5), (2, 1, 3), (3, 1, 4), (4, 1, 5)}, and globally angle rigid for TL†5 = TL∗5 ∪ {(1, 2, 4), (1, 3, 5)}. The angles in red are constrained angles de- termined by TL†5 . (b) A framework embedded by a graph containing L5 . The framework is globally and infinitesimally angle rigid for TGF , where TGF is in form (14). The angles in red are constrained angles determined by TGF . 4.1. The Formation Stabilization Problem Consider n agents moving in the plane, each agent i has a simple kinematic point dynamics ṗi = ui , i ∈ V, (12) where pi ∈ R2 and ui ∈ R2 are the position and control input of agent i, respectively, in the global coordinate frame. We consider that the global coordinate system is absent for the agents, each agent i has its own local coordinate system. Let pij be the coordinate of agent j’s position with respect to agent i’s local coordinate system. Agent i can measure the relative position state pii − pik if k ∈ Ni . In this paper, we employ an infinitesimally angle rigid framework (G, p∗ ) to describe the target formation shape. Each agent is viewed as a vertex of the framework. An interaction link between two agents is regarded as an edge in graph G. That is, G is also the sensing graph interpreting the interaction relationship between agents. By virtue of Theorem 1, the target formation shape can be defined as the following manifold: E = Sp∗ = {p ∈ R2n : p = c(In ⊗ R)p∗ + 1n ⊗ ξ, R ∈ O(2), c ∈ R \ {0}, ξ ∈ R2 }. (13) For the target formation (G, p∗ ), we make the following assumption: Assumption 1. G contains a triangulated Laman graph Ln as a subgraph, and (Ln , p∗ ) is strongly rigid. The set determining all angle constraints is given by TGF = {(i, j, k) ∈ V 3 : (i, j), (j, k), (i, k) ∈ E, i, j < k}, 18 (14) Remark 5. Assumption 1 is a graphical condition for (G, p∗ ), and will be the only condition for achieving stability of the target formation. Once Assumption 1 holds, it is easy to see that TL∗n ⊂ TGF , where TL∗n is in form (10). Since we have shown in Theorem 7 that (Ln , p∗ ) is infinitesimally angle rigid for TL∗n , together with En ⊂ E, it follows that (G, p∗ ) is infinitesimally angle rigid for TGF . It is also worth noting that strongly rigid configurations form a dense subset of R2n , which is shown in [17]. A framework (G, p) is said to be realizable if there exists some q ∈ R2n such that fG (q) = fG (p). Throughout this paper, we always assume that the target formation shape is realizable. Then the angle-based formation stabilization problem can be summarized as follows. Problem 1. Given a realizable formation (G, p∗ ) satisfying Assumption 1, design a distributed control law for each agent i based on the relative position measurements {pii − pij , j ∈ Ni }, such that E is asymptotically stable. 4.2. A Steepest Descent Formation Controller ∗ T ∗T ∗ Denote gij = gij (p), gij = gij (p∗ ) for all (i, j) ∈ E, δ(i,j,k) = gij gik − gij gik , ∗ (i, j, k) ∈ TG . To form a desired geometric shape, the multi-agent system should minimize the following cost function: VF (p) = 1 2 X T ∗T ∗ 2 (gij gik − gij gik ) = (i,j,k)∈TG∗ 1 2 X 2 δ(i,j,k) . (15) (i,j,k)∈TG∗ On the basis of function (15), a gradient-based control strategy can be derived as X X T uF y1 (eij , eik )− y2 (eji , ejk ), i ∈ V (16) i = −(∇pi VF (p)) = − (j,k)∈NTi (j,k)∈NT i where NTi = {(j, k) ∈ V 2 : (i, j, k) ∈ TGF }, NT i = {(j, k) ∈ V 2 : (j, i, k) or (j, k, i) ∈ P T ∗T ∗ T ik gik − gij gik )( ||eijij|| gik + ||ePik TGF }, y1 (eij , eik ) = (gij || gij ), y2 (eji , ejk ) = (gji gjk − P ∗T ∗ gji gjk ) ||eijij|| gkj . Observe that if (j, i, k) ∈ TGF , the control input of agent i includes a term associated with ejk . This can be obtained by simple subtraction eik − eij . From the form of TGF in (14), we have k, j ∈ Ni . Therefore, it is reasonable for agent i to use ejk . We define the desired equilibrium for the formation system as T T EF = {p ∈ R2n : gij (p)gik (p) = gij (p∗ )gik (p∗ ), (i, j, k) ∈ TGF }. (17) It is easy to see EF is only a subset of E . EF = E if and only if (G, p∗ ) is globally angle rigid for TGF . For example, in Fig. 5 (b), the framework is globally and infinitesimally angle rigid for TGF , thus it holds EF = E . However, the framework in Fig. 5 (a) is infinitesimally angle rigid but not globally angle 19 rigid. In this scenario, even if all the angle constraints determined by TGF are satisfied, it is possible that the target formation shape is not formed. Nonetheless, from the definition of infinitesimal angle rigidity, for any q ∈ E , there exists a neighborhood U of q, such that E ∩ U = EF ∩ U . Hence, stability of EF can still be sufficient for local stability of E . Let δ(p) = (· · · , δ(i,j,k) , · · · )T = fTGF (p) − fTGF (p∗ ), (i, j, k) ∈ TG∗ . Then δ(p) = 0 if and only if p ∈ EF , and (15) can be written as V (p) = 21 ||δ||2 . By the chain rule, the multi-agent system (12) with control input (16) can be written in the following compact form ṗ = −(∇p VF (p))T = −(δ T (p) · ∂fTGF (p) ∂p )T = −RTT F (p)δ(p). G (18) Note that uF i only requires agent i to sense real-time relative displacements from its neighbors. Therefore, uF i is a distributed control strategy. Moreover, by implementing uF i , the formation system has the following properties. Lemma 10. Under the control law (16), the following statements hold: (i) The global coordinate system is not required for each agent. (ii) If p(0) is degenerate, then p(t) = p(0) for t ≥ 0. q P P (iii) The centroid po (t) = n1 i∈V pi (t) and the scale s(t) = n1 i∈V ||pi (t) − po (t)||2 are both invariant. The proof of (i) is straightforward by a similar approach to those of [13, 16], the validity of (ii) is also easy to verify. Thus their proofs are omitted here. For (iii), observe that po (t) = n1 pT (t)1n , according to (18), we have ṗo = 1 T 1 ṗ 1n = δ T RTGF 1n = 0. n n P To show ṡ = 0, we first note that ṗT p = δ T RTGF p = δ T Rg diag( ||eijij|| )H̄p = 0. It follows that 2 Pij 2 )H̄(1n ⊗ po ) = 0. ṡ = √ ṗT (p − 1n ⊗ po ) = − √ δ T diag( ||eij || n n  4.3. Stability analysis Theorem 8. For a group of n ≥ 3 agents with dynamics (12) and controller (16) moving in the plane. Under Assumption 1, for any q ∈ E , there is a neighborhood Uq of q, such that if p(0) ∈ Uq , then limt→∞ p(t) = p† for some p† ∈ E . Proof: For any q ∈ E , let ρ = p − q, f (p) = −RTT F (p)δ(p), expanding f (p) G in Taylor series about q, we have f (p) = f (q) + ∂f∂p(q) ρ + g(ρ). Then (18) is equivalent to ∂f (q) ρ̇ = ρ + g(ρ) = Jf (q)ρ + g(ρ), (19) ∂p 20 where Jf (q) = ∂f (q) ∂p =− T ∂RT F (q) G ∂p T δ(q) − RTT F (q) ∂δ(q) ∂p = −RT F (q)RTGF (q). From G G Lemma 9, the validity of Assumption 1 implies that (G, q) is infinitesimally angle rigid. Therefore, Jf (q) has 4 zero eigenvalues and the rest are negative real numbers. There must exist an orthonormal transformation Q ∈ R2n×2n such ˜ where J˜ is Hurwitz. Then (19) is equivalent that QJf (q)QT = diag(04×4 , J), to ϕ̇ = g1 (ϕ, ψ), ˜ + g2 (ϕ, ψ), ψ̇ = Jψ (20) where (ϕT , ψ T )T = Qρ, (g1T , g2T )T = Qg(ρ). Note that ρ = 0 is an equilibrium point of (19), hence, g1 (0, 0) = 0 and g2 (0, 0) = 0. Since g(ρ) = f (p) − Jf (q)ρ, we have Jg |ρ=0 = 0. It follows that Jg1 (0, 0) = 0 and Jg2 (0, 0) = 0. Observe that M = {(ϕT , ψ T )T : (ϕT , ψ T )T = Qρ, ρ + q ∈ E } is a 4-dimensional manifold. We next show M is a center manifold. Note that M is invariant since E ⊂ ˜ + g2 (ϕ, ψ) = 0, EF ⊂ {p ∈ R2n : f (p) = 0}. Any equilibria must satisfy Jψ by implicit function theorem, there is a neighborhood U of the origin, such that ψ = h(ϕ) for ψ ∈ U , where h(·) : R4 → R2n−4 is smooth and h(0) = 0, Jh (0) = 0. Since M is a 4-dimensional manifold, there must exist an open set in R4 that is diffeomorphic to a neighborhood U 0 of origin in M. Because M can be represented by (ϕT , hT (ϕ))T in U ∩ U 0 , we conclude that M is a center manifold. The flow on the manifold M is governed by the 4-dimensional system ξ˙ = g1 (ξ, h(ξ)) for sufficiently small ξ. Recall that M is a manifold of equilibria, we have ξ˙ = 0. By center manifold theory [35], for any sufficiently small ϕ(0), ψ(0), we have ϕ(t) = ξ(0) + O(e−γt ), ψ = h(ξ(0)) + O(e−γt ) for some γ > 0. This implies that limt→∞ (ϕT , ψ T )T = (ξ T (0), hT (ξ(0)))T ∈ M. It follows that limt→∞ p(t) = limt→∞ QT (ϕT , ψ T )T + q = QT (ξ T (0), hT (ξ(0)))T + q = p† ∈ E . The proof is completed.  Observe that the equilibrium set of system (18) is E = {p ∈ R2n : RTT F (p)δ = G F 0}. If RTGF ∈ R|TG |×2n is of full row rank, then p ∈ E implies δ = 0, it follows that p ∈ EF . However, RTGF (p) varies as the formation system evolves, it is difficult to determine its rank. Moreover, once |TGF | > 2n − 4, RTGF can never be of full row rank. As a result, undesired equilibria often exist for system (18). Hence we can only obtain local stability of EF , which further implies local stability of E . Theorem 8 actually means that by implementing the control law (16), the agents can cooperatively restore the desired formation shape under a small perturbation from any q ∈ E , and the convergence rate is as fast as e−γt for some γ > 0 dependent on q. However, it is uncertain that whether there exists a uniform exponent γ for all q ∈ E . This is because E is not compact, there does not exist a finite subcover including E . 4.4. Orientation and Scale Control We have shown that the angle-constrained formation has 4 degrees of freedom, which is higher than that of displacement-, distance-, and bearing-based 21 formations. This ensures that one advantage of the angle-based formation approach is the convenience of orientation and scale control. In this subsection, we will propose an angle-based control scheme to steer all agents to form a target formation shape with prescribed orientation and scale. Given (G, p∗ ) as the target formation shape satisfying Assumption 1, a configuration forming the target formation with desired orientation and scale can be written by p = c∗ (In ⊗ Ro (θ∗ ))p∗ + 1n ⊗ ξ for some constant θ∗ ∈ [0, 2π), c∗ ∈ R \ {0} and an arbitrary translational vector ξ ∈ R2 . It is worth noting that p∗i here denotes the position of agent i in the global coordinate frame. Let p̃ = c∗ (In ⊗ Ro (θ∗ ))p∗ , then the target equilibrium can be described as EM = {p ∈ R2n : p = p̃ + 1n ⊗ ξ, ξ ∈ R2 }. (21) To control the orientation of the formation, it is obviously necessary that some agents should have access to the global coordinate system. To keep the target shape in a precise orientation, we will try to constrain the displacement between two adjacent agents, which is similar to [16]. Since orientation and scale of the ultimate formation is determined by these two agents, we call them leaders. It is noteworthy that any two adjacent agents can be selected as leaders, and controlling their relative position is sufficient to control the orientation and scale of the formation (this fact will be shown later). Moreover, different from [16], using angle-based approach, the target displacement between leaders can be artificially specified and does not have to satisfy a fixed length constraint. That is, not only orientation, but also scale of the target formation can be controlled. Suppose agents l1 and l2 are leaders, l1 , l2 ∈ V. Then p̃l1 − p̃l2 is the displacement of l1 and l2 in the formation with target orientation and scale. Now we summarize the problem that we will deal with in this subsection as below. Problem 2. Given a realizable target formation (G, p∗ ) satisfying Assumption 1, and the target displacement p̃l1 − p̃l2 known by agents l1 and l2 , design a distributed control law for each agent i based on the relative position measurements {pii − pij , j ∈ Ni }, such that EM is asymptotically stable. To solve Problem 2, we consider the following set containing the target equilibrium EM El = {p ∈ EF : pl1 − pl2 = p̃l1 − p̃l2 }. (22) The following lemma shows that once (G, p∗ ) is infinitesimally angle rigid, El and EM coincide near each point in EM . Lemma 11. If (G, p∗ ) is infinitesimally angle rigid, then for any q ∈ EM , there exists a neighborhood Uq of q, such that EM ∩ Uq = El ∩ Uq .   F f (p) Proof: Let fl (p) = ∈ R|TG |+2 , fM (p) = (· · · , (pi − pj )T , · · · )T ∈ pl1 − pl2 −1 R2m , it follows that El = fl−1 fl (p̃), EM = fM fM (p̃). Since G must be connected, 22 we have rank( ∂f∂pM ) = rank(H̄) = 2n − 2, according to Theorem 6, EM is a 2dimensional manifold. Next we show El is also a 2-dimensional manifold near each q ∈ EM . Without loss of generality, suppose pl1 − pl2 is consisted of the (2k − 1)-th row and 2k-th row of H̄p. Let S = [Sij ] ∈ R2×2m be a matrix with S1,2k−1 = S2,2k = 1, ∂(pl1 −pl2 ) = S H̄. and Sij = 0 for other i, j. Then S H̄p = pl1 − pl2 and ∂p For any q ∈ EM , define Rl (q) = ∂fl ∂p |p=q = (RTT F (q), (S H̄)T )T , it is easy G to obtain null(Rl (q)) = null(RTGF (q)) ∩ null(S H̄). We first notice that (G, q) must be infinitesimally angle rigid, implying null(RTGF (q)) = S, where S is the trivial motion space shown in Lemma 3. We also note that null(S H̄) = (null(S) ∩ range(H̄)) ∪ null(H̄). It can be verified that null(Rl (q)) = S ∩ l null(S H̄) = null(H̄) = span{1n ⊗I2 }. Then we obtain rank( ∂f ∂p |p=q ) = 2n−2 = 2n l max{rank( ∂f ∂p ) : p ∈ R }, i.e., q is a regular point of fl . From [18, Proposition 2], there exists a neighborhood U of q, such that El ∩ U is a 2-dimensional manifold. Together with EM ⊂ El , we have EM ∩ U ⊂ El ∩ U . It follows that El ∩ Uq = EM ∩ Uq for some Uq ⊂ U .  By virtue of Lemma 11, when the initial positions of agents are close to EM , to drive the agents into EM , it suffices to constrain pl1 − pl2 to be p̃l1 − p̃l2 while steering the agents to meet angle constraints determined by TGF . Therefore, we wish the agents to cooperatively minimize the following cost function V = VF + VM , (23) where VF is in form (15), VM = 21 ||p̃l1 − p̃l2 − (pl1 − pl2 )||2 . As a result, the gradient-based control law is induced as M ui = uF i + ui = −∇pi VF − ∇pi VM , i∈V (24) M where uF i in form (16) is for driving agents to maintain the target shape, ui is for controlling formation orientation and scale. It is easy to see that the control law (24) is distributed and uM = 0 for i i ∈ V \{l1 , l2 }. Under (24), property (i) in Lemma 10 also holds for the formation system, while (ii) in Lemma 10 becomes invalid. Moreover, during the evolution, the centroid is still invariant, but the scale may be changed. Define the graph Gl = (V, El ), where El = {(pl1 , pl2 )} (we do not distinguish (pl1 , pl2 ) and (pl2 , pl1 )). Let Hl ∈ R1×n be the incidence matrix and Ll = HlT Hl be the Laplacian matrix, corresponding to graph Gl . Denote p̄ = p − p̃, by using control law (24), the formation system can be written in the following compact form ṗ = hM (p) = −RTT F (p)δ(p) − (Ll ⊗ I2 )p̄(p). (25) G The Jacobian matrix of hM at the desired equilibrium p̃ ∈ El is JhM (p)|p=p̃ = − ∂RTT F (p) G ∂p δ(p)|p=p̃ − RTGF (p) ∂δ(p) |p=p̃ − (Ll ⊗ I2 )|p=p̃ ∂p = −(RTT F (p̃)RTGF (p̃) + Ll ⊗ I2 ) , JM . G 23 The following theorem shows the effectiveness of our control strategy. Theorem 9. For a group of n ≥ 3 agents with dynamics (12) and controller (24) moving in the plane. Under Assumption 1, EM is locally exponentially stable. Proof: By Lemma 11, we only have to show local exponential stability of El . Note that system (25) has a similar form to [16, Equation (9)]. Moreover, null(JM ) = null(Rl (p̃)) = span{1n ⊗ I2 }, where Rl is the matrix defined in the proof of Lemma 11. Through a process similar to the proof of [16, Theorem 3], it can be shown that El is locally exponentially stable. By Lemma 11, EM is also locally exponentially stable.  Remark 6. Besides orientation and scale, we can also control translation of the formation by pre-specifying ξ in EM to be ξ ∗ . To do this, it suffices to add an extra control term uξ = p̃l1 + ξ ∗ − pl1 into the control law of agent l1 . In this scenario, the desired equilibrium is a point p† = p̃ + 1n ⊗ ξ ∗ . Let ET = {p ∈ R2n : pl1 = p̃l1 + ξ ∗ }, then ET ∩ EM = {p† }. By Lemma 11, there is a neighborhood Up† of p† such that EM ∩ Up† = El ∩ Up† . It follows that {p† } = ET ∩ El ∩ Up† . By linearization approach in [34, Theorem 4.13], it is easy to prove local exponential stability of ET ∩ El . Therefore, p = p† is also locally exponentially stable. Most of methods for formation control in the literature do not apply to the problem in this subsection. More specifically, by a displacement-based approach, neither orientation nor scale can be controlled; by a distance-based approach, the formation scale cannot be controlled; by a bearing-based approach, the formation orientation cannot be controlled. 5. Simulations In this section, we present two numerical examples to illustrate the effectiveness of the theoretical findings. In the first example, the target formation shape is formed exponentially fast under the formation control law (16), while in the second example, by implementing the control law (24), the formation is transformed into another one with desired orientation and scale. Example 1. Consider a group of 5 autonomous agents moving in the plane. The target formation shape is a regular pentagon described by the framework ∗T ∗ (G, p∗ ) in Fig. 5 (a). The set of desired angle information should be {g12 g13 = ∗T ∗ ∗T ∗ ∗T ∗ ∗T ∗ ∗T ∗ g45 = 0.8090, g13 g14 = 0.8090, g14 g15 = 0.8090, g21 g23 = −0.3090, g31 g34 = 0.3090, g41 ∗ 0.8090}. Note that G is a triangulated Laman graph, and (G, p ) is strongly rigid. That is, Assumption 1 holds. Without loss of generality, choose qi = 2π T T T T (cos( 2π 5 i), sin( 5 i)) , i = 1, · · · , 5. Then q = (q1 , · · · , qn ) ∈ E . Set the initial position vector of the agents as p(0) = q + r, where r ∈ R10 is a perturbation, each component of r is a pseudorandom value drawn from the uniform distribution on (−0.5, 0.5). By implementing the control law (16), Fig. 6 (a) 24 2 1.4 1.2 Initial positions Initial positions Final positions Final positions 1.5 VF(t) e-0.1tVF(0) 1 y-axis 1 0.8 0.5 0.6 0 0.4 -0.5 -1 -1 0.2 -0.5 0 0.5 1 1.5 2 0 2.5 x-axis 0 10 20 30 40 50 60 Time (a) (b) Figure 6: (a) Under control law (16), the agents asymptotically form a regular pentagon. (b) VF (t) vanishes to zero in an exponential speed. is obtained, which shows that the desired formation shape can be formed by our formation strategy. Fig. 6 (b) describes the evolution of VF (t), where VF (t) is in form (15). It can be observed that VF (t) ≤ e−0.1t VF (0) for all t ≥ 0, implying exponential convergence of the formation system. In conclusion, the simulation result illustrates Theorem 8. In fact, when we repeat the simulation by choosing other values of r in the same way as above, it can always be obtained that VF vanishes to zero exponentially and the target formation shape is eventually formed. Moreover, when we select each component of r from the uniform distribution on (−1, 1), the target formation shape can still be formed in most cases. In other cases, the angle constraints can usually be satisfied with an exponentially fast speed, i.e., VF vanishes to zero exponentially, whereas the target formation shape is not eventually formed. This is because (G, p∗ ) with TGF is not globally angle rigid. Note that the edge length of the pentagon formed by q is 1.176, therefore, the attraction region is sizable. Example 2. In this example, we control orientation and scale of the formation formed in Example 1 by implementing the control input (24). Let agents 3 and 4 be the two leaders. Now we aim to drive the direction of p3 − p4 to be horizontal with respect to the global coordinate system, while setting the length of each edge as 0.5. It suffices to set the target displacement between two leaders as p̃3 − p̃4 = (−0.5, 0)T . Fig. 7 shows the trajectories of agents and the evolution of V (t) in (23), in which we can observe the validity of Theorem 9. 6. Conclusion In this paper, we have developed an angle rigidity theory to study when planar frameworks can be determined by angles uniquely up to translations, rotations, scalings and reflections. We have also proved that the shape of a 25 & š & 2 0.35 Initial positions of followers Final positions of followers Initial positions of leaders Final positions of leaders 1.5 0.3 0.25 y-axis 1 V(t) e-0.03tV(0) 0.2 0.5 0.15 0 0.1 -0.5 -1 0.05 -0.5 0 0.5 1 1.5 2 2.5 0 3 x-axis 0 20 40 60 80 100 120 140 160 180 200 Time (b) (a) Figure 7: (a) Under control law (24), the regular pentagon formed by all agents is asymptotically transformed into another regular pentagon with desired orientation and scale. (b) V (t) vanishes to zero exponentially. triangulated framework can always be uniquely determined by angles. On the basis of the proposed angle rigidity theory, a distributed formation controller has been designed for formation shape stabilization. We have proved that by implementing our control strategy, a formation containing a strongly rigid triangulated framework is locally exponentially stable. Taking the advantage of high degrees of freedom, we have proposed a distributed control strategy, which can drive agents to stabilize a target formation shape with prescribed orientation and scale. Two simulations have been given to show effectiveness of our formation strategies. The future work includes global stability of angle-based formation maneuver control. References [1] Fax, J. A., and Murray, R. M., 2004. Information flow and cooperative control of vehicle formations. IEEE Transactions on Automatic Control, 49(9), 1465-1476. [2] Ren, W., and Atkins, E. 2007. Distributed multi-vehicle coordinated control via local information exchange. International Journal of Robust and Nonlinear Control, 17(10-11), 1002-1033. [3] Xiao, F., Wang, L., Chen, J., and Gao, Y., 2009. Finite-time formation control for multi-agent systems. Automatica, 45(11), 2605-2611. [4] Coogan, S., and Arcak, M. 2012. Scaling the size of a formation using relative position feedback. Automatica, 48(10), 2677-2685. [5] Jing, G., Zheng, Y., and Wang, L. 2017. Consensus of Multiagent Systems with Distance-Dependent Communication Networks. IEEE transactions on neural networks and learning systems, 28(11), 2712-2726. 26 [6] Olfati-Saber, R., Fax, J. A., and Murray, R. M. 2007. Consensus and cooperation in networked multi-agent systems. Proceedings of the IEEE, 95(1), 215-233. [7] Wang, L., and Xiao, F. 2007. A new approach to consensus problems in discrete-time multiagent systems with time-delays. Science in China Series F: Information Sciences, 50(4), 625-635. [8] Wang, L., and Xiao, F. 2010. Finite-time consensus problems for networks of dynamic agents. IEEE Transactions on Automatic Control, 55(4), 950-955. [9] Anderson, B. D. O., Yu, C., Fidan, B., and Hendrickx, J., 2008. Rigid graph control architectures forautonomous formations. IEEE Control Systems Magazine, 28(6), 48-63. [10] Krick, L., Broucke, M. E., and Francis, B. A., 2009. Stabilization of infinitesimally rigid formations of multi-robot networks. International Journal of Control 82(3), 423-439. [11] Yu, C., Anderson, B. D. O., Dasgupta, S., and Fidan, B., 2009. Control of minimally persistent formations in the plane. SIAM Journal on Control and Optimization, 48(1), 206-233. [12] Summers, T. H., Yu, C., Dasgupta, S., and Anderson, B. D. O., 2011. Control of minimally persistent leader-remote-follower and coleader formations in the plane. IEEE Transactions on Automatic Control, 56(12), 2778-2792. [13] Oh, K. K., and Ahn, H. S., 2011. Formation control of mobile agents based on inter-agent distance dynamics. Automatica, 47(10), 2306-2312. [14] Zelazo, D., Franchi, A., Bülthoff, H. H., and Robuffo Giordano, P., 2015. Decentralized rigidity maintenance control with range measurements for multi-robot systems. The International Journal of Robotics Research, 34(1), 105-128. [15] Mou, S., Belabbas, M. A., Morse, A. S., Sun, Z., and Anderson, B. D. O., 2016. Undirected rigid formations are problematic. IEEE Transactions on Automatic Control, 61(10), 2821-2836. [16] Sun, Z., Park, M. C., Anderson, B. D. O., and Ahn, H. S., 2017. Distributed stabilization control of rigid formations with prescribed orientation. Automatica, 78, 250-257. [17] Chen, X., Belabbas, M. A., and Başar, T. 2017. Global stabilization of triangulated formations. SIAM Journal on Control and Optimization, 55(1), 172-199. [18] Asimow, L., and Roth, B., 1978. The rigidity of graphs. Transactions of the American Mathematical Society, 245, 279-289. 27 [19] Hendrickson, B., 1992. Conditions for unique graph realizations. SIAM Journal on Computing 21 (1), 65-84. [20] Liberti, L., Lavor, C., Maculan, N., and Mucherino, A., 2014. Euclidean distance geometry and applications. Siam Review, 56(1), 3-69. [21] Eren, T., Whiteley, W., Morse, A. S., Belhumeur, P. N., and Anderson, B. D. O., 2003. Sensor and network topologies of formations with direction, bearing, and angle information between agents. In Proceedings of the 42nd IEEE Conference on Decision and Control, pp. 3064-3069. [22] Zelazo, D., Franchi, A., and Giordano, P. R. 2004. Rigidity theory in SE(2) for unscaled relative position estimation using only bearing measurements, in Proceedings of European Control Conference, pp. 2703-2708. [23] Bishop, A. N., Shames, I., and Anderson, B. D. O., 2011. Stabilization of rigid formations with direction-only constraints. In Proceedings of the 50th IEEE Conference on Decision and Control and European Control Conference (CDC-ECC), pp. 746-752. [24] Zhao, S., Zelazo, D., 2016. Bearing rigidity and almost global bearingonly formation stabilization. IEEE Transactionson Automatic Control 61 (5), 1255-1268. [25] Zhao, S., and Zelazo, D. 2017. Translational and scaling formation maneuver control via a bearing-based approach. IEEE Transactions on Control of Network Systems 4(3), 429-438. [26] Wang, L., Shi, H., Chu, T., Zhang, W., and Zhang L. 2004. Aggregation of foraging swarms. Lecture Notes in Artificial Intelligence, vol. 3339, Springer, pp. 766-777. [27] Oh, K. K., Park, M. C., and Ahn, H. S., 2015. A survey of multi-agent formation control. Automatica 53, 424-440. [28] Lin, Z., Wang, L., Chen, Z., Fu, M., and Han, Z. 2016. Necessary and sufficient graphical conditions for affine formation control. IEEE Transactions on Automatic Control, 61(10), 2877-2891. [29] Aranda, M., López-Nicolás, G., Sagüés, C., and Zavlanos, M. M. 2016. Distributed formation stabilization using relative position measurements in local coordinates. IEEE Transactions on Automatic Control, 61(12), 39253935. [30] Zhao, S., Lin, F., Peng, K., Chen, B. M., and Lee, T. H. 2014. Distributed control of angle-constrained cyclic formations using bearing-only measurements. Systems & Control Letters, 63, 12-24. [31] Zhao, S., Sun, Z., Zelazo, D., Trinh, M., Ahn, H. 2017. Laman graphs are generically bearing rigid in arbitrary dimensions. Arxiv preprint: 1703.04035. 28 [32] Dongarra, J. J., Moler, C. B., Bunch, J. R., and Stewart, G. W. 1979. LINPACK users’ guide. Society for Industrial and Applied Mathematics. [33] Lee, J. 2000. Introduction to smooth manifolds (Vol. 218). Springer. [34] Khalil, H. K. 2002. Noninear Systems, 3rd edition. Prentice-Hall. [35] Carr, J. 2012. Applications of centre manifold theory (Vol. 35). Springer Science & Business Media. 29
3cs.SY
Type Targeted Testing Eric L. Seidel, Niki Vazou, and Ranjit Jhala arXiv:1410.5370v2 [cs.PL] 16 Jan 2015 UC San Diego Abstract. We present a new technique called type targeted testing, which translates precise refinement types into comprehensive test-suites. The key insight behind our approach is that through the lens of SMT solvers, refinement types can also be viewed as a high-level, declarative, test generation technique, wherein types are converted to SMT queries whose models can be decoded into concrete program inputs. Our approach enables the systematic and exhaustive testing of implementations from high-level declarative specifications, and furthermore, provides a gradual path from testing to full verification. We have implemented our approach as a Haskell testing tool called TARGET , and present an evaluation that shows how TARGET can be used to test a wide variety of properties and how it compares against state-of-the-art testing approaches. 1 Introduction Should the programmer spend her time writing better types or thorough tests? Types have long been the most pervasive means of describing the intended behavior of code. However, a type signature is often a very coarse description; the actual inputs and outputs may be a subset of the values described by the types. For example, the set of ordered integer lists is a very sparse subset of the set of all integer lists. Thus, to validate functions that produce or consume such values, the programmer must painstakingly enumerate these values by hand or via ad-hoc generators for unit tests. We present a new technique called type targeted testing, abbreviated to TARGET, that enables the generation of unit tests from precise refinement types. Over the last decade, various groups have shown how refinement types – which compose the usual types with logical refinement predicates that characterize the subset of actual type inhabitants – can be used to specify and formally verify a wide variety of correctness properties of programs [29,7,23,27]. Our insight is that through the lens of SMT solvers, refinement types can be viewed as a high-level, declarative, test generation technique. TARGET tests an implementation function against a refinement type specification using a query-decode-check loop. First, TARGET translates the argument types into a logical query for which we obtain a satisfying assignment (or model) from the SMT solver. Next, TARGET decodes the SMT solver’s model to obtain concrete input values for the function. Finally, TARGET executes the function on the inputs to get the corresponding output, which we check belongs to the specified result type. If the check fails, the inputs are returned as a counterexample, otherwise TARGET refutes the given model to force the SMT solver to return a different set of inputs. This process is repeated for a given number of iterations, or until all inputs up to a certain size have been tested. TARGET offers several benefits over other testing techniques. Refinement types provide a succinct description of the input and output requirements, eliminating the need to enumerate individual test cases by hand or to write custom generators. Furthermore, TARGET generates all values (up to a given size) that inhabit a type, and thus does not skip any corner cases that a hand-written generator might miss. Finally, while the above advantages can be recovered by a brute-force generate-and-filter approach that discards inputs that do not meet some predicate, we show that our SMT-based method can be significantly more efficient for enumerating valid inputs in a highly-constrained space. TARGET paves a gradual path from testing to verification, that affords several advantages over verification. First, the programmer has an incentive to write formal specifications using refinement types. TARGET provides the immediate gratification of an automatically generated, exhaustive suite of unit tests that can expose errors. Thus, the programmer is rewarded without paying, up front, the extra price of annotations, hints, strengthened inductive invariants, or tactics needed for formally verifying the specification. Second, our approach makes it possible to use refinement types to formally verify some parts of the program, while using tests to validate other parts that may be too difficult to verify TARGET integrates the two modes by using refinement types as the uniform specification mechanism. Functions in the verified half can be formally checked assuming the functions in the tested half adhere to their specifications. We could even use refinements to generate dynamic contracts [9] around the tested half if so desired. Third, even when formally verifying the type specifications, the generated tests can act as valuable counterexamples to help debug the specification or implementation in the event that the program is rejected by the verifier. Finally, TARGET offers several concrete advantages over previous property-based testing techniques, which also have the potential for gradual verification. First, instead of specifying properties with arbitrary code [4,21] which complicates the task of subsequent formal verification, with TARGET the properties are specified via refinement types, for which there are already several existing formal verification algorithms [27]. Second, while symbolic execution tools [12,22,28] can generate tests from arbitrary code contracts (e.g. assertions) we find that highly constrained inputs trigger path explosion which precludes the use of such tools for gradual verification. In the rest of this paper, we start with an overview of how TARGET can be used and how its query-decode-check loop is implemented (§ 2). Next, we formalize a general framework for type-targeted testing (§ 3) and show how it can be instantiated to generating tests for lists (§ 4), and then automatically generalized to other types (§ 4.6). All the benefits of TARGET come at a price; we are limited to properties that can be specified with refinement types. We present an empirical evaluation that shows TAR GET is efficient and expressive enough to capture a variety of sophisticated properties, demonstrating that type-targeted testing is a sweet spot between automatic testing and verification (§ 5). 2 2 Overview We start with a series of examples pertaining to a small grading library called Scores. The examples provide a bird’s eye view of how a user interacts with TARGET, how TARGET is implemented, and the advantages of type-based testing. Refinement Types A refinement type is one where the basic types are decorated with logical predicates drawn from an efficiently decidable theory. For example, type Nat = {v:Int | 0 <= v} type Pos = {v:Int | 0 < v} type Rng N = {v:Int | 0 <= v && v < N} are refinement types describing the set of integers that are non-negative, strictly positive, and in the interval [0, N) respectively. We will also build up function and collection types over base refinement types like the above. In this paper, we will not address the issue of checking refinement type signatures [27]. We assume the code is typechecked, e.g. by GHC, against the standard type signatures obtained by erasing the refinements. Instead, we focus on using the refinements to synthesize tests to execute the function, and to find counterexamples that violate the given specification. 2.1 Testing with Types Base Types Let us write a function rescale that takes a source range [0,r1), a target range [0,r2), and a score n from the source range, and returns the linearly scaled score in the target range. For example, rescale 5 100 2 should return 40. Here is a first attempt at rescale rescale :: r1:Nat -> r2:Nat -> s:Rng r1 -> Rng r2 rescale r1 r2 s = s * (r2 ‘div‘ r1) When we run TARGET, it immediately reports Found counter-example: (1, 0, 0) Indeed, rescale 1 0 0 results in 0 which is not in the target Rng 0, as the latter is empty! We could fix this in various ways, e.g. by requiring the ranges are non-empty: rescale :: r1:Pos -> r2:Pos -> s:Rng r1 -> Rng r2 Now, TARGET accepts the function and reports OK. Passed all tests. Thus, using the refinement type specification for rescale, TARGET systematically tests the implementation by generating all valid inputs (up to a given size bound) that respect the pre-conditions, running the function, and checking that the output satisfies the post-condition. Testing against random, unconstrained inputs would be of limited value as the function is not designed to work on all Int values. While in this case we could filter invalid inputs, we shall show that TARGET can be more effective. Containers Let us suppose we have normalized all scores to be out of 100 type Score = Rng 100 3 Next, let us write a function to compute a weighted average of a list of scores. average average [] average wxs where total n :: [(Int, Score)] -> Score = 0 = total ‘div‘ n = sum [w * x | (w, x) <- wxs ] = sum [w | (w, _) <- wxs ] It can be tricky to verify this function as it requires non-linear reasoning about an unbounded collection. However, we can gain a great degree of confidence by systematically testing it using the type specification; indeed, TARGET responds: Found counter-example: [(0,0)] Clearly, an unfortunate choice of weights can trigger a divide-by-zero; we can fix this by requiring the weights be non-zero: average :: [({v:Int | v /= 0}, Score)] -> Score but now TARGET responds with Found counter-example: [(-3,3),(3,0)] which also triggers the divide-by-zero! We will play it safe and require positive weights, average :: [(Pos, Score)] -> Score at which point TARGET reports that all tests pass. Ordered Containers The very nature of our business requires that at the end of the day, we order students by their scores. We can represent ordered lists by requiring the elements of the tail t to be greater than the head h: data OrdList a = [] | (:) {h :: a, t :: OrdList {v:a | h <= v}} Note that erasing the refinement predicates gives us plain old Haskell lists. We can now write a function to insert a score into an ordered list: insert :: (Ord a) => a -> OrdList a -> OrdList a TARGET automatically generates all ordered lists (up to a given size) and executes insert to check for any errors. Unlike randomized testers, TARGET is not thwarted by the ordering constraint, and does not require a custom generator from the user. Structured Containers Everyone has a few bad days. Let us write a function that takes the best k scores for a particular student. That is, the output must satisfy a structural constraint – that its size equals k. We can encode the size of a list with a logical measure function [27]: measure len :: [a] -> Nat len [] = 0 len (x:xs) = 1 + len xs Now, we can stipulate that the output indeed has k scores: best :: k:Nat -> [Score] -> {v:[Score] | k = len v} best k xs = take k $ reverse $ sort xs 4 Now, TARGET quickly finds a counterexample: Found counter-example: (2,[]) Of course – we need to have at least k scores to start with! best :: k:Nat -> {v:[Score]|k <= len v} -> {v:[Score]|k = len v} and now, TARGET is assuaged and reports no counterexamples. While randomized testing would suffice for best, we will see more sophisticated structural properties such as height balancedness, which stymie random testers, but are easily handled by TARGET. Higher-order Functions Perhaps instead of taking the k best grades, we would like to pad each individual grade, and, furthermore, we want to be able to experiment with different padding functions. Let us rewrite average to take a functional argument, and stipulate that it can only increase a Score. padAverage :: (s:Score -> {v:Score | s <= v}) -> [(Pos, Score)] -> Score padAverage f [] = f 0 padAverage f wxs = total ‘div‘ n where total = sum [w * f x | (w, x) <- wxs ] n = sum [w | (w, _) <- wxs ] TARGET automatically checks that padAverage is a safe generalization of average. Randomized testing tools can also generate functions, but those functions are unlikely to satisfy non-trivial constraints, thereby burdening the user with custom generators. 2.2 Synthesizing Tests Next, let us look under the hood to get an idea of how TARGET synthesizes tests from types. At a high-level, our strategy is to: (1) query an SMT solver for satisfying assigments to a set of logical constraints derived from the refinement type, (2) decode the model into Haskell values that are suitable inputs, (3) execute the function on the decoded values to obtain the output, (4) check that the output satisfies the output type, (5) refute the model to generate a different test, and repeat the above steps until all tests up to a certain size are executed. We focus here on steps 1, 2, and 4 – query, decode, and check – the others are standard and require little explanation. Base Types Recall the initial (buggy) specification rescale :: r1:Nat -> r2:Nat -> s:Rng r1 -> Rng r2 TARGET encodes input requirements for base types directly from their corresponding refinements. The constraints for multiple, related inputs are just the conjunction of the constraints for each input. Hence, the constraint for rescale is: . C0 = 0 ≤ r1 ∧ 0 ≤ r2 ∧ 0 ≤ s < r1 In practice, C0 will also contain conjuncts of the form −N ≤ x ≤ N that restrict Intvalued variables x to be within the size bound N supplied by the user, but we will omit these throughout the paper for clarity. 5 Note how easy it is to capture dependencies between inputs, e.g. that the score s be in the range defined by r1. On querying the SMT solver with the above, we get a model [r1 7→ 1, r2 7→ 1, s 7→ 0]. TARGET decodes this model and executes rescale 1 1 0 to obtain the value v = 0. Then, TARGET validates v against the post-condition by checking the validity of the output type’s constraint: r2 = 1 ∧ v = 0 ∧ 0 ≤ v ∧ v < r2 As the above is valid, TARGET moves on to generate another test by conjoining C0 with a constraint that refutes the previous model: . C1 = C0 ∧ (r1 6= 1 ∨ r2 6= 1 ∨ s 6= 0) This time, the SMT solver returns a model: [r1 7→ 1, r2 7→ 0, s 7→ 0] which, when decoded and executed, yields the result 0 that does not inhabit the output type, and so is reported as a counterexample. When we fix the specification to only allow Pos ranges, each test produces a valid output, so TARGET reports that all tests pass. Containers Next, we use TARGET to test the implementation of average. To do so, TARGET needs to generate Haskell lists with the appropriate constraints. Since each list is recursively either “nil” or “cons”, TARGET generates constraints that symbolically represent all possible lists up to a given depth, using propositional choice variables to symbolically pick between these two alternatives. Every (satisfying) assignment of choices returned by the SMT solver gives TARGET the concrete data and constructors used at each level, allowing it to decode the assignment into a Haskell value. For example, TARGET represents valid [(Pos, Score)] inputs (of depth up to 3), required to test average, as the conjunction of Clist and Cdata : . Clist = (c00 ⇒ xs 0 = []) ∧ (c01 ⇒ xs 0 = x1 : xs 1 ) ∧ (c00 ⊕ c01 ) ∧ (c10 ⇒ xs 1 = []) ∧ (c11 ⇒ xs 1 = x2 : xs 2 ) ∧ (c01 ⇒ c10 ⊕ c11 ) ∧ (c20 ⇒ xs 2 = []) ∧ (c21 ⇒ xs 2 = x3 : xs 3 ) ∧ (c11 ⇒ c20 ⊕ c21 ) ∧ (c30 ⇒ xs 3 = []) ∧ (c21 ⇒ c30 ) . Cdata = (c01 ⇒ x1 = (w1 , s1 ) ∧ 0 < w1 ∧ 0 ≤ s1 < 100) ∧ (c11 ⇒ x2 = (w2 , s2 ) ∧ 0 < w2 ∧ 0 ≤ s2 < 100) ∧ (c21 ⇒ x3 = (w3 , s3 ) ∧ 0 < w3 ∧ 0 ≤ s3 < 100) The first set of constraints Clist describes all lists up to size 3. At each level i, the choice variables ci0 and ci1 determine whether at that level the constructed list xs i is a “nil” or a “cons”. In the constraints [] and ( : ) are uninterpreted functions that represent “nil” and “cons” respectively. These functions only obey the congruence axiom and hence, can be efficiently analyzed by SMT solvers [19]. The data at each level xi is constrained to be a pair of a positive weight wi and a valid score si . The choice variables at each level are used to guard the constraints on the next levels. First, if we are generating a “cons” at a given level, then exactly one of the choice variables for the next level must be selected; e.g. c11 ⇒ c20 ⊕ c21 . Second, the constraints on the data at a given level only hold if we are generating values for that 6 level; e.g. c21 is used to guard the constraints on x3 , w3 and s3 . This is essential to avoid over-constraining the system which would cause TARGET to miss certain tests. To decode a model of the above into a Haskell value of type [(Int, Int)], we traverse constraints and use the valuations of the choice variables to build up the list appropriately. At each level, if ci0 7→ true, then the list at that level is [], otherwise ci1 7→ true and we decode xi+1 and xs i+1 and “cons” the results. We can iteratively generate multiple inputs by adding a constraint that refutes each prior model. As an important optimization, we only refute the relevant parts of the model, i.e. those needed to construct the list (§ 4.5). Ordered Containers Next, let us see how TARGET enables automatic testing with highly constrained inputs, such as the increasingly ordered OrdList values required by insert. From the type definition, it is apparent that ordered lists are the same as the usual lists described by Clist , except that each unfolded tail must only contain values that are greater than the corresponding head. That is, as we unfold x1:x2:xs :: OrdList – At level 0, we have OrdList {v:Score| true} – At level 1, we have OrdList {v:Score| x1 <= v} – At level 2, we have OrdList {v:Score| x2 <= v && x1 <= v} and so on. Thus, we encode OrdList Score (of depth up to 3) by conjoining Clist with Cscore and Cord , which capture the valid score and ordering requirements respectively: . Cord = (c11 ⇒ x1 ≤ x2 ) ∧ (c21 ⇒ x2 ≤ x3 ∧ x1 ≤ x3 ) . Cscore = (c01 ⇒ 0 ≤ x1 < 100) ∧ (c11 ⇒ 0 ≤ x2 < 100) ∧ (c21 ⇒ 0 ≤ x3 < 100) Structured Containers Recall that best k requires inputs whose structure is constrained – the size of the list should be no less than k. We specify size using special measure functions [27], which let us relate the size of a list with that of its unfolding, and hence, let us encode the notion of size inside the constraints: . Csize = (c00 ⇒ len xs 0 = 0) ∧ (c01 ⇒ len xs 0 = 1 + len xs 1 ) ∧ (c10 ⇒ len xs 1 = 0) ∧ (c11 ⇒ len xs 1 = 1 + len xs 2 ) ∧ (c20 ⇒ len xs 2 = 0) ∧ (c21 ⇒ len xs 2 = 1 + len xs 3 ) ∧ (c30 ⇒ len xs 3 = 0) At each unfolding, we instantiate the definition of the measure for each alternative of the datatype. In the constraints, len · is an uninterpreted function derived from the measure definition. All of the relevant properties of the function are spelled out by the unfolded constraints in Csize and hence, we can use SMT to search for models for the above constraint. Hence, TARGET constrains the input type for best as: 0 ≤ k ∧ Clist ∧ Cscore ∧ Csize ∧ k ≤ len xs 0 where the final conjunct comes from the top-level refinement that stipulates the input have at least k scores. Thus, TARGET only generates lists that are large enough. For example, in any model where k = 2, it will not generate the empty or singleton list, as in those cases, len xs 0 would be 0 (resp. 1), violating the final conjunct above. 7 -- Manipulating Refinements refinement :: RefType -> Refinement subst :: RefType -> [(Var, Var)] -> RefType -- Manipulating Types unfold :: Ctor -> RefType -> [(Var, RefType)] binder :: RefType -> Var proxy :: RefType -> Proxy a Fig. 1. Refinement Type API Higher-order Functions Finally, TARGET’s type-directed testing scales up to higherorder functions using the same insight as in QuickCheck [4], namely, to generate a function it suffices to be able to generate the output of the function. When tasked with the generation of a functional argument f, TARGET returns a Haskell function that when executed checks whether its inputs satisfy f’s pre-conditions. If they do, then f uses TARGET to dynamically query the SMT solver for an output that satisfies the constraints imposed by the concrete inputs. Otherwise, f’s specifications are violated and TARGET reports a counterexample. This concludes our high-level tour of the benefits and implementation of TARGET. Notice that the property specification mechanism – refinement types – allowed us to get immediate feedback that helped debug not just the code, but also the specification itself. Additionally, the specifications gave us machine-readable documentation about the behavior of functions, and a large unit test suite with which to automatically validate the implementation. Finally, though we do not focus on it here, the specifications are amenable to formal verification should the programmer so desire. 3 A Framework for Type Targeted Testing Next, we describe a framework for type targeted testing, by formalizing an abstract representation of refinement types (§ 3.1), describing the operations needed to generate tests from types (§ 3.2), and then using the above to implement TARGET via a querydecode-check loop (§ 3.3). Subsequently, we instantiate the framework to obtain tests for refined primitive types, lists, algebraic datatypes and higher-order functions (§ 4). 3.1 Refinement Types A refinement type is a type, where each component is decorated with a predicate from a refinement logic. For clarity, we describe refinement types and refinements abstractly as RefType and Refinement respectively. We write Var as an alias for Refinement that is typically used to represent logical variables appearing within the refinement. Notation In the sequel, we will use double brackets [[]] to represent the various entities in the meta-language used to describe TARGET. For example, [[k]], [[k ≤ len v]], and 8 [[{v : [Score] | k ≤ len v}]] are the Var, Refinement, and RefType representing the corresponding entities written in the brackets. Next, we describe the various operations over them needed to implement TARGET. These operations, summarized in Figure 1, fall into two categories: those which manipulate the refinements and those which manipulate the types. Operating on Refinements To generate constraints and check inhabitation, we use the function refinement which returns the (top-level) refinement that decorates the given refinement type. We will generate fresh Vars to name values of components, and will use subst to replace the free occurrences of variables in a given RefType. Suppose that t is the RefType represented by [[{v : [Score] | k ≤ len v}]]. Then, – refinement t evaluates to [[k ≤ len v]] and – subst t [([[k]], [[x0 ]])] evaluates to [[{v : [Score] | x0 ≤ len v}]]. Operating on Types To build up compound values (e.g. lists) from components (e.g. an integer and a list), unfold breaks a RefType (e.g. a list of integers) into its constituents (e.g. an integer and a list of integers) at a given constructor (e.g. “cons”). binder simply extracts the Var representing the value being refined from the RefType. To write generic functions over RefTypes and use Haskell’s type class machinery to query and decode components of types, we associate with each refinement type a proxy representing the corresponding Haskell type (in practice this must be passed around as a separate argument). For example, if t is [[{v : [Score] | k ≤ len v}]], – unfold [[:]] t evaluates to [([[x]], [[Score]]), ([[xs]], [[[Score]]])], – binder t evaluates to [[v]], and – proxy t evaluates to a value of type Proxy [Int]. 3.2 The Targetable Type Class Following QuickCheck, we encapsulate the key operations needed for type-targeted testing in a type class Targetable (Figure 2). This class characterizes the set of types class Targetable a where query :: Proxy a -> Int -> RefType -> SMT Var decode :: Var -> SMT a check :: a -> RefType -> SMT (Bool, Var) toReft :: a -> Refinement Fig. 2. The class of types that can be tested by TARGET which can be tested by TARGET. All of the operations can interact with an external SMT solver, and so return values in an SMT monad. – query takes a proxy for the Haskell type for which we are generating values, an integer depth bound, and a refinement type describing the desired constraints, and generates a set of logical constraints and a Var that represents the constrained value. 9 – decode takes a Var, generated via a previous query and queries the model returned by the SMT solver to construct a Haskell value of type a. – check takes a value of type a, translates it back into logical form, and verifies that it inhabits the output type t. – toReft takes a value of type a and translates it back into logical form (a specialization of check). 3.3 The Query-Decode-Check Loop Figure 3 summarizes the overall implementation of TARGET, which takes as input a function f and its refinement type specification t and proceeds to test the function against the specification via a query-decode-check loop: (1) First, we translate the refined inputTypes into a logical query. (2) Next, we decode the model (i.e. satisfying assignment) for the query returned by the SMT solver to obtain concrete inputs. (3) Finally, we execute the function f on the inputs to get the corresponding output, which we check belongs to the specified outputType. If the check fails, we return the inputs as a counterexample. After each test, TARGET, refutes the given test to force the SMT solver to return a different set of inputs, and this process is repeated until a user specified number of iterations. The checkSMT call may fail to find a model meaning that we have exhaustively tested all inputs upto a given testDepth bound. If all iterations succeed, i.e. no counterexamples are found, then TARGET returns Ok, indicating that f satisfies t up to the given depth bound. target f t = do let txs = inputTypes t vars <- forM txs $ \tx -> query (proxy tx) testDepth tx -- Query forM [1 .. testNum] $ \_ -> do hasModel <- checkSMT when hasModel $ do inputs <- forM vars decode -- Decode output <- execute f inputs let su = zip (map binder txs) (map toReft inputs) let to = outputType t ‘subst‘ su (ok,_) <- check output to -- Check if ok then refuteSMT else throw (CounterExample inputs) return Ok Fig. 3. Implementing TARGET via a query-decode-check loop 10 4 Instantiating the TARGET Framework Next, we describe a concrete instantiation of TARGET for lists. We start with a constraint generation API (§ 4.1). Then we use the API to implement the key operations query (§ 4.2), decode (§ 4.3), check (§ 4.4), and refuteSMT (§ 4.5), thereby enabling TARGET to automatically test functions over lists. We omit the definition of toReft as it follows directly from the definition of check. Finally, we show how the list instance can be generalized to algebraic datatypes and higher-order functions (§ 4.6). 4.1 SMT Solver Interface Figure 4 describes the interface to the SMT solvers that TARGET uses for constraint generation and model decoding. The interface has functions to (a) generate logical variables of type Var, (b) constrain their values using Refinement predicates, and (c) determine the values assigned to the variables in satisfying models. fresh :: SMT Var guard :: Var -> SMT a -> SMT a constrain :: Var -> Refinement -> SMT () apply unapply :: Ctor -> [Var] -> SMT Var :: Var -> SMT (Ctor, [Var]) oneOf whichOf :: Var -> [(Var, Var)] -> SMT () :: Var -> SMT Var eval :: Refinement -> SMT Bool Fig. 4. SMT Solver API – fresh allocates a new logical variable. – guard b act ensures that all the constraints generated by act are guarded by the choice variable b. That is, if act generates the constraint p then guard b act generates the (implication) constraint b ⇒ p. – constrain x r generates a constraint that x satisfies the refinement predicate r. – apply c xs generates a new Var for the folded up value obtained by applying the constructor c to the fields xs, while also generating constraints from the measures. For example, apply [[:]] [[[x1 ]], [[xs1 ]]] returns [[x1 : xs 1 ]] and generates the constraint len (x1 : xs 1 ) = 1 + len xs 1 . – unapply x returns the Ctor and Vars from which the input x was constructed. – oneOf x cxs generates a constraint that x equals exactly one of the elements of cxs. For example, oneOf [[xs0 ]] [([[c00 ]],[[[]]]),([[c01 ]],[[x1 : xs1 ]])] yields: (c00 ⇒ xs 0 = []) ∧ (c01 ⇒ xs 0 = x1 : xs 1 ) ∧ (c00 ⊕ c01 ) 11 query p d t = do let cs = ctors d bs <- forM cs (\_ -> fresh) xs <- zipWithM (queryCtor (d-1) t) bs cs x <- fresh oneOf x (zip bs xs) constrain x (refinement t) return x queryCtor d let fts = fs’ <x <return x) t b c = guard b (do unfold c t scanM (queryField d) [] fts apply c fs’ queryField d su (f, t) = do f’ <- query (proxy t) d (t ‘subst‘ su) return ((f, f’) : su, f’) ctors d | d > 0 = [ [[:]], [[[]]] ] | otherwise = [ [[[]]] ] Fig. 5. Generating a Query – whichOf x returns the particular alternative that was assigned to x in the current model returned by the SMT solver. Continuing the previous example, if the model sets [[c00 ]] (resp. [[c01 ]]) to true, whichOf [[xs0 ]] returns [[[]]] (resp [[x1 : xs1 ]]). – eval r checks the validity of a refinement with no free variables. For example, eval [[len (1 : []) > 0]] would return True. 4.2 Query Figure 5 shows the procedure for constructing a query from a refined list type, e.g. the one required as an input to the best or insert functions from § 2. Lists query returns a Var that represent all lists up to depth d that satisfy the logical constraints associated with the refined list type t. To this end, it invokes ctors to obtain all of the suitable constructors for depth d. For lists, when the depth is 0 we should only use the [[[]]] constructor, otherwise we can use either [[:]] or [[[]]] . This ensures that query terminates after encoding all possible lists up to a given depth d. Next, it uses fresh to generate a distinct choice variable for each constructor, and calls queryCtor to generate constraints and a corresponding symbolic Var for each constructor. The choice variable for each constructor is supplied to queryCtor to ensure that the constraints are guarded, i.e. only required to hold if the corresponding choice variable is selected in the model and not otherwise. Finally, a fresh x represents the value at depth d and is constrained to be oneOf the alternatives represented by the constructors, and to satisfy the top-level refinement of t. 12 decode x = do x’ <- whichOf x (c,fs’) <- unapply x’ decodeCtor c fs’ decodeCtor [[[]]] [] = return [] decodeCtor [[:]] [x,xs] = do v <- decode x vs <- decode xs return (v:vs) Fig. 6. Decoding Models into Haskell Values Constructors queryCtor takes as input the refined list type t, a depth d, a particular constructor c for the list type, and generates a query describing the unfolding of t at the constructor c, guarded by the choice variable b that determines whether this alternative is indeed part of the value. These constraints are the conjunction of those describing the values of the individual fields which can be combined via c to obtain a t value. To do so, queryCtor first unfolds the type t at c, obtaining a list of constituent fields and their respective refinement types fts. Next, it uses scanM :: Monad m => (a -> b -> m (a, c)) -> a -> [b] -> m [c] to traverse the fields from left to right, building up representations of values for the fields from their unfolded refinement types. Finally, we invoke apply on c and the fields fs’ to return a symbolic representation of the constructed value that is constrained to satisfy the measure properties of c. Fields queryField generates the actual constraints for a single field f with refinement type t, by invoking query on t. The proxy enables us to resolve the appropriate typeclass instance for generating the query for the field’s value. Each field is described by a new symbolic name f’ which is substituted for the formal name of the field f in the refinements of subsequent fields, thereby tracking dependencies between the fields. For example, these substitutions ensure the values in the tail are greater than the head as needed by OrdList from § 2. 4.3 Decode Once we have generated the constraints we query the SMT solver for a model, and if one is found we must decode it into a concrete Haskell value with which to test the given function. Figure 6 shows how to decode an SMT model for lists. Lists decode takes as input the top-level symbolic representation x and queries the model to determine which alternative was assigned by the solver to x, i.e. a nil or a cons. Once the alternative is determined, we use unapply to destruct it into its constructor c and fields fs’, which are recursively decoded by decodeCtor. Constructors decodeCtor takes the constructor c and a list of symbolic representations for fields, and decodes each field into a value and applies the constructor to obtain the Haskell value. For example, in the case of the [[[]]] constructor, there are no fields, so we return the empty list. In the case of the [[:]] constructor, we decode the head and the tail, and cons them to return the decoded value. decodeCtor has the type Targetable a => Ctor -> [Var] -> SMT [a] 13 check v t = do let (c,vs) = splitCtor v let fts = unfold c t (bs, vs’) <- fmap unzip (scanM checkField [] (zip vs fts)) v’ <- apply c vs’ let t’ = t ‘subst‘ [(binder t, v’)] b’ <- eval (refinement t’) return (and (b:bs), v’) checkField su (v, (f, t)) = do (b, v’) <- check v (t ‘subst‘ su) return ((f, v’) : su, (b, v’)) splitCtor [] = ([[[]]], []) splitCtor (x:xs) = ([[:]], [x,xs]) Fig. 7. Checking Outputs i.e. if a is a decodable type, then decodeCtor suffices to decode lists of a. Primitives like integers that are directly encoded in the refinement logic are the base case – i.e. the value in the model is directly translated into the corresponding Haskell value. 4.4 Check The third step of the query-decode-check loop is to verify that the output produced by the function under test indeed satisfies the output refinement type of the function. We accomplish this by encoding the output value as a logical expression, and evaluating the output refinement applied to the logical representation of the output value. check, shown in Figure 7, takes a Haskell (output) value v and the (output) refinement type t, and recursively verifies each component of the output type. It converts each component into a logical representation, substitutes the logical expression for the symbolic value, and evaluates the resulting Refinement. 4.5 Refuting Models Finally, TARGET invokes refuteSMT to refute a given model in order to force the SMT solver to produce a different model that will yield a different test input. A naı̈ve implementation of refutation is as follows. Let X be the set of all variables appearing in the constraints. Suppose that in the current model, each variable x is assigned the value σ(x). Then, to refute the model, we add a refutation constraint ∨x∈X x 6= σ(x). That is, we stipulate that some variable be assigned a different value. The naı̈ve implementation is extremely inefficient. The SMT solver is free to pick a different value for some irrelevant variable which was not even used for decoding. As a result, the next model can, after decoding, yield the same Haskell value, thereby blowing up the number of iterations needed to generate all tests of a given size. 14 TARGET solves this problem by forcing the SMT solver to return models that yield different decoded tests in each iteration. To this end TARGET restricts the refutation constraint to the set of variables that were actually used to decode the Haskell value. We track this set by instrumenting the SMT monad to log the set of variables and choicevariables that are transitively queried via the recursive calls to decode. That is, each call to decode logs its argument, and each call to whichOf logs the choice variable corresponding to the alternative that was returned. Let R be the resulting set of decoderelevant variables. TARGET refutes the model by using a relevant refutation constraint ∨x∈R x 6= σ(x) which ensures that the next model decodes to a different value. 4.6 Generalizing TARGET To Other Types The implementation in § 4 is for List types, but ctors, decodeCtor, and splitCtor are the only functions that are List-specific. Thus, we can easily generalize the implementation to: – primitive datatypes, e.g. integers, by returning an empty list of constructors, – algebraic datatypes, by implementing ctors, decodeCtor, and splitCtor for that type. – higher-order functions, by lifting instances of a to functions returning a. Algebraic Datatypes Our List implementation has three pieces of type-specific logic: – ctors, which returns a list of constructors to unfold; – decodeCtor, which decodes a specific Ctor; and – splitCtor, which splits a Haskell value into a pair of its Ctor and fields. Thus, to instantiate TARGET on a new data type, all we need is to implement these three operations for the type. This implementation essentially follows the concrete template for Lists. In fact, we observe that the recipe is entirely mechanical boilerplate, and can be fully automated for all algebraic data types by using a generics library. Any algebraic datatype (ADT) can be represented as a sum-of-products of component types. A generics library, such as GHC.Generics [15], provides a univeral sum-ofproducts type and functions to automatically convert any ADT to and from the universal representation. Thus, to obtain Targetable instances for any ADT it suffices to define a Targetable instance for the universal type. Once the universal type is Targetable we can automatically get an instance for any new user-defined ADT (that is an instance of Generic) as follows: (1) to generate a query we simply create a query for GHC.Generics’ universal representation of the refined type, (2) to decode the results from the SMT solver, we decode them into the universal representation and then use GHC.Generics to map them back into the userdefined type, (3) to check that a given value inhabits a user-defined refinement type, we check that the universal representation of the value inhabits the type’s universal counterpart. The Targetable instance for the universal representation is a generalized version of the List instance from § 4, that relies on various technical details of GHC.Generics. 15 Higher Order Functions Our type-directed approach to specification makes it easy to extend TARGET to higher-order functions. Concretely, it suffices to implement a typeclass instance: instance (Targetable input, Targetable output) => Targetable (input -> output) In essence, this instance uses the Targetable instances for input and output to create an instance for functions from input -> output, after which Haskell’s type class machinery suffices to generate concrete function values. To create such instances, we use the insight from QuickCheck, that to generate (constrained) functions, we need only to generate output values for the function. Following this route, we generate functions by creating new lambdas that take in the inputs from the calling context, and use their values to create queries for the output, after which we can call the SMT solver and decode the results to get concrete outputs that are returned by the lambda, completing the function definition. Note that we require input to also be Targetable so that we can encode the Haskell value in the refinement logic, in order to constrain the output values suitably. We additionally memoize the generated function to preserve the illusion of purity. It is also possible to, in the future, extend our implementation to refute functions by asserting that the output value for a given input be distinct from any previous outputs for that input. 5 Evaluation We have built a prototype implementation of TARGET1 and next, describe an evaluation on a series of benchmarks ranging from textbook examples of algorithms and data structures to widely used Haskell libraries like CONTAINERS and XMONAD. Our goal in this evaluation is two-fold. First, we describe micro-benchmarks (i.e. functions) that quantitatively compare TARGET with the existing state-of-the-art, property-based testing tools for Haskell – namely SmallCheck and QuickCheck – to determine whether TARGET is indeed able to generate highly constrained inputs more effectively. Second, we describe macro-benchmarks (i.e. modules) that evaluate the amount of code coverage that we get from type-targeted testing. 5.1 Comparison with QuickCheck and SmallCheck We compare TARGET with QuickCheck and SmallCheck by using a set of benchmarks with highly constrained inputs. For each benchmark we compared TARGET with SmallCheck and QuickCheck, with the latter two using the generate-and-filter approach, wherein a value is generated and subsequently discarded if it does not meet the desired constraint. While one could possibly write custom “operational” generators for each property, the point of this evaluation is compare the different approaches ability to enable “declarative” specification driven testing. Next, we describe the benchmarks and then summarize the results of the comparison (Figure 8). 1 http://hackage.haskell.org/package/target-0.1.1.0 16 L IST. INSERT RBT REE . ADD XM ONAD . FOCUS LEFT Time (sec) 104 100 10−4 5 10 15 20 5 10 2 4 6 8 Depth M AP. DELETE M AP. DIFFERENCE 4 Time (sec) 10 100 10−4 TARGET 2 4 SmallCheck 6 8 10 2 Depth 4 Lazy SmallCheck 6 8 Lazy SmallCheck (slow) Fig. 8. Results of comparing TARGET with QuickCheck, SmallCheck, and Lazy SmallCheck on a series of functions. TARGET , SmallCheck, and Lazy SmallCheck were both configured to check the first 1000 inputs that satisfied the precondition at increasing depth parameters, with a 60 minute timeout per depth; QuickCheck was run with the default settings, i.e. it had to produce 100 test cases. TARGET , SmallCheck, and Lazy SmallCheck were configured to use the same notion of depth, in order to ensure they would generate the same number of valid inputs at each depth level. QuickCheck was unable to successfully complete any run due to the low probability of generating valid inputs at random. Inserting into a sorted List Our first benchmark is the insert function from the homonymous sorting routine. We use the specification that given an element and a sorted list, insert x xs should evaluate to a sorted list. We express this with the type type Sorted a = List <{\hd v -> hd < v}> a insert :: a -> Sorted a -> Sorted a where the ordering constraint is captured by an abstract refinement [25] which states that each list head hd is less than every element v in its tail. Inserting into a Red-Black Tree Next, we consider insertion into a Red-Black tree. data RBT a = Leaf | Node Col a (RBT a) (RBT a) data Col = Black | Red Red-black trees must satisfy three invariants: (1) red nodes always have black children, (2) the black height of all paths from the root to a leaf is the same, and (3) the elements 17 in the tree should be ordered. We capture (1) via a measure that recursively checks each Red node has Black children. measure isRB :: RBT a -> Prop isRB Leaf = true isRB (Node c x l r) = isRB l && isRB r && (c == Red => isBlack l && isBlack r) We specify (2) by defining the Black height as: measure bh :: RBT a -> Int bh Leaf = 0 bh (Node c x l r) = bh l + (if c == Red then 0 else 1) and then checking that the Black height of both subtrees is the same: measure isBH :: RBT a -> Prop isBH Leaf = true isBH (Node c x l r) = isBH l && isBH r && bh l == bh r Finally, we specify the (3), the ordering invariant as: type OrdRBT a = RBT <{\r v -> v < r}, {\r v -> r < v}> a i.e. with two abstract refinements for the left and right subtrees respectively, which state that the root r is greater than (resp. less than) each element v in the subtrees. Finally, a valid Red-Black tree is: type OkRBT a = {v:OrdRBT a | isRB v && isBH v} Note that while the specification for the internal invariants for Red-Black trees is tricky, the specification for the public API – e.g. the add function – is straightforward: add :: a -> OkRBT a -> OkRBT a Deleting from a Data.Map Our third benchmark is the delete function from the Data.Map module in the Haskell standard libraries. The Map structure is a balanced binary search tree that implements purely functional key-value dictionaries: data Map k a = Tip | Bin Int k a (Map k a) (Map k a) A valid Data.Map must satisfy two properties: (1) the size of the left and right subtrees must be within a factor of three of each other, and (2) the keys must obey a binary search ordering. We specify the balancedness invariant (1) with a measure measure isBal :: Map k a -> Prop isBal (Tip) = true isBal (Bin s k v l r) = isBal l && isBal r && (sz l + sz r <= 1 || sz l <= 3 * sz r <= 3 * sz l) and combine it with an ordering invariant (like OrdRBT) to specify valid trees. type OkMap k a = {v : OrdMap k a | isBal v} 18 We can check that delete preserves the invariants by checking that its output is an OkMap k a. However, we can also go one step further and check the functional correctness property that delete removes the given key, with a type: delete :: Ord k => k:k -> m:OkMap k a -> {v:OkMap k a | MinusKey v m k} where the predicate MinusKey is defined as: predicate MinusKey M1 M2 K = keys M1 = difference (keys M2) (singleton K) using the measure keys describing the contents of the Map: measure keys :: Map k a -> Set k keys (Tip) = empty () keys (Bin s k v l r) = union (singleton k) (union (keys l) (keys r)) Refocusing XMonad StackSets Our last benchmark comes from the tiling window manager XMonad. The key invariant of XMonad’s internal StackSet data structure is that the elements (windows) must all be unique, i.e. contain no duplicates. XMonad comes with a test-suite of over 100 QuickCheck properties; we select one which states that moving the focus between windows in a StackSet should not affect the order of the windows. prop_focus_left_master n s = index (foldr (const focusUp) s [1..n]) == index s With QuickCheck, the user writes a custom generator for valid StackSets and then runs the above function on test inputs created by the generator, to check if in each case, the result of the above is True. With TARGET, it is possible to test such properties without requiring custom generators. Instead the user writes a declarative specification: type OkStackSet = {v:StackSet | NoDuplicates v} (We refer the reader to [26] for a full discussion of how to specify NoDuplicates). Next, we define a refinement type: type TTrue = {v:Bool | Prop v} that is only inhabited by True, and use it to type the QuickCheck property as: prop_focus_left_master :: Nat -> OkStackSet -> TTrue This property is particularly difficult to verify; however, TARGET is able to automatically generate valid inputs to test that prop_focus_left_master always returns True. Results Figure 8 summarizes the results of the comparison. QuickCheck was unable to successfully complete any benchmark to the low probability of generating properly constrained values at random. List Insert TARGET is able to test insert all the way to depth 20, whereas Lazy SmallCheck times out at depth 19. 19 Red-Black Tree Insert TARGET is able to test add up to depth 12, while Lazy SmallCheck times out at depth 6. Map Delete TARGET is able to check delete up to depth 10, whereas Lazy SmallCheck times out at depth 7 if it checks ordering first, or depth 6 if it checks balancedness first. StackSet Refocus TARGET and is able to check this property up to depth 8, while Lazy SmallCheck times out at depth 7. TARGET sees a performance hit with properties that require reasoning with the theory of Sets e.g. the no-duplicates invariant of StackSet. While Lazy SmallCheck times out at a higher depths, when it completes e.g. at depth 6, it does so in 0.7s versus TAR GET ’s 9 minutes. We suspect this is because the theory of sets are a relatively recent addition to SMT solvers [18], and with further improvements in SMT technology, these numbers will get significantly better. Overall, we found that for small inputs Lazy SmallCheck is substantially faster as exhaustive enumeration is tractable, and does not incur the overhead of communicating with an external general-purpose solver. Additionally, Lazy SmallCheck benefits from pruning predicates that exploit laziness and only force a small portion of the structure (e.g. ordering). However, we found that constraints that force the entire structure (e.g. balancedness), or composing predicates in the wrong order, can force Lazy SmallCheck to enumerate the entire exponentially growing search space. TARGET, on the other hand, scales nicely to larger input sizes, allowing systematic and exhaustive testing of larger, more complex inputs. This is because TARGET eschews explicit enumeration-and-filtering (which results in searching for fewer needles in larger haystacks as the sizes increas), in favor of symbolically searching for valid models via SMT, making TARGET robust to the strictness or ordering of constraints. 5.2 Measuring Code Coverage The second question we seek to answer is whether TARGET is suitable for testing entire libraries, i.e. how much of the program can be automatically exercised using our system? Keeping in mind the well-known issues with treating code coverage as an indication of test-suite quality [16], we consider this experiment a negative filter. To this end, we ran TARGET against the entire user-facing API of Data.Map, our RBTree library, and XMonad.StackSet – using the constrained refined types (e.g. OkMap, OkRBT, OkStackSet) as the specification for the exposed types – and measured the expression and branch coverage, as reported by hpc [11]. We used an increasing timeout ranging from one to thirty minutes per exported function. Results The results of our experiments are shown in Figure 9. Across all three libraries, TARGET achieved at least 70% expression and 64% alternative coverage at the shortest timeout of one minute per function. Interestingly, the coverage metrics for RBTree and Data.Map remain relatively constant as we increase the timeouts, with a small jump in expression coverage between 10 and 20 minutes. XMonad on the other hand, jumps from 70% expression and 64% alternative coverage with a one minute timeout, to 96% expression and 94% alternative with a ten minute timeout. 20 DATA .M AP XM ONAD .S TACK S ET RBT REE % Coverage 1 0.8 0.6 0.4 0.2 0 0 10 20 30 expressions always-false 0 10 20 30 Timeout (min) booleans alternatives 0 10 20 30 always-true local-functions Fig. 9. Coverage-testing of Data.Map.Base, RBTree, and XMonad.StackSet using TAR GET . Each exported function was tested with increasing depth limits until a single run hit a timeout ranging from one to thirty minutes. Lower is better for “always-true” and “always-false”, higher is better for everything else. There are three things to consider when examining these results. First is that some expressions are not evaluated due to Haskell’s laziness (e.g. the values contained in a Map). Second is that some expressions should not be evaluated and some branches should not be taken, as these only happen when an unexpected error condition is triggered (i.e. these expressions should be dead code). TARGET considers any inputs that trigger an uncaught exception a valid counterexample; the pre-conditions should rule out these inputs, and so we expect not to cover those expressions with TARGET. The last remark is not intrinsically related to TARGET, but rather our means of collecting the coverage data. hpc includes otherwise guards in the “always-true” category, even though they cannot evaluate to anything else. Data.Map contained 56 guards, of which 24 were marked “always-true”. We manually counted 21 otherwise guards, the remaining 3 “always-true” guards compared the size of subtrees when rebalancing to determine whether a single or double rotation was needed; we were unable to trigger the double rotation in these cases. XMonad contained 9 guards, of which 4 were “always-true”. 3 of these were otherwise guards; the remaining “always-true” guard dynamically checked a function’s pre-condition. If the pre-condition check had failed an error would have been thrown by the next case, we consider it a success of TARGET that the error branch was not triggered. 5.3 Discussion To sum up, our experiments demonstrate that TARGET generates valid inputs: (1) where QuickCheck fails outright, due to the low probability of generating random values satisfying a property; (2) more efficiently than Lazy SmallCheck, which relies on lazy pruning predicates; and (3) providing high code coverage for real-world libraries with no hand-written test cases. Of course our approach is not without drawbacks; we highlight five classes of pitfalls the user may encounter. 21 Laziness in the function or in the output refinement can cause exceptions to go unthrown if the output value is not fully demanded. For example, TARGET would decide that the result [1, undefined] inhabits [Int] but not [Score], as the latter would have to evaluate 0 <= undefined < 100. This limitation is not specific to our system, rather it is fundamental to any tool that exercises lazy programs. Furthermore, TARGET only generates inductively-defined values, it cannot generate infinite or cyclic structures, nor will the generated values ever contain ⊥. Polymorphism Like any other tool that actually runs the function under scrutiny, TAR GET can only test monomorphic instantiations of polymorphic functions. For example, when testing XMonad we instantiated the “window” parameter to Char and all other type parameters to (), as the properties we were testing only examined the window. This helped drastically reduce the search space, both for TARGET and SmallCheck. Advanced type-system features such as GADTs and Existential types may prevent GHC from deriving a Generic instance, which would force the programmer to write her own Targetable instance. Though tedious, the single hand-written instance allows TARGET to automatically generate values satisfying disparate constraints, which is still an improvement over the generate-and-filter approach. Refinement types are less expressive than properties written in the host language. If the pre-conditions are not expressible in TARGET’s logic, the user will have to use the generate-and-filter approach, losing the benefits of symbolic enumeration. Input explosion TARGET excels when the space of valid inputs is a sparse subset of the space of all inputs. If the input space is not sufficiently constrained, TARGET may spend lose its competitive advantage over other tools due to the overhead of using a general-purpose solver. 6 Related Work TARGET is closely related to a number of lines of work on connecting formal specifications, execution, and automated constraint-based testing. Next, we describe the closest lines of work on test-generation and situate them with respect to our approach. 6.1 Model-based Testing Model-based testing encompasses a broad range of black-box testing tools that facilitate generating concrete test-cases from an abstract model of the system under test. These systems generally (though not necessarily) model the system at a holistic level using state machines to describe the desired behavior [6], and may or may not provide fully automatic test-case generation. In addition to generating test-cases, many model-based testing tools, e.g. Spec Explorer [28] will produce extra artifacts like visualizations to help the programmer understand the model. One could view property-based testing, including our system, as a subset of model-based testing focusing on lower-level properties of individual functions (unit-testing), while using the type-structure of the functions under scrutiny to provide fully automatic generation of test-cases. 22 6.2 Property-based Testing Many property-based testing tools have been developed to automatically generate testsuites. QuickCheck [4] randomly generates inputs based on the property under scrutiny, but requires custom generators to consistently generate constrained inputs. [3] extends QuickCheck to randomly generate constrained values from a uniform distribution. In contrast SmallCheck [21] enumerates all possible inputs up to some depth, which allows it to check existential properties in addition to universal properties; however, it too has difficulty generating inputs to properties with complex pre-conditions. Lazy SmallCheck [21] addresses the issue of generating constrained inputs by taking advantage of the inherent laziness of the property, generating partially-defined values (i.e. values containing ⊥) and only filling in the holes if and when they are demanded. Korat [2] instruments a programmer-supplied repOk method, which checks class invariants and method pre-conditions, to monitor which object fields are accessed. The authors observe that unaccessed fields cannot have had an effect on the return value of repOk and are thereby able to exclude from the search space any objects that differ only in the values of the unaccessed fields. While Lazy SmallCheck and Korat’s reliance on functions in the source language for specifying properties is convenient for the programmer (specification and implementation in the same language), it makes the method less amenable to formal verification, the properties would need to be re-specified in another language that is restricted enough to facilitate verification. 6.3 Symbolic Execution and Model-checking Another popular technique for automatically generating test-cases is to analyze the source code and attempt to construct inputs that will trigger different paths through the program. DART [12], CUTE [22], and Pex [24] all use a combination of symbolic and dynamic execution to explore different paths through a program. While executing the program they collect path predicates, conditions that characterize a path through a program, and at the end of a run they negate the path predicates and query a constraint solver for another assignment of values to program variables. This enables such tools to efficiently explore many different paths through a program, but the technique relies on the path predicates being expressible symbolically. When the predicates are not expressible in the logic of the constraint solver, they fall back to the values produced by the concrete execution, at a severe loss of precision. Instead of trying to trigger all paths through a program, one might simply try to trigger erroneous behavior. Check ’n’ Crash [5] uses the ESC/Java analyzer [10] to discover potential bugs and constructs concrete test-cases designed to trigger the bugs, if they exist. Similarly, [1] uses the BLAST model-checker to construct test-cases that bring the program to a state satisfying some user-provided predicate. In contrast to these approaches, TARGET (and more generally, property-based testing) treats the program as a black-box and only requires that the pre- and post-conditions be expressible in the solver’s logic. Of course, by expressing specifications in the source language, e.g. as contracts, as in PEX [24], one can use symbolic execution to generate tests directly from specifications. One concrete advantage of our approach over the symbolic execution based method of PEX is that the latter generates tests by explicitly 23 enumerating paths through the contract code, which suffers from a similar combinatorial problem as SmallCheck and QuickCheck. In contrast, TARGET performs the same search symbolically within the SMT engine, which performs better for larger input sizes. 6.4 Integrating Constraint-solving and Execution TARGET is one of many tools that makes specifications executable via constraint solving. An early example of this approach is TestEra [17] that uses specifications written in the Alloy modeling language [13] to generate all non-isomorphic Java objects that satisfy method pre-conditions and class invariants. As the specifications are written in Alloy, one can use Alloy’s SAT-solver based model finding to symbolically enumerate candidate inputs. Check ’n’ Crash uses a similar idea, and SMT solvers to generate inputs that satisfy a given JML specification [5]. Recent systems such as SBV [8] and Kaplan [14] offer a monadic API for writing SMT constraints within the program, and use them to synthesize program values at run-time. SBV provides a thin DSL over the logics understood by SMT solvers, whereas Kaplan integrates deeply with Scala, allowing the use of user-defined recursive types and functions. Test generation can be viewed as a special case of value-synthesis, and indeed Kaplan has been used to generate testsuites from preconditions in a similar manner to TARGET. However, in all of the above (and also symbolic execution based methods like PEX or JCrasher), the specifications are assertions in the Floyd-Hoare sense. Consequently, the techniques are limited to testing first-order functions over monomorphic data types. In contrast, TARGET shows how to view types as executable specifications, which yields several advantages. First, we can use types to compositionally lift specifications about flat values (e.g. Score) over collections (e.g. [Score]), without requiring special recursive predicates to describe such collection invariants. Second, the compositional nature of types yields a compositional method for generating tests, allowing us to use type-class machinery to generate tests for richer structures from tests for sub-structures. Third, (refinement) types have proven to be effective for verifying correctness properties in modern modern languages that make ubiquitous use of parametric polymorphism and higher order functions [29,7,20,23,26] and thus, we believe TARGET’s approach of making refinement types executable is a crucial step towards our goal of enabling gradual verification for modern languages. Acknowledgements This work was supported by NSF grants CCF-1422471, CNS-0964702, CNS-1223850, CCF-1218344, CCF-1018672, and a generous gift from Microsoft Research. We thank Lee Pike and the reviewers for their excellent feedback on a draft of this paper. References 1. Beyer, D., Chlipala, A.J., Henzinger, T.A., Jhala, R., Majumdar, R.: Generating tests from counterexamples. In: ICSE 04: Software Engineering. pp. 326–335 (2004) 2. Boyapati, C., Khurshid, S., Marinov, D.: Korat: Automated testing based on Java predicates. In: ISSTA 02: Software Testing and Analysis. pp. 123–133. ACM (2002) 24 3. Claessen, K., Duregård, J., Palka, M.H.: Generating constrained random data with uniform distribution. pp. 18–34. FLOPS ’14 (2014) 4. Claessen, K., Hughes, J.: QuickCheck: a lightweight tool for random testing of haskell programs. In: ICFP. ACM (2000) 5. Csallner, C., Smaragdakis, Y.: Check ’n’ crash: combining static checking and testing. In: ICSE. pp. 422–431 (2005) 6. Dias Neto, A.C., Subramanyan, R., Vieira, M., Travassos, G.H.: A survey on model-based testing approaches: A systematic review. In: WEASELTech ’07. ACM (2007) 7. Dunfield, J.: Refined typechecking with Stardust. In: PLPV (2007) 8. Erkök, L.: SBV: SMT based verification in haskell, http://leventerkok.github.io/sbv/ 9. Findler, R.B., Felleisen, M.: Contract soundness for object-oriented languages. In: OOPSLA. pp. 1–15 (2001) 10. Flanagan, C., Leino, K., Lillibridge, M., Nelson, G., Saxe, J.B., Stata, R.: Extended static checking for Java. In: PLDI (2002) 11. Gill, A., Runciman, C.: Haskell program coverage. pp. 1–12. Haskell ’07, ACM (2007) 12. Godefroid, P., Klarlund, N., Sen, K.: Dart: directed automated random testing. In: PLDI. pp. 213–223 (2005) 13. Jackson, D.: Alloy: a lightweight object modelling notation. ACM Transactions on Software Engineering and Methodology (TOSEM) 11(2), 256–290 (2002) 14. Köksal, A.S., Kuncak, V., Suter, P.: Constraints as control. pp. 151–164. POPL ’12, ACM, New York, NY, USA (2012) 15. Magalhães, J.P., Dijkstra, A., Jeuring, J., Löh, A.: A generic deriving mechanism for haskell. In: Haskell Symposium. ACM (2010) 16. Marick, B.: How to misuse code coverage. In: Proceedings of the 16th Interational Conference on Testing Computer Software. pp. 16–18 (1999) 17. Marinov, D., Khurshid, S.: Testera: A novel framework for automated testing of java programs. ASE ’01, IEEE Computer Society, Washington, DC, USA (2001) 18. de Moura, L., Bjørner, N.: Generalized, efficient array decision procedures. In: FMCAD (2009) 19. Nelson, G.: Techniques for program verification. Tech. Rep. CSL81-10, Xerox Palo Alto Research Center (1981) 20. Nystrom, N., Saraswat, V.A., Palsberg, J., Grothoff, C.: Constrained types for object-oriented languages. In: OOPSLA. pp. 457–474 (2008) 21. Runciman, C., Naylor, M., Lindblad, F.: Smallcheck and lazy smallcheck: Automatic exhaustive testing for small values. In: Haskell Symposium. ACM (2008) 22. Sen, K., Marinov, D., Agha, G.: Cute: A concolic unit testing engine for c. In: ESEC/FSE. ACM (2005) 23. Swamy, N., Chen, J., Fournet, C., Strub, P.Y., Bhargavan, K., Yang, J.: Secure distributed programming with value-dependent types. In: ICFP (2011) 24. Tillmann, N., Halleux, J.d.: Pex–White box test generation for .NET. In: Tests and Proofs, pp. 134–153 (2008) 25. Vazou, N., Rondon, P., Jhala, R.: Abstract refinement types. In: ESOP (2013) 26. Vazou, N., Seidel, E.L., Jhala, R.: Liquidhaskell: Experience with refinement types in the real world. In: Haskell Symposium (2014) 27. Vazou, N., Seidel, E.L., Jhala, R., Vytiniotis, D., Peyton-Jones, S.: Refinement types for haskell. In: ICFP (2014) 28. Veanes, M., Campbell, C., Grieskamp, W., Schulte, W., Tillmann, N., Nachmanson, L.: Model-based testing of object-oriented reactive systems with spec explorer. In: Formal Methods and Testing. Springer-Verlag (2008) 29. Xi, H., Pfenning, F.: Eliminating array bound checking through dependent types. In: PLDI (1998) 25
6cs.PL
On freeness of the random fundamental group arXiv:1601.07520v3 [math.AT] 10 Oct 2017 Andrew Newman ∗ October 12, 2017 Abstract Let Y (n, p) denote the probability space of random 2-dimensional simplicial complexes in the Linial–Meshulam model, and let Y ∼ Y (n, p) denote a random complex chosen according to this distribution. In a paper of Cohen, Costa, Farber, and Kappeler, it is shown that for p = o(1/n) with high probability π1 (Y ) is free. Following that, a paper of Costa and Farber shows that for values of p which satisfy 3/n < p ≪ n−46/47 , with high probability π1 (Y ) is not free. Here we improve on both of these results to show that there are explicit constants γ2 < c2 < 3, so that for p < γ2 /n with high probability Y has free fundamental group and that for p > c2 /n, with high probability Y has fundamental group which either is not free or is trivial. 1 Introduction For positive integers n and d and p = p(n) ∈ [0, 1], the space of Linial–Meshulam random ddimensional simplicial complexes, first introduced in [10] and [13] and denoted Yd (n, p), is defined to be the probability space of d-dimensional simplicial complexes on n vertices with complete  n (d − 1)-skeleton where each of the possible d+1 d-dimensional faces is included independently with probability p. Here we are primarily interested in the d = 2 case and so we suppress the dimension parameter and write Y (n, p) for Y2 (n, p). Now the question of the fundamental group of Y ∼ Y (n, p) is nontrivial and has been studied in [4, 6, 7, 8]. Additionally the series of papers [1, 2, 3, 12], study Yd (n, p) in the regime p = c/n. We will describe these results below, but we introduce two constants first introduced in [3] and [1] that are needed to state our main theorem. − log y Let γ2 = (2x(1−x))−1 where x is the unique nonzero solution to exp(− 1−x 2x ) = x and let c2 = (1−y)2 where y is the unique root in (0, 1) of 3(1 − y) + (1 + 2y) log y = 0. Here we build on the work of [3], [7], and [12] to prove the following result about the fundamental group of a random 2-complex. Note that most of the theorems stated here are asymptotic results and we use the phrase “with high probability”, abbreviated w.h.p., to mean that a property holds for Y ∼ Yd (n, p) with probability tending to 1 as n tends to infinity. The following theorem is the main result of this paper. Theorem 1. If c < γ2 and Y ∼ Y (n, c/n), then with high probability π1 (Y ) is a free group and if c > c2 and Y ∼ Y (n, c/n) then with high probability π1 (Y ) is not a free group. Now γ2 is first defined in [3] and c2 is first defined in [1] and approximations are computed as γ2 ≈ 2.455407 and c2 ≈ 2.753806. ∗ The Ohio State University 1 2 The lower bound In this section we prove the first part of theorem that for c < γ2 one has π1 (Y ) is a free group with high probability for Y ∼ Y (n, c/n). This result will follow by adapting the argument of [3] used to prove the following result. Theorem 2 (2-dimensional case of Theorem 1.4 from [3]). Let γ2 be as above. If c < γ2 then w.h.p. Y ∼ Y (n, c/n) is 2-collapsible or contains ∂∆3 as a subcomplex. We first define what it means for a simplicial complex to be d-collapsible. For a d-dimensional simplicial complex Y , we say that a (d− 1)-dimensional face τ is free if it is contained in exactly one d-dimensional face σ ∈ Y . For a free (d − 1)-face τ an elementary collapse at τ is defined to be the simplicial complex Y ′ obtained from Y be removing τ and the unique d-face σ in Y containing τ . If there is a sequence of elementary collapses that removes all d-dimensional faces of Y we say that Y is d-collapsible. Observe that elementary collapses are homotopy equivalences, so if a 2-complex is 2-collapsible (to a graph) then in particular it has free fundamental group. Therefore theorem 2 above almost proves the lower bound except for the problem of tetrahedron boundaries. Note that it is impossible to rule out ∂∆3 appearing as a subcomplex of Y ∼ Y (n, c/n) for any c > 0 since the expected number of copies of ∂∆3 in Y ∼ Y (n, c/n) approaches a Poisson distribution with mean c4 /24. Additionally, [3] does not state any result about partial collapsibility in the presence of a few copies of ∂∆3 and indeed it is not clear that any partial collapsibility result would hold. However such a result is not needed to imply that the fundamental group of Y ∼ Y (n, c/n) is free for c < γ2 as we will see below. Following the convention of [3] define a core to be a 2-dimensional simplicial complex in which every edge is contained in at least two faces. Also for a 2-complex Y , let R(Y ) denote the simplicial complex obtained by collapsing all the free edges of Y and let R∞ (Y ) denote the simplicial complex obtained after repeatedly collapsing at all free edges until no free edges remain. The two key results of [3] that we will use are the following. Theorem 3 (2-dimensional case of Theorem 4.1 from [3]). For every c > 0 there exists a constant δ = δ(c) > 0 such that w.h.p. every core subcomplex K of Y ∼ Y (n, c/n) with f2 (K) ≤ δn2 must contain the boundary of a tetrahedron. Theorem 4 (2-dimensional case of Theorem 5.3 from [3]). Let δ > 0 and 0 < c < γ2 be fixed and suppose Y ∼ Y (n, c/n). Then w.h.p. f2 (R∞ (Y )) ≤ δn2 . Now to bound the probability that π1 (Y ) is not a free group for Y ∼ Y (n, c/n), we will bound the probability that Y ∼ Y (n, c/n) for c < γ2 has a core which contains no tetrahedron boundary or has a pair of tetrahedron boundaries that are not face disjoint. This will be an upper bound to the probability that π1 (Y ) is not free by the following proposition. Proposition 5. Let Y be a 2-dimensional simplicial complex. If every core of Y contains a tetrahedron boundary and all the tetrahedron boundaries are face-disjoint then π1 (Y ) is free Proof. Let Ỹ be the 3-dimensional simplicial complex obtained from Y be adding a 3-simplex inside all the tetrahedron boundaries of Y . Now Ỹ (2) = Y so π1 (Y ) = π1 (Ỹ ). Now let Z be obtained from Ỹ by collapsing at a free 2-dimensional face at every 3-dimensional face, such a collapse will remove 2 all the tetrahedra from Ỹ as the tetrahedron boundaries in Y are face disjoint so every tetrahedron in Ỹ has that all of its faces are free. Equivalently, Z is obtained from Y by deleting one face from every tetrahedron boundary of Y . Now collapsing at free faces is a homotopy equivalence so π1 (Z) = π1 (Ỹ ). Furthermore Z is 2-collapsible. Indeed Z has no cores as a core K of Z would be a core in Y as well since Z is obtained from Y by removing faces. But every core of Y contains a tetrahedron boundary and Z has no tetrahedron boundaries. Since Z does not have a core it must be 2-collapsible, otherwise deleting all the isolated edges of R∞ (Z) would give us a subcomplex of Z that has no faces of degree zero or one, so such a subcomplex would be a core. Thus Z is 2-collapsible, in particular Z is homotopy equivalent to a graph so π1 (Z) is a free group. Now we are ready to prove the first part of Theorem 1, that is for c < γ2 and Y ∼ Y (n, c/n), π1 (Y ) is a free group with high probability. Proof of lower bound on Theorem 1. Let c < γ2 be fixed and suppose Y ∼ Y (n, c/n), by proposition 5, the probability that π1 (Y ) is not free is bounded above by the sum of the probability that Y contains tetrahedron boundaries that share a face and the probability that Y has a core with no tetrahedron boundary. First it is easy to bound the probability that Y contains tetrahedron boundaries that share a face. Two tetrahedron boundaries in a simplicial complex sharing a face must meet in exactly one face. Two tetrahedron boundaries meeting at one face is a simplicial complex with 5 vertices and 7 faces, the expected number of such subcomplexes in Y ∼ Y (n, p) is O(n5 p7 ) which in this case is O(c7 /n2 ) = o(1). So by Markov’s inequality the probability that there are tetrahedron boundaries in Y that are not face disjoint is o(1). We will now use the two theorems from [3] above to show that the probability that Y has a core with no tetrahedron boundary is o(1). Let δ = δ(c) be the δ given by Theorem 3. Let F denote the collection of 2-complexes on n vertices containing a core with no tetrahedron boundary and let G denote the collection of 2-complexes on n vertices for which all cores have size at most δn2 . Note that if Y ∈ / G , then f2 (R∞ (Y )) > δn2 since cores are unaffected by elementary collapses, so P r(Y ∈ / G ) = o(1) by Theorem 4. Now we bound P r(Y ∈ F ). P r(Y ∈ F ) = P r(Y ∈ F ∩ G ) + P r(Y ∈ F \ G ) ≤ P r(Y ∈ F ∩ G ) + P r(Y ∈ / G) ≤ P r(Y ∈ F ∩ G ) + o(1) ≤ P r(Y ∈ {X : X has a core K with at most δn2 faces and no ∂∆3 }) + o(1) Now by the choice of δ and Theorem 3, we know that the probability that Y has a core which has at most δn2 faces but no tetrahedron boundary is o(1). Thus we have that P r(Y ∈ F ) = o(1) which completes the proof. 3 The upper bound We now turn our attention to proving that when c > c2 and Y ∼ Y (n, c/n), with high probability π1 (Y ) is not a free group. In fact relevant results by Costa and Farber ([7]) will prove that the cohomological dimension is 2. We refer the reader to [5] for background on group cohomology theory. The main result of [7] is the following: 3 Theorem 6 (Theorem 2 of [7]). Assume that p ≪ n−46/47 , then w.h.p. a random 2-complex Y ∼ Y (n, p) is asphericable. That is the complex Z obtained from Y by removing one face from each tetrahedron of Y is aspherical (i.e. the universal cover of Z is contractible). From here Costa and Farber prove the following result. Theorem 7 (Theorem 3B of [7]). For any constants c > 3 and 0 < ǫ < 1/47 and p satisfying c/n < p < n−1+ǫ , the cohomological dimension of Y ∼ Y (n, p) equals 2 with high probability. To prove our upper bound from Theorem 1 we will use the following result of Linial and Peled [12] to reduce the constant 3 in Theorem 7 to c2 , the argument will follow exactly the argument of Costa and Farber in their proof of Theorem 7, but with the current state-of-the-art (and bestpossible, also by [12]) threshold for emergence of homology in degree 2 for a random 2-complex. Theorem 8 (Special case of Theorem 1.3 from [12]). Suppose c > c2 , then w.h.p. Y ∼ Y (n, c/n) has dim H2 (Y ; R) = Θ(n2 ). In [12], the constant implicit in Θ(n2 ) is given explicitly, but we do not need it here. We are now ready to prove the second part of theorem 1. Proof of upper bound on Theorem 1. Fix c > c2 and suppose that Y is a simplicial complex drawn from Y (n, c/n). Now let Z be obtained from Y by removing one face from every tetrahedron boundary. With high probability π1 (Y ) = π1 (Z), and by theorem 6, Z is aspherical. Therefore showing that β2 (Z) 6= 0 would imply that the cohomological dimension of π1 (Y ) is at least two. Now by theorem 8 we know that with high probability β2 (Y ) = Θ(n2 ). Also we have by a first moment argument that the expected number of tetrahedron boundaries is bounded above by c4 /24. Therefore by Markov’s inequality with high probability Y has no more than, say, n tetrahedron boundaries. Now given a 2-dimensional simplicial complex, removing a face can drop β2 by at most one. Therefore when we remove one face from from each tetrahedron boundary of Y to obtain Z we drop β2 (Y ) by at most n, then w.h.p. β2 (Z) = Θ(n2 ) > 0. Thus the cohomological dimension of π1 (Y ) is at least two (actually equality holds by theorem 6), in particular π1 (Y ) is not a free group. 4 Concluding Remarks The statement of Theorem 1 perhaps implicitly suggests a sharp threshold for the property that a random 2-complex has fundamental group which is not free. However, it is worth mentioning that the property that the fundamental group of a simplicial complex is free is not a monotone property, so it is not obvious at all that a sharp threshold should exist. However, by theorem 1 and theorem 7, for c2 /n < p < 3 log n/n and Y ∼ Y (n, p), with high probability π1 (Y ) is not free. Combining this with a result from [8] that for p > (2 log n + ω(n))/n (with ω(n) → ∞ as n → ∞) and Y ∼ Y (n, p), π1 (Y ) has property (T) with high probability, we have that for p > c2 /n, the fundamental group of Y ∼ Y (n, p) is with high probability free only if it is trivial as the only free group with property (T) is the trivial group. On the other hand, [6] proves that for p = o(1/n), Y ∼ Y (n, p) collapses to a graph with high probability. Thus we do have at least a coarse threshold of 1/n for the fundamental group of a random 2-complex to be either not free or trivial. 4 It remains to discover the fundamental group for Y (n, p) for γ2 ≤ c ≤ c2 and p = c/n. Right now, there does not seem to be enough evidence to establish a conjecture. There are the following three possibilites for what happens to the fundamental group of Y (n, p) in this intermediate regime: 1. γ2 /n is the sharp threshold for the fundamental group of Y (n, p) to go from a free group to a non-free group. 2. c2 /n is the sharp threshold for the fundamental group of Y (n, p) to go from a free group to a non-free group. 3. Neither γ2 /n nor c2 /n is the sharp threshold for the fundamental group of Y (n, p) to go from a free group to a non-free group. Any of these three would be interesting in their own way. If (1) holds, then by [7], Y (n, c/n) in the regime c ∈ (γ2 , c2 ) has cohomological dimension equal to 2 and Y (n, c/n) is asphericable. Thus when we remove a face from every tetrahedron we have that Y (n, c/n) is a K(G, 1) for a group G which has cohomological dimension 2. However, the reason for it to have cohomological dimension 2 must be different than the reason for π1 (Y (n, c/n)) to have cohomological dimension 2 in the regime c > c2 . Indeed, in the regime c > c2 , H2 (Y (n, c/n), R) 6= 0 is enough to imply that the cohomological dimension of the fundamental group is at least 2. For c < c2 the second homology group of Y (n, c/n) with coefficients in R is trivial, after the removal of a face from each tetrahedron boundary. Moreover, there is an apparent lack of torsion in H1 (Y (n, c/n)) if c < c2 . This has not been proved, but extensive experiments conducted in [9] provide evidence to support this, and [14] state the following conjecture regarding torsion in homology: Conjecture (2-dimensional case of the conjecture from [14]). For every p = p(n) such that |np−c2 | is bounded away from 0, H1 (Yd (n, p); Z) is torsion-free with high probability. Torsion in homology is observed experimentally for p close to cd /n. For more about this torsion see [9]. All of this is to say that it is likely that one will not be able to prove that the cohomological dimension of π1 (Y (n, c/n)) ≥ 2 for γ2 < c < c2 by proving H2 (Y (n, c/n), Z/qZ) 6= 0 for some prime q. On the other hand if (2) holds, then Y (n, c/n) in the regime γ2 < c < c2 is homotopy equivalent to a wedge of circles after the removal of one face from each tetrahedron boundary. This follows from the fact that Y (n, c/n) is asphericable and that an aspherical space which is a CW-complex is unique up to homotopy equivalence. Now for c < γ2 , as we show above following the results of [3], Y (n, c/n) is homotopy to a wedge of circles after the removal of a face from each tetrahedron boundary. However, this homotopy equivalence is given by a sequence of elementary collapses which reduces the complex to a graph. It is proved in [2] that such a series of elementary collapses is not possible for c > γ2 . Furthermore, [11] points out that in the regime γ2 < c < c2 , Y (n, c/n) is far from being 2-collapsible in the sense that a constant fraction of the faces must be deleted to arrive at a complex which is 2-collapsible. Thus Y (n, c/n) in the regime γ2 < c < c2 if (2) holds would be homotopy equivalent to a wedge of circles, but not via the same type of homotopy equivalence 5 which exists for smaller values of c. In summary, regardless of whether the truth is (1) or (2), new techniques will almost certainly be required to prove which is correct. Of course, (3) is a possibility as well. Indeed it is possible that no sharp threshold exists for the property that π1 (Y (n, p)) as we discuss above. It could also be that there is some c∗ ∈ (γ2 , c2 ) so that c∗ /n is the sharp threshold for π1 (Y (n, p)) to be non-free, or that within this intermediate regime there is a positive probability Y (n, p) is free and a positive probability that it is not. References [1] L. Aronshtam and N. Linial, When does top homology in a random simplicial complex vanish?, Random Structures & Algorithms 46 (2013), 26–35. [2] , The threshold for d-collapsibility in random complexes, Random Structures & Algorithms 48 (2015), 260–269. [3] L. Aronshtam, N. Linial, T. Luczak, and R. Meshulam, Collapsibility and vanishing of top homology in random simplicial complexes., Discrete & Computational Geometry 49 (2013), 317–334. [4] E. Babson, C. Hoffman, and M. Kahle, The fundamental group of random 2-complexes, Journal of the American Mathematical Society 24 (2011), 1–28. [5] K. S. Brown, Cohomology of groups, Springer-Verlag New York Inc., 1982. [6] D. Cohen, A. Costa, M. Farber, and T. Kappeler, Topology of random 2-complexes, Discrete & Computational Geometry 47 (2012), 117–149. [7] A. Costa and M. Farber, The asphericity of random 2-dimensional complexes, Random Structures & Algorithms 46 (2015), 261–273. [8] C. Hoffman, M. Kahle, and E. Paquette, Spectral gaps of random graphs and applications to random topology, arXiv: 1201.0425. [9] M. Kahle, F. H. Lutz, A. Newman, and K. Parsons, Cohen–Lenstra heuristics for torsion in homology of random complexes, In preparation. [10] N. Linial and R. Meshulam, Homological connectivity of random 2-complexes, Combinatorica 26 (2006), 475–487. [11] N. Linial and Y. Peled, Random simplicial complexes – around the phase transition, arXiv: 1609.00914. [12] , On the phase transition in random simplicial complexes, Annals of Mathematics 184 (2016), 745–773. [13] R. Meshulam and N. Wallach, Homological connectivity of random k-dimensional complexes, Random Structures & Algorithms 34 (2009), 408–417. [14] T. Luczak and Y. Peled, Integral homology of random simplicial complexes, arXiv: 1607.06985. 6
4math.GR
Reducing bias in nonparametric density estimation via bandwidth dependent kernels: L1 view1 arXiv:1611.10203v1 [math.ST] 30 Nov 2016 Kairat Mynbaev International School of Economics Kazakh-British Technical University Tolebi 59 Almaty 050000, Kazakhstan email: kairat [email protected] and Carlos Martins-Filho Department of Economics University of Colorado Boulder, CO 80309-0256, USA email: [email protected] & IFPRI 2033 K Street NW Washington, DC 20006-1002, USA email: [email protected] November, 2016 Abstract. We define a new bandwidth-dependent kernel density estimator that improves existing convergence rates for the bias, and preserves that of the variation, when the error is measured in L1 . No additional assumptions are imposed to the extant literature. Keywords and phrases. Kernel density estimation, higher order kernels, bias reduction. AMS-MS Classification. 62G07, 62G10, 62G20. 1 We thank an anonymous referee and an Associate Editor for excellent comments that improved this note significantly. 1 Introduction Given a sequence of n ∈ N independent realizations {Xj }nj=1 of the random variable X, having density f on R, the Rosenblatt-Parzen kernel estimator (Rosenblatt (1956), Parzen (1962)) of f is given by n 1X (Shn K)(x − Xj ), n j=1 fn (x) = (1.1) where Shn is an operator defined by 1 (Shn K)(x) = K hn K is a kernel, i.e., a function on R such that that hn → 0 as n → ∞.1 R  x hn  , (1.2) K(x)dx = 1 and hn > 0 is a non-stochastic bandwidth such One of the most natural and mathematically sound (Devroye and Györfi (1985), Devroye (1987)) criteria to measure the performance of fn as an estimator of f is the L1 distance R |fn − f |. In particular, given that this distance is a random variable (measurable function of {Xj }nj=1 ) it is convenient to focus on E R  |fn − f | , where E denotes the expectation taken using f . For this criterion, there is a simple bound (Devroye, 1987, p. 31) E Z |fn − f |  ≤ Z |(f ∗ Shn K) − f | + E where for arbitrary f, g ∈ L1 , (f ∗ g)(x) = R |f ∗ Shn K − f | is called bias over R and E R R Z  |fn − f ∗ Shn K| , g(y)f (x − y)dy is the convolution of f and g. The term  |fn − f ∗ Shn K| is called the variation over R. There exists a large literature devoted to establishing conditions on f and K that assure suitable rates of convergence of the bias to zero as n → ∞ (see, inter alia, Silverman (1986), Devroye (1987) and Tsybakov (2009)). In particular, if K is of order s, i.e., αj (K) = 0 for j = 1, ..., s − 1 and αs (K) 6= 0, where αj (K) = is the jth moment of K, and f has an integrable derivative f (s) , then R R tj K(t)dt |f ∗ Shn K − f | is of order O(hsn ) and this order cannot be improved, see, e.g., (Devroye, 1987, Theorem 7.2). In this note, we show that if in (1.2) the kernel is allowed to depend on n, then the order O(hsn ) can be replaced by the order o(hsn ), without increasing the order of the kernel or the smoothness of the density. In addition, another result from Devroye 1 Throughout this note, integrals are over R, unless otherwise specified. 1 (1987) states that if K is a kernel of order greater than s and the derivative f (s) is a-Lipschitz then the bias is of order O(hs+a n ). We achieve the same rate of convergence with kernels of order s. 2 Main results Let L1 and C denote the spaces of integrable and (bounded) continuous functions on R with norms kf k1 = R |f | and kf kC = sup |f |, and βs (K) = R |t|s |K(t)| dt. Let {Kn } be a sequence of kernels and define n 1X fˆn (x) = (Shn Kn )(x − Xj ). n j=1 In the following Theorem 1, the density f has the same degree of smoothness and the kernels Kn are of the same order as in (Devroye, 1987, Theorem 7.2), but the bias is of order o(hsn ) instead of O(hsn ). This results because the kernels depend on n and have “disappearing” moments of order s. Theorem 1. Let {Kn } be a sequence of kernels of order s such that: 1. αs (Kn ) → 0; 2. {us Kn (u)} is uniformly integrable. For all f with absolutely continuous f (s−1) and f (s) ∈ L1 , we have kf ∗ Shn Kn − f k1 = o(hsn ). Proof. Note that since Kn is a kernel f ∗ Shn Kn (x) − f (x) = Z Kn (t)[f (x − hn t) − f (x)]dt. (2.1) Since f is s-times differentiable, by Taylor’s Theorem, f (x − hn t) − f (x) = s−1 (j) X f (x) j! j=1 j (−hn t) + x−hn t Z x (x − hn t − u)s−1 (s) f (u)du. (s − 1)! Furthermore, given that Kn is of order s, 1 f ∗ Shn Kn (x) − f (x) = (s − 1)! Z Z x−hn t (x − hn t − u)s−1 f (s) (u)duKn (t)dt. x (2.2) Letting λ = − u−x hn t we have Z x−hn t x s−1 (s) (x − hn t − u) f s (u)du = (−hn t) Z 0 2 1 f (s) (x − hn λt)(1 − λ)s−1 dλ. (2.3) Substituting (2.3) into (2.2) we obtain f ∗ Shn Kn (x) − f (x) = Since R1 0 (−hn )s s! Z Z 1 0 f (s) (x − hn λt)s(1 − λ)s−1 dλts Kn (t)dt. (2.4) (1 − λ)s−1 dλ = 1s , we have that (−hn )s (s − 1)! Z Z 1 f (s) 0 s−1 (x)(1 − λ) (−hn )s (s) f (x) dλt Kn (t)dt = s! s Z ts Kn (t)dt. (2.5) Then, adding and subtracting (2.5) to the right-hand side of (2.4) gives f ∗ Shn Kn (x) − f (x) = (−hn )s s!   Z Z 1 f (s) (x)αs (Kn ) + [f (s) (x − hn λt) − f (s) (x)]s(1 − λ)s−1 dλts Kn (t)dt . 0 Since f (s) ∈ L1 we write its continuity modulus as ω(δ) = sup|t|≤δ R f (s) (x − t) − f (s) (x) dx. It is well- known (see properties M.2, M.6 and M.7 in Zhuk and Natanson (2003)) that ω(δ) ≤ 2 f (s) 1 , ω is nondecreasing and lim ω(δ) = 0. (2.6) δ→0 Then, kf ∗ Shn Kn − f k1 ≤ ≤ = ≤ hsn s!  hsn  s! f (s) f (s)  hsn  (s) f s!  hsn  (s) f s! 1 1 1 |αs (Kn )| + Z Z 1 0 1 Z f (s) (x − hn λt) − f (s) (x) dx s(1 − λ)s−1 dλ|ts Kn (t)|dt  ω(λhn |t|) | ts Kn (t)| dt s(1 − λ)s−1 dλ 0    Z Z 1 Z  ω(λhn |t|)|ts Kn (t)|dt s(1 − λ)s−1 dλ  + |αs (Kn )| + |αs (Kn )| + Z 0 Z |t|≤ √1 hn |t|> √1 hn (2.7) 1  |αs (Kn )| + ω p  hn βs (Kn ) + 2 f (s) 1 Z |t|> √1 hn  |ts Kn (t)| dt . (2.8) Given that αs (Kn ) → 0 as n → ∞, {ts Kn (t)} is uniformly integrable, which implies sup βs (Kn ) < ∞, and n using (2.6) and (2.8) we have kf ∗ Shn Kn − f k1 = o(hsn ). (2.9) Remark 1. Kernel sequences {Kn } that satisfy the restrictions imposed by Theorem 1 can be easily constructed. To this end, denote by Bs the space of functions with bounded norm kKkBs = β0 (K) + βs (K). 3 Take functions K(0) , K(s) ∈ Bs such that α0 (K(0) ) = 1, αj (K(0) ) = 0 for j = 1, ..., s; αj (K(s) ) = 0 for j = 0, 1, ..., s − 1, αs (K(s) ) = 1. (2.10) We define the n-dependent kernel Kn = K(0) + hn K(s) with 0 < hn ≤ 1. Note that Kn is a kernel of order s with αs (Kn ) = hn which tends to zero as n → ∞. It is clear that any kernel K of order s can be written as K = K(0) + αs (K)K(s) , so that the conventional s-order kernels obtain from ours with αs (K) = hn . Furthermore, it follows from (2.10) that {ts (K(0) (t) + hn K(s) (t))} is uniformly integrable. Now, to obtain K(0) and K(s) , assume that for a nonnegative kernel K we have β2s (K) < ∞. Then, we can associate with K a symmetric matrix  α0 (K) α1 (K)  α1 (K) α2 (K) As =   ... ... αs (K) αs+1 (K) ... ... ... ...  αs (K) αs+1 (K)  ,  ... α2s (K) such that det As 6= 0 (see Mynbaev et al. (2014)). For an arbitrary vector b ∈ Rs+1 let a = A−1 s b and define a polynomial transformation of K by (Ta K)(t) = Ps i=0  ai ti K(t). Then, we put K(0) = Ta K with b = (1, 0, ..., 0)′ and K(s) = Ta K with b = (0, ..., 0, 1)′ , which satisfy (2.10). Thus, we have the following corollary to Theorem 1. Corollary 1. Let Kn = K(0) + hn K(s) where K(0) and K(s) are as defined in Remark 1. Then, for all f with absolutely continuous f (s−1) and f (s) ∈ L1 , we have kf ∗ Shn Kn − f k1 = o(hsn ). Remark 2. If Kn are supported on [−M, M ] for some M > 0 and for all n, then in (2.7), instead of splitting   √ √ R = |t| ≤ 1/ hn ∪ |t| > 1/ hn we can use R = {|t| ≤ M } ∪ {|t| > M } and then instead of (2.8) we get kf ∗ Shn Kn − f k1 ≤ hsn h (m) f s! 1 i |αs (Kn )| + ω(hn M )βs (Kn ) . Hence, selecting {Kn } in such a way that αs (Kn ) = O(ω(hn )), sup βs (Kn ) < ∞ and using the fact that n 2 ω(hn M ) ≤ (M + 1) ω(hn ) we get a result that is more precise than (2.9), i.e., kf ∗ Shn Kn − f k1 = O(hsn ω(hn )). 2 See property M.5 in Zhuk and Natanson (2003). 4 Remark 3. By Young’s inequality, the variation of fˆn using Kn = K(0) + hn K(s) is such that E (0) Letting fn Z |fˆn − f ∗ Shn Kn | ≤ E Z |fˆn − f ∗ Shn K(0) | + hn |f ∗ Shn K(s) | Z Z Z ≤ E |fˆn − f ∗ Shn K(0) | + hn |f | |K(s) |. be the estimator in (1.1) with K = K(0) , we have E Shn K(0) | + hn R Z R |fˆn − f ∗ Shn K(0) | ≤ E R (0) |fn − f ∗ R |f | |K(s) |. Hence, E Z |fˆn − f ∗ Shn Kn | ≤ E Z |fn(0) − f ∗ Shn K(0) | + 2 hn Z |f | Z |K(s) |. Since, hn → 0 as n → ∞, the variation of fˆn is asymptotically bounded by the variation of the conventional estimator fn using K(0) , i.e., E R (0) |fn − f ∗ Shn K(0) |. R Under the assumptions that f has a variance, (1 + t2 )(K(0) (t))2 dt < ∞, (Devroye, 1987, Theorem 7.4) showed that E R (0) |fn − f ∗ Shn K(0) | = O((nhn )−1/2 ). Thus, Z p nhn E |fˆn − f ∗ Shn Kn | = (1 + (nh3n )1/2 )O(1) = O(1), where the last equality follows if nh3n ≤ c < ∞. We now provide an analog for Theorem 7.1 in Devroye (1987). There, the bias order O(hs+a ) is achieved for kernels with orders greater than s, while in the following theorems we obtain the same order of bias for kernels of order s. Theorem 2. Let {Kn } be a sequence of kernels of order s such that: 1. αs (Kn ) = O(han ); 2. sup βs+a (Kn ) < n ∞, for some a ∈ (0, 1]. For f with absolutely continuous f (s−1) and f (s) ∈ L1 assume that for some 0<c<∞ ω(δ) ≤ c |δ|a . (2.11) Then, kf ∗ Shn Kn − f k1 = O(hs+a n ). Proof. As in the proof of Theorem 1, we have kf ∗ Shn Kn − f k1 ≤ hsn s!  f (s) 1 |αs (Kn )| + Z 1 0 5 Z  ω(λhn |t|)s(1 − λ)s−1 | ts Kn (t)| dtdλ (2.12) By (2.11) hs kf ∗ Shn Kn − f k1 ≤ n s!  f (s) 1 |αs (Kn )| + chan Z Z 0 1 s−1 s(1 − λ) dλ t s+a  Kn (t) dt . Hence, under conditions 1. and 2. in the statement of the theorem we have kf ∗ Shn Kn − f k1 = O(hs+a n ). Remark 4. Practitioners may find condition (2.11) too general, preferring more primitive conditions on f (s) . To this end, we say that a function g defined on R satisfies a global Lipschitz condition of order a ∈ (0, 1] if there exist positive functions l(x), r(x) such that |g(x − h) − g(x)| ≤ l(x)|h|a for |h| ≤ r (x) , x ∈ R. (2.13) The function l is called a Lipschitz constant and the function r is called a Lipschitz radius. The class Lip(a, δ), for δ > 1, is defined as the set of functions g which satisfy (2.13) with l and r such that Z (l(x) + r(x)−δ )dx < ∞. (2.14) In the next lemma we give two sufficient sets of conditions for g ∈ Lip(a, δ). In the first case g is compactly supported, and in the second it is not. Lemma 1. a) Suppose g has compact support, supp g ⊆ [−N, N ] for some N > 0, and g satisfies the usual Lipschitz condition |g(x − h) − g(x)| ≤ c|h|a for any x, h and some a ∈ (0, 1]. Set l(x) = c, r(x) = 1 for |x| < N and l(x) = 0, r(x) = |x| − N for |x| ≥ N . Then, g ∈ Lip(a, δ) with any δ > 1. b) Suppose that |g (1) (t)| ≤ ce−|t| , t ∈ R. Let l(x) = c exp(−|x|/2 + 1/2), r(x) = (1 + |x|)/2, x ∈ R. Then, g ∈ Lip(1, δ) with any δ > 1. Proof. a) If |x| < N , then |g(x − h) − g(x)| ≤ |h|a l(x) for all h (and not only for |h| ≤ r(x)). If |x| ≥ N , then |h| ≤ r(x) = |x| − N implies |x − h| ≥ |x| − |h| ≥ N , so that |g(x − h) − g(x)| = 0 = |h|a l(x) for |h| ≤ r(x). b) Let |x| ≥ 1. We have |g(x − h) − g(x)| ≤ |h| sup |t−x|≤|h| |g (1) (t)| ≤ |h|c sup e−|t| . (2.15) |t−x|≤|h| |t − x| ≤ |h| ≤ r(x) = (1 + |x|)/2 implies |t| = |x + t − x| ≥ |x| − |t − x| ≥ |x|/2 − 1/2 ≥ 0 and (2.15) gives |g(x − h) − g(x)| ≤ |h|c exp(1/2 − |x|/2) = |h|l(x) for |h| ≤ r(x). Now let |x| < 1. Then, e−|x|/2 ≥ e−1/2 so 6 that by (2.15), |g(x − h) − g(x)| ≤ |h|c ≤ |h|c exp(1/2 − |x|/2) = |h|l(x) for all h and not only for |h| ≤ r(x). Condition (2.14) is obviously satisfied in both cases. By part a) of Lemma 1, compactly supported densities with derivative f (s) that satisfies the usual aLipschitz condition are such that f (s) ∈ Lip(a, δ) for any δ > 1. This corresponds to the case treated in Theorem 7.1 of Devroye (1987). Part b) shows that for densities with unbounded domains, not covered by Theorem 7.1, if f (s) (x) has derivative that decays exponentially as |x| → ∞, then f (s) ∈ Lip(1, δ) for any δ > 1. Next we provide a version of Theorem 2 for densities with derivative f (s) ∈ Lip(a, δ). Theorem 3. Suppose that the density f is such that its derivative f (s) belongs to L1 , C (the respective norms are finite) and Lip(a, δ). Let {Kn } be a sequence of kernels of order s such that: 1. αs (Kn ) = O(han ); 2. sup max{βs+a (Kn ), βs+δ (Kn )} < ∞. Then, kf ∗ Shn Kn − f k1 = O(hs+a n ). n Proof. As in the proof of Theorem 1, we have hs kf ∗Shn Kn −f k1 ≤ n s!  f (s) 1 |αs (Kn )| + Z 1 0 Z Z f (s) (x − hn λt) − f (s) s s−1 (x) |t Kn (t)|dt dx s(1 − λ)  dλ . f (s) (x − hn λt) − f (s) (x) |ts Kn (t)|dt and note that since f (s) ∈ Lip(a, δ)   Z Z  (s)  (s) s + I(x) =   f (x − hn λt) − f (x) |t Kn (t)|dt Let I(x) = R λhn |t|≤r(x) ≤ Z λhn |t|>r(x) Z l(x)λa han |t|a+s |Kn (t)|dt + λhn |t|≤r(x) Z ≤ han βs+a (Kn )l(x) + |f (s) (x − hn λt) − f (s) (x)||ts Kn (t)|dt λhn |t|>r(x) |f (s) (x − hn λt) − f (s) (x)||ts Kn (t)|dt. λhn |t|>r(x) Letting I1 (x) = R |f (s) (x − hn λt) − f (s) (x)||ts Kn (t)|dt we have λhn |t|>r(x) I1 (x) ≤ Z λhn |t|>r(x)  1  (s) |f (x − hn λt)| + |f (s) (x)| |t|s+δ |Kn (t)|dt. δ |t| Noting that |t|−δ < λδ hδn r(x)−δ and given that kf (s) kC < ∞, we obtain I1 (x) ≤ 2kf (s) kC λδ hδn β (Kn ). r(x)δ s+δ Consequently,  I(x) ≤ han max{βs+a (Kn ), βs+δ (Kn )} l(x) + 2hnδ−a kf (s) kC 7 1 r(x)δ  . (2.16) Since R1 0 s(1 − λ)s−1 ds = kf ∗Shn Kn −f k1 ≤ hsn s!  1 s and given (2.14) f (s) 1 |αs (Kn )| + han max{βs+a (Kn ), βs+δ (Kn )} s 1 Z  l(x) + 2kf (s) kC 1 r(x)δ   dx . (2.17) Thus, using conditions 1. and 2. in the statement of the theorem, we have kf ∗ Shn Kn − f k1 = O(hs+a n ). Remark 5. As in the case of Theorem 1, Theorems 2 and 3 do not address the construction of the kernel sequence {Kn }. The following corollary to Theorem 3 shows that Kn = K(0) + han K(s) is a suitable kernel sequence, where K(0) and K(s) are as defined above. Corollary 2. Suppose the density f is such that its derivative f (s) belongs to L1 , C and to Lip(a, δ), where a ∈ (0, 1], δ > 1. Let K(0) , K(s) satisfy (2.10) and belong to the intersection Bs+a ∩ Bs+δ . Put Kn = K(0) +han K(s) , 0 ≤ hn ≤ 1. Then Kn is a kernel of order s for hn > 0 and kf ∗Shn Kn −f k1 = O(hs+a n ). The condition K(0) ∈ Bs+a and the definition Kn = K(0) + han K(s) can be replaced by K(0) ∈ Bs+1 and Kn = K(0) + hn K(s) , respectively, without affecting the conclusion. References Devroye, L., 1987. A course in density estimation. Birkhäuser, Boston, MA. Devroye, L., Györfi, L., 1985. Nonparametric density estimation: the L1 view. John Wiley and Sons, New York, NY. Mynbaev, K., Nadarajah, S., Withers, C., Aipenova, A., 2014. Improving bias in kernel density estimation. Statistics and Probability Letters 94, 106–112. Parzen, E., 1962. On estimation of a probability density and mode. Annals of Mathematical Statistics 33, 1065–1076. Rosenblatt, M., 1956. Remarks on some nonparametric estimates of a density function. Annals of Mathematical Statistics 27, 832–837. Silverman, B. W., 1986. Density estimation for statistics and data analysis. Chapman and Hall, London. Tsybakov, A. B., 2009. Introduction to nonparametric estimation. Springer-Verlag, New York, NY. Zhuk, V. V., Natanson, G. I., 2003. Seminorms and continuity modules of functions defined on a segment. Journal of Mathematical Sciences 118, 4822–4851. 8
10math.ST
Ext and Tor on two-dimensional cyclic quotient singularities arXiv:1601.05673v2 [math.AG] 5 May 2016 Lars Kastner ∗ Freie Universität Berlin Given two torus invariant Weil divisors D and D0 on a two-dimensional cyclic quotient singularity X, the groups ExtiX (O(D), O(D0 )), i > 0, are naturally Z2 -graded. We interpret these groups via certain combinatorial objects using methods from toric geometry. In particular, it is enough to give a combinatorial description of the Ext1 -groups in the polyhedra of global sections of the Weil divisors involved. Higher Exti -groups are then reduced to the case of Ext1 via a quiver. We use this description to show that Ext1X (O(D), O(K − D0 )) = Ext1X (O(D0 ), O(K − D)), where K denotes the canonical 0 divisor on X. Furthermore, we show that Exti+2 X (O(D), O(D )) is the Matlis dual of X 0 Tori (O(D), O(D )). 1 Preliminaries Let us start by recalling the basic definitions and notation. For toric geometry we will follow [CLS11] closely. Given two coprime positive integers 0 < q < n, we can define a 2-dimensional cyclic quotient singularity X by taking the quotient of C2 by the action of the cyclic subgroup of GL(2, C) generated by   ξn 0 , 0 ξnq where ξn denotes an n-th root of unity. Any 2-dimensional cyclic quotient singularity arises in this manner. The equivalent definition in terms of toric geometry is as follows: Let N be a twodimensional lattice and let M = HomZ (N, Z) be the dual lattice. Now let NQ := N ⊗Z Q and MQ be the associated Q-vector spaces. We identify N and M with Z2 by choosing the usual scalar product as pairing. Definition 1.1. Given two integers 0 < q < n such that gcd(q, n) = 1, we define the cyclic quotient singularity X to be X := Spec C[σ ∨ ∩ M ], ∗ The author is supported by the DFG (German research foundation) priority program SPP 1489. 1 where σ ∨ denotes the dual cone of σ := cone ρ0 := (1, 0), ρ1 := (−q, n)  ⊆ NQ . By R we denote the coordinate ring C[σ ∨ ∩ M ] of X. Let us introduce a running example. Example 1.2. Let n = 7 and q = 3. Then the Hilbert basis of the dual cone σ ∨ has four elements, indicated by the dots in the picture. σ∨ Thus R = C[x[0,1] , x[1,1] , x[2,1] , x[7,3] ] or, if we label the axes x and y, R = C[y, xy, x2 y, x7 y 3 ]. Remark 1.3. There is a close relationship between the Hilbert basis of σ ∨ and the n continued fraction expansion of n−q discovered by Riemenschneider ([Rie81]). This has already lead to a very fruitful discussion of their deformation theory in terms of chains representing zero ([Ste91; Chr91]) and so-called p-resolutions ([Alt98]). The connection n of the Ext functor with the continued fraction expansion of n−q is part of [Kas15]. Any torus invariant Weil divisor is an integer linear combination of the orbits corresponding to the rays of σ, denoted as [ρ0 ] and [ρ1 ]. We write D = a0 [ρ0 ] + a1 [ρ1 ], ai ∈ Z. Notation. Throughout this article, we will omit the O, for example we will write ExtiX (D, D0 ) for ExtiX (O(D), O(D0 )). In order to study the modules ExtiX (D, D0 ) we may instead study the modules ExtiR (Γ(X, D), Γ(X, D0 )), since X is affine. In the toric language the global sections of a torus invariant Weil divisor are given by the section polyhedron. Definition 1.4. For a torus invariant Weil divisor D = a0 [ρ0 ] + a1 [ρ1 ], the section polyhedron is given by PD := {u ∈ MQ | hu, ρi i ≥ −ai }. The lattice points of the section polyhedron correspond to the homogeneous global sections of O(D). We use this to describe H 0 (X, O(D)) as a divisorial ideal over R: M HD := H 0 (X, O(D)) = C · χu ⊆ C[M ]. u∈PD ∩M Keep in mind that D is not necessarily Cartier. Hence the summation D + D0 of divisors does not translate to the multiplication of the ideals, and in general we have HD+D0 ( HD · HD0 . 2 Because σ ∨ is simplicial, every PD will just be the Minkowski sum of σ ∨ and a rational vector ν(D) ∈ Q2 . We write PD = ν(D) + σ ∨ . The (minimal) homogeneous generators of the R-module correspond exactly to the lattice points on the compact edges of conv(PD ∩ M ). Denote these lattice points as G(D) := {u ∈ M | u lies on a compact edge of conv(PD ∩ M )} ⊆ M. Remark 1.5. If G(D) = {u0 , . . . , ur } we can sort these lattice points from left to right, such that hu0 , ρ0 i < hu1 , ρ0 i < . . . < hur , ρ0 i and hur , ρ1 i < hur−1 , ρ1 i < . . . < hu0 , ρ1 i. Notation. Throughout this paper we will use the following shorthand notation: Let P be a subset of MQ , then we denote by C{P } the R-module M C{P } := C · χu , u∈P ∩M with the multiplication w x ·χ u ( χu+w := 0 u+w ∈P . else Note that only with this multiplication C{P } becomes a M -graded R-module. Furthermore, this is not well-defined for every subset P of Q2 , rather one needs “convexity” of P with respect to σ ∨ . Thus, we require for p ∈ P with u + p ∈ P for u ∈ σ ∨ that λu + p ∈ P for 0 ≤ λ ≤ 1, which is actually a little stronger than needed. As an example note that HD = C{PD }. The class group of X is Z/nZ. By 0 = E 0 , . . . , E n−1 we denote the torus invariant divisors E i := −i · [ρ0 ]. These divisors form a system of representatives for the class group of X. Furthermore, let K = −[ρ0 ] − [ρ1 ] be the canonical divisor. One can now calculate the vertex of the canonical divisor to be q+1 ]. ν(K) = [1, n Example 1.6. We will consider the divisors E 1 and E 3 . First we draw the corresponding polyhedra of global sections. [7, 3] ν(E 3 ) ν(E 2 ) 3 Then we compute the generators of HE 2 and HE 3 . They are depicted as dots of the respective colors. Our approach is to resolve such a divisorial ideal HD projectively in a Taylor-like fashion ([Tay66]). Choosing a minimal generating set of syzygies, we arrive at a short exact sequence, which may be seen as a slight generalization of cellular resolutions ([MS05, Ch. 4]) to the coordinate rings of cyclic quotient singularities. 2 Resolving torus invariant divisors on CQS A major obstacle, stemming from the non-regularity of R, is the infiniteness of the complexes. It turns out that the syzygies of the generators of HD are isomorphic to a direct sum of divisorial ideals, i.e. global sections of other torus invariant divisors. Finiteness of the class group yields that we can encode all the information needed to freely resolve any HD in a finite quiver Q with edges labelled by elements of M , effectively overcoming the previously mentioned obstacle. This results in a recursive formula for both Exti and Tori , i > 1, in terms of Ext1 and Tor1 , respectively. Denote by {u0 , . . . , ur } the generators G(D) of D. Now take π to be the canonical surjection r M i R[−ui ]  HD , ei 7→ xu . i=0 ui ui+1 For every pair and of consecutive generators, we can build an injective map into the kernel of π in the following way: i−1 (xu i i i−1 ) ∩ (xu ) → ⊕ri=0 R[−ui ], xu 7→ xu−u ei − xu−u i−1 ei−1 . i Denote by ι the map from the direct sum ⊕ri=1 (xu ) ∩ (xu ) of these ideals into ⊕ri=0 R[−ui ]. The following proposition may be seen as a generalization of [MS05, Prop 3.1], which states that every monomial ideal in the polynomial ring with two variables can be resolved freely in a short exact sequence, to the singular case. Proposition 2.1. The sequence 0→ r M i−1 ((xu ι i ) ∩ (xu )) ,→ i=1 r M π R[−ui ]  HD → 0 i=0 i−1 is exact. Furthermore, the fractional ideals (xu Let us illustrate this proposition in the example. 4 i ) ∩ (xu ) are divisorial. Example 2.2. In our example D = E 3 is an ideal of R, generated by x3 y 2 , x4 y 2 and x7 y 3 . We obtain the following sequence [7, 3] ν(E 3 ) 0 → [(x[3,2] ) ∩ (x[4,2] )]⊕[(x[4,2] ) ∩ (x[7,3] )] ,→ R[−[3, 2]]⊕R[−[4, 2]]⊕R[−[7, 3]]  HE 3 → 0 One immediately recognizes the summands of the first term as divisorial ideals, i.e. [(x[3,2] ) ∩ (x[4,2] )] ⊕ [(x[4,2] ) ∩ (x[7,3] )] = HE 1 [−[3,2]] ⊕ HE 3 [−[4,2]] . We begin the proof of Proposition 2.1 by showing that all homogeneous elements of ker π are in the image of ι. Lemma 2.3. Let a ∈ ker π ⊆ ⊕ri=0 R[−ui ] be a homogeneous element of degree u ∈ M . Then there are bi ∈ C, i = 1, . . . , r such that a= r X i i−1 bi · (xu−u ei − xu−u ei−1 ), i=1 with u − ui ∈ σ ∨ whenever bi 6= 0. In particular, a ∈ im ι. Proof. For the cases r = 1 there is nothing to prove. We prove the lemma explicitly for the case r = 2. The methods used in that case are the same as for the induction step in the general case, since we just show how to split off the last summand. Because a is homogeneous, every entry of it is a multiple of a monomial. Hence, take a to be 0 1 2 a = (a0 xu−u , a1 xu−u , a2 xu−u ). Furthermore, assume a0 6= 0 6= a2 , otherwise we are done. This implies u − u0 ∈ σ ∨ and u − u2 ∈ σ ∨ . Together with the inequalities of Remark 1.5 we get 0 ≤ hu − u0 , ρ0 i < hu − u1 , ρ0 i < hu − u2 , ρ0 i 0 ≤ hu − u2 , ρ1 i < hu − u1 , ρ1 i < hu − u0 , ρ1 i. Therefore, u − u1 ∈ σ ∨ and we split a into the following 0 1 2 a = (a0 xu−u , a1 xu−u , a2 xu−u ) 0 1 1 2 = (a0 xu−u , (a1 − a2 )xu−u , 0) + (0, a2 xu−u , −a2 xu−u ). 5 The second summand is clearly an element of both ker π and im ι. We conclude a1 − a2 = −a0 and hence, we are done. Proof of Proposition 2.1. It is already clear that π is surjective. We already know that ι is injective on the direct summands. Hence, an homogeneous element of degree u of the kernel of ι gives rise to an equation r X i−1 ai (xu−u i ei−1 − xu−u ei ), i=1 i−1 in R#G(D) , with ai ∈ C and ai = 0 for xu ∈ / ((xu i ) ∩ (xu )). Now we factor out I = (xu − 1 | u ∈ σ ∨ ∩ M ), and consider the equation over R/I ∼ = C. But the vectors ei−1 − ei ∈ C#G(D) are linearly independent and hence, ai = 0 for i = 1, . . . , r. Factoring out I did not change the ai , thus, ι must be injective. All modules are M -graded and the maps are homogeneous of degree 0. Therefore ker π is a M -graded submodule of ⊕ri=0 R[−ui ]. In particular, ker π can be generated by homogeneous elements and thus, Lemma 2.3 implies im ι = ker π. i−1 i The final claim is that ((xu ) ∩ (xu )) is divisorial. Take the polyhedron (ui−1 + σ ∨ ) ∩ (ui + σ ∨ ). i−1 i Its lattice points correspond exactly to the monomials in ((xu ) ∩ (xu )). Furthermore it is the polyhedron of the divisor −hui−1 , ρ0 i[ρ0 ] − hui , ρ1 i[ρ1 ]. Remark 2.4. An alternative proof of Proposition 2.1 can be given by using a modification of the criterion for exactness of [BPS98, Lemma 2.2]. One just needs to replace the expression of the least common multiple of two monomials xu and xv by the intersection of the corresponding principal ideals (xu ) ∩ (xv ). Using this approach, the above sequence is a subcomplex of the Taylor resolution for the divisorial ideal HD . Applying Proposition 2.1 recursively, we can construct free resolutions of D up to any desired length. Taking into account the finiteness of the class group of X, we can encode the information of Proposition 2.1 for different divisors in a quiver. For each E i , Proposition 2.1 gives a sequence r(E i ) 0→ M j=1 r(E i ) kj j E [−v ] ,→ M R[−uj ]  E i → 0, j=0 i where {u0 , . . . , ur(E ) } = G(E i ) and v j ∈ M . Let us introduce the labelled quiver Q: It consists of an ordinary quiver, i.e. a set of vertices Q0 , a set of arrows Q1 and two functions s, t : Q1 → Q0 returning the source and the target of an arrow. Additionally we have a function l : Q1 → M equipping each arrow with a label. 6 Definition 2.5. Take Q to be the quiver with vertices Q0 := {E 0 , . . . , E n−1 }. For every direct summand E kj [−v j ] in the above sequence we add an arrow a to Q1 such that s(a) := E kj , t(a) := E i , l(a) := v j . We do this for all such exact sequences for i = 0, . . . , n − 1. Furthermore, for an arbitrary Weil divisor D we define the sources of the incoming arrows in Q. This definition takes care of shifting all divisors in the right way. Definition 2.6. Let E i be the divisor linearly equivalent to D, i.e. D = E i [−u] for u ∈ M . Then we define inQ D := {E j [−v j − u] | ∃ a ∈ Q1 with s(a) = E j , t(a) = E i , l(a) = v j }. The sequence of Proposition 2.1 now becomes M 0→ HG ,→ R#G(D)  D → 0, G∈inQ D with the grading imposed by the generators of D on the middle module. Example 2.7. In the running example with n = 7 and q = 3 the quiver Q looks as follows: [1, 1] [4, 2] E1 [3, 2] E7 [6, 3] E3 [4, 2] E6 [6, 3] [5, 3] [2, 1] E4 [2, 1] E2 E5 One immediately recognizes the first term in the sequence for E 3 given in Example 2.2 via inQ (E 3 ) = {E 3 [−[4, 2]], E 1 [−[3, 2]]}. One can use this construction to define a free resolution of E 3 recursively. This resolution will even be minimal. However, the quiver Q is the more elegant way of dealing with the infiniteness of these resolutions. For the case of X being Gorenstein we recover a well-known result by Eisenbud: 7 Remark 2.8. Building the quiver Q for the case q = n − 1 one notices that it consists of b n−1 2 c disjoint cycles of length 2. For n being even, one of the cycles will have length one, i.e. it is a loop. In particular, for every non-trivial divisor D the direct sum at the beginning of the exact sequence of Proposition 2.1 has exactly one summand. This means that the resolution of the divisorial ideal HD is 2-periodic, which was already observed by Eisenbud in [Eis80] and is due to X being Gorenstein for this choice of n and q and HD being MCM. As a final remark, we can use the quiver Q to construct higher Exti and Tori recursively. Remark 2.9. For Ext and Tor we obtain the following formulas using Proposition 2.1, applying Hom(•, D0 ) and taking the long exact sequence of cohomology: M Extn+1 (D, D0 ) = Extn (G, D0 ) G∈inQ D and M Torn+1 (D, D0 ) = Torn (G, D0 ) G∈inQ D for n > 0. Thus, we only need to know how to compute Ext1 and Tor1 . 3 Ext1 Applying Hom(•, D0 ) to the short exact sequence of Proposition 2.1 for D, we may consider the long exact sequence of cohomology. The first part gives a formula for Ext1 (D, D0 ). In this section we will rephrase this formula in combinatorial terms. To a Weil divisor D define the following set Definition 3.1. [ E(D) := int(PD )\ u + int(σ ∨ ). u∈G(D) Example 3.2. We draw the sets E(E i ) for E 3 and E 2 in the running example with n = 7 and q = 3: Remember that the leftmost and the bottom boundary do not belong to the E sets, this is indicated by the dashed lines. Since E 2 only has two generators, its E set looks like a parallelepiped. On the other hand, E 3 is generated by three elements and hence, its E set has one ’dent’. 8 Let us now establish the link of E(D) with Ext1 (D, D0 ). Proposition 3.3. For two Weil divisors D and D0 define ext(D, D0 ) := −(E(D) − ν(D0 )). Then Ext1 (D, D0 ) = C{ext(D, D0 )}. We start by proving a lemma about the support of the M -graded module Hom(D, D0 ). Lemma 3.4. Denote by hom(D, D0 ) := − ν(D0 ) + PD0 . Then Hom(D, D0 ) = C{hom(D, D0 )}. In particular, the module Hom(D, D0 ) is a divisorial ideal. Proof. We know that Hom(D, D0 ) is M -graded and thus, generated by homogeneous elements. Furthermore, we note that any non-zero map D → D0 must be injective, implying that the image of any non-zero element of D completely determines the map. Hence, non-zero homogeneous maps D → D0 are given as C-multiples of multiplication of D by monomials xu ∈ C[M ] such that xu · D ⊆ D0 . This leaves us with determining all the lattice points {u ∈ M | PD + u ⊆ PD0 }. These are exactly the lattice points of hom(D, D0 ). Lemma 3.5. Denote by {u0 , . . . , ur } the generators G(D) of D. Furthermore write (ui−1 + σ ∨ ) ∩ (ui + σ ∨ ) = v i + σ ∨ , v i ∈ MQ , i = 1, . . . , r for the elements of inQ D. Then 0 ext(D, D ) = r [    −v i + ν(D0 ) + σ ∨ \ (−u0 + ν(D0 ) + σ ∨ ) ∪ (−ur + ν(D0 ) + σ ∨ ) . i=1 Proof. Using the assumption we can write E(D) as E(D) = int PD \ r [  ui + int σ ∨ . i=0 Furthermore we note that (u0 − σ ∨ ) ∩ (ur − σ ∨ ) = ν(D) − σ ∨ . Now use the equations giving the v i to obtain E(D) = r [    v i − σ ∨ \ (u0 − σ ∨ ) ∪ (ur − σ ∨ ) . i=1 Multiplying this with (−1) and adding ν(D0 ) on both sides yields the desired formula. 9 Proof of Proposition 3.3. Take the sequence of Proposition 2.1 and apply Hom(•, D0 ) to it. Considering the first part of the long exact sequence of cohomology we have 0 → Hom(D, D0 ) → Hom(R#G(D) , D0 ) M → Hom( G, D0 ) → Ext1 (D, D0 ) → 0. G∈inQ D Hence, we need to understand the quotient of Hom(⊕G∈inQ D G, D0 ) by the image of Hom(R#G(D) , D0 ). Now we use Lemma 3.4:   M M M Hom  G, D0  = Hom(G, D0 ) = C{hom(G, D0 )}. G∈inQ D G∈inQ D G∈inQ D Next we determine the image of Hom(R#G(D) , D0 ) in this direct sum. Take ui to be a generator of D, not at the boundary, i.e. 0 6= i 6= r. Then Di and Di+1 are the only summands of ⊕G∈inQ D G mapping non-trivially to R[−ui ] via the following map Di ⊕ Di+1 → R[−ui−1 ] ⊕ R[−ui ] ⊕ R[−ui+1 ], . i−1 i i i+1 (xu , xw ) 7→ (−xu−u , xu−u − xw−u , xw−u ) Applying Hom(•, D0 ) to this map gives Hom(R[−ui ], D0 ) → Hom(Di , D0 ) ⊕ Hom(Di+1 , D0 ) . i xu−u 7→ (xu , −xu ) Hence, dividing by the image of Hom(R[−ui ], D0 ) means that the elements xu ∈ Hom(Di , D0 ) and xu ∈ Hom(Di+1 , D0 ) get identified. This explains why we take the union of the −v i + σ ∨ . Now consider u0 . Then the map D1 → R[−u0 ] ⊕ R[−u1 ] yields Hom(R[−u0 ], D0 ) → Hom(D1 , D0 ) . 0 xu−u 7→ xu Thus, all xu ∈ Hom(D1 , D0 ) such that u + u0 ∈ PD0 are set to zero. One proceeds analogously for ur . This explains the part which is cut off and we are done. Let us briefly remark on the MCM’ness and sMCM’ness as mentioned in the introduction. Remark 3.6. We claim that Exti (D, K) = 0 for i > 0 and any D. By the recursion formula it is enough to show that all Ext1 (D, K) = 0. Recall that the vertex of K is ν(K) = [1, q+1 n ]. Now proceed to compute ext(D, K) = E(D) − ν(K) in two steps: First subtract [1, nq ], second subtract [0, n1 ]. One can then show q (E(D) − [1, ]) ∩ M ⊆ E(D) ∩ M. n 10 Now we argue that G(D) = E(D) ∩ M , otherwise G(D) would not generate HD . Hence, the closure of E(D) − [1, nq ] can only have lattice points on its top and rightmost edges. In particular, the lattice points of E(D) − [1, nq ] do not lie in the ‘valleys’ of E(D) − [1, nq ], since they were at the ‘valleys’ of E(D). Subtracting [0, n1 ] from E(D) − [1, nq ] yields the desired result. Remark 3.7. Assume D to be non-trivial. For the simplest case of H0 = R in the second argument we see dimC Ext1R (D, R) = #G(D) − 2. Thus, Ext1R (D, R) vanishes whenever HD is generated by exactly two elements, thereby relating our construction to the result of Wunram ([Wun87]). 4 Tor1 Using the same strategy as for Ext, we can derive a combinatorial description of Tor1 as well. While Ext1 depended on the polyhedra of global sections of the involved divisors exclusively, Tor1 needs the quiver Q as an additional datum. Definition 4.1. [ T(D) := PD \ u + σ∨. u∈G(D) Proposition 4.2. For two Weil divisors D and D0 let tor(D, D0 ) := T(D) + ν(D0 ). Then  Tor1 (D, D0 ) =  M M  W i ∈inQ D C{tor(W ij , D0 )} . W ij ∈inQ W i Proof. For a Weil divisor W , denote by F0 (W ) the M -graded module RG(W ) in the middle of the sequence of Proposition 2.1. Then we can build a free resolution of D as follows:   M M M d d  F0 (W ij ) →2 F0 (W i ) →1 F0 (D)  D → 0, W i ∈inQ D W ij ∈inQ W i W i ∈inQ D resulting from repeatedly applying Proposition 2.1. Tensorizing this sequence with D0 and then taking cohomology yields Tor1 (D, D0 ) = ker(d1 ⊗ idD0 ) . im(d2 ⊗ idD0 ) 11 Tensorizing R[−u] with D0 yields D0 [−u]. Inserting this, we see that the kernel of d1 ⊗idD0 is exactly   M M   ker(d1 ⊗ idD0 ) = C{PW ij + ν(D0 )}  . W i ∈inQ D W ij ∈inQ W i By construction it is enough to consider the single summands. In each of these we have to remove the image of F0 (W ij )⊗D0 . Assume W ij to be generated by G(W ij ) = {u0 , . . . , ur }. Then the image of F0 (W ij ) ⊗ D0 is exactly r X k xu D 0 . k=0 Thus for the support we have (PW ij + ν(D0 ))\ r [ (uk + D0 ) = ν(D0 ) + PW ij \ k=0 r [ ! (uk + σ ∨ ) k=0 and this equals tor(W ij , D0 ), hence, finishing the proof. 5 The Matlis dual Definition 5.1. We define the Matlis dual (H)∨ of an R-module H to be (H)∨ := HomR (H, C[−σ ∨ ∩ M ]). One can check that in our setting, C[−σ ∨ ∩ M ] is exactly the injective hull of C as an R-module. Remark 5.2. As stated in [MS05], this means that for a M -graded module H, ((H)∨ )−u = HomC (Hu , C). The R-multiplication on (H)∨ is then the transpose of the R-multiplication on H. In particular, this means that (C{P })∨ = C{−P }. Proposition 5.3. The Matlis dual of Ext1 (D, K − D0 ) is (Ext1 (D, K − D0 ))∨ = C{tor(D, D0 )}. In order to prove this proposition, we will first have a closer look at the sets E(D) and T(D). By construction they only differ at the boundaries. We will introduce a set link(D), which is the common core of E(D) and T(D), meaning that it links these sets when intersecting with the lattice M . This set and its behaviour under shifts by vertices ν(D0 ) is the key to understanding Theorem 6.2, the Matlis duality of Ext and Tor. 12 Definition 5.4. For a Weil divisor D, define the link of D: h i link(D) := E(D) ∩ E(D) + ν(K)] . Example 5.5. Let us construct link(E 3 ). Again we have E(E 3 ) with the dashed lower and left edge. Now we shift it by 4 ν(K) = [1, ] 7 and take the closure. The intersection link(E 3 ) is indicated in green. Alternatively one can define link(D) using the T set. One just has to close the first set in the intersection. This is the first statement in the following proposition. Proposition 5.6. Given D and D0 two Weil divisors on X, we have 1. link(D) = T(D) ∩ [T(D) + ν(K)]; 2. [E(D) + ν(D0 )] ∩ M = [link(D) + ν(D0 )] ∩ M ; and 3. [T(D) + ν(D0 )] ∩ M = [link(D) + ν(D0 ) − ν(K)] ∩ M . Proof. It is already clear that the closures of E and T are equal. The complementary boundary containments then yield the first formula. The proofs of the second and third claim are very similar, hence, we will only prove the second claim. The containment of link(D) + ν(D0 ) in E(D) + ν(D0 ) is trivial. By construction, E(D) is contained in PD , even in the interior. Let PD = {u ∈ MQ | hu, ρ0 i ≥ aD , hu, ρ0 i ≥ bD }, with aD , bD ∈ Z, i.e. D = −aD · [ρ0 ] − bD · [ρ1 ]. Similarly, let D0 = −aD0 · [ρ0 ] − bD0 · [ρ1 ] for some aD0 , bD0 ∈ Z. Hence   hu, ρ0 i ≥ aD + aD0 , E(D) + ν(D0 ) ⊆ PD + ν(D0 ) = u ∈ MQ | . hu, ρ1 i ≥ bD + bD0 Now we want lattice points in the interior of the right hand side. Taking u ∈ int(PD + ν(D0 )), u evaluates to an integer with both ρ0 and ρ1 . Since it is not on the boundary of PD + ν(D0 ), we have hu, ρ0 i ≥ aD + aD0 + 1, and hu, ρ1 i ≥ bD + bD0 + 1. 13 This corresponds exactly to adding the vertex of the canonical divisor K = −[ρ0 ] − [ρ1 ]. We obtain [E(D) + ν(D0 )] ∩ M ⊆ PD + ν(D0 ) + ν(K). Intersecting the right hand side with E(D) + ν(D0 ) preserves this relation. As a final step, we note that we can replace PD by E(D). One then recognizes this intersection as link(D) + ν(D0 ). Proof of Proposition 5.3. Inserting the formula for tor and ext in terms of E(D) and T(D), we use the formula of Proposition 5.6 to obtain: tor(D, D0 ) ∩ M = [T(D) + ν(D0 )] ∩ M = [link(D) + ν(D0 ) − ν(K)] ∩ M = [E(D) − ν(K − D0 )] ∩ M = − ext(D, K − D0 ) ∩ M. Inserting Remark 5.2 finishes the proof. 6 Main theorems Theorem 6.1. Let D and D0 be two Weil divisors on a cyclic quotient singularity. Then Ext1 (D, K − D0 ) = Ext1 (D0 , K − D). Proof. We want to prove the equality of the lattice points of the respective supports, i.e. ext(D, K − D0 ) ∩ M = ext(D0 , K − D) ∩ M. The trick is to show that there are no lattice points in the respective complements. Since this is symmetric we will just show   ext(D0 , K − D)\ ext(D, K − D0 ) ∩ M = ∅. We reverse the sign and insert the definition of E(D) to get − ext(D, K − D0 ) = ν(−K + D0 ) + E(D) = (ν(−K + D + D0 ) + int(σ ∨ ))\ r [ (ν(D0 − K) + ui + int σ ∨ ), i=0 where {u0 , . . . , ur } = G(D). Both − ext(D, K − D0 ) and − ext(D0 , K − D) result from ν(−K + D + D0 ) + int(σ ∨ ) by cutting off certain pieces at the top. Inserting the equation for − ext(D, K − D0 ), we can rephrase this as an intersection, i.e. − ext(D0 , K − D)\ − ext(D, K − D0 ) = − ext(D0 , K − D) ∩ r [ (ν(D0 ) − ν(K) + ui + int σ ∨ ). i=0 14 The set − ext(D0 , K − D) is a shift of E(D0 ). Thus, we can replace ν(D0 ) + ui + int σ ∨ by ui + E(D0 ) in the above intersection. Hence, 0 0 − ext(D , K − D)\ − ext(D, K − D ) ⊆ = r [ (− ν(K) + ui + E(D0 )) i=0 r [ − ext(D0 [−ui ], K). i=0 Since D0 is Q-Cartier and hence, MCM, we know that Ext(D0 , K) = 0, which stays true under M -shifts of D0 . Thus, −(ext(D0 [−ui ], K) ∩ M ) = ∅ for all i = 0, . . . , r, and we are done. Finally, we show the duality of Ext and Tor. Theorem 6.2. Let D and D0 be two Weil divisors on a cyclic quotient singularity. Then Exti+2 (D, K − D0 ) = (Tori (D, D0 ))∨ for i > 0. Proof. Using the recursion of Remark 2.9 on both sides this is a consequence of Lemma 6.3 below. Lemma 6.3. Given two Weil divisors D and D0 , we have the following equality of R-modules: Ext3 (D, K − D0 ) = (Tor1 (D, D0 ))∨ . Proof. First, we use the description of Tor1 developed in Proposition 4.2. Then we insert the formula for the Matlis dual of Ext1 of Proposition 5.3.   M M  Tor1 (D, D0 ) = C{tor(W ij , D0 )} W i ∈inQ D W ij ∈inQ W i  ∼ = M  M  W i ∈inQ D (Ext1 (W ij , K − D0 ))∨  . W ij ∈inQ W i Applying the recursion formula of Remark 2.9 for Ext3 , we obtain the desired result. Note that although Theorem 6.2 shows the symmetry of Theorem 6.1 for i > 2, it does not generalize Theorem 6.1, as it does not imply the i = 1 case. In particular, the case i = 2 remains open. 15 References [Alt98] Klaus Altmann. “P-resolutions of cyclic quotients from the toric viewpoint.” English. In: Singularities. The Brieskorn anniversary volume. Proceedings of the conference dedicated to Egbert Brieskorn on his 60th birthday, Oberwolfach, Germany, July 1996. Basel: Birkhäuser, 1998, pp. 241–250. [BPS98] Dave Bayer, Irena Peeva and Bernd Sturmfels. “Monomial resolutions.” English. In: Math. Res. Lett. 5.1-2 (1998), pp. 31–46. [Chr91] Jan Arthur Christophersen. “On the components and discriminant of the versal base space of cyclic quotient singularities.” English. In: Symmetric Lagrangian singularities and Gauss maps of theta divisors. 1991, pp. 81–92. [CLS11] David A. Cox, John B. Little and Henry K. Schenck. Toric varieties. English. Providence, RI: American Mathematical Society (AMS), 2011, pp. xxiv + 841. [Eis80] David Eisenbud. “Homological algebra on a complete intersection, with an application to group representations”. In: Transactions of the American Mathematical Society 260.1 (1980), pp. 35–64. [Kas15] Lars Kastner. “Ext on affine toric varieties”. available at http://www.diss. fu-berlin.de/diss/receive/FUDISS_thesis_000000101520. PhD thesis. Freie Universität Berlin, 2015. [MS05] Ezra Miller and Bernd Sturmfels. Combinatorial commutative algebra. English. New York, NY: Springer, 2005, pp. xiv + 417. [Rie81] Oswald Riemenschneider. “Zweidimensionale Quotientensingularitaeten: Gleichungen und Syzygien.” German. In: Arch. Math. 37 (1981), pp. 406–417. [Ste91] Jan Stevens. “On the versal deformation of cyclic quotient singularities.” English. In: Symmetric Lagrangian singularities and Gauss maps of theta divisors. 1991, pp. 302–319. [Tay66] Diana Kahn Taylor. “Ideals generated by monomials in an R-sequence”. PhD thesis. University of Chicago, Department of Mathematics, 1966. [Wun87] Jürgen Wunram. “Reflexive modules on cyclic quotient surface singularities”. In: Singularities, representation of algebras, and vector bundles. Springer, 1987, pp. 221–231. 16
0math.AC
Seeding the Initial Population of Multi-Objective Evolutionary Algorithms: A Computational Study Tobias Friedricha,, Markus Wagner*b arXiv:1412.0307v1 [cs.NE] 30 Nov 2014 a Friedrich-Schiller-Universität Jena, Germany b University of Adelaide, Australia Abstract Most experimental studies initialize the population of evolutionary algorithms with random genotypes. In practice, however, optimizers are typically seeded with good candidate solutions either previously known or created according to some problem-specific method. This seeding has been studied extensively for single-objective problems. For multi-objective problems, however, very little literature is available on the approaches to seeding and their individual benefits and disadvantages. In this article, we are trying to narrow this gap via a comprehensive computational study on common real-valued test functions. We investigate the effect of two seeding techniques for five algorithms on 48 optimization problems with 2, 3, 4, 6, and 8 objectives. We observe that some functions (e.g., DTLZ4 and the LZ family) benefit significantly from seeding, while others (e.g., WFG) profit less. The advantage of seeding also depends on the examined algorithm. Keywords: Multi-objective optimization, approximation, comparative study, limited evaluations 1. Introduction In many real-world applications trade-offs between conflicting objectives play a crucial role. As an example, consider route planning, where one objective might be travel time and another fuel consumption. For such problems, we need specialized optimizers that determine the Pareto front of mutually ∗ Corresponding author. Phone: +61 8 8313 5405, fax: +61 8 8313 4366, email: [email protected]. Preprint submitted to Elsevier December 2, 2014 non-dominated solutions. There are several established evolutionary multiobjective evolutionary algorithms (MOEA) and many comparisons on various test functions. However, most of them start with random initial solutions. In practice, however, a good initial seeding can make problem solving approaches competitive that would otherwise be inferior. If prior knowledge exists or can be generated at a low computational cost, good initial estimates may generate better solutions with faster convergence. For single-objective evolutionary algorithms, methods such as seeding have been studied for about two decades; see, e.g., [17, 20, 23, 29, 39] for studies and examples (see [26] for a recent categorization). For example, the effects of seeding for the Traveling Salesman Problem (TSP) and the jobshop scheduling problem (JSSP) were investigated in [31]. The algorithms were seeded with known good solutions in the initial population, and it was found that the results were significantly improved on the TSP but not on the JSSP. To investigate the influence of seeding on the optimisation, a varying percentage of seeding was used, ranging from 25 to 75%. Interestingly, it was also pointed out that a 100% seed is not necessarily very successful on either problems [27]. This is one of the very few reported that seeding can in some cases beneficial to the optimisation process, but not necessarily always is. In [21] a seeding technique for dynamic environments was investigated. There, the population was seeded when a change in the objective landscape arrived, aiming at a faster convergence to the new global optimum. Again, some of the investigated seeding approaches were more successful than others. One of the very few studies that can be found on seeding techniques for MOEAs is the one performed by Hernandez-Diaz et al. [22]. There, seeds were created using gradient-based information. These were then fed into NSGA-II [10] and the quality was assessed on the benchmark family ZDT [42]. The results indicate that the proposed approach can produce a significant reduction in the computational cost of the approach. In general, seeding is not well documented for multi-objective problems, even for real-world problems. If seeding is done, then typically the approach is outlined and used with the comment that it worked in “preliminary experiments”—the reader is left in the dark on the design process behind the used seeding approach. This is quite striking as one expects that humans can construct a few solutions by hand, even if they do not represent the ranges of the objectives well. The least that one should be able to do is to reuse existing designs, and to modify these iteratively towards extremes. Nevertheless, even this manual seeding is rarely reported. 2 In this paper, we are going to investigate the effects of two structurally different seeding techniques for five algorithms on 48 multi-objective optimization (MOO) problems. Seeding As seeding we use the weighted-sum method, where the trade-off preferences are specified by non-negative weights for each objective. Solutions to these weighted-sums of objectives can be found with an arbitrary classical single-objective evolutionary algorithm. In our experiments we use the CMA-ES [18]. Details of the two studied weighting schemes are presented in Section 2.1. Quality measure There are different ways to measure the quality of the solutions. A recently very popular measure is the hypervolume indicator, which measures the volume of the objective space dominated by the set of solutions relative to a reference point [41]. Its disadvantage is its high computational complexity [3, 4] and the arbitrary choice of the reference point. We instead consider the mathematically well founded approximation constant. In fact, it is known that the worst-case approximation obtained by optimal hypervolume distributions is asymptotically equivalent to the best worst-case additive approximation constant achievable by all sets of the same size [6]. For a rigorous definition, see Section 2. This notion of multi-objective approximation was introduced by several authors [15, 19, 30, 34, 35] in the 80’s and its theoretical properties have been extensively studied [9, 12, 32, 33, 36]. Algorithms We use the jMetal framework [13] and its implementation of NSGA-II [10], SPEA2 [43], SMS-EMOA [14], and IBEA [40]. Additionally to these more classical MOEAs, we also study AGE [7], which aims at directly minimizing the approximation constant and has shown to perform very well for larger dimensions [37, 38]. For each of these algorithms we compare their regular behavior after a certain number of iterations with their performance when initialized with a certain seeding. Benchmark families We compare the aforementioned algorithms on four common families of benchmark functions. These are DTLZ [11], LZ09 [28], WFG [24], 3 and ZDT [42]. While the last three families only contain two- and threedimensional problems, DTLZ can be scaled to an arbitrary number of dimensions. 2. Preliminaries We consider minimization problems with d objective functions, where d ≥ 2 holds. Each objective function fi : S 7→ R, 1 ≤ i ≤ d, maps from the considered search space S into the real values. In order to simplify the presentation we only work with the dominance relation on the objective space and mention that this relation transfers to the corresponding elements of S. For two points x = (x1 , . . . , xd ) and y = (y1 , . . . , yd ), with x, y ∈ Rd we define the following dominance relation: x  y :⇔ xi ≤ yi for all 1 ≤ i ≤ d, x ≺ y :⇔ x  y and x 6= y. We assess the seeding schemes and algorithms by their achieved additive approximation of the (known) Pareto front. We use the following definition. Definition 1. For finite sets S, T ⊂ Rd , the additive approximation of T with respect to S is defined as α(S, T ) := max min max (si − ti ). s∈S t∈T 1≤i≤d We measure the approximation constant with respect to the known Pareto front of the test functions. The better an algorithm approximates a Pareto front, the smaller the additive approximation value is. Perfect approximation is achieved if the additive approximation constant becomes 0. However, the approximation constant achievable for a (finite) population with respect to a continuous Pareto front (consisting of an infinite number of points) is always strictly larger than 0. It depends on the fitness function what is the smallest possible approximation constant achievable with a population of bounded size. 2.1. Seeding For the task of computing the seeds, we employ an evolutionary strategy (ES), because it “self-adapts” the extent to which it perturbs decision variables when generating new solutions based on previous ones. The Covariance 4 Matrix Adaptation based evolutionary strategy (CMA-ES) [18] self-adapts the covariance matrix of a multivariate normal distribution. This normal distribution is then used to sample from the multidimensional search space where each variate is a search variable. The co-variance matrix allows the algorithm to respect the correlations between the variables making it a powerful evolutionary search algorithm. P To compute a seed, a (2,4)-CMA-ES minimizes di=1 ai fi (x), where the fi (x) are the objective values of the solution x. In preliminary testing, we noticed that larger population values for CMA-ES tended to result in seeds with better objective values. This came at the cost of significantly increased evaluation budgets, as the learning of the correlations takes longer. Our choice does not necessarily represent the optimal choice across all 48 benchmark functions, however, it is our take on striking a balance between (1) investing evaluations in the seeding and (2) investing evaluations in the regular multi-objective optimization. Note that large computational budgets for the seeding have the potential to put the unseeded approaches at a disadvantage, if the final performance assessment is not done carefully. The number of seeds, the coefficients used, and the budget of evaluations is determined by the seeding approaches, which we will describe in the following. CornersAndCentre: A total of 10,000 evaluations is equally distributed over the generation of d + 1 seeds. The rest of the population is generated randomly. For the i-th seed, 1 ≤ i ≤ d, the coefficients aj (1 ≤ j ≤ d) are set in the following way: ( 10 if i = j, ai = 1 otherwise. Thus, we prevent the seeding mechanism from treating the optimization problem in a purely single-objective way by entirely neglecting any trade-off relationships between the objectives.1 Lastly, the (d + 1)-th weight vector uses equal weights of 1 per objective. This way, we aim at getting a seed that is relatively central with respect to the others. LinearCombinations: Here a total of 100 seeds is generated, where each seed is the result of running CMA-ES for 1,000 evaluations. The coeffi1 If the ranges of the objective values differ significantly, then the coefficients should be adjusted accordingly. 5 cients of the linear combinations are integer values and we construct them in the following way. First, we consider all “permutations” of coefficients with ai = 1 for one coefficient and aj6=i = 0 for all others. Then, we consider all permutations where two coefficients have the value 1, then those where three coefficients have the value 1, and so on. When all such permutations that are based on {0, 1} are considered, we consider all permutations based on {0, 1, 2}, then based on {0, 1, 3}, then based on {0, 2, 3}, and so on. Consequently, we achieve a better distribution of points in the objective space. This comes, however, at the increased initial computational cost. Furthermore, the budget per seed is lower than in the CornersAndCentre approach, which typically results in less optimized seeds. NoSeed: All solutions of the initial population are generated randomly. This is the approach that is typically used for the generation of the initial population. 2.2. Evolutionary Multi-Objective Optimization Algorithms In the following, we outline the five optimization algorithms for which we will later-on investigate the benefits of seeding the initial populations. Many approaches try to produce good approximations of the true Pareto front by incorporating different preferences. For example, the environmental selection in NSGA-II [10] first ranks the individuals using non-dominated sorting. Then, in order to distinguish individuals with the same rank, the crowding distance metric is used, which prefers individuals from less crowded sections of the objective space. The metric value for each solution is computed by adding the edge lengths of the cuboids in which the solutions reside, bounded by the nearest neighbors. SPEA2 [43] works similarly. The raw fitness of the individuals according to Pareto dominance relations between them is calculated, and then a density measure to break the ties is used. The individuals that reside close together in the objective space are less likely to enter the archive of best solutions. In contrast to these two algorithms, IBEA [40] is a general framework, which uses no explicit diversity preserving mechanism. The fitness of individuals is determined solely based on the value of a predefined indicator. Typically, implementations of IBEA come with the epsilon indicator or the hypervolume indicator, where the latter measures the volume of the dominated portion of the objective space. SMS-EMOA [14] is a frequently used IBEA, which uses the hypervolume indicator directly in the search process. It is a steady-state algorithm that 6 uses non-dominated sorting as a ranking criterion, and the hypervolume as the selection criterion to discard the individual that contributes the least hypervolume to the worst-ranked front. While SMS-EMOA often outperforms its competition, its runtime unfortunately increases exponentially with the number of objectives. Nevertheless, with the use of fast approximation algorithms (e.g., [2, 5, 25]), this algorithm can be applied to solve problems with many objectives as well. Recently, approximation-guided evolution (AGE) [7] has been introduced, which allows to incorporate a formal notion (such as Definition 1) of approximation into a multi-objective algorithm. This approach is motivated by studies in theoretical computer science studying multiplicative and additive approximations for given multi-objective optimization problems [8, 9, 12, 36]. As the algorithm cannot have complete knowledge about the true Pareto front, it uses the best knowledge obtained so far during the optimization process. It stores an archive A consisting of the non-dominated objectives vectors found so far. Its aim is to minimize the additive approximation α(A, P ) of the population P with respect to the archive A. The experimental results presented in [7] show that given a fixed time budget it outperforms current state-of-the-art algorithms in terms of the desired additive approximation, as well as the covered hypervolume on standard benchmark functions. 3. Experimental Setup We use the jMetal framework [13], and our code for the seeding as well all used seeds are available online2 . As test problems we used the benchmark families DTLZ [11], ZDT [42], LZ09 [28], and WFG [24], We used the functions DTLZ 1-4, each with 30 function variables and with d ∈ {2, 4, 6, 8} objective values/dimensions. In order to investigate the benefits of seeding even in the long run, we limit the calculations of the algorithms to a maximum of 106 fitness evaluations and a maximum computation time of four hours per run. Note that the time restriction had to be used as the runtime of some algorithms increases exponentially with respect to the size of the objective space. AGE uses random parent selection; in all other algorithms parents are selected via a binary tournament. As variation operators, the polynomial 2 http://cs.adelaide.edu.au/~markus/publications.html 7 mutation and the simulated binary crossover [1] were applied, which are both used widely in MOEAs [10, 16, 43]. The distribution parameters associated with the operators were ηm = 20.0 and ηc = 20.0. The crossover operator is biased towards the creation of offspring that are close to the parents, and was applied with pc = 0.9. The mutation operator has a specialized explorative effect for MOO problems, and was applied with pm = 1/(number of decision variables). Population size was set to µ = 100 and λ = 100. Each setup was repeated 100 times. Note that these parameter settings are the default settings in the jMetal framework, and they can often be found in the literature, which makes a cross-comparison easier. To the best of our knowledge, this parameter setting does not favor any particular algorithm or put one at a disadvantage, even though individual algorithms can have differing optimal settings for individual problems. In a real-world scenario, if an algorithm is run several times (e.g. because of restarts), the seeding might be only calculated once. In this case, it might make sense to compare the unseeded and seeded variant of an algorithm with the same number of fitness evaluations. However, we observed the expected outcome that in this case seeding is almost always beneficial. We therefore consider a more difficult scenario where the optimization is only run once and the number of fitness function evaluations used for the seeding is deduced from the number of fitness evaluations available for the MOEA. As pointed out earlier, we assess the seeding schemes and algorithms using the additive approximation of the Pareto front. However, as it is difficult to compute the exact achieved approximation constant of a known Pareto front, we approximate it. For the quality assessment on the LZ, WFG and ZDT functions, we compute the achieved additive approximations with respect to the Pareto fronts given in the jMetal package. For the DTLZ functions, we draw one million points of the front uniformly at random. and then compute the additive approximation achieved for this set. We also measure the hypervolume for all experiments. As the behaviors of the five algorithms differ significantly, there is no single reference point that allows for a meaningful comparison of all functions. However, we observe the same qualitative comparison with the hypervolume as we do with the additive approximation. Therefore, we omit all hypervolume values in this paper, because the additive approximation constant gives a much better way to compare the results for these benchmark functions, where the Pareto fronts are known in advance. In addition to calculating the average ratio of the achieved approximation 8 constant with and without seeding, we also perform a non-parametric test on the significance of the observed behavior. For this, we compare the final approximation of the 100 runs without seeding and the 100 runs with seeding using the Wilcoxon-Mann-Whitney two-sample rank-sum test at the 95% confidence level. 4. Experimental Results Our results are summarized in Tables 1 and 2. They compare the approximation constant achieved with CornersAndCentre seeding (Table 1) and LinearCombinations seeding (Table 2) with the same number of iterations without seeding. As the seeding itself requires a number of fitness function evaluations (104 for CornersAndCentre and 105 for LinearCombinations), we allocate the seeded algorithms fewer fitness function evaluations. This makes it harder for the seeded algorithms to outperform its unseeded variant, as discussed above. Figures 1 and 2 show some representative charts how the approximation constant behaves over the runtime of the algorithms. First note that the approximation constant is mostly monotonically decreasing. As a smaller approximation constant corresponds to a better approximation of the Pareto front, this means that most algorithms achieve a better approximation over time. Exceptions are SPEA2 ( ), which is unable to handle the six dimensional variants of DTLZ, and NSGA-II ( ), which sometimes gets worse after a certain time. For most problems and algorithms, the total maximal number of fitness function evaluations (106 ) was enough such that the algorithms have converged. The small black circles in Figures 1 and 2 indicate the average approximation constant of the initial seeding after the number of fitness function evaluations needed to calculate it. Note that because of their specific selection schemes, some algorithms like SPEA2 ( ) and NSGA-II ( ) sometimes increase the approximation constant after the initial seeding (e.g. on LZ09 F1). Another surprising effect can be observed on LZ09 F2. There, seeding is disadvantageous to NSGA-II ( ), while it is advantageous to SPEA2 ( ). For all considered test problems (not only the ones shown in Figures 1 and 2), either AGE ( ) or SMS-EMOA ( ) reach the best approximation constant. However, for test problems with more than two or three dimensions (cf. Figure 1), SMS-EMOA ( ) fails due to the high computational cost of calculating the hypervolume. On some problems AGE ( ) does not finish all 9 iterations within 106 steps, but still achieves the best approximation constant (e.g. DTLZ1 6D and DTLZ4 6D). For all algorithms, both seedings are beneficial on some test functions. However, the generally more performant algorithms (AGE and SMS-EMOA) typically gain the most from both seedings. On some functions, these algorithms not only achieve a better approximation faster with seeding, but it seems that all best approximations can only be achieved with seeding (e.g. DTLZ4). On DTLZ4 2D the gap between the approximation constant achieved by SMS-EMOA ( ) with and without seeding is about two orders of magnitude, which is the difference between a very good approximation of the Pareto front and basically no approximation of the Pareto front. Tables 1 and 2 give a numerical comparison assuming that about 10% of the fitness evaluations are used for seeding. The shown numbers are the ratios of the median approximation constant without seeding to the median approximation constant with seeding. Values >1.00 indicate where seeding is beneficial in the median. We additionally show statistically significance based on the Wilcoxon-Mann-Whitney two-sample rank-sum test at the 95% confidence level. “>” marks statistically significant improvements, “<” marks statistically significant worsenings, “=” marks statistically insignificant findings. The ratios in Table 1 correspond to the approximation constants after 105 function evaluations in the left column of Figures 1 and 2. The ratios in Table 2 correspond to the approximation constants after 106 function evaluations in the right column of Figures 1 and 2. Counting only the statistically significant results over all functions and seedings, the tables show that the majority profits from the seeding. The algorithms which benefit the most are SPEA2 ( ) with 20ד>” and 11ד<”, AGE ( ) with 28ד>” and 21ד<”, and IBEA ( ) with 22ד>” and 17ד<”. There are significant differences depending on the test function. The LZ09 benchmark family profits the most: Summing up the significant results for all algorithms, there are 55ד>” and 18ד<”. Also for DTLZ4 there are 23ד>” and 8ד<”. The worst performance of the seeding is achieved on the rather difficult WFG functions: While the CornersAndCentre seeding achieves over all algorithms 10ד>” and 5ד<’, the LinearCombinations seeding only achieves 10ד>” and 28ד<”. We can do a similar analysis to assess the benefits of the investigated seeding approaches. We observe that over all algorithms the CornersAndCentre seeding yields in total 51ד>” and 36ד<’, which is a bit better than the LinearCombinations seeding which yields in total 62ד>” and 10 55ד<”. In order to answer the question whether this is statistically significant, we calculate the average rank of with and without seeding for each of the 100 runs, each of the 48 functions, and each of the 5 algorithms. With this combined data from all runs, functions and algorithms, the Wilcoxon-MannWhitney two-sample rank-sum test shows significance at the 95% confidence level that both seedings improve upon no seeding. 5. Conclusions Seeding can result in a significant reduction of the computational cost and the number of fitness function evaluations needed. We observe that there is an advantage on many common real-valued fitness functions even if computing an initial seeding reduces the number of fitness function evaluations available for the MOEA. For some functions we observe a dramatic improvement in quality and needed runtime (e.g., DTLZ4 and the LZ09 family). For practitioners, our results show that it can be worthwhile to apply some form of seeding (especially when evaluations are expensive), but also to investigate different MOEAs as well, as they have proven to benefit differently from seeding. While we observed that seeding can be very beneficial, our experiments could not reveal why this is the case for a particular combination of seeding, algorithm, and function landscape. To answer this, many parts have to be studied: the mappings that the benchmark functions create from the search spaces into the objective spaces, the connectedness between different local Pareto fronts, the adequacy of using CMA-ES in the seeding procedure, and much more. As a next step towards this goal, we propose to investigate seeding for combinatorial optimization problems. Acknowledgements The research leading to these results has received funding from the Australian Research Council (ARC) under grant agreement DP140103400 and from the European Union Seventh Framework Programme (FP7/2007-2013) under grant agreement no 618091 (SAGE). 11 References [1] R. B. Agrawal and K. Deb. Simulated binary crossover for continuous search space. Technical report, 1994. [2] J. Bader, K. Deb, and E. Zitzler. Faster hypervolume-based search using Monte Carlo sampling. In Multiple Criteria Decision Making for Sustainable Energy and Transportation Systems (MCDM ’10), Vol. 636 of Lecture Notes in Economics and Mathematical Systems, pp. 313–326. Springer, 2010. [3] K. Bringmann and T. Friedrich. Parameterized average-case complexity of the hypervolume indicator. In 15th Annual Conference on Genetic and Evolutionary Computation Conference (GECCO ’13), pp. 575–582. ACM Press, 2013. [4] K. Bringmann and T. Friedrich. Approximating the volume of unions and intersections of high-dimensional geometric objects. Computational Geometry: Theory and Applications, 43:601–610, 2010. [5] K. Bringmann and T. Friedrich. Approximating the least hypervolume contributor: NP-hard in general, but fast in practice. Theoretical Computer Science, 425:104–116, 2012. [6] K. Bringmann and T. Friedrich. Approximation quality of the hypervolume indicator. Artificial Intelligence, 195:265–290, 2013. [7] K. Bringmann, T. Friedrich, F. Neumann, and M. Wagner. Approximation-guided evolutionary multi-objective optimization. In Proc. 22nd International Joint Conference on Artificial Intelligence (IJCAI ’11), pp. 1198–1203, Barcelona, Spain, 2011. IJCAI/AAAI. [8] T. C. E. Cheng, A. Janiak, and M. Y. Kovalyov. Bicriterion single machine scheduling with resource dependent processing times. SIAM J. on Optimization, 8:617–630, 1998. [9] C. Daskalakis, I. Diakonikolas, and M. Yannakakis. How good is the Chord algorithm? In 21st Annual ACM-SIAM Symposium on Discrete Algorithms (SODA ’10), pp. 978–991, 2010. 12 [10] K. Deb, A. Pratap, S. Agrawal, and T. Meyarivan. A fast and elitist multiobjective genetic algorithm: NSGA-II. IEEE Trans. Evolutionary Computation, 6:182–197, 2002. [11] K. Deb, L. Thiele, M. Laumanns, and E. Zitzler. Scalable test problems for evolutionary multiobjective optimization. In Evolutionary Multiobjective Optimization, Advanced Information and Knowledge Processing, pp. 105–145. 2005. [12] I. Diakonikolas and M. Yannakakis. Small approximate Pareto sets for biobjective shortest paths and other problems. SIAM Journal on Computing, 39:1340–1371, 2009. [13] J. J. Durillo, A. J. Nebro, and E. Alba. The jMetal framework for multiobjective optimization: Design and architecture. In IEEE Congress on Evolutionary Computation (CEC ’10), pp. 4138–4325, 2010. [14] M. T. M. Emmerich, N. Beume, and B. Naujoks. An EMO algorithm using the hypervolume measure as selection criterion. In 3rd International Conference on Evolutionary Multi-Criterion Optimization (EMO ’05), pp. 62–76. Springer, 2005. [15] Y. G. Evtushenko and M. Potapov. Methods of numerical solution of multicriterion problem. In Soviet mathematics – doklady, Vol. 34, pp. 420–423, 1987. [16] M. Gong, L. Jiao, H. Du, and L. Bo. Multiobjective immune algorithm with nondominated neighbor-based selection. Evolutionary Computation, 16:225–255, 2008. [17] J. J. Grefenstette. Incorporating problem specific knowledge into genetic algorithms. Genetic algorithms and simulated annealing, 4:42–60, 1987. [18] N. Hansen. The CMA evolution strategy: a comparing review. In Towards a new evolutionary computation. Advances in estimation of distribution algorithms, pp. 75–102. Springer, 2006. [19] P. Hansen. Bicriterion path problems. In Multiple Criteria Decision Making: Theory and Applications, Vol. 177 of Lecture Notes in Economics and Mathematical Systems, pp. 109–127, 1980. 13 [20] G. R. Harik and D. E. Goldberg. Linkage learning through probabilistic expression. Computer Methods in Applied Mechanics and Engineering, 186:295–310, 2000. [21] I. Hatzakis and D. Wallace. Dynamic multi-objective optimization with evolutionary algorithms: a forward-looking approach. In Proc. 8th Annual Conference on Genetic and Evolutionary Computation Conference (GECCO ’06), pp. 1201–1208. ACM Press, 2006. [22] A. Hernandez-Diaz, C. A. Coello Coello, F. Perez, R. Caballero, J. Molina, and L. Santana-Quintero. Seeding the initial population of a multi-objective evolutionary algorithm using gradient-based information. In Proc. Congress on Evolutionary Computation (CEC ’08), pp. 1617–1624. IEEE Press, 2008. [23] E. Hopper and B. Turton. An empirical investigation of meta-heuristic and heuristic algorithms for a 2d packing problem. European Journal of Operational Research, 128:34–57, 2001. [24] S. Huband, L. Barone, R. L. While, and P. Hingston. A scalable multiobjective test problem toolkit. In 3rd International Conference on Evolutionary Multi-Criterion Optimization (EMO ’05), Vol. 3410 of LNCS, pp. 280–295. Springer, 2005. [25] H. Ishibuchi, N. Tsukamoto, Y. Sakane, and Y. Nojima. Indicator-based evolutionary algorithm with hypervolume approximation by achievement scalarizing functions. In 12th Annual Conference on Genetic and Evolutionary Computation Conference (GECCO ’10), pp. 527–534. ACM Press, 2010. [26] B. Kazimipour, X. Li, and A. Qin. A review of population initialization techniques for evolutionary algorithms. In Proc. Congress on Evolutionary Computation (CEC ’14), pp. 2585–2592, 2014. [27] E. Keedwell and S.-T. Khu. A hybrid genetic algorithm for the design of water distribution networks. Engineering Applications of Artificial Intelligence, 18:461–472, 2005. [28] H. Li and Q. Zhang. Multiobjective optimization problems with complicated pareto sets, MOEA/D and NSGA-II. IEEE Trans. on Evolutionary Computation, 13:284–302, 2009. 14 [29] C.-F. Liaw. A hybrid genetic algorithm for the open shop scheduling problem. European Journal of Operational Research, 124:28–42, 2000. [30] P. Loridan. ε-solutions in vector minimization problems. Journal of Optimization Theory and Applications, 43:265–276, 1984. 10.1007/BF00936165. [31] S. Oman and P. Cunningham. Using case retrieval to seed genetic algorithms. International Journal of Computational Intelligence and Applications, 1:71–82, 2001. [32] C. H. Papadimitriou and M. Yannakakis. On the approximability of trade-offs and optimal access of web sources. In 41st Annual Symposium on Foundations of Computer Science (FOCS ’00), pp. 86–92. IEEE Press, 2000. [33] C. H. Papadimitriou and M. Yannakakis. Multiobjective query optimization. In 20th ACM Symposium on Principles of Database Systems (PODS ’01), pp. 52–59, 2001. [34] H. Reuter. An approximation method for the efficiency set of multiobjective programming problems. Optimization, 21:905–911, 1990. [35] G. Ruhe and B. Fruhwirth. ε-optimality for bicriteria programs and its application to minimum cost flows. Computing, 44:21–34, 1990. [36] S. Vassilvitskii and M. Yannakakis. Efficiently computing succinct tradeoff curves. Theor. Comput. Sci., 348:334–356, 2005. [37] M. Wagner and T. Friedrich. Efficient parent selection for approximation-guided evolutionary multi-objective optimization. In Proc. IEEE Congress on Evolutionary Computation (CEC ’13), pp. 1846–1853. IEEE, 2013. [38] M. Wagner and F. Neumann. A fast approximation-guided evolutionary multi-objective algorithm. In Proc. 15th Annual Conference on Genetic and Evolutionary Computation Conference (GECCO ’13), pp. 687–694. ACM, 2013. [39] M. Yang, X. Zhang, X. Li, and X. Wu. A hybrid genetic algorithm for the fitting of models to electrochemical impedance data. Journal of Electroanalytical Chemistry, 519:1–8, 2002. 15 [40] E. Zitzler and S. Künzli. Indicator-based selection in multiobjective search. In 8th International Conference on Parallel Problem Solving from Nature (PPSN VIII), Vol. 3242 of LNCS, pp. 832–842. Springer, 2004. [41] E. Zitzler and L. Thiele. Multiobjective evolutionary algorithms: A comparative case study and the strength Pareto approach. IEEE Trans. Evolutionary Computation, 3:257–271, 1999. [42] E. Zitzler, K. Deb, and L. Thiele. Comparison of Multiobjective Evolutionary Algorithms: Empirical Results. Evolutionary Computation, 8: 173–195, 2000. [43] E. Zitzler, M. Laumanns, and L. Thiele. SPEA2: Improving the strength Pareto evolutionary algorithm for multiobjective optimization. In Evolutionary Methods for Design, Optimisation and Control with Application to Industrial Problems (EUROGEN 2001), pp. 95–100, 2002. 16 DTLZ1 2D 102 102 101 101 100 100 10−1 10−1 10−2 10−2 DTLZ1 6D 10−3 3 10 103 DTLZ4 2D 105 106 10−3 3 10 103 102 102 101 101 100 100 10−1 10−1 103 104 105 106 103 100 100 10−1 10−1 10−2 10−2 103 DTLZ4 6D 104 104 105 106 100 10−1 3 10 103 104 105 106 104 105 106 104 105 106 104 105 106 100 104 105 106 10−1 3 10 Figure 1: Comparison of seeding with CornersAndCentre (left column) and LinearCombinations (right column) on DTLZ1 and DTLZ4 for two and six dimensions. The approximation constant of the Pareto front (y-axis) is shown as a function of the number of fitness function evaluations (x-axis) for the seeded (×) and unseeded (+) versions of AGE ( ), IBEA ( ), NSGA-II ( ), SMS-EMOA ( ), and SPEA2 ( ). The figures show the average of 100 repetitions each. Smaller approximation constants indicate a better approximation of the front. The plots for the seeded versions are shifted by the number of iterations required by the CornersAndCentre seeding (104 iterations) and the LinearCombinations seeding (105 iterations); circles indicate the approximation of the initial seeding. The shaded areas illustrate the difference between seeding and no seeding for a specific algorithm. Plots end prematurely if the time limit of four hours was reached. ZDT1 100 100 10−1 10−1 10−2 10−2 ZDT2 10−3 3 10 105 106 10−3 3 10 100 100 10−1 10−1 10−2 10−2 10−3 3 10 LZ09 F1 104 104 105 106 10−3 3 10 100 100 10−1 10−1 10−2 10−2 103 104 105 106 103 100 10−1 10−1 105 106 104 105 106 104 105 106 104 105 106 LZ09 F2 100 104 103 104 105 106 103 Figure 2: Comparison of seeding with CornersAndCentre (left column) and LinearCombinations (right column) on ZDT1, ZDT2, LZ09 F1 and LZ09 F2. The approximation constant of the Pareto front (y-axis) is shown as a function of the number of fitness function evaluations (x-axis) for the seeded (×) and unseeded (+) versions of AGE ( ), IBEA ( ), NSGA-II ( ), SMS-EMOA ( ), and SPEA2 ( ). The figures show the average of 100 repetitions each. Smaller approximation constants indicate a better approximation of the front. The plots for the seeded versions are shifted by the number of iterations required by the CornersAndCentre seeding (104 iterations) and the LinearCombinations seeding (105 iterations); circles indicate the approximation of the initial seeding. The shaded areas illustrate the difference between seeding and no seeding for a specific algorithm. Plots end prematurely if the time limit of four hours was reached. Function DTLZ1 2D DTLZ1 4D DTLZ1 6D DTLZ1 8D DTLZ2 2D DTLZ2 4D DTLZ2 6D DTLZ2 8D DTLZ3 2D DTLZ3 4D DTLZ3 6D DTLZ3 8D DTLZ4 2D DTLZ4 4D DTLZ4 6D DTLZ4 8D LZ09 F1 LZ09 F2 LZ09 F3 LZ09 F4 LZ09 F5 LZ09 F6 LZ09 F7 LZ09 F8 LZ09 F9 AGE ( ) 0.99 = 0.94 < 0.18 < 1.02 = 0.96 < 1.08 > 0.95 < 0.85 < 0.85 < 0.97 < 0.09 < 0.86 < 0.96 < 4.73 > 1.08 > 1.03 > 3.56 > 1.47 > 1.06 > 6.36 > 1.13 > 1.14 > 1.52 > 0.99 = 2.16 > IBEA NSGA-II SMS-EMOA SPEA2 ( ) 1.00 = 0.98 = 1.00 = 0.98 = 1.01 = 1.00 = 1.00 = 1.00 = 1.00 = 1.00 = 1.00 = 1.00 = 1.14 > 3.79 > 2.22 > 1.79 > 1.50 > 0.97 < 1.03 > 4.11 > 1.07 > 1.00 > 1.80 > 1.47 > 1.30 > ( ) 1.00 = 0.99 = 1.00 = 1.00 = 1.00 = 1.00 = 1.00 = 0.98 = 1.00 = 1.00 = 0.99 = 1.00 = 1.00 > 1.00 > 1.00 = 1.01 = 1.05 > 0.73 < 0.99 = 0.96 < 0.98 = 1.00 = 0.88 < 1.09 = 0.81 < ( ) 1.00 = 1.44 > – – 0.99 < 1.01 > – – 1.00 = 0.99 = – – 1.02 > 5.24 > 1.91 > – 1.04 > 1.47 > 1.05 > 5.98 > 1.06 > 1.09 > 1.75 > 1.17 > 2.23 > ( ) 1.02 = 1.05 = 1.01 = 0.98 < 1.00 = 1.00 = 1.00 = 1.00 > 1.02 = 0.95 = 1.00 = 1.03 > 1.05 > 2.91 > 0.98 < 1.01 = 0.97 = 1.50 > 1.01 = 6.49 > 1.04 > 1.02 > 1.58 > 0.99 = 2.22 > Function ZDT1 ZDT2 ZDT3 ZDT4 ZDT6 WFG1 WFG1 WFG2 WFG2 WFG3 WFG3 WFG4 WFG4 WFG5 WFG5 WFG6 WFG6 WFG7 WFG7 WFG8 WFG8 WFG9 WFG9 2D 3D 2D 3D 2D 3D 2D 3D 2D 3D 2D 3D 2D 3D 2D 3D 2D 3D AGE ( ) 0.99 < 1.00 = 1.02 = 1.01 = 1.01 = 1.00 = 1.01 = 0.01 < 1.00 = 1.00 = 0.98 = 0.99 = 0.99 = 1.00 = 0.98 = 0.06 < 0.38 < 1.01 > 1.00 = 0.60 < 0.87 < 1.01 = 1.01 > IBEA NSGA-II SMS-EMOA SPEA2 ( ) 1.01 = 1.02 = 1.01 = 0.97 = 1.05 > 1.01 = 0.99 = 0.05 < 0.96 = 1.00 = 0.91 < 1.00 = 0.99 = 1.00 > 1.00 = 0.15 < 0.57 < 0.90 < 1.00 = 0.56 < 0.82 < 0.89 < 1.01 = ( ) 1.00 = 1.00 < 1.00 = 1.00 = 1.00 > 1.00 = 1.01 > 0.47 < 1.00 = 1.00 = 1.00 = 1.00 = 1.00 = 1.00 > 1.00 > 0.73 < 0.86 < 1.00 > 1.00 = 0.96 < 1.21 > 1.00 = 1.00 = ( ) 1.00 = 1.01 = 0.99 < 1.01 = 1.00 = 1.07 = 1.01 > 0.01 < 1.00 = 1.00 = 1.01 > 1.00 = 1.00 = 1.00 = 1.00 = 0.06 < 0.41 < 0.99 < 1.00 = 1.00 < 0.99 < 1.01 = 1.02 > Table 1: Summary of our results for the improvement through LinearCombinations seeding. We compare the default strategy NoSeed with 106 fitness function evaluations and LinearCombinations seeding, which uses 105 fitness function evaluations, plus 9·105 fitness function evaluations. The table shows the ratio of the median approximation constant of NoSeed divided by the median approximation constant of LinearCombinations (100 independent runs each). Values >1.00 indicate where LinearCombinations achieves a better additive approximation, as the default strategy’s outcome is in the dividend. To facilitate qualitative observations, we show only two decimal place. “>” marks statistically significant improvements, “<” marks statistically significant worsenings, “=” marks statistically insignificant findings. In case a MOEA needed more than 4h time, the approximation constant after 4h is used. Dashes indicate scenarios where not even the first iteration of the algorithm was completed within the allotted 4h. ( ) 0.98 = 1.02 = 1.00 = 0.99 = 1.01 = 1.00 = 1.01 = 0.02 < 1.02 = 1.00 = 0.97 = 0.99 = 1.01 = 1.00 = 0.98 = 0.09 < 0.63 < 1.00 = 1.00 = 1.00 < 0.98 < 1.02 = 1.00 = Function DTLZ1 2D DTLZ1 4D DTLZ1 6D DTLZ1 8D DTLZ2 2D DTLZ2 4D DTLZ2 6D DTLZ2 8D DTLZ3 2D DTLZ3 4D DTLZ3 6D DTLZ3 8D DTLZ4 2D DTLZ4 4D DTLZ4 6D DTLZ4 8D LZ09 F1 LZ09 F2 LZ09 F3 LZ09 F4 LZ09 F5 LZ09 F6 LZ09 F7 LZ09 F8 LZ09 F9 AGE ( ) 0.99 = 1.00 = 4.06 > 1.03 > 1.00 = 1.06 > 1.05 > 0.99 = 0.99 = 0.99 = 1.27 > 1.09 > 0.98 = 4.51 > 0.47 < 0.98 = 3.39 > 0.90 < 1.05 > 2.84 > 0.97 < 0.94 < 1.08 > 1.07 > 1.76 > IBEA NSGA-II SMS-EMOA SPEA2 ( ) 1.01 = 1.01 = 1.00 = 0.97 = 1.00 = 1.01 = 0.99 < 1.00 = 1.00 = 1.00 = 1.00 = 1.00 < 1.13 > 0.99 < 0.97 < 0.97 < 1.57 > 1.03 > 0.99 = 2.46 > 0.91 < 1.00 > 0.90 > 1.69 > 1.55 > ( ) 1.01 = 1.00 = 1.00 = 1.01 > 1.00 = 1.00 = 0.99 = 1.03 = 1.00 = 1.00 = 0.99 = 1.00 = 1.00 > 0.99 = 1.00 = 1.05 > 1.06 > 0.93 < 0.93 < 1.03 = 1.02 = 1.00 = 0.93 < 0.74 < 0.83 < ( ) 1.00 = 0.73 < – – 1.00 = 1.00 = – – 0.99 = 0.34 < – – 1.03 > 5.12 > 1.17 > – 1.00 = 1.08 > 1.02 = 2.97 > 0.89 < 0.89 < 1.29 > 1.33 > 1.68 > ( ) 1.01 = 0.96 = 1.02 = 0.99 = 1.02 = 1.01 = 0.99 = 1.01 = 1.01 = 0.95 = 0.98 = 1.02 > 1.05 > 1.00 = 1.05 > 1.00 = 0.98 = 1.06 > 0.97 = 3.49 > 0.88 < 0.28 < 1.18 > 1.10 > 1.70 > Function ZDT1 ZDT2 ZDT3 ZDT4 ZDT6 WFG1 WFG1 WFG2 WFG2 WFG3 WFG3 WFG4 WFG4 WFG5 WFG5 WFG6 WFG6 WFG7 WFG7 WFG8 WFG8 WFG9 WFG9 2D 3D 2D 3D 2D 3D 2D 3D 2D 3D 2D 3D 2D 3D 2D 3D 2D 3D AGE ( ) 0.99 < 1.02 = 1.01 = 0.99 = 1.01 = 1.02 > 1.00 = 0.98 = 1.00 = 1.00 = 1.01 = 1.00 = 1.00 = 1.00 = 0.99 = 0.93 = 1.01 = 1.01 = 1.00 = 1.02 = 1.18 = 1.00 = 1.00 = IBEA NSGA-II SMS-EMOA SPEA2 ( ) 1.01 = 1.02 = 0.99 = 0.98 = 1.03 = 1.01 = 0.98 < 1.00 = 0.93 = 1.00 = 1.00 = 1.00 = 0.98 = 1.02 > 1.00 = 0.95 = 0.99 = 1.00 = 1.02 > 0.70 < 1.00 = 1.03 = 1.01 = ( ) 1.00 = 1.00 = 1.00 = 1.00 = 1.00 > 0.87 = 1.00 = 1.00 = 1.00 = 1.00 = 1.00 = 1.00 = 1.00 = 1.00 > 1.00 > 1.00 = 1.00 < 1.00 = 1.00 = 0.96 > 1.21 > 1.00 = 1.00 = ( ) 0.99 < 1.01 > 0.99 = 1.01 = 1.00 = 1.06 > 1.00 = 1.01 = 1.00 = 1.00 = 1.00 = 1.01 > 1.00 = 1.00 = 1.00 = 0.90 = 1.00 = 0.99 < 1.00 = 1.00 = 1.00 = 0.99 = 1.00 = Table 2: Summary of our results for the improvement through CornersAndCentre seeding. We compare the default strategy NoSeed with 106 fitness function evaluations and CornersAndCentre seeding, which uses 104 fitness function evaluations, plus 9 · 105 fitness function evaluations. The table shows the ratio of the median approximation constant of NoSeed divided by the median approximation constant of CornersAndCentre (100 runs independent each). Values >1.00 indicate where CornersAndCentre achieves a better additive approximation, as the default strategy’s outcome is in the dividend. To facilitate qualitative observations, we show only two decimal place. “>” marks statistically significant improvements, “<” marks statistically significant worsenings, “=” marks statistically insignificant findings. In case a MOEA needed more than 4h time, the approximation constant after 4h is used. Dashes indicate scenarios where not even the first iteration of the algorithm was completed within the allotted 4h. ( ) 0.99 < 1.00 = 0.96 = 0.99 = 1.00 = 1.00 = 1.02 = 1.00 = 0.98 = 1.00 = 0.97 = 0.97 < 1.01 = 1.00 = 0.98 = 0.96 = 0.99 = 1.01 = 1.03 > 1.79 = 1.26 > 0.99 = 1.02 =
9cs.NE
arXiv:1802.08984v1 [cs.PL] 25 Feb 2018 Secure Serverless Computing Using Dynamic Information Flow Control KALEV ALPERNAS∗ , Tel Aviv University CORMAC FLANAGAN, UC Santa Cruz SADJAD FOULADI, Stanford University LEONID RYZHYK, VMware Research MOOLY SAGIV∗ , Tel Aviv University THOMAS SCHMITZ, UC Santa Cruz KEITH WINSTEIN, Stanford University The rise of serverless computing provides an opportunity to rethink cloud security. We present an approach for securing serverless systems using a novel form of dynamic information flow control (IFC). We show that in serverless applications, the termination channel found in most existing IFC systems can be arbitrarily amplified via multiple concurrent requests, necessitating a stronger termination-sensitive non-interference guarantee, which we achieve using a combination of static labeling of serverless processes and dynamic faceted labeling of persistent data. We describe our implementation of this approach on top of JavaScript for AWS Lambda and OpenWhisk serverless platforms, and present three realistic case studies showing that it can enforce important IFC security properties with low overhead. 1 INTRODUCTION In May 2017, the Equifax credit reporting agency suffered a security breach, leaking social security numbers and other personal information of 145.5 million consumers [34]. The breach, which exploited a code injection vulnerability in Apache Struts [49], became the latest in a series of high-profile attacks on public and private clouds compromising sensitive personal information of hundreds of million users [22, 23, 28, 33, 62, 65–68, 72, 73]. Most of these attacks can be traced down to two types of faults: misconfigurations and software vulnerabilities. The former include issues like incorrect database security attributes [28, 53, 61], the choice of weak authentication schemes [23], or the use of unpatched software [34]. The latter include code and SQL injections, file inclusions, directory traversals, etc. [21, 22, 72, 73]. Simply put, the enormous Trusted Computing Base (TCB) of modern cloud applications makes it intractable to enforce information security in these environments. A promising avenue to a smaller TCB lies in the use of information flow control (IFC)-based security [25, 54]. In the IFC world, information is protected by a global security policy that cannot be overridden by a misconfigured application. The policy explicitly and concisely captures constraints on end-to-end information flow through the system, e.g., “credit card numbers can only be exposed to appropriate card associations (e.g., Visa or MasterCard)”. The IFC system enforces the policy even for buggy or malicious applications, thus removing application code and configuration from the TCB of the cloud. In particular, an application that has been hijacked by a code injection attack should not be able to bypass the enforcement mechanism. This is in contrast to security models based on access control lists or capabilities, where, for instance, a compromised program running with database administrator privileges can easily leak the entire database to a remote attacker. Despite significant progress on IFC, it remains difficult to apply in real software. Dynamic IFC systems [8, 24, 29, 60] incur high runtime overhead. Static IFC [47, 48, 54, 71] systems shift the costs to development time, ∗ Work done while visiting VMware Research. usually via the use of type systems; however, they restrict the style of programming, which complicates their adoption. We demonstrate that IFC for cloud computing is not only feasible, but can be implemented with low overhead and for essentially unmodified applications. We achieve these properties by leveraging recent developments in cloud computing, namely, the rise of serverless computing [56]. Initially popularized by Amazon’s AWS Lambda [2], serverless computing is rapidly gaining adoption by cloud providers [6, 32, 38, 41, 46] and tenants [1, 14, 19, 20, 30, 31, 36, 43, 51] due to its key benefits: elastic scalability, ease of deployment, and flexible pay-per-use pricing. It achieves these benefits by decoupling application logic from resource management. In the serverless model, users express their applications as collections of functions triggered in response to user requests or calls by other functions. A function can be written in any language and may request a certain runtime environment, including, e.g., specific versions of the Python interpreter and libraries. However, the function is agnostic of where this environment is instantiated: a physical machine, a virtual machine or a container. The cloud platform manages function placement and scheduling, automatically spawning new function instances on demand. This requires application state to be decoupled from functions and placed in a shared data store (e.g., a database or a key-value store), allowing all function instances to access the state regardless of their physical placement in the cloud. We argue that serverless computing has fundamental implications for cloud security. In particular, it enables practical IFC for the cloud. Our key observation is that a serverless function constitutes a natural unit of information flow tracking. First, a serverless function activation handles a single request on behalf of a specific user and only accesses secrets related to this request. Second, each invocation starts from a clean state and does not get contaminated with sensitive data from previous invocations. Under a conservative assumption that all secrets obtained during function execution propagate to all its outputs, we can track the global flow of information in the system by monitoring inputs and outputs of functions comprising it. Based on this observation, we develop the first IFC system for serverless applications, called Trapeze. Trapeze encapsulates cloud sandbox each unmodified serverless function in a sandbox, which intercepts all interactions between the function and the rest of the F() world, including other functions, shared data stores, and external communication channels, and redirects them to the security shim (a) (b) G() shim (Figure 1). The shim tracks information flow and enforces the (d) (c) global security policy. The class of supported policies, along with policy enforcement datastore rules, is defined by Trapeze’s dynamic IFC model. The model addresses a weakness in most existing static and dynamic IFC Fig. 1. Trapeze architecture. Serverless function systems, which leak information through the termination channel, F is encapsulated in a sandbox. All inputs and whereby an adversary can infer secrets by observing termination outputs of F , including (a) invocations of F from or non-termination of the program. The massively parallel nature within and from outside of the cloud, (b) calls to of the serverless environment amplifies this weakness, allowing other serverless functions, (c) reads and writes to the attacker to construct a high-bandwidth information channel, shared data stores, and (d) external communication channels, are monitored by the security shim. effectively defeating the purpose of IFC (Section 2). Our IFC model eliminates this channel by enforcing a strong security property known as termination-sensitive non-interference (TSNI) [55]. Only a handful of previous IFC models achieve this level of security; however these models are either too restrictive for most practical applications [15, 55, 58], or introduce significant overhead [27] (see Section 7). Trapeze achieves TSNI through a novel combination of static program labeling with dynamic labeling of the data store based on a faceted store semantics. Static program labeling restricts the sensitivity of data a serverless function can observe ahead of time and is key to eliminating the termination channel. Dynamic data 2 labeling is crucial to securing unmodified applications that do not statically partition the data store into security compartments, while the faceted store semantics eliminates implicit storage channels. We present a formal proof, validated using the Coq proof assistant, that our model enforces TSNI. We evaluate Trapeze on three real-world serverless applications: an online retail store [51], a parallel build system [35], and an image feature extraction service [57]. We use Trapeze to secure these applications with minimal changes to application code and with low runtime overhead. Thus, our key contributions in this work are (1) a light-weight IFC shim architecture for serverless computing, (2) a new IFC model that enforces TSNI, along with its formal semantics and proof of correctness, and (3) an experimental evaluation of the architecture and the model on three serverless applications. Finally, we point out that our IFC model is not limited to the serverless domain. Generally speaking, it applies to any reactive system that decouples computation from state. Algorithmically, we show that TSNI can be enforced in such systems efficiently. Examples of such systems include, e.g., Hadoop [5], Apache Spark [70] and Stateless Network Functions [44]. 2 WHY A NEW IFC MODEL FOR SERVERLESS? As discussed above, a serverless function offers a convenient unit of information tracking, enabling practical IFC for serverless applications. It seems natural that our next step should be adapting one of many existing IFC models to the serverless environment. However, we do not take this path, as existing models do not provide adequate security for serverless applications. Specifically, most previous IFC models, both dynamic and static, enforce a security property known as termination-insensitive non-interference (TINI) [55]. Intuitively, TINI guarantees that an attacker cannot deduce secrets stored in the system from its non-secret outputs. However, they may be able to deduce part of a secret from the fact that the system stopped producing outputs. This information channel, known as the termination channel, is often disregarded because it has low bandwidth, typically leaking just a single bit. This is not true in serverless systems. Below, we construct an attack on a serverless application, that amplifies the termination channel by spawning many parallel computations, each leaking one bit. Example 2.1. Consider a serverless system with two users: a benign user Bob and a malicious user Eve. We introduce security labels b and e to tag Bob’s and Eve’s data respectively. Labels form a lattice, with labels higher up in the lattice representing more secret data. Bob and Eve are mutually distrusting, therefore their labels are incomparable (Figure 2a). Eve launches a code injection attack against serverless function F, forcing the function to execute malicious code in Figure 2b. This code is designed to leak Bob’s 64-bit secret stored under key 100 in the key-value store to Eve. We assume that the system is secured using a classical dynamic IFC model, where, upon reading a value from the store, the function’s label gets bumped to the least upper bound of the function’s previous label and the value’s label (note that, since the security shim cannot observe the data flow inside the function, it must conservatively taint the entire function with this label). The function initially runs with Eve’s label e (every line in the listing is annotated with the current label of the function). Before reading Bob’s secret, the function forks 64 instances of helper function H (lines 2–3). Each instance of H will leak one bit of the secret. Next, we read the secret, bumping the function’s dynamic label to b ⊔ e = ⊤ and encode it using the first 64 keys in the store: we store an arbitrary value under key i iff the ith bit of the secret is 1 (lines 5–7). The helper function H also starts with initial label e. After a short delay (line 10), it reads the key equal to the function’s argument i from the store (line 11). At this point the function’s label either bumps to ⊤ if the corresponding bit of the secret is 1 or stays at e otherwise. Line 12 attempts to send a message to Eve (here, eve is a handle to Eve’s HTTP session), which succeeds if the label of the channel (e) is higher than or equal to the 3 function F /* compromised */ (): e for i = 0 to 63: 3 e fork H(i) 4 e secret = store . read (100) 5 ⊤ for i = 0 to 63: 6 ⊤ if secret [i ]: 7 ⊤ store . write (i ,1) 1 2 ⟙ e b 8 function H(i ): e delay (1 s) 11 e store . read (i) 12 e/⊤ eve . send (i) /* diverges if label is ⊤*/ 9 10 ⟘ (a) Example security lattice. ⊤ is the most secret label at the top of the lattice; ⊥ is the bottom (least secret) label. (b) High-bandwidth termination channel in the classical dynamic IFC model. Fig. 2. A security lattice and a termination channel. function’s current label and diverges otherwise. Eventually, the attacker at the other end of the channel receives the list of bits of the secret equal to 0. □ We implemented the above attack in AWS Lambda and were able to leak 170 bits per second by scaling the number of threads. Thus, by elastically scaling the computation, the serverless architecture also scales the termination channel. This is inline with theoretical results, which suggest that in a concurrent system, the termination channel can leak a secret in time linear in the size of the secret [7]. We therefore aim for a stronger security guarantee, known as termination-sensitive non-interference (TSNI) [55], which eliminates the termination channel. Note that the termination channel in the above example arises as the function’s label, and hence its ability to send to an external channel, depends on the labels of values the function reads from the store. In contrast, our proposed model assigns a static security label to each function activation. To do so, we take advantage of the fact that a serverless function always runs on behalf of a specific user and can be assigned a corresponding security label. The complete model, presented in Sections 3 and 4, also offers a secure way to dynamically increase the function’s label without introducing a side channel. The function’s label determines its view of the data store: the function can only observe the existence of data whose label does not exceed the function’s label. For example, when reading a key that contains a secret above function’s current label, the store returns the same result as if the key was not present in the store. This information hiding semantics is somewhat tricky to maintain when multiple functions with incomparable labels write to the same store location. We avoid information leaks in this situation by employing faceted store semantics, where each record can contain several values (facets) with different security labels [10, 69]. To the best of our knowledge, Trapeze is the first IFC system to combine static program labeling with dynamic labeling of data (using faceting). This combination eliminates termination and storage channels and enforces a strong security property, TSNI. 3 INFORMAL DESIGN 3.1 Threat model and assumptions We assume that the following entities are trusted, i.e., not malicious or compromised: (1) the cloud operator, (2) physical hosts and network, (3) system software (OS, hypervisor, container manager, scheduler), (4) serverless 4 runtime, (5) shared data stores, (6) the sandboxing technology. Assumptions (1) through (5) can in the future be relaxed with the help of a secure enclave technology such as Intel SGX [40, 42], data encryption, and software verification [26, 39]. We further trust the serverless application administrator to enforce the following invariants on application configuration: (1) all data stores used by the application are configured to only be accessible from serverless functions, (2) all serverless functions in the system are sandboxed. Finally, we trust the application developer to correctly define the application’s information flow policy and declassifier functions (Section 3.4). The rest of the application is untrusted. In particular, we assume that the attacker can compromise application code running inside serverless functions, including any of the frameworks and libraries it uses. In this paper we focus on data confidentiality, i.e., protecting sensitive data from being exposed to unauthorized users. The complementary problem of enforcing data integrity, i.e., protecting data from unauthorized modification is outside the scope of Trapeze, although it can also be enforced with the help of IFC techniques [54]. Finally, we are not concerned with timing and other covert channels [17]. An example of such a channel is a function running with a high label communicating with a function running with a low label by modulating its CPU or memory usage. 3.2 Security lattice We start the construction of our IFC model with the lattice of security labels. Labels represent security classes of information flowing through the system. Trapeze does not assign any specific semantics to labels; however in practice they typically represent users or roles of the system. Trapeze relies on a trusted authentication gateway to tag all external input and output channels with correct security labels. For example, when Eve establishes an HTTP session with the system, the session gets tagged with Eve’s label e. Given the labeling of inputs and outputs, Trapeze applies information flow rules presented below to enforce that information received through an input channel labeled li can only be exposed through an output channel labeled lo if li ⊑ lo . 3.3 Information flow rules The choice of information flow rules determines two critical properties of an IFC system: security and transparency. The former characterizes the class of insecure behaviors the system prevents. The latter characterizes the class of secure programs that the system executes with unmodified semantics and that therefore do not need to be modified to work with Trapeze. Trapeze’s enforces the strong security property of TSNI at the cost of some loss of transparency that, we argue, is acceptable in serverless systems. Trapeze assigns a runtime security label to every serverless function activation. This label is derived from the event that triggered the function. In particular, if the function was invoked via an HTTP request from a user, it obtains the user’s security label. Alternatively, when invoked by another function, it inherits the caller’s label. The function’s label controls its ability to send to an output channel: a send is only allowed if the function’s label is smaller than or equal to the channel label. Trapeze also dynamically labels records in the data store. To this end, the security shim intercepts data store operations issued by the function and modifies them to insert and check security labels. When a function creates or updates a record in the store, the record inherits the function’s label (see detailed write semantics below). When reading from the store, the function only observes values whose labels are below or equal to its own label. From the function’s perspective, the store behaves as if it did not contain any data that the function may not observe. 5 A function can upgrade its label to an arbitrary higher label using the raiseLabel operation. This operation does not introduce an unauthorized information channel, as the decision to upgrade cannot depend on secrets above function’s previous label (such secrets are simply invisible to the function). The upgrade mechanism is useful, for example, when a function running on behalf of a regular user needs to update global statistics on behalf of a superuser. Upgrade is a one-way operation: a function’s label can never be downgraded below its current value. Store semantics Trapeze’s security shim conceals the existence of data whose security label is not less than or equal to the func1 function Fb (): tion’s label. Maintaining this semantics is straightforward when 2 b secret = store . read (100) all writes to a data store location carry the same label. In the 3 b for i = 0 to 63: presence of conflicting writes, a resolution mechanism is required 4 b if secret [i] == 1: to avoid implicit storage channels [9]. When the conflicting labels 5 b store . write (i ,1) are comparable, conflict resolution can be performed, e.g., using 6 the no-sensitive-upgrade rule [9]. However, no such mechanism 7 function Fe (): that avoids storage channels exists for writes with incomparable 8 e x = 0 labels. The following example illustrates the problem: 9 e for i = 0 to 63: e e 12 e 13 e 10 11 Example 3.1 (Implicit storage channel). Suppose we resolve conflicts by ignoring writes when an incomparable label exists in the store (alternative strategies, e.g., silently overriding the existing value or failing the conflicting write are similarly vulnerable). Figure 3 shows two functions running with labels b and e respecFig. 3. Implicit storage channel via conflicting tively that collude to leak Bob’s 64-bit secret to Eve. Fb reads the writes. secret in line 2; however it does not have the authority to send it to Eve directly. Instead it encodes each bit of the secret using a record in the key-value store, as in Example 2.1 (lines 3–5). Fe reconstructs the secret by attempting to write to locations 0 to 63 and then reading the value back in. Writes to locations that correspond to 1s are ignored, indicating that the corresponding bit of the secret is 1. □ store . write (i ,1234) if store . read (i) == 1: x [i] = 1 eve . send (x) We eliminate such unauthorized flows using faceted store semantics, where each record can contain several values (facets) with different labels [10, 69]. Facets are created dynamically: when a value with a new label is stored in the record, a facet is created for it (see Section 4 for precise semantics). A read returns the most recent write that is visible to the function. Thus, facets conceal writes with label b from a function running with label e, unless b ⊑ e. Example 3.2. We replay the example in Figure 3 with faceted store semantics. Since function labels b and e are incomparable, their respective writes will go into different facets. The functions do not observe each other’s writes either explicitly or indirectly, as in Example 3.1. □ Faceted stores were previously introduced in IFC research in work on faceted execution [10, 12, 69]. The fundamental difference from our approach is in the read semantics. Under faceted execution, a read conceptually forks the program, creating a separate branch for each facet read from the store. If the program sends to an external channel, only the branch whose label is compatible with that of the channel is allowed to send. Similar to our design, faceted execution eliminates storage channels; however it does so at a potentially high runtime cost and may become impractical in a system with a large security lattice. In contrast, Trapeze avoids faceted-execution using the apriori knowledge of the function’s label by pruning all incompatible facets at read time. Existing faceted execution systems expose the termination channel and therefore enforce TINI, whereas Trapeze enforces the stronger TSNI property. 6 In the practical use of Trapeze, faceting is an exceptional situation. Trapeze is designed to run unmodified applications that assume conventional store semantics. The moment multiple facets are created in some store location, this semantics is violated, as different functions can now observe different values at the same location. Trapeze treats such situations as attempted exploits and notifies the administrator, who can then take recovery actions, e.g., remove the offending function from the system and rollback the store to the previous consistent state. In the meanwhile Trapeze guarantees that the system continues running without exposing any sensitive information to the attacker. Faceted store semantics is emulated by the security shim on top of a conventional non-faceted store. In Section 6, we implement facets on top of a key-value store. Yang et al. [69] present the design of a faceted SQL database. Transparency The flip side of Trapeze’s strong TSNI security guarantees and light-weight protection is the theoretical loss of transparency, i.e., the ability to run existing unmodified applications. By assigning a static security label to a function, we restrict data that is visible to it. In particular, the function cannot access values above its security level even if it does not send these values (or anything derived from them) through unauthorized channels. On the other hand, all writes to the data store performed by the function are conservatively labeled with the function’s label even if they do not carry any secrets. Both problems can be addressed by refactoring the application. In particular, the function can gain access to secret data via the raiseLabel operation. Conversely, one can avoid tainting data with excessively high labels by splitting the offending function into several functions that run with lower labels. However, if many such changes are required in order to adapt existing applications to work with Trapeze, this will create a barrier to Trapeze’s practical adoption. Our evaluation in Section 6 indicates that in practice the loss of transparency is not an issue in serverless applications due to the common serverless design practice where every function only accesses values that are related to a specific small task and are therefore likely to have compatible security labels. 3.4 Declassifiers Many real-world applications allow limited flow of information down the security lattice. For example, a credit reporting agency may make the distribution of consumers across credit score bands publicly available. This statistics is computed based on the credit history of all consumers and must therefore be labeled with the least upper bound of all their labels. However, since the aggregate statistics exposes negligible amount of information about individual consumers, it can be safely declassified. Similar to previous IFC models, Trapeze introduces declassifiers to support such scenarios. A declassifier is a triple ⟨h, l, D⟩, where h and l are security labels, such that l ⊏ h, and D is a serverless function. A declassifier is invoked just like any other serverless function; however its security label is computed using special rules. Let x be the label of the calling function. Then the declassifier is assigned label x ′, such that: ( l, if l ⊑ x ⊑ h x′ = x, otherwise By design, declassifiers violate the non-interference property; therefore the formal model and proofs in Section 4 are given for the pure IFC model without declassifiers. 4 FORMAL SEMANTICS In this section, we formalize our IFC semantics for serverless systems with an underlying persistent key-value store. Since computations at different security labels might write to the same key, the key-value store maps each key to a set of values (facets), each with a different label, and we order this set into a sequence according to the temporal order of the writes. The initial store σ0 maps each key to the empty sequence: σ0 = λk.ϵ. 7 l v S k σ t p ps Σ ∈ ∈ ∈ ∈ ∈ ∈ ∈ ∈ ∈ Label Value LabeledValueSeq Key Store Thread Process Processes State = (Value × Label)∗ = Key → LabeledValueSeq e ∈ Event ch es op ∈ ∈ ∈ OutputChannel Events Operation f ∈ ReadContinuation (t, l ) multisets of processes (σ, ps) ::= = ::= (a) Serverless execution state. ::= | | start p output ch v nop = ::= | | | | | = Event ∗ read k f write k v t send ch v t fork t t raiseLabel l t stop (Value × Label)⊥ → Thread (b) External events and I/O operations. e Σ −→ Σ State transition relation (σ, ps) start p −→ output ch v (σ, ps ⊎ {p }) [s-start] −→ (σ, ps ⊎ {(t ′, l )}) run(t ) = send ch v t ′ (σ, ps ⊎ {(t, l )}) −→ (σ, ps ⊎ {(f (last(σ (k )↓l )), l )}) run(t ) = read k f (σ, ps ⊎ {(t, l )}) −→ (σ [k := write(σ (k), v, l )], ps ⊎ {(t ′, l )}) run(t ) = write k v t ′ [s-write] run(t ) = fork t ′ t ′′ [s-fork] (σ, ps ⊎ {(t, l )}) nop nop nop (σ, ps ⊎ {(t, l )}) −→ (σ, ps ⊎ (σ, ps ⊎ {(t, l )}) −→ (σ, ps ⊎ {(t ′, l ′ )}) (σ, ps) −→ (σ, ps) nop nop {(t ′, l )} ⊎ {(t ′′, l )}) l ⊑ label(ch) [s-send] [s-read] run(t ) = raiseLabel l ′ t ′ l ⊑ l′ [s-raise-label] [s-skip] es Σ −→∗ Σ Multiple-step state transition relation Σ Σ ϵ −→∗ e ++e s −→∗ Σ [refl] e Σ −→ Σ′ Σ′′ es Σ′ −→∗ Σ′′ [trans] (c) Transition relations. Fig. 4. Formal semantics. A state Σ ∈ State of the system consists of a key-value store σ ∈ Store, plus a multiset of currently executing serverless function activations called processes (see Figure 4(a)). Each process p = (t, l) consists of a thread t plus its associated security label l ∈ Label. Observable events e ∈ Event of the system include the input event start p, which starts a new process p,1 and the output event output ch v, which sends the value v on output channel ch (see Figure 4(b)). e The state transition relation Σ −→ Σ ′ shown in Figure 4(c) describes how the system executes. The first rule [s-start] handles an incoming event start p simply by adding p to the multiset of processes. The next five transition rules all involve executing a particular process (t, l) until its next I/O operation op ∈ Operation. For maximal generality, we do not formalize the computation language, but instead assume that the function run : Thread → Operation executes the thread t and returns op, which includes a continuation for the rest of the thread (analogous to the coinductive definitions used by Bohannon et al. [18]). We describe each operation and its corresponding transition rule in turn: Serverless systems spawn a new function/process p to handle each incoming event. Here, we assume that each incoming event contains that new process, to simplify the formal development. 1 8 S↓l = S \ {(v ′, l ′) ∈ S | l ′ @ l } ps↓l = multiset{(t, l ′) ∈ ps | l ′ ⊑ l } σ↓l = λk.σ (k)↓l   e ∃t, l ′ . e = start (t, l ′) and l ′ ⊑ l    e↓l = e ∃ch, v. e = output ch v and label(ch) ⊑ l    nop otherwise.  (e 1 . . . en )↓l = e 1↓l . . . en ↓l (σ , ps)↓l = (σ↓l , ps↓l ) Fig. 5. Definition of projection function. • [s-send] for send ch v t ′: This rule checks that the process is permitted to output on channel ch (here, label : OutputChannel → Label returns the security label of each channel). The process becomes stuck if this check fails. Otherwise, it generates the output event e = output ch v and the new process state (t ′, l) using the continuation t ′ returned from run. • [s-read] for read k f : This rule reads the labeled value sequence σ (k) from the store; uses the projection operation •↓l defined in Figure 5 to remove all values not visible to the current label; and passes the last entry in this list (i.e. the most recent visible write) to the read continuation f . Note that σ (k)↓l may be the empty sequence ϵ, either because key k was never written, or because no such writes are visible to the current process; in this case, last(ϵ) returns ⊥, which is passed to f . This rule (and the following four below) generates a dummy event nop, since it does not have any externally visible behavior. • [s-write] for write k v t ′: In a conventional data store, a new write would overwrite the previous value at that key. In contrast, our faceted store semantics must ensure that a low-label process unable to see the new write will still read an older write. Hence we represent σ (k) as a sequence of labeled values. At a new write (v, l) of value v at label l, we can garbage-collect or remove all older writes (v ′, l ′) in this sequence σ (k) that are no longer visible, namely those where l ⊑ l ′, since any process that could read (v ′, l ′) can also read the more recent write (v, l). The following function performs this garbage collection, and then appends the new labeled value: write : LabeledValueSeq × Value × Label → LabeledValueSeq write(S, v, l) = (S \ {(v ′, l ′) ∈ S | l ⊑ l ′ }) ++ (v, l) The symbol ++ denotes sequence concatenation. • [p-fork] for fork t ′ t ′′: This rule forks a new thread t ′′, where t ′ is the continuation of the original thread. Both threads inherit the security label of the original process. • [s-raise-label] for raiseLabel l ′ t ′: This rule simply raises the label of the current process to a higher label l ′, which, for example, permits the process to read more secret data. • Finally, [s-skip] allows a state to perform stuttering nop steps at any time, as a technical device to facilitate the non-interference proof below. Note that no rule is needed for the stop operation. Instead we just leave the stopped processes in the process multiset for simplicity. 9 5 TERMINATION SENSITIVE NON-INTERFERENCE We use the notation •↓l on various domains to remove any information that is not visible to an observer at level l (see Figure 5). For example: S↓l contains only values with labels visible to l, and ps↓l contains only processes with labels visible to l. An event e is visible to l if it starts a process visible to l, or if it outputs on a channel visible to l; otherwise, we say e↓l = nop. We write •1 ≈l •2 to denote that items appear equivalent to an observer at level l, i.e., •1↓l = •2 ↓l . Our proof is based on the projection lemma below, which relates the execution of the full system Σ and the portion Σ↓l visible at level l. Every step of Σ has a corresponding step in Σ↓l (part 1) and vice versa (part 2). Lemma (Projection). Part 1. If e1 Σ −→ Σ1′ then for some Σ2′ and e 2 , e2 Σ↓l −→ Σ2′ Σ1′ ≈l Σ2′ Part 2. If e 1′ ≈l e 2′ e1 Σ↓l −→ Σ1 then for some Σ2′ and e 2 , e2 Σ −→ Σ2 Σ1 ≈l Σ2 e 1 ≈l e 2 Proof. See appendix. Based on this lemma, our proof of single-step and multi-step termination sensitive non-interference is straightforward.2 Theorem (Single step Termination Sensitive Non-Interference). If e1 Σ1 ≈l Σ2 Σ1 −→ Σ1′ then for some Σ2′ and e 2 , e2 Σ2 −→ Σ2′ Σ1′ ≈l Σ2′ e 1 ≈l e 2 Proof. By Projection (Part 1): e3 Σ1 ↓l −→ Σ3′ for some Σ3′ e3 e2 for some e 1 ≈l e 3 and e 3 . The l-equivalence assumption implies that Σ2 ↓l −→ Σ3′ . By Projection (Part 2): Σ2 −→ Σ2′ Σ2′ Σ1′ ≈l Σ3′ Σ3′ ≈l Σ2′ e 3 ≈l e 2 and e 2 . Therefore, by transitivity of ≈l , we have Σ1′ ≈l Σ2′ and e 1 ≈l e 2 , as required. Corollary (Termination Sensitive Non-Interference). If es 1 Σ1 ≈l Σ2 Σ1 −→∗ Σ1′ then for some Σ2′ and e 2 , es 2 Σ2 −→∗ Σ2′ Σ1′ ≈l Σ2′ 2 es 1 ≈l es 2 . When applied to a reactive system as we have here, this notion of termination-sensitive non-interference is often known as progress-sensitive non-interference. 10 es 1 Proof. By induction on the derivation of Σ1 −→∗ Σ1′ . Our Coq formalization of these semantics and proofs is available at https://github.com/anonymous-pldi2018-1/ faceted-tsni-coq. Our TSNI result states that the set of observable outputs of the system under all possible schedules does not depend on inputs that are not visible to the observer. This result does not prevent a malicious scheduler from leaking secrets by prioritizing certain schedules, e.g., by scheduling low-security processes based on high-security secrets. However, as mentioned earlier, we assume that the scheduler is not adversarial in this manner. Prior work [59] has addressed this problem by assuming a round-robin scheduler, but this assumption is not realistic for serverless computing. 6 IMPLEMENTATION AND EVALUATION 6.1 Implementation In order to evaluate our proposed security architecture and IFC model, we developed an open-source prototype implementation of Trapeze [4]. The implementation is portable and currently runs on the two most popular serverless platforms—AWS Lambda [2] and OpenWhisk [6]. It consists of three components: the sandbox, the security shim, and the authentication service. Sandbox The Trapeze sandbox encapsulates application code, redirecting all its inputs and outputs through the security shim (Figure 1). The exact sandboxing technology depends on the programming language used. We currently support serverless functions written in JavaScript for the Node.js runtime, which is one of the most common types of serverless functions on both AWS and IBM Cloud Functions, IBM’s public OpenWhisk service. We encapsulate such functions using the VM2 JavaScript sandbox [63, 64]. Many serverless functions rely on the ability to invoke external programs. We encapsulate such external executables using a ptrace-based sandbox [35], which restricts program’s I/O activity to a temporary local directory that gets purged on every serverless function invocation. Security shim The security shim monitors all inputs and outputs of a function and enforces IFC rules. The shim consists of multiple adapter modules, one for each supported input and output interface. There are three groups of adapters: (1) data store adapters, (2) function call adapters, (3) external channel adapters. A data store adapter implements faceted store semantics on top of a conventional cloud data store. Trapeze currently supports a single type of data store—a faceted key-value store implemented on top of a relational database. The key-value store implements a standard dictionary with the following operations: put(key, value), get(key), del(key), and keys() (returns all keys in the store). The store is backed by a relational database table with 3 columns, for the key, value, and label. The table contains an entry for each facet of each value in the store. We used MySQL server available in AWS through Amazon Relational Database Service. The security shim passes an additional parameter to every operation—the security label. The get operation performs an SQL query that returns all entries that match the given key, and whose label is less than or equal to the given label. The del operation deletes all facets with labels greater than or equal to the given label. The put operation deletes the same elements a del does, and then inserts the given key-value pair, with the given label. In addition to the faceted version, we also provide a conventional insecure key-value store implementation as a baseline for performance evaluation. Function call adapters support different ways to invoke serverless functions, making sure that the callee inherits the caller’s label, as required by our IFC model. We support two invocation mechanisms: AWS Step Functions, which run a workflow with multiple serverless functions, controlled by a finite automaton, and Amazon Kinesis, which supports asynchronous communication via real-time event streams. 11 External channel adapters enable secure communication across the cloud boundary. The supported types of channels are (1) user-initiated HTTP sessions, (2) email communication via the Nodemailer module[50], and (3) connections to external S3 buckets (used to upload large data objects that do not fit in HTTP requests). HTTP sessions obtain their security labels from the authentication service (see below). The Nodemailer adapter uses the user database (see below) to map an email address to a user security label. The S3 adapter inherits the label of the user who provides login credentials for the S3 bucket. Authentication service The authentication service is responsible for associating a correct security label with every external HTTP session. It is implemented on top of a user database that stores credentials, email addresses, and security labels of all users in the system. The entire Trapeze framework consists of 1174 lines of JavaScript code, including 649 lines in the the AWS and OpenWhisk shim modules, 484 lines in the key-value store, and 41 lines in the authentication service. 6.2 Evaluation questions Our evaluation aims to answer the following questions: (1) Security: Can Trapeze enforce information security in real-world serverless applications? In particular, can confidentiality requirements of such applications be captured in a security policy consisting of a security lattice and trusted declassifiers? Can Trapeze enforce the policy in the presence of buggy or malicious code? (2) Transparency: Can Trapeze secure existing serverless applications with minimal modifications? (3) Performance: Can Trapeze achieve the first two goals with low performance overhead? 6.3 Case studies To answer the above questions, we carried out three case studies where we used Trapeze to add a security layer to existing serverless applications. We outline each of the case studies below. Case study 1: Hello, Retail! Hello, Retail! is a project from the serverless team at Nordstrom. The goal was to produce a purely serverless, back-end for an e-commerce web site. It has since been open-sourced [51] and won the architecture competition award at serverlessConf Austin’17[45]. We made several changes to Hello, Retail! before applying Trapeze to it. First, we replaced DynamoDB and S3 databases in Hello, Retail! with with calls to Trapeze’s key-value store. Second, we replaced calls to the Twilio SMS messaging service, which is currently not supported by Trapeze, with e-mail communication. Third, we extended the Hello, Retail! project with a product purchase subsystem, which manages online orders and credit card payments. The resulting system consists of 21 serverless functions. Figure 6 shows the high-level architecture of the system. The system serves several types of users: (1) the store owner, who manages the online catalog and processes orders, (2) photographers, who upload product images to the catalog, (3) customers, who navigate the catalog and place orders, and (4) the VISA credit card authority, which authorizes card payments on behalf of customers. The security lattice (Figure 7a) consists of labels, matching these user categories. Solid lines in the diagram show the partial order of security labels; dashed arrows show declassifiers, with a declassifier ⟨h, l, D⟩ represented by an arrow from label h to l. Table 1 summarizes the security labels in this case study. The following scenario illustrates the flow of sensitive information through the Hello, Retail! system. Every step in the scenario is annotated with security label(s) of data involved in this step. 1. [owner ] The owner creates a new product description in the catalog. 2. [photoдrapher i ] The owner sends an email to one of the photographers requesting a picture of the product. The request includes information from the product description, declassified with the ⟨owner, photoдrapher i , photo_request()⟩ declassifier, which implements a trusted user interface that request 12 Email Photo Request Photographer Registry Register Photographer API Receive Photo API Get Photos Step Function Photos Event Processor Retail Event Stream (AWS Kinesis) Create Product API Photo Storage Catalog API Product Release API Credit Card Registry Credit Card Authorization Catalog Builder Product Catalog Purchase Product Step Function Purchase API Fig. 6. The architecture of the Hello, Retail! project. Circles labeled λ represent the main functions of this application. Functions whose names end with ‘API’ can be directly invoked via client HTTP requests. Arrows show interactions between different components. Red dashed arrows indicate interactions that carry declassified data. label owner client j clientCC j V ISA photoдrapher i description Sensitive information managed by the store owner, including product catalog and photographers’ email addresses. Items in the catalog are only visible to the owner until they are released to the public via the release declassifier. Labels online purchases of a specific customer. This information is visible to the customer and the store owner (since client j ⊏ owner ) Customer credit card information that can only be released to a credit card authority Labels the external communication channel to the VISA credit card authority Product photos uploaded by a photographer Table 1. Security classes in the Hello, Retail! case study. owner’s confirmation of the declassification. 3. [photoдrapher i ] The photographer uploads a product image to the catalog. 4. [⊥] Once the owner is ready to make the product publicly available in the online catalog, she declassifies it using the ⟨owner, ⊥, release()⟩ declassifier. 5. [client j /clientCC j ] A client orders a product from the catalog. Order information, labeled client j is visible to the the client as well as the owner, since client j ⊏ owner . Client’s credit card details are labeled clientCC j , and are hidden from the owner (clientCC j @ owner ). 13 ⟙ VISA owner clientCC photo_request() release() photographer authorize() client ⟙ ⟙ tenant user ⟘ ⟘ (a) Hello, Retail!. open_source() (b) gg ⟘ (c) Feature Extraction. Fig. 7. Security lattice and declassifiers in the different case studies. 6. [VISA] Before the order is finalized, credit card information is sent to VISA for payment authorization through an external channel labeled V ISA. 7. [client j ] The response received through this channel consists of one bit of information indicating success or failure, which gets declassified by the ⟨V ISA, client j , authorize()⟩ declassifier, making the outcome of the request visible to the client and the owner. Case study 2: gg gg [35, 37] is a system for running parallel software workflows, such as software compilation and video processing, on serverless platforms. In gg, each unit of work, or thunk, specifies both the executable to run and all its data dependencies. The workflow is synthesized as a direct acyclic graph (DAG) of thunks, and is recursively executed on a serverless platform by gg’s execution engine. gg identifies each dependency in a content-addressed way, using a key-value store as the storage backend. gg consists of a single serverless function, which internally runs arbitrary user-provided executables. Each invocation of the function executes exactly one thunk by fetching the dependencies from the object store, executing the thunk, and storing the output back into the object store. We use a parallel build framework implemented on top of gg [35] as a concrete use case. The framework extracts a workflow DAG, where every thunk corresponds to an invocation of a build tool (e.g., a compiler or a linker), from the project makefile. The original gg implementation is single-tenant, with every authenticated user having access to all sources and binaries in the system. We use Trapeze to introduce a secure multi-tenant mode to gg. In this mode, tenants only have access to their own source and compiled code. A thunk running on behalf of the tenant taints all of its outputs with the tenant’s label. A tenant may release some of their sources or compiled binaries to the public, making them available to all other tenants. This is reflected in the security lattice in Figure 7b with mutually incomparable tenant labels and a ⟨user i , ⊥, open_source()⟩ declassifier. Prior to adding the multi-tenant mode to gg, we ported parts of it that were written in Python to JavaScript, as well as modified it to use our key-value store. Case study 3: Image feature extraction This serverless application gives its users access to Amazon’s AWS Rekognition image analysis service [3]. It is based on the ‘Fetch File and Store in S3’ and ‘Analyse Image from S3’ examples from the Serverless Examples collection[57]. The application consists of the upload function that takes an image URL, fetches the image and stores it in the key-value store, and the feature extraction function that uses AWS Rekognition to extract features from the image and send them to the user. We use Trapeze to add a security layer to this example, enforcing that every user can only access information extracted from images they own. This policy is expressed in the simple security lattice in Figure 7c. 14 case study app code modif. code declassifiers Hello, Retail! 1,300 3 104 gg 8,800 2 94 Feature Extraction 95 0 0 Table 2. Size of the case studies in lines of code (LoCs): (1) LoCs comprising the application, (2) lines added or modified to adapt the application to work with Trapeze, (3) LoCs in trusted declassifiers. 6.4 Security We employ Trapeze to protect sensitive data in the three case studies. The original implementation of these applications either offered coarse-grained protection, giving every authenticated user access to all data in the system, or implemented ad hoc security policies embedded in application code. For example, the Hello, Retail! system by design only exposes credit card details to the credit card authority. Such protection relies on checks scattered around the application code and is easy to get wrong. Besides, it can be bypassed by any exploit that subverts the application logic. Trapeze captures the security requirements of each of the three case studies in a security policy consisting of a security lattice and declassifiers, shown in Figures 7a, 7b, 7c. Our policies are simple and concise, consisting of only several classes of labels and few declassifiers. The policies are decoupled from the application logic and its software architecture. For instance, adding new functions to the application, changing its control flow, or even refactoring the database schema, do not affect the security policy. Furthermore, Trapeze is immune to malicious or compromised application logic. We simulated code injection attacks in our case studies by replacing some of the original functions with malicious functions that attempt to leak secrets to unauthorized users, similar to examples in Figures 2b and 3. As expected, these simulated attacks failed when running the application with Trapeze. 6.5 Transparency As discussed in Section 3, Trapeze enforces TSNI at the cost of reduced transparency, which may require the developer to refactor the application to work with Trapeze. Table 2 measures the loss of transparency in our case studies by reporting the size of changes to application code in terms of lines of code (LoCs) required to adapt the application to work with Trapeze. This does not take into account the changes needed to port the application to use our key-value store as well as other compatibility changes that are not fundamental to the Trapeze architecture and can be made unnecessary with some additional engineering effort. None of the case studies required splitting a function into multiple functions. Hello, Retail! required calling raiseLabel twice, once in order to upgrade the label of the purchase placement function from client j to clientCC j before saving the customer’s credit card details in the data store, and once to upgrade the label of the payment authorization function from client j to V ISA, in order to read credit card details from the store and send them to the credit card authority. In addition, the gg case study required a minor change due to a technicality: the existing code was not fully compatible with the VM2 sandbox. These results indicate that in practice the loss of transparency is not an issue in serverless applications. This is due to the common software design practices in the serverless world, where each function is assigned a single small task and only accesses the values that are related to this task and are therefore likely to have compatible security labels. The last column of the table reports the total size of declassifiers used in each case study. This number characterizes the amount of trusted application code in each example. 15 function runtime (ms) insecure Trapeze Hello, Retail! Update&Purchase 435 51,246 98,563 Build&Browse 955 257,799 391,900 gg mosh 111 681,173 654,448 git 917 2,602,500 2,660,721 vim 234 1,242,873 1,338,128 openssh 654 1,626,223 1,649,139 Image Feature Extraction Image Upload 1 475 525 Feature Extraction 1 1,882 2,114 Table 3. Trapeze performance. scenario 6.6 #λ ∆(%) 92.33 52.03 -3.92 2.24 7.66 1.41 10.4 12.3 Performance We measure the overhead of Trapeze by running case studies 1 and 3 on the AWS Lambda serverless platform. We run case study 2 on the OpenWhisk platform in the IBM Cloud (formerly, IBM Bluemix), since AWS Lambda does not support ptrace, which we use to sandbox binary executables in gg (Section 6.1). Table 3 summarizes the runtime overhead of Trapeze. Since the overhead may depend on the exact workload, we constructed several typical workflows for each case study. We test the Hello, Retail! case study on two workloads: the ‘Build&Browse’ workload, that simulates the construction and browsing of the product catalog, and the ‘Update&Purchase’ workload, that simulates updates to the catalog followed by a series of online purchases. We test gg by using it to compile four open source software packages: mosh, git, vim, and openssh. Finally, we consider two scenarios for the Image Feature Extraction: the ‘Image Upload’ scenario, that uploads a single image to the data store, and the ‘Feature Extraction’ scenario that performs feature extraction for a stored image. For each workload, we report the total number of serverless function calls (the #λ column in Table 3). The ‘function runtime’ section of the table reports the total runtime of all functions in the scenario with and without protection and the relative slowdown introduced by protection, averaged across 10 runs. These runtimes do not include additional declassifier calls introduced in the protected execution. Accounting for declassifiers increased the total runtime by another 10% in the Build&Browse workload, while not making any measurable impact on other workloads. In our initial experiments we also measured the total time to execute each workload; however we found that, due to the non-deterministic nature and varying resource availability in the serverless environment, these times varied wildly across different runs and did not provide any insights into the performance of Trapeze. For most workloads, Trapeze adds a modest overhead of up to 12.3% to function runtime. The negative overhead in the gg mosh workload is due to the noisy IBM Cloud environment, where the runtime of a function varies dramatically across different invocations based on the load on the node where the function is scheduled. The overhead is higher in the Hello, Retail! case study, up to 92.33% in the Update&Purchase scenario. Further benchmarking revealed that the bulk of this overhead is due to the startup time of the VM2 sandbox, which adds 100ms on average per function invocation. Since all functions in this example have short runtimes, the startup time becomes a significant contributor to the total runtime. We measured that two thirds of the startup time is spent loading libraries used by the application. In the future, much of this overhead can be eliminated by caching preloaded libraries in memory. Finally, we evaluate the storage overhead of our secure key-value store. Table 4 compares database sizes (in kilobytes) for an insecure and secure versions of the store for each of the three case studies (we report results 16 case study insecure (KB) Trapeze (KB) Hello, Retail! 2,704 3,200 gg 15,054,000 15,118,496 Feature Extraction 8,256 8,416 Table 4. Storage overhead of Trapeze. ∆(%) 18.34 0.43 1.94 for one of the workloads in each case study, as the relative increase in the database size is independent of the workload). The secure database requires more space, as it stores a security label with each value. This overhead is low (under 2%) in examples where the database stores large objects, e.g., images or source files. It is more significant (18.34%) in the Hello, Retail! case study where individual values stored in the database are small. 7 RELATED WORK The modern technique for using security labels to dynamically monitor information flow was proposed by Denning [25] as the Lattice Model. That work also defines the concept of implicit flow of information. Austin et al. [11] describe three techniques for monitoring such flows, namely Failure Oblivious and No Sensitive Upgrade and Permissive Upgrade. Our work exposes a fourth choice using faceted values specifically to eliminate implicit flows. Austin and Flanagan [10] introduce faceted values as a full language-based enforcement technique: rather than focusing specifically on controlling implicit flows, they combine the faceted value concept with the concept of multiple executions, which enables more precise enforcement at the cost of more runtime overhead. Trapeze enforces a strong form of non-interference, TSNI. Most existing IFC systems support only terminationinsensitive non-interference (TINI). The few previous systems that enforce TSNI are either too restrictive or too costly for most practical applications. The multilevel security (MLS) model [15] achieves TSNI by statically partitioning all the code and data in the system into security compartments. This model, designed primarily for military-grade systems, is too restrictive for most applications and requires complete re-design of existing software. Smith and Volpano [58] present a security type system that enforces TSNI by imposing a harsh restriction that loop conditions may not depend on secret data. Heintze and Riecke [39] propose a secure typed Lambda calculus called SLam. While SLam only enforces TINI, Sabelfeld and Sands [55] point out that a version of SLam with lazy evaluation semantics would be termination-sensitive. This theoretical result has limited practical implications, as, with the exception of Haskell, none of today’s major programming languages use lazy evaluation. Indeed, Stefan et al. [59] implemented a Haskell library called LIO, which guarantees TSNI by requiring programmers to decompose their programs into separate threads with floating labels. These are analogous to the processes in our formalism. However, LIO uses the No Sensitive Upgrade rule to prevent implicit flows, while Trapeze uses faceted values instead. They also assume a round-robin scheduler, which would be inappropriate for our application to serverless computing. Secure multi-execution [27] achieves TSNI by running multiple independent copies of the program, one for each security class. This technique introduces CPU and memory overhead proportional to the number of security classes. While acceptable in systems with few security classes (e.g., Devriese and Piessens [27] consider only two classes, secret and non-secret), this becomes impractical in cloud-scale systems with potentially millions of mutually untrusting users. Faceted execution has the potential to mitigate this drawback, and Bielova and Rezk [16] have proposed a theoretical approach for extending the faceted execution model to enforce TSNI. The Asbestos OS [29] applies dynamic IFC at the granularity of an OS process, similar to how Trapeze operates at the granularity of a serverless function. Asbestos associates a static security label with each process; however this label only serves as an upper bound on the label of data the process can access. Process’s effective label changes dynamically, which enables the implicit termination channel. 17 To the best of our knowledge, Trapeze is the first system to apply IFC to serverless applications. Several researchers advocate the use of IFC in the broader context of secure cloud computing [13, 52]; however we are not aware of a practical implementation of these ideas. 8 CONCLUSION The advent of serverless computing provides the opportunity to rebuild our cloud computing infrastructure based on a rigorous foundation for information flow security. We present a novel and promising approach for dynamic IFC in serverless systems. This approach combines (1) a sandbox and security shim that monitors all I/O operations of each serverless function invocation; (2) static security labels for each serverless function invocation; and (3) dynamic faceted labeling of data in the persistent store. This combination of ideas provides the strong security guarantee of TSNI, which is necessary in serverless settings to avoid high-bandwidth termination channel leaks via multiple concurrent requests. Our Trapeze implementation of this approach is lightweight, requiring no new programming languages, compilers, or virtual machines. The three case studies show that Trapeze can enforce important IFC properties with low space and time overheads. We believe Trapeze represents a promising approach for deploying serverless systems with rigorous security guarantees that help prevent costly information leaks arising from buggy or mis-configured application code or from code-injection attacks. ACKNOWLEDGMENTS REFERENCES [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] [14] [15] [16] [17] [18] [19] Airbnb. 2017. StreamAlert: A serverless framework for real-time data analysis and alerting. (2017). http://airbnb.io/projects/streamalert/. Amazon. 2017. AWS Lambda. (2017). https://aws.amazon.com/lambda/. Amazon. 2017. AWS Rekognition. (2017). https://aws.amazon.com/rekognition/. Anonymous authors. 2017. Trapeze source code repository. (2017). Link anonymized for double-blind reviewing. Apache Software Foundation. [n. d.]. Apache Hadoop. ([n. d.]). https://hadoop.apache.org/. Apache Software Foundation. 2017. OpenWhisk. (2017). https://openwhisk.apache.org/. Aslan Askarov, Sebastian Hunt, Andrei Sabelfeld, and David Sands. 2008. Termination-Insensitive Noninterference Leaks More Than Just a Bit. In Proc. of ESORICS 2008. Malaga, Spain, 333–348. Thomas H. Austin and Cormac Flanagan. 2009. Efficient Purely-dynamic Information Flow Analysis. In Proc. of PLAS 2009. 113–124. Thomas H. Austin and Cormac Flanagan. 2010. Permissive Dynamic Information Flow Analysis. In Proc. of PLAS 2010. 1–12. Thomas H. Austin and Cormac Flanagan. 2012. Multiple Facets for Dynamic Information Flow. In Proc. of POPL 2012. 165–178. Thomas H. Austin, Tommy Schmitz, and Cormac Flanagan. 2017. Multiple Facets for Dynamic Information Flow with Exceptions. ACM Trans. Program. Lang. Syst. 39, 3, Article 10 (May 2017), 56 pages. https://doi.org/10.1145/3024086 Thomas H. Austin, Jean Yang, Cormac Flanagan, and Armando Solar-Lezama. 2013. Faceted Execution of Policy-agnostic Programs. In Proc. of PLAS. Seattle, Washington, USA, 15–26. Jean Bacon, David Eyers, Thomas F. J.-M. Pasquier, Jatinder Singh, Ioannis Papagiannis, and Peter Pietzuch. 2014. Information Flow Control for Secure Cloud Computing. IEEE Transactions on Network and Service Management 11, 1 (Jan. 2014), 76–89. Andrew Baird, Michael Connor, and Patrick Brandt. 2016. Coca-Cola: Running Serverless Applications with Enterprise Requirements. (2016). https://aws.amazon.com/serverless/videos/video-lambda-coca-cola/. D. Elliott Bell and Leonard J. LaPadula. 1973. Secure Computer Systems: Mathematical Foundations. Technical Report 2547. MITRE. Nataliia Bielova and Tamara Rezk. 2016. Spot the difference: Secure multi-execution and multiple facets. In European Symposium on Research in Computer Security. Springer, 501–519. Arnab Kumar Biswas, Dipak Ghosal, and Shishir Nagaraja. 2017. A Survey of Timing Channels and Countermeasures. ACM Comput. Surv. 50, 1 (March 2017), 6:1–6:39. Aaron Bohannon, Benjamin C Pierce, Vilhelm Sjöberg, Stephanie Weirich, and Steve Zdancewic. 2009. Reactive noninterference. In Proceedings of the 16th ACM conference on Computer and communications security. ACM, 79–90. Mark Boyd. 2017. iRobot Confronts the Challenges of Running Serverless at Scale. (2017). https://thenewstack.io/ irobot-confronts-challenges-running-serverless-scale/. 18 [20] Kuldeep Chowhan. 2016. Serverless Computing Patterns at Expedia. (2016). https://www.slideshare.net/AmazonWebServices/ aws-reinvent-2016-serverless-computing-patterns-at-expedia-svr306. The PlayStation Network breach (FAQ). (May 2011). https://www.cnet.com/news/ [21] CNET Magazine. 2011. the-playstation-network-breach-faq/. [22] Computerworld. 2009. SQL injection attacks led to Heartland, Hannaford breaches. (Aug. 2009). https://www.computerworld.com/ article/2527185/security0/sql-injection-attacks-led-to-heartland--hannaford-breaches.html. [23] Computerworld. 2014. Two-factor authentication oversight led to JPMorgan breach. (Dec. 2014). https://www.computerworld.com/ article/2862578/twofactor-authentication-oversight-led-to-jpmorgan-breach-investigators-reportedly-found.html. [24] Willem De Groef, Dominique Devriese, Nick Nikiforakis, and Frank Piessens. 2012. FlowFox: a web browser with flexible and precise information flow control. In Proc. of CCS 2012. 748–759. [25] Dorothy E Denning. 1976. A lattice model of secure information flow. Comm, of the ACM 19, 5 (1976), 236–243. [26] Dorothy E. Denning and Peter J. Denning. 1977. Certification of Programs for Secure Information Flow. Commun. ACM 20, 7 (July 1977), 504–513. [27] Dominique Devriese and Frank Piessens. 2010. Noninterference Through Secure Multi-execution. In Proc. IEEE SSP 2010. 109–124. [28] Digital Trends. 2016. The latest data breach involves the voting records of 93.4 million Mexican citizens. (April 2016). https: //www.digitaltrends.com/computing/mexico-voting-breach/. [29] Petros Efstathopoulos, Maxwell Krohn, Steve VanDeBogart, Cliff Frey, David Ziegler, Eddie Kohler, David Mazières, Frans Kaashoek, and Robert Morris. 2005. Labels and event processes in the Asbestos operating system. In Proc. of SOSP 2005. https://serverless.com/blog/ [30] Ken Ellis. 2017. How Reuters Replaced WebSockets with Amazon Cognito and SQS. (2017). how-reuters-replaced-websockets-with-amazon-cognito-and-sqs/. [31] Marius Eriksen. 2013. Your server as a function. In In Proc. of PLOS 2013. [32] Fn Project. 2017. (2017). https://fnproject.io/. [33] Forbes. 2014. eBay Suffers Massive Security Breach, All Users Must Change Their Passwords. (May 2014). https://www.forbes.com/ sites/gordonkelly/2014/05/21/ebay-suffers-massive-security-breach-all-users-must-their-change-passwords/#793467c57492. [34] Forbes. 2017. How Hackers Broke Equifax: Exploiting A Patchable Vulnerability. (Sept. 2017). https://www.forbes.com/sites/ thomasbrewster/2017/09/14/equifax-hack-the-result-of-patched-vulnerability/#20abe9015cda. [35] Sadjad Fouladi, Dan Iter, Shuvo Chatterjee, Christos Kozyrakis, Matei Zaharia, and Keith Winstein. 2017. A Thunk to Remember: make -j1000 (and other jobs) on functions-as-a-service infrastructure (Under review). (2017). http://stanford.edu/~sadjad/gg-paper.pdf. [36] Sadjad Fouladi, Riad S. Wahby, Brennan Shacklett, Karthikeyan Vasuki Balasubramaniam, William Zeng, Rahul Bhalerao, Anirudh Sivaraman, George Porter, and Keith Winstein. 2017. Encoding, Fast and Slow: Low-Latency Video Processing Using Thousands of Tiny Threads. In Proc. of NSDI 2017. Boston, MA, 363–376. [37] gg project. 2017. gg source code repository. (2017). https://github.com/stanfordsnr/gg. [38] Google. 2017. Google Cloud Functions. (2017). https://cloud.google.com/functions/. [39] Nevin Heintze and Jon G. Riecke. 1998. The SLam Calculus: Programming with Secrecy and Integrity. In Proc. of POPL 1998. San Diego, California, USA, 365–377. [40] Tyler Hunt, Zhiting Zhu, Yuanzhong Xu, Simon Peter, and Emmett Witchel. 2016. Ryoan: A Distributed Sandbox for Untrusted Computation on Secret Data. In Proc. of OSDI 2016. Savannah, GA, USA, 533–549. [41] IBM. 2017. IBM Cloud Functions. (2017). https://console.bluemix.net/openwhisk/. [42] Intel Corporation. 2014. Intel Software Guard Extensions Programming Reference. (2014). [43] Eric Jonas, Shivaram Venkataraman, Ion Stoica, and Benjamin Recht. 2017. Occupy the Cloud: Distributed Computing for the 99%. CoRR abs/1702.04024 (2017). http://arxiv.org/abs/1702.04024 [44] Murad Kablan, Azzam Alsudais, Eric Keller, and Franck Le. 2017. Stateless Network Functions: Breaking the Tight Coupling of State and Processing. In Proc. of NSDI 2017. Boston, MA, 97–112. [45] McKim, John. 2017. Announcing the Winners of the Inaugural ServerlessConf Architecture Competition. (2017). https://read.acloud. guru/announcing-the-winners-of-the-inaugural-serverlessconf-architecture-competition-1dce2db6da3. [46] Microsoft. 2017. Azure Functions. (2017). https://azure.microsoft.com/services/functions/. [47] Andrew C Myers. 1999. JFlow: Practical mostly-static information flow control. In Proc. of POPL 1999. 228–241. [48] Andrew C Myers and Barbara Liskov. 2000. Protecting privacy using the decentralized label model. TOSEM 9, 4 (2000), 410–442. [49] National Vulnerability Database. 2017. CVE-2017-5638. (March 2017). https://nvd.nist.gov/vuln/detail/CVE-2017-5638. [50] nodemailer 2017. nodemailer. (2017). https://github.com/nodemailer/nodemailer. [51] Nordstrom Technology. 2017. Hello, Retail! (2017). https://github.com/Nordstrom/hello-retail. [52] Thomas Pasquier, Jean Bacon, Jatinder Singh, and David Eyers. 2016. Data-Centric Access Control for Cloud Computing. In Proc. of SACMAT 2016. Shanghai, China, 81–88. [53] PCWorld. 2010. Microsoft Cloud Data Breach Heralds Things to Come. (Dec. 2010). https://www.pcworld.com/article/214775/microsoft_ cloud_data_breach_sign_of_future.html. 19 [54] Andrei Sabelfeld and Andrew C Myers. 2003. Language-based information-flow security. IEEE Journal on selected areas in communications 21, 1 (2003), 5–19. [55] Andrei Sabelfeld and David Sands. 2001. A Per Model of Secure Information Flow in Sequential Programs. Higher Order Symbol. Comput. 14, 1 (March 2001), 59–91. [56] Peter Sbarski. 2017. Serverless Architectures on AWS: With examples using AWS Lambda. Manning Publications, Shelter Island, NY. [57] Serverless, Inc. 2017. Serverless Examples. (2017). https://github.com/serverless/examples. [58] Geoffrey Smith and Dennis Volpano. 1998. Secure Information Flow in a Multi-threaded Imperative Language. In Proc. of POPL 1998. San Diego, California, USA, 355–364. [59] Deian Stefan, Alejandro Russo, Pablo Buiras, Amit Levy, John C Mitchell, and David Mazieres. 2012. Addressing covert termination and timing channels in concurrent information flow systems. In ACM SIGPLAN Notices, Vol. 47. 201–214. [60] Deian Stefan, Alejandro Russo, John C. Mitchell, and David Mazières. 2011. Flexible Dynamic Information Flow Control in Haskell. In Proc. of Haskell 2011. 95–106. [61] TechRepublic. 2017. Massive Amazon S3 leaks highlight user blind spots in enterprise race to the cloud. (July 2017). https://www. techrepublic.com/article/massive-amazon-s3-breaches-highlight-blind-spots-in-enterprise-race-to-the-cloud/. [62] The Register. 2011. RSA explains how attackers breached its systems. (April 2011). https://www.theregister.co.uk/2011/04/04/rsa_hack_ howdunnit/. [63] Tom Van Cutsem and Mark S. Miller. 2013. Trustworthy Proxies: Virtualizing Objects with Invariants. In Proc. of ECOOP 2013. Montpellier, France, 154–178. [64] VM2 2017. VM2. (2017). https://github.com/patriksimek/vm2. [65] Wikipedia. 2017. Anthem medical data breach. (2017). https://en.wikipedia.org/wiki/Anthem_medical_data_breach. [66] Wikipedia. 2017. Sony Pictures hack. (2017). https://en.wikipedia.org/wiki/Sony_Pictures_hack. [67] Wikipedia. 2017. Yahoo! data breaches. (2017). https://en.wikipedia.org/wiki/Yahoo!_data_breaches. [68] Wired. 2016. Inside the Cyberattack That Shocked the US Government. (Oct. 2016). https://www.wired.com/2016/10/ inside-cyberattack-shocked-us-government/. [69] Jean Yang, Travis Hance, Thomas H. Austin, Armando Solar-Lezama, Cormac Flanagan, and Stephen Chong. 2016. Precise, Dynamic Information Flow for Database-backed Applications. In Proc. of PLDI 2016. Santa Barbara, CA, USA. [70] Matei Zaharia, Mosharaf Chowdhury, Tathagata Das, Ankur Dave, Justin Ma, Murphy McCauley, Michael J. Franklin, Scott Shenker, and Ion Stoica. 2012. Resilient Distributed Datasets: A Fault-tolerant Abstraction for In-memory Cluster Computing. In Proc. of NSDI 2012. San Jose, CA. [71] Stephan Arthur Zdancewic. 2002. Programming languages for information security. Ph.D. thesis, Cornell University. [72] ZDNet. 2015. Anatomy of the Target data breach: Missed opportunities and lessons learned. (Feb. 2015). http://www.zdnet.com/article/ anatomy-of-the-target-data-breach-missed-opportunities-and-lessons-learned/. http://www.zdnet.com/article/ [73] ZDNet. 2016. AdultFriendFinder network hack exposes 412 million accounts. (Nov. 2016). adultfriendfinder-network-hack-exposes-secrets-of-412-million-users. A SUMMARY OF AUXILIARY SEMANTIC DETAILS B PROOF DETAILS ϵ is the empty sequence and ++ is concatenation. label : OutputChannel → Label run : Thread → Operation write : LabeledValueSeq × Value × Label → LabeledValueSeq write(S, v, l) = (S \ {(v ′, l ′) ∈ S | l ⊑ l ′ }) ++ (v, l) •1 ≈l •2 means •1 ↓l = •2↓l Lemma (Invisibility). If (σ , ps ⊎ l′ @ l e −→ (σ ′, ps ⊎ ps ′) {(t, l ′)}) 20 then σ ′↓l = σ↓l e↓l = nop ps ′↓l = {} Proof. Omitted. Lemma (Projection 1). e1 (1) If Σ −→ Σ1′ , e2 then ∃Σ2′ .∃e 2 . Σ↓l −→ Σ2′ and Σ1′ ≈l Σ2′ and e 1′ ≈l e 2′ . Proof. Let (σ , ps) = Σ. Let (σ1′, ps 1′ ) = Σ1′ . Proceed by cases (ie inversion) on (1). Case: [s-start]. Let t, l ′ be such that: e 1 = start (t, l ′); and σ1′ = σ ; and ps 1′ = ps + (t, l ′). Proceed by cases. Case: where l ′ ⊑ l. Pick Σ2′ = (σ↓l , ps↓l + (t, l ′)). Pick e 2′ = start (t, l ′). QED by [s-start]. Case: where l ′ @ l. Pick Σ2′ = Σ↓l and pick e 2′ = ϵ. QED by [s-skip]. Case: [s-skip]. e 1 = ϵ and Σ1′ = Σ. Pick Σ2′ = Σ↓l and pick e 2′ = ϵ. QED by [s-skip]. Last case: any other rule. Let t, l ′, ps 1 , ps 2 be such that: ps = ps 1 ⊎ {(t, l ′)}; and ps 1′ = ps 1 ⊎ ps 2 ; and Proceed by cases. Case: where l ′ @ l. σ1′↓l = σ↓l and e 1 ↓l = ϵ and ps 2 ↓l = {} by Invisibility. QED by [s-skip]. Last case: where l ′ ⊑ l. Resume case analysis on (1). Case: [s-send]. Let ch, v, t ′ be such that: e 1 = output ch v; and σ1′ = σ ; and 21 ps 2 = {(t ′, l ′)}; and run(t) = send ch v t ′; and l ′ ⊑ label(ch). Pick Σ2′ = (σ↓l , ps 1 ↓l ⊎ {(t ′, l ′)}). Pick e 2′ = output ch v. QED by [s-step]. Remaining cases omitted. Lemma (Projection 2). e1 (1) If Σ↓l −→ Σ1 , e2 then ∃Σ2 .∃e 2 . Σ −→ Σ2 and Σ1 ≈l Σ2 and e 1 ≈l e 2 . Proof. Let (σ , ps) = Σ. Let (σ1 , ps 1 ) = Σ1 . Proceed by cases (ie inversion) on (1). Case: [s-start]. Let t, l ′ be such that: e 1 = (t, l ′); and σ1 = σ↓l ; and ps 1 = ps↓l + (t, l ′); and Pick Σ2 = (σ , ps + (t, l ′)) and e 2 = e 1 . QED by [s-start]. Case: [s-skip]. Pick Σ2 = Σ and e 2 = ϵ. QED by [s-skip]. Case: [s-send]. Let t, l ′, ps 3 , ch, v, t ′ be such that: (2) ps↓l = ps 3 ⊎ {(t, l ′)}; and ps 1 = ps 3 ⊎ {(t ′, l ′)}; and e 1 = output ch v; and σ1 = σ↓l ; and run(t) = send ch v t ′; and l ′ ⊑ label(ch). l′ ⊑ l by (2). ps 3 = (ps − (t, l ′))↓l by (2). Pick Σ2 = (σ , ps − (t, l ′) + (t ′, l ′)). Pick e 2 = e 1 . QED by [s-send]. Remaining cases omitted. 22
6cs.PL
arXiv:1708.00638v1 [math.AG] 2 Aug 2017 ON SUBFINITENESS OF GRADED LINEAR SERIES Huayi Chen & Hideaki Ikoma Abstract. — Hilbert’s 14th problem studies the finite generation property of the intersection of an integral algebra of finite type with a subfield of the field of fractions of the algebra. It has a negative answer due to the counterexample of Nagata. We show that a subfinite version of Hilbert’s 14th problem has a confirmative answer. We then establish a graded analogue of this result, which permits to show that the subfiniteness of graded linear series does not depend on the function field in which we consider it. Finally, we apply the subfiniteness result to the study of geometric and arithmetic graded linear series. Contents 1. Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 2. A weak form of Hilbert’s fourteenth problem. . . . . . . . . . . . . . 7 3. Graded linear series and subfiniteness. . . . . . . . . . . . . . . . . . . . . 9 4. A subfinite version of Zariski’s theorem. . . . . . . . . . . . . . . . . . . . 15 5. Applications. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26 References. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30 1. Introduction Let k be a field and X be an integral projective scheme over Spec k. If D is a Cartier divisor on X, as a graded linear series of D, one refers to a graded Huayi Chen is partially supported by ANR-14-CE25-0015, Hideaki Ikoma is supported by JSPS Grant-in-Aid for Young Scientists (B) No. 16K17559 and partially by JSPS Grantin-Aid (S) No. 16H06335. 2 HUAYI CHEN & HIDEAKI IKOMA L 0 sub-k-algebra of n∈N H (X, nD). The graded linear series are closely related to the positivity of the divisor and are objects of central interest in the study of the geometry of the underlying polarised scheme (X, D). Classically the asymptotic behaviour of graded linear series of finite type is well understood through the theory of Hilbert polynomials. Several results in birational algebraic geometry, such as Fujita’s approximation theorem [9, 24], show that certain graded linear series, even though not of finite type, still have a similar asymptotic behaviour as in the finite generation case. More recently, Lazarsfeld-Mustaţă [16] and Kaveh-Khovanskii [14, 13] have proposed, after ideas of Okounkov [22, 23], a method to encode the asymptotic behaviour of dimensions of the homogeneous components of a given graded linear series into a convex body (called the Newton-Okounkov body) in an Euclidean space. Note that a graded linear series of a Cartier divisor is always a graded subalgebra of a graded algebra of finite type. It is then quite natural to ask if there is a nice birational geometry for algebras of subfinite type (namely subalgebras of an algebra of finite type) over a field. From the point of view of birational geometry, it is more convenient to consider graded linear series of a finitely generated field extension K/k without specifying a polarised model of K. In this framework, as a graded linear series of K/k, we refer to a graded sub-k-algebra V• of the polynomial algebra K[T ] such that V0 = k and that Vn is a finite dimensional vector space over k for any n ∈ N. In [6], a new construction of Newton-Okounkov bodies has been proposed by using ideas from Arakelov geometry, which only depends on a choice of a tower of successive field extensions k = K0 ⊂ K1 ⊂ · · · ⊂ Kd = K such that each extension Ki+1 /Ki is transcendental and of transcendence degree 1. The construction is valid for graded linear series of subfinite type (namely contained in a graded linear series of finite type of K/k) whose field of rational functions k(V• ) coincides with K (see Definition 3.1). One may expect that the same method applies to general graded linear series of subfinite type V• by considering V• as a graded linear series of k(V• )/k. However, the main obstruction to this strategy is that a priori the condition of subfiniteness depends on the extension K/k with respect to which we consider the graded linear series. This leads to the following subfiniteness problem: given a graded linear series V• of K/k of subfinite type, does there exist a graded linear series W• of finite type of the extension k(V• )/k which contains V• ? Note that the above problem is closely related to Hilbert’s fourteenth problem (1) . In fact, given a graded linear series V• of K/k which is contained in a graded linear series of finite type V•′ . The intersection of V•′ with k(V• )[T ] 1. Let k be a field and k(x1 , . . . , xn ) be the field of rational functions of n variables. Hilbert’s fourteenth problem asked whether the intersection of a subfield of k(x1 , . . . , xn ) and the polynomial algebra k[x1 , . . . , xn ] is finitely generated over k (as a k-algebra). ON SUBFINITENESS OF GRADED LINEAR SERIES 3 gives a graded linear series of k(V• )/k containing V• , where k(V• ) is the field of rational functions of V• . Unfortunately the intersection is not necessarily a k-algebra of finite type, as is shown by Nagata’s counterexamples [21, 20] to Hilbert’s fourteenth problem. Note that the above subfiniteness problem actually asks for a weaker condition than the finite generation of the intersection of V•′ with k(V• )[T ]. It suffices that the intersection is contained in a graded linear series of finite type of k(V• ). Similarly, we can consider the following subfinite version of Hilbert’s fourteenth problem, which actually has a positive answer (see Theorem 2.6 and Corollary 2.7 infra). Theorem 1.1. — Let k be a field, R be an integral k-algebra of finite type and K be the field of fractions of R. Let K ′ be an extension of k which is contained in K. Then there exists a finitely generated sub-k-algebra R′ of K ′ containing R ∩ K ′ , such that Frac(R′ ) = Frac(R ∩ K ′ ). The method of proof consists of an induction argument with respect to the field extension K/k which permits to reduce the problem to the case where the extension K/k is monogenerated. Similar method can be applied to the graded case (but with more subtleties because of the grading structure), which leads to the following result and gives a confirmative answer to the subfiniteness problem of graded linear series. It shows that the subfiniteness of graded linear series is an absolute condition, which does not depend on the choice of field extension with respect to which the graded linear series is considered (see Theorem 3.7 and Corollary 4.11 infra). Theorem 1.2. — Let k be a field and K/k be a finitely generated field extension. Let V• be a graded linear series of K/k which is of subfinite type. Then there exists a graded linear series of finite type W• of K/k such that V• ⊂ W• and k(V• ) = k(W• ). Recall that Hilbert’s fourteenth problem is reformulated in a geometric setting by Zariski [25], see also [19] and the survey article [18]. Note that Theorem 1.1 can be compared with the following result in [25]. Theorem 1.3 (Zariski). — Let k be a field, A an integrally closed k-algebra of finite type, K := Frac(A), and K ′ /k a subextension of K/k. There then exist an integrally closed k-algebra B of finite type and an ideal I of B such that the fraction field of B is k-isomorphic to the fraction field of A ∩ K ′ and that [ A ∩ K′ = (B : I n ), n∈N where (B : I n) := {x ∈ Frac(B) : xI n ⊂ B} denotes the ideal quotient. 4 HUAYI CHEN & HIDEAKI IKOMA Inspired by this result, we establish the following projective version of Zariski’s theorem and deduce an alternative proof for Theorem 1.2 (see Corollary 4.11 infra). Theorem 1.4. — Let K/k be a finitely generated field extension and W• a graded linear series of K/k that is generated over k by the homogeneous elements of degree 1. We assume that W1 contains 1 ∈ K and that the projective ′ spectrum P := Proj(WL • ) is a normal scheme. Let K /k be a subextension of ′ ′ K/k and W• ∩ K := n∈N (Wn ∩ K ). Then there exist a rational fibration π : P 99K X of P over an integral normal projective k-scheme X and an effective Q-Weil divisor D on X having the following properties. (i) Rat(X) = k(W• ∩ K ′ ). (ii) Wn ∩ K ′ ⊂ H 0 (X, nD) for every sufficiently positive integer n. (iii) For every ξ ′ ∈ X with dim OX,ξ ′ = 1, there exists a ξ ∈ P with dim OP,ξ = 1 such that ξ ′ = cX (ordξ |Rat(X) ). Moreover, if the transcendence degree of K ′ over k is 1, then we can replace the property (ii) by (ii’) below. (ii’) Wn ∩ K ′ = H 0 (X, nD) for every sufficiently positive integer n. As an application of the above subfiniteness results, we establish a Fujita approximation theorem for general graded linear series of subfinite type (see Theorem 5.2 infra) and an upper bound for the Hilbert-Samuel function of such graded linear series (see Theorem 5.3 infra). More precisely, we obtain the following results. Theorem 1.5. — Let K/k be a finitely generated field extension. For any graded linear series V• of K/k of subfinite type, whose Kodaira-Iitaka dimension d is nonnegative, the limit vol(V• ) = lim n∈N, Vn 6={0}, n→+∞ dimk (Vn ) nd /d! exists in (0, +∞). Moreover, vol(V• ) is equal to the supremum of vol(W• ), where W• runs over the set of all graded linear series contained in V• having d as the Kodaira-Iitaka dimension. Finally, there exists a function f : N → R+ such that nd f (n) = vol(V• ) + O(nd−1 ) d! and that dimk (Vn ) 6 f (n) for any n ∈ N. We also apply the above results to the study of graded linear series in the arithmetic setting (see Theorem 5.6 infra). The article is organised as follows. In the second section, we prove a weaker form of Hilbert’s 14th problem as the subfiniteness result stated in ON SUBFINITENESS OF GRADED LINEAR SERIES 5 Theorem 1.1. In the third section, we prove a graded analogue of Theorem 1.1 in the setting of graded linear series. In the fourth section we consider the subfiniteness problem in the geometric setting as a projective analogue of Zariski’s result and establish Theorem 1.4. Finally in the fifth section, we develop various applications. Notation and conventions. — 1. The field of fractions of an integral domain A is denoted by Frac(A). 2. Let K/k be an extension of fields. We denote by tr.degk (K) the transcendence degree of K over k. 3. Let S be a scheme. For any i ∈ N, we denote by S (i) the set of points x of S such that the local ring OS,x has i as its Krull dimension. If S is an integral scheme, we denote by Rat(S) the field of rational functions on S. 4. Let k be a field and S be a projective normal scheme over Spec k. As Weil divisor (resp. Q-Weil divisor ) on S one refers to an element X D= nV V V ∈S (1) (1) (1) in Z⊕S (resp. Q⊕S ). If all coefficients nV are nonnegative, we say that D is effective, denoted by D > 0. If φ is a nonzero rational function on S, we denote by (φ) the principal Weil divisor associated with φ, namely X (φ) := ordV (φ)V. V ∈S (1) (1) The map (.) : Rat(X)× → Z⊕S is a group homomorphism and induces a (1) Q-linear map from Rat(X)× ⊗Z Q to Q⊕S which we denote by (.)Q . If D is a Q-Weil divisor on S, we define  (1.1) H 0 (X, D) := φ ∈ Rat(S)× : D + (φ ⊗ 1)Q > 0 ∪ {0} and (1.2) R(D)• := M H 0 (X, nD)T n . n>0 Note that R(D)• is a graded sub-k-algebra of the polynomial algebra Rat(S)[T ]. 5. Let K/k be a field extension. As discrete valuation of K over k, we refer to a valuation ν : K → Z ∪ {+∞} such that ν(a) = 0 for any a ∈ k× . Given such a valuation ν, we denote by Oν := {f ∈ K : ν(f ) > 0} its valuation ring, mν the maximal ideal of Oν and κ(ν) := Oν /mν the residue field. Note that κ(ν) is an extension of k and Oν is a k-algebra. If Oν is equal to K, we say that the valuation ν is trivial (note that in this case ν(a) = 0 for any a ∈ K × ). Two discrete valuations ν1 and ν2 of K over HUAYI CHEN & HIDEAKI IKOMA 6 k are said to be equivalent if there exists an order-preserving isomorphism ι : ν1 (K × ) → ν2 (K × ) such that ν2 = ι ◦ ν1 . Let K/k be a finitely generated extension of fields. We say that a discrete valuation ν of K over k is divisorial if tr.degk (K) = tr.degk (κ(ν)) + rkZ (ν(K × )). (1.3) In the case where the valuation is not trivial, the divisorial condition above is just tr.degk (K) = tr.degk (κ(ν)) + 1 Let K ′ /k be a subextension of K/k and let ν be a discrete valuation of K over k which is nontrivial. Then the restriction of ν to K ′ is a discrete valuation of K ′ over k. We define the ramification index of ν with respect to K ′ as the unique integer e(K ′ ,ν) ∈ N satisfying ν(K ′× ) = e(K ′ ,ν)ν(K × ). (1.4) 6. Let k be a field and S be an integral separated k-scheme. Given a discrete valuation ν of Rat(S) over k, we say that a point x of S is the centre of ν in S if OS,x ⊂ Oν (1.5) and mx = mν ∩ OS,x , where mx denotes the maximal ideal of OS,x . By the valuative criterion of separation, if the centre of ν in S exists, then it is unique. In the case where the centre of ν in S exists, we denote it by cS (ν). If S is proper over k, then by the valuative criterion of properness every discrete valuation of Rat(S) over k has a centre in S. A discrete valuation ν is trivial if and only if the centre of ν in S is the generic point. Moreover, each regular point ξ ∈ S (1) defines a discrete valuation L ordξ : Rat(S) → Z ∪ {+∞} whose centre is ξ. 7. Let R• = n∈N Rn be a graded ring. We denote by Proj(R• ) the projective f• the quasispectrum of R• . If M• is a graded R• -module, we denote by M coherent OProj(R• ) -module associated with M• (see [10, §II.2.5]). For any m ∈ N, we let M (m)• be the N-graded R• -module such that M (m)n = Mn+m for any n ∈ N, and let M>m be the N-graded sub-R• -module of M• such that (M>m )n = {0} if n < m and (M>m )n = Mn if n > m. In ^• particular, one has M (m)• = M>m (m)• . The quasi-coherent sheaf R(m) is denoted by OProj(R• ) (m). Note that if R• is generated as an R0 -algebra by R1 , then OProj(R• ) (m) are invertible OProj(R• ) -modules for all m ∈ N, and one has canonical isomorphisms OProj(R ) (m) ⊗O OProj(R ) (m′ ) ∼ = OProj(R ) (m + m′ ) Proj(R• ) • for all (m, m′ ) ∈ N2 . • • ON SUBFINITENESS OF GRADED LINEAR SERIES 7 L 8. Let R• = n∈N Rn be a graded ring. We say that R• is essentially integral if the ideal R>1 of R• does not vanish and if the product of two nonzero homogeneous elements of positive degree of R• is nonzero. Note that if R• is essentially integral then the scheme Proj(R• ) is integral (see [10, Proposition II.2.4.4]) 2. A weak form of Hilbert’s fourteenth problem Let k be a field, R be a finitely generated integral k-algebra and K be the field of fractions of R. Clearly K is a finitely generated extension of k. Let K ′ be a subextension of K/k, which is also a finitely generated extension (see [4, Chapitre V, §14, n◦ 7, Corollaire 3]). We consider the intersection R ∩ K ′ and ask the following question which could be considered as a weaker form of Hilbert’s fourteenth problem: does there exist a finitely generated sub-k-algebra R′ of K ′ containing R ∩ K ′ such that Frac(R′ ) = Frac(R ∩ K ′ ). In this section, we give a confirmative answer to this question. Definition 2.1. — Let k be a field and A be a k-algebra. We say that A is of subfinite type if it is a sub-k-algebra of a k-algebra of finite type. Lemma 2.2. — An injective homomorphism of rings A → B yields a dominant morphism Spec(B) → Spec(A). Proof. — Let p be a minimal prime ideal of A and S := A \ p. Since the homomorphism of rings A → B is injective, also is the localised homomorphism Ap → S −1 B. Hence S −1 B is nonzero. In particular, there exists a prime ideal P of B such that P ∩ S = ∅, or equivalently, P ∩ A ⊂ p. Since P ∩ A is a prime ideal of A and p is a minimal prime ideal of A, one has P ∩ A = p. Proposition 2.3. — Let k be a field and A be a k-algebra of subfinite type. We assume that A is an integral domain. Then there exists a k-algebra of finite type containing A, which is also an integral domain. Proof. — Let B be a k-algebra of finite type such that A ⊂ B. By Lemma 2.2, one can find a prime ideal p of B such that p ∩ A = {0}. Since B is a k-algebra of finite type, also is B/p. The proposition is thus proved. Lemma 2.4. — Let A be a k-algebra which is an integral domain, and K the field of fractions of A. Let K ′ /K be a finite extension of K generated by one element α and B ′ a sub-k-algebra of finite type of K ′ which contains A. Then there exists a sub-k-algebra of finite type B of K which contains A. Proof. — Let f ∈ K[T ] be the minimal polynomial of α over K, which is assume to be monic. Let F1 , . . . , Fn be polynomials in K[T ] such that 8 HUAYI CHEN & HIDEAKI IKOMA B ′ = k[F1 (α), . . . , Fn (α)]. Let S ⊂ K be the (finite) set of the coefficients of the polynomials f , F1 , . . . , Fn . We claim that A is contained in k[S]. In fact, suppose that an element u of A is written in the form ϕ(F1 (α), . . . , Fn (α)), where ϕ ∈ k[X1 , . . . , Xn ], then by Euclidean division the polynomial ϕ(F1 , . . . , Fn ) ∈ k[S][T ] can be written as f g + u, where g is a polynomial in k[S][T ]. Therefore, one has u ∈ k[S]. Lemma 2.5. — Let A be a k-algebra which is an integral domain, and K the field of fractions of A. Let K ′ /K be a purely transcendental extension of transcendence degree 1 and B ′ a sub-k-algebra of finite type of K ′ which contains A. Then there exists a sub-k-algebra of finite type B of K which contains A. Proof. — Let α ∈ K ′ be a transcendental element over K such that K ′ = K(α). Assume that B ′ = k[ϕ1 (α), . . . , ϕn (α)], where each ϕi is a rational function of the form Fi /Gi , where Fi and Gi are polynomials of one variable with coefficients in K and Gi 6= 0. Let β be an element in the algebraic closure of the field K such that Gi (β) 6= 0 in K ′ (β) for any i ∈ {1, . . . , n}. e := k[ϕ1 (β), . . . , ϕn (β)] ⊂ K(β). In fact, if an element Then one has A ⊂ B u of A can be written as P (ϕ1 (α), . . . , ϕn (α)), where P is a polynomial with coefficients in k, then, since α is transcendental over K(β), by considering α as the variable of rational functions and by specifying its value by β, we obtain e and that u = P (ϕ1 (β), . . . , ϕn (β)). Finally, by applying Lemma 2.4 to A ⊂ B the finite extension K(β)/K, we obtain that there exists a k-algebra of finite type B ⊂ K such that A ⊂ B. Theorem 2.6. — Let k be a field and A be a k-algebra of subfinite type. We assume in addition that A is an integral domain and we denote by K the field of fractions of A. Then there exists a sub-k-algebra of finite type B of K such that A ⊂ B. Proof. — By Proposition 2.3, there exists a k-algebra of finite type B ′ which is an integral domain containing A. Let K ′ be the field of fractions of B ′ , it is a finitely generated extension of K. Therefore there exists a sequence of extensions K = K0 ( K1 ( . . . ( Kn = K ′ such that each extension Ki /Ki−1 is generated by one element, i ∈ {1, . . . , n}. The extension Ki /Ki−1 is either generated by an algebraic element over Ki−1 or is purely transcendental of transcendence degree 1. By induction we obtain that, for any i ∈ {0, . . . , n − 1}, there exists a sub-k-algebra of finite type Bi of Ki such that Bi ⊃ A. The theorem is thus proved. Corollary 2.7. — Let k be a field, R be an integral k-algebra of finite type and K be the field of fractions of R. Let K ′ be an extension of k which is ON SUBFINITENESS OF GRADED LINEAR SERIES 9 contained in K. Then there exists a finitely generated sub-k-algebra R′ of K ′ containing R ∩ K ′ , such that Frac(R′ ) = Frac(R ∩ K ′ ). Proof. — By definition, R ∩ K ′ is an integral k-algebra of subfinite type. By Theorem 2.6, there exists a sub-k-algebra of finite type R′ of Frac(R ∩ K ′ ) such that R ∩ K ′ ⊂ R′ . Clearly one has Frac(R′ ) = Frac(R ∩ K ′ ) since R ∩ K ′ ⊂ R′ ⊂ Frac(R ∩ K ′ ). The assertion is thus proved. 3. Graded linear series and subfiniteness Let k be a field and K/k be a finitely generated field extension. Let M K[T ] = KT n n∈N be the graded ring of polynomials of one variable with coefficients in K. Definition 3.1. — As a graded linear series of K/k we refer to a graded sub-k-algebra M V• = Vn T n n∈N of K[T ] such that V0 = k and that Vn is a finite dimensional k-vector subspace of K for any n ∈ N>1 . Let V• and V•′ be two graded linear series of K/k. If Vn ⊂ Vn′ for any n ∈ N, we say that V• is contained in V•′ , or V• contains V•′ , and denote it by V• ⊂ V•′ . Let V• be a graded linear series of K/k. If V• is finitely generated as a k-algebra, we say that V• is of finite type. If V• is contained in a graded linear series of finite type, we say that it is of subfinite type. Let V• be a graded linear series of K/k. We denote by k(V• ) the subextension of K/k generated by elements of the form f /g, where f and g are nonzero elements of K such that there exists n ∈ N>1 with {f, g} ⊂ Vn . The field k(V• ) is called the field of rational functions of V• . Lemma 3.2. — Given any graded linear series V• of K/k, one has k(Vn ) = k(V• ) for every sufficiently positive integer n with Vn 6= {0}, where k(Vn ) denotes the subextension of K/k generated by the elements of the form f /g with {f, g} ⊂ Vn , g 6= 0. Proof. — First, we note that if ℓ ∈ N>1 is an index such that Vℓ contains a nonzero element h, then k(Vm ) ⊂ k(Vm+ℓn ) for any m, n ∈ N>1 . In fact, if {f, g} ⊂ Vm and g 6= 0, then f hn f = and {f hn , ghn } ⊂ Vm+ℓn g ghn Misuse of k as the index since k is referred to the base field. 10 HUAYI CHEN & HIDEAKI IKOMA for any n ∈ N>1 . By changing the grading of V• , we may assume without loss of generality that {n ∈ N : Vn 6= {0}} generates Z as a Z-module. There exist integers {n1 , . . . , nr } ⊂ N>1 and nonzero elements {f1 , . . . , fr , g1 , . . . , gr } ⊂ K such that {fi , gi } ⊂ Vni for any i ∈ {1, . . . , r} and that k(V• ) = k(f1 /g1 , . . . , fr /gr ). Set p := lcm(n1 , . . . , nr ). By the above observation, we can assume {fi , gi } ⊂ Vp for any i, and one has k(V• ) = k(f1 /g1 , . . . , fr /gr ) = k(Vp ). Moreover, by the hypothesis that {n ∈ N : Vn 6= {0}} generates Z as a Zmodule, we can find a positive integer q such that p and q are coprime and that k(Vp ) = k(Vq ) = k(V• ). To conclude the proof, it suffices to show that {pm + qn : m, n ∈ N} contains every sufficiently positive integer. Since p and q are coprime, we can fix x, y ∈ Z such that px − qy = 1. Moreover, we can assume that both x and y are positive. For any r with 0 6 r < q and any n with n > (q − 1)y, qn + r = prx + q(n − ry) ∈ {pm + qn : m, n ∈ N}. Hence {pm + qn : m, n ∈ N} contains every integer not less than q(q − 1)y. Remark 3.3. — Let V• be a graded linear series of K/k and L f be a nonzero n n element of K. We denote by V• (f ) the graded linear series n∈N f Vn T , n n where f Vn := {f g : g ∈ Vn }, called the twist of V• by f . Note that the twist does not change the field of rational functions: one has k(V• (f )) = k(V• ) for any f ∈ K \ {0}. Proposition 3.4. — Let W• be a graded linear series of finite type of K/k. Let n0 be an integer such that n0 > 1. There exist an integer r > 1 and a family (fi T ni )ri=1 of homogeneous elements in W• such that the following conditions are fulfilled: (1) for any i ∈ {1, . . . , r}, one has ni > n0 ; (2) for any integer n > n0 , the vector space Wn is generated by elements of the form f1a1 · · · frar , where a1 , . . . , ar are natural numbers such that a1 n1 + · · · + ar nr = n. Proof. — Suppose that W• is generated by W1 T ⊕ · · · ⊕ Wd T d . We claim that the graded linear series M k⊕ Wn T n n>n0 is generated by Wn0 T n0 ⊕ · · · ⊕ W2n0 +d−2 T 2n0 +d−2 . Let n be an integer such that n > 2n0 + d − 2. Since W• is generated by W1 T ⊕ · · · ⊕ Wd T d , we obtain ON SUBFINITENESS OF GRADED LINEAR SERIES that X Wn = 11 W1a1 · · · Wdad . (a1 ,...,ad )∈Nd a1 +2a2 +···+dad =n Let (a1 , . . . , ad ) be an element in Nd such that a1 + 2a2 + · · · + dad = n. Since n > 2n0 + d − 2, there exist an integer m > 1 and a family  (i) (i) (a1 , . . . , ad ) : i ∈ {1, . . . , m} of elements in Nd such that ∀ j ∈ {1, . . . , d}, ∀ i ∈ {1, . . . , m − 1}, (1) (m) a j + · · · + aj (i) = aj , (i) (i) n0 6 a1 + 2a2 + · · · + dad 6 n0 + d − 1, and (m) n 0 6 a1 Therefore Wn = (m) + 2a2 (m) + · · · + dad X 6 2n0 + d − 2. bn b2n +d−2 Wn0 0 · · · W2n00+d−2 , (bn0 ,...,b2n0 +d−2 )∈Nn0 +d−1 n0 bn0 +···+(2n0 +d−2)b2n0 +d−2 =n which concludes the claim (bj corresponds to the number of i ∈ {1, . . . , m} (i) (i) (i) such that a1 + 2a2 + · · · + dad = j). Finally it suffices to choose a family of homogeneous elements in W• which forms a basis of Wn0 T n0 ⊕ · · · ⊕ W2n0 +d−2 T 2n0 +d−2 . Lemma 3.5. — Let K/k ′ /k be extensions of fields. We assume that the extension K/k is finitely generated and the extension k′ /k is finite. Let W•′ be a graded linear series of finite type of K/k′ and let M W• = k ⊕ Wn′ T n . n∈N>1 Then W• is a graded linear series of finite type of K/k. Proof. — Let (fi T ni )ri=1 be a system of generators of W•′ . Let (θj )m j=1 be a ′ basis of k over k. We claim that W• is generated by (3.1) (θj fi T ni )(i,j)∈{1,...,r}×{1,...,m} . In fact, if ϕ is an element of Wn′ , then it can be written as X λa f1a1 · · · frar , a=(a1 ,...,ar )∈Nr a1 n1 +···+ar nr =n 12 HUAYI CHEN & HIDEAKI IKOMA where the coefficients λa belong to k′ . By writing λa as a linear combination of (θj )m j=1 , we obtain that ϕ lies in the graded linear series of K/k generated by (3.1). The lemma is thus proved. Definition 3.6. — Let V• be a graded linear series of K/k. We assume that there exists n ∈ N>1 such that Vn 6= {0}. We define the Kodaira-Iitaka dimension of V• as the transcendence degree of k(V• ) over k. We refer the readers to [13, §3] and [7, §2] for the definition of Kodaira-Iitaka dimension in the setting of graded linear series of Cartier divisors or line bundles. If Vn = {0} for any n ∈ N>1 , then by convention the Kodaira-Iitaka dimension of V• is defined to be −∞. Theorem 3.7. — Let V• be a graded linear series of K/k. Assume that there exists a graded linear series of finite type V•′ of K/k which contains V• . Then there exists a graded linear series of finite type W• of K/k such that V• ⊂ W• and k(V• ) = k(W• ). Proof. — Step 1: reduction to the case where 1 ∈ V1 and k(V1′ ) = k(V•′ ). Let Θ := {n ∈ N>1 : Vn 6= {0}}. The assertion of the theorem is trivial when Θ = ∅. In the following, we assume that Θ is not empty, and hence it is a subsemigroup of N >1 . Let a ∈ N>1 be a generator of the subgroup of Z L ′ T an is a k-algebra of finite type (see for example generated by Θ. As n∈N Van [10, Lemme II.2.1.6.(iv)]), by changing the grading we can reduce the problem to the case where a = 1. In particular, there exists an m ∈ N>1 such that the vector spaces Vm and Vm+1 are both nonzero. We pick x ∈ Vm \ {0} and y ∈ Vm+1 \ {0}. By replacing V• by the graded linear series generated by V• and (y/x)T and replacing V•′ by the graded linear series generated by V•′ and (y/x)T (this procedure does not change the fields of rational functions), we reduce the problem to the case where V1 6= {0}. Finally, by replacing V• by V• (f −1 ) and V•′ by V•′ (f −1 ) (see Remark 3.3 for the notation), where f is a nonzero element of V1 (again this procedure does not change the fields of fractions, see Remark 3.3), we reduce the problem to the case where 1 ∈ V1 . Moreover, by replacing V•′ by the graded linear series generated by V•′ and α1 T, . . . , αm T , where {α1 , . . . , αm } is a system of generators of k(V•′ ) over k, we may assume that k(V1′ ) = k(V•′ ). Step 2: reduction to the simple extension case by induction. As explained in the previous step, we can assume 1 ∈ V1 and k(V1′ ) = k(V•′ ). Since k(V•′ )/k(V• ) is a finitely generated extension of fields (where V1 is assumed to contain 1), there exist successive extensions of fields k(V• ) = K0 ( K1 ( . . . ( Kb = k(V•′ ) such that each extension Ki /Ki−1 is generated by one element of V1′ . ON SUBFINITENESS OF GRADED LINEAR SERIES 13 Assume that the theorem has been proved for the case where k(V•′ )/k(V• ) is generated by one element in V1′ . Then by induction we can show that, for any i ∈ {0, . . . , b}, there exists a graded linear series of finite type W•(i) , which contains V• and such that k(W•(i) ) = Ki . In fact, we can choose W•(r) = V•′ . Assume that we have chosen a graded linear series of finite type W•(i+1) such that W•(i+1) ⊃ V• and k(W•(i+1) ) = Ki+1 , where i ∈ {0, . . . , b − 1}. Let V•(i) be the graded linear series generated by V• and a finite system of generators (i) of Ki /k in V1′ . The graded linear series V•(i) contains V• and Ki = k(V1 ). Without loss of generality we may assume that V•(i) ⊂ W•(i+1) and that the (i+1) extension Ki+1 /Ki is generated by one element α in W1 , otherwise we just (i) (i+1) replace W• by the graded linear series generated by W•(i+1) , V1 and a generator of the extension Ki+1 /Ki in V1′ . It is a graded linear series of finite type which contains V• and has Ki+1 as its field of rational functions. If the theorem has been proved for the simple extension case, then we obtain the existence of a graded linear series of finite type W•(i) such that V• ⊂ W• and k(W•(i) ) = Ki . Note that the graded linear series W• = W•(0) satisfies the conditions V• ⊂ W• and k(V• ) = k(W• ). Therefore, to prove the theorem it suffices to prove the particular case where the extension k(V•′ )/k(V• ) is generated by one element in V1′ . Similarly, to prove the theorem under the supplementary condition that the extension k(V•′ )/k(V• ) is algebraic, it suffices to prove the particular case where the extension k(V•′ )/k(V• ) is generated by one element in V1′ which is algebraic over k(V• ). Step 3: algebraic extension case. In this step, we prove the theorem under the assumption that the extension k(V•′ )/k(V• ) is algebraic. As explained in the previous two steps, we may suppose without loss of generality that 1 ∈ V1 , k(V1′ ) = k(V•′ ) and the extension k(V•′ )/k(V• ) is generated by one element α in V1′ which is algebraic over k(V• ). Let G(X) := X δ + ξ1 X δ−1 + · · · + ξδ ∈ k(V• )[X] be the minimal polynomial of α over k(V• ). By Proposition 3.4, there exist an integer r ∈ N>1 and homogeneous elements (fi T ni )ri=1 with ni > δ for any i ∈ {1, . . . , r}, which generates the graded linear series M k⊕ Vn′ T n . n>δ Since 1 ∈ Vn ⊂ Vn′ for any n ∈ N>1 , for any i ∈ {1, . . . , r}, one has fi ∈ k(V•′ ). Moreover, since the extension k(V•′ )/k(V• ) is generated by α (which is of degree δ over k(V• )), there exist polynomials Fi (X) := ηi,1 X δ−1 + · · · + ηi,δ ∈ k(V• )[X], i ∈ {1, . . . , r} HUAYI CHEN & HIDEAKI IKOMA 14 such that fi = Fi (α) for any i ∈ {1, . . . , r}. We introduce the following polynomials in k(V• )[T, Y ] e G(T, Y ) = Y δ + (ξ1 T )Y δ−1 + · · · + ξδ T δ , Fei (T, Y ) = (ηi,1 T ni −δ+1 )Y δ−1 + · · · + ηi,δ T ni . e Note that one has G(T, T X) = G(X)T δ and Fe(T, T X) = Fi (X)T ni . We let W• be the graded linear series generated by V1 T ⊕ · · · ⊕ Vδ−1 T δ−1 and the elements ξ1 T, . . . , ξδ T δ , ηi,1 T ni −δ+1 , . . . , ηi,δ T ni (i ∈ {1, . . . , r}). It is a graded linear series of finite type of K/k such that k(W• ) ⊂ k(V• ). It remains to prove that W• contains V• . Clearly Vn ⊂ Wn for n ∈ {1, . . . , δ − 1}. Let n ∈ N>δ and ϕ be an element in Vn ⊂ Vn′ . By definition ϕ can be written in the form X X λa f1a1 · · · frar = λa F1 (α)a1 · · · Fr (α)ar , a=(a1 ,...,ar )∈Nr a1 n1 +···+ar nr =n a=(a1 ,...,ar )∈Nr a1 n1 +···+ar nr =n where λa ∈ k. We consider the element X Fe(T, Y ) = λa Fe1 (T, Y )a1 · · · Fer (T, Y )ar ∈ k(V• )[T, Y ]. a=(a1 ,...,ar )∈Nr a1 n1 +···+ar nr =n Viewed as a polynomial on Y with coefficients in k(V• )[T ], the coefficients of Fe(T, Y ) can be written as the values of certain polynomials on ηi,1 T ni −δ+1 , . . . , ηi,δ T ni (i ∈ {1, . . . , r}). Note that one has X Fe(T, T X) = λa F1 (X)a1 · · · Fr (X)ar T n . a=(a1 ,...,ar )∈Nr a1 n1 +···+ar nr =n Therefore Fe(T, T α) − ϕT n = 0 in k(V•′ )[T ]. Since G is the minimal polynomial of α, an Euclidean division argument shows that ϕT n can be written as a polynomial of ξ1 T, . . . , ξδ T δ , ηi,1 T ni −δ+1 , . . . , ηi,δ T ni (i ∈ {1, . . . , r}). The theorem is thus proved in the particular case where k(V•′ )/k(V• ) is an algebraic extension. Step 4: general case. In this step, we prove the theorem in the general case. As explained in steps 1 and 2, we may assume that 1 ∈ V1 , k(V1′ ) = k(V•′ ) and that the extension k(V•′ )/k(V• ) is generated by one element α in V1′ which is transcendental over k(V• ) (the algebraic case has already been treated in Step 3). Since V•′ is of finite type, there exist an integer r > 1 and homogeneous elements (fi T ni )ri=1 which generate V•′ as a k-algebra. As k(V•′ )/k(V• ) is generated by α, there exists rational functions Pi /Qi (i ∈ {1, . . . , r}), where {Pi , Qi } ⊂ k(V• )[X], Qi 6= 0, such that fi = Pi (α)/Qi (α). ON SUBFINITENESS OF GRADED LINEAR SERIES 15 Let θ be an element in the algebraic closure k of k, such that Qi (θ) 6= 0 b = K(θ). Then K/K b for any i ∈ {1, . . . , r}. Let b k = k(θ) and K is a finite b b extension of field, and K/k is a purely transcendental extension generated by b ] generated by V• and α. Let Vb• and Vb•′ be the graded sub-b k-algebra of K[T ′ ′ b b V• respectively. Then V• is generated as a k-algebra by (fi T ni )ri=1 . We let c• be the graded linear series of K/ b b W k generated by T and elements of the n i form (Pi (θ)/Qi (θ))T , where i ∈ {1, . . . , r}. This is a graded linear series of finite type. Note that Pi (θ)/Qi (θ) ∈ b k(Vb• ) for any i ∈ {1, . . . , r}. Therefore b b c b k(W• ) ⊂ k(V• ). Let n ∈ N>1 and ϕ be an element of Vbn ⊂ Vbn′ . By definition ϕ can be written in the form X ϕ= λa f1a1 · · · frar , a=(a1 ,...,ar )∈Nr a1 n1 +···+ar nr =n where the coefficients λa belong to b k. As α is transcendental over b k(Vb• ), we obtain that r  Y X Pi (θ) ai , ϕ= λa Qi (θ) r a=(a1 ,...,ar )∈N a1 n1 +···+ar nr =n i=1 c• , which implies that which shows that ϕ ∈ Wn . Therefore one has Vb• ⊂ W b b b b c c k(V• ) = k(W• ) since we have already seen that k(W• ) ⊂ b k(Vb• ). Let M cn T n . W W ′ := k ⊕ • n∈N> 1 b by Lemma 3.5 we c• is a graded linear series of finite type of K/ b k, Since W ′ b obtain that W• is a graded linear series of K/k of finite type. Moreover, c• ) = b one has V• ⊂ W•′ and k(W•′ ) ⊂ b k(W k(Vb• ) is a finite extension of k(V• ). Therefore, by the algebraic extension case of the theorem proved in Step 3 we b such that obtain the existence of a graded linear series of finite type W• of K/k V• ⊂ W• and that k(V• ) = k(W• ). Moreover, the equality k(V• ) = k(W• ) and the assumption 1 ∈ V1 ⊂ W1 imply that W• is a graded linear series of k(V• )/k (and hence a graded linear series of K/k). The theorem is thus proved. 4. A subfinite version of Zariski’s theorem 4.1. Preliminaries. — In this section, we collect several basic facts on the valuations and on the graded rings, which we use to show Theorem 1.4. HUAYI CHEN & HIDEAKI IKOMA 16 4.1.1. — Let K/k be a finitely generated field extension. We set D(K/k) = {ν : divisorial valuations of K over k}   ν is a discrete valuation of K over k which either is trivial = ν : or satisfies ν(K × ) ∼ = Z and tr.degk (κ(ν)) = tr.degk (K) − 1 (see Notation and conventions 5). Lemma 4.1. — Let K/k be a finitely generated field extension and K ′ /k be a subextension of K/k. If ν ∈ D(K/k), then the restriction ν ′ := ν|K ′ belongs to D(K ′ /k). Proof. — Let ν ∈ D(K/k). The assertion is trivially true if the restriction of ν to K ′ is a trivial valuation. In the rest of the proof, we assume that ν ′ is not trivial (and consequently ν is not trivial). By applying [3, Chapitre VI, §10, n◦ 3, Corollaire 1] to K ′ /k and K/K ′ , one has (4.1) tr.degk (κ(ν ′ )) + 1 = tr.degk (κ(ν ′ )) + rk(ν(K ′× )) 6 tr.degk (K ′ ) and (4.2) tr.degκ(ν ′ ) (κ(ν)) = tr.degκ(ν ′ ) (κ(ν)) + rk(ν(K × )/ν(K ′× )) 6 tr.degK ′ (K), respectively. By taking the sum of these two inequalities, one obtains (4.3) tr.degk (κ(ν ′ )) + tr.degκ(ν ′ ) (κ(ν)) 6 tr.degk (K ′ ) + tr.degK ′ (K) − 1 = tr.degk (K) − 1. Since ν belongs to D(K/k), one has tr.degk (κ(ν)) = tr.degk (κ(ν ′ )) + tr.degκ(ν ′ ) (κ(ν)) = tr.degk (K) − 1, which means that the inequality in (4.3) is actually an equality. Hence both inequalities (4.1) and (4.2) are equalities. In particular, one has tr.degk (κ(ν ′ )) = tr.degk (K ′ ) − 1. Lemma 4.2. — Let π : X → X ′ be a dominant morphism of integral separated k-schemes, K := Rat(X), K ′ := Rat(X ′ ), and ν a discrete valuation of K/k. If the centre cX (ν) of ν in X exists, then π(cX (ν)) is the center of ν|K ′ in X ′ , namely π(cX (ν)) = cX ′ (ν|K ′ ). Proof. — Since the morphism π is dominant, it induces an injective homomorphism of fields Rat(X ′ ) → Rat(X), which allows to consider K ′ as a subfield of K. Recall that the centre cX (ν) is the unique point x ∈ X satisfying OX,x ⊂ Oν and mx = mν ∩ OX,x (see Notation and conventions 6). Note that  Oν|K ′ = f ∈ K ′ : ν(f ) > 0 = Oν ∩ K ′ , and mν|K ′ = mν ∩ K ′ . ON SUBFINITENESS OF GRADED LINEAR SERIES 17 Hence OX ′ ,π(cX (ν)) ⊂ Oν|K ′ and mπ(cX (ν)) ⊂ mν|K ′ (which implies mπ(cX (ν)) = mv|K ′ ∩ OX ′ ,π(cX (ν)) since mπ(cX (ν)) is a maximal ideal). 4.1.2. — Let R• be a graded ring and let P := Proj(R• ). For each homogeneous element a ∈ R>1 , let   f : deg f = p deg a (4.4) (R• )(a) := ap be the degree 0 component of the localisation R• [1/a], and let DProj(R• )+ (a) := Spec((R• )(a) ) denote the affine open subscheme of Proj(R• ). ^• (see Notation and conventions 7). Given an s ∈ Rn , the Set OP (n) := R(n) local sections s/1 ∈ H 0 (DP + (a), OP (n)) = (R(n)• )(a) for a ∈ R1 glue up to a global section αn (s) ∈ H 0 (P, OP (n)). The following lemmas are well-known. Lemma 4.3 ([10, Proposition II.2.7.3]). — Suppose that the irrelevant ideal R>1 is finitely generated, and let M• be a finitely generated graded R• -module. f• = 0, then Mn = {0} for any sufficiently positive integer n. If M Lemma 4.4. — Let R• be a graded ring and P = Proj(R• ). If R• is essentially integral and is generated as an R0 -algebra by finitely many homogeneous elements in R1 , then the canonical homomorphism α• : R• → R(OP (1))• := L 0 (P, O (n)) is injective and any element of R(O (1)) is integral over H P P • n∈N R• . Proof. — Suppose that R• is generated as an R0 -algebra by {a1 , . . . , ar } ⊂ R1 \{0}, where a1 , . . . , ar are all non zerodivisors in R>1 since R• is essentially integral (see Notation and conventions 8). Given any p ∈ P , one can find an ai such that ai ∈ / p; hence (DP + (ai ))i∈{1,...,r} covers P . Thus, a section in R(OP (1))• can naturally be identified with an element in r \ R• [1/ai ], (4.5) i=1 where the intersection is taken in R• [1/(a1 . . . ar )]. In particular, α• is injective. Given any homogeneous element u ∈ R(OP (1))• , one can find an e > 1 such that aei u ∈ R• for every i by (4.5). Since a1 , . . . , ar generates R>1 , one obtains R>re u ⊂ R>re . Moreover, by induction, R>re un ⊂ R>re un−1 ⊂ · · · ⊂ R>re u ⊂ R>re for every n > 1. It implies that R• [u] ⊂ (1/a1 )re R• ; hence u is integral over R• (see for example [17, Theorem 9.1]). Lemma 4.5. — We keep the notation of Lemma 4.4. Suppose that R• is a Noetherian integral domain and is generated as an R0 -algebra by finitely many homogeneous elements in R1 . HUAYI CHEN & HIDEAKI IKOMA 18 (1) If R• is an N -1 ring, then there exists an n0 > 0 such that αn is isomorphic for every n > n0 . (2) If R• is an integrally closed domain, then αn is isomorphic for every n > 0. Proof. — (1) Recall that an integral domain is called an N -1 ring if its integral closure in its fraction field is a finite generated module over itself. Note that the graded rings R• and R•′ := R(OP (1))• have the same homogeneous fraction field, which is the field of rational functions of the scheme Proj(R• ). In particular, any homogeneous element of R•′ belongs to the homogeneous fraction field of R• , which is contained in the fraction field of R• . By Lemma 4.4 we obtain that R•′ is contained in the integral closure of R• and hence is a module of finite type over R• by the Noetherian and N -1 hypotheses. We consider the exact sequence of OProj(R• ) -modules: 0 ^• ) / Ker(α f• /R α f• f′ /R • ^ •) / Coker(α / 0. ^• ) = Since α f• is isomorphic by [10, Proposition II.2.7.11], we have Ker(α ^ • ) = 0. Hence, by Lemma 4.3, we conclude. Coker(α (2) If R• is integrally closed, the above argument actually leads to R• = R•′ since R•′ is contained in the integral closure of R• . Given a graded ring R• and a positive integer d, the Veronese subring R•(d) of R• is defined as ( Rn if d divides n, and (d) (4.6) Rn := 0 otherwise. for any n ∈ N. Lemma 4.6 ([10, Proposition II.2.4.7]). — For any d ∈ N>1 , the natural inclusion u• : R•(d) → R• induces an isomorphism Proj(u• ) : Proj(R• ) → Proj(R•(d) ) sending p to p ∩ R•(d) . Moreover, the open subscheme DProj(R• )+ (a) is isomorphic to DProj(R(d) )+ (ad ) via Proj(u• ) for each homogeneous element • a ∈ R>1 . Lemma 4.7. — If R• is of finite type over R0 , then Proj(R• ) is projective over Spec(R0 ). Proof. — By [2, Chapitre III, §1, n◦ 3, Proposition 3] and Lemma 4.6, there exists a positive integer n0 such that R•(n0 ) = R0 [Rn0 ] and that the natural morphism Proj(R• ) → Proj(R•(n0 ) ) is isomorphic over Spec(R0 ). Since the L (n0 ) ′ graded ring R•′ := n∈N Rn0 n is finitely generated by R1 as an R0 -algebra, ′ R• can be written as a quotient of a suitable polynomial algebra R0 [T1 , . . . , Tr ] with deg Ti = 1 for each i. Then Proj(R•′ ) → PrR0 is a closed embedding and ON SUBFINITENESS OF GRADED LINEAR SERIES 19 Proj(R•′ ) is projective over Spec(R0 ) in the sense of Hartshorne [12, page 103]. (n ) The isomorphisms Rn′ → Rn00n yield an isomorphism (R•′ )(a) → (R•(n0 ) )(a) for each homogeneous element a ∈ R1′ . Hence, Proj(R•(n0 ) ) → Proj(R•′ ) is an isomorphism and Proj(R•(n0 ) ) is also projective over Spec(R0 ). 4.2. Proof of Theorem 1.4. — We begin with a reminder on the notation and the hypotheses of the theorem. Let K/k be a finitely generated field extension and W• a graded linear series of K/k (see Definition 3.1). We assume that it is generated as a k-algebra by (a finite number of) homogeneous elements of degree 1. Moreover, we assume that W1 contains 1 ∈ K and that the projective spectrum P = Proj(W• ) is a normal scheme. Let K ′ /k be a subextension of K/k. Our purpose is to construct a rational fibration π : P 99K X of integral normal projective k-schemes and an effective Q-Weil divisor D on X satisfying the properties (i)–(iii) predicted L in the theorem. We set W•′ := W• ∩ K ′ = n∈N (Wn ∩ K ′ ) and Q := Proj(W•′ ). Note that Q may not be of finite type over k; hence, may not be proper over k. Since W• ∩ K ′ = W• ∩ k(W• ∩ K ′ ), we can assume without loss of generality that k(W• ∩ K ′ ) = K ′ and k(W• ) = K. We divide the rest of the proof into six steps. Step 1: In this step, we give a valuation theoretic interpretation of the required statement. Let H be the effective Cartier divisor on P defined by the image of 1 via W1 → H 0 (P, OP (1)). By Lemma 4.5(1), one has (4.7) Wn = {φ ∈ K : nH + (φ) > 0} o n = φ ∈ K : ordξ (φ) > −n ordξ (H), ∀ ξ ∈ P (1) for every sufficiently positive integer n. Therefore, o n (4.8) Wn′ = φ ∈ K ′ : ordξ |K ′ (φ) > −n ordξ (H), ∀ ξ ∈ P (1) for every sufficiently positive integer n. Step 2: In this step, we show the following. Claim 4.8. — The scheme Q is normal. Moreover, for any ξ ′ ∈ Q(1) , there exists a ξ ∈ P (1) such that ordξ |K ′ is equivalent to ordξ ′ (see Notation and conventions 5). It is a consequence of the following. Claim 4.9. — Let a be a homogeneous element of degree d > 1 in W•′ , R := (W• )(a) and R′ := (W•′ )(a) . Then R′ = R ∩ K ′ . 20 HUAYI CHEN & HIDEAKI IKOMA Proof of Claim 4.9. — The inclusion R′ ⊂ R ∩ K ′ is obvious. If b is an element of Wdn such that b/an ∈ K ′ , then b ∈ Wdn ∩ K ′ . Hence we obtain b/an ∈ R′ . For each homogeneous element a of positive degree in W•′ , we consider the morphism   (4.9) Spec (W• )(a) −→ Spec (W•′ )(a) . Since P is normal, R := (W• )(a) is integrally closed; hence we have \ R= RP . P∈Spec(R)(1) By Claim 4.9, we know that (4.10) R′ = R ∩ K ′ = \ RP ∩ K ′ P∈Spec(R)(1) is a Krull ring; thus in particular, an integrally closed domain. Given any ξ ′ = p ∈ Spec(R′ )(1) , one can find a P ∈ Spec(R)(1) such that (4.11) Rp′ = RP ∩ K ′ (see [17, Theorem 12.3]). To show Claim 4.8, it suffices to take ξ := P. In fact, if x ∈ R′ \ p, then by (4.11) a 1 = ∈ RP ∩ K ′ x y (a ∈ R, y ∈ R \ P). Thus, if x ∈ P, then y = ax ∈ P, which is a contradiction. Hence, we know p ⊃ P ∩ K ′ . Since p has height 1 and P ∩ K ′ 6= {0}, we have p = P ∩ K ′ . Step 3: Fix an n0 > 1 such that   f ′ : f, g ∈ Wn ∩ K , g 6= 0 = K′ k g for every n divisible by n0 (see Lemma 3.2). Let V•0 be the graded sub-kalgebra of W•′ generated by Wn′ 0 and v• : V•0 → W•′ the natural inclusion map. Let ν0 : X0 → Proj(V•0 ) be a normalisation. Then X0 is an integral normal projective k-scheme with Rat(X0 ) = k(V•0 ) = K ′ (Lemma 4.7). Set  0 G(v• ) := p ∈ Q : p 6⊃ v• (V>1 ) (see Notation and conventions 7) and let Proj(v• ) : G(v• ) → Proj(V•0 ) be the morphism defined by v• . Since Q is normal, Proj(v• ) induces µ : G(v• ) → X0 . Since   µ−1 ν0−1 (DProj(V•0 )+ (a)) = Spec((W•′ )(a) ) ON SUBFINITENESS OF GRADED LINEAR SERIES 21 0 , µ is an affine morphism ([10, Definition for each homogeneous element a in V>1 II.1.2.1]). (1) Step 4: In this step, we show that, given any η ∈ X0 , one can find an η ′ ∈ Q(1) such that η ′ ∈ G(v• ) and µ(η ′ ) = η. We suppose that one finds an (1) η ∈ X0 such that there is no η ′ ∈ G(v• )(1) with µ(η ′ ) = η, from which we are going deduce a contradiction. Since X0 is normal and [ Proj(V•0 ) = DProj(V•0 )+ (a), a: homogeneous 0 and an l belonging to the integral one can fix a homogeneous element a ∈ V>1 b of A := (V•0 )(a) in K ′ such that {η} is defined by a single nonzero closure A b equation f ∈ A[1/l] on the affine open subscheme o n b U := Spec(A[1/l]) = x ∈ ν0−1 (DProj(V•0 )+ (a)) : l(x) 6= 0 . The hypothesis implies that µ∗ f generates the unit ideal on µ−1 (U ) = Spec((W•′ )(a) [1/l]). Thus, there exist n1 , p ∈ N>1 , q ∈ N, and g ∈ Wn′ 1 such that g (4.12) f · p = lq (n1 = p deg a). a Let V•1 be the graded sub-k-algebra of W•′ generated by Wn′ 1 over k and ν1 : X1 → Proj(V•1 ) a normalisation of Proj(V•1 ). Then X1 is also an integral normal projective k-scheme with Rat(X1 ) = K ′ (see Step 3). Let V•0(n1 ) denote the Veronese subalgebra of V•0 (see (4.6)). We consider the natural inclusion homomorphism w• : V•0(n1 ) → V•1 and the commutative diagram u X0 o❴ ❴ ❴ ❴ ❴ ❴ ❴ ❴ ❴ ❴ ❴ ❴ ❴ ❴ ❴ ❴ ❴ ❴ X1 ν0 ν1  Proj(V•0 ) O ? Spec(A) ∼  Proj(w ) / Proj(V 0(n1 ) ) o❴ ❴ ❴ • ❴ Proj(V 1 ) O• O • ? DProj(V 0(n1 ) )+ (an1 ) o ? Spec(B), • b denote the integral where we set B := (V•1 )(an1 ) (see also Lemma 4.6). Let B b closure of B in K ′ . On the open subscheme u−1 (U ) = Spec(B[1/l]), the ∗ equation u f is invertible since f n1 · g n1 =1 an1 p ln1 q HUAYI CHEN & HIDEAKI IKOMA 22 b by (4.12) and gn1 /(an1 p ln1 q ) ∈ B[1/l]. However, on the other hand, the valuation ordη has a centre η1 on X1 , and OX1 ,η1 is a discrete valuation ring. Thus, by the valuative criterion of properness [10, Corollaire II.7.3.6], η1 is contained in the maximal domain of definition for u and is mapped to η ∈ U by u. Therefore, η1 ∈ ν1−1 (G(w• )); hence η1 ∈ u−1 (U ) and u∗ f vanishes at η1 , which leads to a contradiction. (1) Step 5: By Claim 4.8 and Step 4, given any η ∈ X0 , there is a ξ ∈ P (1) such that ordη is equivalent to ordξ |K ′ (see Notation and conventions 5). Claim 4.10. — The set n o (0) (1) / X0 ∪ X0 Σ := ξ ∈ P (1) : cX0 (ordξ |K ′ ) ∈ is finite. In particular, we obtain a surjective map (1) (0) (P (1) ∪ P (0) ) \ Σ → X0 ∪ X0 , ξ 7→ cX0 (ordξ |K ′ ). Proof of Claim 4.10. — The inclusion K ′ ⊂ K yields a morphism π : U ′ → X0 from a nonempty open subscheme U ′ of P . By the theorem of generic flatness [11, Théorème IV.6.9.1], there is a nonempty open subscheme U ′′ ⊂ X0 such that π : π −1 (U ′′ ) → U ′′ is flat. If ξ ∈ π −1 (U ′′ )(1) , then  dim OX0 ,π(ξ) = dim OU ′ ,ξ − dimξ π −1 (π(ξ)) = 0 or 1 (1) (0) [12, Proposition III.9.5]. Thus π maps π −1 (U ′′ )(1) into X0 ∪ X0 . Let eξ denote the ramification index of ordξ (see (1.4)) and set   X ordξ (H) (1) ′ : ξ ∈ P , ξ 7→ ξ , eξ 6= 0 {ξ ′ }. (4.13) D := min e ξ (1) ξ ′ ∈X0 By (4.8) and Claim n Wn′ = φ ∈ K ′ : n ⊂ φ ∈ K′ : n = φ ∈ K′ : 4.10, we have ordξ |K ′ (φ) > −n ordξ (H), ∀ ξ ∈ P (1) o o ordξ |K ′ (φ) > −n ordξ (H), ∀ ξ ∈ P (1) \ Σ o (1) eξ ordξ ′ (φ) > −n ordξ (H), ∀ ξ ′ ∈ X0 = H 0 (X0 , nD) for every n ≫ 0. Step 6: Finally, we consider the case where tr.degk K ′ = 1. In this case, X is a regular projective curve over Spec k, which (as a set) is canonically in bijection with D(K ′ /k). Moreover, we have a surjective map P (1) → X (1) ∪ X (0) , ξ 7→ cX (ordξ |Rat(X) ). ON SUBFINITENESS OF GRADED LINEAR SERIES Hence, if we set (4.14) D := X ξ ′ ∈X (1) min  23  ordξ (H) (1) ′ : ξ ∈ P , ξ 7→ ξ , eξ 6= 0 ξ ′ , eξ then, by (4.8), we have Wn ∩ K ′ = H 0 (X, nD) for every sufficiently positive integer n. 4.3. Rational fibrations associated with graded linear series. — In the following, we give an alternative proof for Theorem 1.2 by using the projective version of Zariski’s result (Theorem 1.4). Corollary 4.11. — Let K/k be a finitely generated field extension and K ′ /k a subextension of K/k. Let V• be a graded linear series of K ′ /k. If V• is contained in a graded linear series W• of K/k and of finite type over k, then V• is contained a graded linear series W•′ of K ′ /k and of finite type over k. Proof. — We divide the proof into three steps. Step 1: In this step, we make several reductions of the theorem. By the same arguments as in the step 1 of Theorem 3.7, we can assume that V1 contains 1. Claim 4.12. — By enlarging K if necessary, we can assume that W• is generated by W1 over k. Proof of Claim 4.12. — Let f1 T d1 , . . . , fr T dr ∈ W>1 be homogeneous generators of W• over k. Let T1 , . . . , Tr be variables with deg Ti = 1 for every i. One can find a homogeneous prime ideal p of W• [T1 , . . . , Tr ] such that p contains I := (T1d1 − f1 T d1 , . . . , Trdr − fr T dr ) and such that p ∩ V• = {0}. In fact, let W•′ := W• [T1 , . . . , Tr ]/I and let a be a homogeneous element of degree > 1. Since the morphism Spec (W•′ )(a) →  Spec (V• )(a) is dominant (Lemma 2.2), there exists a homogeneous prime ideal p ∈ Proj(W•′ ) such that p ∩ V• = {0}. We set U• := W•′ /p. Then U• is a graded linear series of k(U• )/k, W• → U• is injective, and U• is generated by U1 = W1 + W0 T1 + · · · + W0 Tr . In particular, we can assume that P := Proj(W• ) is a projective scheme over ^ k and that OP (1) := W (1)• is an invertible sheaf on P . b Step 2: Let u : P → P be a normalisation and H the Cartier divisor defined by the image of 1 via V1 → H 0 (Pb , u∗ OP (1)). We choose a very ample divisor b such that H b − H is effective and such that R(H) b • is generated by R(H) b 1T H b over R(H)0 . 24 HUAYI CHEN & HIDEAKI IKOMA Note that the graded k-algebra c• := k ⊕ W M n>1 b n H 0 (Pb, nH)T is a graded linear series of K/k and of finite type over k (Lemma 3.5) and that c• ) is isomorphic to Pb over k. Proj(W c• and K ′ /k, we can find an integral normal Applying Theorem 1.4 to W projective k-scheme X, an effective Q-divisor D on X, and an integer n0 > 1 b n ∩ K ′ ⊂ H 0 (X, nD) for such that Rat(X) ⊂ K ′ and such that Vn ⊂ R(H) every n with n > n0 . b be a very ample divisor on X such that D b − D is effective Step 3: Let D ′ b and such that R(D)• is finitely generated over k. Let W• be the graded linear series generated by a basis of M Vn T n n<n0 b • over k. Then Wn′ contains over k and by finite number of generators of R(D) ′ Vn for every n > 0 and W• is finitely generated over k. Theorem 1.4 is comparable with the existence theorem of Iitaka fibrations for line bundles on normal projective varieties (see for example [15, Theorem 2.1.33]). As a consequence of Theorem 1.4, we can give an estimate of the following type for graded linear series of subfinite type (see also [15, Corollary 2.1.38] and Theorem 5.2 infra). Corollary 4.13. — Let K/k be a finitely generated field extension and V• a graded linear series of K/k and of subfinite type. Let d be the Kodaira-Iitaka dimension of V• . If d is nonnegative, then there exist an integral normal projective k-scheme X and Q-Cartier divisors D, D ′ on X such that the rational function field of X is k-isomorphic to k(V• ), that both D and D ′ have KodairaIitaka dimension d, and that H 0 (X, nD ′ ) ⊂ Vn ⊂ H 0 (X, nD) ⊂ k(V• ) for every sufficiently positive n with Vn 6= {0}. Proof. — The existence of D results from the same arguments as in Corollary 4.11. Thus, it suffices to show the existence of D ′ having the prescribed properties. By changing the grading of V• , we may assume that {n ∈ N : Vn 6= {0}} generates Z as a Z-module. Choose any sufficiently positive integer p0 such that k(Vp0 ) = k(V• ) (see Lemma 3.2). Let W• be the sub-k-algebra of V• generated by Vp0 , and set M W•′ := Wp 0 n . n∈N ON SUBFINITENESS OF GRADED LINEAR SERIES 25 ^ ′ By Lemma 4.5, Wn′ = Let P := Proj(W•′ ) and OP (1) := W • (1). 0 H (P, OP (n)) ⊂ Vp0 n for every n ≫ 1. Let ν : Pb → P be a normalisation. Let p be any sufficiently positive integer divisible by p0 . Then one can find an ample divisor A on Pb such that H 0 (Pb, nA) = H 0 (P, ν∗ (OPb (nA))) ⊂ H 0 (P, OP (pn/p0 )) ⊂ Vpn for every positive integer n (see [5, Démonstration de Proposition 3.6]). Repeating the same arguments, one can choose an integral normal projective k-scheme X, two big Cartier divisors A, A′ on X, and two coprime positive integers p, p′ such that H 0 (X, nA) ⊂ Vpn and H 0 (X, nA′ ) ⊂ Vp′ n for any positive integer n. Moreover, one can choose an ample Q-Cartier divisor D ′ on X and two coprime positive integers q, q ′ such that qq ′ D ′ is integral, that q (resp. q ′ ) is divisible by p (resp. p′ ), and that H 0 (X, qnD ′ ) ⊂ H 0 (X, (qn/p)A) ⊂ Vqn and H 0 (X, q ′ nD ′ ) ⊂ H 0 (X, (q ′ n/p′ )A) ⊂ Vq′ n hold for every integer n ∈ N≥1 . Since H 0 (X, qnD ′ ) ⊗k H 0 (X, q ′ n′ D ′ ) → H 0 (X, (qn + q ′ n′ )D ′ ) is surjective for any sufficiently positive integers n, n′ (see for example [15, Example 1.2.22], which is valid over fields of arbitrary characteristics), we have H 0 (X, nD ′ ) ⊂ Vn for every sufficiently positive n (recall the arguments in Lemma 3.2). Theorem 4.14 (Fujita [8, Appendix]). — Let X be an integral normal projective k-scheme and D an effective Cartier divisor on X. If the Kodaira-Iitaka dimension of D is 1, then the section ring R(D)• is finitely generated. Proof. — Let K := Rat(X) and let C = D(k(R(D)• )/k) be the smooth projective k-curve with rational function field k-isomorphic to K ′ := k(R(D)• ). The inclusion K ′ ⊂ K defines a rational map X 99K C and, by taking a suitable b → X, one obtains a flat morphism π : X b → C. If we set blow-up µ : X   X ordξ (µ∗ D) (1) ′ b : ξ ∈ X , ξ 7→ ξ , eξ 6= 0 ξ ′ , E := min e ξ (1) ′ ξ ∈C b nµ∗ D) = H 0 (X, nD) for every positive integer n. then H 0 (C, nE) = H 0 (X, Hence the result is reduced to the classic case of curves. HUAYI CHEN & HIDEAKI IKOMA 26 Remark 4.15. — 1. If X is a surface, Zariski [26] completely classified the cases where R(D)• is finitely generated [26, Theorem 10.6 and Proposition 11.5]. Later, Fujita [8] generalised the case where the Kodaira-Iitaka dimension is one to the form of Theorem 4.14 by using the Iitaka fibrations. 2. For a nef and big Cartier divisor D on X, R(D)• is finitely generated if and only if D is semiample (see [15, Theorem 2.3.15]). 5. Applications In this section, we apply the subfinite criterion (Theorem 1.2) to the study of Fujita approximation for general subfinite graded linear series. Throughout the section, we let k be a field and K/k be a finitely generated k-algebra. Definition 5.1. — Let V• be a graded linear series of K/k and d be its Kodaira-Iitaka dimension (see Definition 3.6). If d 6= −∞, we define the volume of V• as (5.1) vol(V• ) := lim sup n→+∞ dimk (Vn ) . nd /d! A priori this invariant takes value in [0, +∞]. We will see below that, if in addition the graded linear series V• is of subfinite type, then its volume is always a positive real number. We say that a graded linear series V• satisfies the Fujita approximation property if vol(W• ) = vol(V• ), sup W• ⊂V• W• of finite type dim(W• )=dim(V• ) where W• runs over the set of all graded linear series of finite type which are contained in V• and such that W• has the same Kodaira-Iitaka dimension as V• . The purpose of the section is to establish the following approximation result. Theorem 5.2. — Any graded linear series V• of K/k which is of subfinite type and has nonnegative Kodaira-Iitaka dimension d satisfies the Fujita approximation property. Moreover, one has vol(V• ) = dimk (Vn ) ∈ (0, +∞), nd /d! n∈N(V• ), n→+∞ lim where N(V• ) = {n ∈ N : Vn 6= {0}}. ON SUBFINITENESS OF GRADED LINEAR SERIES 27 Proof. — By changing the grading we may assume without loss of generality that Vn 6= {0} for sufficiently positive integer n. Let K ′ be the homogeneous fraction field k(V• ). Note that K ′ /k is a subextension of K/k and hence is finitely generated. Moreover, by Theorem 1.2, we obtain that V• viewed as a graded linear series of K ′ /k is of subfinite type. Therefore, the assertions follow from [6, Theorem 1.1] (by definition V• is birational if we consider it as a graded linear series of K ′ ). By combining the results of [5] and the subfiniteness result (Theorem 1.2), we obtain the following upper bound for the Hilbert-Samuel function of general graded linear series of subfinite type. Theorem 5.3. — Let V• be a graded linear series of K/k and d its KodairaIitaka dimension. There then exists a function f : N → R+ such that f (n) = vol(V• ) nd + O(nd−1 ), d! n → +∞ and ∀ n ∈ N, dimk (Vn ) 6 f (n). Remark 5.4. — The result [6, Theorem 1.1] actually provides more geometric information about the graded linear series of subfinite type. Let K/k be a finitely generated transcendental field extension and let d be the transcendence degree of K/k. We fix a flag k = K0 ⊂ K1 ⊂ . . . ⊂ Kd = K of subfields of K containing k such that each extension Ki /Ki−1 is transcendental and has transcendence degree 1. Let A(K/k) be the set of all graded linear series of subfinite type V• of K/k such that k(V• ) = k. Then there has been constructed in [6] a map ∆ from A(K/k) to the set of convex bodies in Rd which satisfies the following conditions. (a) If V• and V•′ are two graded linear series in A(K/k) such that V• ⊂ V•′ , then one has ∆(V• ) ⊂ ∆(V•′ ). (b) If V• and W• are two graded linear series in A(K/k), then ∆(V• · W• ) ⊃ ∆(V• ) + ∆(W• ) := {x + y : x ∈ ∆(V• ), y ∈ ∆(W• )}, where V• · W• denotes the graded linear series whose n-th homogeneous component is the k-vector space generated by {f g : f ∈ Vn , g ∈ Wn }. (c) For any graded linear series V• in A(K/k), the volume of V• identifies with the Lebesgue measure of ∆(V• ) multiplied by d!. This allows us to construct the arithmetic analogue of Newton-Okounkov bodies for general arithmetic graded linear series of subfinite type, using the ideas of [1]. HUAYI CHEN & HIDEAKI IKOMA 28 In what follows, we assume that k is a number field. We denote by Mk the set of all places of k. For each v ∈ Mk , let |.|v be an absolute value on k which extends either the usual absolute value or certain p-adic absolute value (so that |p|v = p−1 ) on Q. As adelic vector bundle on Spec k, we refer to the data V = (V, (k.kv )v∈Mk ) of a finite dimensional vector space V over k and a family of norms k.kv over V ⊗k kv such that there exists a basis (ei )ri=1 of V over k and a finite subset S of Mk satisfying the following condition: ∀ v ∈ Mk \ S, ∀ (λ1 , . . . , λr ) ∈ kvr , kλ1 e1 + · · · + λr er kv = max |λi |v . i∈{1,...,r} Given an adelic vector bundle V on Spec k, for any nonzero element s ∈ V , we define the Arakelov degree of s as X d deg(s) := − [kv : Qv ] ln kskv . v∈Mk By the product formula ∀ a ∈ k× , X [kv : Qv ] ln |a|v = 0 v∈Mk we obtain that d d ∀ a ∈ k× , deg(as) = deg(s). Moreover, the Arakelov degree of V is defined as X − ln kηkv,det , v∈Mk where η is a nonzero element of det(V ), and kηkv,det = inf{kx1 kv · · · kxr kv : η = x1 ∧ · · · ∧ xr }. Again by the product formula we obtain that the definition does not depend on the choice of η ∈ det(V ) \ {0}. Let V be an adelic vector bundle of rank r on Spec k. For any t ∈ R, let d F t (V ) = Vectk ({s ∈ V \ {0} : deg(s) > t}). This is a decreasing R-filtration on V , called the R-filtration by minima. Note that for any i ∈ {1, . . . , r}, the number λi (V ) = sup{t ∈ R : rkk (F t (V )) > i} coincides with the minus logarithmic version of the i-th minima in the sense of Roy and Thunder. For any s ∈ V , we let λ(s) := sup{t ∈ R : s ∈ F t (V )}. In the following, we let K/k be a finitely generated field extension of the number field k. Let V• be a graded linear series of subfinite type of ON SUBFINITENESS OF GRADED LINEAR SERIES 29 K/k. For each n ∈ N, we equip Vn with a structure of adelic vector bundle (Vn , (k.kn,v )v∈Mk ) on Spec k such that, for any v ∈ Mk , (5.2) ∀ (n, m) ∈ N2 , ∀ (sn , sm ) ∈ Vn × Vm , ksn · sm kv 6 ksn kv · ksm kv . We assume in addition that λmax (V • ) := lim sup n→+∞ λ1 (V n ) < +∞. n This condition implies that V• has a nonnegative Kodaira-Iitaka dimension. For any t ∈ R, let M V•t := F nt (Vn ). n∈N It is a graded linear series of K/k. By definition one has Vnt = {0} if n ∈ N>1 and t > λmax (V • ). Proposition 5.5. — For any t < λmax (V • ), one has k(V• ) = k(V•t ). Proof. — Clearly one has k(V• ) ⊃ k(V•t ). It suffices to prove the converse inclusion. Let n > 1 be an integer and f , g be nonzero elements in Vn . Since t < λmax (V• ) there exist m ∈ N>1 and s ∈ Vm such that λ(s) > mt. Thus for sufficiently positive integer ℓ one has λ(sℓ f ) > (ℓm+n)t and λ(sℓ g) > (ℓm+n)t. t Therefore {sℓ f, sℓ g} ⊂ Vℓm+n , which implies f /g ∈ k(V•t ). The above proposition allows us to consider V•t as a birational graded linear series of k(V• )/k and to construct its Newton-Okounkov body as reminded in Remark 5.4. We define the concave transform of V • as the function GV • on ∆(V• ) sending x ∈ ∆(V• ) to sup{t < λmax (V • ) : x ∈ ∆(V•t )}. By the condition (b) in Remark 5.4, the function GV • is concave. The following result generalises [1, Theorem 2.8] to the case of subfinite adelically normed graded linear series. Theorem 5.6. L — Let K/k be a finitely generated extension of a number field k, and V • = n∈N V n a graded linear series of subfinite type of K/k of Kodaira-Iitaka dimension d > 0, equipped with structures of adelic vector bundles on Spec k, which satisfy the submultiplicativity condition (5.2) and the condition λmax (V • ) < +∞. Then the sequence of measures rkk (Vn ) X 1 δλi (Vn )/n , rkk (Vn ) i=1 n ∈ N(V• ) = {m ∈ N : Vm 6= {0}} 30 HUAYI CHEN & HIDEAKI IKOMA converges weakly to a Boreal probability measure on R, which is the image of the uniform measure 1 1l (x) dx vol(∆(V• )) ∆(V• ) by the concave transform GV • . Proof. — For any t < λmax (V • ), the graded linear series V•t has the same homogeneous fraction field as V• (see Proposition 5.5). Hence we can construct a decreasing family (∆(V•t ))t<λmax (V • ) of convex bodies contained in ∆(V• ), as described in Remark 5.4. Moreover, if t1 and t2 are two real numbers which are < λmax (V • ). Then by the same method as in [1, §1.3], we obtain the desired result. References [1] S. Boucksom & H. Chen – “Okounkov bodies of filtered linear series”, Compositio Mathematica 147 (2011), no. 4, p. 1205–1229. [2] N. Bourbaki – éléments de mathématique. Fascicule XXVIII. Algèbre commutative. Chapitre 3: Graduations, filtra- tions et topologies. Chapitre 4: Idéaux premiers associés et décomposition primaire, Actualités Scientifiques et Industrielles, No. 1293, Hermann, Paris, 1961. [3] , Éléments de mathématique, Hermann, Paris, 1964, Fasc. XXX. Algèbre commutative. Chapitres 5 et 6. [4] N. Bourbaki – Éléments de mathématique, Masson, Paris, 1981, Algèbre. Chapitres 4 à 7. [5] H. Chen – “Majorations explicites des fonctions de Hilbert-Samuel géométrique et arithmétique”, Mathematische Zeitschrift 279 (2015), no. 1-2, p. 99–137. [6] , “Okounkov bodies: an approach of function field arithmetic”, preprint available at https://webusers.imj-prg.fr/~huayi.chen/Recherche/okounkov_cdf.pdf, 2017. [7] S. D. Cutkosky – “Asymptotic multiplicities of graded families of ideals and linear series”, Advances in Mathematics 264 (2014), p. 55–113. [8] T. Fujita – “On L-dimension of coherent sheaves”, Journal of the Faculty of Science. University of Tokyo. Section IA. Mathematics 28 (1981), no. 2, p. 215–236. [9] , “Approximating Zariski decomposition of big line bundles”, Kodai Mathematical Journal 17 (1994), no. 1, p. 1–3. [10] A. Grothendieck & J. Dieudonné – “Éléments de géométrie algébrique. II. Étude globale élémentaire de quelques classes de morphismes”, Institut des Hautes Études Scientifiques. Publications Mathématiques 8 (1961), p. 222. , “Éléments de géométrie algébrique. IV. Étude locale des schémas et des [11] morphismes de schémas. II”, Institut des Hautes Études Scientifiques. Publications Mathématiques (1965), no. 24, p. 231. ON SUBFINITENESS OF GRADED LINEAR SERIES 31 [12] R. Hartshorne – Algebraic geometry, Springer-Verlag, New York, 1977, Graduate Texts in Mathematics, No. 52. [13] K. Kaveh & A. G. Khovanskii – “Newton-Okounkov bodies, semigroups of integral points, graded algebras and intersection theory”, Annals of Mathematics. Second Series 176 (2012), no. 2, p. 925–978. [14] K. Kaveh & A. Khovanskii – “Algebraic equations and convex bodies”, in Perspectives in analysis, geometry, and topology, Progr. Math., vol. 296, Birkhäuser/Springer, New York, 2012, p. 263–282. [15] R. Lazarsfeld – Positivity in algebraic geometry. I, Ergebnisse der Mathematik und ihrer Grenzgebiete. 3. Folge. A Series of Modern Surveys in Mathematics, vol. 48, Springer-Verlag, Berlin, 2004, Classical setting: line bundles and linear series. [16] R. Lazarsfeld & M. Mustaţă – “Convex bodies associated to linear series”, Annales Scientifiques de l’École Normale Supérieure. Quatrième Série 42 (2009), no. 5, p. 783–835. [17] H. Matsumura – Commutative ring theory, second ed., Cambridge Studies in Advanced Mathematics, vol. 8, Cambridge University Press, Cambridge, 1989, Translated from the Japanese by M. Reid. [18] D. Mumford – “Hilbert’s fourteenth problem — the finite generation of subrings such as rings of invariants”, in Mathematical developments arising from Hilbert problems (Proc. Sympos. Pure Math., Vol. XXVIII, Northern Illinois Univ., De Kalb, Ill., 1974), Amer. Math. Soc., Providence, R. I., 1976, p. 431–444. [19] M. Nagata – “Addition and corrections to my paper “A treatise on the 14th problem of Hilbert” ”, Mem. Coll. Sci. Univ. Kyoto. Ser. A. Math. 30 (1957), p. 197–200. , “On the 14-th problem of Hilbert”, American Journal of Mathematics [20] 81 (1959), p. 766–772. , “On the fourteenth problem of Hilbert”, in Proc. Internat. Congress [21] Math. 1958, Cambridge Univ. Press, New York, 1960, p. 459–462. [22] A. Okounkov – “Brunn-Minkowski inequality for multiplicities”, Inventiones Mathematicae 125 (1996), no. 3, p. 405–411. , “Why would multiplicities be log-concave?”, in The orbit method in [23] geometry and physics (Marseille, 2000), Progr. Math., vol. 213, Birkhäuser Boston, Boston, MA, 2003, p. 329–347. [24] S. Takagi – “Fujita’s approximation theorem in positive characteristics”, Journal of Mathematics of Kyoto University 47 (2007), no. 1, p. 179–202. [25] O. Zariski – “Interprétations algébrico-géométriques du quatorzième problème de Hilbert”, Bulletin des Sciences Mathématiques. 2e Série 78 (1954), p. 155–168. [26] O. Zariski – “The theorem of Riemann-Roch for high multiples of an effective divisor on an algebraic surface”, Annals of Mathematics. Second Series 76 (1962), p. 560–615. August 3, 2017 32 HUAYI CHEN & HIDEAKI IKOMA Huayi Chen, Université Paris Diderot, Institut de Mathématiques de Jussieu - Paris Rive Gauche, Bâtiment Sophie Germain, Boîte Courrier 7012, 75205 Paris Cedex 13, France. • Beijing International Center for Mathematical Research, Peking University, Beijing, 100871, China. • E-mail : [email protected] Url : webusers.imj-prg.fr/~huayi.chen Hideaki Ikoma, Department of Mathematics, Kyoto University, Kyoto, 606-8502, Japan E-mail : [email protected]
0math.AC
On the Achievability Region of Regenerating Codes for Multiple Erasures arXiv:1802.00104v1 [cs.IT] 31 Jan 2018 Marwen Zorgui, Zhiying Wang Center for Pervasive Communications and Computing (CPCC) University of California, Irvine, USA {mzorgui,zhiying}@uci.edu Abstract—We study the problem of centralized exact repair of multiple failures in distributed storage. We describe constructions that achieve a new set of interior points under exact repair. The constructions build upon the layered code construction by Tian et al in [1], designed for exact repair of single failure. We firstly improve upon the layered construction for general system parameters. Then, we extend the improved construction to support the repair of multiple failures, with varying number of helpers. In particular, we prove the optimality of one point on the functional repair tradeoff of multiple failures for some parameters. Finally, considering minimum bandwidth cooperative repair (MBCR) codes as centralized repair codes, we determine explicitly the best achievable region obtained by space-sharing among all known points, including the MBCR point. I. I NTRODUCTION Driven by the growth of data-centric applications, efficient data storage and retrieval has become of crucial importance for several service providers. Distributed storage systems (DSS) are currently widely employed for large-scale storage. DSS provide scalable storage and high level of resiliency in the face of server failures. To maintain the desired level of failure tolerance, DSS utilize a replacement mechanism for out-ofaccess nodes, known also as the repair mechanism, that allows to recover the content of inaccessible/failed nodes. The repair process of a failed node is performed by downloading data from accessible nodes (or a subset thereof) in the system and recovering the lost data. Efficiency of a DSS is determined by two parameters, namely, the overhead required for reliability and the amount of data being transferred for a repair process. The seminal work in [2] proposed a new class of erasure codes, called regenerating codes, that optimally solve the repair bandwidth problem. It is shown in [2] that one can significantly reduce the amount of bandwidth required for repair and the bandwidth decreases as each node stores more information. Regenerating codes, as presented in [2], achieve functional repair. In this case, the replacement nodes are not required to be exact copies of the failed nodes, but the repaired code should satisfy reliability constraints. However, in practice, it is often more desirable to recover the exact same information as the failed node, which is called exact repair. Exact repair codes are easier to implement and maintain, and thus are of more interest. There has been a flurry of interest in designing exact repair regenerating codes [3]–[11]. Moreover, there is a growing literature focused on understanding the fundamental limits of exact repair regenerating codes [12]–[15], as opposed to the well-understood functional regenerating codes [2]. A. Multi-node recovery In many practical scenarios, such as in large scale storage systems, multiple failures are more frequent than a single failure. Moreover, many systems apply a lazy repair strategy, which seeks to limit the repair cost of erasure codes. Indeed, it has been demonstrated that jointly repairing multiple failures reduces the overall bandwidth compared to repairing each failure individually [16]–[19]. We distinguish between two ways of repairing multiple failures. Cooperative regenerating codes: In this framework, each replacement node first downloads information from d nodes (helpers). Then, the replacement nodes exchange information between themselves before regenerating the lost nodes. Of interest to our work, we note that codes corresponding to the extreme points on the cooperative tradeoff have been developed: minimum storage cooperative regenerating (MSCR) codes [17], [20] and minimum bandwidth cooperative regeneration (MBCR) codes [21]. Centralized regenerating codes: Upon failure of e nodes, the repair is carried out in a centralized way by contacting any d helpers out of the n − e available nodes, d ≤ n − e, and downloading β amount of information from each helper. The content of any k out of n nodes in the system is sufficient to reconstruct the entire data. Let α be the size of each node, and F be the size of the entire data. A code satisfying the centralized repair constraints is referred to as an (F, n, k, d, e, α, β) code. We also say it is a code of the (n, k, d, e) system. In our previous work [19], we characterized the functional repair tradeoff for multi-node recovery. Let q = ⌈ ke ⌉ − 1, t = k − qe. The normalized functional tradeoff can then be written as follows min(tᾱ, dβ̄) + q−1 X p=0 min(eᾱ, (d − t − pe)β̄) ≥ 1, (1) where ᾱ = α/F, β̄ = β/F . Inequality (1) gives q linear bounds: (t + pe)ᾱ + q−1 X i=p (d − t − ie)β̄ ≥ 1, p = 0, . . . , q − 1. (2) In this work, we are interested in designing centralized exact repair regenerating codes for recovering multiple failures. When e ≥ k, the tradeoff reduces to a single point, which is trivially achievable [19]. We hereafter focus on the case e < k. In [18], it is argued that cooperative regenerative codes can be used to construct centralized repair codes. The total bandwidth in this case is obtained by taking into account the bandwidth obtained from the helper nodes and disregarding the communication between the replacement nodes. In particular, MSCR codes achieve the same performance as centralized minimum storage multi-node repair (MSMR) codes [11], [18]. Additionally, MBCR codes can be used as centralized repair codes, which do not correspond to centralized minimum bandwidth codes on the functional tradeoff [19]. These points are given by e 1 ), (ᾱM SM R , β̄M SM R ) = ( , k k(d − k + e) 2e 2d + e − 1 , ). (ᾱM BCR , β̄M BCR ) = ( k(2d − k + e) k(2d − k + e) (3) (4) Contributions of the paper: We improve upon the layered construction presented in [1], which is concerned with single node repair, to construct a family of regenerating codes that is capable of repairing multiples failures. In particular, for the (k + e, k, k, e) system, we first prove the optimality of a particular constructed point using the functional repair tradeoff; combining the achievable points via our construction and also the MBCR point, we then characterize the best achievable region obtained by space-sharing between all known points. The remainder of the paper is organized as follows. A description of our first code construction is provided in Section II. In Section III, we analyze the achievability region of the (k + e, k, k, e) system. We describe our second code construction in Section IV, before concluding in Section V. Notation: we denote by [i] the set of integers {1, 2, . . . , i} for i ≥ 1. II. C ODE C ONSTRUCTION Exact repair regenerating codes are characterized by parameters (F, n, k, d, e, α, β). We consider a distributed storage system with n nodes storing F amount of information. The data elements are distributed across the n storage nodes such that each node can store up to α amount of information. We use ᾱ = α/F, β̄ = β/F to denote the normalized storage size and repair bandwidth, respectively. The system should satisfy the following two properties: • Reconstruction property: by connecting to any k ≤ n nodes it should be sufficient to reconstruct the entire data. • Repair property: upon failure of e nodes, a central node is assumed to contact d helpers, k ≤ d ≤ n − e, and download β amount of information from each of them. The exact content of the failed nodes is determined by the central node. β is called the repair bandwidth. We first describe the code construction which is an improvement upon [1]. The construction is based on a collection of subsets of [n], called a Steiner system. Information is first encoded within each subset, and then distributed among the n nodes. We recall the definition of Steiner systems. Definition 1. A Steiner system S(t, r, n), t ≤ r ≤ n, is a collection of subsets of size r, included in [n], such that any subset of [n] of size t appears exactly once across all the subsets. Steiner systems do not exist for all design parameters. When t = r, Steiner systems always exist, and the blocks in this case are all r−combinations of the set [n]. The family of (F, n, k, d, e, α, β) codes we describe below is parameterized by t, m, r, for e ≤ m < r ≤ n, t ≤ r, where  n Nr t F = N (r − m), N = r , α = , k = n − m. (5) n t Construction 1. Precoding step: We consider a Steiner system (n) S(t, r, n) and generate N = rt blocks such that each block is (t) indexed by a set J ∈ S(t, r, n). Block J corresponds to r − m information symbols over an alphabet of size q, which is then encoded using an MSMR code with length r and dimension r−m over an alphabet of size q. The codeword symbols, called the repair group J, is comprised of {cx,J : x ∈ J}. Moreover, we assume that the MSMR code possesses the optimal repair bandwidth (3) for any number of erasures l, 1 ≤ l ≤ m, and any number of helpers d, r − m ≤ d ≤ r − l. The total number of information symbols is F = N (r − m). The code matrix: The code structure can be described by a code matrix C, of size n × N . The rows of C are indexed by integers in [n], corresponding to the different storage nodes, and its columns are indexed by sets in S(t, r, n), arranged in some arbitrary chosen order. We formally define C as ( cx,J , if x ∈ J, Cx,J = (6) −, otherwise, where ” − ” denotes an empty symbol. Node i ∈ [n] stores all the non-empty symbols of row i in the code matrix C. It can be checked that the storage per node is given by α = Nnr . By abuse of notation, the terms block and repair group are used interchangeably. The requirement on the alphabet size q is dictated by the existence of an MSMR code with the required property in (3). Such MSMR codes are known to exist [9]. Example 1. Consider a Steiner system S(t, r, n) = S(3, 4, 8). So the number of blocks is N = 14 and each node number appears α = rN n = 7 times in the blocks. The 14 blocks are given by J1 = {1, 2, 4, 8}, J2 = {2, 3, 5, 8}, J3 = {3, 4, 6, 8}, J4 = {4, 5, 7, 8} J5 = {1, 5, 6, 8}, J6 = {2, 6, 7, 8}, J7 = {1, 3, 7, 8}, J8 = {3, 5, 6, 7} J9 = {1, 4, 6, 7}, J10 = {1, 2, 5, 7}, J11 = {1, 2, 3, 6} J12 = {2, 3, 4, 7}, J13 = {1, 3, 4, 5}, J14 = {2, 4, 5, 6}. The code matrix is given by (7) in Figure 1. Let m = 2, e = 2, d = n − e = 6. Then we can repair nodes 1 and 2 simultaneously, by downloading • symbols c4,J1 , c8,J1 from nodes 4 and 8, respectively. These help repair symbols c1,J1 and c2,J1 , • symbols c5,J10 , c7,J10 from nodes 5 and 7, respectively. These help repair symbols c1,J10 and c2,J10 , • symbols c3,J11 , c6,J11 from nodes 3 and 6, respectively. These help repair symbols c1,J11 and c2,J11 , • 12 symbol from each of the nodes 5, 6 and 8, to repair c1,J5 , • 21 symbol from each of the nodes 3, 7 and 8, to repair c1,J7 , • 21 symbol from each of the nodes 4, 6 and 7, to repair c1,J9 , • 21 symbol from each of the nodes 3, 4 and 5, to repair c1,J13 , • and similarly for node 2 to repair c2,J2 , c2,J6 , c2,J12 and c2,J14 . From the example above, we see that each repair group J tolerates the failure of m nodes. Therefore, the code C also tolerates the failure of up to any m nodes. Thus, it can be checked that for Construction 1 from any k = n − m nodes, we can recover the data, which is the reconstruction parameter. Moreover, the code can recover from any m failures. Therefore, it is possible to repair simultaneously any 1 ≤ e ≤ m failures. The number of helpers is flexible, and satisfies k ≤ d ≤ n − e. The repair bandwidth is given in Propositions 1 and 2 for two different scenarios. Proposition 1. Using Construction 1 with t = r, it is possible to repair simultaneously any set of 1 ≤ e ≤ m nodes, using n − m ≤ d ≤ n − e helpers, such that the contribution of each helper, denoted by βe (d), is given by βe (d) = e   min(n−d−e+s,r−1)  d − 1 n − d − e X X s e . (8) p − s r − p − 1 m − p+s s s=1 p=max(s,r−d) Proof: In the repair procedure, any subset of missing symbols belonging to the same repair group is repaired via MSMR repair procedure, using all available helpers from the same group among the chosen helper nodes. Fixing the set of helper nodes, we argue that the repair is feasible. Indeed, let H be the set of d helpers. For each repair group J, we denote ′ ′ the set of remaining nodes in J as J . Using |H ∪ J | ≤ n − e and d ≥ k = n − m, it follows that ′ ′ be chosen from the remaining n − e − d nodes. Figure 2 summarizes the repair situation for given parameters s and p. Summing over all repair contributions, and analyzing the limit cases of p for a given s, (8) follows. ĞͲƐ 1,J1 c2,J1  −  c4,J 1 C=  −   −  − c8,J1 − c2,J2 c3,J2 − c5,J2 − − c8,J2 − − c3,J3 c4,J3 − c6,J3 − c8,J3 − − − c4,J4 c5,J4 − c7,J4 c8,J4 c1,J5 − − − c5,J5 c6,J5 − c8,J5 c1,J7 − c3,J7 − − − c7,J7 c8,J7   ŶͲĚͲĞͲƉнƐ   !"#$%&' ()*+, functional tradeoff space sharing Construction 1 Layered code [1] Exact-repair tradeoff 0.16 (9) − c2,J6 − − − c6,J6 c7,J6 c8,J6 ƉͲƐ (n,k,d,e)=(10,7,7,1) ≥ d + r − e − (n − e) = r + d − n c ĚͲƌнƉ Remark 1. It can be seen that the repair procedure can benefit from the MSMR repair property in the case n > k + 1. In particular, the advantages of using MSMR codes in our construction over maximum distance separable (MDS) codes as in [1] are: 1) lower repair bandwidth, 2) symmetric repair among helper nodes, which obviates the need for the expensive procedure of duplicating the block design as in [1], and 3) adaptability, meaning non-trivial repair strategies for multiple erasures, 1 ≤ e ≤ m with the help of varying number of helpers d, such that n − m ≤ d ≤ n − e. Figure 3 shows a comparison between the performance of the layered code in [1] and Construction 1, for an (n, k, d) = (10, 7, 7) system. The MSR repair property clearly helps reduce the bandwidth. |J ∩ H| = |H| + |J | − |H ∪ J | Thus, for each repair group, we have enough information across the set of helpers to recover the missing components. We now analyze the contribution of a single helper h: h helps in the simultaneous repair of s missing symbols of the same repair group, such that 1 ≤ s ≤ e. For each size s, we count all possible cases in which the repair can be done through the help of r − p coded symbols among all the d helpers, because the number of available coded symbols determines the contribution of each helper, as dictated by the MSMR repair bandwidth (3). It follows that, for the corresponding repair group, r − p − 1 can be chosen from the set of d − 1 helpers (helper h already belongs to the repair group by assumption), while the remaining p − s elements of the repair group can ƌͲƉ Fig. 2: A repair situation associated to given parameters s and p. ′ ≥ r − n + n − m = r − m. Ɛ      Normalized bandwidth per helper In total, we download 18 symbols. Each helper transmits 3 symbols. 0.14 0.12 0.1 0.08 0.06 0.04 0.14 0.16 0.18 0.2 0.22 0.24 0.26 Normalized storage per node Fig. 3: Using the MSR repair property improves upon the layered code repair performance. The technique of using MSMR codes as building blocks for outer code constructions has been used in the literature, for instance in constructing codes with local regeneration [22], [23]. − − c3,J8 − c5,J8 c6,J8 c7,J8 − c1,J9 − − c4,J9 − c6,J9 c7,J9 − c1,J10 c2,J10 − − c5,J10 − c7,J10 − c1,J11 c2,J11 c3,J11 − − c6,J11 − − − c2,J12 c3,J12 c4,J12 − − c7,J12 − Fig. 1: Code matrix for the system with parameters (t, r, n) = (3, 4, 8). c1,J13 − c3,J13 c4,J13 c5,J13 − − − − c2,J14 − c4,J14 c5,J14 c6,J14 − −      .     (7) Remark 2. We argue that one can use a regenerating code corresponding to an interior point instead of an MSMR code as the inner code per repair group. Consider the case (n, k, d, e) = (5, 4, 4, 1). Let r = t = 5, m = 1 in (5). The code structure is given by   − c1,J2 c1,J3 c1,J4 c1,J5 c2,J1 − c2,J3 c2,J4 c2,J5     (10) − c3,J4 c3,J5  C = c3,J1 c3,J2 . c4,J1 c4,J2 c4,J3 − c4,J5  − c5,J1 c5,J2 c5,J3 c5,J4 Thus, the code per column of C is of length r = 4 and dimension r − m = 3. We use the interior code: (ᾱ0 , β̄0 ) = ( 83 , 14 ) per repair group. Let F0 be the information size per column. 3 Thus, F = 5F0 and α = 3F2 0 . It follows that ᾱ = 10 . To repair node 1, we download a total bandwidth of 3F0 . Thus, 3 3 3 . We obtain the achievable point (ᾱ, β̄) = ( 10 , 20 ). β̄ = 20 The same point is equally achievable using Construction 1 with (t, r, n, m, e) = (3, 3, 5, 1, 1) with an MSMR code as the interior code. This point is optimal on the exact-repair tradeoff of the (5, 4, 4, 1) system [10], [24], and is the optimal point next to the minimum bandwidth regenerating point. In Proposition 1, we considered Construction 1 with Steiner systems such that t = r. We study next the use of a general Steiner system for the specific (k + 2, k, k, 2) system. Proposition 2. Construction 1 generates an (F, k + 2, k, k, 2, α, β) code such that    n−2 n−1 n t−2 t−1 t (11) F = (r − 2) r , α = r−1 , β = r−2 , t ᾱ = t−1 t−2 r r(r − 1) , β̄ = . n(r − 2) n(n − 1)(r − 2) (12) Proof: We consider a Steiner system S(t, r, n) and let m = 2. From (5), we obtain F and α as in (11). To analyze the repair bandwidth per helper, we distinguish two cases: Case t = 2: If the helper node h shares a block with both failed nodes, then, by design, h does not share any other block with either of the failed nodes. Thus, h contributes a single symbol (log2 q bits) that is useful for the repair of the missing symbols of the shared repair group. Otherwise, h shares exclusively two blocks with each of the failed nodes. In each of the shared repair group, node h contributes 12 symbol ( 21 log2 q bits) to help repair the corresponding missing symbol, by virtue of the MSMR repair property (i.e., the missing symbol is repaired with r − 1 helpers). Case t ≥ 3: For a helper h, the number of blocks he shares (n−3 t−3 ) . The number with both failed nodes is given by λ3 , r−3 ( t−3 ) of blocks node h shares exclusively with either of the failed (n−2 (n−3 t−2 ) t−3 ) nodes is given by λ2 − λ3 , r−2 − r−3 . Therefore, the ( t−2 ) ( t−3 ) contribution of each helper node is 2(λ2 − λ3 ) 2λ3 + = λ2 . β= (r − 2) − (r − 2) + 2 (r − 1) − (r − 2) + 1 The repair in Example 1 is an illustration of Proposition 2. Similar to Proposition 1, the repair bandwidth is identical among the helper nodes, and independent of the choice of the failed nodes and helpers. Remark 3. We note here that ᾱ, β̄ do not depend on t by (12). The advantage of using Steiner systems with smaller t, whenever they exist, is that they induce smaller α and β, for the same normalized parameters. Indeed, it can be shown that α, as given by (11), is strictly increasing in t. Therefore, to reduce the storage size per node, and therefore the repair bandwidth, it is advantageous to use a Steiner System with the smallest t, t ≤ r. Moreover, when e = 2, t = r, Proposition 1 and Proposition 2 give the same ᾱ, β̄. III. A NALYSIS OF THE ACHIEVABILITY FOR AN (n, k, d, e) = (k + e, k, k, e) SYSTEM In this section, we analyze the achievable region for an (n, k, d, e) = (k + e, k, k, e) system by means of Construction 1, using, for simplicity, a Steiner system with t = r. Proposition 3. Construction 1 with t = r, m = e generates a set of achievable points for an (F, k + e, k, k, e, α, β) system, such that F = ! k+e (r − e), α = r ! k+e−1 ,β = r−1 ! k+e−2 , r−2 (13) r(r − 1) r , β̄ = , (k + e)(r − e) (k + e)(k + e − 1)(r − e) e + 1 ≤ r ≤ k + e. ᾱ = (14) Proof: When d = k, n = k + e, m = e, r is chosen such that e + 1 ≤ r ≤ n, the general expression in (8) is given by βe (k) = e X t=max(1,r−k) ! ! k−1 e−1 = r−t−1 t−1 ! k+e−2 , r−2 (15) where the last equality follows from Vandermonde’s identity. A. Optimality of one achievable point Proposition 4. For the (k + e, k, k, e) system, the point achieved in (13) for r = k + e − 1 is an optimal interior point. Proof: From (13) when r = k + e − 1, we achieve F = (k + e)(k − 1), α = k + e − 1, β = k + e − 2. Thus, (ᾱ, β̄) = ( k+e−1 k+e−2 , ). (k + e)(k − 1) (k + e)(k − 1) (16) Substituting (16) in (2) and setting p = q − 1, we obtain (t + qe − e)ᾱ + (d − t − qe + e)β̄ = (k − e)ᾱ + eβ̄ = 1. Therefore, the above point lies on the functional repair lower bound and hence is optimal. It lies on the first segment of the bound near the MSMR point, and it is not the MSMR point nor the MBCR point, as indicated by (3) and (4). B. Optimal extension property Proposition 5. Consider a (k +e, k, k, e) system and consider the optimal point achieved by Construction 1 in Proposition 4, one can extend the system to a (k + e + 1, k, k, e + 1) system, operating at the optimal point of Proposition 4, by adding another node to the system and increasing the storage per node, while keeping the initial storage content. Proof: Let αi , βi , Fi , for i = 1, 2, refer to the parameters of the old and the new systems, respectively. Then, α2 − α1 = 1, β2 − β1 = 1, F2 − F1 = k − 1. Moreover, the number of blocks N is increased by 1. Let k + e + 1 be the index of the new node to be added. The new code is obtained by simply adding another block, whose set is {1, . . . , k + e}, and adding to the old sets the element (k + e + 1) to each of them, and thus generating another coded symbol for the corresponding repair group. A key requirement is to assume the use of an MSMR code that can accommodate the addition of extra coded symbols, when needed. This can be done by choosing the number of nodes of the MSMR code to be as large as needed (this may result in an increase in the underlying field size). Each old node will store an extra symbol coming from the new repair group, while the new node stores the newly generated coded symbols from the old repair groups. Normalized bandwidth per helper From Proposition 4, Construction 1 gives us an optimal point for any (k + e, k, k, e) system. Construction 1 also offers the following property. (n,k,d,e)=(17,14,14,3) 0.07 functional tradeoff space sharing :MBCR and MSMR Construction 1 space sharing MBCR and r=8 space sharing MBCR and r=9 0.065 0.06 0.055 0.05 r=8 0.045 r=6 0.04 0.035 0.03 0.025 0.07 0.08 0.09 0.1 0.11 0.12 0.13 0.14 0.15 0.16 Normalized storage per node Fig. 4: Achievable points for an (n, k, d, e) = (17, 14, 14, 3) system. The x-axis is the normalized storage per node ᾱ and the y-axis is the normalized bandwidth β̄. of Proposition 5, we can increase the fault tolerance of the system by any desirable factor. C. Acheivability region for the (k + e, k, k, e) system In this subsection, we seek to determine the convex hull of the known achievable points for the (k + e, k, k, e) system. The convex hull, denoted by R, is the smallest convex set Example 2. We illustrate the process of extending a (4, 3, 3, 1) containing all known achievable points, obtained by all convex system to a (5, 3, 3, 2) system. Initially, each repair group is combinations (i.e., space-sharing) among the points achieved by Construction 1, described in (14), and also the MBCR point of size 3. The code blocks are given by given by (4). The objective is therefore to determine which J1 = {2, 3, 4}, J2 = {1, 3, 4}, J3 = {1, 2, 4}, J4 = {1, 2, 3}. points are sufficient to describe R. We refer to these points as corner points of R. The code matrix is given by Figure 4 presents the achievable points for an (17, 14, 14, 3)   − c1,J2 c1,J3 c1,J4 system. The achievable points of (13) are parameterized by r, − c2,J3 c2,J4  c . C1 =  2,J1 such that e + 1 ≤ r ≤ e + k. For each r, we denote the − c3,J4  c3,J1 c3,J2 corresponding point as (ᾱr , β̄r ). As r decreases, the storage − c4,J1 c4,J2 c4,J3 Adding node 5 to the system, we add another block J5 = αr increases. By abuse of notation, we refer to the point {1, 2, 3, 4}, whose symbols will be distributed across the old (ᾱr , β̄r ) as point r. We state some guiding observations for our subsequent analysis. First, one can eliminate some of the nodes {1, 2, 3, 4}. The old blocks become achievable points obtained by Construction 1. For instance, J1 = {2, 3, 4, 5}, J2 = {1, 3, 4, 5}, J3 = {1, 2, 4, 5}, J4 = {1, 2, 3, 5}. point r = 5, with ᾱ = 0.1471, achieves a similar bandwidth as the neighbor point r = 6, but at a larger storage size. Points The new node 5 stores newly generated coded symbols of each to the right of ᾱ = 0.1471, such that r < 5, can be also of the old repair groups {J1 , . . . , J4 }. The new code matrix immediately eliminated, because they can be outperformed is given by by space-sharing between the MBCR point and some interior   point. Interestingly, we observe that point r = 8 lies exactly − c1,J2 c1,J3 c1,J4 c1,J5  c2,J1 c c − c on the segment joining point r = 9 and the MBCR point. This 2,J5  2,J4 2,J3   means that, while point r = 8 is not outperformed by spacec − c c c . C2 =  3,J5  3,J4 3,J2  3,J1 c4,J1 c4,J2 c4,J3 − c4,J5  sharing, it is nonetheless not necessary for the description of − c5,J1 c5,J2 c5,J3 c5,J4 R, and thus it is not considered as a corner point. In the following, we show that the observations from Figure 4 can The above property is useful for systems for which the be generalized and we explicitly determine the corner points fault tolerance may be deemed insufficient. Therefore, one can of R, depending on the system’s parameters e and k. increase the fault tolerance of the system without sacrificing the optimality on the exact repair tradeoff, or changing the Lemma 1. The achievable points in (13), with r < 2e, are existing data. We note also that by a successive application not corner points in R. Proof: From (13), it can be seen that ᾱ(r), seen as a function of r, is decreasing. β̄(r) is a fractional function in r, with a pole at r = e. For r > e, β̄(r) is convex in r. It can be shown that it decreases and then increases monotonically. Therefore, as ᾱ(r) is decreasing, the points of interest are those for which β̄(r) increases. Moreover, by noticing that β̄(2e) = β̄(2e − 1), it follows that points with r ≤ 2e − 1 do not contribute to the acheivability region (ᾱ, β̄), as these points are outperformed by the point r = 2e in terms of both, storage and bandwidth. Lemma 1 implies that it is sufficient to consider the range 2e ≤ r ≤ k + e. We define the non-negative integer p such that r = 2e + p. We now show that the achievable points r = 2e, . . . , k + e can not be eliminated by space-sharing between themselves, when not considering the MBCR point. Lemma 2. The achievability region of the points (ᾱr , β̄r ), r = e + 1, . . . , k + e has points with r ∈ {2e, . . . , k + e} as corner points, when not considering the MBCR point. Proof: By virtue of Lemma 1, points with e + 1 ≤ r < 2e can be eliminated. We consider the segment joining the points (ᾱr , β̄r ) and (ᾱr+1 , β̄r+1 ). The slope of the segment, denoted sl(r), is given by −r(r − 2e + 1) β̄r+1 − β̄r = . sl(r) = ᾱr+1 − ᾱr e(k + e − 1) The slope sl(r) is strictly decreasing in r for r ≥ 2e. This means, for any three consecutive points (ᾱr+2 , β̄r+2 ), (ᾱr+1 , β̄r+1 ) and (ᾱr , β̄r ), the point (ᾱr+1 , β̄r+1 ) lies below the segment joining the other two extreme points. Therefore, space-sharing between (ᾱr+2 , β̄r+2 ) and (ᾱr , β̄r ) is suboptimal. Now, we analyze the achievability region when adjoining the MBCR point to the points in (13) with 2e ≤ r ≤ k + e. Lemma 3. The MBCR point is a corner point for R . 2k+e−1 2 (k+e)k > ᾱ2e = (k+e) and 2(2e−1) (k+e)(k+e−1) , along with Lemma 2 Proof: Noting that ᾱMBCR = 2e (k+e)k β̄MBCR = < β̄2e = concludes the result. By Lemma 3, we only need to analyze whether spacesharing between the MBCR point and any other point r may ′ outperform some of the other achievable points r . Lemma 4. If a point r, r ≥ 2e, is not outperformed by space-sharing between the point r + 1 and the MBCR point, then, all points r′ such that r′ ≥ r, are corner points of the achievability region. Proof: The assumption of the lemma implies that the slope of the segment joining the points (ᾱr , β̄r ) and (ᾱMBCR , β̄MBCR) is smaller than the slope of the segment between (ᾱr+1 , β̄r+1 ) and (ᾱMBCR , β̄MBCR ). As from Lemma 2, the slope of the segment between (ᾱr , β̄r ) and (ᾱr+1 , β̄r+1 ) is decreasing in r, it follows that no point r′ ≥ r can be outperformed by space-sharing across any two other achievable points, including the MBCR point. Therefore, to determine the corner points of R, we need to successively test for increasing values of p, such that 0 ≤ p ≤ k − e, whether the point r = 2e + p is outperformed by spacesharing of MBCR and point r + 1. Let p∗ denote the smallest p such that r = 2e + p is not outperformed by space-sharing, it follows by Lemma 4 the following achievability region. Proposition 6. The achievability region R is given by the corner points R = {(ᾱr , β̄r ) : r ∈ {r : r = 2e + p and p∗ ≤ p ≤ k − e} ∪ {MBCR}}, (17) where 1 ≤ p∗ ≤ k − e, and p∗ is given by p∗ =  e − k − 2e2 + 1 + 2(e + k − 1) √  ∆ + 1, ∆ = (2e2 − e + k − 1)2 + 8(k + e − 1)e(e − 1)(k − e − 1). (18) Proof: Consider r = 2e + p, 0 ≤ p ≤ k − e − 1. We consider space-sharing between the MBCR point and the point r + 1. We compute the normalized bandwidth, denoted by β¯′ r , achieved by the considered space-sharing, at the intermediate point α = αr , and then determine whether β¯′ r > β̄r . Using (14) and (4), we obtain after simplification β¯′ r − β̄r k(−2e2 + 2e + p2 + p) − p(−2e2 + e + 1) + 2e(e2 − 1) + p2 (e − 1) (e + k)(e + p)(e + k − 1)(e2 + pe + k − p + kp − 1) N1 (k) (19) , D 2 2 (k + e − 1)p + p(2e + k − e − 1) + 2e(e − 1)(e + 1 − k) = (e + k)(e + p)(e + k − 1)(e2 + pe + k − p + kp − 1) N2 (p) . (20) , D = We regard N1 as a function of k, for fixed e and p, and N2 as a function of p, for fixed e and k. In this proof, we are interested in analyzing N2 . We analyze N1 in a later proof. Clearly D > 0. Thus, sign(β¯′ r − β̄r ) = sign(N2 (p)). Therefore, it suffices to study the sign of N2 (p). We note that β¯′ r − β̄r ≤ 0 implies that point r = 2e + p can be eliminated by space-sharing and thus it is a not a corner point. N2 (p) is a quadratic function in p. Let ∆ denote the discriminant of N2 (p). It can be checked that ∆ = (2e2 − e + k − 1)2 + 8(k + e − 1)e(e − 1)(k − e − 1) > 0. Thus, there exists p0,1 , p0,2 such that N2 (p0,1 ) = N2 (p0,2 ) = 0. As the leading coefficient of N2 (p) is positive, and N2 (0) = −2e(e − 1)(k − e − 1) ≤ 0, it follows that one solution, say p0,1 , is negative and the other solution p0,2 is non-negative. That is, p0,1 < 0 and p0,2 ≥ 0. Then, it follows that ∀0 ≤ p ≤ p0,2 , N2 (p) ≤ 0, which implies that the set {p : p ≤ p0,2 } can be eliminated. In particular, p = 0 is always eliminated. Let p∗ = ⌊p0,2 ⌋ + 1, as in (18). Thus, p∗ outperforms spacesharing and so do all p ≥ p∗ . As N2 (k − e − 1) = (k − e)(k + e − 1)(k − e − 1) ≥ 0, it follows that p0,2 ≤ k − e − 1, and thus p∗ ≤ k − e. Proposition 6 agrees with known particular cases. 1) When e = 1, we have p∗ = 1 and the only eliminated point (p = 0) coincides with the MBCR point, in agreement with [1]. 2) The optimal point in Proposition 4 (p = k − e − 1) is not a corner point for k = e + 1, because of p∗ = k − e > p and Proposition 6. Indeed, the point with p = k − e − 1 lies exactly on the segment joining the MBCR and the MSMR point. 3) When k > e + 1, the optimal point in Proposition 4 is a corner point, as β¯′ k+e−1 − β̄k+e−1 = (k−e)(k−e−1) k(k+e)(k−1)2 > 0. While Proposition 6 characterizes exactly R, it does not give insight into when a particular point r = 2e + p is a corner point or not. We focus on the analysis of the sign of N1 (k) in (19). N1 (k) is linear in k. Depending on the sign of its the leading coefficient −2e2 + 2e + p2 + p, there may exist an integer kth such that when k ≥ kth space sharing enhances the achievability region (i.e., N1 (k) ≤ 0 ) and does not enhance it when k < kth . That is, a point with the same r may be a corner point for some (k + e, k, k, e) systems and may be not a corner point for other systems, with higher reconstruction parameter k. For example, when p = e − 1, we have N1 (k) = e(1 − e)(k − 5e + 1). It follows that, for systems with k ≥ 5e − 1, the point r = 2e + (e − 1) = 3e − 1 is outperformed by spacesharing. For systems with 3e − 1 ≤ k < 5e − 1, the point r is a corner point. The next proposition addresses the cases in which a particular point r = 2e+p is a corner point, using a similar argument as the above example. Proposition 7. Consider the achievable point r = 2e + kp, for j p fixed (e, k), e > 1. Let pmax = 12 ( 8e(e − 1) − 1 − 1) and   e+1 (p+1 2 )+2( 2 )+ep kth = (1 − e) . Then, Table I specifies the e (p+1 2 )−2(2) scenarios in which (ᾱr , β̄r ) is a corner point in R. (ᾱr , β̄r ) k < kth (p) k ≥ kth (p) p ≤ pmax X ✗ p > pmax cannot be 0, for e > 0, ∀p ≥ 0. The maximum value of p satisfying (23) is given by   1 p ( 8e(e − 1) − 1 − 1) . pmax = (24) 2 Thus, a point r = 2e + p, p > pmax is a corner point for any (k + e, k, k, e) system such that r ≤ k + e. For each 0 ≤ p ≤ pmax , the point r = 2e + p is a corner point if and only if sign(β¯′ r − β̄r ) = sign(N2 (k)) > 0. From (19), Let k0 be the solution to the linear equation N1 (k) = 0. Then, after simplification, we have (1 − e)(2e2 + 2ep + 2e + p2 + p) −2e2 + 2e + p2 + p   p+1 + 2 e+1 + ep . = (1 − e) 2 p+1 2 e −2 2 2 k0 = Proof: We examine N1 (k). First, we note that when −2e2 +2e+p2+p > 0, the point r = 2e+p is a corner point for all systems. Indeed, as N1 (e + 1) = 2ep(e + p) > 0, p > 0, we have N1 (k) > 0, ∀k ≥ e + 1, p > 0. It follows that, for a fixed (e, p), we need to determine the sign of −2e2 + 2e + p2 + p. We have (26) As p ≤ pmax , we have −2e2 + 2e + p2 + p < 0, which also implies that k0 > 0. As N1 (e + 1) = 2ep(e + p), we have kth ≥ e + 1, with equality iff p = 0. It can be checked from (26) that when p = e − 1, k0 = 5e − 1. For k ≥ k0 , point r is not a corner point. As k is an integer and k0 is not necessarily an integer, it follows that k ≥ k0 ⇐⇒ k ≥ ⌈k0 ⌉ , kth . Using Proposition 7, Corollary 1 follows. Corollary 1. For a (k + e, k, k, e) system with e ≥ 2, we have • X TABLE I: Summary of cases for which (ᾱr , β̄r ) is a corner point in R. The symbol X means (ᾱr , β̄r ) is a corner point while the symbol ✗ denotes the other case. (25) • • p∗ in (18) can also be expressed as p∗ = 1 + max{p : p ≤ pmax and k ≥ kth (p)} (27)   p  1 = 1 + max p : p ≤ ( 8e(e − 1) − 1 − 1) 2 & '   p+1 + 2 e+1 + ep 2 2   and k ≥ (1 − e) . (28) p+1 − 2 2e 2 The number of corner points in R is given by nc , |{r : 2e + p∗ ≤ r ≤ k + e}| + 1 = k − e + 2 − p∗ . As a function of k, p∗ levels out at k = kth (pmax ) and its final value is given by 1 + pmax . Example 3. We consider the setting of Figure 4: e = 3, k = 14. We obtain pmax = 2, p∗ = 3. This means the points r, for 6 ≤ r ≤ 2e + p∗ − 1 = 8 are not corner points in R and the number of corner points is nc = 10. This clearly matches the observations made in Figure 4. − 2e2 + 2e + p2 + p < 0 ⇐⇒ p(p + 1) < 2e(e + 1), (21)     p+1 e ⇐⇒ <2 , 2 2 r ⇐⇒ p < 2e2 − 2e − (22) 1 1 1 p − = ( 8e(e − 1) − 1 − 1). 4 2 2 (23) We p note that RHS of (23) can not be an integer, as otherwise 8e(e − 1) − 1 should be an odd integer, implying 8e(e − 1) − 1 ≡ 1 mod 4, which leads to a contradiction as 8e(e − 1) − 1 ≡ 3 mod 4. This also implies that the slope of N1 (k) IV. C ODE CONSTRUCTION 2 In this section, we present another family of codes improved upon [1] that encapsulates Construction 1 as a special case. Let G denote the N (r − m) × nα generator matrix after vectorization of the code in (6), with t = r. Every node corresponds to a set of α columns of G. Different from Construction 1, we allow k ≤ n − m, hence we may feed Fc , (r − m)N dependent symbols to the generator matrix. Let T be kα columns of G corresponding to k out of the n nodes. Let G|T be the submatrix of G consisting of the p=max(1,r−(n−k)) (29) The maximum amount of information that can be stored in the system, F , is upper bounded by ρk,m,r , i.e., F ≤ ρk,m,r . For instance, when m = n − k, it can be checked that ρk,m,r = (r − m)N = Fc . To generate the Fc dependent symbols, we add another layer of inner code to Construction 1. Moreover, the information symbols are assumed to be over Fκq , for the finite field Fq and an appropriately chosen positive integer κ. Construction 2. For an (n, k, d, e) system, similarly to Construction 1, the code construction is parameterized by m, r, such that e ≤ m ≤ n − k and m + 1 ≤ r ≤ n (we assume t = r). For each pair (r, m), let F be given by (29), F κ α = n−r r−1 . First, the F information symbols {vi }i=1 , vi ∈ Fq , are used to construct a linearized polynomial f (x) = F X vi xq i−1 . (30) i=1 The linearized polynomial is then evaluated at Fc elements of Fκq to obtain {f (θi ), 1 ≤ i ≤ Fc }, which when viewed as vectors over Fq , are linearly independent. Finally, the evaluation points {f (θi ), 1 ≤ i ≤ Fc } are fed to the encoder in Construction 1. Repair: The repair of e nodes is similar to Construction 1, and the contribution of each helper is given by (8). We note that the elements in Construction 1 are defined over an alphabet of size q, while the evaluation points are defined over Fκq . This difference can be resolved by viewing {f (θi ), 1 ≤ i ≤ Fc } as vectors over Fq and applying Construction 1 to each of their components. Similarly, the repair is carried out component-wise. The linearized polynomial evaluations are an instance of rank-metric codes. In [1, Proposition 5], it is shown that the use of rank-metric codes guarantees the reconstruction property of the regenerating code. Moreover, [1] shows that when κ ≥ Fc , the symbols {f (θi ), 1 ≤ i ≤ Fc } can be made independent over Fq . In fact, rank metric codes may be replaced by other linear codes, as long as the reconstruction property is satisfied, so as to reduce the field size [1]. Furthermore, we note that when m = n − k, the use of rank-metric codes is not needed, and the code obtained is simply the code in Construction 1. Remark 4. Construction 2 generalizes the non-canonical construction in [1], which is designed for repairing single erasures. Moreover, the non-canonical construction in [1] is based on MDS codes, rather than MSMR codes, and its repair scheme is based on the naive repair scheme of MDS codes. Finally, non-canonical codes in [1] set m = n − d, while in Construction 2, m takes arbitrary values, such that e ≤ m ≤ n − k. Remark 5. The repair process in Construction 2 does not take (n,k,d,e)=(19,13,14,3) m=e m=e+1 m=e+2 m=e+3 functional tradeoff Space sharing: MSMR and MBCR MBCR point 0.06 Normalized bandwidth per helper columns of T . Then the rank of G|T , denoted by ρk,m,r , is independent of the choice of the k nodes, and is given by [1]    min(k,r) X k n−k min(p, r − m). ρk,m,r = p r−p 0.055 0.05 0.045 0.04 0.035 0.03 0.025 0.07 0.08 0.09 0.1 0.11 0.12 0.13 0.14 Normalized storage per node Fig. 5: Achievable points using Construction (n, k, d, e) = (19, 13, 14, 3) system. The x-axis malized storage per node ᾱ and the y-axis is the bandwidth β̄. When m = n − k = e + 3, the coincides with Construction 1. 2 for an is the nornormalized blue curve into account the dependency introduced by rank-metric codes among the Fc = (r − m)N intermediate symbols. It may be possible to reduce further the repair bandwidth by leveraging such dependency. By varying m and r in Construction 2, we obtain various achievability points. Construction 1 is a special case of Construction 2, corresponding to m = n − k. In particular, when k = d, n = k + e, Constructions 1 and 2 coincide as m = n − k = e. For other parameters, simulation shows that Construction 1 performs better closer to the MSMR point while Construction 2 with m = e performs better closer to the MBCR point. Figure 5 plots the achievable points by Construction 2 for an (n, k, d, e) = (19, 13, 14, 3) system, for various values of m, e ≤ m ≤ n − k. V. C ONCLUSION We studied the problem of centralized exact repair of multiple failures in distributed storage. We first described a construction that achieves a new set of interior points. In particular, we proved the optimality of one point on the functional centralized repair tadeoff. Moreover, considering minimum bandwidth cooperative repair codes as centralized repair codes, we determined explicitly the best achievable region obtained by space-sharing among all known points, for the (k + e, k, k, e) system. Finally, we described another construction, that includes the first construction as a special case, and that generates various achievable points for a general (n, k, d, e) system. Future work includes investigating outer bounds for the centralized exact repair problem. R EFERENCES [1] C. Tian, B. Sasidharan, V. Aggarwal, V. A. Vaishampayan, and P. V. Kumar, “Layered exact-repair regenerating codes via embedded error correction and block designs,” IEEE Trans. Inf. Theory, vol. 61, no. 4, pp. 1933–1947, 2015. [2] A. G. Dimakis, P. Godfrey, Y. Wu, M. J. Wainwright, and K. Ramchandran, “Network coding for distributed storage systems,” IEEE Trans. Inf. Theory, vol. 56, no. 9, pp. 4539–4551, 2010. [3] N. B. Shah, K. Rashmi, P. V. Kumar, and K. Ramchandran, “Interference alignment in regenerating codes for distributed storage: Necessity and code constructions,” IEEE Trans. Inf. Theory, vol. 58, no. 4, pp. 2134– 2158, 2012. [4] C. Suh and K. Ramchandran, “Exact-repair MDS code construction using interference alignment,” IEEE Trans. Inf. Theory, vol. 57, no. 3, pp. 1425–1442, 2011. [5] A. S. Rawat, O. O. Koyluoglu, and S. Vishwanath, “Progress on high-rate msr codes: Enabling arbitrary number of helper nodes,” in Information Theory and Applications Workshop (ITA), 2016. [6] S. Goparaju, A. Fazeli, and A. Vardy, “Minimum storage regenerating codes for all parameters,” IEEE Trans. Inf. Theory, vol. 63, no. 10, pp. 6318–6328, Oct 2017. [7] V. R. Cadambe, S. A. Jafar, H. Maleki, K. Ramchandran, and C. Suh, “Asymptotic interference alignment for optimal repair of MDS codes in distributed storage,” IEEE Trans. Inf. Theory, vol. 59, no. 5, pp. 2974– 2987, May 2013. [8] I. Tamo, Z. Wang, and J. Bruck, “Zigzag codes: MDS array codes with optimal rebuilding,” IEEE Trans. Inf. Theory, vol. 59, no. 3, pp. 1597– 1616, March 2013. [9] M. Ye and A. Barg, “Explicit constructions of high-rate MDS array codes with optimal repair bandwidth,” IEEE Trans. Inf. Theory, vol. 63, no. 4, pp. 2001–2014, April 2017. [10] M. Elyasi and S. Mohajer, “Determinant coding: A novel framework for exact-repair regenerating codes,” IEEE Trans. Inf. Theory, vol. 62, no. 12, pp. 6683–6697, 2016. [11] M. Zorgui and Z. Wang, “Centralized multi-node repair for minimum storage regenerating codes,” in IEEE International Symposium on Information Theory (ISIT), June 2017, pp. 2213–2217. [12] B. Sasidharan, K. Senthoor, and P. V. Kumar, “An improved outer bound on the storage-repair-bandwidth tradeoff of exact-repair regenerating codes,” in IEEE International Symposium on Information Theory (ISIT). IEEE, 2014, pp. 2430–2434. [13] I. M. Duursma, “Outer bounds for exact repair codes,” arXiv preprint arXiv:1406.4852, 2014. [14] B. Sasidharan, N. Prakash, M. N. Krishnan, M. Vajha, K. Senthoor, and P. V. Kumar, “Outer bounds on the storage-repair bandwidth trade-off of exact-repair regenerating codes,” International Journal of Information and Coding Theory, vol. 3, no. 4, pp. 255–298, 2016. [15] I. M. Duursma, “Shortened regenerating codes,” arXiv preprint arXiv:1505.00178, 2015. [16] A.-M. Kermarrec, N. Le Scouarnec, and G. Straub, “Repairing multiple failures with coordinated and adaptive regenerating codes,” in International Symposium on Network Coding (NetCod). IEEE, 2011, pp. 1–6. [17] K. W. Shum and Y. Hu, “Cooperative regenerating codes,” IEEE Trans. Inf. Theory, vol. 59, no. 11, pp. 7229–7258, Nov 2013. [18] A. S. Rawat, O. O. Koyluoglu, and S. Vishwanath, “Centralized repair of multiple node failures with applications to communication efficient secret sharing,” arXiv preprint arXiv:1603.04822, 2016. [19] M. Zorgui and Z. Wang, “Centralized multi-node repair in distributed storage,” in 2016 54th Annual Allerton Conference on Communication, Control, and Computing (Allerton), Sept 2016, pp. 617–624. [20] J. Li and B. Li, “Cooperative repair with minimum-storage regenerating codes for distributed storage,” in INFOCOM, 2014 Proceedings IEEE. IEEE, 2014, pp. 316–324. [21] A. Wang and Z. Zhang, “Exact cooperative regenerating codes with minimum-repair-bandwidth for distributed storage,” in 2013 Proceedings IEEE INFOCOM, April 2013, pp. 400–404. [22] G. M. Kamath, N. Prakash, V. Lalitha, and P. V. Kumar, “Codes with local regeneration and erasure correction,” IEEE Trans. Inf. Theory, vol. 60, no. 8, pp. 4637–4660, 2014. [23] A. S. Rawat, N. Silberstein, O. O. Koyluoglu, and S. Vishwanath, “Optimal locally repairable codes with local minimum storage regeneration via rank-metric codes,” in Information Theory and Applications Workshop (ITA), 2013. IEEE, 2013, pp. 1–8. [24] C. Tian, “A note on the rate region of exact-repair regenerating codes,” arXiv preprint arXiv:1503.00011, 2015.
7cs.IT
arXiv:1509.01376v2 [math.GR] 17 Feb 2016 New topological methods to solve equations over groups Anton Klyachko and Andreas Thom Abstract. We show that the equation associated with a group word w ∈ G ∗ F2 can be solved over a hyperlinear group G if its content – that is its augmentation in F2 – does not lie in the second term of the lower central series of F2 . Moreover, if G is finite, then a solution can be found in a finite extension of G. The method of proof extends techniques developed by Gerstenhaber and Rothaus, and uses computations in p-local homotopy theory and cohomology of compact Lie groups. Contents Introduction 1. The main results 2. The topology of SU(p) and PU(p) 3. Solvability of equations Acknowledgments References 1 2 5 11 15 15 Introduction This paper is about the solvability of equations in groups. Let us start by briefly recalling the analogous situation of polynomial equations with rational coefficients. Even though not every non-constant polynomial p(t) ∈ Q[t] has a root in Q, there always exists a finite field extension Q ⊂ K, such that p(t) = 0 can be solved in K, i.e., there exists α ∈ K with p(α) = 0. Indeed, it is straightforward to construct some splitting field K with the desired property using the machinery of commutative algebra. On the other side, it is also well-known that arguments from algebraic topology (using notions of degree, winding number or the fundamental group) can be used to show that every polynomial has a root in the topological field C and historically, this was the first way to provide a field extension of Q in which p(t) = 0 can be solved – an argument which essentially goes back to Gauss’ work from 1799. In the analogous situation, when one wants to solve equations with coefficients in a group, the algebraic or combinatorial approach fails to a large extend and the homotopy theoretic approach has been used by Gerstenhaber-Rothaus [14] to obtain positive results – see the next section for definitions and more precise statements. As a particular consequence, Gerstenhaber-Rothaus were able to prove the Kervaire-Laudenbach conjecture for locally residually finite groups. First of all, 1 2 ANTON KLYACHKO AND ANDREAS THOM we want to clarify a relationship between Connes’ Embedding Problem and the KervaireLaudenbach Conjecture that was observed in [36]. Moreover, we want to extend this study to cover a larger class of groups and also a larger class of equations which can be handled by methods from algebraic topology. Our methods involve a detailed study of the p-local homotopy type of the simple Lie group PU(p) and the effect of word maps on the cohomology ring with mod p coefficients. Our first main result applies to any prime number p and any group word w ∈ SU(p) ∗ F2 . If the augmentation of w in F2 does not lie in the second step of the exponent-p central series [F2 , F2 ]p [F2 , [F2 , F2 ]], then the equation w(a, b) = 1 can be solved in SU(p). This implies our second main result, which says that a two-variable equation with augmentation not in [F2 , [F2 , F2 ]] can be solved over any hyperlinear group, see Section 1 for details. Moreover, if the group G is finite, then a solution can be found in a finite extension of G. This covers classes of singular equations, which were intractable by combinatorial methods or the topological methods developed by Gerstenhaber-Rothaus. Our main results are stated explicitly as Theorems 1.5 and 1.6 in Section 1.2. The paper is organized as follows. Section 1 collects various preliminaries and discusses briefly the setup of group words and equations and the classes of hyperlinear and sofic groups. Section 2 recalls some facts about the cohomology of SU(n) and PU(n), localization theory of topological spaces, and computations of homotopy groups of spheres. This section is the most technical part and also contains a review and extension of results of Kishimoto and Kono [25]. Section 3 contains the proofs of our main results and discusses related low-dimensional results and further directions. 1. The main results 1.1. Group words and equations. We denote by Fn the free group on generators x1 , . . . , xn . For any group G, an element w in the free product G ∗ Fn determines a word map w : G×n → G given by evaluation. We denote by ε : G ∗ Fn → Fn the natural augmentation which sends G to the neutral element and call ε(w) the content of w. We call w ∈ G ∗ Fn a group word in n variables with coefficients in G. Every group word w ∈ G ∗ Fn determines an equation w(x1 , . . . , xn ) = 1 in n variables with coefficients in G in an obvious way. We say that w ∈ G ∗ Fn can be solved over G if there exists an overgroup H ⊇ G and g1 , . . . , gn ∈ H such that w(g1 , . . . , gn ) = 1, where 1 denotes the neutral element in H. Similarly, we say that it can be solved in G if we can take H = G. We denote the normal subgroup in G ∗ Fn , which is generated by the element w by hhwii. It is clear that an equation w ∈ G ∗ Fn can be solved over G if and only if the natural homomorphism G → G ∗ Fn /hhwii is injective. Similarly, an equation can be solved in G if and only if the natural homomorphism G → G ∗ Fn /hhwii is split-injective, i.e., it has a left inverse. The study of equations over groups dates back to the work of Bernhard Neumann [34]. There is an extensive literature about equations over groups, including [1,8–10,13,14,20–22, 24, 26, 27, 29, 30, 34]. See also Roman’kov’s recent survey about this topic [39]. It is well-known that not all equations with coefficients in G are solvable over G. For example if G = ha, b | a2 , b3 i, then the equation w(x) = xax−1 b with variable x is not solvable over G. Indeed, a and b cannot become conjugate in any overgroup of G. Another example is G = Z/pZ = hai with the equation w(x) = xax−1 axa−1 x−1 a−2 . However, in both cases we have ε(w) = 1 ∈ Fn . Indeed, the only known examples of equations which are not solvable EQUATIONS OVER GROUPS 3 over some G are equations whose content is trivial. We call an equation w ∈ G ∗ Fn singular if its content is trivial, and non-singular otherwise. This lets us put forward the following conjecture: Conjecture 1.1. Let G be a group and w ∈ G ∗ Fn be an equation in n variables with coefficients in G. If w is non-singular, then it is solvable over G. In addition, if G is finite, then a solution can be found in a finite extension. The case n = 1 is the famous Kervaire-Laudenbach Conjecture. The one-variable case was studied in classical work by Gerstenhaber-Rothaus from 1962, see [14]. They showed that if G is finite, then every non-singular equation in one variable can be solved over G (in fact in some finite extension of G). Their proof used computations in cohomology of the compact Lie groups U (n). It is this proof, that inspired us to start this work. The work of Gerstenhaber-Rothaus showed in fact that every non-singular equation in one variable with coefficients in the unitary group U(n) can be solved already in U(n), for any n ∈ N. Their strategy was to use homotopy theory to say that the associated word map w : U(n) → U(n) has a non-vanishing degree (as a map of oriented manifolds) and thus must be surjective. Any preimage of the neutral element provides a solution to the equation w. The key to the computation of the degree is to observe that the degree depends only on the homotopy class of w and thus – since U(n) is connected – does not change if w is replaced by ε(w). The computation of the degree is now an easy consequence of classical computations of Hopf [19]. This property of solvability in a group is easily seen to pass to arbitrary Cartesian products of groups and arbitrary quotients of groups. As a consequence, non-singular equations in one variable with coefficients in G as above can Q be solved over G if G is isomorphic to a subgroup of a quotient of the infinite product n U(n) – an observation that is due to Pestov [36]. Groups which admit such an embedding are called hyperlinear groups, see [36] and Section 3.1 for more information on this class of groups – see also Remark 3.3. Thus, the result of Gerstenhaber-Rothaus also holds for hyperlinear groups – in particular for all amenable groups, or more generally, all sofic groups [36]. Connes’ Embedding Conjecture predicts (among other things) that every countable group is hyperlinear and thus implies the Kervaire-Laudenbach Conjecture – this was also observed by Pestov in [36]. Actually, Gerstenhaber-Rothaus [14] studied the more involved question whether m equations of the form w1 , . . . , wm ∈ G ∗ Fn in n variables can be solved simultaneously over G. Their main result is that this is the case if G is finite (or more generally, locally residually finite) and the presentation two-complex X := Khx1 , . . . , xn | ε(w1 ), . . . , ε(wm )i satisfies H2 (X, Z) = 0, i.e., the second homology of X with integral coefficients vanishes. Here, the representation two-complex is the two-dimensional CW -complex associated with the presentation of a group – obtained by glueing m two-cells to a bouquet of n circles according to the relations. (This amounts to a certain algebraic condition on the exponent sum matrix.) A system of equations which satisfies this vanishing condition was called non-singular by Jim Howie [20] – note that our terminology is not consistent with this, but there will be no risk of confusion. Later, Howie [20] proved the same result for locally indicable groups and conjectured it to hold for all groups – we call that Howie’s Conjecture. Again, Connes’ Embedding Conjecture implies Howie’s Conjecture – and more specifically, every hyperlinear group satisfies Howie’s Conjecture. Remark 1.2. Equations in one variable with at most three occurrences of the variable are solvable by a result of Howie [21], which however also reduces this to the residually finite 4 ANTON KLYACHKO AND ANDREAS THOM case and uses the results of Gerstenhaber-Rothaus. Similar results have been proved for non-singular equations with four [10] and five [12] occurrences of variables. Remark 1.3. Equations w ∈ G ∗ Fn with G torsion-free can be solved by more combinatorial methods. A systematic study of the torsion-free case was started by Levin [30] who conjectured that equations in one variable with coefficients in a torsion-free group should always be solvable if w is conjugate to an element in G. A result in this direction is due to the first author who proved that this is indeed the case for one-variable equations with content ±1 ∈ Z, see [26]. Moreover, over any torsion-free group any several-variable equation whose content is not a proper power (and not the neutral element) is solvable [28]. Again, due to the absence of any counterexamples, it is conjectured that solvability in the torsion-free case is true even if the content of the equation is trivial. Remark 1.4. Existence of non-trivial solutions can be a subtle issue too, see for example [40]. For G = Z/pZ = hai, the equation w(x) = axa−1 xax−1 a−1 x−2 can be solved in a finite overgroup of G only with x = 1, even though non-trivial solutions exist in infinite extensions. The mechanism behind these kind of examples was first discovered by Higman, see [18]. 1.2. Statement of the main results. The main goal of this work is to provide examples of non-singular equations in many variables which are solvable over every hyperlinear group, where the condition on the equation only depends on its content. This should be compared for example with results of Gersten [13], where the conditions on w depended on the unreduced word obtained by deleting the coefficients from w. For simplicity, we concentrate on the two-variable case. Our main result is: Theorem 1.5. Let G be a hyperlinear group. An equation in two variables with coefficients in G can be solved over G if its content does not lie in [F2 , [F2 , F2 ]]. Moreover, if G is finite, then a solution can be found in a finite extension of G. In order to prove our main result we have to refine the study of Gerstenhaber-Rothaus on the effect of word maps on cohomology of compact Lie groups. Again, the strategy is to show that such equations can be solved in SU(n) for sufficiently many n ∈ N. More specifically, we prove: Theorem 1.6. Let p be a prime number. Let w ∈ SU(p) ∗ F2 be a group word. If ε(w) 6∈ [F2 , F2 ]p [F2 , [F2 , F2 ]], then the equation w(a, b) = 1 can be solved in SU(p). If ε(w) 6∈ [F2 , F2 ], then this theorem is a direct consequence of the work of Gerstenhaber and Rothaus. However, if ε(w) ∈ [F2 , F2 ], then a new idea is needed. We show – under the conditions on p which are mentioned above – that the induced word map w : PU(p)×PU(p) → SU(p) is surjective, where SU(p) denotes the special unitary group and PU(p) its quotient by the center. The strategy is to replace w by the much simpler and homotopic map induced by ε(w) and study its effect on cohomology directly. This is done in Section 3.2 with the necessary preparations from Section 2. In general, the assumption on ε(w) cannot be omitted in the previous theorem. Indeed, the second author showed in previous work: Theorem 1.7 ([11]). For every k ∈ N and every neighborhood V ⊂ SU(k) of 1k ∈ SU(k), there exists w ∈ F2 \{e}, such that the image of w : SU(k)×2 → SU(k) lies in V. In particular, the equation w(a, b) = g is not solvable in SU(k) for g 6∈ V. EQUATIONS OVER GROUPS 5 The construction that proves the preceding theorem yields words in F2 that lie deep in the derived series, so that there is no contradiction with Theorem 1.6. The surjectivity of word maps without coefficients is an interesting subject in itself. Michael Larsen conjectured that for each non-trivial w ∈ F2 and n high enough, the associated word map w : PU(n) × PU(n) → PU(n) is surjective. This was shown (with some divisibility restrictions on n) for words not in the second derived subgroup of F2 by Elkasapy and the second author in [11]. In a similar direction, we believe that for n high enough – or again, with some divisibility restrictions – the word map w should define a non-trivial homotopy class and not even be homotopic to a non-surjective map. In order to study words which lie deeper in the lower central series, we suspect that it might be helpful to oberserve that the induced word map w : PU(p) × PU(p) → PU(p) does not only lift to SU(p) – which is the simply connected cover of PU(p) – but lifts even to higher connected covers of PU(p). Indeed, for example one can show that if w ∈ [F2 , [F2 , F2 ]], then the associated word maps lifts to the complex analogue of the string group, see [45] for a study of related groups. 2. The topology of SU(p) and PU(p) In this section we collect some standard results from algebraic topology that will be used in the proof of the main theorems. A classical result of Samelson says: SU(2) : SU(2)×2 → SU(2) is not Theorem 2.1 (Samelson, see [41]). The commutator map c2 null-homotopic. In particular, since SU(2) is a sphere, any map homotopic to the commutator map must be surjective. This easily implies that for every group word w ∈ SU(2) ∗ F2 whose content is the commutator of the generators of F2 , the equation w(a, b) = 1 can be solved in SU(2). This already has non-trivial consequences that (to the best of our knowledge) could not be proved using combinatorial techniques. In order to treat SU(n) for higher n, we have to recall some aspects of algebraic topology. Our methods in the proof of the main results follow closely ideas from Hamanaka-Kishimoto-Kono [16] and Kishimoto-Kono [25]. 2.1. The cohomology of SU(p) and PU(p). Let n be a positive integer. We denote by SU(n) the special unitary group and by PU(n) the quotient of SU(n) by its center – the projective unitary group. We denote the quotient map by π : SU(n) → PU(n) and the coset of some u ∈ SU(n) in PU(n) by π(u) = ū. The cohomology rings of the simply-connected classical Lie groups were computed by Borel in [3]. For example, it is well-known that as a graded ring H ∗ (SU(n), Z/pZ) = Λ∗Z/pZ (x2 , x3 , . . . , xn ) with |xi | = 2i − 1. Here, we denote by Λ∗k the exterior algebra over a field k on a certain set of generators of particular degrees. The product map m : SU(n) × SU(n) → SU(n) and the inversion turn H ∗ (SU(n), Z/pZ) into a Hopf algebra. However, the comultiplication turns out to be trivial in this situation, i.e., ∆(xi ) = xi ⊗ 1 + 1 ⊗ xi for all 2 ≤ i ≤ n. We will be mainly interested in the case n = p. The computation of the cohomology ring of PU(p) is more involved than that of SU(p) and was also first studied by Borel in [4]. Later, the comultiplication on the cohomology of PU(p) with Z/pZ-coefficients was computed in work of Baum-Browder [2] and turns out to be not co-commutative. It is this lack of co-commutativity which makes our approach work. Let us sumarize the situation: 6 ANTON KLYACHKO AND ANDREAS THOM Theorem 2.2 (Baum-Browder, see [2]). Let p be an odd prime number. Then, H ∗ (PU(p), Z/pZ) ∼ = (Z/pZ)[y]/(y p ) ⊗Z Λ∗Z/pZ (y1 , y2 , . . . , yp−1 ) with |y| = 2, |yi | = 2i − 1, π ∗ (yi ) = xi for 2 ≤ i ≤ p − 1, and π ∗ (y) = π ∗ (y1 ) = 0. Moreover, the comultiplication takes the form ∆(y) = y ⊗ 1 + 1 ⊗ y, and ∆(yi ) = yi ⊗ 1 + 1 ⊗ yi +  i−1  X j−1 j=1 i−1 · yj ⊗ y i−j . We denote by I(n) the kernel of the natural augmentation H ∗ (PU(p)n , Z/pZ) → Z/pZ. We start out by recalling the effect of various natural word maps on the cohomology ring. Lemma 2.3. Let n ∈ N and p be an odd prime number. Consider the map µn : PU(p) → PU(p) given by µn (u) = un . The map induced by µn : PU(p) → PU(p) on cohomology satisfies µ∗n (yi ) = n · yi mod I(1)2 for all 1 ≤ i ≤ p − 1. of the diagonal embedding PU(p) → Qn Proof. The map µn arises as the composition Q n PU(p) following by the multiplication map m : i=1 i=1 PU(p) → PU(p). In cohomology, (n) ∗ this induces first the the n-fold coproduct ∆ : H (PU(p), Z/pZ) → ⊗ni=1 H ∗ (PU(p), Z/pZ) followed by the multiplication in cohomology ⊗ni=1 H ∗ (PU(p), Z/pZ) → H ∗ (PU(p), Z/pZ). An easy verification shows that each generator is just multiplied by n, modulo sums of products of at least two generators. This proves the claim.  It is also important for us to study the effect of the commutator map in cohomology. We need the following result from the work of Hamanaka-Kishimoto-Kono [16], which is an easy consequence of Theorem 2.2 above. Lemma 2.4 (Proposition 6 in [16]). The commutator map c : PU(p) × PU(p) → PU(p) induces the cohomology map c∗ : H ∗ (PU(p), Z/pZ) → H ∗ (PU(p) × PU(p), Z/pZ) sending yi to (i − 1)(yi−1 ⊗ y − y ⊗ yi−1 ) modulo the ideal I(2)3 . The elements y1 and y map to zero. Note that the commutator map SU(n) × SU(n) ∋ (u, v) 7→ uvu−1 v −1 ∈ SU(n) induces a well-defined map c : PU(n) × PU(n) → SU(n), which we will also call commutator map. Our first aim is to show that the commutator map c : PU(p) × PU(p) → SU(p) is not homotopic to a non-surjective map. We will show this by showing that the image of the 2 top-dimensional cohomology class x2 · · · xp ∈ H p −1 (SU(p), Z/pZ) does not vanish in the 2 group H p −1 (PU(p) × PU(p), Z/pZ). As it turns out, the study the images of x2 , . . . , xp−1 in ∗ H (PU(p) × PU(p), Z/pZ) is fairly straightforward, since these generators are the image of generators y2 , . . . , yp−1 in the cohomology of PU(p). The study of the last generator xp is considerably more complicated and we have to rely on some structure results on the p-local homotopy type of PU(p). In fact, in the final argument we will not rely on Lemma 2.4, but the required result is proved for all xi with 2 ≤ i ≤ p directly. EQUATIONS OVER GROUPS 7 2.2. The lens spaces. Since S 2d−1 ⊂ Cp , there is a natural (Z/pZ)-action on S 2d−1 given by scalar multiplication with the complex number exp(2πi/p). In our considerations, we only study the case d = p. We denote by L the lens space S 2p−1 /(Z/pZ) and let ρ : S 2p−1 → L be the natural projection. The space L has a natural CW-structure with one cell in each dimension, see [17, Example 2.43]. We denote by Lk := S 2k−1 ∪p D 2k the mod-p Moore space for 1 ≤ k ≤ p − 1. This is, by definition, the space obtained by attaching D 2k to S 2k−1 along the attaching map p : S 2k−1 → S 2k−1 , which is defined as (z1 , . . . , zk ) → (z1p , z2 , . . . , zk ). Note that the letter p is over-used here, but this will not cause any confusion. The characteristic property of Lk (for 1 ≤ k ≤ p − 1) is that Hn (Lk , Z) = 0 unless n = 2k − 1 or n = 0, and H2k−1 (Lk , Z) = Z/pZ. See [17, Chapter 2, Example 2.40] for more details. We set Lp := S 2p−1 . For 1 ≤ k ≤ p − 1, we denote by qk : Lk → S 2k the so-called pinch map, which collapses 2k−1 S (and hence the boundary of D 2k ) to a point. Note that the 2-skeleton of L is just L1 . Indeed, L1 = S 1 ∪p D 2 , see [17, Example 2.43]. ι π There is a fibre bundle SU(p − 1) → SU(p) → S 2p−1 , where the embedding ι sends a matrix  A to the matrix 10 A0 and the projection π sends a matrix to its first row. Similarly, the ι π group PU(p) admits a fibre bundle SU(p − 1) → PU(p) → L, where the embedding ι sends a  matrix A to the class of matrices hexp(2πi/p)i 10 A0 , the projection π sends a matrix to its first row (which is defined up to multiplication by exp(2πi/p)), and L = S 2p−1 /hexp(2πi/p)i is the lens space. 2.3. Localization at a prime. We will freely use the concept of localization of topological spaces (simply connected or with abelian fundamental group) at a prime p, see the work of Bousfield-Kan [7] or Mimura-Nishida-Toda [33] background and as general references. See also [32] for a more recent presentation of this material. Given a topological space X with abelian fundamental group, we denote by X(p) its plocalization which comes equipped with a natural map ι : X → X(p) . The p-localization can be defined as a certain tower of spaces, and its defining properties are πi (X(p) , ι(x)) = πi (X, x) ⊗Z Z(p) , ∀x ∈ X, ∀i ≥ 1. Here, Z(p) denotes the p-localization of Z, i.e., the ring of those fractions in Q, whose denominator is not divisible by p. For a continuous map f : X → Y (between topological spaces with abelian fundamental group), we denote by f(p) : X(p) → Y(p) the induced map between the p-localizations. We will freely use that ι : X → X(p) induces an isomorphism on cohomology with coefficients in Z/pZ. A map is called a p-local homotopy equivalence if it is a homotopy equivalence after p-localization. If X is a double suspension, then [X, Y ] is an abelian group – here [X, Y ] denote as usual the set of homotopy classes of maps from X to Y . We will use that if in addition X is also a finite CW-complex, then the natural maps [X, Y ] ⊗Z Z(p) → [X, Y(p) ] ← [X(p) , Y(p) ] are isomorphisms, see for example [32, Chapter 6.6]. We will need the following computation of the homotopy groups of SU(n), which is due to Bott [5]. 8 ANTON KLYACHKO AND ANDREAS THOM Theorem 2.5 (Bott).  0    Z πk (SU(n)) =  0    Z/n!Z k k k k = 0, 1, 2 = 2i − 1, 2 ≤ i ≤ n . = 2i, 2 ≤ i ≤ n − 1 = 2n 2k−1 → SU(n) be a generator of π Let ǫQ k: S 2k−1 (SU(n)) for 2 ≤ k ≤ n and consider the n map µ : k=2 S 2k−1 → SU(n) given by µ(x2 , . . . , xn ) := ǫ2 (x2 ) · · · ǫn (xn ), where we use multiplication in the group SU(n). The following theorem was first proved by Serre [42, Proposition 7] – even though without using the language of localization at the level of topological spaces. Theorem 2.6 (Serre). Let p be a prime number. If p ≥ n, then the map n Y µ: S 2k−1 → SU(n) k=2 is a p-local homotopy equivalence. We will now concentrate on the case that n = p. For 2 ≤ i ≤ p, we denote by 2i−1 the composition of the homotopy inverse of µ(p) with the projection λi : SU(p)(p) → S(p) 2i−1 . We also have the following computation of the p-local homotopy groups of odd onto S(p) spheres, which is also due to Serre [42, Proposition 11]:   0 0 ≤ k < 2i − 1     k = 2i − 1 Z(p)    2i−1 = 0 (1) πk S(p) 2i − 1 < k < 2i + 2p − 4    Z/pZ k = 2i + 2p − 4    0 2i + 2p − 4 < k < 2i + 4p − 7. 2i−1 3 ). ) is equal to Σ2i−4 (α) for some generator α ∈ π2p (S(p) Here, the generator in π2i+2p−4 (S(p) Here, Σ(?) denotes as usual the suspension also on the level of maps. Hence, Theorem 2.6 together with the computation above implies that there is a more refined computation of the homotopy groups of SU(p) localized at a prime p:   k = 0, 1, 2 0    Z k = 2i − 1, 2 ≤ i ≤ p   (p) πk SU(p)(p) = 0 k = 2i, 2 ≤ i ≤ p − 1    0 k = 2i + 1, p ≤ i < 2p − 1    Z/pZ k = 2i, p ≤ i < 2p − 1. Note that this covers all dimensions up to 4p − 4, whereas Bott’s computation only gives information up to dimension 2p – a fact that will be used later. Now, the commutator map on SU(p) induces a secondary operation h., .i : πi (SU(p)) × πj (SU(p)) → πi+j (SU(p)), the so-called Samelson product, which was originally introduced in [41]. Bott already analyzed the Samelson products of the maps ǫk in [6]. He proved as a corollary to his main result [6, Theorem 1] that the element hǫi , ǫp−i+1 i in π2p (SU(p)) = Z/p!Z is divisible by precisely EQUATIONS OVER GROUPS 9 p! (i−1)!(p−i)! , i.e., it is equal to (i−1)!(p−i)! times some generator of Z/p!Z. The maps ǫk induce natural maps ǭk : S 2k−1 → PU(p) for 2 ≤ k ≤ p. Note, that we can also choose a natural map ǭ1 : S 1 → PU(p) which yields a generator of π1 (PU(p)) = Z/pZ – and that Bott’s result extends to the case i = 1. In the light of our computation of πk (SU(p)(p) ) from above, Bott’s computation of the Samuelson products implies: Theorem 2.7 (Bott). Let p be a prime number and 1 ≤ i < p. The element hǭp , ǭi i ∈ π2p+2i−2 (SU(p)(p) ) = Z/pZ does not vanish. Proof. Indeed, Bott’s result from above yields that the image of the map hǭp , ǭi i : S 2p+2i−2 → SU(p + i − 1) in π2p+2i−2 (SU(p + i − 1)) = Z/(p + i − 1)!Z is (p − 1)!(i − 1)! times some generator, and hence does not vanish modulo p. Since hǭp , ǭi i factors through SU(p), the assertion follows.  The non-vanishing of these Samuelson products modulo p will be the key to understand the non-vanishing of certain cohomology classes after application of the commutator map. 2.4. The work of Kishimoto-Kono. In order to understand the effect of the commutator map on the cohomology of PU(p), we must now study the p-local homotopy type of PU(p). We restate Proposition 2 from the work of Kishimoto-Kono [25]. Lemma 2.8. There exists a natural map η : L(p) → PU(p)(p) , such that the diagram ǫp(p) 2p−1 S(p) (2) / SU(p) (p) ρ(p)  η L(p)  / PU(p)(p) commutes up to homotopy. Using the notation introduced in Section 2.2, we are now ready to state and prove an extension of Lemma 4 of Kishimoto-Kono [25]. Lemma 2.9. For 1 ≤ i ≤ p − 1, we have p-locally 2i+1 2i−1 → S(p) λi+1 ◦ c(p) ◦ (η|L1(p) ∧ ε̄i(p) ) = a · (q1 ∧ 1S 2i−1 )(p) : L1(p) ∧ S(p) for some a ∈ Z× (p) . Proof. First of all, we know from [33, Proposition 9.6] that there exists a p-local splitting (L ∧ S 1 )(p) = p _ (Lk ∧ S 1 )(p) . k=1 Thus, (L ∧ S 2i−1 )(p) = Wp k=1 (Lk ∧ S 2i−1 )(p) and the map 2p−1 ∧ S 2i−1} → L ∧ S 2i−1 ρ ∧ 1S 2i−1 : S | {z S 2p+2i−2 10 ANTON KLYACHKO AND ANDREAS THOM can be decomposed p-locally as (3) (ρ ∧ 1S 2i−1 )(p) = p _ fk , 2p+2i−2 → (Lk ∧ S 2i−1 )(p) , with fk : S(p) 1 ≤ k ≤ p. k=1 S 2p−1 Since the map ρ : → L is a p-fold covering, we get fp is equal to multiplication by p. p Now, for 1 ≤ k ≤ p−1, the cofiber sequence S 2k−1 → S 2k−1 → Lk (coming from the definition of Lk ) induces a long exact sequence p p · · · → π2i+2k−1 (S 2i+1 ) → π2i+2k−1 (S 2i+1 ) → [Lk ∧ S 2i−1 , S 2i+1 ] → π2i+2k−2 (S 2i+1 ) → · · · . From the computations of the p-local homotopy groups of spheres, we obtain for all 1 ≤ i ≤ p that   k=1 Z(p) 2i−1 2i+1 [Lk ∧ S ,S ](p) = 0 2≤k ≤p−1   Z/pZ k = p. Moreover, it follows that the group [Lk ∧S 2i−1 , S 2i+1 ](p) is generated by the map (q1 ∧1S 2i−1 )(p) . Consider now the map 2i+1 2i−1 . → S(p) λi+1 ◦ c(p) ◦ (η ∧ ǭi(p) ) : L(p) ∧ S(p) We obtain from Equation (3) and the sentence after Equation (1) that λi+1 ◦ c(p) ◦ (η ∧ ǭi(p) ) = ai · (q1 ∧ 1S 2i−1 )(p) ∨ bi · (Σ2i−2 (α)) (4) for some ai , bi ∈ Z(p) and 1 ≤ i ≤ p − 1. Here, we consider Σ2i−2 (α) as map 1∧α(p) 2p 2p+2i−2 2i+1 2i−2 2i−2 2i−1 3 . ∧ S(p) = S(p) → S(p) ∧ S(p) = S(p) = S(p) Lp(p) ∧ S(p) Now is the point, when we are going to use Theorem 2.7. Indeed, we have the following identification of homotopy classes of maps from S 2p+2i−2 to S 2i+1 (note that π2p+2i−2 (S 2i+1 ) = Z/pZ by Equation 1): 0 Th.2.7 6= λi+1 ◦ hǭp , ǭi i(p) = λi+1 ◦ c(p) ◦ (ǭp(p) ∧ ǭi(p) ) (2) = λi+1 ◦ c(p) ◦ (η ∧ ǭi(p) ) ◦ (ρ(p) ∧ 1S 2i−1 )  ai · (q1 ∧ 1S 2i−1 )(p) ∨ bi · (Σ2i−2 (α)) ◦ (ρ(p) ∧ 1S 2i−1 ) = ai · ((q1 ∧ 1S 2i−1 )(p) ◦ f1 ). = (4) = (3) ai · ((q1 ∧ 1S 2i−1 )(p) ◦ f1 ) ∨ pbi · (Σ2i−2 (α)) Finally, this implies that (q1 ∧ 1S 2i−1 )(p) ◦ f1 is a non-zero multiple of the class Σ2i−2 (α) ∈ π2p+2i−2 (S 2i+1 )(p) = Z/pZ and we can conclude that ai ∈ Z× (p) . This finishes the proof.  The preceding proof followed closely the work of Kishimoto-Kono [25] and we do not claim any originality for this computation. EQUATIONS OVER GROUPS 11 2.5. Applications to cohomology. We will now apply the computation from the previous section to study the effect of the commutator map on cohomology. Recall that H ∗ (PU(p), Z/pZ) ∼ = (Z/pZ)[y]/(y p ) ⊗Z Λ∗ (y1 , y2 , . . . , yp−1 ) Z/pZ with |y| = 2, |yi | = 2i − 1. We denote by Ji the ideal in the ring H ∗ (PU(p), Z/pZ) ⊗ H ∗ (PU(p), Z/pZ) which is generated by y 2 ⊗ 1, yj ⊗ 1, 1 ⊗ yk , 1 ⊗ y for 1 ≤ j, k ≤ p − 1 with k 6= i. Corollary 2.10. Let 2 ≤ i ≤ p and c : PU(p) × PU(p) → SU(p) the commutator map. Then, the induced map c∗ : H ∗ (SU(p), Z/pZ) → H ∗ (PU(p), Z/pZ) ⊗Z H ∗ (PU(p), Z/pZ) satisfies c∗ (xi ) = ai (y ⊗ yi−1 ) mod Ji−1 for some ai ∈ Z× (p) . Proof. Note that   2i−1 , Z/pZ = Λ∗ (y) ⊗Z Λ∗ (yi ) H ∗ L1(p) × S(p) with |y| = 2 and |yi | = 2i − 1 such that the natural map 2i−1 → PU(p) × PU(p) η × ǭi(p) : L1(p) × S(p) induces the natural homomorphism from (Z/pZ)[y]/(y p ) ⊗Z Λ∗Z/pZ (y1 , y2 , . . . , yp−1 ) ⊗ (Z/pZ)[y]/(y p ) ⊗Z Λ∗Z/pZ (y1 , y2 , . . . , yp−1 ) to Λ∗ (y) ⊗Z Λ∗ (yi ) which sends y ⊗ 1 to y ⊗ 1, 1 ⊗ yi to 1 ⊗ yi and the other generators to zero. The kernel of this homomorphism is precisely the ideal Ji . Now, Lemma 2.9 implies that the composition c λi+1 2i+1 2i−1 → PU(p)(p) ∧ PU(p)(p) → SU(p)(p) → S(p) L1(p) ∧ S(p) 2i−1 → is homotopic to ai (q1 ∧ 1S 2i−1 )(p) for some ai ∈ Z× (p) . Since the map q1 ∧ 1S 2i−1 : L1 ∧ S S 2i+1 sends the generator xi+1 of the cohomology of S 2i+1 to y ⊗ yi ∈ Λ∗ (y) ⊗Z Λ∗ (yi ), this implies the claim.  3. Solvability of equations 3.1. Hyperlinear groups and related classes of groups. The unitary group U(n) is equipped with a natural metric that arises from the normalized Frobenius norm, i.e.,  1/2 n X 1 |uij − vij |2  . d(u, v) = 1/2  n i,j=1 Informally speaking, a group G is said to be hyperlinear if its multiplication table can be modelled locally (that means on finite subsets of the group) by unitary matrices up to small mistakes measured in the normalized Frobenius norm. More precisely: Definition 3.1. A group G is called hyperlinear if for all finite subsets F ⊂ G and all ε > 0, there exists n ∈ N and a map ϕ : G → U(n), such that (1) d(ϕ(gh), ϕ(g)ϕ(h)) < ε for all g, h ∈ F , and 12 ANTON KLYACHKO AND ANDREAS THOM (2) d(ϕ(g), 1n ) > 1, for all g ∈ F \ {e}. There are variations on this definition but they are all equivalent. A detailed discussion of the class of hyperlinear groups can be found in [36]. If in the above definition the unitary groups with their metrics are replaced by symmetric groups Sym(n) with the normalized Hamming metrics, then one obtains the definition of the class of sofic groups. This important class of groups was introduced by Gromov [15] and Weiss [47] in order to study certain problems in ergodic theory. Since the inclusion Sym(n) ⊂ U(n) is compatible enough with the metrics, every sofic group is automatically hyperlinear – see [36] for more details. It is not known if there are non-sofic groups. We denote the set of prime numbers by P. We will need the following easy proposition. Proposition 3.2. Let G be a countable hyperlinear group. Then G is a subgroup of a Q quotient of p∈P SU(p). Proof. Let (gi )i∈N be an enumeration of G. Let nk be some integer such that the definition of hyperlinearity is satisfied for the finite set {g1 , . . . , gk } with ε = 1/k. Let ϕk : G → U(nk ) the the corresponding map. Without loss of generality, we may assume that limk→∞ nk = ∞. Indeed, the natural diagonal embedding U(n) ⊂ U(nm) is isometric with respect to the normalized Frobenius metric, so that we can replace nk by knk if necessary. Using the natural embedding U(n) ⊂ SU(n + 1), we may now assume without loss of generality that the image of ϕk lies in SU(nk ). Similarly, replacing nk again by a suitable number of the form mnk + 1, we may assume that nk is a prime number – using Dirichlet’s theorem. Now, consider     Y N := (up )p ∈ SU(p) | lim d(1nk , unk ) = 0 .   k→∞ p∈P Q Q It is easy to see that N ⊂ p∈P SU(p) is a normal subgroup and ϕ = k∈N ϕk defines Q a injective homomorphism from G to the quotient of p∈P SU(p) by N . This proves the claim.  Q Q Remark 3.3. It is also true that any subgroup of a quotient of n∈N U(n) (or p∈P SU(p) for that matter) is hyperlinear. This follows from results in [44], based on ideas from work of Nikolov-Segal, see [35]. It is not known if there are any groups that are not hyperlinear – essentially all groups that are known to by hyperlinear, are also known to be sofic. 3.2. Proofs of the main results. We can now prove the main theorems, i.e., Theorem 1.5 and Theorem 1.6. Let us first study the commutator map again. It follows from Corollary 2.10 that c∗ (x2 · · · xp ) = a · (y p−1 ⊗ y1 · · · yp−1 ) (5) for some a ∈ Z× (p) , where J is the ideal defined as X Y Y ≥(2,2i−1) J := (y ⊗ yi ) · Ji , E({1,...,p−1} i∈E ≥(2,2i−1) mod J i6∈E where Ji denotes the subspace of Ji , which is of bi-degree (2, 2i − 1) or more. Here, we use the natural bi-grading of the tensor product H ∗ (PU(p), Z/pZ) ⊗Z H ∗ (PU(p), Z/pZ). It is easy to see that y p−1 ⊗ y1 · · · yp−1 6∈ J . Indeed, assume that y p−1 ⊗ y1 · · · yp−1 ∈ J . The EQUATIONS OVER GROUPS 13 element y p−1 ⊗ y1 · · · yp−1 is of bi-degree (2(p − 1), 1 + 3 + · · · + 2p − 1) so that all contributions ≥(2,2i−1) of Ji must of of minimal possible degree (2, 2i − 1). Note that y ⊗ yi 6∈ Ji by construction. This implies that for any E ⊂ {1, . . . , p − 1}, a product of p − 1 factors of the (2,2i−1) form y ⊗ yi for i ∈ E and otherwise in Ji cannot yield a summand y p−1 ⊗ y1 . . . yp−1 unless E = {1, . . . , p − 1}, but this is forbidden. This proves as a first step that any continuous map which is homotopic to the commutator map c : PU(p) × PU(p) → SU(p) must be surjective. Indeed, the previous computation shows 2 that its effect on the fundamental class x2 · · · xp ∈ H p −1 (SU(p), Z/pZ) is non-trivial on cohomology – and this happens only if the map (and any map homotopic to it) is surjective. We now attempt to extend this result to other words in F2 . Later, we will also allow to vary p and will see that our approach works for all elements which do not lie in [F2 , [F2 , F2 ]]. (1) First, we need some preparations. Note that F2 := [F2 , F2 ] is a free group with basis {[xn1 , xm 2 ] | nm 6= 0}, see Proposition 4 in Chapter I, §1.3 of [43]. Proposition 3.4. Let w = [xn1 , xm 2 ]. Then w∗ : H ∗ (SU(p), Z/pZ) → H ∗ (PU(p), Z/pZ) ⊗ H ∗ (PU(p), Z/pZ) satisfies w∗ (xi ) = nm · ai · (y ⊗ yi−1 ) mod Ji−1 for some ai ∈ Z× (p) independent of n, m. More Qs mk lk nk generally, if w = k=1 [x1 , x2 ] , then ! s X ∗ w (xi ) = nk mk lk · ai · (y ⊗ yi−1 ) mod Ji−1 . k=1 On the other side, if w ∈ (2) F2 , the second derived subgroup, then we have w∗ = 0. Proof. If w1 : PU(p) × PU(p) → SU(p) and w2 : PU(p) × PU(p) → SU(p) are word maps, for w1 , w2 ∈ [F2 , F2 ], so that the associated word map can be factored through SU(p), then w1 w2 : PU(p) × PU(p) → SU(p) is equal to mSU(p) ◦ (w1 × w2 ) ◦ ∆PU(p)×PU(p) : PU(p) × PU(p) → SU(p). Hence, the effect on cohomology can be computed explicitly as follows: xi 7→ xi ⊗ 1 + 1 ⊗ xi 7→ w1∗ (xi ) ⊗ 1 + 1 ⊗ w2∗ (xi ) 7→ w1∗ (xi ) + w2∗ (xi ). The results follow directly from Lemma 2.3 and Corollary 2.10. This finishes the proof of the proposition.  Consider now the 3-dimensional Heisenberg group     1 a b  H3 (Z) := 0 1 c | a, b, c ∈ Z .   0 0 1 Sending x1 to the matrix with a = 1, b = c = 0 and x2 to the matrix with a = b = 0, c = 1, Pl Q k lk we get that w = lk=1 [xn1 k , xm 2 ] is sent to the matrix with a = c = 0 and b = k=1 nk mk lk . It is well known that H3 (Z) = F2 /[[F2 , F2 ], F2 ]. Coming back to the proof of Theorem 1.6, 14 ANTON KLYACHKO AND ANDREAS THOM we see that we will succeed with our strategy if w can be mapped non-trivially to the central quotient of H3 (Z) by pZ. Proof of Theorem 1.6. The result is clear if ε(w) 6∈ [F2 , F2 ], so that we may assume that ε(w) ∈ [F2 , F2 ]. Now, the assumption on ε(w) implies that it can be mapped nontrivially to the canonical central extension of Z2 by Z/pZ, which is just the central quotient of H3 (Z)/pZ. This happens if any only if ε(w) 6∈ [F2 , F2 ]p [[F2 , F2 ], F2 ]. Hence, by our main result above the induced word map w : PU(p) × PU(p) → SU(p) is is non-trivial on 2 the fundamental class x1 . . . xn ∈ H p −1 (SU(p), Z/pZ), and hence the word map must be (1) surjective. Since ε(w) 6∈ F2 , any lift to SU(p) of a preimage of the neutral element solves the equation.  Proof of Theorem 1.5. This is a straightforward consequence of Theorem 1.6 and Proposition 3.2. The claim about finite groups follows from Mal’cev’s theorem [31], stating that finitely generated linear groups are residually finite.  3.3. Related results and low-dimensional cases. Let us finish by mentioning a few low-dimensional results which go beyond the second step of the lower central series. So far, we are unable to exploit the mechanisms behind these examples in order to get satisfactory results for all hyperlinear groups. However, we would also like to mention some further directions and possible extensions of the techniques used in this paper Recall, we denote the commutator by [x, y] := xyx−1 y −1 . The iterated commutators cn ∈ Fn = hx1 , . . . , xn i are defined by induction cn = [xn , cn−1 ] and c1 = x1 . The first result that goes beyond the second step in the lower central series is the following result by Porter. SU(2) Theorem 3.5 (Porter, see [37]). The map c3 : SU(2)×3 → SU(2) is not null-homotopic. In order to treat cn for n ≥ 4, we need to use some more sophisticated results from algebraic topology related to homotopy nilpotence results. This was done by Rao in [38], showing also that Spin(n) is not homotopy nilpotent for n ≥ 7. PU(2) Theorem 3.6 (Rao, [38]). The map cn any n ∈ N. : PU(2)×n → PU(2) is not null-homotopic for As before, we obtain results concerning solvability of equations. Corollary 3.7. Let G be any subgroup of SU(2) and let w ∈ G∗Fn be such that ε(w) = cn for some n ≥ 2. Then, w(x1 , . . . , xn ) = 1 can be solved in some group containing G. Proof. Since SU(2) = S 3 , every non-surjective map is null-homotopic. Thus, using the same arguments as before, we can conclude that for every w ∈ SU(2) ∗ Fn with content cn , the induced word map w : SU(2)×n → SU(2) is surjective.  Finally, we want to mention some questions that appear naturally at this interface between homotopy theory and the study of word maps. Given a topological group, it seems natural to study the group of words modulo those which are null-homotopic. Let G be a compact Lie group, set Nn,G := {w ∈ Fn | w : Gn → G is homotopically trivial} and define Hn,G := Fn /Nn,G . Question 3.8. Can we compute H2,SU(n) ? EQUATIONS OVER GROUPS 15 See [23, 49] for partial information about Hn,G in particular cases. In this direction, the following result is implied by results on p.464 in [48]. Theorem 3.9 (Whitehead, see [48]). Let G be a connected and simply connected compact Lie group. Then, HG is k-step nilpotent for some k ≤ 2 · dim(G). Proof. We denote the degree of nilpotency of a group Γ by nil(Γ). Whitehead showed that the homotopy set [X, G] is a group and nil([X, G]) ≤ dim(X). For X = G × G, we obtain nil([G × G, G]) ≤ dim(G × G) = 2 · dim(G). Now, the subgroup generated by the coordinate projections is precisely HG . This proves the claim.  Let G be a topological group, e.g., a compact Lie group. We call w ∈ Fn homotopically surjective with respect to G if every map in the homotopy class of w : G×n → G is surjective. Question 3.10. Let w ∈ Fn \{1}. Is w : PU(n)×PU(n) → PU(n) homotopically surjective for large n? Acknowledgments The work of the first author was supported by the Russian Foundation for Basic Research, project no. 15-01-05823. He thanks TU Dresden for its hospitality during a visit in January 2015. He thanks this institution for its hospitality. The second author wants to thank Tilman Bauer for some interesting comments. Part of this paper was written, when he visited Institute Henri Poincaré for the trimester about random walks and asymptotic geometry of groups in spring 2014. This research was supported by ERC Starting Grant No. 277728 and the MPI-MIS in Leipzig. We thank the unknown referee for many useful comments that improved the exposition. References [1] Dmitrii V. Baranov and Anton A. Klyachko, Efficient adjunction of square roots to groups, Sibirsk. Mat. Zh. 53 (2012), no. 2, 250–257 (Russian, with Russian summary); English transl., Sib. Math. J. 53 (2012), no. 2, 201–206. ↑2 [2] Paul F. Baum and William Browder, The cohomology of quotients of classical groups, Topology 3 (1965), 305–336. ↑5, 6 [3] Armand Borel, Sur la cohomologie des espaces fibrés principaux et des espaces homogènes de groupes de Lie compacts, Ann. of Math. (2) 57 (1953), 115–207 (French). ↑5 [4] , Sur l’homologie et la cohomologie des groupes de Lie compacts connexes, Amer. J. Math. 76 (1954), 273–342 (French). ↑5 [5] Raoul Bott, The space of loops on a Lie group, Michigan Math. J. 5 (1958), 35–61. ↑7 [6] , A note on the Samelson product in the classical groups, Comment. Math. Helv. 34 (1960), 249– 256. ↑8 [7] Aldridge K. Bousfield and Daniel M. Kan, Homotopy limits, completions and localizations, Lecture Notes in Mathematics, Vol. 304, Springer-Verlag, Berlin, 1972. ↑7 [8] Martin Edjvet and Ayre Juhász, Non-singular equations over groups I, Algebra Colloq. 18 (2011), no. 2, 221–240. ↑2 [9] , Nonsingular equations over groups II, Comm. Algebra 38 (2010), no. 5, 1640–1657. ↑2 [10] Martin Edjvet and James Howie, The solution of length four equations over groups, Trans. Amer. Math. Soc. 326 (1991), no. 1, 345–369. ↑2, 4 [11] Abdelrhman Elkasapy and Andreas Thom, About Gôto’s method showing the surjectivity of word maps, arXiv:1207.5596, to appear in Indiana Univ. Math. J. ↑4, 5 16 ANTON KLYACHKO AND ANDREAS THOM [12] Anastasia Evangelidou, The solution of length five equations over groups, Comm. Algebra 35 (2007), no. 6, 1914–1948. ↑4 [13] Steve M. Gersten, Reducible diagrams and equations over groups, Essays in group theory, Math. Sci. Res. Inst. Publ., vol. 8, Springer, New York, 1987, pp. 15–73. ↑2, 4 [14] Murray Gerstenhaber and Oscar S. Rothaus, The solution of sets of equations in groups, Proc. Nat. Acad. Sci. U.S.A. 48 (1962), 1531–1533. ↑1, 2, 3 [15] Misha Gromov, Endomorphisms of symbolic algebraic varieties, J. Eur. Math. Soc. (JEMS) 1 (1999), no. 2, 109–197. ↑12 [16] Hiroaki Hamanaka, Daisuke Kishimoto, and Akira Kono, Self homotopy groups with large nilpotency classes, Topology Appl. 153 (2006), no. 14, 2425–2429. ↑5, 6 [17] Allen Hatcher, Algebraic topology, Cambridge University Press, Cambridge, 2002. ↑7 [18] Graham Higman, A finitely generated infinite simple group, J. London Math. Soc. 26 (1951), 61–64. ↑4 [19] Heinz Hopf, Über den Rang geschlossener Liescher Gruppen, Comment. Math. Helv. 13 (1940), 119–143. ↑3 [20] James Howie, On pairs of 2-complexes and systems of equations over groups, J. Reine Angew. Math. 324 (1981), 165–174. ↑2, 3 [21] , The solution of length three equations over groups, Proc. Edinburgh Math. Soc. (2) 26 (1983), no. 1, 89–96. ↑2, 3 [22] Sergey V. Ivanov and Anton A. Klyachko, Solving equations of length at most six over torsion-free groups, J. Group Theory 3 (2000), no. 3, 329–337. ↑2 [23] Ioan James and Emery Thomas, Which Lie groups are homotopy-abelian?, Proc. Nat. Acad. Sci. U.S.A. 45 (1959), 737–740. ↑15 [24] Arye Juhász, On the solvability of equations over groups, Comm. Algebra 32 (2004), no. 4, 1487–1496. ↑2 [25] Daisuke Kishimoto and Akira Kono, On a conjecture of Ōshima, Topology Appl. 156 (2009), no. 13, 2189–2192. ↑2, 5, 9, 10 [26] Anton A. Klyachko, A funny property of sphere and equations over groups, Comm. Algebra 21 (1993), no. 7, 2555–2575. ↑2, 4 [27] , Equations over groups, quasivarieties, and a residual property of a free group, J. Group Theory 2 (1999), no. 3, 319–327. ↑2 [28] , How to generalize known results on equations over groups, Mat. Zametki 79 (2006), no. 3, 409–419 (Russian, with Russian summary); English transl., Math. Notes 79 (2006), no. 3-4, 377–386. ↑4 [29] Anton A. Klyachko and Anton V. Trofimov, The number of non-solutions of an equation in a group, J. Group Theory 8 (2005), no. 6, 747–754. ↑2 [30] Frank Levin, Solutions of equations over groups, Bull. Amer. Math. Soc. 68 (1962), 603–604. ↑2, 4 [31] Anatoly Malcev, On isomorphic matrix representations of infinite groups, Rec. Math. [Mat. Sbornik] N.S. 8 (50) (1940), 405–422. ↑14 [32] Peter May and Kate Ponto, More concise algebraic topology, Chicago Lectures in Mathematics, University of Chicago Press, Chicago, IL, 2012. Localization, completion, and model categories. ↑7 [33] Mamoru Mimura, Goro Nishida, and Hirosi Toda, Localization of CW-complexes and its applications, J. Math. Soc. Japan 23 (1971), 593–624. ↑7, 9 [34] Bernhard H. Neumann, Adjunction of elements to groups, J. London Math. Soc. 18 (1943), 4–11. ↑2 [35] Nikolay Nikolov and Dan Segal, Generators and commutators in finite groups; abstract quotients of compact groups, Invent. Math. 190 (2012), no. 3, 513–602. ↑12 [36] Vladimir G. Pestov, Hyperlinear and sofic groups: a brief guide, Bull. Symbolic Logic 14 (2008), no. 4, 449–480. ↑2, 3, 12 [37] Gerald J. Porter, Homotopical nilpotence of S 3 , Proc. Amer. Math. Soc. 15 (1964), 681–682. ↑14 [38] Vidhyanath K. Rao, Spin(n) is not homotopy nilpotent for n ≥ 7, Topology 32 (1993), no. 2, 239–249. ↑14 [39] Vitaliı̆ Roman’kov, Equations over groups, Groups Complex. Cryptol. 4 (2012), no. 2, 191–239. ↑2 [40] Oskar S. Rothaus, On the non-triviality of some group extensions given by generators and relations, Ann. of Math. (2) 106 (1977), no. 3, 599–612. ↑4 [41] Hans Samelson, Groups and spaces of loops, Comment. Math. Helv. 28 (1954), 278–287. ↑5, 8 [42] Jean-Pierre Serre, Groupes d’homotopie et classes de groupes abéliens, Ann. of Math. (2) 58 (1953), 258–294 (French). ↑8 EQUATIONS OVER GROUPS [43] [44] [45] [46] [47] [48] [49] 17 , Trees, Springer Monographs in Mathematics, Springer-Verlag, Berlin, 2003. Translated from the French original by John Stillwell; Corrected 2nd printing of the 1980 English translation. ↑13 Abel Stolz and Andreas Thom, On the lattice of normal subgroups in ultraproducts of compact simple groups, Proc. London Math. Soc. 108 (2014), 73–102. ↑12 Stephan Stolz and Peter Teichner, What is an elliptic object?, Topology, geometry and quantum field theory, London Math. Soc. Lecture Note Ser., vol. 308, Cambridge Univ. Press, Cambridge, 2004, pp. 247– 343. ↑5 Andreas Thom, Convergent sequences in discrete groups, Canad. Math. Bull. 56 (2013), no. 2, 424–433. ↑4, 5 Benjamin Weiss, Sofic groups and dynamical systems, Sankhyā Ser. A 62 (2000), no. 3, 350–359. Ergodic theory and harmonic analysis (Mumbai, 1999). ↑12 George W. Whitehead, Elements of homotopy theory, Graduate Texts in Mathematics, vol. 61, SpringerVerlag, New York, 1978. ↑15 Nobuaki Yagita, Homotopy nilpotency for simply connected Lie groups, Bull. London Math. Soc. 25 (1993), no. 5, 481–486. ↑15 A.K., Moscow State University, Russia. E-mail address: [email protected] A.T., Institut für Geometrie, TU Dresden, Germany E-mail address: [email protected]
4math.GR
Biconnectivity, st-numbering and other applications of DFS using O(n) bits I Sankardeep Chakrabortya , Venkatesh Ramana , Srinivasa Rao Sattib a The Institute of Mathematical Sciences, HBNI, Chennai, India b Seoul National University, Seoul, South Korea arXiv:1606.08645v3 [cs.DS] 27 Jul 2017 Abstract We consider space efficient implementations of some classical applications of DFS including the problem of testing biconnectivity and 2-edge connectivity, finding cut vertices and cut edges, computing chain decomposition and st-numbering of a given undirected graph G on n vertices and m edges. Classical algorithms for them typically use DFS and some Ω(lg n) bits1 of information at each vertex. Building on a recent O(n)-bits implementation of DFS due to Elmasry et al. (STACS 2015) we provide O(n)-bit implementations for all these applications of DFS. Our algorithms take O(m lgc n lg lg n) time for some small constant c (where c ≤ 2). Central to our implementation is a succinct representation of the DFS tree and a space efficient partitioning of the DFS tree into connected subtrees, which maybe of independent interest for designing other space efficient graph algorithms. 1. Introduction Space efficient algorithms are becoming increasingly important owing to their applications in the presence of rapid growth of “big data” and the proliferation of specialized handheld devices and embedded systems that have a limited supply of memory. Even if mobile devices and embedded systems are designed with large supply of memory, it might be useful to restrict the number of write operations. For example, on flash memory, writing is a costly operation in terms of speed, and it also reduces the reliability and longevity of the memory. Keeping all these constraints in mind, it makes sense to consider algorithms that do not modify the input and use only a limited amount of work space. One computational model that has been proposed in algorithmic literature to study space efficient algorithms, is the read-only memory (ROM) model. In this article, we focus on space efficient implementations of some fundamental graph algorithms in such settings without paying too much penalty on time. There is already a rich history of designing space efficient algorithms in the read-only memory model. The complexity class L (also known as DLOGSPACE) is the class containing decision problems that can be solved by a deterministic Turing machine using only logarithmic amount of work space for computation. There are several important algorithmic results [29, 33, 34, 35] for this class, the most celebrated being Reingold’s method [62] for checking st-reachability in an undirected graph, i.e., to determine if there is a path between two given vertices s and t. NL is the non-deterministic analogue of L and it is known that the st-reachability problem for directed graphs is NL-complete (with respect to log space reductions). Using Savitch’s algorithm [1], this problem can be solved in nO(lg n) time using O(lg2 n) bits. Savitch’s algorithm is very space efficient but its running time is superpolynomial. Among the deterministic algorithms running in polynomial time for directed st-reachability, √ the Θ( lg n) most space efficient algorithm is due to Barnes et al. [9] who gave a slightly sublinear space (using n/2 bits) algorithm for this problem running in polynomial time. We know of no better polynomial time algorithm for this problem with better space bound. Moreover, the space used by this algorithm matches a lower bound on space for solving directed st-reachability on a restricted model of computation called Node Naming Jumping Automata on Graphs (NNJAG) [24, 32]. This model was introduced especially for the study of directed st-reachability and most of the known sublinear space algorithms for this problem √ can be implemented on it. Thus, to design any polynomial time ROM algorithm taking space less than n/2Θ( lg n) bits requires significantly new ideas. Recently 1 We use lg to denote logarithm to the base 2. of these results were announced in preliminary form in the proceedings of 27th International Symposium on Algorithms and Computation (ISAAC 2016) LIPIcs, Volume 64, pages 22:1-22:13 [19]. Email addresses: [email protected] (Sankardeep Chakraborty), [email protected] (Venkatesh Raman), [email protected] (Srinivasa Rao Satti) I Some Preprint submitted to Elsevier July 28, 2017 there has been some improvement in the space bound for some special classes of graphs like planar and Hminor free graphs [4, 14]. Other than these fundamental graph theoretical problems, there have been some work on designing space-efficient algorithms for the more classical selection and sorting problems [10, 57, 58], and problems in computational geometry [2, 7, 8, 27] among others. A drawback, however, for all these graph algorithms using small space i.e., sublinear bits, is that their running time is often some polynomial of high degree. For example, to the best of our knowledge, the exact running time of Reingold’s algorithm [62] for undirected s-t connectivity is not analysed, yet we know it admits a large polynomial running time. This is not surprising as Tompa [69] showed that for directed st-reachability, if the number of bits available is o(n) then some natural algorithmic approaches to the problem require super-polynomial time. Motivated by these impossibility results from complexity theory and inspired by the practical applications of these fundamental graph algorithms, recently there has been a surge of interest in improving the space complexity of the fundamental graph algorithms without paying too much penalty in the running time i.e., reducing the working space of the classical graph algorithms to O(n) bits with little or no penalty in running time. Generally most of the classical linear time graph algorithms take O(n) words or equivalently O(n lg n) bits of space. Starting with the paper of Asano et al. [3] who showed how one can implement DFS using O(n) bits, improving on the naive O(n lg n)-bit implementation, the recent series of papers [3, 5, 6, 16, 19, 18, 37] presented space-efficient algorithms for a few other basic graph problems: namely BFS, maximum cardinality search, topological sort, connected components, minimum spanning tree, shortest path, recognition of outerplanar graph and chordal graphs among others. We add to this small yet growing body of space-efficient algorithm design literature by providing such algorithms for some classical graph problems that have been solved using DFS, namely the problem of testing biconnectivity and 2-edge connectivity, finding cut vertices and cut edges, computing chain decomposition and st-numbering among others. 1.1. Model of Computation As is standard in the area of space-efficient graph algorithms [3, 6, 5, 37], we assume that the input graph is given in a read-only memory (and so cannot be modified). If an algorithm must do some outputting, this is done on a separate write-only memory. When something is written to this memory, the information cannot be read or rewritten again. So the input is “read only” and the output is “write only”. In addition to the input and the output media, a limited random-access workspace is available. The data on this workspace is manipulated at word level as in the standard word RAM model, where the machine consists of words of size w = Ω(lg n) bits; and any logical, arithmetic, and bitwise operations involving a constant number of words take a constant amount of time. We count space in terms of the number of bits in the workspace used by the algorithms. Historically, this model is called the register input model and it was introduced by Frederickson [43] while studying some problems related to sorting and selection. We assume that the input graphs G = (V, E) are represented using an adjacency array, i.e., G is represented by an array of length |V| where the i-th entry stores a pointer to an array that stores all the neighbors of the i-th vertex. For the directed graphs, we assume that the input representation has both in/out adjacency array for all the vertices i.e., for directed graphs, every vertex v has access to two arrays, one array is for all the in-neighbors of v and the other array is for all the out-neighbors of v. This representation which has now become somewhat standard was also used in [5, 19, 37, 49] recently to design various other space efficient graph algorithms. We use n and m to denote the number of vertices and the number of edges respectively, in the input graph G. Throughout the paper, we assume that the input graph is a connected graph, and hence m ≥ n − 1. 1.2. Our results and organization of the paper Asano et al. [3] showed that Depth First Search (DFS) in a directed or an undirected graph can be performed in O(m lg n) time and O(n) bits of space. Elmasry et al. [37] improved the time to O(m lg lg n) still using O(n) bits of space. We build upon these results to give space efficient implementations of several classical applications of DFS. First, as a warm up, we start with some simple applications of the space efficient DFS to show the following. • An O(m lg n lg lg n) time and O(n) bits of space algorithm to compute the strongly connected components of a directed graph in Section 3.1. In addition, we also give • an algorithm to output the vertices of a directed acyclic graph in a topologically sorted order in Section 3.2, and 2 • an algorithm to find a sparse (with O(n) edges) spanning biconnected subgraph of an undirected biconnected graph in Section 3.3 both using asymptotically the same time and space used for DFS, i.e., using O(n) bits and O(m lg lg n) time. To develop fast and space efficient algorithms for other non-trivial graph problems which are also applications of DFS, in Section 4, we develop and describe in detail a space efficient tree covering technique, and use this in subsequent sections. This technique, roughly speaking, partitions the DFS tree into connected smaller sized subtrees which can be stored using less space. Finally we solve the corresponding graph problem on these smaller sized subtrees and merge the solutions across the subtrees to get an overall solution. All of these can be done using less space and not paying too much penalty in the running time. Some of these ideas are borrowed from succinct tree representation literature. As the first application, we consider in Section 5.1, a space efficient implementation of chain decomposition of an undirected graph. This is an important preprocessing routine for an algorithm to find cut vertices, biconnected components, cut edges, and also to test 3-connectivity [63] among others. We provide an algorithm that takes O(m lg2 n lg lg n) time using O(n) bits of space, improving on previous implementations that took Ω(n lg n) bits [64] or Θ(m + n) bits [5] of space. In Section 5.2, we give improved space efficient algorithms for testing whether a given undirected graph G is biconnected, and if G is not biconnected, we also show how one can find all the cut vertices of G. For this, we provide a space efficient implementation of Tarjan’s classical lowpoint algorithm [66]. Our algorithms take O(m lg n lg lg n) time and O(n) bits of space. In Section 5.3, we provide a space efficient implementation for testing 2-edge connectivity of a given undirected graph G, and producing cut edges of G using O(m lg n lg lg n) time and O(n) bits of space. Given a biconnected graph, and two distinguished vertices s and t, st-numbering is a numbering of the vertices of the graph so that s gets the smallest number, t gets the largest and every other vertex is adjacent both to a lowernumbered and to a higher-numbered vertex. Finding an st-numbering is an important preprocessing routine for a planarity testing algorithm [38] among others. In Section 5.4, we give an algorithm to determine an st-numbering of a biconnected graph that takes O(m lg2 n lg lg n) time using O(n) bits. This improves the earlier implementations that take Ω(n lg n) bits [11, 31, 38, 68]. Using this as a subroutine, in Section 5.5, we provide improved space effcient implementation for two-partitioning and two independent spanning tree problem among others. We direct the readers to Section 2.1 where we provide all the necessary definitions. 1.3. Related Models Several models of computation come close to read-only random-access model, the model we focus on this paper, when it comes to design space-efficient graph algorithms. A single thread common to all of them is that access to the input tape is restricted in some way. In the multi-pass streaming model [57] the input is kept in a read-only sequentially-accessible media, and an algorithm tries to optimize on the number of passes it makes over the input. In the semi-streaming model [42], the elements (or edges if the input is graph) are revealed one by one and extra space allowed to the algorithm is O(n.polylg(n)) bits. Observe that, it is not possible to store the whole graph if it is dense. The efficiency of an algorithm in this model is measured by the space it uses, the time it requires to process each edge and the number of passes it makes over the stream. In the in-place model [12], one is allowed a constant number of additional variables, but it is possible to rearrange (and sometimes even modify) the input values. Chan et al. [20] introduced the restore model which is a more relaxed version of read-only memory (and a restricted version of the in-place model), where the input is allowed to be modified, but at the end of the computation, the input has to be restored to its original form. This has motivation, for example, in scenarios where the input (in its original form) is required by some other application. Buhrman et al. [13, 54] introduced and studied the catalytic-space model where a small amount (typically O(lg n) bits) of clean space is provided along with additional auxiliary space, with the condition that the additional space is initially in an arbitrary, possibly incompressible, state and must be returned to this state when the computation is finished. The input is assumed to be given in ROM. They also provided implementations of some graph algorithms space efficiently. 2. Preliminaries In this section, we list some preliminary results and graph theoretic definitions that will be used later in the algorithms we develop. We also discuss briefly, at a very high level, the main technique that goes behind almost all of our algorithms in this paper. 3 2.1. Graph theoretic terminology Here we collect all the necessary graph theoretic definitions that will be used throughout the paper. A cut vertex in an undirected graph G is a vertex v that when removed (along with its incident edges) from a graph creates more components than previously in the graph. A (connected) graph with at least three vertices is biconnected (also called 2-connected in the graph literature sometimes) if and only if it has no cut vertex. A biconnected component is a maximal biconnected subgraph. These components are attached to each other at cut vertices. Similarly in an undirected graph G, a bridge (or cut edge) is an edge that when removed (without removing the vertices) from a graph creates more components than previously in the graph. A (connected) graph with at least two vertices is 2edge-connected (also called bridgeless sometimes) if and only if it has no bridge. A 2-edge connected component is a maximal 2-edge connected subgraph. Given a biconnected graph G, and two distinguished vertices s and t in V such that s , t, st-numbering is a numbering of the vertices of the graph so that s gets the smallest number, t gets the largest and every other vertex is adjacent both to a lower-numbered and to a higher-numbered vertex i.e., a numbering s = v1 , v2 , · · · , vn = t of the vertices of G is called an st-numbering, if for all vertices v j , 1 < j < n, there exist 1 ≤ i < j < k ≤ n such that {vi , v j }, {v j , vk } ∈ E. It is well-known that G is biconnected if and only if, for every edge {s, t} ∈ E, it has an st-numbering. In the k-partitioning problem, we are given vertices a1 , · · · , ak of an undirected graph G and natural numbers c1 , · · · , ck with c1 + · · · + ck = n, and we want to find a partition of V into sets V1 , · · · , Vk with ai ∈ Vi and |Vi | = ci for every i such that every set Vi induces a connected graph in G. Given a graph G, we call a set of k rooted spanning trees independent if they all have the same root vertex r and, for every vertex v , r, the paths from v to r in all the k spanning trees are vertex-disjoint (except for their endpoints). A directed graph G is said to be strongly connected if for every pair of vertices u and v in V, both u and v are reachable from each other. If G is not strongly connected, it is possible to decompose G into its strongly connected components i.e. a maximal set of vertices C ⊆ V such that for every pair of vertices u and v in C, both u and v are reachable from each other. A topological sort or topological ordering of a directed acyclic graph is a linear ordering of its vertices such that for every directed edge (u, v) ∈ E from vertex u to vertex v, u comes before v in the ordering. Let T be a depth-first search tree of a connected undirected (or directed) graph G. For each vertex v of T , preorder number of v is the number of vertices visited up to and including v during a preorder traversal of T . Similarly, postorder number of v is the number of vertices visited up to and including v during a postorder traversal of T . 2.2. Tree cover and its space efficient construction To implement our algorithms in O(n) bits, our main idea is to process the nodes of the DFS tree in batches of O(n/ lg n) nodes, as we can only afford to store trees of size O(n/ lg n) explicitly with their labels. To do this, we first use a tree-cover algorithm (that is used in succinct representations of trees) to partition the tree into O(lg n) connected subtrees of size O(n/ lg n) each. We then solve the problem we are dealing with in these smaller subtrees, and later merge them in a specific order to obtain the overall solution. In some cases, to obtain the overall solution, we need to generate pairs of subtrees with explicit node labels, and then process the edges between them in a specific order. We describe all the details of the tree cover approach in Section 4, and describe the algorithms in Section 5. 2.3. Rank-Select We use the following fundamental data structure on bitstrings in some of our algorithms. Given a bitvector B of length n, the rank and select operations are defined as follows: • ranka (i, B) = number of occurrences of a ∈ {0, 1} in B[1, i], for 1 ≤ i ≤ n; • selecta (i, B) = position in B of the i-th occurrence of a ∈ {0, 1}. The following theorem gives an efficient structure to support these operations. Theorem 1 ([23, 56, 60]). Given a bitstring B of length n, one can construct a o(n)-bit auxiliary structure to support rank and select operations in O(1) time. Also, such a structure can be constructed from the given bitstring in O(n) time. 2.4. Related work on Space-efficient DFS Recall that DFS starts exploring the given input graph G where each vertex is initially white meaning unexplored, becomes gray when DFS discovers for the first time and pushed on the stack, and is colored black when it is finished i.e. its adjacency list has been checked completely and it leaves the stack. Recently Elmasry et al. [37] showed the following tradeoff result for DFS, 4 Theorem 2 ([37]). For every function t : N → N such that t(n) can be computed within the resource bound of this theorem (e.g., in O(n) time using O(n) bits), the vertices of a directed or undirected graph G can be visited in lg n ) bits. depth first order in O((m + n)t(n)) time with O(n + n lgt(n) In particular, fixing t(n) = O(lg lg n), one can obtain a DFS implementation which runs in O(m lg lg n) time using O(n) bits. We build on top of this DFS algorithm to provide space efficient implementation for various applications of DFS in directed and undirected graphs in the rest of this paper. 3. Some simple applications of DFS using O(n) bits 2 Classical applications of DFS in directed graphs (see [25]) are to find strongly connected components of a directed graph, and to do a topological sort of a directed acyclic graph among many others. Also, given an undirected biconnected graph G, DFS is used as the main tool to produce a sparse spanning biconnected subgraph of G. We show here that while topological sort and producing a sparse spanning biconnected subgraph of an undirected biconnected graph can be solved using the same O(n) bits and O(m lg lg n) time (as for DFS), strongly connected components of a directed graph can be obtained using O(n) bits and O(m lg n lg lg n) time. 3.1. Strongly Connected Components There is a classical two pass algorithm (see [25] or [28]) for computing the Strongly Connected Components (SCC) of a given directed graph G which works as follows. In the first step, it runs a DFS on GR , the reverse graph of G. In the second pass, it runs the connected component algorithm using DFS in G but it processes the vertices in the decreasing order of the finishing time from the first pass. We can obtain GR by switching the role of in and out adjacency arrays present in the input representation. As we can not remember the vertex ordering from the first pass due to space restriction, we process them in batches of size n/ lg n in the reverse order i.e., we run a full DFS in GR to obtain and store the last n/ lg n vertices in an array A as they are the ones which have the highest set of finishing numbers in decreasing order. I.e., we maintain A as a queue of size n/ lg n and as and when a new element is finished, it is added to the queue and the element with the earliest finish time at the other end of the queue is deleted. Now, we pick the vertices from A one by one in the order from the queue with the latest finish time and start a fresh DFS in G to compute the connected components and output all the vertices reachable as a SCC. The output vertices are marked in a bitmap so that we don’t output them again. Once we are done with all the vertices in A, we restart the DFS from the beginning and produce the next chunk of n/ lg n vertices by remembering the last vertex produced in the previous step and stop as soon as we hit that boundary vertex. Then we repeat the connected component algorithm from this chunk of vertices and continue this way. It is clear that the algorithm produces the SCCs correctly. As we are calling the DFS algorithm O(lg n) times, total time taken by this algorithm is O(m lg lg n lg n) with O(n) bits of space. Hence, we have the following, Theorem 3. Given a directed graph G on n vertices and m edges, represented as in/out adjacency array, we can output the strongly connected components of G in O(m lg n lg lg n) time and O(n) bits of space. 3.2. Topological Sort The standard algorithm for computing topological sort [25] outputs the vertices of a DFS in reverse order. If we can keep track of the DFS numbers, then reversing is an easy task. While working in space restricted setting (with o(n lg n) bits), this is a challenge as we don’t have space to keep track of the DFS order. We can do as we did in the strongly connected components algorithm in the last section, by storing and outputting vertices in batches of n/ lg n resulting in an O(m lg n lg lg n) time algorithm. Elmasry et al.[37] showed that, the vertices of a DAG G can be output in the order of a topological sort within the time and space bounds of a DFS in G plus an additional O(n lg lg n) bits. As they also showed how to perform DFS in O(m + n) time and O(n lg lg n) bits, overall their algorithm takes O(m + n) time and O(n lg lg n) bits to compute a topological sorting of G. Their main idea is to maintain enough information about a DFS to resume it in the middle and apply this repeatedly to reverse small chunks of its output, produced in reverse order, one by one. We observe that, instead of storing information to restart DFS and produce the reverse order, we simply work with the reverse graph itself (which can be obtained from the input representation by switching the role of in and 2 The results of this section were announced in preliminary form in the proceedings of 22nd International Computing and Combinatorics Conference (COCOON 2016), Springer LNCS volume 9797, pages 119-130 [5]. 5 out adjacency arrays) and do a DFS in the reverse graph and output vertices as they are finished (or blackened) i.e., in the increasing order of finishing time. To see the correctness of this procedure, note that the reverse graph is also a DAG, and if (i, j) is an edge in the DAG G, then ( j, i) is an edge in the reverse graph and i will become black before j while the algorithm performs DFS in the reverse graph. Hence, i will be placed before j in the correct topological sorted order. Thus we have the following, Theorem 4. Given a DAG G on n vertices and m edges, if the black vertices of the DFS of G can be output using s(n) space and t(n) time, then its vertices can be output in topologically sorted order using O(s(n)) space and O(t(n)) time assuming that the input representation has both the in and out adjacency array of the graph. From Theorem 2 (setting t(n) = O(lg lg n)) and Theorem 4, we have the following. Corollary 1. Given a DAG G on n vertices and m edges, its vertices can be output in topologically sorted order using O(m lg lg n) time and O(n) bits. Note that, we knew all along that DFS and topological sort take the same time, the main contribution of Theorem 4 is that it shows they take the same space (improving on the result of [37] where they showed that topological sort space = DFS space + O(n lg lg n) bits under the same time) when both the in/out adjacency arrays are present in the input. 3.2.1. Topological Sort in Sublinear Space We note the following theorem of Asano et al. [3]. Theorem 5. DFS on a DAG G can be performed in space O( √n 2( lg n) ) bits and in polynomial time. While it should immediately follow from Theorem 4 that topological sort can also be performed using such sublinear bits of space, there is one caveat. Asano et al.’s algorithm works assuming that the given DAG G has a single source vertex. In particular, they determine whether a vertex is black by checking whether it is reachable from the source without using the gray vertices (using the sublinear space reachability algorithm of [9]). The algorithm can be easily extended to handle s many sources if we have some additional s log n bits. We simply keep track of the indices of the sources from which DFS has been explored, and to determine whether a vertex is black, we ask if it is reachable from an earlier source or from the current source without using the gray vertices. Thus we have the following improved theorem. Theorem 6. DFS on DAG G with s sources can be performed using s lg n + o(n) bits and polynomial time. In particular, if s is o(n/ lg n), the overall space used is o(n) bits. Thus from Theorem 4 and Theorem 6 we obtain the following, Theorem 7. Topological Sort on a DAG G with s sinks can be performed using s lg n + o(n) bits and polynomial time. In particular if s is o(n/ lg n), the overall space used is o(n) bits. 3.3. Finding a sparse biconnected subgraph of a biconnected graph The problem of finding a k-connected spanning subgraph with the minimum number of edges of a k-connected graph is known to be NP-hard for any k ≥ 2 [45]. But the complexity of the problem decreases drastically if all we want is to produce a “sparse” k-connected spanning subgraph, i.e., one with O(n) edges. Nagamochi and Ibaraki [61] gave a linear time algorithm which produces a k-connected spanning subgraph with at most kn − k(k+1) 2 edges. Later, Cheriyan et al. [21] gave another linear time algorithm for k = 2 and 3 that produced a 2-connected spanning subgraph with at most 2n − 2 edges, and a 3-connected subgraph with at most 3n − 3 edges. Later, Elmasry [36] gave an alternate linear time algorithm for producing a sparse spanning biconnected subgraph of a given biconnected graph by performing a DFS with additional bookkeeping. In what follows, we provide a space efficient implementation for it. In order to do that, we start by briefly describing Elmasry’s algorithm. Let DFI(v) denote the index (integer) that represents the time at which the vertex v is first discovered from the vertex u when performing a DFS i.e., u is the parent of v in the DFS tree. Let low(v) be the smallest DFI value among the DFI values of vertices w such that (v, w) is a back edge. (Note that this quantity is different from the “lowpoint” value used in Tarjan’s [66] classical biconnectivity algorithm.) Basically low(v) captures the information regarding the deepest back edge going out of the vertex v. If v has no backedges, for convenience (the reason will become clear in the following lemma), we adopt the convention that low(v) = DFI(parent(v)). The edge (v, low(v)) is the deepest backedge out of v. Note that, it is actually the tree edge between v and its parent if v does not have a backedge. The algorithm maintains all the edges of the DFS tree. In addition, for every vertex 6 in the graph, the algorithm maintains the DFI and the low values along with the back edge that realizes it. As the root of the DFS tree does not have any back edge and, as the underlying graph is 2-connected, the root has only one child v so that there is no back edge emanating from v as well. Thus we get at most n − 2 back edges along with n − 1 tree edges, giving a subgraph with at most 2n − 3 edges. Elmasry [36] proved that the resulting graph is indeed a spanning 2-connected subgraph of G. His algorithm takes O(m + n) time and O(n lg n) bits of space. We improve the space bound, albeit with slight increase in time, by first proving a more general lemma as following, va vb vc vi Figure 1: A part of the full DFS tree. The wiggling edges represent tree edges and the edges with arrow heads represent back edges. If low(vi ) = va , we would come across vi in the adjacency array of va before encountering from the arrays of vb and vc . I.e., the back edge (va , vi ) will be processed before the other back edges (vb , vi ) and (vc , vi ) since we process the vertices (and the backedges incident to them) in their DFS order. Lemma 1. Given any undirected graph G with n vertices and m edges, we can compute and report the low(v) values i.e., deepest back edge going out of v, for every vertex v, using O(n) bits of space and O(m lg lg n) time. Proof. The aim is to output all the deepest back edges out of every vertex v in G as we perform the DFS. As always, let {v1 , v2 , · · · , vn } be the vertices of the graph. We perform a DFS with the usual color array and other relevant data structures (as required in Theorem 2 with t(n) = lg lg n) along with one more array of n bits, which we call DBE (for Deepest Back Edge) array, which is initialized to all zero. DBE[i] is set to 1 if and only if the algorithm has found and output the deepest back edge emanating from vertex vi . So whenever a white vertex vi becomes gray (i.e., vi is visited for the first time), we scan vi ’s adjacency array to mark, for every white neighbor v j , DBE[ j] to 1 if and only if it was 0 before. The correctness of this step follows from the fact that as we are visiting vertices in DFS order, and if DBE[ j] is 0, then vertex v j is not adjacent to any of the vertices we have visited so far, and as it is adjacent to vi , the deepest back edge emanating from v j is (vi , v j ). Hence we output this edge and move on to the next neighbor and eventually with the next step of DFS until all the vertices are exhausted. This completes the description of the algorithm. See Figure 1 for an illustration. Now to see how this procedure produces all the deepest back edges out of every vertex, note that, at vertex vi , our algorithm reports all the back edges e = (vi , v j ) where e is the deepest back edge from v j , and also all tree edges (vi , v j ) where v j has no back edge. Observe that from our convention, in the second case, (vi , v j ) is the deepest back edge out of v j . This concludes the proof of the lemma. As we performed just one DFS to produce all such edges, using Theorem 2, the claimed running time and space bounds follow. The way we will actually use Lemma 1 in our algorithms, is for finding and storing the low values for at most n/ lg n vertices. So we state a corollary for that. Corollary 2. Given any undirected graph G with n vertices and m edges and any set L of O(n/ lg n) vertices as input, we can compute, report and store the low(v) values for every vertex v in L in the DFS tree T of G using O(n) bits of space and O(m lg lg n) time. Note that, Lemma 1 holds true for any undirected connected graph G. In what follows, we use Lemma 1 to give a space efficient implementation of Elmasry’s algorithm when the input graph G is an undirected biconnected graph. In particular, we show the following, Theorem 8. Given an undirected biconnected graph G with n vertices and m edges, we can output the edges of a sparse spanning biconnected subgraph of G using O(n) bits of space and O(m lg lg n) time. 7 Proof. When the underlying graph G is undirected biconnected graph, we know that Elmasry’s algorithm produces a sparse spanning subgraph which is also biconnected. In order to implement that, given an undirected biconnected graph G, we first run on G the algorithm of Lemma 1 which produces and reports all the deepest back edges out of all the vertices v in G. Out of all those deepest back edges, note that, some are actually tree edges from our convention. Hence, we don’t want to report them multiple time. More specifically, if a vertex v j has no back edge going out of it, Lemma 1 outputs the edge (vi , v j ) as the deepest back edge out of v j , which is actually a tree edge in the DFS tree T of G. In order to avoid reporting such edges more than once, we perform the following. During the scanning of vi ’s adjacency array, we also check if any of its neighbor, other than its parent, is gray. If so, we report the edge from vi to its parent. Note that if vi has a back edge to one of its ancestors (other than its parent), then this step reports the tree edge from vi to its parent. Otherwise, vi didn’t have any back edge, and hence the tree edge to its parent would have been output while DFS was exploring and outputting deepest back edges from its parent; so we do not output the edge again. Note that, we can do this test along with the algorithm of Lemma 1 so that using just one DFS, we can produce all the tree edges and deepest back edges as required in Elmasry’s algorithm. Thus using Theorem 2, we can output the edges of a sparse spanning biconnected subgraph of G using O(n) bits of space and O(m lg lg n) time. 4. Tree Cover and Space Efficient Construction Before moving on to handle other complex applications of DFS in undirected graphs, namely biconnectivity, 2-edge connectivity, st-numbering etc, in the this section we discuss the common methodology to attack all of these problems. Once we set all our machinary here, in Section 4, we see afterwards how to use them almost in a similar fashion to several problems. Central to all of our algorithms following this section is a decomposition of the DFS tree. For this we use the well-known tree covering technique which was first proposed by Geary et al. [47] in the context of succinct representation of rooted ordered trees. The high level idea is to decompose the tree into subtrees called minitrees, and further decompose the mini-trees into yet smaller subtrees called microtrees. The microtrees are tiny enough to be stored in a compact table. The root of a minitree can be shared by several other minitrees. To represent the tree, we only have to represent the connections and links between the subtrees. Later He et al. [50] extended this approach to produce a representation which supports several additional operations. Farzan and Munro [40] modified the tree covering algorithm of [47] so that each minitree has at most one node, other than the root of the minitree, that is connected to the root of another minitree. This simplifies the representation of the tree, and guarantees that in each minitree, there exists at most one non-root node which is connected to (the root of) another minitree. The tree decomposition method of Farzan and Munro [40] is summarized in the following theorem: Theorem 9 ([40]). For any parameter L ≥ 1, a rooted ordered tree with n nodes can be decomposed into Θ(n/L) minitrees of size at most 2L which are pairwise disjoint aside from the minitree roots. Furthermore, aside from edges stemming from the minitree root, there is at most one edge leaving a node of a minitree to its child in another minitree. The decomposition can be performed in linear time. See Figure 2 for an illustration. In our algorithms, we apply Theorem 9 with L = n/ lg n. For this parameter L, since the number of minitrees is only O(lg n), we can represent the structure of the minitrees within the original tree (i.e., how the minitrees are connected with each other) using O(lg2 n) bits. The decomposition algorithm of [40] ensures that each minitree has at most one ‘child’ minitree (other than the minitrees that share its root) in this structure. We use this property crucially in our algorithms. We refer to this as the minitree-structure. See Figure 3(a) for the minitree structure of the tree decomposition shown in Figure 2. Explicitly storing all the minitrees (using pointers) requires ω(n) bits overall. One way to represent them efficiently using O(n) bits is to store each of them using any linear-bit encoding of a tree [? ]. But if we store these minitrees separately, we loose the ability to compute the preorder or postorder numbers of the nodes in the entire tree, which is needed in our algorithms. Hence, we encode the entire tree structure using a linear-bit encoding, and store pointers into this encoding to represent the minitrees. We first encode the tree using the balanced parenthesis (BP) representation [15, 59], summarized in the following theorem.3 Theorem 10 ([15]). Given a rooted ordered tree T on n nodes, it can be represented as a sequence of balanced parentheses of length 2n. Given the preorder or postorder number of a node v in T , we can support subtree size and various navigational queries (such as parent and i-th child) on v in O(1) time using an additional o(n) bits. 3 The representation of [59] does not support computing the i-th child of a node in constant time while the one in [15] can. When using these representations to produce a tree cover, the representation of [59] is sufficient as we just need to compute the ‘next child’ as we traverse the tree in post-order computing the subtree sizes of each subtree. 8 Figure 2: An illustration of Tree Covering technique with L = 5. The figure is reproduced from [40]. Each closed region formed by the dotted lines represents a minitree. Note that each minitree has at most one ‘child’ minitree (other than the minitrees that share its root) in this structure. The following lemma by Farzan et al. [41, Lemma 2] (restated) shows that each minitree is split into a constant number of consecutive chunks in the BP sequence. So we now represent each minitree by storing pointers to the set of all chunks in the BP representation that together constitute the minitree. Lemma 2. In the BP sequence of a tree, the bits corresponding to a mini-tree form a set of constant number of substrings. Furthermore, these substrings concatenated together in order, form the BP sequence of the mini-tree. Hence, one can store a representation of the minitrees by storing an O(lg2 n)-bit structure that stores pointers to the starting positions of the chunks corresponding to each minitree in the BP sequence We refer to the representation obtained using this tree covering (TC) approach as the TC representation of the tree. See Figure 3 for a complete example of a minitree structure along with the BP sequence of the tree of Figure 2. The following lemma shows that we can construct the TC representation of the DFS tree of a given graph, using O(n) additional bits. Lemma 3. Given a graph G on n vertices and m edges, if there is an algorithm that takes t(n, m) time and s(n, m) bits to perform DFS on G, then one can create the TC representation of the DFS tree in t(n, m) + O(n) time, using s(n, m) + O(n) bits. Proof. We first construct the balanced parenthesis (BP) representation of the DFS tree as follows. We start with an empty sequence, BP, and append parentheses to it as we perform each step of the DFS algorithm. In particular, whenever the DFS visits a vertex v for the first time, we append an open parenthesis to BP. Similarly when DFS backtracks from v, we append a closing parenthesis. At the end of the DFS algorithm, as every vertex is assigned a pair of parenthesis, length of BP is 2n bits. We just need to run the DFS algorithm once to construct this array, hence the running time of this algorithm is asymptotically the same as the running time of the DFS algorithm. We construct auxiliary structures to support various navigational operations on the DFS tree using the BP sequence, as mentioned in Theorem 10. This takes o(n) time and space using the algorithm of [46]. We then use the BP sequence along with the auxiliary structures to navigate the DFS tree in postorder, and simulate the tree decomposition algorithm of Farzan and Munro [40] for constructing the TC representation of the DFS tree. If we reconstruct the entire tree (with pointers), then the intermediate space would be Ω(n lg n) bits. Instead, we observe that the tree decomposition algorithm of [40] never needs to keep more than O(L) temporary components (see [40] for details) in addition to some of the permanent components. Each component (permanent or temporary) can be stored by storing the root of the component together with its subtree size. Since L = n/ lg n, and the number of 9 a b d M8 M3 k M1 M2 M4 p n M4 o r q x M5 M6 M7 y z β M7 (a) (((())()(())())()((()((()(())()()())((())()()))()))()()) (b) a b M1 M2 b M3 d M4 o q M5 M6 q r M7 r o M4 d M8 a (c) Figure 3: (a) The minitree structure of the tree decomposition shown in Figure 2. (b) This array encodes the entire DFS tree using the balanced parenthesis (BP) representation. (c) In this array, we demonstrate how the minitrees are split into a constant number of consecutive chunks in the BP representation. Note that the bottom array can actually be encoded using O(lg2 n) bits, by storing, for each of the O(lg n) minitrees, pointers to all the chunks in BP sequence indicating the starting and ending positions of the chunks corresponding to the minitrees. permanent components is only O(lg n), the space required to store all the permanent and temporary components at any point of time is bounded by O(n) bits. The construction algorithm takes O(n) time. We use the following lemma in the description of our algorithms in the later sections. Lemma 4. Let G be a graph, and T be its DFS tree. If there is an algorithm that takes t(n, m) time and s(n, m) bits to perform DFS on G, then, using s(n, m) + O(n) bits, one can reconstruct any minitree given by its ranges in the BP sequence of the TC representation of T , along with the labels of the corresponding nodes in the graph in O(t(n, m)) time. Proof. We first perform DFS to construct the BP representation of the DFS tree, T . We then construct the TC representation of T , as described in Lemma 3. We now perform DFS algorithm again, keeping track of the preorder number of the current node at each step. Whenever we visit a new node, we check its preorder number to see if it falls within the ranges of the minitree that we want to reconstruct. (Note that, as mentioned above, from [41, Lemma 2], the set of all preorder number of the nodes that belong to any minitree form a constant number of ranges, since these nodes belong to a constant number of chunks in the BP sequence.) If it is within one of the ranges corresponding to the minitree being constructed, then we add the node along with its label to the minitree. 5. Applications of DFS using tree-covering technique In this section, we provide O(n) bit implementations of various algorithmic graph problems that use DFS, by using the tree covering technique developed in the previous section. At a higher level, we use the tree covering 10 technique to generate the minitrees one by one, and then partially solve the corresponding graph problem inside that minitree before finally combining the solution across all the minitrees. The problems we consider include algorithms to test biconnectivity, 2-edge connectivity and to output cut vertices, edges, and to find a chain decomposition and an st-numbering among others. To test for biconnectivity and related problems, the classical algorithm due to Tarjan [66, 67] computes the so-called “low-point” values (which are defined in terms of a DFStree) for every vertex v, and checks some conditions based on these values. Brandes [11] and Gabow [44] gave considerably simpler algorithms for testing biconnectivity and computing biconnected components by using some path-generating rules instead of low-points; they call these algorithms path-based. An algorithm due to Schmidt [64] is based on chain decomposition of graphs to determine biconnectivity (and/or 2-edge connected). All these algorithms take O(m + n) time and O(n) words of space. Roughly these approaches compute DFS and process the DFS tree in specific order maintaining some auxiliary information of the nodes. We start with a brief description of chain decomposition and its application first before providing its space efficient implementation. 5.1. Chain decomposition Schmidt [63] introduced a decomposition of the input graph that partitions the edge set of the graph into cycles and paths, called chains, and used this to design an algorithm to find cut vertices and biconnected components [64] and also to test 3-connectivity [63] among others. In what follows, we discuss briefly the decomposition algorithm, and state his main result. The algorithm first performs a depth first search on G. Let r be the root of the DFS tree T of G. DFS assigns an index to every vertex v, namely, the time vertex v is discovered for the first time during DFS – call it the depth-firstindex of v (DFI(v)). Imagine that the back edges are directed away from r and the tree edges are directed towards r. The algorithm decomposes the graph into a set of paths and cycles called chains as follows. See Figure 4 for an example. First we mark all the vertices as unvisited. Then we visit every vertex starting at r in the increasing order of DFI, and do the following. For every back edge e that originates at v, we traverse a directed cycle or a path. This begins with v and the back edge e and proceeds along the tree towards the root and stops at the first visited vertex or the root. During this step, we mark every encountered vertex as visited. This forms the first chain. Then we proceed with the next back edge at v, if any, or move towards the next vertex in the increasing DFI order and continue the process. Let D be the collection of all such cycles and paths. Notice that the cardinality of this set is exactly the same as the number of back edges in the DFS tree as each back edge contributes to a cycle or a path. Also, as initially every vertex is unvisited, the first chain would be a cycle as it would end in the starting vertex. Using this, Schmidt proved the following theorem. Theorem 11 ([64]). Let D be a chain decomposition of a connected graph G(V, E). Then G is 2-edge-connected if and only if the chains in D partition E. Also, G is 2-vertex-connected if and only if δ(G) ≥ 2 (where δ(G) denotes the minimum degree of G) and D1 is the only cycle in the set D where D1 is the first chain in the decomposition. An edge e in G is bridge if and only if e is not contained in any chain in D. A vertex v in G is a cut vertex if and only if v is the first vertex of a cycle in D \ D1 . Now we are ready to describe an implementation of Schmidt’s chain decomposition algorithm using only O(n) bits of space and in O(m lg2 n lg lg n) time using our partition of the DFS tree of Section 4. In the following description, processing a back edge refers to the step of outputting the chain (directed path or cycle) containing that edge and marking all the encountered vertices as visited. Processing a node refers to processing all the back edges out of that node. The main idea of our implementation is to process all the back edges out of each node in their preorder (as in Schmidt’s algorithm). To perform this efficiently (within the space limit of O(n) bits), we process the nodes in chunks of size n/ lg n each (i.e., the first chunk of n/ lg n nodes in preorder are processed, followed by the next chunk of n/ lg n nodes, and so on). But when processing the back edges out of a chunk C, we process all the back edges that go from C to all the minitrees in their postorder, processing all the edges from C to a minitree τ1 before processing any other back edges going out of C to a different minitree. This requires us to go through all the edges out of each chunk at most O(lg n) times (once for each minitree). Thus the order in which we process the back edges is different from the order in which we process them in Schmidt’s algorithm, but we argue that this does not affect the correctness of the algorithm. In particular, we observe the following: • Schmidt’s algorithm correctly produces a chain decomposition even if we process vertices to any order, as long as we process a vertex v only after all its ancestors are also processed – for example, in level order instead of preorder. This also implies that as long as we process the back edges coming to a vertex v (from any of its descendants) only after we process all the back edges going to any of it’s ancestors from any of v’s descendants, we can produce a chain decomposition correctly. 11 a V1 b V2 c V3 e d i f V5 V4 V9 V6 j g V10 V7 h V8 (b) (a) V1 V1 V2 V5 V6 V2 V4 V5 V9 V7 V3 V3 V3 V10 V8 (c) Figure 4: Illustration of Chain Decomposition. (a) An input graph G. (b) A DFS traversal of G and the resulting edge-orientation along with DFIs. (c) A chain decomposition D of G. The chains D2 and D3 are paths and rest of them are cycles. The edge (V5 , V6 ) is bridge as it is not contained in any chain. V5 and V6 are cut vertices. To process a back edge (u, v) between a chunk C and a minitree τ, where u belongs to C, v belongs to τ, and u is an anscestor of v, we first output the edge (u, v), and then traverse the path from v to the root of τ, outputting all the traversed edges and marking the nodes as visited. We then start another DFS to produce the minitree τ p containing the parent p of the root of τ, and output the path from p to the root of τ p , and continue the process untill we reach a vertex that has been marked as visited. Note that this process will terminate since u is marked and is an ancestor of v. We maintain a bitvector of length n to keep track of the marked vertices, to perform this efficiently. A crucial observation that we use in bounding the runtime is that once we produce a minitree τ p for a particular pair (C, τ), we don’t need to produce it again, as the root of τ will be marked after the first time we output it as part of a chain. Also, once we generate a chunk C and a minitree τ, we go through all the vertices of C in preorder, and process all the edges that go between C and τ. We provide the pseudocode (see Algorithm 1) below describing the high-level algorithm for outputting the chain decomposition. Algorithm 1 Chain Decomposition Let τ1 , τ2 , · · · , τO(lg n) be the minitrees in postorder and C1 , C2 , · · · , Clg n be the chunks of vertices in preorder 1: for i = 1 to lg n do 2: for j = 1 to O(lg n) do 3: for all back edges (u, v) with u ∈ Ci and v ∈ τ j do 4: output the chain containing the edge (u, v) 5: end for 6: end for 7: end for The time taken for the initial part, where we construct the DFS tree, decompose it into minitrees, and construct the auxiliary structures, is O(m lg lg n), using Theorem 2 with t(n) = lg lg n. The running time of the rest of the algorithm is dominated by the cost of processing the back edges. As outlined in Algorithm 1, we process the back edges between every pair (Ci , τ j ), where Ci is the i-th chunk of n/ lg n nodes in preorder, and τ j is the j-th minitree in postorder, for 1 ≤ i ≤ lg n and 1 ≤ j ≤ O(lg n). The outer loop of the algorithm generates each chunk in preorder, and thus requires a signle DFS to produce all the chunks over the entire execution of the algorithm. The inner loop goes through all the minitrees for each chunk. Since there are lg n chunks and O(lg n) minitrees, and prodicing each minitree takes O(m lg lg n) time, the generation of all the chunk-minitree pairs takes 12 O(m lg lg n lg2 n) time. For a particular pair (C, τ), we may need to generate many (O(lg n), in the worst-case) minitrees. But we observe that, this happens for at most one back edge for a every pair (C, τ), since after processing the first such back edge, the root of the minitree τ is marked and hence any chain that is output afterwards will stop before the root of the minitree. Also, if a minitree τ` is generated when processing a pair (C, τ), then it will not be generated when processing any other pair (C 0 , τ0 ) which is different from (C, τ) (since each minitree has at most one child minitree). Thus the overall running time is dominated by generating all the pairs C, τ), which is O(m lg2 n lg lg n). Thus, we obtain the following. Theorem 12. Given an undirected graph G on n vertices and m edges, we can output a chain decomposition of G in O(m lg2 n lg lg n) time using O(n) bits. 5.2. Testing biconnectivity and finding cut vertices A naı̈ve algorithm to test for biconnectivity of a graph G = (V, E) is to check if (V \ {v}, E) is connected, for each v ∈ V. Using the O(n) bits and O(m + n) time BFS algorithm [5] for checking connectivity, this gives a simple O(n) bits algorithm running in time O(mn). Another approach is to use Theorem 12 combining with criteria mentioned in Theorem 11 to test for biconnectivity and output cut vertices in O(m lg2 n lg lg n) time using O(n) bits. Here we show that using O(n) bits we can design an even faster algorithm running in O(m lg n lg lg n) time. If G is not biconnected, then we also show how one can find all the cut-vertices of G within the same time and space bounds. We implement the classical low-point algorithm of Tarjan [66]. Recall that, the algorithm performs a DFS and computes for every vertex v, a value lowpoint[v] which is recursively defined as lowpoint[v] = min{ DFI(v) ∪ {lowpoint[s]| s is a child of v} ∪ {DFI(w)|(v, w) is a back-edge} } Tarjan proved that if a vertex v is not the root, then v is a cut vertex if and only if v has a child w such that lowpoint[w] ≥ DFI(v). The root of a DFS tree is a cut vertex if and only if the root has more than one child. Since the lowpoint values require Ω(n lg n) bits in the worst case, this poses the challenge of efficiently testing the condition for biconnectivity with O(n) bits. To deal with this, as in the case of the chain decomposition algorithm, we compute lowpoint values in O(lg n) batches using our tree covering algorithm. Cut vertices encountered in the process, if at all, are stored in a separate bitmap. We show that each batch can be processed in O(m lg lg n) time using DFS, resulting in an overall runtime of O(m lg n lg lg n). 5.2.1. Computing lowpoint and reporting cut vertices We first obtain a TC representation of the DFS tree using the decomposition algorithm of Theorem 9 with L = n/ lg n. We then process each minitree, in the postorder of the minitrees in the minitree structure. To process a minitree, we compute the lowpoint values of each of the nodes in the minitree (except possibly the root) in overall O(m) time. During the processing of any minitree, if we determine that a vertex is a cut vertex, we store this information by marking the corresponding node in a seperate bit vector. Each minitree can be reconstructed in O(m lg lg n) time using Lemma 4. The lowpoint value of a node is a function of the lowpoints of all its children. However the root of a minitree may have children in other minitress. Hence for the root of the minitree, we store the partial lowpoint value (till that point) which will be used to update its value when all its subtrees have computed their lowpoint values (possibly in other minitrees). Computing the lowpoint values in each of the minitrees is done in a two step process. In the first step, we compute and store the low values of each node (which is the DFI value of the deepest back edge emanating from that node) belonging to the minitree using Corollary 2. Note that the low values form one component of the values among which we find the minimum, in the definition of lowpoint above, with a slight change. I.e., if a vertex v has a backedge, then low(v) is nothing but min{DFI(w) : (v, w) is a back edge}. However, if v does not have a backedge, by our convention low(v) has the DFI value of its parent which needs to be discounted in computing lowpoint value of v. This is easily done if we also remember the DFI value of the parent of every node in the minitree (using O(n) bits). Once these low(v) values are computed and stored for all the vertices v belonging to a minitree, they are passed on to the next step for computing lowpoint(v) values. More specifically, in the second step, we do another DFS starting at the root of this minitree and compute the lowpoint values for all the vertices v belonging to a minitree exactly in the same way as it is done in the classical Tarjan’s [66] algorithm using the explicitly stored low(v) values. We provide the code snippet which actually shows how to compute lowpoint values recursively for a minitree in Algorithm 2. Thus we obtain the following, 13 Lemma 5. Computing and storing the lowpoint(v) values for all the nodes v in a minitree can be performed in O(m lg lg n) time, using O(n) bits. Algorithm 2 DFS(v) 1: if low(v) = DFI(parent(v)) then 2: lowpoint(v) = DFI(v) 3: else lowpoint(v) = Min{DFI(v), low(v)} 4: for all y ∈ ad j(v) do 5: if y is white then 6: DFI(y) ← DFI(v) + 1 7: DFS(y) 8: if lowpoint(y) < lowpoint(v) then 9: lowpoint(v) = lowpoint(y) 10: end if 11: end if 12: end for To compute the effect of the roots of the minitrees on the lowpoint computation, we store various Θ(lg n) bit information with each of the Θ(lg n) minitree roots including their partial/full lowpoint values, the rank of its first/last child in its subtree. After we process one minitree, we generate the next minitree, in postorder, and process it in a similar fashion and continue until we exhaust all the minitrees. As we can store the cut vertices in a bitvector B of size n marking B[i] = 1 if and only if the vertex vi is a cut vertex, reporting them at the end of the execution of the algorithm is a routine task. Clearly we have taken O(n) bits of space and the total running time is O(m lg lg n lg n) as we run the DFS algorithm O(lg n) times overall. Thus we have the following Theorem 13. Given an undirected graph G with n vertices and m edges, in O(m lg n lg lg n) time and O(n) bits of space we can determine whether G is 2-vertex connected. If not, in the same amount of time and space, we can compute and report all the cut vertices of G. 5.3. Testing 2-edge connectivity and finding bridges The classical algorithm of Tarjan [67] to check if G is 2-edge connected takes O(m + n) time using O(n) words. Schmidt’s algorithm [64] which is based on chain decomposition can also be implemented in linear time but with O(m) words. The purpose of this section is to improve the space bound to O(n) bits, albeit with slightly increased running time. For this, we use the following folklore characterization: a tree edge (v, w), where v is the parent of w, is a bridge if and only if lowpoint[w] > DFI(v). That is to say, a tree edge (v, w) is a bridge if and only if the vertex w and any of its descedants in the DFS tree cannot reach to vertex v or any of its ancestors. Thus if the edge (v, w) is removed, the graph G becomes disconnected. Note that, since storing the lowpoint values requires Ω(n lg n) bits, we cannot store all of them at once to check the criteria mentioned in the characterization, and this poses the challenge of efficiently testing the condition for 2-edge connectivity with only O(n) bits. To perform this test in a space efficient manner, we extend ideas similar to the ones developed in the previous section. Similar to the biconnectivity algorithm, here also we first construct a TC representation of the DFS tree using the decomposition algorithm of Theorem 9 with L = n/ lg n. We then process each minitree, in the postorder of the minitrees in the minitree structure. To process a minitree, we compute the lowpoint values of each of the nodes in the minitree (except possibly the root) in overall O(m) time. While processing these minitrees, if we come across any bridge, we store it in a separate bitvector so that at the end of the execution of the algorithm we can report all of them. Using Lemma 4, we know that each minitree can be reconstructed in O(m lg lg n) time, and also we store for the root the partially computed lowpoint (till the point we are done processing minitrees). Now we compute the lowpoint values for each of the vertices belonging to a minitree using Lemma 5. Once we determine lowpoint values for all the vertices belonging to a minitree, we generate each minitree along with the node labels, and easily test whether any tree edge is a bridge using the characterization mentioned above. We also need to check this condition for edges that connect two minitrees; but this can also be done within the same time and space bounds. We store this information using a bit vector B of length n − 1 such that B[i] = 1 if and only if the i-th edge in pre-order, of the DFS tree, is a bridge. Thus, by running another DFS, we can report all the bridges of G. Clearly this procedure takes O(n) bits of space and the total running time is O(m lg lg n lg n) as we run the DFS algorithm O(lg n) times overall. Hence we obtain the following. 14 Theorem 14. Given an undirected graph G with n vertices and m edges, in O(m lg n lg lg n) time and O(n) bits of space we can determine whether G is 2-edge connected. If G is not 2-edge connected, then in the same amount of time and space, we can compute and output all the bridges of G. 5.4. st-numbering The st-ordering of vertices of an undirected graph is a fundamental tool for many graph algorithms, e.g., in planarity testing and graph drawing. The first linear-time algorithm for st-ordering the vertices of a biconnected graph is due to Even and Tarjan [38], and is further simplified by Ebert [31], Tarjan [68] and Brandes [11]. All these algorithms, however, preprocess the graph using depth-first search, essentially to compute lowpoints which in turn determine an (implicit) open ear decomposition. A second traversal is required to compute the actual stordering. All of these algorithms take O(n lg n) bits of space. We give an O(n) bits implementation of Tarjan’s [68] algorithm. We first describe the two pass classical algorithm of Tarjan without worrying about the space requirement. The algorithm assumes, without loss of generality, that there exists an edge between the vertices s and t, otherwise it adds the edge (s, t) before starting with the algorithm. Moreover, the algorithm starts a DFS from the vertex s and the edge (s, t) is the first edge traversed in the DFS of G. Let p(v) be the parent of vertex v in the DFS tree. DFI(v) and lowpoint(v) have the usual meaning as defined previously. The first pass is a depth first search during which for every vertex v, p(v), DFI(v) and lowpoint(v) are computed and stored. The second pass constructs a list L, which is initialized with [s, t], such that if the vertices are numbered in the order in which they occur in L, then we obtain an st-ordering. In addition, we also have a sign array of n bits, intialized with sign[s]=-. The second pass is a preorder traversal starting from the root s of the DFS tree and works as described in the following pseudocode (Algorithm 3) below. Algorithm 3 st-numbering 1: DFS(s) starts with the edge (s, t) 2: for all vertices v , s, t in preorder of DFS(s) do 3: if sign(lowpoint(v)) == + then 4: Insert v after p(v) in L 5: sign(p(v)) = − 6: end if 7: if sign(lowpoint(v))==- then 8: Insert v before p(v) in L 9: sign(p(v))=+ 10: end if 11: end for It is clear from the above pseudocode that the procedure runs in linear time using O(n lg n) bits of space for storing elements in L. To make it space effcient, we use ideas similar to our biconnectivity algorithm. At a high level, we generate the lowpoint values of the first n/ lg n vertices in depth first order and process them. Due to space restriction, we cannot store the list L as in Tarjan’s algorithm; instead we use the BP sequence of the DFS tree and augment it with some extra information to ‘encode’ the final st-ordering, as described below. As in some of our earlier algorithms, this algorithm also runs in O(lg n) phases and in each phase it processes n/ lg n vertices. In the first phase, to obtain the lowpoint values of the first n/ lg n vertices in depth first order, we run as in our biconnectivity algorithm a procedure to store explicitly for these vertices their lowpoint values in an array. Also during the execution of the biconnectivity algorithm, the BP sequence is generated and stored in the BP array. We create two more arrays, of size n bits, that have one to one correspondence with the open parentheses of the BP sequence. We can use rank/select operations (as defined Section 2.3) to map the position of a vertex in these two arrays to the corresponding open parenthesis in the BP sequence. The first array, called Sign, is for storing the sign for every vertex as in Tarjan’s algorithm. To simulate the effect of the list L, we create the second array, called P, where we store the relative position, i.e., “before” or “after”, of every vertex with respect to its parent. Namely, if u is the parent of v, and v comes before (after, respectively) u in the list L in Algorithm 3, then we store P[v] = b (P[v] = a, respectively). One crucial observation is that, even though the list L is dynamic, the relative position of the vertex v does not change with respect to the position of u, and is determined at the time of insertion of v into the list L (new vertices may be added between u and v later). In what follows, we show how to use the BP sequence, and the array P to emulate the effect of list L and produce the st-ordering. We first describe how to reconstruct the list L using the BP sequence and the P array. The main observation we use in the reconstruction of L is that a node v appears in L after all the nodes in its child subtrees whose roots are 15 marked with b in P, and also before all the nodes in its child subtrees whose roots are marked with a in P. Also, all the nodes in a subtree appear “together” (consecutively) in the list L. Moreover, all the children marked b appear in the increasing order of the DFI while all the children marked a appear in the decreasing order of the DFI. Thus by looking at the P[v] values of all the children of a node u, and computing their subtree sizes, we can determine the position in L of u among all the nodes in its subtree. Let us call a child v of u as after-child if v is marked a in P. Similarly, if v is marked b in P, it is called before-child. Let T (v) denote the subtree rooted at the vertex v in the DFS tree T of G and |T (v)| denotes the size of T (v). Let us also suppose that the vertex u has k + ` children, out of which k children v1 , · · · , vk are before-children and the remaining ` children w1 , · · · , w` are after-children, where DFI(v1 ) < DFI(v2 ) < · · · < DFI(vk ) and DFI(w1 ) < DFI(w2 ) < · · · < DFI(w` ). Then in L, all the vertices from T (v1 ), T (v2 ), followed by till T (vk ) appear, followed by u and finally the vertices from T (w` ), T (w`−1 ) till P T (w1 ) appear. More specifically, u appears at the (S + 1)-th location where S = ki=1 |T (vi )|. With this approach, we can reconstruct the list L, and hence output the st-numbers of all the nodes in linear time, if L can be stored in memory - which requires O(n lg n) bits. Now to perform this step with O(n) bits, we repeat the whole process of reconstruction lg n times, where in the i-th iteration, we reproduce sublist L[(i − 1)n/ lg n + 1, . . . , i.n/ lg n] – by ignoring any node that falls outside this range – and reporting all these nodes with st-numbers in the range [(i−1)n/ lg n+1, . . . , i.n/ lg n]. As each of these reconstruction takes O(m lg n lg lg n) time, we obtain the following, Theorem 15. Given an undirected biconnected graph G on n vertices and m edges, and two distinct vertices s and t, we can output an st-numbering of all the vertices of G in O(m lg2 n lg lg n) time, using O(n) bits of space. 5.5. Applications of st-numbering In this section, we show that using the space efficient implementation of Theorem 15 for st-numbering, we immediately obtain similar results for a few applications of st-numbering. We provide the details below. 5.5.1. Two-partitioning problem In this problem, given vertices a1 , · · · , ak of a graph G and natural numbers c1 , · · · , ck with c1 + · · · + ck = n, we want to find a partition of V into sets V1 , · · · , Vk with ai ∈ Vi and |Vi | = ci for every i such that every set Vi induces a connected graph in G. This problem is called the k-partitioning problem. The problem is NP-hard even when k = 2, G is bipartite and the condition ai ∈ Vi is relaxed [30]. But, Györi [48] and Lovasz [55] proved that such a partition always exists if the input graph is k-connected and can be found in polynomial time in such graphs. Let G be 2-connected. Then two-partitioning problem can be solved in the following manner [65]: Let v1 := a1 and vn := a2 , compute an v1 vn -numbering v1 , v2 , · · · , vn and note that, from the property of st-numbering, for any vertex vi (in particular for i = c1 ) the graphs induced by v1 , · · · , vi and by vi , · · · , vn are always connected subgraph of G. Thus applying Theorem 15, we obtain the following: Theorem 16. Given an undirected biconnected graph G, two distinct vertices a1 , a2 , and two natural numbers c1 , c2 such that c1 + c2 = n, we can obtain a partition (V1 , V2 ) of the vertex set V of G in O(m lg2 n lg lg n) time, using O(n) bits of space, such that a1 ∈ V1 and a2 ∈ V2 , |V1 | = c1 , |V2 | = c2 , and both V1 and V2 induce connected subgraph on G. 5.5.2. Vertex-subset-two-partition problem Wada and Kawaguchi [70] defined the following problem which they call the vertex-subset-k-partition problem. This is actually an extension of the k-partition problem defined in Section 5.5.1. The problem is defined as follows: Input: 1. 2. 3. 4. An undirected graph G = (V, E) with n vertices and m edges; a vertex subset V 0 (⊆ V) with n0 = |V 0 | ≥ k; k distinct vertices ai (1 ≤ i ≤ k) ∈ V 0 , ai , a j (1 ≤ i < j ≤ k); and P k natural numbers n1 , n2 , · · · , nk such that ki=1 ni = n0 . Output: a partition V1 ∪ V2 ∪ · · · ∪ Vk of the vertex set V and a partition V10 ∪ V20 ∪ · · · ∪ Vk0 of vertex set V 0 such that for each i(1 ≤ i ≤ k) 1. 2. 3. 4. ai ∈ Vi0 ; |Vi0 | = ni ; Vi0 ⊆ Vi and each Vi induces a connected subgraph of G. 16 Note that this problem is an extension of the k-partition problem, since choosing V 0 = V corresponds to the original k-partition problem. Wada and Kawaguchi [70] proved that vertex-subset-k-partition problem always admits a solution if the input graph G is k-connected (for k ≥ 2). In particular, if G is 2-connected, using stordering, the vertex-subset-two-partitioning problem can be solved in the following manner [70]: suppose that G, V 0 (⊆ V), a1 , a2 , n1 and n2 (n1 + n2 = n0 = |V 0 |) are the inputs. Let s = v1 := a1 and t = vn := a2 , compute an st-numbering v1 , v2 , · · · , vn . From this st-numbering, note that, V now can be partitioned in two sets V1 and V2 such that |V1 ∩ V 0 | = n1 and |V2 ∩ V 0 | = n2 . From the property of st-numbering, we know that both V1 and V2 induce a connected subgraph of G. Moreover, a1 ∈ V1 and a2 ∈ V2 . Using Theorem 15 as a subroutine to compute such an st-numbering of G, we obtain the following result. Theorem 17. Given an undirected biconnected graph G, we can solve the vertex-subset-two-partitioning problem in O(m lg2 n lg lg n) time, using O(n) bits of space. 5.5.3. Two independent spanning trees Recall that k spanning trees of a graph G are independent if they all have the same root vertex r, and for every vertex v , r, the paths from v to r in the k spanning trees are vertex-disjoint (except for their endpoints). Itai and Rodeh [52] conjectured that every k-connected graph contains k independent spanning trees. Even though the most general version of this conjecture has not been proved yet, this conjecture is shown to be true for k ≤ 4 [22, 26, 52, 71], and also for planar graphs [51]. In particular, if the given graph G is biconnected, we can generate two independent spanning trees (let us call them S and T ) in the following manner [52]. Choose an arbitrary edge, say (s, t) in G. Let f be an st-numbering of G. To construct S , choose for every vertex v , s an edge (u, v) such that f (u) < f (v), and for t choose an edge other than (s, t). To construct T , choose the edge (s, t) and for every vertex v < {s, t} an edge (v, w), f (v) < f (w) . It is easy to prove that s is the root of both S and T , and that S and T are independent spanning trees as, for every vertex v, the path from the root s to v in S consists of vertices u with f (u) < f (v) but except the edge (s, t), whereas in T , along with the edge (s, t), it consists of vertices w with f (v) < f (w). Using Theorem 15 to compute such an st-numbering of G, it is not hard to produce S and T . Thus we obtain the following, Theorem 18. Given an undirected biconnected graph G, we can report two independent spanning trees S and T in O(m lg2 n lg lg n) time, using O(n) bits. 6. Concluding remarks and open problems We have presented space efficient algorithms for a number of important applications of DFS. Obtaining linear time algorithms for them while maintaining O(n) bits of space usage is both interesting and challenging open problem. One of the main bottlenecks (with this approach) towards this is finding an O(n)-bit, O(m + n)-time algorithm for DFS, which is also open, even though for BFS we know such implementations [5, 37]. Another challenging open problem is to remove the poly-log terms in the running times of the algorithms described (e.g., the lg n term in the running time of 2-vertex and 2-edge connectivity algorithm, and the lg2 n term in the running time of two independent spanning trees algorithm). These terms seem inherent in our tree covering approach. It would be interesting to find other applications of our tree covering approach for space efficient algorithms. There are also plenty of other applications of DFS, it would be interesting to study them from the point of view of space efficiency. For example, planarity is one prime example where DFS has been used very crucially. So it is a natural question that, can we test planarity of a given graph using O(n) bits? References References [1] S. Arora and B. Barak. Computational Complexity - A Modern Approach. Cambridge University Press, 2009. [2] T. Asano, K. Buchin, M. Buchin, M.Korman, W. Mulzer, G. Rote, and A. Schulz. Reprint of: Memory-constrained algorithms for simple polygons. Comput. Geom., 47(3):469–479, 2014. [3] T. Asano, T. Izumi, M. Kiyomi, M. Konagaya, H. Ono, Y. Otachi, P. Schweitzer, J. Tarui, and R. Uehara. Depth-first search using O(n) bits. In 25th ISAAC, pages 553–564, 2014. √ [4] T. Asano, D. G. Kirkpatrick, K. Nakagawa, and O. Watanabe. Õ( n)-space and polynomial-time algorithm for planar directed graph reachability. In 39th MFCS LNCS 8634, pages 45–56, 2014. [5] N. Banerjee, S. Chakraborty, and V. Raman. Improved space efficient algorithms for BFS, DFS and applications. In 22nd COCOON, volume 9797, pages 119–130. Springer, LNCS, 2016. [6] N. Banerjee, S. Chakraborty, V. Raman, S. Roy, and S. Saurabh. Time-space tradeoffs for dynamic programming in trees and bounded treewidth graphs. In 21st COCOON, volume 9198, pages 349–360. springer, LNCS, 2015. 17 [7] L. Barba, M. Korman, S. Langerman, K. Sadakane, and R. I. Silveira. Space-time trade-offs for stack-based algorithms. Algorithmica, 72(4):1097–1129, 2015. [8] L. Barba, M. Korman, S. Langerman, and R. I. Silveira. Computing a visibility polygon using few variables. Comput. Geom., 47(9):918– 926, 2014. [9] G. Barnes, J. Buss, W. Ruzzo, and B. Schieber. A sublinear space, polynomial time algorithm for directed s-t connectivity. SIAM J. Comput., 27(5):1273–1282, 1998. [10] P. Beame. A General Sequential Time-Space Tradeoff for Finding Unique Elements. SIAM J. Comput., 20(2):270-277, 1991. [11] U. Brandes. Eager st-ordering. In 10th ESA, pages 247–256, 2002. [12] H. Brönnimann and T. M. Chan. Space-efficient algorithms for computing the convex hull of a simple polygonal line in linear time. Comput. Geom., 34(2):75–82, 2006. [13] H. Buhrman, R. Cleve, M. Koucký, B. Loff, and F. Speelman. Computing with a full memory: catalytic space. In Symposium on Theory of Computing, STOC 2014, New York, NY, USA, May 31 - June 03, 2014, pages 857–866, 2014. [14] D. Chakraborty, A. Pavan, R. Tewari, N. V. Vinodchandran, and L. Yang. New time-space upperbounds for directed reachability in high-genus and h-minor-free graphs. In FSTTCS, pages 585–595, 2014. [15] H. Lu and C. Yeh. Balanced parentheses strike back. ACM Trans. Algorithms, 4(3):28:1–28:13, July 2008. [16] S. Chakraborty, S. Jo, and S. R. Satti. Improved space-efficient linear time algorithms for some classical graph problems. In 15th CTW, 2017. [17] S. Chakraborty, V. Raman, and S. R. Satti. Biconnectivity, chain decomposition and st-numbering using O(n) bits. In 27th ISAAC, volume 64 of LIPIcs, pages 22:1–22:13. Schloss Dagstuhl - Leibniz-Zentrum fuer Informatik, 2016. [18] S. Chakraborty and S. R. Satti. Space-efficient algorithms for maximum cardinality search, stack BFS, queue BFS and applications. In 23rd COCOON, 2017. [19] S. Chakraborty, V. Raman, and S. R. Satti. Biconnectivity, chain decomposition and st-numbering using O(n) bits. In 27th ISAAC, volume 64 of LIPIcs, pages 22:1–22:13. Schloss Dagstuhl - Leibniz-Zentrum fuer Informatik, 2016. [20] T. M. Chan, J. I. Munro, and V. Raman. Selection and sorting in the ”restore” model. In 25th-SODA, pages 995–1004, 2014. [21] J. Cheriyan, M. Kao, and R. Thurimella. Scan-first search and sparse certificates: An improved parallel algorithms for k-vertex connectivity. SIAM J. Comput., 22(1):157–174, 1993. [22] J. Cheriyan and S. N. Maheshwari. Finding nonseparating induced cycles and independent spanning trees in 3-connected graphs. J. Algorithms, 9(4):507–537, 1988. [23] D. R. Clark. Compact Pat Trees. PhD thesis. University of Waterloo, Canada, 1996. [24] S. A. Cook and C. Rackoff. Space lower bounds for maze threadability on restricted machines. SIAM J. Comput., 9(3):636–652, 1980. [25] T. H. Cormen, C. E. Leiserson, R. L. Rivest, and C. Stein. Introduction to Algorithms (3. ed.). MIT Press, 2009. [26] S. Curran, O. Lee, and X. Yu. Finding four independent trees. SIAM J. Comput., 35(5):1023–1058, 2006. [27] O. Darwish and A. Elmasry. Optimal time-space tradeoff for the 2d convex-hull problem. In 22th ESA, pages 284–295, 2014. [28] S. Dasgupta, C. H. Papadimitriou, and U. V. Vazirani. Algorithms. McGraw-Hill, 2008. [29] S. Datta, N. Limaye, P. Nimbhorkar, T. Thierauf, and F. Wagner. Planar graph isomorphism is in log-space. In 24th CCC, pages 203–214, 2009. [30] M.E. Dyer and A.M. Frieze. On the complexity of partitioning graphs into connected subgraphs. Discrete Applied Mathematics, 10(2):139–153, 1985. [31] J. Ebert. st-ordering the vertices of biconnected graphs. Computing, 30(1):19–33, 1983. [32] J. Edmonds, C. K. Poon, and D. Achlioptas. Tight lower bounds for st-connectivity on the NNJAG model. SIAM J. Comput., 28(6):2257– 2284, 1999. [33] M. Elberfeld, A. Jakoby, and T. Tantau. Logspace versions of the theorems of bodlaender and courcelle. In 51th FOCS, pages 143–152, 2010. [34] M. Elberfeld and K. Kawarabayashi. Embedding and canonizing graphs of bounded genus in logspace. In Symposium on Theory of Computing, STOC 2014, New York, NY, USA, May 31 - June 03, 2014, pages 383–392, 2014. [35] M. Elberfeld and P. Schweitzer. Canonizing graphs of bounded tree width in logspace. In 33rd Symposium on Theoretical Aspects of Computer Science, STACS 2016, February 17-20, 2016, Orléans, France, pages 32:1–32:14, 2016. [36] A. Elmasry. Why depth-first search efficiently identifies two and three-connected graphs. In 21st ISAAC, pages 375–386, 2010. [37] A. Elmasry, T. Hagerup, and F. Kammer. Space-efficient basic graph algorithms. In 32nd STACS, pages 288–301, 2015. [38] S. Even and R. E. Tarjan. Computing an st-numbering. Theo. Comp. Sci., 2(3):339–344, 1976. [39] S. Even and R. E. Tarjan. Corrigendum: Computing an st-numbering. TCS 2(1976):339-344. Theor. Comput. Sci., 4(1):123, 1977. [40] A. Farzan and J. Ian Munro. Succinct representation of dynamic trees. Theor. Comput. Sci., 412(24):2668–2678, 2011. [41] A. Farzan, R. Raman, and S. S. Rao. Universal succinct representations of trees? In 36th ICALP, pages 451–462, 2009. [42] J. Feigenbaum, S. Kannan, A. McGregor, S. Suri, and J. Zhang. On graph problems in a semi-streaming model. Theor. Comput. Sci., 348(2-3):207–216, 2005. [43] G. N. Frederickson. Upper bounds for time-space trade-offs in sorting and selection. J. Comput. Syst. Sci., 34(1):19–26, 1987. [44] H. N. Gabow. Path-based depth-first search for strong and biconnected components. Inf. Process. Lett., 74(3-4):107–114, 2000. [45] M. R. Garey and D. S. Johnson. Computers and Intractability: A Guide to the Theory of NP-Completeness. W. H. Freeman, 1979. [46] R. F. Geary, N. Rahman, R. Raman, and V. Raman. A simple optimal representation for balanced parentheses. Theor. Comput. Sci., 368(3):231–246, 2006. [47] R. F. Geary, R. Raman, and V. Raman. Succinct ordinal trees with level-ancestor queries. ACM Trans. Algorithms, 2(4):510–534, 2006. [48] E. Győri. Partition conditions and vertex-connectivity of graphs. Combinatorica, 1(3):263–273, 1981. [49] T. Hagerup and F. Kammer. Succinct choice dictionaries. CoRR, abs/1604.06058, 2016. [50] M. He, J. I. Munro, and S. R. Satti. Succinct ordinal trees based on tree covering. ACM Trans. Algorithms, 8(4):42:1–42:32, 2012. [51] A. Huck. Independent trees in planar graphs. Graphs and Combinatorics, 15(1):29–77, 1999. [52] A. Itai and M. Rodeh. The multi-tree approach to reliability in distributed networks. Inf. Comput., 79(1):43–59, 1988. [53] F. Kammer, D. Kratsch, and M. Laudahn. Space-efficient biconnected components and recognition of outerplanar graphs. In 41st MFCS, 2016. [54] M. Koucký. Catalytic computation. Bulletin of the EATCS, 118, 2016. [55] L. Lovasz. A homology theory for spanning tress of a graph. Acta Mathematica Hungarica, 30(3-4):241–251, 1977. [56] J. I. Munro. Tables. In FSTTCS, pages 37–42, 1996. [57] J. I. Munro and M. Paterson. Selection and sorting with limited storage. Theor. Comput. Sci., 12:315–323, 1980. 18 [58] J. I. Munro and V. Raman. Selection from Read-Only Memory and Sorting with Minimum Data Movement. Theor. Comput. Sci., 165(2):311–323, 1996. [59] J. I. Munro and V. Raman. Succinct representation of balanced parentheses and static trees. SIAM J. Comput., 31(3):762–776, 2001. [60] J. I. Munro, V. Raman, and S. S. Rao. Space efficient suffix trees. J. Algorithms, 39(2):205–222, 2001. [61] H. Nagamochi and T. Ibaraki. A linear-time algorithm for finding a sparse k-connected spanning subgraph of a k-connected graph. Algorithmica, 7(5&6):583–596, 1992. [62] O. Reingold. Undirected connectivity in log-space. J. ACM, 55(4), 2008. [63] J. M. Schmidt. Structure and constructions of 3-connected graphs. PhD thesis, Free University of Berlin, 2010. [64] J. M. Schmidt. A simple test on 2-vertex- and 2-edge-connectivity. Inf. Process. Lett., 113(7):241–244, 2013. [65] J. M. Schmidt. The mondshein sequence. In 41st ICALP, pages 967–978, 2014. [66] R. E. Tarjan. Depth-first search and linear graph algorithms. SIAM J. Comput., 1(2):146–160, 1972. [67] R. E. Tarjan. A note on finding the bridges of a graph. Inf. Process. Lett., 2(6):160–161, 1974. [68] R. E. Tarjan. Two streamlined depth-first search algorithms. Fund. Inf., 9:85–94, 1986. [69] M. Tompa. Two familiar transitive closure algorithms which admit no polynomial time, sublinear space implementations. SIAM J. Comput., 11(1):130–137, 1982. [70] K. Wada and K. Kawaguchi. Efficient algorithms for tripartitioning triconnected graphs and 3-edge-connected graphs. In 19th WG, pages 132–143, 1993. [71] A. Zehavi and A. Itai. Three tree-paths. Journal of Graph Theory, 13(2):175–188, 1989. 19
8cs.DS
Let’s Dance: Learning From Online Dance Videos Daniel Castro Georgia Institute of Technology Steven Hickson Patsorn Sangkloy [email protected] patsorn [email protected] arXiv:1801.07388v1 [cs.CV] 23 Jan 2018 [email protected] Bhavishya Mittal Sean Dai James Hays Irfan Essa [email protected] [email protected] [email protected] [email protected] Abstract In recent years, deep neural network approaches have naturally extended to the video domain, in their simplest case by aggregating per-frame classifications as a baseline for action recognition. A majority of the work in this area extends from the imaging domain, leading to visual-feature heavy approaches on temporal data. To address this issue we introduce “Let’s Dance”, a 1000 video dataset (and growing) comprised of 10 visually overlapping dance categories that require motion for their classification. We stress the important of human motion as a key distinguisher in our work given that, as we show in this work, visual information is not sufficient to classify motion-heavy categories. We compare our datasets’ performance using imaging techniques with UCF-101 and demonstrate this inherent difficulty. We present a comparison of numerous state-of-theart techniques on our dataset using three different representations (video, optical flow and multi-person pose data) in order to analyze these approaches. We discuss the motion parameterization of each of them and their value in learning to categorize online dance videos. Lastly, we release this dataset (and its three representations) for the research community to use. Figure 1. Each row contains frames from the class it represents. This figure is best viewed digitally. be applied to extended/long sequences and datasets lacking in such highly dynamic videos. Our goal is to determine which methods best represent motion as opposed to methods that use a single (properly picked) frame [6] to identify the activity, as we feel such approaches devalue the necessity for video data. In this work we introduce a 1,000 video dataset and evaluate methods that focuses on highly dynamic videos requiring motion analysis for classification. We choose the domain of dance videos as (a) there is large amount of dance videos available online and (b) the diversity of dynamics in these videos provides us with a challenging space of problems for highly dynamic video analysis. This enables us to conduct a focused study on the relevance of motion in dancing classification and the broader value of motion in improving video classification. The core challenge of this task is attaining an adequate representation of human motion across a 10-second clip. In order to highlight the trajectory of this work, we will evaluate the current approaches and demonstrate the value of isolating motion for properly evaluating these approaches and this dataset. 1. Introduction Video is a rich medium with dynamic information that can be used to determine, what is happening in a scene. In this work, we consider highly dynamic video, video that requires the parametrization of motion over extended sequences to identify the activity being performed. The main challenge with highly dynamic video is that a single frame cannot provide sufficient information to understand the action being performed. Therefore, multiple frames, leading to an extended sequence of frames, need to be analyzed for scene classification. One of the drawbacks of current action classification research is both a lack of approaches that can 1 Many video classification techniques exist, either utilizing single frames, late fusion architectures, temporal (3D) convolutional networks, or recurrent networks with long short-term memory (LSTM). Current classification problems can often be identified by a single frame. We present a more challenging problem wherein each class requires the use of multiple frames to adequately classify each category. Specifically, we propose the use of optical flow and multi-agent pose estimation as motion representations which augment traditional video classification approaches. Comparing these approaches enables us to gain insights into the inherent encoding of motion in neural networks that is difficult to understand. Our main contributions are: (1) An analysis of baseline and state-of-the-art approaches in video classification, (2) a general method for concurrently learning from multiple motion parameterizations in video, and (3) A 1000 video dataset of highly dynamic dance videos, contrasted with existing video datasets, to motivate further investigation and understanding of motion parameterization in video classification. rating temporal data with each video frame by extending the convolution kernels from size m x m x 3 to m x m x 3 x T , where T represents a temporal extent[11]. They also point out one of the major challenges of using deep learning for video classification – there are no large-scale video datasets comparable to the quality and size of image recognition datasets. Similarly, 3D convolutional kernels that incorporate the spatial domain have been shown to be successful for action classification in both security camera and depth data recordings [9, 27]. Wang et al. use a similar two-stream late fusion approach [28], but they note that without incorporating the learned features into an ensemble method with handcrafted features, these deep-learned approaches still fail to outperform handcrafted approaches. We combine these methods in our work by incorporating preprocessed features (optical flow and multi-agent pose detection) with 3D convolutional kernels in order to integrate the representation of motion into the network architecture. Another common approach is to leverage the sequential nature of a Long Short-Term Memory (LSTM) network– a specific type of recurrent neural network with additional gates to control the flow of information. LSTMs can process information over long term temporal sequences and have been applied in video for various tasks such as caption generation [26] and learning video representations [23]. Similarly, the long-term recurrent convolutional networks (LRCNs) proposed by Donahue et. al. introduce another variation of an LSTM for this task. Despite their temporal nature, these approaches have been less successful at encoding motion in comparison to two-stream networks [4] which encode the spatial and temporal domain in concurrent architectures. The most effective method for classifying motion in video is still unclear. In the context of action recognition, many of these approaches are learning features based on the image’s context and not the inherent action. This is in part because commonly used video datasets such as UCF-Sports and more traditionally UCF-101 can generally be identified to moderately decent accuracy using single-frame approaches which do not encode motion parameters[11]. A specific method for encoding motion that has recently gained traction in action recognition is the use of pose detection over the temporal domain with neural networks [3][14][24][30]. Detecting pose over this domain provides us with the intrinsic motion of the subjects in the scene. As highlighted earlier, an initial breakthrough was achieved by Toshev et. al. [24] with state-of-the-art results in estimating the pose of a single individual from an image. The importance of pose was further demonstrated in [3], incorporating pose features from a CNN into action recognition. This work was extended over the next two years to attain jointspecific networks that work well with partial and occluded poses [30]. It was then most recently implemented to detect 2. Related Work In order to determine which competing state-of-the-art approaches to examine, we first present a literature review on video classification. While deep networks have been shown to be very effective at classifying, localizing, and segmenting images, it is still unclear how to properly extend these methods to the video domain. There are a few common approaches, some of which are: (1) Applying proven image classification deep network architectures to individual frames of a video; (2) Extending 2D convolutional operators to 3D convolutions acting on the time domain; and (3) Preprocessing the video into images that encode motion, such as optical flow, and running current image architectures on the processed frames. A simple way to extend image-based neural networks to video classification is to extract features from each individual frame of a video [31]. While this technique does lead to some success if the network learns temporallyinvariant features, it is commonly only used as a baseline approach to compare against networks that incorporate temporal data [9, 11]. One common variant is a two-stream late fusion architecture with a still frame-based “spatial” network stream running in parallel alongside a “temporal” network performing classifications based on optical flow calculations [3, 6, 8, 20]. This network architecture significantly outperforms approaches based solely on individual frame classification, suggesting that incorporating a temporal component is necessary. In our work we leverage the benefit of a temporal network by incorporating it into the design of our network architecture. Karpathy et al. explore more direct methods of incorpo2 2.1.3 Atomic Visual Actions (AVA) The AVA dataset [15] contains 80 atomic visual actions in 57,400 movie clips which are localized within the frame. This work goes beyond simply understanding a simple action in a video clip to understanding the interaction, both between humans and with humans and objects. Although this is somewhat less relevant to our work, it demonstrates the need for understanding motion features in human interaction – specifically by localizing the action and its relevance in a scene that may contain multiple subjects / objects. Figure 2. Each of these examples represents a different class in our dataset (they are types of ballroom dancing). Top Left: Waltz, Top Right: Quickstep, Bottom Left: Foxtrot, Bottom Right: Tango. 3. Let’s Dance Dataset Our main challenge in this work was determining a reliable way of testing how well a specific method can parameterize motion. We realized that available video datasets such as UCF-101 [22] and UCF-Sports [18] tackled a known classification problem, one that could be evaluated using extensions of available image classification architectures. With that in mind, we developed a new dataset that prioritizes motion as the key characteristic of the classification. We assembled a 1,000 video dataset containing 10 dynamic and visually overlapping dances. We chose the parent category of dancing because it has a variety of measurable features (i.e. rhythm, limb movement), and it is not represented in the Sports-1M and UCF-101 datasets [11, 22]. The categories included for this dataset are: multiple people within a single frame [2]. In our work we will leverage our own implementation of multi-agent pose detection to demonstrate the need for motion parameterization when classifying highly dynamic video. 2.1. Existing Datasets There are a handful of relevant datasets that exist in the research domain. We highlight some of the more relevant video datasets that are appropriate to our work. All of these datasets demonstrate the growing need for understanding what type of motion features are relevant in classifying highly dynamic actions, which we explore in this work. 2.1.1 • Ballet • Flamenco • Latin • Square • Tango UCF-101 The UCF-101 dataset [22] contains approximately 13,000 clips and 101 action classes, totaling 27 hours of data. The clip length varies largely from 1 second to 71 seconds depending on the activity at a resolution of 320x240. This was one of the first datasets to tackle human actions in video. However, as we will demonstrate in this work, most perframe (image-based) approaches still perform moderately well on the dataset, illustrating the main question which we seek to answer in this work – that being the representation of motion as a classification feature. 2.1.2 • Break Dancing • Foxtrot • Quickstep • Swing • Waltz The dataset contains 100 videos for each class. Each video is 10-seconds long at 30 frames per second. The videos themselves were taken from YouTube at a quality of 720p, and includes both dancing performances and plainclothes practicing. Examples of each class can be seen in Figure 1. We highlight that the dataset contains four different types of ballroom dancing (quickstep, foxtrot, waltz, and tango) as seen in Figure 2. The motivation behind picking these dances is that their parent category is specifically the setting in which the dance occurs (a ballroom). This satisfies our main challenge of selecting classes that exemplify highly dynamic video. On this note, we extract two different motion representations from our input data for use by the community; optical flow[5] and multi-person pose detection. When attempting to detect pose, we found numerous methods that focused on single-person pose detection. We adapted these methods to multiple individuals (given that dancing is generally a group activity, see Figure 3) through Kinetics The Kinetics dataset [12] contains 300,000 clips and 400 action classes, with a minimum of 400 videos per class. The action classes are also loosely grouped in 32 parent classes which further break down the dataset. This dataset was collected semi-automatically with curation through image classifiers and use of Amazon Mechanical Turk to determine the action classes and if the video snippet was appropriate to that class. 3 4.1. Frame-by-Frame Using the architecture of a state-of-the-art convolutional neural network for image classification, such as VGG [21], a classification for the video can be achieved based on key image frames from a video. A sample architecture based on CaffeNet, a variation of AlexNet [13], is shown in Figure 4. This approach does not explicitly encode motion in determining the video’s classification but rather categorizes each frame and naively selects the majority label. We do note that although there are numerous approaches for aggregating a single class from multiple per-frame classifications, the network itself does not encode the temporal domain. 4.2. Two-Stream Late Fusion A common way of adding a temporal component to deep networks is by separately performing a classification based on spatial data (a single frame) and temporal data (i.e. optical flow). Merging these results produces an overall classification for the video, as shown in Figure 5. This approach computes optical flow from two frames (at time n and n − k where k is not necessarily 1) over the period of the entire video. Each frame in this case can be considered a single instance of motion that occurred in the video. For dancing we envision this as a specific move in a dance. Figure 3. Distribution of number of people per frame using [17]. 75% of frames had at least two people detected in the dataset. 56% of the dataset has more than two people in the shot, which further illustrates the added complexity of this task. the use of a recent real-time person detector[17]. Similar approaches can be seen in [7][16][2]. After detecting the bounding boxes for each person in the scene we computed the pose for each individual using [30]. Positive and negative examples of this methodology can be seen in Figure 7. 4. Baseline Methods Figure 5. Two-Stream Late Fusion Architecture (color key in 4). This method incorporates motion (optical flow) into a traditional CNN pipeline. In order to better understand the need for motion parametrization in video, we have identified two commonly-used architectures to establish as our baseline. These are architectures which are commonly applied to video architectures but only take a single-frame as input (per architecture). 5. Proposed Approaches In order to address the challenge of categorizing highly dynamic videos we implement a number of methods which explicitly encode motion. At the core of these approaches is the notion of 3-dimensional kernels which process a series of video frames for classification. This enables us to pass in very short video clips (16 frames or approx. 1/2 second) for the network to learn. The overall objective was to incorporate motion in the learning pipeline of standard approaches and assess their performance. After testing these approaches it was evident that combining numerous motion parameterizations in a concurrent deep network architecture would best represent the input video. These approaches are extensions of very successful image classification techniques. 5.1. Temporal 3D CNN (RGB) Figure 4. Frame-by-Frame Architecture: This is a traditional CNN, commonly used in image recognition. As stated, traditional convolutional neural networks can be extended to video by using 3-dimensional kernels that 4 frames that are convolved in the temporal domain. 5.3. Three-Stream CNNs We tested both single-frame and temporal approaches for a three-steam convolutional network in order to directly compare the potential importance of embedding multiple frames into the learning pipeline in addition to providing multiple representations of your original input. We highlight that these temporal convolutions are computing 2D convolutions over each of the input frames. Although this increases the complexity of our model it still remains significantly more tractable than computing 3D convolutions which require approximately twice the computational power. Figure 6. This pipeline displays a skeletal temporal CNN (3D Convolution) which processes the initial frames to obtain a multi person pose estimation from the input frames obtained by performing a bounding box person detection from [17] which is then processed by [30] for detecting the dancers’ pose. 5.3.1 Frame-by-Frame Architecture For the frame-by-frame architecture, the first stack of our network processes the spatial representation of our input which is our RGB image. Our second stack processes the optical flow representation which was computed from frames n and n − 10 in order to accentuate particular motions from a given dance. Our third stack processes our multi-person pose visualization explained in Figure 6. As discussed earlier, this stack is essentially encoding the number of participants detected for a given dance frame and their current pose. Figure 7. Demonstration of outputs from our pose detection pipeline. Top: Latin dancing positively classified. Bottom: Break dancing being erroneously classified. The dancers’ left leg is accurate but his remaining limbs fail. 5.3.2 Temporal Architecture convolve in the temporal domain. We focus on testing this slow-fusion approach discussed in [9], which embeds the high-level spatial and temporal information at the initial convolutional layers by propagating the information through the network. One of the main setbacks of this proposed approach is the computational time it currently takes to compute these methodologies. We discuss this further in Section 7. The temporal architecture utilizes the same three stacks but processes chunks of 16 frames at a time in order to incorporate a temporal component into the loss of the network. This enables us to learn motion parameters from the spatial, optical flow and multi-person pose representations. A visualization of our pipeline can be seen in Figure 8 whose convolutional and fully connected layers are based on the standard AlexNet architecture[13]. 5.2. Temporal 3D CNN (Skeletal) 6. Baseline Experiments In this pipeline we compute a temporal CNN on multiperson pose information. We visualize the pipeline in Figure 6. This architecture demonstrates the importance of leveraging context for particular videos. Dance videos inherently benefit from this representation given that there are generally multiple people in the scene. Through the use of a visualization of pose we are able to attain comparable results to single-frame CNN approaches. It is key to note that this method does not use visual information from the original frame but solely visualized pose information as shown in Figure 7. Similar to our optical flow approach, it is likely that this method benefits heavily from encoding the number of people in the frame in addition to the motion over the 16 We implement our proposed approaches with the goal of determining which approach is most effective at highly dynamic video classification. Implementation details for each approach are given below. 6.1. Dataset Splits We extract individual frames from the Let’s Dance dataset (1000 10-second videos at 30fps, resulting in 300000 frames), which we then randomly split per video into 80% training, 10% testing and 10% validation (consistent across experiments). Optical flow and pose detection was split in the same manner in order to consistently test the approaches. 5 Figure 8. This visualizes the workflow for our three-stream temporal CNN which uses three convolutional stacks to process the spatial and respective motion components. It aggregates the fc7 layers into one and outputs the dance classification for a 16 frame input. 6.2. Frame-by-Frame that it is merely embedding the motion between two frames. We will later demonstrate that larger frame chunks provide significant improvements to this approach. To perform a baseline video classification experiment, we implemented the architecture shown in Figure 4 in Tensorflow[1]. The weights for the network’s convolutional layers are initialized to values from a network pre-trained on the ILSVRC 2012 dataset [19]. Final video classification results can be determined by classifying each frame in a video and voting to determine the video’s overall class. For an initial comparison, we also tested the network with optical flow imagery as the input. Overall, we observed significant amounts of overfitting in the original training accuracy which hints at the network learning too much about the appearance of the specific videos in the training set for each class. As we hypothesized, using image frames alone results in the network learning features that do not generalize well to the dancing categories, since it has no way to observe the motion inherent in the video. Testing accuracy peaks at 56.4% over 10,000 iterations of fine-tuning the network. We compare these results to a similar framework introduced by [29] which tested the frame-by-frame baseline on UCF-101, attaining an accuracy of 72.8%. This directly demonstrates the possibility of solving the classification problem by carefully selecting the right frame versus understanding the underlying motion of the video. We also ran the identical setup using optical flow estimation. Before training we pre-compute optical flow for the entire dataset. We used Farneback’s method for calculating dense optical flow [5] to obtain a per-pixel estimate of the horizontal and vertical components of motion and then incorporate this into the same network architecture. In this case we saw slightly worse performance at approximately 45% for testing. We do note that the overfitting for optical flow images is subdued given that the per-frame images no longer contain background information. Given that a number of our dances occurred in similar or identical settings, background information was a strong confounding factor for the original images. The overall result for optical flow performs worse than training on RGB images given 6.3. Two-Stream Late Fusion We implemented the two-stream late fusion architecture shown in Figure 5 in Caffe[10]. The two-stream approach follows intuitively from the previous subsection in which we discuss the effects of both a frame-by-frame method on images and on optical flow. Each individual stream uses the CaffeNet architecture, with weights initialized to a network pre-trained on the ILSVRC 2012 dataset [19]. We then finetune the network by training only the fully-connected layers at the end of each stream, which are then concatenated and passed through a final fully-connected layer which outputs the respective classifications. We note that each architecture in the two-stream method is still using a single frame as input, and as such the network is trained on a frame-by-frame basis. We chose to use the CaffeNet architecture for each frame, initialized with the ILSVRC 2012 weights, to be consistent with the baseline frame-by-frame experiment described in the previous section. This allows us to perform a direct comparison between the two-stream and frame-by-frame approaches, to determine the benefit of optical flow on this dataset. As with the frame-by-frame approach, final video classifications can be determined by classifying each individual frame and optical flow image pair, followed by voting to determine an overall class. It is interesting to note that the total per video classification accuracy of this method was 68.89% which is much higher than the single frame-by-frame accuracy of 56.40%. Although one may be compelled to argue that single-frame motion is key to this classification, we refer back to Figure 3. This figure demonstrates that the frames throughout the dataset also contain a tremendously varied number of participants. As we can further see in Figure 9, optical flow tends to visually separate the dancers from the background, which also explains the significant increase in the algorithm’s performance. In addition to the motion in a single frame pair, 6 two-stream comparison is comparing a two-stream accuracy for UCF-101 that utilizes an SVM to combine its streams whereas we concatenate the final layers of both convolutional streams into the fully connected output. As stated earlier, this illustrates the core issue we encountered in looking for a highly dynamic dataset which further validates our motivation to introduce the “Lets Dance” dataset to the research community. Figure 9. An image of dancers performing ballet and their optical flow estimation. As we can see, optical flow does a good job of segmenting the subjects in the scene in addition to encoding their motion. 7. Results & Discussion In order to assess our temporal architectures we compare with a number of state-of-the-art approaches that explicitly encode motion in order to determine their performance. Overall it has become clear to us that we need to transition from traditional per-frame CNN approaches when conducting video classification. It is evident from Table 2 that methods which embed motion significantly outperform traditional methods and that metrics to evaluate these approaches are necessary in order to better understand what each network architecture is learning. the foreground’s shape and representation is playing a key role in the classification of the network. The results demonstrate an improvement over each independent approach, with a classification accuracy of 64.69% per-frame. This is a significant increase of 10% above the imaging method and 20% over the optical flow method. This increase was attained by combining the same architecture as the previous two methods, with the addition of a single concatenation node to fuse the data at the end of the network. It demonstrates that directly incorporating temporal data into a network can be immediately beneficial towards classifying video. Leveraging the network to perform full video classification (rather than only per-frame classification), we tested the trained network on our test set of videos, taking the class with the largest number of per-frame votes as the final video label. This resulted in a per-video classification accuracy of 66.14%. After further experimentation with the network architecture, we saw a significant improvement from computing a unique mean image to subtract from the optical flow, which increased our accuracy to a final per-video classification rate of 68.89%. The network performs well at classifying Ballet, Waltz, Tango, Flamenco, and Foxtrot, with poor classification accuracy on Break and Swing dancing. Of particular interest is the network’s performance on Waltz, Tango and Foxtrot which occur in similar settings. As such, the network shows that it’s capable of performing fine-grained classification within the Let’s Dance dataset. Dataset UCF-101 [22] Let’s Dance Frame-by-Frame 72.8% 56.4% 7.1. Temporal 3D CNN In order to evaluate this approach we restructured our data into 16-frame chunks that were needed as the input for the 3D convolution. The network could be trained on the 3D features from 16-frame non-overlapping chunks of the video. We fine-tuned from the network trained on UCF101 by [25]. This method yielded a per-video accuracy of 70.11%. This result was particularly impressive because it demonstrated the inherent ability of a 3D convolution to extract motion features that are not explicitly computed. The major drawback of this approach is its complexity. A 3D convolution inherently takes significant computation for a single-stream. We were unable to perform multi-stream approaches using 3D convolutions due to this complexity. In order to combat this we introduce more tractable approaches for state-of-the-art graphics cards (Our current systems utilizes Titan Z Pascal graphics cards) that achieve comparable performance by explicitly encoding motion into the network architecture. In addition to this we note that 3D convolutions are limited to the initial input-size which in our case was 16 frames. This makes it difficult to encode more complex motions that last more than 1/2 second without sub sampling frames which will invariably lead to a loss in detail. Most temporal methods will invariably suffer from this limitation given that variable inputs into a convolutional network has not been fully explored. Two-Stream 88.0% 68.89% Table 1. Method Comparison of UCF-101 and Let’s Dance. UCF Frame-by-Frame results obtained from [29], Two-Stream results obtained from [20] Lastly, we revisit our accuracy results with UCF-101, a well-established activity recognition dataset. Table 1 illustrates high levels of accuracy on UCF-101 using the standard extensions of image classification techniques which we discuss in this section. It is important to note that the 7.2. Skeletal Temporal 3D CNN In order to embed human motion data, we incorporate skeletal images into a temporal CNN. We visualize each 7 Approach Frame-by Frame CNN Two-Stream CNN Temporal 3D CNN (RGB) Temporal 3D CNN (Skeletal) Three-Stream CNN Temporal Three-Stream CNN 8. Conclusion and Future Work Testing Accuracy 56.4% 68.89% 70.11% 57.14% 69.20% 71.60% In this work we sought out to understand the effect of motion on classifying videos. Recent work in the are has demonstrated the relevance of these type of videos, most recently seen in [15] and [12]. The work we have conducted demonstrates that traditional CNN approaches do not properly or intentionally encode motion in their methodology. This fact is frequently overlooked by testing on videos that do not inherently require motion. That was the primary motivator of this work. As we can see in Table 2, 3D convolution methods outperform more traditional approaches by inherently encoding motion into their computation and prediction. Similarly, two-stream methods that incorporate optical flow can also leverage temporal features to significantly improve video classification. Table 2. Comparison of numerous approaches and their testing accuracies on our dataset pose into a single image which represents the pose for that particular frame. We attained an accuracy of 57.14%. We note that this accuracy still performs marginally better than a frame-by-frame approach despite the fact that it does not utilize the spatial (RGB) representation. Due to the computational complexity of running concurrent 3D convolutional networks we propose a stacked 2D convolutional method which allows us to combine multiple streams in a single state-of-the-art graphics card. This also opens up some potential for future work in incorporating optical flow and pose data. Hybrid approaches, such as a three-stream temporal CNN, have the potential to increase an algorithm’s understanding of the video. We have also developed a more focused dataset that we believe the research community will benefit from by intentionally selecting highly dynamic actions in one specific class. We tested a variety of traditional and more complex methods in order to begin to understand the composition of our dataset and its baseline performance. The Let’s Dance dataset will continue to help us to assess adequate motion parameterization and hopefully assist in improving how we learn from video data. 7.3. Frame-by-Frame Three-Stream CNN Our Three-Stream Frame-by-Frame architecture utilizes all three data modalities. We assess this as both a singleframe and as a stacked architecture in order to compare their benefits and drawbacks. As shown in Table 2, this approach attains an accuracy of 69.20%. This three-stream network performs comparably to the two-stream fusion approach we conducted as one of our baselines which indicates that there is not a significant amount of information added from the use of both skeletal and optical flow representations. One of the biggest problems we ran into throughout this research endeavor was determining the best classes to select for our dataset. Initially we had some intuition for dancing and martial arts being adequate parent categories but we quickly saw that martial arts represented a multiclass problem. Although dancing exhibits similar overlaps the separation was much more evident when performing the data collection. We also had to alternate between different dances partly due to availability on YouTube and our own understanding of these dances. 7.4. Temporal Three-Stream CNN Logically, we extended our frame-by-frame approach into the temporal domain by stacking the image input layers to produce a 16-frame chunk. This approach utilizes the same input as the Temporal 3D CNN we implemented at a much lower complexity for three streams. We saw this method attain the best performance out of all of the methods we evaluated, at an accuracy of 71.60%. Looking at our most successful approaches, three-stream methods and 3D convolution, we note that both achieve very similar performance in per-video classification. However, the two methods are not equivalent in terms of computational resources. Beyond the increased workload and restrictions inherent in appropriately formatting the data for the temporal CNN, 3D convolution is much more computationally-intensive at both training and testing time. We observe that even though the temporal CNN was our most successful approach, it may be sub-optimal when a much simpler three-stream stacked convolutional network approach is available. One of the next steps we have considered in this work is modifying the input data in order to blur out regions of the video which are not in motion or considered background. This would further enforce motion parameterization and help us better understand how we can accomplish that to improve more general video classification algorithms. This could also be explored by independently classifying the pose estimation which is significantly more challenging. We seek to extend this work by continuing to develop human-motion representations that intentionally target these highly dynamic actions. For more information, please visit: https://www. cc.gatech.edu/cpl/projects/dance/ 8 References [15] C. Pantofaru, C. Sun, C. Gu, C. Schmid, D. Ross, G. Toderici, J. Malik, R. Sukthankar, S. Vijayanarasimhan, S. Ricco, et al. Ava: A video dataset of spatio-temporally localized atomic visual actions. 2017. 3, 8 [16] L. Pishchulin, A. Jain, M. Andriluka, T. Thormählen, and B. Schiele. Articulated people detection and pose estimation: Reshaping the future. In Computer Vision and Pattern Recognition (CVPR), 2012 IEEE Conference on, pages 3178–3185. IEEE, 2012. 4 [17] J. Redmon, S. Divvala, R. Girshick, and A. Farhadi. You only look once: Unified, real-time object detection. arXiv preprint arXiv:1506.02640, 2015. 4, 5 [18] M. D. Rodriguez, J. Ahmed, and M. Shah. Action mach a spatio-temporal maximum average correlation height filter for action recognition. In Computer Vision and Pattern Recognition, 2008. CVPR 2008. IEEE Conference on, pages 1–8. IEEE, 2008. 3 [19] O. Russakovsky, J. Deng, H. Su, J. Krause, S. Satheesh, S. Ma, Z. Huang, A. Karpathy, A. Khosla, M. Bernstein, A. C. Berg, and L. Fei-Fei. ImageNet Large Scale Visual Recognition Challenge. International Journal of Computer Vision (IJCV), 115(3):211–252, 2015. 6 [20] K. Simonyan and A. Zisserman. Two-stream convolutional networks for action recognition in videos. In Z. Ghahramani, M. Welling, C. Cortes, N. D. Lawrence, and K. Q. Weinberger, editors, Advances in Neural Information Processing Systems 27, pages 568–576. Curran Associates, Inc., 2014. 2, 7 [21] K. Simonyan and A. Zisserman. Very deep convolutional networks for large-scale image recognition. arXiv preprint arXiv:1409.1556, 2014. 4 [22] K. Soomro, A. R. Zamir, and M. Shah. Ucf101: A dataset of 101 human actions classes from videos in the wild. arXiv preprint arXiv:1212.0402, 2012. 3, 7 [23] N. Srivastava, E. Mansimov, and R. Salakhutdinov. Unsupervised learning of video representations using lstms. CoRR, abs/1502.04681, 2015. 2 [24] A. Toshev and C. Szegedy. Deeppose: Human pose estimation via deep neural networks. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pages 1653–1660, 2014. 2 [25] D. Tran, L. Bourdev, R. Fergus, L. Torresani, and M. Paluri. Learning spatiotemporal features with 3d convolutional networks. arXiv preprint arXiv:1412.0767, 2014. 7 [26] S. Venugopalan, M. Rohrbach, J. Donahue, R. Mooney, T. Darrell, and K. Saenko. Sequence to sequence-video to text. In Proceedings of the IEEE International Conference on Computer Vision, pages 4534–4542, 2015. 2 [27] K. Wang, X. Wang, L. Lin, M. Wang, and W. Zuo. 3d human activity recognition with reconfigurable convolutional neural networks. In Proceedings of the 22Nd ACM International Conference on Multimedia, MM ’14, pages 97–106, New York, NY, USA, 2014. ACM. 2 [28] L. Wang, Y. Qiao, and X. Tang. Action recognition with trajectory-pooled deep-convolutional descriptors. In The IEEE Conference on Computer Vision and Pattern Recognition (CVPR), June 2015. 2 [1] M. Abadi and A. A. et. al. TensorFlow: Large-scale machine learning on heterogeneous systems, 2015. Software available from tensorflow.org. 6 [2] Z. Cao, T. Simon, S.-E. Wei, and Y. Sheikh. Realtime multiperson 2d pose estimation using part affinity fields. June 2017. 3, 4 [3] G. Chéron, I. Laptev, and C. Schmid. P-cnn: Pose-based cnn features for action recognition. In Proceedings of the IEEE International Conference on Computer Vision, pages 3218– 3226, 2015. 2 [4] J. Donahue, L. Anne Hendricks, S. Guadarrama, M. Rohrbach, S. Venugopalan, K. Saenko, and T. Darrell. Long-term recurrent convolutional networks for visual recognition and description. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pages 2625–2634, 2015. 2 [5] G. Farnebäck. Two-frame motion estimation based on polynomial expansion. In Image analysis, pages 363–370. Springer, 2003. 3, 6 [6] C. Feichtenhofer, A. Pinz, and A. Zisserman. Convolutional two-stream network fusion for video action recognition. arXiv preprint arXiv:1604.06573, 2016. 1, 2 [7] G. Gkioxari, B. Hariharan, R. Girshick, and J. Malik. Using k-poselets for detecting people and localizing their keypoints. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pages 3582–3589, 2014. 4 [8] G. Gkioxari and J. Malik. Finding action tubes. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pages 759–768, 2015. 2 [9] S. Ji, W. Xu, M. Yang, and K. Yu. 3d convolutional neural networks for human action recognition. Pattern Analysis and Machine Intelligence, IEEE Transactions on, 35(1):221– 231, Jan 2013. 2, 5 [10] Y. Jia, E. Shelhamer, J. Donahue, S. Karayev, J. Long, R. Girshick, S. Guadarrama, and T. Darrell. Caffe: Convolutional architecture for fast feature embedding. In Proceedings of the 22nd ACM international conference on Multimedia, pages 675–678. ACM, 2014. 6 [11] A. Karpathy, G. Toderici, S. Shetty, T. Leung, R. Sukthankar, and L. Fei-Fei. Large-scale video classification with convolutional neural networks. In The IEEE Conference on Computer Vision and Pattern Recognition (CVPR), June 2014. 2, 3 [12] W. Kay, J. Carreira, K. Simonyan, B. Zhang, C. Hillier, S. Vijayanarasimhan, F. Viola, T. Green, T. Back, P. Natsev, et al. The kinetics human action video dataset. arXiv preprint arXiv:1705.06950, 2017. 3, 8 [13] A. Krizhevsky, I. Sutskever, and G. E. Hinton. Imagenet classification with deep convolutional neural networks. In F. Pereira, C. J. C. Burges, L. Bottou, and K. Q. Weinberger, editors, Advances in Neural Information Processing Systems 25, pages 1097–1105. Curran Associates, Inc., 2012. 4, 5 [14] J. Liu, A. Shahroudy, D. Xu, and G. Wang. Spatio-temporal lstm with trust gates for 3d human action recognition. In European Conference on Computer Vision, pages 816–833. Springer, 2016. 2 9 [29] L. Wang, Y. Xiong, Z. Wang, and Y. Qiao. Towards good practices for very deep two-stream convnets. arXiv preprint arXiv:1507.02159, 2015. 6, 7 [30] S.-E. Wei, V. Ramakrishna, T. Kanade, and Y. Sheikh. Convolutional pose machines. arXiv preprint arXiv:1602.00134, 2016. 2, 4, 5 [31] W. Zou, S. Zhu, K. Yu, and A. Y. Ng. Deep learning of invariant features via simulated fixations in video. In F. Pereira, C. J. C. Burges, L. Bottou, and K. Q. Weinberger, editors, Advances in Neural Information Processing Systems 25, pages 3203–3211. Curran Associates, Inc., 2012. 2 10
1cs.CV
arXiv:1803.03737v2 [cs.NE] 26 Mar 2018 Enhancing Evolutionary Optimization in Uncertain Environments by Allocating Evaluations via Multi-armed Bandit Algorithms Xin Qiu Risto Miikkulainen Sentient Technologies, Inc San Francisco, California [email protected] Sentient Technologies, Inc San Francisco, California The University of Texas at Austin Austin, Texas [email protected] ABSTRACT Optimization problems with uncertain fitness functions are common in the real world, and present unique challenges for evolutionary optimization approaches. Existing issues include excessively expensive evaluation, lack of solution reliability, and incapability in maintaining high overall fitness during optimization. Using conversion rate optimization as an example, this paper proposes a series of new techniques for addressing these issues. The main innovation is to augment evolutionary algorithms by allocating evaluation budget through multi-armed bandit algorithms. Experimental results demonstrate that multi-armed bandit algorithms can be used to allocate evaluations efficiently, select the winning solution reliably and increase overall fitness during exploration. The proposed methods can be generalized to any optimization problems with noisy fitness functions. KEYWORDS Evolutionary computation, multi-armed bandit algorithm, uncertain environment 1 INTRODUCTION In many real-world problems, fitness evaluations are noisy, and such uncertainty makes evolutionary optimization difficult [14]. The true fitness of a solution can only be approximated by a large number of samples [22], slowing down evaluations and making results unreliable. As a concrete example, consider the conversion rate optimization (CRO) problem. CRO is an emerging field where web designs are optimized to increase the percentage of converted visitors [25]. Conversion refers to any desired actions of website users, e.g., making purchase, registering new account, or clicking on any desired links. The true conversion rate of a web design can only be estimated via a certain number of user interactions/visits. Recently, a new technology for CRO was developed by applying evolutionary algorithm (EA) [20, 21]. Each website design is represented as a genome, and will be evolved into better ones in terms of conversion rate. Evolutionary CRO provides considerable advantages over traditional A/B or multivariant testing: the exploration in evolutionary algorithm covers a large design space; evolution discovers and utilizes effective interactions among variables; the optimization of website design is fully automated. Although impressive improvements over human design have been reported [20, 21], there are still several open issues in evolutionary CRO. First, the evaluations for candidate designs are expensive, and a fair amount of traffic may be wasted on bad designs. Second, only weak statistical evidence is necessary for winner selection among candidate designs, reducing reliability of the optimization outcome. Third, in some cases, the target is to maintain a high overall conversion rate during the optimization process instead of identifying a single best website design after optimization; the current evolutionary CRO technique can not accommodate to this demand. To overcome these issues, a series of new mechanisms are proposed in this paper by augmenting evolutionary optimization with multi-armed bandit (MAB) algorithms [2–4]. First, a new framework called MAB-EA is developed by utilizing MAB algorithms for traffic allocation during fitness evaluation. The proposed framework aims at reducing the evaluation cost while maintaining the optimization performance. Second, an enhanced variant of MAB-EA is designed to select the winner reliably. The main idea is to include an addtional verification phase, based on MAB algorithms, to the end of the evolution process. Third, another variant of MAB-EA is developed by introducing a new concept called asynchronous statistics into MAB algorithms. The new variant is particularly well suited for problems where overall fitness (average fitness over all evaluations) during optimization needs to be maximized. Empirical studies demonstrate that these techniques are effective in a simulated CRO domain. Although the studies in this work are based on CRO domain, the principle ideas can be easily generalized to other optimization problems with uncertain environments. The remainder of this paper is organized as follows. Section 2 introduces the basic concepts of evolutionary CRO and MAB algorithms. Section 3 explains the technical details of the new approaches and discusses the underlying rationales. Section 4 evaluates the proposed mechanisms via experiments. Section 5 provides high-level discussions and suggests some future research diections. 2 BACKGROUND This section provides a brief description of the basic concepts and existing MAB algorithms that will be utilized in the proposed techniques. 2.1 Evolutionary Conversion Rate Optimization EA is a population-based metaheuristic inspired by natural evolution process. Each individual (genome) in the population represents a single solution to the optimization problem, and these individuals will evolve through crossover, mutation and survival selection iteratively. The most significant advantage of EAs is that they do not make any assumption about the underlying landscape of the optimization problems, thereby leading to exceptional ability in finding good solutions to mathematically intractable problems [9]. Algorithm 1 UCB1 Algorithm In evolutionary CRO [20, 21], each genome represents a web interface design. The search space is pre-defined by the web designer. For each such space, the designer specifies the elements of the interface and values that they can take. For instance in a landing page, logo size, header image, button color, content order are such elements, and they can each take on 2-4 values. Evolutionary CRO searches for good designs in the space of possible combinations of these values, which often number in millions. In each generation, all the genomes will be evaluated with a fixed number of user interactions, and the conversion rates during evalution will be used as the fitnesses for each genome. Fitness-proportionate selection is then used to select parent genomes, and traditional genetic operations such as crossover (recombination of the elements in two parent genomes) and mutation (randomly changing one element in the offspring genome) are performed to generate offspring candidates. The same process will be repeated generation by generation until the termination criterion is met, which usually means reaching a fixed number of user interactions. In a typical winner-selection application, the winning design is then selected among the best candidates, with an estimate of its future performance. In campaignmode application, there is no winner but performance is measured by the overall convergence rate throughout the entire experiment. 2.2 Require: K: Total number of arms 1: for i = 1 to K do 2: Pull arm i, and observe reward X i,0 3: x̂ i = X i,0 4: ni = 1 5: end for 6: for t = K + 1, K + 2, . . . do p 7: Pull arm i max := argmaxi x̂ i + 2 log (t)/ni , and observe reward X i max,t 8: 9: 10: x̂ ×n +X i max , t x̂ i max = imax niimax+1 max ni max = ni max + 1 end for MAB problems due to its good theoretical guarantees [2]. The principle behind UCB is optimism in the face of uncertainty [15]. Generally, UCB constructs an optimistic guess on the potential reward of each arm, and pulls the arm with the highest guess. Among the UCB family of algorithms [11, 16, 18, 19], UCB1 [4] is a simple yet efficient variant that can be directly applied to Bernoulli Bandits. The optimistic guess in UCB1 is in the form of an upper confidence bound derived from the Chernoff-Hoeffding inequality [7, 13]. Suppose X 1 , X 2 , . . . , X n are independent random variables on Í [0, 1] with expected values as µ 1 , µ 2 , . . . , µ n . For X = n1 ni=1 X i and Í µ = E(X ) = n1 ni=1 µ i , the Chernoff-Hoeffding inequality gives an exponential upper bound on the probability that the value of X deviates from its expectation for more than a: Multi-armed Bandit Algorithms This subsection explains the definition of multi-armed bandit problem, and introduces three representative multi-armed bandit algorithms used in this paper. 2 P(X > µ + a) ≤ e −2na . 2.2.1 Multi-armed Bandit Problem. In MAB problem, a slot machine with multiple arms is given, and the gambler has to decide which arms to pull, how many times to pull each arm, and in which order to pull them [28]. The most common is the stochastic MAB problem, which is parameterized by the number of arms K, the number of rounds n, and K fixed but unknown reward distributions ν 1 , ν 2 , . . . , ν K associated with arm 1, arm 2, . . . , arm K, respectively. For t = 1, 2, . . . , n, at round t, the agent (gambler) chooses an arm It from the set of arms {1, 2, . . . , K } to pull, and observes a reward sampled from ν It . Each reward sample is independent from the past actions and observations. The CRO problem is a special case (called Bernoulli bandit) of the general stochastic MAB problem: the reward for each pull is either 1 or 0 (converted or not in CRO), and for arm i the probability of success (reward = 1) is µ i . An algorithm for the stochastic MAB problem must decide which arm to pull at each round t, based on the outcomes of the previous t − 1 pulls. In the classical MAB problem, the goal is to maximize the cumulative sum of rewards over the n rounds [4, 24]. Since the agent has no prior knowledge about the reward distributions, it needs to explore the different arms, and at the same time, exploit the seemingly most rewarding arms [3]. This goal aligns with the campaign-mode application in CRO. For clarity of statement, we call this type of problem the classical stochastic MAB problem. Another target for stochastic MAB problem is to output a recommended arm after a given number of pulls. The performance of the MAB algorithm is only evaluated by the average payoff of that recommended arm. This goal aligns with the winner-selection application in CRO. This is called pure exploration problem [5]. (1) For the stochastic MAB problem, X i will be the reward of each pull for a single arm and X will be the p empirical average reward for that arm after n pulls. Using a = 2 log (t)/n, where t represents the total number of pulls so far for all the arms, P(X > µ + a) ≤ t −4 , which converges to zero very quickly as the total number of pulls increases. This upper bound will then be used in UCB1 to balance between exploration and exploitation. Algorithm 1 shows the basic steps of UCB1 algorithm. Two effects of the UCB1 algorithm needs to bepmentioned: first, if one arm is never pulled, its corresponding x̂ i + 2 log (t)/ni will grow at a rate that is faster than all the other pulled arms. This means that an arm will never be permanently ruled out no matter how poorly it performs. This effect encourages exploration. Second, if one arm has been pulled as many times as the other arms but has a significantly higher empirical mean reward x̂ i , it will be pulled more subsequently. This effect encourages exploitation. A delicate tradeoff between exploration and exploitation is therefore the hallmark of UCB1. 2.2.3 Thompson Sampling. Except for UCB, Thompson Sampling (TS) [27] is another good alternative MAB algorithm for the classical stochastic MAB problem. The idea is to assume a simple prior distribution on the parameters of the reward distribution of every arm, and at each round, play an arm according to its posterior probability of being the best arm [2]. The effectiveness of TS has been empirically demonstrated by several studies [6, 12, 26], and the asymptotic optimality of TS has been theoretically proved for Bernoulli bandits [2, 17]. TS for Bernoulli bandits utilizes beta distribution as priors, i.e., a family of continuous probability distributions on the interval [0, 1] parameterized by two 2.2.2 UCB Algorithm. Upper Confidence Bound (UCB) algorithm is arguably the most popular approach for solving classical 2 Algorithm 2 Thompson Sampling for Bernoulli Bandits Algorithm 3 Successive Rejects Algorithm Require: K: Total number of arms 1: for i = 1 to K do 2: Si = 0, Fi = 0 3: end for 4: for t = 1, 2, . . . do 5: for i = 1 to K do 6: Sample θ i,t from Beta(Si + 1, Fi + 1) 7: end for 8: Pull arm i max := argmaxi θ i,t , and observe reward X i max,t 9: if X i max,t = 1 then 10: Si = Si + 1 11: else 12: Fi = Fi + 1 13: end if 14: end for Require: K: Total number of arms n: Total number of pulls Ensure: Best arm Jn 1 ÍK 1 , n = 0 1: A1 = {1, . . . , K }, log(K) = 2 + i=2 0 i 2: for k = 1 to K − 1 do 3: nk = ⌈ 1 Kn−K +1−k ⌉ log(K ) 4: 5: 6: 7: 8: 9: 3 positive shape parameters, denoted by α and β. The probability density function (PDF) of the beta distribution Beta(α, β) is given Γ(α +β ) by f (x; α, β) = Γ(α )Γ(β ) x α −1 (1 − x)β −1 , where Γ() is the gamma function, and 0 ≤ x ≤ 1. The mean of Beta(α, β) is α α+β , and higher α, β lead to tighter concentration of Beta(α, β) around the mean. TS initially assumes each arm i to have prior reward distribution Beta(1, 1), which is equivalent to uniform distribution on [0, 1]. At round t, after having observed Si successes (reward = 1) and Fi failures (reward = 0) in Si + Fi pulls for arm i, the reward distribution of arm i will be updated as Beta(Si + 1, Fi + 1). The algorithm then samples from these updated reward distributions, and selects the next arm to pull according to the sampled reward. Algorithm 2 describes the detailed procedure of TS. 1 n−K ⌉ log(K ) K −1 3.1 MAB-EA In the original Evolutionary CRO framework [20, 21], the evaluation of each candidate is performed in a static fashion: a fixed amount of traffic will be allocated to each website design, and the fitness of each candidate is measured by the conversion rate. In the case of CRO, the evaluation is very expensive because it is consuming traffic on a real website. Thus, the overall conversion rate during evolution determines the real cost of the optimization process. One main drawback of the original static evaluation is that a large amount of traffic may be consumed by bad candidates. Thus, the goal is to develop of a new framework that allocates traffic dynamically in a more efficient way. MAB algorithms are well suited for this role. More specifically, each candidate web design is regarded as an arm, and each visit to the website is equal to a pull. The reward of each visit to a single web design is assumed to follow an unknown but fixed Bernoulli distribution. The probability of getting reward 1 (the visited user is successfully converted) is p and the probability of getting reward 0 (the visited user is not converted) is 1 − p, where p is the true conversion rate of that web design. Given a fixed budget of traffic (number of visits) for each generation, a Bernoulli MAB algorithm will then be invoked to allocate traffic to the current candidates. The fitness of each candidate is equivalent to its number of successful conversions divided by its total visits (both numbers are counted within the current generation). Based on these fitnesses, standard EA operations such as parent selection, crossover, mutation and survival selection will be conducted to generate the population for next generation. Algorithm 4 depicts the procedure of the proposed framework, namely MAB-EA. Note that the goals of the MAB algorithm and the evaluation phase in EA are inherently different: MAB algorithm only cares about identifying the good arms efficiently, whereas EA aims at estimating the fitnesses of all arms. In spite of this fact, MAB algorithm should not impair the optimization performance significantly, and may even improve it. As shown in Algorithm 4, elite candidates log(K ) times, and so on, except for the last two arms, which are both pulled n K −1 = ⌈ 1 n−K ⌉ times, where log(K) = 21 + log(K ) 2 ÍK 1 i=2 i . Therefore, the total number of pulls does not exceed the budget n: K −1 n 1 + n 2 + · · · + n K −1 + n K −1 ≤ K + METHODOLOGY This section describes the algorithmic details of the proposed approaches and mechanisms. A basic framework combining Evolutionary CRO technique with MAB algorithm is presented first, then two enhanced variants are developed for tackling different use cases, namely, Best Arm Identification and Campaign mode. 2.2.4 Successive Rejects Algorithm. Among many existing algorithms for solving the pure exploration problem [8, 10, 23], Successive Rejects (SR) algorithm stands out in that it is parameter-free and independent of the scaling of the rewards [3]. The main task for SR algorithm is to identify the best arm (the arm with truly best mean reward) after a fixed number of pulls. Suppose we are given K arms and n pulls. First the SR algorithm divides the n pulls into K − 1 phases. At the end of each phase, the arm with the lowest empirical mean reward will be discarded. During each phase, each arm that has not been discarded yet will be pulled for equal number of times. The only surviving arm after K − 1 phases, Jn , will be recommended as the best arm. The details of SR are described in Algorithm 3. As a result, one arm is pulled n 1 = ⌈ 1 n−K K ⌉ times, one arm is pulled n 2 = ⌈ for i ∈ Ak do Pull arm i for nk − nk−1 rounds end for Ak +1 = Ak \argmini ∈Ak X̂ i,nk , where X̂ i,nk is the average reward for arm i after nk pulls end for Let Jn be the unique element of AK n−K 1 Õ 1 ( + ) = n. 2 K + 1−k log(K) k =1 (2) The SR algorithm is essentially optimal because the regret (difference between the mean rewards of identified best arm and true best arm) decreases exponentially at a rate which is, up to a logarithmic factor, the best possible [3]. 3 Algorithm 4 MAB-EA Algorithm 5 Best Arm Identification Mode Require: K: Population size, G max : Maximum number of generations T : Number of website visits for each generation Ce : Percentage for elites, Cp : Percentage for parents P1 : Initial population, Cm : Mutation probability 1: D = P 1 , D is the archive for storing evaluated candidates 2: for д = 1 to G max do 3: Perform MAB algorithm on Pд with a traffic budget of T , record the number of conversions si and number of visits ni within current generation for each candidate 4: for i = 1 to K do 5: Set fitness for candidate i as fi = si /ni 6: end for Create elite pool Eд as the best Ce percentile candidates in 7: current generation 8: Create parent pool Aд as the best Cp percentile candidates in current generation 9: Initialize offspring pool Oд as empty 10: while Size of Eд + Oд is less than K do 11: Perform fitness-proportionate selection on Aд to pick 2 parent candidates Perform uniform crossover between the two parents to 12: generate an offspring 13: Perform mutation operation on the offspring, each element of the offspring will have Cm probability to be randomly altered 14: if the offspring is not in D then 15: Add the offspring to Oд 16: Add the offspring to D 17: end if 18: end while 19: Pд+1 = Eд + Oд 20: end for Require: Same control parameters as in Algorithm 4 Ke : Size for the elite pool Te : Additional traffic for Best Arm Identification phase 1: D = P 1 , D is the archive for storing evaluated candidates 2: Initialize elite pool E as empty 3: for д = 1 to G max do 4: Same as lines 3-6 in Algorithm 4 5: Add the best Ce percentile candidates of current generation to elite pool E 6: while Size of E is larger than Ke do 7: Remove the worst candidate from E 8: end while Create parent pool Aд as the best Cp percentile candidates 9: in current generation 10: Initialize offspring pool Oд as empty 11: while Size of Oд is less than K do 12: Same as lines 11-17 in Algorithm 4 13: end while 14: Pд+1 = Oд 15: end for 16: Perform pure exploration MAB algorithm on E with a traffic budget of Te , return the identified best candidate tests in Section 4.2 show that BAI mode can significantly improve the reliability of identified best candidate without incurring any additional cost. One additional modification in BAI mode is the removal of elite survival mechanism. No candidate is allowed to survive for more than one generation, and all the candidates for next generation will be totally new. The purpose for this modification is to further improve the explorative ability of the framework, considering the fact that the evaluations are very expensive and only limited number of generations (less than 10) are acceptable in real CRO cases. Since the elite pool in BAI mode has already stored the outstanding candidates for every generation, the evolution can focus on exploring more regions in search space. play an important role in both parent selection and survival selection. Since MAB algorithms allocate more traffic to those promising candidates, their fitnesses are actually more reliably estimated than those of the least promising candidates. Selection mechanisms relying on good candidates are therefore further enhanced. Thus, the proposed framework is expected to significantly increase the overall conversion rate during evolution without sacrificing the overall optimization performance. 3.2 3.3 Campaign Mode with Asynchronous Multi-armed Bandit Algorithm The current evolutionary CRO technique is designed to identify a good candidate at the end of optimization. However, in some scenaria, the goal for CRO is to make the overall conversion rate during optimization as high as possible. To fill this need, a Campaign mode based on MAB-EA is developed by introducing a new concept to existing MAB algorithms: asynchronous statistics. The original MAB algorithms initialize the statistics (total reward, average reward, number of pulls, etc.) of all the arms as 0. In contrast, the MAB algorithms in Campaign mode run in an asynchronous manner: All the candidates surviving from previous generation preserve their statistics and use them to initialize the MAB algorithm, which then updates them further, as usual. Taking asynchronous TS as an example, each candidate has an Si and Fi , and these two numbers are updated over generations until the candidate fails to survive. The underlying rationale is that preservation of statistics increases the survival probability of good candidates, therefore Campaign mode focuses more on exploitation than exploration. Asynchronous MAB algorithms allocate more traffic to Best Arm Identification Mode One important goal for CRO is to identify a single best design that can be delivered to website owner for long-term use. However, during the normal evolutionary process, only weak statistical evidence is obtained. Although this evidence is enough to rank the candidate designs for reproduction, it is not enough to identify the true best candidate. To solve this problem, Best Arm Identification (BAI) Mode (Algorithm 5) is developed based on the new MAB-EA framework. The BAI mode is applied after the evolution process has concluded. A MAB algorithm for pure exploration (e.g., SR algorithm) will be performed on an elite pool, i.e., the collection of top candidates over all generations. A single winner will be returned after the BAI phase. Although additional traffic is needed for running the BAI phase, this cost can be compensated by extracting a small portion of traffic from each previous generation (e.g., 10%). Empirical 4 Algorithm 6 Campaign Mode with Asynchronous MAB Algorithm a total of 8 elements in the website that needs to be optimized. The elements have 5, 4, 2, 3, 4, 3, 3 and 4 choices, respectively. The basic conversion rate for the website is 0.05, and the effect of each element choice is within [−0.01, 0.01]. The mean conversion rate for all possible designs is 0.04997, and the conversion rate for the best possible design is 0.08494. This parametric setup is similar to real world situations. For each simulated visit, a Bernoulli test with success probability equal to the conversion rate of the web design will be conducted. A successful trail corresponds to a successful conversion, and givies a reward of 1. A failed trial returns a reward of 0. Require: Same control parameters as in Algorithm 4 excluding Ce 1: Initialize the total number of conversions si and total number of visits ni for each candidate as 0 2: for д = 1 to G max do 3: Perform asynchronous MAB algorithm on Pд with a traffic budget of T , update the total number of conversions si and total number of visits ni for each candidate 4: Same as lines 4-6 in Algorithm 4 Create parent pool Aд as the best Cp percentile candidates 5: in current generation 6: Remove the worst Cp percentile candidates from Pд 7: Initialize offspring pool Oд as empty 8: while Size of Pд + Oд is less than K do 9: Same as lines 11-13 in Algorithm 4 10: if the offspring is not in Pд + Oд then 11: Initialize the total number of conversions si and total number of visits ni for the offspring as 0 12: Add the offspring to Oд 13: end if 14: end while 15: Pд+1 = Pд + Oд 16: end for 4.2 the existing elites without reevaluating them from scratch, thus improving overall conversion rate. Algorithm 6 summarizes the structure of Campaign mode. Except for asynchronous statistics in MAB algorithms, the Campaign mode differs from the original MAB-EA in two other aspects. First, the duplication avoidance mechanism is weakened. Since exploration is not the first priority in Campaign mode, duplications between different generations are allowed to encourage the revival of underestimated candidates. Second, only the worst Cp percentile candidates are replaced by the new offspring, which are generated from the top Cp percentile candidates. By setting Cp as 20 or even less, the portion of newly generated offspring is limited, and the overall conversion rate is more stable. Moreover, because all the offspring are generated based on the top candidates, the overall quality of offspring tends to be better than purely random sampling. Under these mechanisms, the crossover and mutation operations can continue the exploration at a steady pace. 4 EMPIRICAL STUDY This section evaluates the effectiveness of the proposed framework and mechanisms via simulated experiments in the conversion rate optimization domain. All the conclusions in this section are supported by t-test at a 5% significance level. 4.1 Overall Performance Evaluation In order to evaluate the performance of the new framework, three representative MAB algorithms (SR, TS and UCB1) are incorporated into it, and an empirical comparison between these three variants and the original evolutionary CRO algorithm is conducted. The original algorithm is the same as Algorithm 4 except for traffic allocation: instead of varying it based on a MAB algorithm, all candidates evenly share the traffic budget. For convenience, the original evolutionary CRO algorithm is named "Standard Method" in the rest of the paper. The traffic budget for each generation is fixed at 10,000, and the maximun number of generations is set at 10 , conforming to cost limitations in real-world CRO. The population size K is 20, and the mutation probability Cm is 0.01. Different values of elite and parent percentages, Ce and Cp , are tested to investigate the robustness of the proposed framework. Two performance metrics are utilized: one is the best conversion rate, i.e., the true conversion rate of the best-performing candidate in each generation; the other is the overall conversion rate for each generation, i.e., the total number of conversions in one generation divided by the total number of visits in that generation. Note that the overall conversion rate is different from simply averaging the conversion rates of all the candidates, because the traffic allocated to each candidate may be different. Figure 1 shows the results based on 500 independent runs. From Figure 1, it is clear that the proposed framework with TS and SR significantly increases the overall conversion rate during evolution without deteriorating the optimization performance. In fact, the incorporation of MAB algorithms even improves the optimization performance in terms of best conversion rate. Regarding the influence of Ce and Cp , larger values of these two parameters lead to more explorative behaviors at a cost of overall conversion rate at early stage. In real-world cases, the largest acceptable generation number is usually 5, so a reasonable choice for Ce and Cp would be 20 or even less. Under these circumstances, the TS and SR variants perform best both in terms of overall conversion rate and best conversion rate. There are three explanations: first, the MAB algorithm allocates more traffic to the promising candidates, thereby increasing the overall conversion rate during evaluation; second, since the top candidates receive more traffic from MAB algorithm, the reliability of best performing candidate is enhanced; third, under small Ce and Cp , the quality of offspring relies heavily on the top candidates, and more reliable top candidates tend to generate more reliable offspring. The overall quality of candidates is therefore improved, and the overall conversion rate is further increased in this way. Regarding UCB1, since the average reward in p the simulated CRO case is very low (e.g., 0.05), the second term 2 log (t)/ni in line 7 of Algorithm 1 plays a more important role Experimental Setup A CRO simulator was built to simulate the interactions between users and website designs. There are multiple possible choices for each element of a website, and each choice will increase or decrease the basic conversion rate of the website independently (that is, interactions between elements are not modeled in these experiments: although they are important in real-world CRO, they do not play a large role in traffic allocation). The effect of each choice is predefined and kept fixed during the CRO process. For all the experiments in this section, the following setup is used: There are 5 Figure 1: This figure shows the best conversion rate and overall conversion rate in each generation. The results are averaged over 500 independent runs for different Ce and Cp settings. TS and SR perform significantly better than Standard Method in terms of both measures. The differences in best conversion rate are statistically significant after generation 1, and the differences in overall conversion rate are statistically significant over all the generations. Best Conversion Rate over Generations in arm selection. This encourages evenly allocation of the traffic, thereby leading to similar behaviors as in Standard Method. Effectiveness of Best Arm Identification Mode 0.070 Best Conversion Rate 4.3 0.075 This subsection demonstrates the effectiveness of BAI mode through an experimental comparison with the Standard Method, MAB-EA, and a state-of-the-art approach [22] where the average fitness within a predefined neighborhood (in solution space) is used to evaluate candidates. In the experiments, the neighborhood approach was further improved by considering all the previous candidates when calculating neighbood fitnesses. For a fair comparison, MAB-EA and neighborhood approach have 11,000 visits per generation; BAI mode has 10,000 visits for each generation and 10,000 additional visits in the BAI phase. The other parameters are identical for all algorithms: Ce = 20, Cp = 20, K = 20, G max = 15, Cm = 0.01. For BAI mode, Ke = 20, and SR algorithm is used in BAI phase. For neighborhood approach, neighborhood size is fixed at 5. Figure 2 compares the best conversion rates of all the algorithms over 500 independent runs. BAI mode consistently improves over the Standard Method, MAB-EA, and neighborhood approach. It both converges faster early on, and explores more efficiently later. After generation 10, BAI mode significantly outperforms MAB-EA even with less total traffic. The neighborhood approach’s performance gradually improves with the collection of more candidates. However, BAI mode is still more reliable than the neighborhood approach even in later stages. Based on the experimental results, BAI mode allows selecting a better winner, and estimates its future/true performance 0.065 UCB1 Successive Rejects Thompson Sampling Standard Method UCB1+BAI Successive Rejects+BAI Thompson Sampling+BAI Standard Method+BAI Neighborhood Approach 0.060 0.055 0 2 4 6 8 10 Generation 12 14 16 Figure 2: Best conversion rate over generations. The methods with a BAI phase perform significantly better, i.e. they allow identifying a candidate where true performance is significantly better than methods without a BAI phase. The neighborhood approach is also better than non-BAI methods, but not as good as BAI. The results are averaged over 500 independent runs, and the performance differences between BAI variants and non-BAI variants are statistically significant . more accurately. It therefore provides important improvements in practical applications. 6 Overall Conversion Rate over Generations of them can be generalized to other optimization problems with noisy fitness functions. The main idea of MAB-EA is to utilize MAB algorithms to allocate the evaluation budget. Although poorly performing candidates cannot receive sufficient traffic to accurate estimate of their true fitnesses, the optimization performance does not deteriorate. This is because the evolution pressure in EAs comes from the parent selection and survival selection, and these two steps rely primarily on those good candidates. That is, efficient detection of good candidates is more important than accurate evaluation of bad candidates. Thus, MAB algorithms reduce evaluation cost without sacrificing optimization performance. The BAI mode is a significant improvement in settings where result reliability is critical. The EA maintains an elite archive that collects good candidates throughout the optimization process. After evolution is finished, a pure exploration MAB algorithm (e.g., SR) is performed on the elite archive to select the final winner. This process amounts to a two-level winner selection, and reliability of the optimization outcome is enhanced. The additional traffic for the BAI phase is extracted from previous generations, thus no extra cost is incurred. For problems in which overall fitness during optimization matters, the new concepts in Campaign mode can be applied. Asynchronous MAB algorithms together with a high survival probability and greedy offspring generation lead to a high yet stable overall fitness during evolution. It is notable that only MAB algorithms without sharing parameters among candidates are suitable for asynchronization, such as TS and SR but not UCB1. From the experimental results in Section 4.3, neighborhood-based fitness works better than original fitness if the candidate pool is big enough. Therefore, one promising future direction is to combine neighborhood-based fitness with MAB algorithms in later optimization stages. The reliability of winner candidate should be further improved in this way. Another interesting future direction is to introduce contextual bandit algorithms [1], in which the interrelations among variables are explicitly modeled. The model will then be used by the MAB algorithms to allocate evaluation budget more efficiently. Moreover, the model can be used in the crossover or mutation operations to propagate promising variable combinations more often, thus increasing overall performance and efficiency further. Third direction is the incorporation of asynchronous statistics into BAI mode. Initializing elites in BAI phase with their statistics in the main optimization phase may further increase the reliability of best candidate. Overall Conversion Rate 0.075 0.070 0.065 0.060 UCB1 Successive Rejects Thompson Sampling Standard Method Asynchronous UCB1 Asynchronous Successive Rejects Asynchronous Thompson Sampling 0.055 0.050 0 10 20 30 Generation 40 50 Figure 3: The overall conversion rate for entire optimization process in Campaign Mode. The data point at generation д shows the overall conversion rate until generation д. The asynchronous versions of TS and SR perform significantly better than other versions, leading to better conversion rate over the entire campaign. The results are averaged over 500 independent runs, and the performance differences between asynchronous versions and original versions are statistically significant. 4.4 Effectiveness of Asynchronous MAB Algorithm in Campaign Mode The main difference between Campaign mode and MAB-EA is the new asynchronous MAB algorithm. This section verifies the effectiveness of asynchronous statistics in MAB algorithms via an empirical comparison. In the experiments, SR, TS and UCB1 are modified to run asynchronously and compared with their original versions, as well as with the Standard Method. The same parameters are used for all algorithms: Cp = 20, K = 20, Cm = 0.01, T = 10, 000. Since Campaign mode generally run for longer period of time, G max is set at 50. Figure 3 compares the results over 500 independent runs. Asynchronous SR and asynchronous TS perform significantly better than their original versions. For UCB1, the asynchronous version is better only in the early stages. This is because all the candidates in UCB1 algorithm share the parameter t (total number of visits for all the candidates). A candidate that has survived for a long period in the asynchronous variant will lead to a very large t. A significant bias towards less visited candidates will then be introduced during the traffic allocation (line 7 of Algorithm 1), thereby wasting more traffic in those unreliable candidates. The candidates in SR and TS do not share any parameters, so the Campaign mode works properly with their asynchronous versions, improving overall conversion rate during optimization significantly. 5 6 CONCLUSION This paper demonstrates how MAB algorithms can be used to make EAs more effective in uncertain environments. First, the proposed MAB-EA framework makes it possible to allocate the evaluation budget more efficiently. Second, a more reliable two-level winner selection mechanism is employed in BAI mode based on pure exploration MAB algorithms. Third, a Campaign mode with asynchronous MAB algorithms is designed to achieve high and stable overall fitness during the entire campaign. All proposed mechanisms are shown to be effective through experimental comparisons in the simulated CRO domain. The ideas and conclusions in this work can be generalized to other uncertain optimization problems as well. DISCUSSION AND FUTURE WORK The proposed mechanisms in this work solves three general issues in uncertain optimization problems: how to allocate the evaluation budget efficiently, how to make the optimization outcome reliable, and how to maintain high overall fitness during evolution. Although the new approaches are only demonstrated in the CRO domain, all 7 REFERENCES [23] Volodymyr Mnih, Csaba Szepesvári, and Jean-Yves Audibert. 2008. Empirical Bernstein Stopping. In Proceedings of the 25th International Conference on Machine Learning (ICML ’08). ACM, New York, NY, USA, 672–679. https://doi.org/10.1145/ 1390156.1390241 [24] Herbert Robbins. 1952. Some aspects of the sequential design of experiments. Bull. Amer. Math. Soc. 58, 5 (09 1952), 527–535. https://projecteuclid.org:443/ euclid.bams/1183517370 [25] Khalid Salehd and Ayat Shukairy. 2011. Conversion Optimization: The Art and Science of Converting Prospects to Customers. O’Reilly Media, Inc., Sebastopol, CA. [26] Steven L. Scott. 2010. A Modern Bayesian Look at the Multi-armed Bandit. Appl. Stoch. Model. Bus. Ind. 26, 6 (Nov. 2010), 639–658. https://doi.org/10.1002/asmb.874 [27] William R. Thompson. 1933. On the Likelihood that One Unknown Probability Exceeds Another in View of the Evidence of Two Samples. Biometrika 25, 3/4 (1933), 285–294. http://www.jstor.org/stable/2332286 [28] Richard Weber. 1992. On the Gittins Index for Multiarmed Bandits. The Annals of Applied Probability 2, 4 (1992), 1024–1033. http://www.jstor.org/stable/2959678 [1] Alekh Agarwal, Daniel J. Hsu, Satyen Kale, John Langford, Lihong Li, and Robert E. Schapire. 2014. Taming the Monster: A Fast and Simple Algorithm for Contextual Bandits. CoRR abs/1402.0555 (2014). arXiv:1402.0555 [2] Shipra Agrawal and Navin Goyal. 2012. Analysis of Thompson Sampling for the Multi-armed Bandit Problem. In COLT 2012 - The 25th Annual Conference on Learning Theory, June 25-27, 2012, Edinburgh, Scotland. 39.1–39.26. http://www. jmlr.org/proceedings/papers/v23/agrawal12/agrawal12.pdf [3] Jean-Yves Audibert and Sébastien Bubeck. 2010. Best Arm Identification in Multi-Armed Bandits. https://www.microsoft.com/en-us/research/publication/ best-arm-identification-multi-armed-bandits/ [4] Peter Auer, Nicolò Cesa-Bianchi, and Paul Fischer. 2002. Finite-time Analysis of the Multiarmed Bandit Problem. Machine Learning 47, 2 (01 May 2002), 235–256. https://doi.org/10.1023/A:1013689704352 [5] Sébastien Bubeck, Rémi Munos, and Gilles Stoltz. 2009. Pure Exploration in Multiarmed Bandits Problems. Springer Berlin Heidelberg, Berlin, Heidelberg, 23–37. https://doi.org/10.1007/978-3-642-04414-4_7 [6] Olivier Chapelle and Lihong Li. 2011. An Empirical Evaluation of Thompson Sampling. In Proceedings of the 24th International Conference on Neural Information Processing Systems (NIPS’11). Curran Associates Inc., USA, 2249–2257. http://dl. acm.org/citation.cfm?id=2986459.2986710 [7] Herman Chernoff. 1952. A Measure of Asymptotic Efficiency for Tests of a Hypothesis Based on the sum of Observations. The Annals of Mathematical Statistics 23, 4 (1952), 493–507. http://www.jstor.org/stable/2236576 [8] Carlos Domingo, Ricard Gavaldà, and Osamu Watanabe. 2002. Adaptive Sampling Methods for Scaling Up Knowledge Discovery Algorithms. Data Mining and Knowledge Discovery 6, 2 (01 Apr 2002), 131–152. https://doi.org/10.1023/A: 1014091514039 [9] Agoston E. Eiben and Jim Smith. 2015. From evolutionary computation to the evolution of things. Nature 521 (27 05 2015), 476 EP –. http://dx.doi.org/10.1038/ nature14544 [10] Eyal Even-Dar, Shie Mannor, and Yishay Mansour. 2006. Action Elimination and Stopping Conditions for the Multi-Armed Bandit and Reinforcement Learning Problems. J. Mach. Learn. Res. 7 (Dec. 2006), 1079–1105. http://dl.acm.org/citation. cfm?id=1248547.1248586 [11] Aurélien Garivier and Olivier Cappé. 2011. The KL-UCB Algorithm for Bounded Stochastic Bandits and Beyond. (02 2011). [12] OleâĂŘChristoffer Granmo. 2010. Solving twoâĂŘarmed Bernoulli bandit problems using a Bayesian learning automaton. International Journal of Intelligent Computing and Cybernetics 3, 2 (2010), 207–234. https://doi.org/10.1108/ 17563781011049179 arXiv:https://doi.org/10.1108/17563781011049179 [13] Wassily Hoeffding. 1963. Probability Inequalities for Sums of Bounded Random Variables. J. Amer. Statist. Assoc. 58, 301 (1963), 13–30. http://www.jstor.org/ stable/2282952 [14] Yaochu Jin and J. Branke. 2005. Evolutionary optimization in uncertain environments-a survey. IEEE Transactions on Evolutionary Computation 9, 3 (June 2005), 303–317. https://doi.org/10.1109/TEVC.2005.846356 [15] Moto Kamiura and Kohei Sano. 2017. Optimism in the face of uncertainty supported by a statistically-designed multi-armed bandit algorithm. Biosystems 160, Supplement C (2017), 25 – 32. https://doi.org/10.1016/j.biosystems.2017.08.004 [16] Emilie Kaufmann, Olivier Cappe, and Aurelien Garivier. 2012. On Bayesian Upper Confidence Bounds for Bandit Problems. In Proceedings of the Fifteenth International Conference on Artificial Intelligence and Statistics (Proceedings of Machine Learning Research), Neil D. Lawrence and Mark Girolami (Eds.), Vol. 22. PMLR, La Palma, Canary Islands, 592–600. http://proceedings.mlr.press/v22/ kaufmann12.html [17] Emilie Kaufmann, Nathaniel Korda, and Rémi Munos. 2012. Thompson Sampling: An Asymptotically Optimal Finite-time Analysis. In Proceedings of the 23rd International Conference on Algorithmic Learning Theory (ALT’12). Springer-Verlag, Berlin, Heidelberg, 199–213. https://doi.org/10.1007/978-3-642-34106-9_18 [18] T.L Lai and Herbert Robbins. 1985. Asymptotically efficient adaptive allocation rules. Advances in Applied Mathematics 6, 1 (1985), 4 – 22. https://doi.org/10. 1016/0196-8858(85)90002-8 [19] Odalric-Ambrym Maillard, Remi Munos, and Gilles Stoltz. 2011. A Finite-Time Analysis of Multi-armed Bandits Problems with Kullback-Leibler Divergences. 19 (05 2011). [20] Risto Miikkulainen, Neil Iscoe, Aaron Shagrin, Ron Cordell, Sam Nazari, Cory Schoolland, Myles Brundage, Jonathan Epstein, Randy Dean, and Gurmeet Lamba. 2017. Conversion Rate Optimization Through Evolutionary Computation. In Proceedings of the Genetic and Evolutionary Computation Conference (GECCO ’17). ACM, New York, NY, USA, 1193–1199. https://doi.org/10.1145/3071178.3071312 [21] Risto Miikkulainen, Neil Iscoe, Aaron Shagrin, Ryan Rapp, Sam Nazari, Patrick McGrath, Cory Schoolland, Elyas Achkar, Myles Brundage, Jeremy Miller, Jonathan Epstein, and Gurmeet Lamba. 2018. Sentient Ascend: AI-Based Massively Multivariate Conversion Rate Optimization. In Proceedings of the Thirtieth Innovative Applications of Artificial Intelligence Conference. AAAI. http://nn.cs.utexas.edu/ ?miikkulainen:iaai18 [22] Risto Miikkulainen, Hormoz Shahrzad, Nigel Duffy, and Phil Long. 2017. How to Select a Winner in Evolutionary Optimization?. In Proceedings of the IEEE Symposium Series in Computational Intelligence. IEEE. http://nn.cs.utexas.edu/ ?miikkulainen:ssci17 8
9cs.NE
Lifting from the Deep: Convolutional 3D Pose Estimation from a Single Image arXiv:1701.00295v4 [cs.CV] 11 Oct 2017 Denis Tome University College London [email protected] Chris Russell The Turing Institute and The University of Edinburgh [email protected] Lourdes Agapito University College London [email protected] http://visual.cs.ucl.ac.uk/pubs/liftingFromTheDeep Abstract We propose a unified formulation for the problem of 3D human pose estimation from a single raw RGB image that reasons jointly about 2D joint estimation and 3D pose reconstruction to improve both tasks. We take an integrated approach that fuses probabilistic knowledge of 3D human pose with a multi-stage CNN architecture and uses the knowledge of plausible 3D landmark locations to refine the search for better 2D locations. The entire process is trained end-to-end, is extremely efficient and obtains stateof-the-art results on Human3.6M outperforming previous approaches both on 2D and 3D errors. 1. Introduction Estimating the full 3D pose of a human from a single RGB image is one of the most challenging problems in computer vision. It involves tackling two inherently ambiguous tasks. First, the 2D location of the human joints, or landmarks, must be found in the image, a problem plagued with ambiguities due to the large variations in visual appearance caused by different camera viewpoints, external and self occlusions or changes in clothing, body shape or illumination. Next, lifting the coordinates of the 2D landmarks into 3D from a single image is still an ill-posed problem – the space of possible 3D poses consistent with the 2D landmark locations of a human, is infinite. Finding the correct 3D pose that matches the image requires injecting additional information usually in the form of 3D geometric pose priors and temporal or structural constraints. We propose a new joint approach to 2D landmark detection and full 3D pose estimation from a single RGB image that takes advantage of reasoning jointly about the estimation of 2D and 3D landmark locations to improve both tasks. We propose a novel CNN architecture that learns to combine the image appearance based predictions provided by convolutional-pose-machine style 2D landmark detectors [44], with the geometric 3D skeletal information en- coded in a novel pretrained model of 3D human pose. Information captured by the 3D human pose model is embedded in the CNN architecture as an additional layer that lifts 2D landmark coordinates into 3D while imposing that they lie on the space of physically plausible poses. The advantage of integrating the output proposed by the 2D landmark location predictors – based purely on image appearance – with the 3D pose predicted by a probabilistic model, is that the 2D landmark location estimates are improved by guaranteeing that they satisfy the anatomical 3D constraints encapsulated in the human 3D pose model. In this way, both tasks clearly benefit from each other. A further advantage of our approach is that the 2D and 3D training data sources may be completely independent. The deep architecture only needs that images are annotated with 2D poses, not 3D poses. The human pose model is trained independently and exclusively from 3D mocap data. This decoupling between 2D and 3D training data presents a huge advantage since we can augment the training sets completely independently. For instance we can take advantage of extra 2D pose annotations without the need for 3D ground truth or extend the 3D training data to further mocap datasets without the need for synchronized 2D images. Our contribution: In this work, we show how to integrate a prelearned 3D human pose model directly within a novel CNN architecture (illustrated in figure 1) for joint 2D landmark and 3D human pose estimation. In contrast to preexisting methods, we do not take a pipeline approach that takes 2D landmarks as given. Instead, we show how such a model can be used as part of the CNN architecture itself, and how the architecture can learn to use physically plausible 3D reconstructions in its search for better 2D landmark locations. Our method achieves state-of-the-art results on the Human3.6M dataset both in terms of 2D and 3D errors. 2. Related Work We first describe methods that assume that 2D joint locations are provided as input and focus on solving the 3D Fusion 2D fusion predicted belief maps Fusion Loss Fusion Loss Loss Final 3D pose fused belief maps projected pose belief maps Input image 9 9 9 9 9 9 9 9 Output 2D pose 11 1 1 predicted belief maps Probabilistic 3D pose model predicted belief maps predicted belief maps projected pose belief maps Feature extraction 2D joint prediction 3D/2D projection projected pose belief maps 3D pose STAGE 1 3D lifting & projection Fusion 2D fusion fused belief maps 2D Loss STAGE 2 STAGE 6 Feature extraction 2D joint prediction 3D lifting & projection Fusion 2D Loss Feature extraction 2D joint prediction 3D lifting & projection Probabilistic 3D pose model Fusion 2D Loss Final 3D pose Figure 1: The multistage deep architecture for 2D/3D human pose estimation. Each stage produces as output a set of belief maps for the location of the 2D landmarks (one per landmark). The belief maps from each stage, as well as the image, are used as input to the next stage. Internally, each stage learns to combine: (a) belief maps provided by convolutional 2D joint predictors, with (b) projected pose belief maps, proposed by the probabilistic 3D pose model. The 3D pose layer is responsible for lifting 2D landmark coordinates into 3D and projecting them onto the space of valid 3D poses. These two belief maps are then fused into a single set of output proposals for the 2D landmark locations per stage. The accuracy of the 2D and 3D landmark locations increases progressively through the stages. The loss used at each stage requires only 2D pose annotations, not 3D. The overall architecture is fully differentiable – including the new projected-pose belief maps and 2D-fusion layers – and can be trained end-to-end using back-propagation. [Best viewed in color.] lifting problem and follow with methods that learn to estimate the 3D pose directly from images. 3D pose from known 2D joint positions: A large body of work has focused on recovering the 3D pose of people given perfect 2D joint positions as input. Early approaches [19, 34, 25, 6] took advantage of anatomical knowledge of the human skeleton or joint angle limits to recover pose from a single image. More recent methods [13, 28, 3] have focused on learning a prior statistical model of the human body directly from 3D mocap data. Non-rigid structure from motion approaches (NRSfM) also recover 3D articulated motion [8, 4, 14, 20] given known 2D correspondences for the joints in every frame of a monocular video. Their huge advantage, as unsupervised methods, is they do not need 3D training data, instead they can learn a linear basis for the 3D poses purely from 2D data. Their main drawback is their need for significant camera movement throughout the sequence to guarantee accurate 3D reconstruction. Recent work on NRSfM applied to human pose estimation has focused on escaping these limitations by the use of a linear model to represent shape variations of the human body. For instance, [10] defined a generative model based on the assumption that complex shape variations can be decomposed into a mixture of primitive shape variations and achieve competitive results. Representing human 3D pose as a linear combination of a sparse set of 3D bases, pretrained using 3D mocap data, has also proved a popular approach for articulated human motion [28, 43, 49], while [49] propose a convex relaxation to jointly estimate the coefficients of the sparse representation and the camera viewpoint [28] and [43] enforce limb length constraints. Although these approaches can reconstruct 3D pose from a single image, their best results come from imposing temporal smoothness on the reconstructions of a video sequence. Recently, Zhao et al. [47] achieved state-of-the-art results by training a simple neural network to recover 3D pose from known 2D joint positions. Although the results on perfect 2D input data are impressive, the inaccuracies in 2D joint estimation are not modeled and the performance of this approach combined with joint detectors is unknown. 3D pose from images: Most approaches to 3D pose inference directly from images fall into one of two categories: (i) models that learn to regress the 3D pose directly from image features and (ii) pipeline approaches where the 2D pose is first estimated, typically using discriminatively trained part models or joint predictors, and then lifted into 3D. While regression based methods suffer from the need to annotate all images with ground truth 3D poses – a technically complex and elaborate process – for pipeline approaches the challenge is how to account for uncertainty in the measurements. Crucial to both types of approaches is the question of how to incorporate the 3D dependencies between the different body joints or to leverage other useful 3D geometric information in the inference process. Many earlier works on human pose estimation from a single image relied on discriminatively trained models to learn a direct mapping from image features such as silhouettes, HOG or SIFT, to 3D human poses without passing through 2D landmark estimation [1, 12, 11, 24, 32]. Recent direct approaches make use of deep learning [21, 22, 40, 41]. Regression-based approaches train an end-toend network to predict 3D joint locations directly from the image [41, 21, 22, 48]. Li et al. [22] incorporate model joint dependencies in the CNN via a max-margin formalism, others [48] impose kinematic constraints by embedding a dif- ferentiable kinematic model into the deep learning architecture. Tekin et al. [35] propose a deep regression architecture for structured prediction that combines traditional CNNs for supervised learning with an auto-encoder that implicitly encodes 3D dependencies between body parts. As CNNs have become more prevalent, 2D joint estimation [44] has become increasingly reliable and many recent works have looked to exploit this using a pipeline approach. Papers such as [9, 16, 40, 26] first estimate 2D landmarks and later 3D spatial relationships are imposed between them using structured learning or graphical models. Simo-Serra et al. [33] were one of the first to propose an approach that naturally copes with the noisy detections inherent to off-the-shelf body part detectors by modeling their uncertainty and propagating it through 3D shape space while satisfying geometric and kinematic 3D constraints. The work [31] also estimates the location of 2D joints before predicting 3D pose using appearance and the probable 3D pose of discovered parts using a non-parametric model. Another recent example is Bogo et al. [7], who fit a detailed statistical 3D body model [23] to 2D joint proposals. Zhou et al. [50] tackles the problem of 3D pose estimation for a monocular image sequence integrating 2D, 3D and temporal information to account for uncertainties in the model and the measurements. Similar to our proposed approach, Zhou et al.’s method [50] does not need synchronized 2D-3D training data, i.e. it only needs 2D pose annotations to train the CNN joint regressor and a separate 3D mocap dataset to learn the 3D sparse basis. Unlike our approach, it relies on temporal smoothness for its best performance, and performs poorly on a single image. Finally, Wu et al. [45]’s 3D Interpreter Network, a recent approach to estimate the skeletal structure of common objects (chairs, sofas, ...) bears similarities with our method. Although our approaches share common ground in the decoupling of 3D and 2D training data and the use of projection from 3D to improve 2D predictions the network architectures are very different and, unlike us, they do not carry out a quantitative evaluation on 3D human pose estimation. 3. Network Architecture Figure 1 illustrates the main contribution of our approach, a new multi-stage CNN architecture that can be trained end-to-end to estimate jointly 2D and 3D joint locations. Crucially it includes a novel layer, based on a probabilistic 3D model of human pose, responsible for lifting 2D poses into 3D and propagating 3D information about the skeletal structure to the 2D convolutional layers. In this way, the prediction of 2D pose benefits from the 3D information encoded. Section 4 describes the new probabilistic 3D model of human pose, trained on a dataset of 3D mocap data. Section 5 describes all the new components and layers of the CNN architecture. Finally, Section 6 describes experimental evaluation on the Human3.6M dataset where we obtain state-of-the-art results. In addition we show qualitative results on images from the MPII and Leeds datasets. 4. Probabilistic 3D Model of Human Pose One fundamental challenge in creating models of human poses lies in the lack of access to 3D data of sufficient variety to characterize the space of human poses. To compensate for this lack of data we identify and eliminate confounding factors such as rotation in the ground plane, limb length, and left-right symmetry that lead to conceptually similar poses being unrecognized in the training data. Simple preprocessing eliminates some factors. Size variance is addressed by normalizing the data such that the sum of squared limb lengths on the human skeleton is one; while left-right symmetry is exploited by flipping each pose in the x-axis and re-annotating left as right and vice-versa. 4.1. Aligning 3D Human Poses in the Training Set Allowing for rotational invariance in the ground-plane is more challenging and requires integration with the data model. We seek the optimal rotations for each pose such that after rotating the poses they are closely approximated by a low-rank compact Gaussian distribution. We formulate this as a problem of optimization over a set of variables. Given a set of N training 3D poses, each represented as a (3 × L) matrix Pi of 3D landmark locations, where i ∈ {1, 2, .., N } and L is the number of human joints/landmarks; we seek global estimates of an average 3D pose µ, a set of J orthonormal basis matrices1 e and noise variance σ, alongside per sample rotations Ri and basis coefficients ai to minimize the following estimate arg min N X R,µ,a,e,σ i=1 ||Pi − Ri (µ + ai · e) ||22 + (1) J J X X  (ai,j · σj )2 + ln σj2 j=1 j=1 Where ai · e = j ai,j ej is the tensor analog of a multiplication between a vector and a matrix, and || · ||22 is the squared Frobenius norm of the matrix. Here the y-axis is assumed to point up, and the rotation matrices Ri considered are ground plane rotations. With the large number of 3D pose samples considered (of the order of 1 million when training on the Human3.6M dataset [15]), and the complex inter-dependencies between samples for e and σ, the memory requirements mean that it is not possible to solve directly as a joint optimization over all variables using a nonlinear solver such as Ceres. Instead, we carefully initialize P 1 When we say e is a set of orthonormal basis matrices we mean that each matrix, if unwrapped into a vector, is of unit norm and orthogonal to all other unwrapped matrices. e) f) d) h) c) b) a) g) Figure 2: Visualization of the 3D training data after alignment (see section 4.1) using 2D PCA. Notice how all poses have the same orientation. Standing-up poses a), b), c) and d) are all close to each other and far from sitting-down poses f) and h) which form another clear cluster. and alternate between performing closed-form PPCA [38] to update µ, a, e, σ; and updating Ri using Ceres [2] to minimize the above error. As we do this, we steadily increase the size of the basis from 1 through to its target size J. This stops apparent deformations that could be resolved through rotations from becoming locked into the basis at an early stage, and empirically leads to lower cost solutions. To initialize we use a variant of the Tomasi-Kanade [39] algorithm to estimate the mean 3D pose µ. As the y component is not altered by planar rotations, we take as our estimate of the y component of µ, the mean of each point in the y direction. For the x and z components, we interleave the x and z components of each sample and concatenate them into a large 2 N × L matrix M, and find the rank two approximation of this such that M ≈ A · B. We then calculate  by replacing each adjacent pair of rows of A with the closest orthonormal matrix of rank two, and take † M as our estimate2 of the x and z components of µ. The end result of this optimization is a compact lowrank approximation of the data in which all reconstructed poses appear to have the same orientation (see Figure 2). In the next section we extend the model to be described as a multi-modal distribution to better capture the variations in the space of 3D human poses. 4.2. A Multi-Modal Model of 3D Human Pose Although the learned Gaussian model of section 4.1 can be directly used to estimate the 3D (see Table 1), inspection of figure 2 shows that the data is not Gaussian distributed and is better described using a multiple modal distribution. In doing this, we are heavily inspired both by approaches such as [27] which characterize the space of 2 A† being the pseudo-inverse of A. human poses as a mixture of PCA bases, and by related works such as [42, 8] that represent poses as an interpolation between exemplars. These approaches are extremely good at modeling tightly distributed poses (e.g. walking) where samples in the testing data are likely to be close to poses seen in training. This is emphatically not the case in much of the Human3.6M dataset, which we use for evaluation. Zooming in on the edges of Figure 2 reveals many isolated paths where motions occur once and are never revisited again. Nonetheless, it is precisely these regions of low-density that we are interested in modeling. As such, we seek a coarse representation of the pose space that says something about the regions of low density but also characterizes the multi-modal nature of the pose space. We represent the data as a mixture of probabilistic PCA models using few clusters, and trained using the EM-algorithm [38]. When using a small number of clusters, it is important to initialize the algorithm correctly, as accidentally initializing with multiple clusters about a single mode, can lead to poor density estimates. To initialize we make use of a simple heuristic. We first subsample the aligned poses (which we refer to as P ), and then compute the Euclidean distance d among pairs. We seek a set of k samples S such that the distance between points and their nearest sample is minimized X arg min min d(s, p) (2) S p∈P s∈S We find S using greedy selection, holding our previous estimate of S constant, and iteratively selecting the next candidate s such that {s} ∪ S minimizes the above cost. A selection of 3D pose samples found using this procedure can be seen in the rendered poses of Figure 2. In practice, we stop proposing candidates when they occur too close to the existing candidates, as shown by samples (a–d), and only choose one candidate from the dominant mode. Given these candidates for cluster centers, we assign each aligned point to a cluster representing its nearest candidate and then run the EM algorithm of [38], building a mixture of probabilistic PCA bases. 5. A New Convolutional Architecture for 2D and 3D Pose Inference Our 3D pose inference from a single RGB image makes use of a multistage deep convolutional architecture, trained end-to-end, that repeatedly fuses and refines 2D and 3D poses, and a second module which takes the final predicted 2D landmarks and lifts them one last time into 3D space for the final estimate (see Figure 1). At its heart, the architecture is a novel refinement of the Convolutional Pose Machine of Wei et al. [44], who reasoned exclusively in 2D, and proposed an architecture that Stage 1 Stage 2 Stage 3 Stage 4 Stage 5 Stage 6 Stage 1 Stage 2 Stage 3 Stage 4 Stage 5 Stage 6 9.19 mm 7.30 mm 6.64 mm 3.34 mm 3.28 mm 3.10 mm Figure 3: Results returned by different stages of the architecture. Top Left: Evolution of the 2D skeleton after projecting the 3D points back into the 2D space; Bottom Left: Evolution of the beliefs for the landmark Left hand through the stages. Right: 3D skeleton with the relative mean error per landmark in millimeters. Even with incorrect landmark locations, the model returns a physically plausible solution. iteratively refined 2D pose estimations of landmarks using a mixture of knowledge of the image and of the estimates of landmark locations of the previous stage. We modify this architecture by generating, at each stage, projected 3D pose belief maps which are fused in a learned manner with the standard maps. From an implementation point of view this is done by introducing two distinct layers, the probabilistic 3D pose layer and the fusion layer (see Figure 1). Figure 3 shows how the 2D uncertainty in the belief maps is reduced at each stage of the architecture and how the accuracy of the 3D poses increases with each stage. 5.1. Architecture of each stage The sequential architecture consists of 6 stages. Each stage consists of 4 distinct components (see Figure 1): Predicting CNN-based belief-maps: we use a set of convolutional and pooling layers, equivalent to those used in the original CPM architecture [44], that combine evidence obtained from image learned features with the belief maps obtained from the previous stage (t − 1) to predict an updated set of belief maps for the 2D human joint positions. Lifting 2D belief-maps into 3D: the output of the CNNbased belief maps is taken as input to a new layer that uses new pretrained probabilistic 3D human pose model to lift the proposed 2D poses into 3D. Projected 2D pose belief maps: The 3D pose estimated by the previous layer is projected back onto the image plane to produce a new set of projected pose belief maps. These maps encapsulate 3D dependencies between the body parts. 2D Fusion layer: The final layer in each stage (described in section 5.5) learns the weights to fuse the two sets of belief maps into a single estimate passed to the next stage. Final lifting: The belief maps produced as the output of the final stage (t = 6) are then lifted into 3D to give the final estimate for the pose (see Figure 1) using our algorithm to lift 2D poses into 3D. 5.2. Predicting CNN-based belief-maps Convolutional Pose Machines [44] can be understood as an updating of the earlier work of Ramakrishna et al. [29] to use a deep convolutional architecture. In both approaches, at each stage t and for each landmark p, the algorithm returns dense per pixel belief maps bpt [u, v], which show how confident it is that a joint center or landmark occurs in any given pixel (u, v). For stages t ∈ {2, . . . , T } the belief maps are a function of not just the information contained in the image but also the information computed by the previous stage. In the case of convolutional pose machines, and in our work which uses the same architecture, a summary of the convolution widths and architecture design is shown in Figure 1, with more details of training given in [44]. Both [29, 44] predict the locations of different landmarks to those captured in the Human3.6M dataset. As such the input and output layers in each stage of the architecture are replaced with a larger set to account for the greater number of landmarks. The new architecture is then initialized by using the weights with those found in CPM’s model for all preexisting layers, with the new layers randomly initialized. After retraining, CPMs return per-pixel estimates of landmark locations, while the techniques for 3D estimation (described in the next section) make use of 2D locations. To transform these belief maps into locations, we select the most confident pixel as the location of each landmark Yp = arg max bp [u, v] (3) (u,v) 5.3. Lifting 2D belief-maps into 3D We follow [50] in assuming a weak perspective model, and first describe the simplest case of estimating the 3D pose of a single frame using a unimodal Gaussian 3D pose model as described in section 4. This model is composed of a mean shape µ, a set of basis matrices e and variances σ 2 , and from this we can compute the most probable sample Results from the Human3.6M dataset 1.5 1.5 1.0Z 0.5 0.0 1.0 0.5 0.4 -0.4 1.5 1.5 Z 1.0 1.0 0.5 0.5 2.0 1.5 Z 1.0 Z 0.5 0.0 0.0 -0.3 Y 0 0.1.0 -0.3 0.0 0.2 X 0.0 .3 -0 Y X 0.2.0 0 .2 -0 0.4 0.2 .0 0 .3 -0 -0.3 00.1.0 Y 2.0 0.0 X 0.0 0.2 -0 0 .1 0.1.0 X 2.0 -0.4 Y X 0.0 Y Z 0.0 0.3 0.0 .2 -0 0.0 .3 -0 -0.1 00.1.0 1.5 1.0Z 0.5 0.0 0.4 X Success cases from MPII and Leeds Y 2.0 0.5 0.0 0.0 -2.2 Y 0.6 X -0.6 X 0.0 0.0 -0.4 0.0 .3 -0 0.0 -0.2 0 0.1.0 0.8 0.5 0.4 Y Z 1.0 0.5 0.0 -0.3 0 0.1.0 1.5 1.0 Z Z 0.5 X Failure cases from MPII and Leeds 1.5 1.5 1.0 Y 2.0 1.5 Z 1.0 0.5 0.0 1.0 0.4 -1.2 X Y 0.7 0.0 -0.5 0.0 0.2 -0.5 -0.7 Y 0.0 X -0.4 -0.5 0.0 0.0 0.0 0.2 Z 1.0 0.5 0.0 0.6 Y Z 0.5 0.0 X 2.0 1.5 1.5 1.0 Figure 4: Left: Results from the Human3.6M dataset. The identified 2D landmark positions and 3D skeleton is shown for each pose taken from different actions: Walking, Phoning, Greeting, Discussion, Sitting Down. Right: Results on images from the MPII [5] (columns 1 to 3) and Leeds [18] datasets (last column). The model was not trained on images as diverse as those contained in these datasets, however it often retrieves correct 2D and 3D joint positions. The last row shows example cases where the method fails either in the identification of 2D or 3D landmarks. 2D Pose refinement in Human3.6M Figure 5: Landmark refinement: Left: 2D predicted landmark positions; Right: improved predictions using the projected 3D pose. from the model that could give rise to a projected image. arg min ||Y − sΠER(µ + a · e)||22 + ||σ · a||22 (4) R,a Where Π is the orthographic projection matrix, E a known external camera calibration matrix, and s the estimated perframe scale. Although, given R this problem is convex in a and s together3 , for an unknown rotation matrix R the problem is extremely non-convex – even if a is known – and prone to sticking in local minima using gradient descent. Local optima often lie far apart in pose space and a poor optima leads to a significantly worse 3D reconstructions. We take advantage of the matrix R’s restricted form that allows it to be parameterized in terms of a single angle θ. Rather than attempting to solve this optimization problem 3 To see this consider the trivial reparameterization where we solve for sµ + b · e and then let a = b/s. using local methods we quantize over the space of possible rotations, and for each choice of rotation, we hold this fixed and solve for s and a, before picking the minimum cost solution of any choice of R. With fixed choices of rotation the terms ΠERµ and ΠERe can be precomputed and finding the optimal a becomes a simple linear least square problem. This process is highly efficient and by oversampling the rotations and exhaustively checking in 10, 000 locations we can guarantee that a solution extremely close to the global optima is found. In practice, using 20 samples and refining the rotations and basis coefficients of the best found solution using a non-linear least squares solver obtains the same reconstruction, and we make use of the faster option of checking 80 locations and using the best found solution as our 3D estimate. This puts us close to the global optima and has the same average accuracy as finding the global optima. Moreover, it allows us to upgrade from sparse landmark locations to 3D using a single Gaussian at around 3,000 frames a second using python code on a standard laptop. To handle models consisting of a mixture of Gaussians, we follow [27] and simply solve for each Gaussian independently and select the most probably solution. 5.4. Projecting 3D poses onto 2D belief maps The projected pose model is interleaved throughout the architecture (see Figure 1). The goal is to correct the beliefs regarding landmark locations at each stage, by fusing extra information about 3D physical plausibility. Given the solution R, s, and a from the previous component, we estimate a physically plausible projected 3D pose as Ŷ = sΠER(µ + a · e) (5) Directions Discussion Eating Greeting Phoning Photo Posing Purchases LinKDE [15] Li et al. [22] Tekin et al. [37] Tekin et al. [35] Tekin et al. [36] Zhou et al. [50] Sanzari et al. [31] 132.71 102.39 85.03 87.36 48.82 183.55 136.88 158.52 129.06 108.79 109.31 56.31 132.37 96.94 87.95 91.43 84.38 87.05 95.98 164.39 124.74 126.83 121.68 98.94 103.16 84.78 162.12 118.37 119.39 116.18 96.47 205.94 168.68 185.02 162.17 95.65 143.32 105.58 150.61 114.69 98.49 106.88 66.30 171.31 107.61 93.77 99.78 107.41 Ours - Single PPCA Model Ours - Mixture PPCA Model 68.55 64.98 78.27 73.47 77.22 76.82 89.05 86.43 91.63 86.28 110.05 110.67 74.92 68.93 83.71 74.79 Sitting Sitting Down Smoking Waiting Walk Dog Walking Walk Together Average LinKDE [15] Li et al. [22] Tekin et al. [37] Tekin et al. [35] Tekin et al. [36] Zhou et al. [50] Sanzari et al. [31] 151.57 136.15 73.76 124.52 116.89 243.03 205.65 170.4 199.23 129.63 162.14 118.21 85.08 107.42 97.84 170.69 146.66 116.91 118.09 65.94 177.13 132.17 128.11 130.53 113.72 114.23 130.46 96.60 69.97 65.86 65.75 62.08 79.39 92.58 127.88 77.21 94.83 97.70 102.21 162.14 125.28 100.08 113.01 93.15 Ours - Single PPCA Model Ours - Mixture PPCA Model 115.94 110.19 185.72 173.91 88.25 84.95 88.73 85.78 92.37 86.26 76.48 71.36 77.95 73.14 92.96 88.39 Table 1: A comparison of the 3D pose estimation results of our approach on the Human3.6M dataset against competitors that follow Protocol #1 for evaluation (3D errors are given in mm). We substantially outperform all other methods in terms of average error showing a 4.7mm average improvement over our closest competitor. Note that some approaches [37, 50] use video as input instead of a single frame. which is then embedded in a belief map as ( 1 if(i, j) = Ŷp p b̂i,j = 0 otherwise. (6) and then convolved using Gaussian filters. 5.5. 2D Fusion of belief maps The 2D belief maps predicted by the probabilistic 3D pose model are fused with the CNN-based belief maps bp according to the following equation ftp = wt ∗ bpt + (1 − wt ) ∗ b̂pt (7) where wt ∈ [0, 1] is a weight trained as part of the end-toend learning. This set of fused belief maps ft is then passed to the next stage and used as an input to guide the 2D reestimation of joint locations, instead of the belief maps bt used by convolutional pose machines. 5.6. The Objective and Training Following [44], the objective or cost function ct minimized at each stage is the the squared distance between the generated fusion maps of the layer ftp , and ground-truth belief maps bp∗ generated by Gaussian blurring the sparse ground-truth locations of each landmark p ct = L+1 X X p=1 z∈Z ||ftp − bp∗ ||22 (8) For end-to-end training the total loss is the sum over all P layers t≤6 ct . The novel layers were implemented as an extension of the published code of Convolutional Pose Machines [44] inside the Caffe framework [17] as Python layers, with weights updated using Stochastic Gradient Descent with momentum. Details of the novel gradient updates used lifting estimates through 3d pose space are given in the supplementary materials. 6. Experimental evaluation Human3.6M dataset: The model was trained and tested on the Human3.6M dataset consisting of 3.6 million accurate 3D human poses [15]. This is a video and mocap dataset of 5 female and 6 male subjects, captured from 4 different viewpoints, that show them performing typical activities (talking on the phone, walking, greeting, eating, etc.). 2D Evaluation: Figure 5 shows how the 2D predictions are improved by the projected pose model, reducing the overall mean error per landmark. The 2D error reduction using our full approach over the estimates of [44] is comparable in magnitude to the improvement due to the change of architecture moving from the work Zhou et al. [50] to the state-of-the-art 2d architecture [44] (i.e. a reduction of 0.59 pixels vs. 0.81 pixels). See Table 2 for details. 3D Evaluation: Several evaluation protocols have been followed by different authors to measure the performance of their 3D pose estimation methods on the Human3.6M dataset. Tables 1 and 2 show comparisons of the 3D pose Evaluation of 3D error (mm) Yasin et al. [46] Rogez et al. [30] Ours - Mixture PPCA Model Evaluation of 3D error (mm) Bogo et al. [7] Ours - Mixture PPCA Model Protocol #2 108.3 88.1 70.7 Protocol #3 82.3 79.6 Evaluation of 2D pixel error Zhou et al. [50] 10.85 Trained CPM [44] architecture Ours using 3D refinement 10.04 9.47 Table 2: Further evaluation on the Human3.6M dataset. Top two tables compare our 3D pose estimation errors against competitors on Protocols #2 or #3. Bottom table compares our 2D pose estimation error against competitors. Our approach, which lifts the 2D landmark predictions into a plausible 3D model and then projects them back into the image, substantially reduces the error. Note that [50] use video as input and knowledge of the action label. estimation with previous works, where we take care to evaluate using the appropriate protocol. Protocol #1, the most standard evaluation protocol on Human3.6M, was followed by [15, 22, 37, 35, 36, 50, 31]. The training set consists of 5 subjects (S1, S5, S6, S7, S8), while the test set includes 2 subjects (S9, S11). The original frame rate of 50 FPS is down-sampled to 10 FPS and the evaluation is on sequences coming from all 4 cameras and all trials. The reported error metric is the 3D error i.e. the Euclidean distance from the estimated 3D joints to the ground truth, averaged over all 17 joints of the Human3.6M skeletal model. Table 1 shows a comparison between our approach and competing approaches using Protocol #1. Our baseline method using a single unimodal probabilistic PCA model outperforms almost every method in most action types, with the exception of Sanzari et al. [31], which it still outperforms on average across the entire dataset. The mixture model improves on this again, offering a 4.76mm improvement over Sanzari et al., our closest competitor. Protocol #2, followed by [46, 30], selects 6 subjects (S1, S5, S6, S7, S8 and S9) for training and subject S11 for testing. The original video is down-sampled to every 64th frame and evaluation is performed on sequences from all 4 cameras and all trials. The error metric reported in this case is the 3D pose error equivalent to the per-joint 3D error up to a similarity transformation (i.e. each estimated 3D pose is aligned with the ground truth pose, on a per-frame basis, using Procrustes analysis). The error is averaged over 14 joints. Table 2 shows a comparison between our approach and other approaches that use Protocol #2. Although, our model was trained using only the 5 subjects used for training in Protocol #1 (one fewer subject), it still outperforms the other methods [30, 46]. Protocol #3, followed by [7], selects the same subjects for training and testing as Protocol #1. However, evaluation is only on sequences captured from the frontal camera (“cam 3”) from trial 1 and the original video is not subsampled. The error metric used in this case is the 3D pose error as described in Protocol #2. The error is averaged over a subset of 14 joints. Table 2 shows a comparison between our approach and [7]. Our method outperforms Bogo et al. [7] by almost 3mm on average, even though Bogo et al. exploits a high-quality detailed statistical 3D body model [23] trained on thousands of 3D body scans, that captures both the variation of human body shape and its deformation through pose. MPII and Leeds datasets: The proposed approach trained exclusively on the Human3.6M dataset can be used to identify 2D and 3D landmarks of images contained in different datasets. Figure 4 shows some qualitative results on the MPII dataset [5] and on the Leeds dataset [18], including failure cases. Notice how the probabilistic 3D pose model generates anatomically plausible poses even though the 2D landmark estimations are not all correct. However, as shown in bottom row, even small errors in 2D pose can lead to drastically different 3D poses. These inaccuracies could be mitigated without further 3D data by annotating additional RGB images for training from different datasets. 7. Conclusion We have presented a novel approach to human 3D pose estimation from a single image that outperforms previous solutions. We approach this as a problem of iterative refinement in which 3D proposals help refine and improve upon the 2D estimates. Our approach shows the importance of thinking in 3D even for 2D pose estimation within a single image, with our method demonstrating better 2D accuracy than [44], the 2D approach it is based upon. Our novel approach for upgrading from 2D to 3D is extremely efficient. When using 3 models, as in Tables 1 and 2, the upgrade for each stage in CPU-based Python code runs at approximately 1,000 frames a second, while a GPU-based realtime approach for Convolutional Pose Machines has been announced. Integrating these systems to provide a reliable real-time 3D pose estimator is a natural future direction, as is integrating this work with a simpler 2D approach for realtime pose estimation on lower power devices. Acknowledgments This work was funded by the SecondHands project, from the European Union’s Horizon 2020 Research and Innovation programme under grant agreement No 643950. Chris Russell was partially supported by The Alan Turing Institute under EPSRC grant EP/N510129/1. References [1] A. Agarwal and B. Triggs. Recovering 3d human pose from monocular images. IEEE transactions on pattern analysis and machine intelligence, 28(1):44–58, 2006. 2 [2] S. Agarwal, K. Mierle, and Others. Ceres solver. http: //ceres-solver.org. 4 [3] I. Akhter and M. J. Black. Pose-conditioned joint angle limits for 3d human pose reconstruction. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pages 1446–1455, 2015. 2 [4] I. Akhter, Y. Sheikh, S. Khan, and T. Kanade. Trajectory space: A dual representation for nonrigid structure from motion. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2011. 2 [5] M. Andriluka, L. Pishchulin, P. Gehler, and B. Schiele. Human pose estimation: New benchmark and state of the art analysis. In IEEE Conference on Computer Vision and Pattern Recognition (CVPR), 2014. 6, 8 [6] C. Barrón and I. A. Kakadiaris. Estimating anthropometry and pose from a single uncalibrated image. Computer Vision and Image Understanding, 81(3):269–284, 2001. 2 [7] F. Bogo, A. Kanazawa, C. Lassner, P. Gehler, J. Romero, and M. J. Black. Keep it smpl: Automatic estimation of 3d human pose and shape from a single image. In European Conference on Computer Vision, pages 561–578. Springer, 2016. 3, 8 [8] C. Bregler, A. Hertzmann, and H. Biermann. Recovering non-rigid 3d shape from image streams. In Computer Vision and Pattern Recognition, 2000. Proceedings. IEEE Conference on, volume 2, pages 690–696. IEEE, 2000. 2, 4 [9] X. Chen and A. L. Yuille. Articulated pose estimation by a graphical model with image dependent pairwise relations. In Advances in Neural Information Processing Systems, pages 1736–1744, 2014. 3 [10] J. Cho, M. Lee, and S. Oh. Complex non-rigid 3d shape recovery using a procrustean normal distribution mixture model. International Journal of Computer Vision, 117(3):226–246, 2016. 2 [11] C. H. Ek, P. H. S. Torr, and N. D. Lawrence. Gaussian process latent variable models for human pose estimation. In A. Popescu-Belis, S. Renals, and H. Bourlard, editors, MLMI, volume 4892 of Lecture Notes in Computer Science, pages 132–143. Springer, 2007. 2 [12] A. Elgammal and C. Lee. Inferring 3d body pose from silhouettes using activity manifold learning. In CVPR, 2004. 2 [13] X. Fan, K. Zheng, Y. Zhou, and S. Wang. Pose locality constrained representation for 3d human pose reconstruction. In European Conference on Computer Vision, pages 174–188. Springer, 2014. 2 [14] P. Gotardo and A. Martinez. Computing smooth time trajectories for camera and deformable shape in structure from motion with occlusion. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2011. 2 [15] C. Ionescu, D. Papava, V. Olaru, and C. Sminchisescu. Human3. 6m: Large scale datasets and predictive methods for 3d human sensing in natural environments. IEEE [16] [17] [18] [19] [20] [21] [22] [23] [24] [25] [26] [27] [28] [29] [30] transactions on pattern analysis and machine intelligence, 36(7):1325–1339, 2014. 3, 7, 8 A. Jain, J. Tompson, M. Andriluka, G. W. Taylor, and C. Bregler. Learning human pose estimation features with convolutional networks. arXiv preprint arXiv:1312.7302, 2013. 3 Y. Jia, E. Shelhamer, J. Donahue, S. Karayev, J. Long, R. Girshick, S. Guadarrama, and T. Darrell. Caffe: Convolutional architecture for fast feature embedding. arXiv preprint arXiv:1408.5093, 2014. 7 S. Johnson and M. Everingham. Clustered pose and nonlinear appearance models for human pose estimation. In Proceedings of the British Machine Vision Conference, 2010. doi:10.5244/C.24.12. 6, 8 H.-J. Lee and Z. Chen. Determination of 3d human body postures from a single view. Computer Vision, Graphics, and Image Processing, 30(2):148–168, 1985. 2 M. Lee, J. Cho, and S. Oh. Procrustean normal distribution for non-rigid structure from motion. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2016. 2 S. Li and A. B. Chan. 3d human pose estimation from monocular images with deep convolutional neural network. In Asian Conference on Computer Vision, pages 332–347. Springer, 2014. 2 S. Li, W. Zhang, and A. B. Chan. Maximum-margin structured learning with deep networks for 3d human pose estimation. In Proceedings of the IEEE International Conference on Computer Vision, pages 2848–2856, 2015. 2, 7, 8 M. Loper, N. Mahmood, J. Romero, G. Pons-Moll, and M. J. Black. Smpl: A skinned multi-person linear model. ACM Transactions on Graphics (TOG), 34(6):248, 2015. 3, 8 G. Mori and J. Malik. Recovering 3d human body configurations using shape contexts. PAMI, 2006. 2 V. Parameswaran and R. Chellappa. View independent human body pose estimation from a single perspective image. In Computer Vision and Pattern Recognition, 2004. CVPR 2004. Proceedings of the 2004 IEEE Computer Society Conference on, volume 2, pages II–16. IEEE, 2004. 2 T. Pfister, J. Charles, and A. Zisserman. Flowing convnets for human pose estimation in videos. In Proceedings of the IEEE International Conference on Computer Vision, pages 1913–1921, 2015. 3 N. Pitelis, C. Russell, and L. Agapito. Learning a manifold as an atlas. In Computer Vision and Pattern Recognition (CVPR), 2013 IEEE Conference on, pages 1642–1649. IEEE, 2013. 4, 6 V. Ramakrishna, T. Kanade, and Y. Sheikh. Reconstructing 3d human pose from 2d image landmarks. In European Conference on Computer Vision, pages 573–586. Springer, 2012. 2 V. Ramakrishna, D. Munoz, M. Hebert, J. A. Bagnell, and Y. Sheikh. Pose machines: Articulated pose estimation via inference machines. In European Conference on Computer Vision, pages 33–47. Springer, 2014. 5 G. Rogez and C. Schmid. Mocap-guided data augmentation for 3d pose estimation in the wild. In Advances in Neural Information Processing Systems, pages 3108–3116, 2016. 8 [31] M. Sanzari, V. Ntouskos, and F. Pirri. Bayesian image based 3d pose estimation. In European Conference on Computer Vision, pages 566–582. Springer, 2016. 3, 7, 8 [32] L. Sigal, R. Memisevic, and D. Fleet. Shared kernel information embedding for discriminative inference. In CVPR, 2009. 2 [33] E. Simo-Serra, A. Ramisa, G. Alenyà, C. Torras, and F. Moreno-Noguer. Single image 3d human pose estimation from noisy observations. In Computer Vision and Pattern Recognition (CVPR), 2012 IEEE Conference on, pages 2673–2680. IEEE, 2012. 3 [34] C. J. Taylor. Reconstruction of articulated objects from point correspondences in a single uncalibrated image. In Computer Vision and Pattern Recognition, 2000. Proceedings. IEEE Conference on, volume 1, pages 677–684. IEEE, 2000. 2 [35] B. Tekin, I. Katircioglu, M. Salzmann, V. Lepetit, and P. Fua. Structured prediction of 3d human pose with deep neural networks. In British Machine Vision Conference (BMVC), 2016. 3, 7, 8 [36] B. Tekin, P. Márquez-Neila, M. Salzmann, and P. Fua. Fusing 2d uncertainty and 3d cues for monocular body pose estimation. arXiv preprint arXiv:1611.05708, 2016. 7, 8 [37] B. Tekin, X. Sun, X. Wang, V. Lepetit, and P. Fua. Predicting people’s 3d poses from short sequences. arXiv preprint arXiv:1504.08200, 2015. 7, 8 [38] M. E. Tipping and C. M. Bishop. Probabilistic principal component analysis. Journal of the Royal Statistical Society, Series B, 61:611–622, 1999. 4 [39] C. Tomasi and T. Kanade. Shape and motion from image streams under orthography: a factorization method. International Journal of Computer Vision, 9(2):137–154, 1992. 4 [40] J. J. Tompson, A. Jain, Y. LeCun, and C. Bregler. Joint training of a convolutional network and a graphical model for human pose estimation. In Advances in neural information processing systems, pages 1799–1807, 2014. 2, 3 [41] A. Toshev and C. Szegedy. Deeppose: Human pose estimation via deep neural networks. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pages 1653–1660, 2014. 2 [42] C. Wang, J. Flynn, Y. Wang, and A. L. Yuille. Representing data by a mixture of activated simplices. arXiv preprint arXiv:1412.4102, 2014. 4 [43] C. Wang, Y. Wang, Z. Lin, , A. Yuille, and W. Gao. Robust estimation of human poses from a single image. In Computer Vision and Pattern Recognition (CVPR), 2014. 2 [44] S.-E. Wei, V. Ramakrishna, T. Kanade, and Y. Sheikh. Convolutional pose machines. arXiv preprint arXiv:1602.00134, 2016. 1, 3, 4, 5, 7, 8 [45] J. Wu, T. Xue, J. J. Lim, Y. Tian, J. B. Tenenbaum, A. Torralba, and W. T. Freeman. Single image 3d interpreter network. In European Conference on Computer Vision, pages 365–382. Springer, 2016. 3 [46] H. Yasin, U. Iqbal, B. Kruger, A. Weber, and J. Gall. A dual-source approach for 3d pose estimation from a single image. In IEEE Conference on Computer Vision and Pattern Recognition (CVPR), 2016. 8 [47] R. Zhao, Y. Wang, and A. Martinez. A simple, fast and highly-accurate algorithm to recover 3d shape from 2d landmarks on a single image. arXiv preprint arXiv:1609.09058, 2016. 2 [48] X. Zhou, X. Sun, W. Zhang, S. Liang, and Y. Wei. Deep kinematic pose regression. arXiv preprint arXiv:1609.05317, 2016. 2 [49] X. Zhou, M. Zhu, S. Leonardos, and K. Daniilidis. Sparse representation for 3d shape estimation: A convex relaxation approach. arXiv preprint arXiv:1509.04309, 2015. 2 [50] X. Zhou, M. Zhu, S. Leonardos, K. Derpanis, and K. Daniilidis. Sparseness meets deepness: 3d human pose estimation from monocular video. arXiv preprint arXiv:1511.09439, 2015. 3, 5, 7, 8 Supplementary Material 1. Computing derivatives for back-propagation through our lifted model As discussed by the Convolution Pose Machine paper [1] recurrent like architectures such as ours have problems with vanishing gradients and for effective training they require an additional loss function to be defined for each layer, that independently drives each individual layer to return correct predictions regardless of how this information is used in subsequent layers. Before we give the derivation of the gradients it should be emphasized that it is entirely possible to train the network without using them – in fact similar results can be obtained by only using the 3D lifting for the forward pass, and not back-propagating the lifting derivatives through the rest of the network. As the additional layers make use of custom Pythonbased derivatives rather than an efficient implementation, for computational reasons it might preferable to avoid this step. Nonetheless for completeness we include the derivatives. There are two reasons the gradients are unneeded: Our lifting 3D model we use makes its best predictions when the 2D predictions of the same layer are closest to ground truth, and this is a constraint naturally enforced by the objective of equation (8) of the main paper. Further, as with Convolutional Pose Machines [1] our architecture suffers from problems with vanishing gradients. To overcome this Wei et al. [1] defined an objective at each layer, which acted to locally strengthen the gradients. However, a side effect of this multi-stage objective is that most of the effects of back-propagation happen locally and gradients back-propagated from other layers have little effect on the learning. This makes subtle interactions between layers less influential, and forces the learning process to concentrate on simply making accurate 2D predictions in each layer. We first give the results for computing the gradients of sparse predicted locations Ŷ from Y (see section 5 of the main paper), before discussing the gradients induced on the confidence maps by these sparse locations. 1.1. Landmark Gradients In the interests of readability we neglect the use of indices to indicate stages, the reader should assume that all variables are taken from the same stage. Similarly, when dealing with a mixture of Gaussians, as we are only interested in computing a subgradient, the reader should assume that the best model has already been selected in the forward pass and we are computing gradients using only this model. Recall (section 5 of main body of paper) that the mapping from the initial landmarks Y to the projected 3D proposals Ŷ is given by Ŷ = ΠR(µ + a · e) (1) where R, a = arg min {R∗ ∈R,a∗ ∈RJ } ||Y − ΠR∗ (µ + a∗ · e)||22 + (σ · a∗ )2 (2) where R is a discrete set of rotations we exhaustively minimize over, and J is the number of bases in e. Owing to the use of discrete rotations, this mapping from Y to Ŷ is a piecewise smooth approximation of the smooth function defined over a continious R, and sub-gradients can be induced by fixing R to its current state. Hence: dŶ = ΠRe da (3) For the remainder of the section, and to compact notation we will write E for the matrix of size 2L × J (L the number of landmark points and J being the number of bases in e ) formed by unwrapping tensor ΠRe. Similarly, we will unwrap the 2 × L matrices Y and Ŷ and write them as y and ŷ. We also write p for the vector representing the unwrapped set of 2D landmark positions ΠRµ. 1 We will use [y, 0] for the vector formed by vector y followed by J zeros, and Ē for the matrix of size (2L + J) × J formed by concatenating E with the matrix that has values σ along the diagonals and zero everywhere else. We can rewrite equation (3) in its new notation as: dŷ =E (4) da and given R, we can rewrite equation (2) as a = arg min |[y, 0] − [p, 0] − a∗ Ē||22 (5) a = [(y − p), 0]Ē † (6) da = Ē † d[y, 0] (7) dŷ da dŷ = = E Ē t dy da dy (8) a∗∈RJ or with Ē † continuing to represent the pseudo-inverse of Ē. Hence and where Ē t is the truncation of Ē † . 1.2. Mapping belief gradients to coordinate transform The coordinates of each predicted landmark Yˆp induce a Gaussian in the belief map b̂p . So a change in the x component of Yˆp induces an update which is equivalent to a difference of Gaussians. db̂p G(Yˆp ≈ dYˆx (x) p (x) + δx ) − G(Yˆp − δx ) 2δx (9) and the same for the y component as well. For computational purposes we take δx as one pixel. As such, an induced gradient on the projected belief map near the predicted location Ŷ b̂p induces an updating of Ŷ that is propagated through to Y using the sub-gradients described in equation (8). Updating B such that Writing B for the the set of all bp , and assuming Yp is not in the right location, i.e. given updates ∆B̂ on B̂ ∆B̂. dB̂ dŶ 6= 0, dŶ dYp any update of b in which we decrease the belief at bpYp and increase anywhere else is a valid sub-gradient. We choose as a dŶ sensible update a negative step at bp of magnitude m = k||∆B̂. ddŶB̂ dY || and a positive update for each element Y of of Bp p of the magnitude m · N (Y, σ 2 ) in the quadrant of a Gaussian of the same width used to generate b̂ (i.e. σ = 1 see section 5.6 dŶ of main paper) and with the same direction as ∆B̂. ddŶB̂ dY in each x and y coordinate. p References [1] S.-E. Wei, V. Ramakrishna, T. Kanade, and Y. Sheikh. Convolutional pose machines. arXiv preprint arXiv:1602.00134, 2016. 1 2
1cs.CV
Neural Belief Tracker: Data-Driven Dialogue State Tracking Nikola Mrkšić1 , Diarmuid Ó Séaghdha2 Tsung-Hsien Wen1 , Blaise Thomson2 , Steve Young1 1 University of Cambridge 2 Apple Inc. {nm480, thw28, sjy}@cam.ac.uk {doseaghdha, blaisethom}@apple.com arXiv:1606.03777v2 [cs.CL] 21 Apr 2017 Abstract One of the core components of modern spoken dialogue systems is the belief tracker, which estimates the user’s goal at every step of the dialogue. However, most current approaches have difficulty scaling to larger, more complex dialogue domains. This is due to their dependency on either: a) Spoken Language Understanding models that require large amounts of annotated training data; or b) hand-crafted lexicons for capturing some of the linguistic variation in users’ language. We propose a novel Neural Belief Tracking (NBT) framework which overcomes these problems by building on recent advances in representation learning. NBT models reason over pre-trained word vectors, learning to compose them into distributed representations of user utterances and dialogue context. Our evaluation on two datasets shows that this approach surpasses past limitations, matching the performance of state-of-the-art models which rely on hand-crafted semantic lexicons and outperforming them when such lexicons are not provided. 1 Introduction Spoken dialogue systems (SDS) allow users to interact with computer applications through conversation. Task-based systems help users achieve goals such as finding restaurants or booking flights. The dialogue state tracking (DST) component of an SDS serves to interpret user input and update the belief state, which is the system’s internal representation of the state of the conversation (Young et al., 2010). This is a probability distribution over dialogue states used by the downstream dialogue manager to decide which action the system should User: I’m looking for a cheaper restaurant inform(price=cheap) System: Sure. What kind - and where? User: Thai food, somewhere downtown inform(price=cheap, food=Thai, area=centre) System: The House serves cheap Thai food User: Where is it? inform(price=cheap, food=Thai, area=centre); request(address) System: The House is at 106 Regent Street Figure 1: Annotated dialogue states in a sample dialogue. Underlined words show rephrasings which are typically handled using semantic dictionaries. perform next (Su et al., 2016a,b); the system action is then verbalised by the natural language generator (Wen et al., 2015a,b; Dušek and Jurčı́ček, 2015). The Dialogue State Tracking Challenge (DSTC) series of shared tasks has provided a common evaluation framework accompanied by labelled datasets (Williams et al., 2016). In this framework, the dialogue system is supported by a domain ontology which describes the range of user intents the system can process. The ontology defines a collection of slots and the values that each slot can take. The system must track the search constraints expressed by users (goals or informable slots) and questions the users ask about search results (requests), taking into account each user utterance (input via a speech recogniser) and the dialogue context (e.g., what the system just said). The example in Figure 1 shows the true state after each user utterance in a three-turn conversation. As can be seen in this example, DST models depend on identifying mentions of ontology items in user utterances. This becomes a non-trivial task when confronted with lexical variation, the dynamics of context and noisy automated speech recognition (ASR) output. F OOD =C HEAP : [affordable, budget, low-cost, low-priced, inexpensive, cheaper, economic, ...] R ATING =H IGH : [best, high-rated, highly rated, top-rated, cool, chic, popular, trendy, ...] A REA =C ENTRE : [center, downtown, central, city centre, midtown, town centre, ...] Figure 2: An example semantic dictionary with rephrasings for three ontology values in a restaurant search domain. Traditional statistical approaches use separate Spoken Language Understanding (SLU) modules to address lexical variability within a single dialogue turn. However, training such models requires substantial amounts of domain-specific annotation. Alternatively, turn-level SLU and cross-turn DST can be coalesced into a single model to achieve superior belief tracking performance, as shown by Henderson et al. (2014d). Such coupled models typically rely on manually constructed semantic dictionaries to identify alternative mentions of ontology items that vary lexically or morphologically. Figure 2 gives an example of such a dictionary for three slot-value pairs. This approach, which we term delexicalisation, is clearly not scalable to larger, more complex dialogue domains. Importantly, the focus on English in DST research understates the considerable challenges that morphology poses to systems based on exact matching in morphologically richer languages such as Italian or German (see Vulić et al. (2017)). In this paper, we present two new models, collectively called the Neural Belief Tracker (NBT) family. The proposed models couple SLU and DST, efficiently learning to handle variation without requiring any hand-crafted resources. To do that, NBT models move away from exact matching and instead reason entirely over pre-trained word vectors. The vectors making up the user utterance and preceding system output are first composed into intermediate representations. These representations are then used to decide which of the ontologydefined intents have been expressed by the user up to that point in the conversation. To the best of our knowledge, NBT models are the first to successfully use pre-trained word vector spaces to improve the language understanding capability of belief tracking models. In evaluation on two datasets, we show that: a) NBT models match the performance of delexicalisation-based models which make use of hand-crafted semantic lexicons; and b) the NBT models significantly outperform those models when such resources are not available. Consequently, we believe this work proposes a framework better-suited to scaling belief tracking models for deployment in real-world dialogue systems operating over sophisticated application domains where the creation of such domain-specific lexicons would be infeasible. 2 Background Models for probabilistic dialogue state tracking, or belief tracking, were introduced as components of spoken dialogue systems in order to better handle noisy speech recognition and other sources of uncertainty in understanding a user’s goals (Bohus and Rudnicky, 2006; Williams and Young, 2007; Young et al., 2010). Modern dialogue management policies can learn to use a tracker’s distribution over intents to decide whether to execute an action or request clarification from the user. As mentioned above, the DSTC shared tasks have spurred research on this problem and established a standard evaluation paradigm (Williams et al., 2013; Henderson et al., 2014b,a). In this setting, the task is defined by an ontology that enumerates the goals a user can specify and the attributes of entities that the user can request information about. Many different belief tracking models have been proposed in the literature, from generative (Thomson and Young, 2010) and discriminative (Henderson et al., 2014d) statistical models to rule-based systems (Wang and Lemon, 2013). To motivate the work presented here, we categorise prior research according to their reliance (or otherwise) on a separate SLU module for interpreting user utterances:1 Separate SLU Traditional SDS pipelines use Spoken Language Understanding (SLU) decoders to detect slot-value pairs expressed in the Automatic Speech Recognition (ASR) output. The downstream DST model then combines this information with the past dialogue context to update the belief state (Thomson and Young, 2010; Wang and Lemon, 2013; Lee and Kim, 2016; Perez, 2016; Perez and Liu, 2017; Sun et al., 2016; Jang et al., 2016; Shi et al., 2016; Dernoncourt et al., 2016; Liu and Perez, 2017; Vodolán et al., 2017). 1 The best-performing models in DSTC2 all used both raw ASR output and the output of (potentially more than one) SLU decoders (Williams, 2014; Williams et al., 2016). This does not mean that those models are immune to the drawbacks identified here for the two model categories; in fact, they share the drawbacks of both. Figure 3: Architecture of the NBT Model. The implementation of the three representation learning subcomponents can be modified, as long as these produce adequate vector representations which the downstream model components can use to decide whether the current candidate slot-value pair was expressed in the user utterance (taking into account the preceding system act). In the DSTC challenges, some systems used the output of template-based matching systems such as Phoenix (Wang, 1994). However, more robust and accurate statistical SLU systems are available. Many discriminative approaches to spoken dialogue SLU train independent binary models that decide whether each slot-value pair was expressed in the user utterance. Given enough data, these models can learn which lexical features are good indicators for a given value and can capture elements of paraphrasing (Mairesse et al., 2009). This line of work later shifted focus to robust handling of rich ASR output (Henderson et al., 2012; Tur et al., 2013). SLU has also been treated as a sequence labelling problem, where each word in an utterance is labelled according to its role in the user’s intent; standard labelling models such as CRFs or Recurrent Neural Networks can then be used (Raymond and Ricardi, 2007; Yao et al., 2014; Celikyilmaz and Hakkani-Tur, 2015; Mesnil et al., 2015; Peng et al., 2015; Zhang and Wang, 2016; Liu and Lane, 2016b; Vu et al., 2016; Liu and Lane, 2016a, i.a.). Other approaches adopt a more complex modelling structure inspired by semantic parsing (Saleh et al., 2014; Vlachos and Clark, 2014). One drawback shared by these methods is their resource requirements, either because they need to learn independent parameters for each slot and value or because they need fine-grained manual annotation at the word level. This hinders scaling to larger, more realistic application domains. Joint SLU/DST Research on belief tracking has found it advantageous to reason about SLU and DST jointly, taking ASR predictions as input and generating belief states as output (Henderson et al., 2014d; Sun et al., 2014; Zilka and Jurcicek, 2015; Mrkšić et al., 2015). In DSTC2, systems which used no external SLU module outperformed all systems that only used external SLU features. Joint models typically rely on a strategy known as delexicalisation whereby slots and values mentioned in the text are replaced with generic labels. Once the dataset is transformed in this manner, one can extract a collection of template-like n-gram features such as [want tagged-value food]. To perform belief tracking, the shared model iterates over all slot-value pairs, extracting delexicalised feature vectors and making a separate binary decision regarding each pair. Delexicalisation introduces a hidden dependency that is rarely discussed: how do we identify slot/value mentions in text? For toy domains, one can manually construct semantic dictionaries which list the potential rephrasings for all slot values. As shown by Mrkšić et al. (2016), the use of such dictionaries is essential for the performance of current delexicalisation-based models. Again though, this will not scale to the rich variety of user language or to general domains. The primary motivation for the work presented in this paper is to overcome the limitations that affect previous belief tracking models. The NBT model efficiently learns from the avail- able data by: 1) leveraging semantic information from pre-trained word vectors to resolve lexical/morphological ambiguity; 2) maximising the number of parameters shared across ontology values; and 3) having the flexibility to learn domainspecific paraphrasings and other kinds of variation that make it infeasible to rely on exact matching and delexicalisation as a robust strategy. 3 Neural Belief Tracker The Neural Belief Tracker (NBT) is a model designed to detect the slot-value pairs that make up the user’s goal at a given turn during the flow of dialogue. Its input consists of the system dialogue acts preceding the user input, the user utterance itself, and a single candidate slot-value pair that it needs to make a decision about. For instance, the model might have to decide whether the goal FOOD =I TALIAN has been expressed in ‘I’m looking for good pizza’. To perform belief tracking, the NBT model iterates over all candidate slot-value pairs (defined by the ontology), and decides which ones have just been expressed by the user. Figure 3 presents the flow of information in the model. The first layer in the NBT hierarchy performs representation learning given the three model inputs, producing vector representations for the user utterance (r), the current candidate slot-value pair (c) and the system dialogue acts (tq , ts , tv ). Subsequently, the learned vector representations interact through the context modelling and semantic decoding submodules to obtain the intermediate interaction summary vectors dr , dc and d. These are used as input to the final decision-making module which decides whether the user expressed the intent represented by the candidate slot-value pair. 3.1 Representation Learning For any given user utterance, system act(s) and candidate slot-value pair, the representation learning submodules produce vector representations which act as input for the downstream components of the model. All representation learning subcomponents make use of pre-trained collections of word vectors. As shown by Mrkšić et al. (2016), specialising word vectors to express semantic similarity rather than relatedness is essential for improving belief tracking performance. For this reason, we use the semantically-specialised Paragram-SL999 word vectors (Wieting et al., 2015) throughout this work. The NBT training procedure keeps these vectors fixed: that way, at test time, unseen words semantically related to familiar slot values (i.e. inexpensive to cheap) will be recognised purely by their position in the original vector space (see also Rocktäschel et al. (2016)). This means that the NBT model parameters can be shared across all values of the given slot, or even across all slots. Let u represent a user utterance consisting of ku words u1 , u2 , . . . , uku . Each word has an associated word vector u1 , . . . , uku . We propose two model variants which differ in the method used to produce vector representations of u: NBT-DNN and NBT-CNN. Both act over the constituent ngrams of the utterance. Let vin be the concatenation of the n word vectors starting at index i, so that: vin = ui ⊕ . . . ⊕ ui+n−1 (1) where ⊕ denotes vector concatenation. The simpler of our two models, which we term NBT-DNN, is shown in Figure 4. This model computes cumulative n-gram representation vectors r1 , r2 and r3 , which are the n-gram ‘summaries’ of the unigrams, bigrams and trigrams in the user utterance: rn = kuX −n+1 vin (2) i=1 Each of these vectors is then non-linearly mapped to intermediate representations of the same size: r0n = σ(Wns rn + bsn ) (3) where the weight matrices and bias terms map the cumulative n-grams to vectors of the same dimensionality and σ denotes the sigmoid activation function. We maintain a separate set of parameters for each slot (indicated by superscript s). The three vectors are then summed to obtain a single representation for the user utterance: r = r01 + r02 + r03 (4) The cumulative n-gram representations used by this model are just unweighted sums of all word vectors in the utterance. Ideally, the model should learn to recognise which parts of the utterance are more relevant for the subsequent classification task. For instance, it could learn to ignore verbs or stop words and pay more attention to adjectives and nouns which are more likely to express slot values. Figure 4: NBT-DNN M ODEL. Word vectors of n-grams (n = 1, 2, 3) are summed to obtain cumulative n-grams, then passed through another hidden layer and summed to obtain the utterance representation r. Figure 5: NBT-CNN Model. L convolutional filters of window sizes 1, 2, 3 are applied to word vectors of the given utterance (L = 3 in the diagram, but L = 300 in the system). The convolutions are followed by the ReLU activation function and max-pooling to produce summary n-gram representations. These are summed to obtain the utterance representation r. NBT-CNN Our second model draws inspiration from successful applications of Convolutional Neural Networks (CNNs) for language understanding (Collobert et al., 2011; Kalchbrenner et al., 2014; Kim, 2014). These models typically apply a number of convolutional filters to n-grams in the input sentence, followed by non-linear activation functions and max-pooling. Following this approach, the NBT-CNN model applies L = 300 different filters for n-gram lengths of 1, 2 and 3 (Figure 5). Let Fns ∈ RL×nD denote the collection of filters for each value of n, where D = 300 is the word vector dimensionality. If vin denotes the concatenation of n word vectors starting at index i, let mn = [v1n ; v2n ; . . . ; vknu −n+1 ] be the list of n-grams that convolutional filters of length n run over. The three intermediate representations are then given by: Rn = Fns mn (5) Each column of the intermediate matrices Rn is produced by a single convolutional filter of length n. We obtain summary n-gram representations by pushing these representations through a recti- fied linear unit (ReLU) activation function (Nair and Hinton, 2010) and max-pooling over time (i.e. columns of the matrix) to get a single feature for each of the L filters applied to the utterance: r0n = maxpool (ReLU (Rn + bsn )) (6) where bsn is a bias term broadcast across all filters. Finally, the three summary n-gram representations are summed to obtain the final utterance representation vector r (as in Equation 4). The NBT-CNN model is (by design) better suited to longer utterances, as its convolutional filters interact directly with subsequences of the utterance, and not just their noisy summaries given by the NBT-DNN’s cumulative n-grams. 3.2 Semantic Decoding The NBT diagram in Figure 3 shows that the utterance representation r and the candidate slotvalue pair representation c directly interact through the semantic decoding module. This component decides whether the user explicitly expressed an intent matching the current candidate pair (i.e. without taking the dialogue context into account). Examples of such matches would be ‘I want Thai food’ with food=Thai or more demanding ones such as ‘a pricey restaurant’ with price=expensive. This is where the use of high-quality pre-trained word vectors comes into play: a delexicalisation-based model could deal with the former example but would be helpless in the latter case, unless a human expert had provided a semantic dictionary listing all potential rephrasings for each value in the domain ontology. Let the vector space representations of a candidate pair’s slot name and value be given by cs and cv (with vectors of multi-word slot names/values summed together). The NBT model learns to map this tuple into a single vector c of the same dimensionality as the utterance representation r. These two representations are then forced to interact in order to learn a similarity metric which discriminates between interactions of utterances with slot-value pairs that they either do or do not express:  c = σ Wcs (cs + cv ) + bsc (7) d=r⊗c (8) where ⊗ denotes element-wise vector multiplication. The dot product, which may seem like the more intuitive similarity metric, would reduce the rich set of features in d to a single scalar. The element-wise multiplication allows the downstream network to make better use of its parameters by learning non-linear interactions between sets of features in r and c.2 3.3 Context Modelling This ‘decoder’ does not yet suffice to extract intents from utterances in human-machine dialogue. To understand some queries, the belief tracker must be aware of context, i.e. the flow of dialogue leading up to the latest user utterance. While all previous system and user utterances are important, the most relevant one is the last system utterance, in which the dialogue system could have performed (among others) one of the following two system acts: 1. System Request: The system asks the user about the value of a specific slot Tq . If the system utterance is: ‘what price range would 2 We also tried to concatenate r and c and pass that vector to the downstream decision-making neural network. However, this set-up led to very weak performance since our relatively small datasets did not suffice for the network to learn to model the interaction between the two feature vectors. you like?’ and the user answers with any, the model must infer the reference to price range, and not to other slots such as area or food. 2. System Confirm: The system asks the user to confirm whether a specific slot-value pair (Ts , Tv ) is part of their desired constraints. For example, if the user responds to ‘how about Turkish food?’ with ‘yes’, the model must be aware of the system act in order to correctly update the belief state. If we make the Markovian decision to only consider the last set of system acts, we can incorporate context modelling into the NBT. Let tq and (ts , tv ) be the word vectors of the arguments for the system request and confirm acts (zero vectors if none). The model computes the following measures of similarity between the system acts, candidate pair (cs , cv ) and utterance representation r: mr = (cs · tq )r mc = (cs · ts )(cv · tv )r (9) (10) where · denotes dot product. The computed similarity terms act as gating mechanisms which only pass the utterance representation through if the system asked about the current candidate slot or slot-value pair. This type of interaction is particularly useful for the confirm system act: if the system asks the user to confirm, the user is likely not to mention any slot values, but to just respond affirmatively or negatively. This means that the model must consider the three-way interaction between the utterance, candidate slot-value pair and the slot value pair offered by the system. If (and only if) the latter two are the same should the model consider the affirmative or negative polarity of the user utterance when making the subsequent binary decision. Binary Decision Maker The intermediate representations are passed through another hidden layer and then combined. If φdim (x) = σ(W x + b) is a layer which maps input vector x to a vector of size dim, the input to the final binary softmax (which represents the decision) is given by:  y = φ2 φ100 (d) + φ100 (mr ) + φ100 (mc ) 4 Belief State Update Mechanism In spoken dialogue systems, belief tracking models operate over the output of automatic speech recognition (ASR). Despite improvements to speech recognition, the need to make the most out of imperfect ASR will persist as dialogue systems are used in increasingly noisy environments. In this work, we define a simple rule-based belief state update mechanism which can be applied to ASR N -best lists. For dialogue turn t, let syst−1 denote the preceding system output, and let ht denote the list of N ASR hypotheses hti with posterior probabilities pti . For any hypothesis hti , slot s and slot value v ∈ Vs , NBT models estimate P(s, v | hti , syst−1 ), which is the (turn-level) probability that (s, v) was expressed in the given hypothesis. The predictions for N such hypotheses are then combined as: P(s, v | ht , syst−1 ) = N X pti P s, v | hti , syst  i=1 This turn-level belief state estimate is then combined with the (cumulative) belief state up to time (t − 1) to get the updated belief state estimate: P(s, v | h1:t , sys1:t−1 ) = λ P s, v | ht , syst−1  + (1 − λ) P s, v | h1:t−1 , sys1:t−2  where λ is the coefficient which determines the relative weight of the turn-level and previous turns’ belief state estimates.3 For slot s, the set of its detected values at turn t is then given by:  Vst = {v ∈ Vs | P s, v | h1:t , sys1:t−1 ≥ 0.5} For informable (i.e. goal-tracking) slots, the value in Vst with the highest probability is chosen as the current goal (if Vst 6= {∅}). For requests, all slots t are deemed to have been requested. As in Vreq requestable slots serve to model single-turn user queries, they require no belief tracking across turns. 5 5.1 Experiments Datasets Two datasets were used for training and evaluation. Both consist of user conversations with taskoriented dialogue systems designed to help users find suitable restaurants around Cambridge, UK. The two corpora share the same domain ontology, which contains three informable (i.e. goal-tracking) slots: FOOD, AREA and PRICE. The users can specify values for these slots in order to find restaurants 3 This coefficient was tuned on the DSTC2 development set. The best performance was achieved with λ = 0.55. which best meet their criteria. Once the system suggests a restaurant, the users can ask about the values of up to eight requestable slots (PHONE NUMBER , ADDRESS , etc.). The two datasets are: 1. DSTC2: We use the transcriptions, ASR hypotheses and turn-level semantic labels provided for the Dialogue State Tracking Challenge 2 (Henderson et al., 2014a). The official transcriptions contain various spelling errors which we corrected manually; the cleaned version of the dataset is available at mi.eng.cam.ac.uk/˜nm480/ dstc2-clean.zip. The training data contains 2207 dialogues and the test set consists of 1117 dialogues. We train NBT models on transcriptions but report belief tracking performance on test set ASR hypotheses provided in the original challenge. 2. WOZ 2.0: Wen et al. (2017) performed a Wizard of Oz style experiment in which Amazon Mechanical Turk users assumed the role of the system or the user of a task-oriented dialogue system based on the DSTC2 ontology. Users typed instead of using speech, which means performance in the WOZ experiments is more indicative of the model’s capacity for semantic understanding than its robustness to ASR errors. Whereas in the DSTC2 dialogues users would quickly adapt to the system’s (lack of) language understanding capability, the WOZ experimental design gave them freedom to use more sophisticated language. We expanded the original WOZ dataset from Wen et al. (2017) using the same data collection procedure, yielding a total of 1200 dialogues. We divided these into 600 training, 200 validation and 400 test set dialogues. The WOZ 2.0 dataset is available at mi.eng.cam.ac. uk/˜nm480/woz_2.0.zip. Training Examples The two corpora are used to create training data for two separate experiments. For each dataset, we iterate over all train set utterances, generating one example for each of the slotvalue pairs in the ontology. An example consists of a transcription, its context (i.e. list of preceding system acts) and a candidate slot-value pair. The binary label for each example indicates whether or not its utterance and context express the example’s candidate pair. For instance, ‘I would like Irish food’ would generate a positive example for candidate pair FOOD =I RISH, and a negative example for every other slot-value pair in the ontology. but over delexicalised features akin to those used by Henderson et al. (2014c). 2. The same baseline model supplemented with a task-specific semantic dictionary (produced by the baseline system creators). The two dictionaries are available at mi.eng.cam. ac.uk/˜nm480/sem-dict.zip. The DSTC2 dictionary contains only three rephrasings. Nonetheless, the use of these rephrasings translates to substantial gains in DST performance (see Sect. 6.1). We believe this result supports our claim that the vocabulary used by Mechanical Turkers in DSTC2 was constrained by the system’s inability to cope with lexical variation and ASR noise. The WOZ dictionary includes 38 rephrasings, showing that the unconstrained language used by Mechanical Turkers in the Wizard-of-Oz setup requires more elaborate lexicons. Evaluation We focus on two key evaluation metrics introduced in (Henderson et al., 2014a): 1. Goals (‘joint goal accuracy’): the proportion of dialogue turns where all the user’s search goal constraints were correctly identified; 2. Requests: similarly, the proportion of dialogue turns where user’s requests for information were identified correctly. 5.2 Models We evaluate two NBT model variants: NBT-DNN and NBT-CNN. To train the models, we use the Adam optimizer (Kingma and Ba, 2015) with crossentropy loss, backpropagating through all the NBT subcomponents while keeping the pre-trained word vectors fixed (in order to allow the model to deal with unseen words at test time). The model is trained separately for each slot. Due to the high class bias (most of the constructed examples are negative), we incorporate a fixed number of positive examples in each mini-batch.4 Baseline Models For each of the two datasets, we compare the NBT models to: 1. A baseline system that implements a wellknown competitive delexicalisation-based model for that dataset. For DSTC2, the model is that of Henderson et al. (2014c; 2014d). This model is an n-gram based neural network model with recurrent connections between turns (but not inside utterances) which replaces occurrences of slot names and values with generic delexicalised features. For WOZ 2.0, we compare the NBT models to a more sophisticated belief tracking model presented in (Wen et al., 2017). This model uses an RNN for belief state updates and a CNN for turn-level feature extraction. Unlike NBTCNN, their CNN operates not over vectors, 4 Model hyperparameters were tuned on the respective validation sets. For both datasets, the initial Adam learning rate was set to 0.001, and 18 th of positive examples were included in each mini-batch. The batch size did not affect performance: it was set to 256 in all experiments. Gradient clipping (to [−2.0, 2.0]) was used to handle exploding gradients. Dropout (Srivastava et al., 2014) was used for regularisation (with 50% dropout rate on all intermediate representations). Both NBT models were implemented in TensorFlow (Abadi et al., 2015). Both baseline models map exact matches of ontology-defined intents (and their lexiconspecified rephrasings) to one-hot delexicalised ngram features. This means that pre-trained vectors cannot be incorporated directly into these models. 6 6.1 Results Belief Tracking Performance Table 1 shows the performance of NBT models trained and evaluated on DSTC2 and WOZ 2.0 datasets. The NBT models outperformed the baseline models in terms of both joint goal and request accuracies. For goals, the gains are always statistically significant (paired t-test, p < 0.05). Moreover, there was no statistically significant variation between the NBT and the lexicon-supplemented models, showing that the NBT can handle semantic relations which otherwise had to be explicitly encoded in semantic dictionaries. While the NBT performs well across the board, we can compare its performance on the two datasets to understand its strengths. The improvement over the baseline is greater on WOZ 2.0, which corroborates our intuition that the NBT’s ability to learn linguistic variation is vital for this dataset containing longer sentences, richer vocabulary and no ASR errors. By comparison, the language of the subjects in the DSTC2 dataset is less rich, and compensating for ASR errors is the main hurdle: given access to the DSTC2 test set transcriptions, the NBT models’ goal accuracy rises to 0.96. This DST Model Delexicalisation-Based Model Delexicalisation-Based Model + Semantic Dictionary N EURAL B ELIEF T RACKER : NBT-DNN N EURAL B ELIEF T RACKER : NBT-CNN DSTC2 Goals Requests 69.1 95.7 72.9* 95.7 72.6* 96.4 73.4* 96.5 WOZ 2.0 Goals Requests 70.8 87.1 83.7* 87.6 84.4* 91.2* 84.2* 91.6* Table 1: DSTC2 and WOZ 2.0 test set accuracies for: a) joint goals; and b) turn-level requests. The asterisk indicates statistically significant improvement over the baseline trackers (paired t-test; p < 0.05). indicates that future work should focus on better ASR compensation if the model is to be deployed in environments with challenging acoustics. 6.2 Word Vectors (No Info.) GloVe Paragram-SL999 XAVIER DSTC2 Goals Requests 64.2 81.2 69.0* 96.4* 73.4* 96.5* WOZ 2.0 Goals Requests 81.2 90.7 80.1 91.4 84.2* 91.6 The Importance of Word Vector Spaces The NBT models use the semantic relations embedded in the pre-trained word vectors to handle semantic variation and produce high-quality intermediate representations. Table 2 shows the performance of NBT-CNN5 models making use of three different word vector collections: 1) ‘random’ word vectors initialised using the XAVIER initialisation (Glorot and Bengio, 2010); 2) distributional GloVe vectors (Pennington et al., 2014), trained using co-occurrence information in large textual corpora; and 3) semantically specialised ParagramSL999 vectors (Wieting et al., 2015), which are obtained by injecting semantic similarity constraints from the Paraphrase Database (Ganitkevitch et al., 2013) into the distributional GloVe vectors in order to improve their semantic content. The results in Table 2 show that the use of semantically specialised word vectors leads to considerable performance gains: Paragram-SL999 vectors (significantly) outperformed GloVe and XAVIER vectors for goal tracking on both datasets. The gains are particularly robust for noisy DSTC2 data, where both collections of pre-trained vectors consistently outperformed random initialisation. The gains are weaker for the noise-free WOZ 2.0 dataset, which seems to be large (and clean) enough for the NBT model to learn task-specific rephrasings and compensate for the lack of semantic content in the word vectors. For this dataset, GloVe vectors do not improve over the randomly initialised ones. We believe this happens because distributional models keep related, yet antonymous words close together (e.g. north and south, expensive and inexpensive), offsetting the useful semantic content embedded in this vector spaces. 5 The NBT-DNN model showed the same trends. For brevity, Table 2 presents only the NBT-CNN figures. Table 2: DSTC2 and WOZ 2.0 test set performance (joint goals and requests) of the NBT-CNN model making use of three different word vector collections. The asterisk indicates statistically significant improvement over the baseline XAVIER (random) word vectors (paired t-test; p < 0.05). 7 Conclusion In this paper, we have proposed a novel neural belief tracking (NBT) framework designed to overcome current obstacles to deploying dialogue systems in real-world dialogue domains. The NBT models offer the known advantages of coupling Spoken Language Understanding and Dialogue State Tracking, without relying on hand-crafted semantic lexicons to achieve state-of-the-art performance. Our evaluation demonstrated these benefits: the NBT models match the performance of models which make use of such lexicons and vastly outperform them when these are not available. Finally, we have shown that the performance of NBT models improves with the semantic quality of the underlying word vectors. To the best of our knowledge, we are the first to move past intrinsic evaluation and show that semantic specialisation boosts performance in downstream tasks. In future work, we intend to explore applications of the NBT for multi-domain dialogue systems, as well as in languages other than English that require handling of complex morphological variation. Acknowledgements The authors would like to thank Ivan Vulić, Ulrich Paquet, the Cambridge Dialogue Systems Group and the anonymous ACL reviewers for their constructive feedback and helpful discussions. References Martı́n Abadi, Ashish Agarwal, Paul Barham, Eugene Brevdo, Zhifeng Chen, Craig Citro, Greg S. Corrado, Andy Davis, Jeffrey Dean, Matthieu Devin, Sanjay Ghemawat, Ian Goodfellow, Andrew Harp, Geoffrey Irving, Michael Isard, Yangqing Jia, Rafal Jozefowicz, Lukasz Kaiser, Manjunath Kudlur, Josh Levenberg, Dan Mané, Rajat Monga, Sherry Moore, Derek Murray, Chris Olah, Mike Schuster, Jonathon Shlens, Benoit Steiner, Ilya Sutskever, Kunal Talwar, Paul Tucker, Vincent Vanhoucke, Vijay Vasudevan, Fernanda Viégas, Oriol Vinyals, Pete Warden, Martin Wattenberg, Martin Wicke, Yuan Yu, and Xiaoqiang Zheng. 2015. TensorFlow: Large-scale machine learning on heterogeneous systems. Dan Bohus and Alex Rudnicky. 2006. A “k hypotheses + other” belief updating model. In Proceedings of the AAAI Workshop on Statistical and Empirical Methods in Spoken Dialogue Systems. Asli Celikyilmaz and Dilek Hakkani-Tur. 2015. Convolutional Neural Network Based Semantic Tagging with Entity Embeddings. In Proceedings of NIPS Workshop on Machine Learning for Spoken Language Understanding and Interaction. Ronan Collobert, Jason Weston, Leon Bottou, Michael Karlen, Koray Kavukcuoglu, and Pavel Kuksa. 2011. Natural language processing (almost) from scratch. Journal of Machine Learning Research 12:2493– 2537. Franck Dernoncourt, Ji Young Lee, Trung H. Bui, and Hung H. Bui. 2016. Robust dialog state tracking for large ontologies. In Proceedings of IWSDS. Ondřej Dušek and Filip Jurčı́ček. 2015. Training a Natural Language Generator From Unaligned Data. In Proceedings of ACL. Juri Ganitkevitch, Benjamin Van Durme, and Chris Callison-Burch. 2013. PPDB: The Paraphrase Database. In Proceedings of NAACL HLT. Xavier Glorot and Yoshua Bengio. 2010. Understanding the difficulty of training deep feedforward neural networks. In Proceedings of AISTATS. Matthew Henderson, Milica Gašić, Blaise Thomson, Pirros Tsiakoulis, Kai Yu, and Steve Young. 2012. Discriminative Spoken Language Understanding Using Word Confusion Networks. In Spoken Language Technology Workshop, 2012. IEEE. Matthew Henderson, Blaise Thomson, and Jason D. Wiliams. 2014a. The Second Dialog State Tracking Challenge. In Proceedings of SIGDIAL. Matthew Henderson, Blaise Thomson, and Jason D. Wiliams. 2014b. The Third Dialog State Tracking Challenge. In Proceedings of IEEE SLT. Matthew Henderson, Blaise Thomson, and Steve Young. 2014c. Robust Dialog State Tracking using Delexicalised Recurrent Neural Networks and Unsupervised Adaptation. In Proceedings of IEEE SLT. Matthew Henderson, Blaise Thomson, and Steve Young. 2014d. Word-Based Dialog State Tracking with Recurrent Neural Networks. In Proceedings of SIGDIAL. Youngsoo Jang, Jiyeon Ham, Byung-Jun Lee, Youngjae Chang, and Kee-Eung Kim. 2016. Neural dialog state tracker for large ontologies by attention mechanism. In Proceedings of IEEE SLT. Nal Kalchbrenner, Edward Grefenstette, and Phil Blunsom. 2014. A Convolutional Neural Network for Modelling Sentences. In Proceedings of ACL. Yoon Kim. 2014. Convolutional Neural Networks for Sentence Classification. In Proceedings of EMNLP. Diederik P. Kingma and Jimmy Ba. 2015. Adam: A Method for Stochastic Optimization. In Proceedings of ICLR. Byung-Jun Lee and Kee-Eung Kim. 2016. Dialog History Construction with Long-Short Term Memory for Robust Generative Dialog State Tracking. Dialogue & Discourse 7(3):47–64. Bing Liu and Ian Lane. 2016a. Attention-Based Recurrent Neural Network Models for Joint Intent Detection and Slot Filling. In Proceedings of Interspeech. Bing Liu and Ian Lane. 2016b. Joint Online Spoken Language Understanding and Language Modeling with Recurrent Neural Networks. In Proceedings of SIGDIAL. Fei Liu and Julien Perez. 2017. Gated End-to-End Memory Networks. In Proceedings of EACL. F. Mairesse, M. Gasic, F. Jurcicek, S. Keizer, B. Thomson, K. Yu, and S. Young. 2009. Spoken Language Understanding from Unaligned Data using Discriminative Classification Models. In Proceedings of ICASSP. Grégoire Mesnil, Yann Dauphin, Kaisheng Yao, Yoshua Bengio, Li Deng, Dilek Hakkani-Tur, Xiaodong He, Larry Heck, Dong Yu, and Geoffrey Zweig. 2015. Using recurrent neural networks for slot filling in spoken language understanding. IEEE/ACM Transactions on Audio, Speech, and Language Processing 23(3):530–539. Nikola Mrkšić, Diarmuid Ó Séaghdha, Blaise Thomson, Milica Gašić, Lina Rojas-Barahona, Pei-Hao Su, David Vandyke, Tsung-Hsien Wen, and Steve Young. 2016. Counter-fitting Word Vectors to Linguistic Constraints. In Proceedings of HLT-NAACL. Nikola Mrkšić, Diarmuid Ó Séaghdha, Blaise Thomson, Milica Gašić, Pei-Hao Su, David Vandyke, Tsung-Hsien Wen, and Steve Young. 2015. Multidomain Dialog State Tracking using Recurrent Neural Networks. In Proceedings of ACL. Vinod Nair and Geoffrey E. Hinton. 2010. Rectified linear units improve restricted Boltzmann machines. In Proceedings of ICML. Kai Sun, Qizhe Xie, and Kai Yu. 2016. Recurrent Polynomial Network for Dialogue State Tracking. Dialogue & Discourse 7(3):65–88. Baolin Peng, Kaisheng Yao, Li Jing, and Kam-Fai Wong. 2015. Recurrent Neural Networks with External Memory for Language Understanding. In Proceedings of the National CCF Conference on Natural Language Processing and Chinese Computing. Blaise Thomson and Steve Young. 2010. Bayesian update of dialogue state: A POMDP framework for spoken dialogue systems. Computer Speech and Language . Jeffrey Pennington, Richard Socher, and Christopher Manning. 2014. Glove: Global Vectors for Word Representation. In Proceedings of EMNLP. Gokhan Tur, Anoop Deoras, and Dilek Hakkani-Tur. 2013. Semantic Parsing Using Word Confusion Networks With Conditional Random Fields. In Proceedings of Interspeech. Julien Perez. 2016. Spectral decomposition method of dialog state tracking via collective matrix factorization. Dialogue & Discourse 7(3):34–46. Andreas Vlachos and Stephen Clark. 2014. A new corpus and imitation learning framework for contextdependent semantic parsing. TACL 2:547–559. Julien Perez and Fei Liu. 2017. Dialog state tracking, a machine reading approach using Memory Network. In Proceedings of EACL. Miroslav Vodolán, Rudolf Kadlec, and Jan Kleindienst. 2017. Hybrid Dialog State Tracker with ASR Features. In Proceedings of EACL. Christian Raymond and Giuseppe Ricardi. 2007. Generative and discriminative algorithms for spoken language understanding. In Proceedings of Interspeech. Ngoc Thang Vu, Pankaj Gupta, Heike Adel, and Hinrich Schütze. 2016. Bi-directional recurrent neural network with ranking loss for spoken language understanding. In Proceedings of ICASSP. Tim Rocktäschel, Edward Grefenstette, Karl Moritz Hermann, Tomas Kocisky, and Phil Blunsom. 2016. Reasoning about entailment with neural attention. In ICLR. Iman Saleh, Shafiq Joty, Lluı́s Màrquez, Alessandro Moschitti, Preslav Nakov, Scott Cyphers, and Jim Glass. 2014. A study of using syntactic and semantic structures for concept segmentation and labeling. In Proceedings of COLING. Hongjie Shi, Takashi Ushio, Mitsuru Endo, Katsuyoshi Yamagami, and Noriaki Horii. 2016. Convolutional Neural Networks for Multi-topic Dialog State Tracking. In Proceedings of IWSDS. Nitish Srivastava, Geoffrey Hinton, Alex Krizhevsky, Ilya Sutskever, and Ruslan Salakhutdinov. 2014. Dropout: A Simple Way to Prevent Neural Networks from Overfitting. Journal of Machine Learning Research . Pei-Hao Su, Milica Gašić, Nikola Mrkšić, Lina RojasBarahona, Stefan Ultes, David Vandyke, TsungHsien Wen, and Steve Young. 2016a. Continuously learning neural dialogue management. In arXiv preprint: 1606.02689. Pei-Hao Su, Milica Gašić, Nikola Mrkšić, Lina RojasBarahona, Stefan Ultes, David Vandyke, TsungHsien Wen, and Steve Young. 2016b. On-line active reward learning for policy optimisation in spoken dialogue systems. In Proceedings of ACL. Kai Sun, Lu Chen, Su Zhu, and Kai Yu. 2014. The SJTU System for Dialog State Tracking Challenge 2. In Proceedings of SIGDIAL. Ivan Vulić, Nikola Mrkšić, Roi Reichart, Diarmuid Ó Séaghdha, Steve Young, and Anna Korhonen. 2017. Morph-fitting: Fine-tuning word vector spaces with simple language-specific rules. In Proceedings of ACL. Wayne Wang. 1994. Extracting Information From Spontaneous Speech. In Proceedings of Interspeech. Zhuoran Wang and Oliver Lemon. 2013. A Simple and Generic Belief Tracking Mechanism for the Dialog State Tracking Challenge: On the believability of observed information. In Proceedings of SIGDIAL. Tsung-Hsien Wen, Milica Gašić, Dongho Kim, Nikola Mrkšić, Pei-Hao Su, David Vandyke, and Steve Young. 2015a. Stochastic Language Generation in Dialogue using Recurrent Neural Networks with Convolutional Sentence Reranking. In Proceedings of SIGDIAL. Tsung-Hsien Wen, Milica Gašić, Nikola Mrkšić, Pei-Hao Su, David Vandyke, and Steve Young. 2015b. Semantically Conditioned LSTM-based Natural Language Generation for Spoken Dialogue Systems. In Proceedings of EMNLP. Tsung-Hsien Wen, David Vandyke, Nikola Mrkšić, Milica Gašić, Lina M. Rojas-Barahona, Pei-Hao Su, Stefan Ultes, and Steve Young. 2017. A networkbased end-to-end trainable task-oriented dialogue system. In Proceedings of EACL. John Wieting, Mohit Bansal, Kevin Gimpel, and Karen Livescu. 2015. From paraphrase database to compositional paraphrase model and back. TACL 3:345– 358. Jason D. Williams. 2014. Web-style ranking and SLU combination for dialog state tracking. In Proceedings of SIGDIAL. Jason D. Williams, Antoine Raux, and Matthew Henderson. 2016. The Dialog State Tracking Challenge series: A review. Dialogue & Discourse 7(3):4–33. Jason D. Williams, Antoine Raux, Deepak Ramachandran, and Alan W. Black. 2013. The Dialogue State Tracking Challenge. In Proceedings of SIGDIAL. Jason D. Williams and Steve Young. 2007. Partially observable markov decision processes for spoken dialog systems. Computer Speech and Language 21:393–422. Kaisheng Yao, Baolin Peng, Yu Zhang, Dong Yu, Geoffrey Zweig, and Yangyang Shi. 2014. Spoken language understanding using long short-term memory neural networks. In Proceedings of ASRU. Steve Young, Milica Gašić, Simon Keizer, François Mairesse, Jost Schatzmann, Blaise Thomson, and Kai Yu. 2010. The hidden information state model: A practical framework for POMDP-based spoken dialogue management. Computer Speech and Language 24:150–174. Xiaodong Zhang and Houfeng Wang. 2016. A Joint Model of Intent Determination and Slot Filling for Spoken Language Understanding. In Proceedings of IJCAI. Lukas Zilka and Filip Jurcicek. 2015. Incremental LSTM-based dialog state tracker. In Proceedings of ASRU.
2cs.AI
A Capacity Scaling Law for Artificial Neural Networks Gerald Friedland∗, Mario Michael Krell† [email protected], [email protected] September 15, 2017 arXiv:1708.06019v2 [cs.NE] 18 Sep 2017 Abstract observed in the self-assembly of matter or the Ising model of ferromagnetism. As a result, it is impossible to make an artificial neural network that is sensitive to, but not disrupted by, new information once a certain threshold is reached. Likewise, too many input dimensions for too few data points will always result in overfitting and the network will only behave as associative memory. Our theoretical derivation, backed up by repeatable empirical evidence, shows the scaling of the capacity of a neural network based on two critical points, which we call lossless-memory (LM) dimension and MacKay (MK) dimension, respectively. The LM dimension defines the point of guaranteed operation as memory and the MK dimension defines the point of guaranteed forgetting (generalization), even for very high dimensional networks. Both points scale strictly linear with the number of weights, exemplified as follows. For a binary classifier, consisting of h threshold perceptrons in the hidden layer with a bias, k weighted inputs, and one binary output perceptron (a configuration commonly referred to as 3-layer multilayer perceptron (MLP)), we show that when we classify n points of input in chaotic position (see Section 4), the following behavior will be observed. By assuming an ideal neural network with gating functions handling the worst case data, we derive the calculation of two critical numbers predicting the behavior of perceptron networks. First, we derive the calculation of what we call the lossless memory (LM) dimension. The LM dimension is a generalization of the Vapnik–Chervonenkis (VC) dimension that avoids structured data and therefore provides an upper bound for perfectly fitting any training data. Second, we derive what we call the MacKay (MK) dimension. This limit indicates necessary forgetting, that is, the lower limit for most generalization uses of the network. Our derivations are performed by embedding the ideal network into Shannon’s communication model which allows to interpret the two points as capacities measured in bits. We validate our upper bounds with repeatable experiments using different network configurations, diverse implementations, varying activation functions, and several learning algorithms. The bottom line is that the two capacity points scale strictly linear with the number of weights. Among other practical applications, our result allows network implementations with gating functions (e. g., sigmoid or rectified linear units) to be evaluated against our upper limit independent of a concrete task. 1 • The LM dimension is bounded by DLM = h(k + 1) + (h + 1) Introduction (1) for k > 1. Having n ≤ DLM samples implies perfect labeling in an ideal network. In this paper, we show that feed-forward neural networks, just like individual perceptrons or hopfield networks, can be best understood as associative memory and one way to understand challenges like overfitting and forgetting is to measure the capacity of that memory. Furthermore, a closer look at the error as a function of capacity then reveals that perceptrons go through two phase transitions, as indicated earlier by Wolfgang Kinzel [23], similar to the ones • The MK dimension is bounded by DM K = 2 × DLM (2) for k > 1. Having n ≥ DM K samples implies a ≥ 50% chance that a labeling cannot be learned even with perfect training and an ideal network. • For any connected perceptron network, the maximum capacity C (MK dimension) of each perceptron is C = 2k and scales linearly in k, the number of weights per perceptron (including bias). ∗ University of California, Berkeley and Lawrence Livermore National Lab † International Computer Science Institute, Berkeley Both authors contributed equally to this paper. 1 Sender dataset, labeling Encoder Channel Learning dataset, Method weights Identity Decoder dataset, weights Receiver Neural dataset, Network labeling' Figure 1: Shannon’s communication model applied to labeling in machine learning. A dataset consisting of n sample points and the ground truth labeling of n bits are sent to the neural network. The learning method transfers it to a parametrization (i. e., network weights). The dataset is kept as constant information in the whole process. The identity channel forwards everything without loss. In the decoding step, the network then uses the weights together with the dataset to try to reproduce the original labeling. • Using an embedding into Shannon’s communication model (Fig. 1), the capacity can be measured in bits and connected to other information-theoretic methods. leading to a variety of claims about the capabilities and limits of each of these algorithms (see for example [51]). Even though artificial neural networks have been popular for decades, The article is structured as follows: Section 2 understanding of the processes underlying them starts with the discussion of related work on is usually based solely on empirical evidence in bounds for artificial neural networks before we a particular application domain or task (see for summarize the main parts of MacKay’s single example [32]. perceptron proof [30] in Section 3. Section 4 In fact, the perceptron was introduced in then generalizes the result for arbitrary net1958 [38] and since then has been extended in works, including a discussion on how the capacmany variants, including but not limited to as ities can be interpreted in bits and some convedescribed in [12, 13, 27, 28]. The perceptron nient consequences of that. We have validated uses a k-dimensional input and generates the the two bounds experimentally using standard output by applying a linear function to the inimplementations of neural networks. These reput, followed by a gating function. The gatsults are presented in Section 5 together with ing function is typically the identity function, actual source code for reproducibility in Apthe sign function, a sigmoid function, or the pendix A. Section 6 finally presents direct pracrectified linear unit (ReLU) [22, 33]. Motitical applications and discusses the limits of our vated by brain research [15], perceptrons are results before Section 7 concludes the paper with stacked together to networks and usually trained future work. by chain rule (backpropagation) [39, 40]. Even though perceptrons have been utilized for a long time, its capacities have been rarely explored be2 Related Work yond discussion of linear separability versus the Understanding machine learning, as opposed to XOR function and general mentions of overfitusing it as a black box, requires insights into the ting, generalization and catastrophic forgetting. training and testing data, the available hypothe- Moreover, overfitting and catastrophic forgetsis space of a chosen algorithm, the convergence ting have so far not been explained satisfactoand other properties of the optimization algo- rily. rithm, and the effect of generalization and loss Catastrophic forgetting [31, 35] describes the terms in the optimization problem formulation. effect that when the net is first trained on one set of labels and then on another set of labels, 2.1 The Perceptron it very quickly looses its capability to classify One of the core questions that machine learning the first set of labels. Recently, an approach theory focuses on is the complexity of the hy- was introduced to overcome catastrophic forpothesis space and what functions can be mod- getting by avoiding too large weight changes eled. For artificial neural networks, this ques- for weights that are associated with the prevition has recently become relevant again as deep ously learned labels [24]. Our interpretation is learning seems to outperform shallow learning. that this approach is valid as small, alternating For deep learning, single perceptrons with a non- weight changes will give better results in case the linear, continuous gating function are concate- total number of weight updates exceed the canated in a layered fashion. Techniques like con- pacity of the network. Hence, we suggest future volutional filters, drop out, early stopping, reg- algorithms should avoid catastrophic forgetting ularization, etc., are used to tune performance, by determining the capacity and avoid overflow. 2 2.2 VC Dimension 2.3 Other Measures One measure that handles the properties of given data is the Rademacher complexity [5]. For understanding the properties of large neural networks, Zhang et al. [51] recently performed randomization tests. They show that their observed networks can memorize the data as well as the noise. This is proven by evaluating that their neural networks perfectly learn with random labels or with random data. This shows that the VC dimension of the analyzed networks is above the size of the used dataset. But it is not clear what the full capacity of the networks is. This observation also gives a good reason for why smaller size networks can outperform larger networks even though they have a lower capacity. Their capacity is still large enough to memorize the labeling of the data. A more elaborate extension of this evaluation has been provided by Arpit et al. [2]. Our paper indicates the lower limit for the size of the network. A different approach using information theory comes from the group around Naftali Tishby [45]. They use the information bottleneck principle to analyze deep learning. For each layer, the previous layers are treated as an encoder that compresses the data X to some better representation T which is then decoded to the labels Y by the consecutive layers. By calculating the respective mutual information I(X, T ) and I(T, Y ) for each layer they analyze networks and their behavior during training or when changing the amount of training data. A relevant statement to our work is then presented in [45]: “An immediate consequence of the DPI (Data Processing Inequality) is that information about Y that is lost in one layer cannot be recovered in higher layers.” Thereby describing the learning capabilities of one layer, one can go to the minimum over all layers to describe the overall capabilities of a network. His results seem to be consistent with our experimental outcomes for second and higher deeper layers (see Section 5). However, we describe the learning capabilities of neural networks using a different information theoretic view, namely the interpretation of neurons as memory cells. Apart from speculations in Section 6 that deeper hidden layers are able to serve as error correcting codes for previous layers, we assume an ideal network and do not investigate concrete architectures. One of the largest contribution to machine learning theory comes from Vladimir N. Vapnik and Alexey Ya. Chervonenkis [47], including the Vapnik-Chervonenkis (VC) dimension. The VC dimension has been well known for decades [48]. It is defined as the largest natural number of samples in a dataset that can be shattered by a hypothesis space. This means that for a hypothesis space having VC dimension DV C , there exists a dataset with DV C samples such that for any binary labeling (2DV C possibilities) there exists a perfect classifier f in the hypothesis space, that is, f maps the samples perfectly to the labels. Due to perfect memorizing, it holds DV C = ∞ for 1-nearest neighbor. Tight bounds have so far been computed for linear classifiers (k + 1) as well as decision trees [3]. The definition of VC dimension comes with two major drawbacks, however. First, it considers only the potential hypothesis space but not other aspects like the optimization algorithm, or loss and regularization function that effect the choice of the hypothesis [2]. Second, it is sufficient to provide only one example of a dataset to match the VC dimension. So given a more complex structure of the hypothesis space, the chosen data can take advantage of this structure. As a result, shatterability can be increased by increasing the structure of the data. While these aspects don’t matter much for simple algorithms, it is a major point for deep neural networks. In [49], Vapnik et al. suggest to determine the VC dimension empirically, but state in their conclusion that the described approach does not apply to neural networks as they are “beyond theory". So far, the VC dimension has only been approximated for neural networks. For example, Abu Mostafa argued loosely that the capacity must be bounded by N 2 with N being the number of perceptrons [1]. Recently, [42] determined in their book that for a sigmoid activation function and a limited amount of bits for the weights, the loose upper bound of the VC dimension is O(|E|) where E is the set of edges and consequently |E| the number of nonzero weights. Extensions of the boundaries have been derived for example for recurrent neural networks [26] and networks with piecewise polynomials [4] and piecewise linear [21] gating functions. Another article [25] describes a quadratic VC dimension for a very special case. The authors use a regular grid of n times n points in the two dimensional space and tailor their multilayer perceptron directly to this structure to use only 3n gates and 8n weights. 2.4 Memory Capacity We are aware of recent questioning of the approach of discussing the memory capacity of neural networks [2, 51]. However, Occam’s razor [6] dictates to follow the path of least as3 Definition 3.1 (VC Dimension [47]). The VC dimension DV C of a hypothesis space f is the maximum integer D = DV C such that some dataset of cardinality D can be shattered by f . Shattered by f means that any arbitrary labeling can be represented by a hypothesis in f (or as in our context learned by a perceptron). If there is no maximum, it holds DV C = ∞. sumptions and perceptrons were initially conceived as a "generalizing memory", as detailed for example, in the early works of Bernard Widrow [50]. This approach has also been suggested by [1] and later explained in depth by Sir David J. C. MacKay [30]. In fact, initial capacity derivations for linear separating functions have already been reported by Thomas Cover [11]. Also, the Ising model of ferromagnetism, which is clearly a model used to explain memory storage, has already been reported to have similarities to perceptrons [17, 18] and also the neurons in the retina [46]. MacKay is the first one to interpret a perceptron as an encoder in a Shannon communication model ([30], Chapter 40). In our article, we use a slightly modified version of the model depicted in Fig. 1. MacKay’s use of the Shannon model allows the measurement of the memory capacity of the perceptron in bits. Furthermore, it allows the discussion of a perceptron’s capability without taking into account the number of bits used to store the weights (64 bit doubles, real-valued, etc.). He also points out that there are two distinct transition points in the error measurement. The first one is discontinuous and happens at the VC dimension. For a single perceptron with offset, that point is DV C = k + 1, when k is the dimensionality of the data. Below this point, the error should be 0 given perfect training, as the perceptron is able to generate any arbitrary shattering of the hypothesis space. In honor of him describing the perceptron in a Shannon communication model, which allows for the generalization outlined in this paper, we call the second point the MacKay (MK) dimension. The MK dimension describes the largest number of samples such that at least 50 % of all possible labelings can be separated by the binary classifier. The MK dimension of a single perceptron with offset is DM K = 2(k + 1). For large k (not really required), MacKay proves that there is a sharp drop at this point in performance. Hence, when the neuron or the neural network has to learn much more than its capacity allows for, catastrophic forgetting will occur. In the following section, we will summarize the proof and then rely on it in the remainder of the paper. 3 Definition 3.2 (General Position [30]). “A set of points {xn } in K-dimensional space are in general position if any subset of size ≤ K is linearly independent, and no K + 1 of them lie in a (K − 1)-dimensional plane.” 3.2 MacKay interprets a perceptron as an encoder in a Shannon communication model [43] (compatible to our interpretation in Fig. 1). The input of the encoder are n points in general position and a random labeling. The output of the encoder are the weights of a perceptron. The decoder receives the (perfectly learned) weights over a lossless channel. The question is then: Given the received set of weights and the knowledge of the data, can the decoder reconstruct the original labels of the points? In other words, the perceptron is interpreted as memory that stores a labeling of n points relative to the data and the question is how much information can be stored by training a perceptron. In other words, we ask about the memory capacity of a perceptron. This communication definition not only has the advantage that the mathematical framework of information theory can be applied to machine learning, it also allows to predict and measure neural network capacity in the actual unit of information, bits (more on this in Section 4.4). The functionality of a perceptron is typically explained by the XOR example (i. e., showing that a perceptron with 2 input variables, which can have 4 states, can only model 14 of the 16 possible output functions). XOR and its negation cannot be linearly separated by a single threshold function of two variables and a bias. For an example of this explanation, see [36], section 3.2.2. MacKay effectively changes the computability question to a labeling question by asking: Given n points, how many of the 2n possible labelings in {0, 1}n can be learned by the model without an error (rather than computing binary functions of k variables). Just as done by [11, 36], MacKay uses the relationship between the input dimensionality of the data k and the number of inputs n to the perceptron, which is denoted by a function T (n, k) that indicates the number of “distinct threshold func- Capacity of a Perceptron In this section, we summarize the proof appearing in [30], Chapter 40. 3.1 Summary of Proof and Interpretation Definitions The following definitions will be required. 4 n\k 1 2 3 4 5 6 7 8 tions” (separating hyperplanes) of n points in general position in k dimensions. The original function was derived by [41]. It can be calculated recursively as: T (n, k) = T (n − 1, k) + T (n − 1, k − 1), (3) where T (n, 1) = T (1, k) = 2 or iteratively: 1 2 2 2 2 2 2 2 2 2 2 4 6 8 10 12 14 16 3 2 4 8 14 22 32 44 58 4 2 4 8 16 30 52 84 128 5 2 4 8 16 32 62 114 198 6 2 4 8 16 32 64 126 240 7 2 4 8 16 32 64 128 254 8 2 4 8 16 32 64 128 256 Table 1: Some values of the T (n, k) function indicating the number of distinct threshold funcT (n, k) = 2 (4) tions on n points in general position in k dimenl=0 sions as defined by [30]. Table 1 shows the T (n, k) function for small n and k. It turns out that T (n, k) has very inexactly 50 % and with more samples the “perforteresting properties. mance” largely decreases and with less samples Namely, it largely increases because the summands in the n T (n, k) = 2 for k >= n. (5) middle are the largest. MacKay concludes that the capacity of a perThis allows to derive the VC dimension for the ceptron is therefore 2k as the error before that case k = n where the number of possible binary point is small. We follow Kinzel’s physical interlabelings for n points is 2n . Since k = n and pretation [23] and understand that the percepT (n, n) = 2n , all possible labelings of the input tron error function undergoes two phase transican be realized. tions: A first order transition at the VC dimenWhen k < n, the T (n, k) function follows a sion and a continuous one at the MK dimension. calculation scheme based on the Pascal Trian- Based on this interpretation, we predict that the gle [10], which means that the bit loss due to different phases will play a role on structuring incomplete shattering is still highly predictable. and explaining machine learning algorithms. We MacKay uses an error function based on the will therefore, throughout this paper, discuss the cumulative distribution of the standard Gaus- two points separately. sian to perform that prediction and approximate the resulting distribution. More importantly, he defines a second point, which we call MK 4 Capacity of a Perceptron dimension. The MK dimension describes the Network largest number of samples such that typically only about 50 % of all possible labelings can be separated by the binary classifier. He proofs this The following further definitions will be useful. point to be a n = 2k for large k and illustrates that there is a sharp continuous drop in perfor- 4.1 Definitions mance at this point. Since the sum of two independent normally distributed random variables For the remainder of this article, we will asis normal, with its mean being the sum of the sume a feed-forward network. The weights are two means, and its variance being the sum of the assumed to be real-valued and each unit has a two variances, it is only natural that we will see bias, which counts as a weight. Note that no in the following section that the MacKay point further assumptions about the architecture are is linearly additive in the best case. required. The quick analytic proof for what is The definition of general position used in the 2k shown in [30] is that T (2k, 2k) = 2 = previous section is typically used in linear al P2k−1 2k − 1 gebra and is the most general case needed for and that it is a symmetric 2 l=0 l a perceptron that uses a hyperplane for linear sum where the last summand is equal to the separation (see also Table 1 in [11]). For neural first, etc. Hence, if we just take half of the networks, a stricter setting is required since neusummands, we get half of the values of the sum ral networks can implement arbitrary non-linear which means T (2k, k) = 22k /2. This means that separations. a perceptron with k inputs can handle half of all possible labelings of 2k samples. Note that this Definition 4.1 (Chaotic Position). A set of direct proof actually does not require large n and points {xn } in K-dimensional space is in chaotic that the transition is sharp in the sense that it is position, if and only if from any subset of size k−1 X n−1 l  5 < n it is not possible to infer anything about the positions of the remaining points. needs to be lossless, regardless of individual neurons being lossy. In fact, it is tempting to call Hp = log2 (T (n, k)) something like the entropy of a perceptron as it indicates the expected number of bits of labeling a perceptron can assign to a set of points. However, empirically it can be easily observed that Hp is not additive as it leads to an overestimation of the capabilities. Analytically, it is also not clear how individual hyperplanes are intersecting when perceptrons are connected in various ways. More particularly, it seems hard to assume a completely disjoint labeling of points when perceptrons that are able to implement the same functions are stacked. Instead, our proof abstracts from a concrete network architecture and assumes the ideal network, handling the worst case data. The two critical points described in Section 3 were obtained by describing the single perceptron as a memory cell. In the generalization, we interpret an artificial neural network as an ideal combination of these memory cells. We can now show that the critical points DLM and DM K of any perceptron network scale linearly. Note that chaotic position implies general position, which was only excluding linear inference. Bear in mind that slightly distorted grid settings, as for example used in [25], are in general position but not in chaotic position. Chaotic position is equivalent of saying that no inference is possible about the structure of the data and the only thing a machine learner can do is memorize. The only distribution that satisfies this constraint is the uniform distribution [19]. As explained in Section 2, it is possible to achieve very high VC dimension by the choice of very special datasets. This has not been an issue yet for learning theory but from a practitioner perspective, this has been criticized [44, 51, 2]. To avoid the reported problems and consistent with our embedding into the Shannon communication model, we therefore propose a generalization of the VC dimension which we call lossless memory dimension. Definition 4.2 (Lossless Memory Dimension). The lossless-memory dimension DLM is the maximum integer number DLM such that for Theorem 4.1 (Capacity Scaling Law). any dataset with cardinality n ≤ DLM and   points in chaotic position, all possible labelings of l l X X this dataset can be represented with a function C(Pj ) = C  Pj  (6) in the hypothesis space, that is, learned even j=1 j=1 with perfect training. where Pj is an arbitrary perceptron with nj inNote that for a single perceptron DLM = DV C puts including a potential offset weight. The cabecause chaotic position implies general posi- pacity is either C = D M K or C = DLM dependtion. As explained in Section 2, we will name ing on the targeted phase. P P denotes a neural j the corresponding point where loss is guaranteed network that combines the respective perceptrons MacKay dimension. perfectly and the data points are assumed to be Definition 4.3 (MacKay Dimension). The in chaotic position. MacKay dimension DM K is the maximum integer DM K such that for any dataset with cardinality n ≤ DM K and points in chaotic position at least 50% of all possible labelings of these datasets can be represented with a function in the hypothesis space, that is, learned with perfect training [30] (100% accuracy). Proof. Each neuron with weights k (including bias) is able to implement exactly T (n, k) different binary threshold functions over n sample points. With the maximum number of binary labelings of n points being 2n , it follows that the perceptron is at DLE when T (n, k) = 2n . It is then able to store n bits. Adding lossConsequently, a higher cardinality than DM K less memory cells with capacity n and m inimplies less than 50% of the labelings can be creases their capacity linearly in the amount represented. We will show that for an ideal per- of bits. Lossy memory cells are bit-additive as well. In fact, if perceptrons are combined ceptron network the limit is exactly 50%. in the best possible way (i. e., they label disjoint sets of sample points correctly), two per4.2 Capacity Scaling Law ceptrons with k1 and k2 weights can maximally k1 k2 We will now extend MacKay’s capacity proof label 2 ∗ 2 points. The transitivity of addifrom a single perceptron to neural networks tion implies that DLM is additive for any perit holds ! of many perceptrons. Generalizing to a neu- ceptron or network. In other words, l l P P ral network that is able to losslessly memorize that DLM (Pj ) = DLM Pj in the case the input labels means the network as a whole j=1 j=1 6 the number of sample points n and each neuron is exactly responsible for its fraction of the labeling of the dataset. In other words, there are no “free labels to borrow" from anywhere. since T (n, k) is monotonically falling for an increasing nk , we can assume that there are no other extreme points between DLM and DM K . Furthermore, we have to assume that capacity is asymptotically approaching 0 for high values of n k . We can therefore assume that the phase transitions observed in a single perceptron generalize to a network of perceptrons. that perceptrons are either lossless, or lossy but combined in the best possible way. To proof the linear scalability of the MK dimension, we take a look at a ideal network at DLM , where the number of weights k equals the number of sample points n. It follows that each neuron is exactly responsible for its fraction of the labeling of the dataset thus T (n, k) = 2n . If we increased n without increasing k and there was a hard cut-off (e. g., conventional transistor memory), we would not be able guarantee the assignment of any labels to new points as we would have to erase the original configuration bit-by-bit for each new label. However, as we discussed in Section 3, there is no hard cutoff as T (2k, k) = 12 T (2k, 2k). Assuming each perceptron equally contributes to the labeling of more incoming points as needed, doubling n for a fixed k should result in each neuron being able to memorize the labeling of half of all points. Therefore DM k = 2DLM generalizes to an ideal neural network. In consequence, both DLM and!DM K scale l l P P linearly, or C(Pj ) = C Pj for a perj=1 4.3 Consequences In conclusion, in an ideal network, all we need to do is add up the weights until the number of input points is reached to guarantee lossless memorization. Halving the number of weights, results in the MK dimension. Generalizing to a neural network that is able to losslessly memorize the input labels means the network as a whole needs to be lossless, regardless of individual neurons being lossy. Note that capacities in information theory are upper bounds, the measurable LM and MK dimension of a given concrete network structure is therefore most likely lower. It can be assumed that two lossy memory cells are more likely to complement each other when a global learning function is used. The learning function will therefore influence an empirically measured capacity, so does the gating function. In the extreme case of using the identity as gating function in an MLP, the capacities are limited to the first perceptron of the feed forward step, and we get again k + 1 and 2k + 2 as dimensions because the overall binary separation function is still linear no matter how the perceptrons are combined. The following formulas for the capacity of a network might come in handy in practice. If we count the bias weights of each perceptron as an edge of a graph, the number of incoming edges |E| and the number of weights P are identical and the following holds: j=1 ceptron Pj with nj weights and C = DM K or C = DLM assuming an ideal network and points in chaotic position. Practically, Equation 6 is an inequality “≥” when the data is not in chaotic position because the network should be able to exploit redundancies. Please allow us to provide the following intuition regarding the MK dimension. Each perceptron reduces the amount of possible labelings by half but it is a joint reduction in the best case. It is not a separate reduction for each perceptron which would result in a reduction by 2p , with p being the number of perceptrons. This can be understood by taking another look at the the T (n, k) function. It is composed of the sum of two T (n, k) functions of n − 1: one that uses k weights and one that uses k−1 weights. So when n is increased, the new function space is composed of a space of functions that requires k parameters (let’s call them “difficult"), and a space of functions that uses k −1 parameters (let’s call them “easy"). We could therefore argue that a network at MK dimension can only handle the easier labelings, which turn out to be exactly 50 % of the functions modeled at DLM if we had twice the amount of edges. We do not know how a network of perceptrons behaves between DLM and DM K and after DM K as we cannot assume T (n, k) to hold for non-linear separation functions. However, we can again assume an ideal network where the number of weights k equals DM K = 2|E| . (7) As of the previous section, each perceptron has MK dimension DM K = 2|E|. Hence, h unconnected hidden units would have capacity DM K = h ∗ |E| and DM K = 2 ∗ DLM . (8) Connecting the hidden units with an output unit results in two observations. First, the output unit is a perceptron with h inputs and a threshold and has the task of encoding 2h possible labelings. The maximum capacity that this unit can add is therefore DM K = 2|E| = 2h bits. 7 Input Layer Hidden Layer Output Layer 1 Offset k+1 k+1 k+1 k+1 k+1 2 Input #1 3 Input #2 4 Output h(k+1)+h+1 1 Input #3 h Input #k Offset Figure 2: Capacity calculation of a 3-Layer MLP with k inputs and h hidden nodes. Displayed are the contributions of each weight for the joint LM dimension as explained in Section 4. in Shannon’s communication model. The intuition is that a binary labeling of d random points is a bit vector with dimension d. If the capacity allows, the weights can label all the points as targeted by a training method. In other words, if the network has the capacity to store the labeling of the d points, there is no error and all the labeling bits are restored at the output. As shown in the previous sections, this is guaranteed at the LM dimension, which is the case for d = k + 1 = C(P ) = DLM . The guaranteed capacity is therefore d bits. For the MK dimension, the capacity is therefore d/2 bits. As a consequence, the LM and MK dimensions can be interpreted using information theoretic measures, such as the KL Divergence which allows predicting the minimally expected error for a given neural network, given some input data. It is also worth noting that the KL divergence is closely related to the cross entropy, which in turn has recently been proposed as an optimization criterion for deep learning algorithms [20]. Second, since we treat a perceptron as a memory unit, we do not care that the output unit looks at a restricted space compared to the input space, the capacity of the unit itself doesn’t change. Hence, for a 3-layer Multilayer Perceptron (MLP) with h hidden units, k inputs, a single output node, and respective offsets we get: DM K = 2 (h(k + 1) + h + 1) . (9) The LM dimension DLM is consequently DLM = |E| (10) DLM = (h(k + 1) + h + 1) (11) and respectively for the MLP. A graphical illustration of the scaling law can be seen in Figure 2. The scaling law is also strongly supported by our empirical results (see Section 5). One can generalize to more than binary classification as follows: If we assume a binary classification network at DLM , it means that any binary labeling can be implemented with one output unit. Adding a second output unit of the same capacity as the first one must work for a specific second binary labeling as well. Just imagine the first output unit away. A multiclassifier MK dimension gives every new output node a 50% chance that it can implement a particular function. 5 Capacity Measurements This section describes how we evaluated LM and MK dimension with empirical means. We observe that our theoretical capacities are indeed upper limits. 5.1 Experimental Setup The basic principle for our empirical evaluation is to obtain samples from randomly generated Measuring the capacities C of a neural network data and increase the number of input points to in bits follows directly from MacKay’s defini- the network step-by-step to test if the network tion of a perceptron being an encoder/decoder can learn all possible labelings for the LM di- 4.4 Unit of Capacity 8 nodes, we looked at [1, 2, 3, 4, 5, 6, 7, 8]. Our implementation does not consider the difficulties of an MLP with class imbalance or redundancies. Here, higher empirical dimensions due to oversampling might be achievable. mension or half of the possible labelings for the MK dimension. Obviously, we expect our empirical measurements to be lower than the theoretical capacities. Practically, neither the ideal network nor the perfect training alogrithm exists. Furthermore, for higher dimensions, we were only able to sample from the hypothesis space and could not test all labelings exhaustively. Therefore our goal was to create the best conditions possible and give the network the highest chance of reaching optimal capacity without violating the constraints of the theoretical framework. Thereby some practical workarounds are required for speedup and some limitations arise due to the exponential increase of the search space. We mainly used the MLP implementation in scikit-learn [34] with L-BFGS [29] as optimizer. Our code is provided in the Appendix A. To control the randomness and ensure consistent results, we seed the randomizers with the respective index of the repetition. In case the optimizer does not fit the training data, we repeat its training up to 20 times. Our data was randomly generated by sampling from a normal distribution. We repeated evaluations with up to 20 different datasets if a labeling could not be fitted in the case of the LM dimension or if 50% of the labelings could not be fitted in the case of the MK dimension. The processing time of the latter is much higher for two reasons. First, a larger amount of samples has to be analyzed since at least 50% of all labelings have to be evaluated every time. Second, with more data the convergence of the MLP takes more iterations. For completeness, every labeling would have to be tested. Due to symmetry in the class handling by the MLP, a minor speedup was achieved by testing only labelings where the last sample was labeled with a "0" and not a "1". This was not possible for large LM dimensions. Testing more than 215 labelings was computationally too expensive for us. Hence, for more than 15 samples, we tested only a random selection of 215 labelings. Due to this approximation, results might be above the true values for the given structure. The processing effort of the MK dimension is even worse and required to have a limit of 210 samples. Given more resources, one could imagine a better approach where multiple random samplings are tested and the median result for the MK dimension and the worst result for the LM dimension is taken. We leave this as future work. The number of tested labels also limits the possible dimensions of the MLP. We analyzed input dimensions: [1, 2, 3, 4]. 1 did not provide reliable results. For the number of hidden 5.2 Tuning the Implementation Apart from the aforementioned implementation, we tested all other optimizers like “Adam” and “SGD” as well as the Keras library [8]. In most cases, the net was not able to fit the data in contrast to using L-BFGS. Hence the measured dimensions were very low. This could be interpreted as generalization capability of Adam and SGD because the optimizer is avoiding overfitting. Note, that L-BFGS approximates the second order derivative which makes it more accurate but also computationally more expensive and prone to get stuck in local minima. We also tested different gating functions. Using the identity function, the network mostly behaved like a single perceptron as expected. For tanh and logistic function, results looked similar to the ReLU function but needed more repetitions and processing time. As expected, the generation of the data had a significant impact on the results. Originally, we tested with uniformly sampled data. Changing it to sampling from a normal distribution improved our results dramatically (i. e., the empirically measured upper bound came closer to the theoretical). The number of different tested datasets using the same distribution had only a minor effect on when the empirical calculation reached its limit in LM or MK dimension. The testing of more than one dataset was solely to capture the randomness in the training algorithm and had no significant impact on the empirical results. 5.3 One Hidden Layer The results with our described setting for the LM dimension are depicted in Figure 3. Using just one hidden neuron behaved always like a single perceptron with LM dimension k + 1 and MK dimension 2(k + 1). The predicted linear relationship in h as well as in k for both dimensions can also be observed. The comparison between theoretical and empirical dimensions shows a similar linear behavior. For the larger LM dimensions, the differences get smaller but this is probably due to sampling error. For the VC dimensions, it is more important to test all labelings because a single misclassification has an impact, whereas for the MK dimension this effect is less severe. 9 Figure 3: Experimental results for LM dimension (left) and MK dimension (right). Displayed are the functional dependency on k (top) and on h (bottom). The solid lines depict the theoretical boundaries whereas the respective dotted lines display our empirical results. The black lines display the number of samples where not all labelings are tested anymore but a random sample, which makes the empirical results less reliable. 5.4 This could be improved in the future with more processing power. We observed that the empirical MK dimension is extremely close to twice the empirical VC dimension. This is expected from the theoretical derivations but considering the aforementioned practical shortcuts, the clarity of this result increases our confidence in the validation experiments. Two Hidden Layers We also performed experiments with going deeper than one layer and, as expected, there was no more than linear increase in the capacity of the network. In fact, in case of using small k and h, the obtained results were better by just one sample compared to the respective LM dimension with a one hidden layer architecture. In most cases, we observed that the LM dimension was actually far below the empirical values of a respective network with one hidden layer. The empirical values for the VC dimension come quite close to hk + 1 for small numbers which is 2h off from the optimal value. By increasing the number of iterations and tested 6 Interpretation and Utility datasets, we also detected three special cases that are worth pointing out here. A perceptron can be interpreted as either a unit For an MLP with 2 hidden nodes and input di- that models a function of n input variables or, mensions of 3, 4, or 5, we found a dataset exam- as we have done in this paper, as a memory unit ple of 9, 11, or 13 samples respectively that could that tries to label n sample points with binary be shattered. In those cases, we tested all label- digits. The choice of interpretation makes a difings. Those sample values are exactly one sam- ference. For example, interpreting the neuron ple higher than h(k + 1) and therefore above the as a binary functional unit, one perceptron has n storage capabilities of the hidden layer. Hence, to be able to represent 22 different functions the output neuron is making a significant contri- of n input variables with k + 1 weights. A task bution to the resulting learning capabilities, as that it is not able to achieve as the number of predicted by the memory capacity formulation functions grows too quickly (see also [36], Secin this paper. tion 6.3). Interpreting the perceptron as mem10 ory unit, the k + 1 variables only have to be able to model 2n binary labelings of n points. Intuitively, given that a hyperplane is already separating a space into two different regions each of which is labeled with one bit, the difference between log2 T (n, k + 1) and log2 2n appears almost insignificant. This has already been discussed in [30] (Figure 40.9). However, this seemingly insignificant difference allows for one thing that a memory stick (which perfectly stores any 2n labelings with n bits) is not able to do: generalization. Assume points form two clusters, the promise is that very few hyperplanes can be used to parametrize the difference between the two clusters. So interpreting perceptrons as memory units does not exclude generalization but at the same time allows us to understand their limits better. We therefore like to concur with the early assumptions in [1] that understanding neural networks as memory is indeed beneficial. application, in that the variation of the linear separability of the input data and the learning function for that will dominate the quality of the prediction of the network. Our result has at least three practical applications. First, an overflow in capacity of all, some, or even a single perceptron serves as one definite explanation for (potentially catastrophic) forgetting. Second, our experimental methodology, including the code in Appendix A, serves as a benchmark for the evaluation of neural network implementations. Using points in general position, one can test any learning algorithm and network architecture against the theoretical limit both for performance and efficiency (convergence rate). Third, statistically speaking we should be able to compare networks with each other by simple However, it is important to understand that bit counting of edges and comparing it to the the capacities, we derived for neural networks, total number of samples. For example, for a are upper limits and that optimization meth- binary function of D variables, our analysis says ods, target functions, feature extraction, prepro- that we will need a network structure with more cessing, initialization methods, specialized ar- than 2D edges. For a 3-layer MLP this means, D−1 chitectures, and other such work will still be that we need more than 2D+2 hidden neurons. of practical value. Furthermore, as explained Having less than 2D−1 edges, we know from the above, our proof is not constructive. Just like MK Dimension, that the chance of a labeling not in Claude Shannon’s original work [43], we are being learned is even higher than 50%. not discussing the structure of the encoder. We are only quantifying maximum capabilities. Additionally, the main use of neural networks is 7 Conclusion generalization, not memorization. Therefore it might be acceptable to lose bits as long as they Using an information theoretic proof and emare the right ones. pirical evidence, we show that the capacities of While our work is network architecture agnostic and therefore implying that deep and flat networks have the same capacity, this should not be interpreted as them having necessarily the same performance. The first hidden layer has complete exposure to the input data and further layers only have exposure to the informationreduced output of the previous layers. Then again, deeper layers have the same capacity as earlier layers (assuming the same amount of weights) while looking at a smaller input space. So deep layers have more free capacity. This is countered by results [37] that neural networks with a so-called shortcut (i. e., where all the hidden layers are directly connected to the input) need overall less weights to learn the same labeling (still bounded by our capacity law). However, it is also easy to show that a deeper hidden layer can serve as an error correcting code to the previous layers. For example, the output of the previous hidden layer can be interpreted as repetition code. Practically speaking, the concrete architecture will be most dependent on the 11 perceptrons in a neural network scale linearly with the number of weights. In fact, for guaranteed perfect memorization accuracy, a neural network can learn one bit per weight. The goal can be stretched to 2 bits per weight without too much error. After that, the error is guaranteed to be very large. While our work is an extension of the initial work by David MacKay, this article is the first to generalize the critical points to multiple perceptrons and derive a concrete scaling law. We show using repeatable experiments (see Appendix A) with a widely used open source framework that linear scaling holds and our theoretical bounds are actual upper bounds. This holds for all threshold-like activation function tested, including sigmoid and ReLU. Future work should be dedicated to the phase between LM and MK dimension, which could be physically interpreted as the “liquid phase”, because in that phase it is clear that the network will make errors (i. e., lose bits compared to the input) but the error is log-proportional to the network complexity (i. e., the number of possi- ble configurations) [14]. The use of neural networks is typically not that of memory but that of abstraction (assumed as learning) and qualifying this information loss for concrete data would therefore allow to reason about the generalization capabilities. For example, if only insignificant bits (noise) were lost as part of the error of the network, it would back up the hypothesis that one should learn in a way to avoid overfitting the data. It is highly conceivable that weight values are not uniformly distributed, especially for deeply layered nets. This would mean that the capacity of individual perceptrons within a network can overflow as well. As a consequence, it will forget some previously learned information based on learning more. That individual overflow can cause interesting effects in the dynamics of the overall system [16] and gives one possible cause for why the theoretical upper limit is not always reached. Investigating methods to detect such a local overflow and redirecting further input to other neurons could be interesting, especially when neural networks are trained in a parallelized fashion. More challenges include understanding the deeper hidden layers as error correcting codes, generalizing these results to networks with more complex activation functions (such as in Radial Basis Function1 networks [7]), and finding the bounds for convolutional networks. Last but not least, it remains to provide more constructive proofs of the capabilities depending on the gating function and the network architecture. Unfortunately, in general, finding an explicit formula that shows if a certain function is implemented by a network or not is very hard. Even just the case of binary functions would reduce to the problem of boolean satisfiability [9]. Acknowledgements This work was performed under the auspices of the U.S. Department of Energy by Lawrence Livermore National Laboratory under Contract DE-AC52-07NA27344. It was also partially supported by a Lawrence Livermore Laboratory Directed Research & Development grant (17-ERD-096). IM release number LLNL-TR736950. Mario Michael Krell was supported by the Federal Ministry of Education and Research (BMBF, grant no. 01IM14006A) and by a fellowship within the FITweltweit program of the German Academic Exchange Service (DAAD). Any findings and conclusions are those of the authors, and do not necessarily reflect the views 1 e. g., 2 e−||x−w|| /(2σ 2 ) instead of max{0, P wi xi } 12 of the funders. We want to cordially thank Raúl Rojas for in depth discussion on the chaining of the T () function. We also want to thank Alfredo Metere, Jerome Feldman, Kannan Ramchandran, Jan Hendrik Metzen, Bhiksha Raj, Naftali Tishby, Jaeyoung Choi, Friedrich Sommer and Andrew Feit for their insightful advise and Barry Chen and Brenda Ng for their support. References [1] Y. Abu-Mostafa. Information theory, complexity and neural networks. IEEE Communications Magazine, 27(11):25–28, November 1989. [2] D. Arpit, S. Jastrzȩbski, N. Ballas, D. Krueger, E. Bengio, M. S. Kanwal, T. Maharaj, A. Fischer, A. Courville, Y. Bengio, and S. Lacoste-Julien. A Closer Look at Memorization in Deep Networks. jun 2017. [3] O. Asian, O. T. Yildiz, and E. Alpaydin. Calculating the VC-dimension of decision trees. In 24th International Symposium on Computer and Information Sciences, pages 193–198. IEEE, sep 2009. [4] P. L. Bartlett, V. Maiorov, and R. Meir. Almost linear vc dimension bounds for piecewise polynomial networks. In Advances in Neural Information Processing Systems, pages 190–196, 1999. [5] P. L. Bartlett and S. Mendelson. Rademacher and Gaussian Complexities: Risk Bounds and Structural Results. Journal of Machine Learning Research, 3:463–482, 2001. [6] A. Blumer, A. Ehrenfeucht, D. Haussler, and M. K. Warmuth. Occam’s razor. Information processing letters, 24(6):377–380, 1987. [7] D. S. Broomhead and D. Lowe. Radial basis functions, multi-variable functional interpolation and adaptive networks. Technical report, Royal Signals and Radar Establishment Malvern (United Kingdom), 1988. [8] F. Chollet et al. Keras. https://github. com/fchollet/keras, 2015. [9] S. A. Cook. The complexity of theoremproving procedures. In Proceedings of the third annual ACM symposium on Theory of computing, pages 151–158. ACM, 1971. [10] J. L. Coolidge. The story of the binomial theorem. The American Mathematical Monthly, 56(3):147–157, 1949. [22] K. He, X. Zhang, S. Ren, and J. Sun. Delving Deep into Rectifiers: Surpassing Human-Level Performance on ImageNet Classification. In 2015 IEEE International [11] T. M. Cover. Geometrical and statistiConference on Computer Vision (ICCV), cal properties of systems of linear inequalpages 1026–1034. IEEE, dec 2015. ities with applications in pattern recognition. IEEE transactions on electronic com- [23] W. Kinzel. Phase transitions of neural networks. Philosophical Magazine Part B, puters, (3):326–334, 1965. 77(5):1455–1477, 1998. [12] K. Crammer, O. Dekel, J. Keshet, [24] J. Kirkpatrick, R. Pascanu, N. RabiS. Shalev-Shwartz, and Y. Singer. Online nowitz, J. Veness, G. Desjardins, A. A. Passive-Aggressive Algorithms. Journal of Rusu, K. Milan, J. Quan, T. RaMachine Learning Research, 7:551 – 585, malho, A. Grabska-Barwinska, D. Hassabis, 2006. C. Clopath, D. Kumaran, and R. Hadsell. Overcoming catastrophic forgetting in neural networks. In Proceedings of the National Academy of Sciences of the United States of America, volume 114, pages 3521–3526. National Academy of Sciences, mar 2017. [13] O. Dekel, S. Shalev-Shwartz, and Y. Singer. The Forgetron: A Kernel-Based Perceptron on a Budget. SIAM Journal on Computing, 37(5):1342–1372, jan 2008. [14] M. Dzugutov, E. Aurell, and A. Vulpi- [25] P. Koiran and E. D. Sontag. Neural ani. Universal Relation between the Networks with Quadratic VC Dimension. Kolmogorov-Sinai Entropy and the TherJournal of Computer and System Sciences, modynamical Entropy in Simple Liquids. 54(1):190–198, feb 1997. Phys. Rev. Lett., 81:1762–1765, Aug 1998. [26] P. Koiran and E. D. Sontag. VapnikChervonenkis dimension of recurrent neu[15] J. A. Feldman. Dynamic connections in ral networks. Discrete Applied Mathematneural networks. Biological Cybernetics, ics, 86(1):63–79, aug 1998. 46(1):27–39, dec 1982. [27] [16] G. Friedland and A. Metere. An Isomorphism between Lyapunov Exponents and Shannon’s Channel Capacity. arXiv preprint arXiv:1706.08638, June 2017 https://arxiv.org/abs/1706.08638. [28] [17] E. Gardner. Maximum storage capacity in neural networks. EPL (Europhysics Letters), 4(4):481, 1987. M. M. Krell. Generalizing, Decoding, and Optimizing Support Vector Machine Classification. Phd thesis, University of Bremen, Bremen, 2015. M. M. Krell and H. Wöhrle. New one-class classifiers based on the origin separation approach. Pattern Recognition Letters, 53:93– 99, feb 2015. [29] D. C. Liu and J. Nocedal. On the limited memory BFGS method for large scale optimization. Mathematical Programming, 45(1-3):503–528, aug 1989. [18] E. Gardner. The space of interactions in neural network models. Journal of physics A: Mathematical and general, 21(1):257, 1988. [30] D. J. C. MacKay. Information Theory, Inference, and Learning Algorithms. Cambridge University Press, New York, NY, USA, 2003 http://www.inference.org. uk/itila/book.html. [19] J. W. Gibbs. The scientific papers of J. Willard Gibbs, volume 1. Longmans, Green and Company, 1906. [20] I. Goodfellow, Y. Bengio, and A. Courville. [31] M. McCloskey and N. J. Cohen. CatasDeep Learning. MIT Press, 2016. trophic Interference in Connectionist Networks: The Sequential Learning Problem. [21] N. Harvey, C. Liaw, and A. MehraPsychology of Learning and Motivation, bian. Nearly-tight VC-dimension bounds 24:109–165, 1989. for piecewise linear neural networks. Proceedings of Machine Learning Research: [32] N. Morgan. Deep and Wide: Multiple LayConference on Learning Theory, 7-10 July ers in Automatic Speech Recognition. IEEE 2017, Amsterdam, Netherlands, 65:1064– Transactions on Audio, Speech, and Lan1068, mar 2017. guage Processing, 20(1):7–13, Jan 2012. 13 [33] V. Nair and G. E. Hinton. Rectified Linear [44] R. Shwartz-Ziv and N. Tishby. Opening the Units Improve Restricted Boltzmann MaBlack Box of Deep Neural Networks via Inchines. In Proceedings of the 27th Internaformation. arXiv preprint, 2017. tional Conference on International Conference on Machine Learning, ICML’10, pages [45] N. Tishby and N. Zaslavsky. Deep learning and the information bottleneck principle. In 807–814, USA, 2010. Omnipress. 2015 IEEE Information Theory Workshop (ITW), pages 1–5, April 2015. [34] F. Pedregosa, G. Varoquaux, A. Gramfort, V. Michel, B. Thirion, O. Grisel, M. Blon[46] G. Tkacik, E. Schneidman, I. Berry, del, P. Prettenhofer, R. Weiss, V. Dubourg, J. Michael, and W. Bialek. Ising models J. Vanderplas, A. Passos, D. Cournapeau, for networks of real neurons. arXiv preprint M. Brucher, M. Perrot, and É. Duchesq-bio/0611072, 2006. nay. Scikit-learn: Machine Learning in Python. Journal of Machine Learning Re- [47] V. N. Vapnik. The nature of statistical search, 12:2825–2830, feb 2011. learning theory. Springer, 2000. [35] R. Ratcliff. Connectionist models of recog- [48] V. N. Vapnik and A. Y. Chervonenkis. On nition memory: constraints imposed by the Uniform Convergence of Relative Frelearning and forgetting functions. Psychoquencies of Events to Their Probabilities. logical review, 97(2):285–308, apr 1990. Theory of Probability & Its Applications, 16(2):264–280, jan 1971. [36] R. Rojas. Neural networks: a systematic introduction. Springer-Verlag, 1996 https:// [49] V. N. Vapnik, E. Levin, and Y. L. Cun. page.mi.fu-berlin.de/rojas/neural/. Measuring the VC-Dimension of a Learning Machine. Neural Computation, 6(5):851– [37] R. Rojas. Deepest Neural Networks. 876, sep 1994. ArXiv e-prints arXiv:1707.02617, July 2017 http://adsabs.harvard.edu/abs/ [50] B. Widrow. Generalization and information storage in network of adaline’neurons’. 2017arXiv170702617R. Self-organizing systems-1962, pages 435– [38] F. Rosenblatt. The perceptron: a proba462, 1962. bilistic model for information storage and organization in the brain. Psychological re- [51] C. Zhang, S. Bengio, M. Hardt, B. Recht, and O. Vinyals. Understanding deep learnview, 65(6):386–408, November 1958. ing requires rethinking generalization. In [39] D. E. Rumelhart, G. E. Hinton, and R. J. International Conference on Learning RepWilliams. Parallel Distributed Processresentations (ICLR), 2017. ing: Explorations in the Microstructure of Cognition, Vol. 1. chapter Learning Internal Representations by Error Propagation, pages 318–362. MIT Press, Cambridge, MA, USA, 1986. [40] D. E. Rumelhart, G. E. Hinton, and R. J. Williams. Neurocomputing: Foundations of research. chapter Learning Representations by Back-propagating Errors, pages 696– 699. MIT Press, Cambridge, MA, USA, 1988. [41] L. Schläfli. Theorie der vielfachen Kontinuität. Birkhäuser, 1852. [42] S. Shalev-Shwartz and S. Ben-David. Understanding Machine Learning: From Theory to Algorithms. Cambridge University Press, New York, NY, USA, 2014. [43] C. E. Shannon. The Bell System Technical Journal. A mathematical theory of communication, 27:379–423, 1948. 14 A Code print ( ’n ’ , ’k ’ , ’h ’ , ’ correct ’ , ’ rate ’ ) for k in K: # input dimension numpy . random . s e e d ( 0 ) for h in H: # number of hidden layers numpy . random . s e e d ( 0 ) for n in range (N ) : # dataset size n += 1 # We start with one sample . d a t a _ r e s = [ ] # Good results # first label is fixed to be zero l _ l e n = min ( n−1 ,max_l−1) # 20 different random datasets for r_data in range ( 2 0 ) : numpy . random . s e e d ( r_data ) # normal distributed data data = numpy . random . normal ( s i z e =[N, k ] ) numpy . random . s e e d ( 0 ) true_results = 0 for l a b e l _ i n t in range ( 2 ∗ ∗ l _ l e n ) : if max_l < n : label_int = \ random . r a n d i n t ( 0 , 2 ∗ ∗ ( n −1)) l a b e l s = [ int ( i ) for i in bin ( l a b e l _ i n t ∗2+2∗∗(N+2))[ −n : ] ] d = data [ : n ] converged = False # repeated runs till converged for r_mlp in range ( 2 0 ) : c l f = MLPClassifier ( h i d d e n _ l a y e r _ s i z e s =(h , ) , random_state=r_mlp , a c t i v a t i o n=’ relu ’ , s o l v e r=’ lbfgs ’ , a l p h a =0) c l f . f i t (d , l a b e l s ) p = c l f . predict (d) if ( p == l a b e l s ) . all ( ) : t r u e _ r e s u l t s += 1 c o n v e r g e d = True break # short converged if not c o n v e r g e d : break # shortcut after miss d a t a _ r e s . append ( t r u e _ r e s u l t s ) # All labelings correct ? if t r u e _ r e s u l t s == 2∗∗ l _ l e n : break t r u e _ r e s u l t s = max ( d a t a _ r e s ) print ( n , k , h , t r u e _ r e s u l t s , true_results ∗1.0/2∗∗ l_len ) if t r u e _ r e s u l t s ∗ 1 . 0 / 2 ∗ ∗ l _ l e n < 0 . 9 5 : break # Variable definitions N = 120 # Maximum number of samples K = [ 1 , 2 , 3 , 4 ] # Analyzed dimensions # Analyzed numbers of hidden layers H = [1 ,2 ,3 ,4 ,5 ,6 ,7 ,8] # Maximum number of samples , max_l = 10 # for random labelings # Imports import i t e r t o o l s import numpy import random from s k l e a r n . neural_network \ import M L P C l a s s i f i e r print ( " n " , " k " , " h " , " correct " , " rate " ) for k in K: # input dimension numpy . random . s e e d ( 0 ) for h in H: # number of hidden layers numpy . random . s e e d ( 0 ) for n in range (N ) : # dataset size n += 1 # We start with one sample if n <= 2 ∗ ( h ) ∗ ( k−1)+k +1: continue # shortcut data_res = [ ] # Good results # first label is fixed to be zero l _ l e n = min ( n−1 ,max_l−1) # 20 different datasets for r_data in range ( 2 0 ) : numpy . random . s e e d ( r_data ) data = numpy . random . normal ( s i z e =[N, k ] ) numpy . random . s e e d ( 0 ) true_results = 0 for l a b e l _ i n t in range ( 2 ∗ ∗ l _ l e n ) : index = label_int if max_l < n : label_int = \ random . r a n d i n t ( 0 , 2 ∗ ∗ ( n −1)) l a b e l s = [ int ( i ) for i in bin ( l a b e l _ i n t ∗2+2∗∗(N+2))[ −n : ] ] d = data [ : n ] converged = False for r_mlp in range ( 2 0 ) : c l f = MLPClassifier ( h i d d e n _ l a y e r _ s i z e s =(h , ) , random_state=r_mlp , a c t i v a t i o n=’ relu ’ , s o l v e r=" lbfgs " , a l p h a =0) c l f . f i t (d , l a b e l s ) p = c l f . predict (d) if ( p == l a b e l s ) . all ( ) : t r u e _ r e s u l t s += 1 c o n v e r g e d = True break # short converged # 50% labelings correct ? if t r u e _ r e s u l t s >=2∗∗( l _ l e n −1): break # short success if index−t r u e _ r e s u l t s > 2 ∗ ∗ ( l _ l e n −1): break # short fail if t r u e _ r e s u l t s >= 2 ∗ ∗ ( l _ l e n −1): d a t a _ r e s . append ( t r u e _ r e s u l t s ) break # short success d a t a _ r e s . append ( t r u e _ r e s u l t s ) t r u e _ r e s u l t s = max ( d a t a _ r e s ) print ( n , k , h , t r u e _ r e s u l t s , true_results ∗1.0/2∗∗ l_len ) if t r u e _ r e s u l t s ∗ 1 . 0 / 2 ∗ ∗ l _ l e n < 0 . 4 5 : break Figure 4: Python 2.7 code used for measuring the LM dimension with one hidden layer. Figure 5: Python 2.7 code used for measuring the MK Dimension with one hidden layer. # Variable definitions N = 80 # Maximum number of samples K = [ 1 , 2 , 3 , 4 ] # Analyzed dimensions # Analyzed numbers of hidden layers H = [1 ,2 ,3 ,4 ,5 ,6 ,7 ,8] # Maximum number of samples , max_l = 15 # for random labelings # Imports import i t e r t o o l s import numpy import random from s k l e a r n . neural_network \ import M L P C l a s s i f i e r 15
9cs.NE
ON FINITE COMPLETE REWRITING SYSTEMS, FINITE DERIVATION TYPE, AND AUTOMATICITY FOR HOMOGENEOUS MONOIDS arXiv:1407.7428v2 [math.GR] 14 May 2017 ALAN J. CAIN, ROBERT D. GRAY, AND ANTÓNIO MALHEIRO Abstract. This paper investigates the class of finitely presented monoids defined by homogeneous (length-preserving) relations from a computational perspective. The properties of admitting a finite complete rewriting system, having finite derivation type, being automatic, and being biautomatic are investigated for this class of monoids. The first main result shows that for any consistent combination of these properties and their negations, there is a homogeneous monoid with exactly this combination of properties. We then introduce the new concept of abstract Rees-commensurability (an analogue of the notion of abstract commensurability for groups) in order to extend this result to show that the same statement holds even if one restricts attention to the class of nary homogeneous monoids (where every side of every relation has fixed length n). We then introduce a new encoding technique that allows us to extend the result partially to the class of n-ary multihomogenous monoids. 1. Introduction Numerous interesting algebras arise as semigroup algebras K[S], where K is a field and S is a homogeneous semigroup (that is, a semigroup that is defined by a presentation where all relations are length-preserving); examples include algebras yielding set-theoretic solutions to the Yang–Baxter equation and quadratic algebras of skew type (see for example [1, 2, 3] and [4, 5, 6]), algebras related to Young diagrams, representation theory and algebraic combinatorics such as the plactic and Chinese algebras (see [7, Ch. 5], [8, 9] and [10, 11, 12]), and algebras defined by permutation relations (see [13, 4, 14]). In these examples, there are strong connections between the structure of the algebra K[S] and that of the underlying semigroup S. Further motivation for studying this class comes from other important semigroups in the literature that admit homogeneous presentations, such as the hypoplactic monoid [15], shifted plactic monoid [16], monoids with the same multihomogeneous growth as the plactic monoid [17], trace monoids [18], The first author was supported by an FCT Ciência 2008 fellowship and later by an Investigador FCT fellowship (IF/01622/2013/CP1161/CT0001). The second author was partially supported by the EPSRC grant EP/N033353/1 ‘Special inverse monoids: subgroups, structure, geometry, rewriting systems and the word problem’. This work was partially supported by the Fundação para a Ciência e a Tecnologia (Portuguese Foundation for Science and Technology) through the project UID/MAT/00297/2013 (Centro de Matemática e Aplicações). 1 2 ALAN J. CAIN, ROBERT D. GRAY, AND ANTÓNIO MALHEIRO divisibility monoids [19], queue monoids [20], and positive braid monoids [21, 22]. When investigating a semigroup S defined by homogeneous relations, and its associated semigroup algebra K[S], a useful first step is to find a good set of normal forms (canonical representatives over the generating set) for the elements of the monoid, and thus for elements of the algebra. (See the list of open problems in [13, Section 3] for more on the importance of this problem in the context of semigroups defined by permutation relations.) Specifically we would like a set of normal forms that is a regular language, and we want to be able to compute effectively with these normal forms. Two situations where such a good set of normal forms does exist are for monoids that admit presentations by finite complete rewriting systems (see [23]), and for monoids and semigroups that are automatic (see [24, 25]). Each of these properties also has implications for properties of the corresponding semigroup algebra. Indeed, if the semigroup admits a finite complete rewriting system, then the semigroup algebra admits a finite Gröbner–Shirshov basis (see [26] for an explanation of the connection between Gröbner–Shirshov bases and complete rewriting systems), while the automaticity of the semigroup implies that the algebra is an automaton algebra in the sense of Ufnarovskij; see [27] and [4, Section 1]. Many of the examples of homogeneous semigroups mentioned above have been shown to admit presentations by finite complete rewriting systems, and have been shown to be biautomatic; see for example [28, 29, 30, 31, 32, 33]. It is natural to ask to what extent these results generalise to arbitrary homogeneous semigroups. One can ask: Does every homogeneous semigroup admit a presentation by a finite complete rewriting system? Is every such semigroup biautomatic? Within the class of homogeneous semigroups, what is the relationship between admitting a finite complete rewriting system and being biautomatic? (For general semigroups, these properties are independent; see [34]). The aim of this paper is to make a comprehensive investigation of these questions. In fact, we shall consider two different strengths of automaticity, called automaticity and biautomaticity, and we shall also investigate the homotopical finiteness property of finite derivation type (FDT) in the sense of Squier [35], which is a finiteness property that is satisfied by monoids that admit presentations by finite complete rewriting systems (full definitions of all of these concepts will be given in Section 2). There are various degrees of homogeneity that one can impose on a semigroup presentation. We shall consider finite presentations hA | Ri which are: • homogeneous: relations are length-preserving; • multihomogeneous: for each letter a in the alphabet A, and for every relation u = v in R, the number of occurrences of the letter a in u equals the number of occurrences of the letter a in v; • n-ary homogeneous: there is a fixed global constant n such that for every relation u = v in R the lengths of the words u and v are both n; • n-ary multihomogeneous: simultaneously n-ary homogeneous and multihomogeneous. ON HOMOGENEOUS MONOIDS 3 fcrs =⇒ fdt biauto =⇒ auto Example Y Y Y Y N N N N N N Y Y Y N Y N N Y Y See Y Plactic monoid [28] Y N Y Y Mfcrs auto Mfcrs nonauto Mfdt biauto Mnonfdt biauto fdt Mfcrs auto ∗ Mbiauto fdt Mbiauto ∗ Mfcrs nonauto nonfdt ∗ M Mfcrs biauto auto nonfdt Mfcrs nonauto ∗ Mbiauto Example Example Example Example 3.1 3.6 3.8 3.10 Section 4 Y N Y Section 4 Y N N Section 4 N N Y Section 4 N N N Table 1. Summary of examples of homogeneous monoids exhibiting all consistent combinations of the properties fcrs, fdt, biauto, and auto. Examples with the same combinations of properties also exist in the class of n-ary homogeneous monoids (see Section 5). fcrs =⇒ fdt biauto =⇒ auto Exists? See Y Y Y Y Y [28] Y Y N N Y Y Y N N N Y Y Y N Y Y Y Y ? Y Theorem Theorem Question Theorem 5.2 5.2 5.4 5.3 N Y N Y ? Question 5.4 N Y N N ? Question 5.4 N N N Y Y Theorem 5.3 N N N N Y Theorem 5.3 Table 2. Summary of the existence of examples of multihomogeneous monoids with consistent combinations of the properties fcrs, fdt, biauto, and auto. Examples with the same combinations of properties also exist in the class of n-ary multihomogeneous monoids. Of course, the most restricted class listed here is the class of n-ary multihomogeneous presentations. For brevity, we introduce the following terminology for the four properties we are interested in: a monoid is • fcrs if it admits a presentation via a finite complete rewriting system (with respect to some finite generating set); • fdt if it has finite derivation type; • biauto if it is biautomatic; • auto if it is automatic. We will also use the natural negated terms: non-fcrs, non-fdt, non-biauto, and non-auto. ALAN J. CAIN, ROBERT D. GRAY, AND ANTÓNIO MALHEIRO au t t fd s o bi au t r fc o 4 Plactic monoid Mfdt biauto Mfcrs auto Mfcrs nonauto Mnonfdt biauto ∗ ∗ ∗ ∗ Figure 1. The semilattice showing the relationship between examples. By taking the free product of two examples, one obtains a new monoid whose properties are given by taking the logical conjunction (that is, the ‘and’ operation) of corresponding properties of the original example monoids. This corresponds to the meet operation in this semilattice. We are interested in which combinations of these properties a homogeneous monoid can have. Since in general fcrs implies fdt, and biauto implies auto, not all combinations will be possible. We refer to any combination of properties that satisfies these restrictions, and that does not contain a property and its negation, as consistent. Our first main result shows that any consistent combination is possible within the class of homogeneous monoids. We show this by constructing examples of homogeneous monoids with each consistent combination of properties. We adopt the following naming scheme: in the example monoid Mab , the superscript a will be one of fcrs, fdt, or nonfdt, indicating that the monoid is respectively fcrs (and thus also fdt), fdt but not fcrs, or non-fdt (and thus also non-fcrs); while the subscript b will be one of biauto, auto, or nonauto, indicating that the monoid is respectively biauto (and thus also auto), auto but not biauto, or non-auto (and thus also non-biauto). In Section 3, we presents fdt fcrs nonfdt the fundamental examples Mfcrs auto , Mbiauto , Mnonauto , and Mbiauto . Section 4 contains general results about the behaviour of the various properties under free products of monoids, which we then use to construct the remaining examples. These results are summarised in Table 1 and the relationship between the various examples is illustrated in Figure 1. In Sections 6 and 7 we introduce new concepts and prove new results, in order to study the combinations of properties can occur in even more restricted classes. We first introduce and investigate the notion of abstract Rees-commensurability (an analogue of abstract commensurability for groups [36, §§ iv.27ff.]), which allows us to show that every consistent combination can arise within the class of n-ary homogeneous monoids. (Thus Table 1 and Figure 1 could also describe the situation for n-ary homogeneous monoids.) We then develop a new encoding technique that embeds ON HOMOGENEOUS MONOIDS 5 a homogeneous monoid into a 2-generated multihomogeneous monoid. This encoding technique allows us to obtain most of the consistent combinations of properties in the class of multihomogeneous or n-ary multihomogenous monoids. Specifically, it allows us to construct n-ary multihomogeneous monoids with any possile combination of the properties fcrs, biauto, and auto, or any combination of the properties fdt, biauto, and auto. However, it does not allow us to construct examples to separate the properties fcrs and fdt within the class of multihomogeneous or n-ary multihomogeneous monoids. Table 2 summarises the known consistent combinations of properties in the class of multihomogeneous monoids. Using the results for abstract Rees commensurability, the same table also describes the situation for the class of n-ary multihomogeneous monoids. 2. Preliminaries The subsection below on derivation graphs, homotopy bases and finite derivation type is self-contained, but it can be complemented with [37, 38]. There is an alternative formulation of the same concepts in terms of strict monoidal categories/groupoids and higher-dimensional variations of them, and homotopical algebra in higher categories [39, 40]. However, our approach, using Squier complexes, is the same one used in papers by Otto [41, 42], Wang [43], Pride and the second and third authors [44], and the third author [45]; we will require methods and results from these papers in Sections 4, 6, and 7. For further information on automatic semigroups, see [25]. We assume familiarity with basic notions of automata and regular languages (see, for example, [46]) and transducers and rational relations (see, for example, [47]), although we will recall some key results that we use frequently. For background on string rewriting systems we refer the reader to [48, 23]. 2.1. Words, rewriting systems, and presentations. We denote the empty word (over any alphabet) by ε. For an alphabet A, we denote by A∗ the set of all words over A. When A is a generating set for a monoid M , every element of A∗ can be interpreted either as a word or as an element of M . For words u, v ∈ A∗ , we write u = v to indicate that u and v are equal as words and u =M v to denote that u and v represent the same element of the monoid M . The length of u ∈ A∗ is denoted |u|, and, for any a ∈ A, the number of symbols a in u is denoted |u|a . We denote by urev the reversal of a word u; that is, if u = a1 · · · an−1 an then urev = an an−1 · · · a1 , with ai ∈ A. If R is a relation on A∗ , then R# denotes the smallest monoid congruence generated by R. We use standard terminology and notation from the theory of string rewriting systems; see [23] or [48] for background reading. If M is a monoid, a presentation of M is a pair hA | Ri such that M is isomorphic to the quotient A∗ /R# , in which case, the elements of R are called the defining relations. We write [u]M for the set of words in A∗ equal to u in M . The presentation hA | Ri is homogeneous (respectively, multihomogeneous) if for every (u, v) ∈ R and a ∈ A, we have |u| = |v| (respectively, |u|a = |v|a ). That is, in a homogeneous presentation, defining relations preserve length; in a multihomogenous presentation, defining relations preserve 6 ALAN J. CAIN, ROBERT D. GRAY, AND ANTÓNIO MALHEIRO the number of each symbol. A monoid is homogeneous (respectively, multihomogeneous) if it admits a homogeneous (respectively, multihomogeneous) presentation. Note that homogeneous and multihomogeneous presentations are not required to be finite presentations. A string rewriting system, or simply a rewriting system, is a pair (A, R), where A is a finite alphabet and R is a set of pairs (ℓ, r), usually written ℓ → r, known as rewriting rules or simply rules, drawn from A∗ × A∗ . The single reduction relation →R is defined as follows: u →R v (where u, v ∈ A∗ ) if there exists a rewriting rule (ℓ, r) ∈ R and words x, y ∈ A∗ such that u = xℓy and v = xry. That is, u →R v if one can obtain v from u by substituting the word r for a subword ℓ of u, where ℓ → r is a rewriting rule. The reduction relation →∗R is the reflexive and transitive closure of →R . The subscript R is omitted when it is clear from context. The process of replacing a subword ℓ by a word r, where ℓ → r is a rule, is called reduction by application of the rule ℓ → r; the iteration of this process is also called reduction. A word w ∈ A∗ is reducible if it contains a subword ℓ that forms the left-hand side of a rewriting rule in R; it is otherwise called irreducible. The rewriting system (A, R) is finite if both A and R are finite. The rewriting system (A, R) is noetherian if there is no infinite sequence u1 , u2 , . . . of words from A∗ such that ui → ui+1 for all i ∈ N. That is, (A, R) is noetherian if any process of reduction must eventually terminate with an irreducible word. The rewriting system (A, R) is confluent if, for any words u, u′ , u′′ ∈ A∗ with u →∗ u′ and u →∗ u′′ , the pair u′ and u′′ resolves, that is, there exists a word v ∈ A∗ such that u′ →∗ v and u′′ →∗ v. It is well known that a noetherian system is confluent if and only if all critical pairs resolve, where critical pairs are obtained by considering overlaps of left-hand sides of the rewrite rules in R; see [23] for more details. A rewriting system that is both confluent and noetherian is complete. If a monoid admits a presentation with respect to some generating set A that forms a finite complete rewriting system R, the monoid is fcrs. In that case, the irreducible elements form a set of unique normal forms, over A, for the elements of the monoid. The Thue congruence ↔∗R is the equivalence relation generated by →R . The elements of the monoid presented by hA | Ri are the ↔∗R -equivalence classes. The relations ↔∗R and R# coincide. Let M be a homogeneous monoid. Let hA | Ri be a homogeneous presentation of M . Without lost of generality, we can assume that R has no trivial relations of the form a = a′ , for letters a, a′ in A. Since none of the generators represented by A can be non-trivially decomposed, the alphabet A represents a unique minimal generating set for M , and any generating set must contain this minimal generating set. Any two words over A representing the same element of M must be of the same length. So there is a well-defined function λ : M → N where xλ is defined to be the length of any word over A representing x. (Here and elsewhere we shall write the function symbol on the right.) It is easy to see that λ is a homomorphism. Following [49, Definition 2.1 in §4] the function λ is called a grading of M , and so homogeneous monoids are graded monoids. ON HOMOGENEOUS MONOIDS 7 2.2. Derivation graphs, homotopy bases, and finite derivation type. Associated with any monoid presentation hA | Ri is a 2-complex D, called the Squier complex, whose 1-skeleton has vertex set A∗ and edges corresponding to applications of relations from R, and that has 2-cells adjoined for each instance of “non-overlapping” applications of relations from R (see below for a formal definition of non-overlapping relations). The free monoid A∗ acts on D in a natural way via left and right multiplication. A collection of closed paths in D is called a homotopy base if the complex obtained by adjoining cells for each of these paths, and those that they generate under the action of the free monoid on the Squier complex, has trivial fundamental groups. A monoid defined by a presentation is said to have finite derivation type (or fdt for short) if the corresponding Squier complex admits a finite homotopy base. It was shown by Squier [35] that the property fdt is independent of the choice of a finite presentation, so we may speak of fdt monoids. The original motivation for studying this notion is Squier’s result [35] which says that if a monoid admits a presentation by a finite complete rewriting system then the monoid must have finite derivation type. The study of these concepts is motivated further by the fact that the fundamental groups of connected components of Squier complexes, which are called diagram groups, have turned out to be a very interesting class of groups; see [50]. In recent important work [51], acyclic polygraphs have been used to define a higher-dimensional homotopical finiteness condition for higher categories. In particular, this work gives rise to a definition of fdtn that extends the notion of finite derivation type to arbitrary dimensions. In more detail, with any monoid presentation P = hA | Ri we associate a graph (in the sense of Serre [52]) as follows. The derivation graph of P is an infinite graph Γ = Γ(P) = (V, E, ι, τ,−1 ) with vertex set V = A∗ , and edge set E consisting of the collection of 4-tuples {(w1 , r, ǫ, w2 ) : w1 , w2 ∈ A∗ , r ∈ R, and ǫ ∈ {+1, −1}}. The functions ι, τ : E → V associate with each edge E = (w1 , r, ǫ, w2 ) (with r = (r+1 , r−1 ) ∈ R) its initial and terminal vertices ιE = w1 rǫ w2 and τ E = w1 r−ǫ w2 , respectively. The mapping −1 : E → E associates with each edge E = (w1 , r, ǫ, w2 ) an inverse edge E−1 = (w1 , r, −ǫ, w2 ). A non-empty path in Γ is a sequence of edges P = E1 ◦E2 ◦. . .◦En , written in the diagrammatic order, where τ Ei = ιEi+1 for i = 1, . . . , n − 1. Here P is a path from ιE1 to τ En and we extend the mappings ι and τ to paths by defining ιP = ιE1 and τ P = τ En . The inverse of a path P = E1 ◦ E2 ◦ . . . ◦ En −1 −1 is the path P−1 = E−1 n ◦ En−1 ◦ . . . ◦ E1 , which is a path from τ P to ιP. A closed path is a path P satisfying ιP = τ P. For two paths P and Q with τ P = ιQ the composition P ◦ Q is defined. We denote the set of paths in Γ by P (Γ), where for each vertex w ∈ V we include a path 1w with no edges, called the empty path at w. The free monoid A∗ acts on both sides of the set of edges E of Γ by x · E · y = (xw1 , r, ǫ, w2 y) where E = (w1 , r, ǫ, w2 ) and x, y ∈ A∗ . This extends naturally to a two-sided action of A∗ on P (Γ) where for a path P = E1 ◦ E2 ◦ . . . ◦ En we define x · P · y = (x · E1 · y) ◦ (x · E2 · y) ◦ . . . ◦ (x · En · y). 8 ALAN J. CAIN, ROBERT D. GRAY, AND ANTÓNIO MALHEIRO ιE1 ιE2 E1 · ιE2 ιE1 · E2 τ E1 ιE2 ιE1 τ E2 τ E1 · E2 E1 · τ E2 τ E1 τ E2 Figure 2. Disjoint derivations in Γ. If P and Q are paths such that ιP = ιQ and τ P = τ Q then we say that P and Q are parallel, and write P k Q. We use k to denote the subset of P (Γ) × P (Γ) of all pairs of parallel paths. An equivalence relation ∼ on P (Γ) is called a homotopy relation if it is contained in k and satisfies the following four conditions. (1) If E1 and E2 are edges of Γ, then (E1 · ιE2 ) ◦ (τ E1 · E2 ) ∼ (ιE1 · E2 ) ◦ (E1 · τ E2 ). (2) For any P, Q ∈ P (Γ) and x, y ∈ A∗ P ∼ Q implies x · P · y ∼ x · Q · y. (3) For any P, Q, R, S ∈ P (Γ) with τ R = ιP = ιQ and ιS = τ P = τ Q P ∼ Q implies R ◦ P ◦ S ∼ R ◦ Q ◦ S. (4) If P ∈ P (Γ) then PP−1 ∼ 1ιP , where 1ιP denotes the empty path at the vertex ιP. The idea behind condition 1 is the following. Suppose that a word w has two disjoint occurrences of rewriting rules in the sense that w = αrǫ βα′ rǫ′ ′ β ′ where α, β, α′ , β ′ ∈ A∗ , r, r ′ ∈ R and ǫ, ǫ′ ∈ {−1, +1}. Let E1 = (α, r, ǫ, β) and E2 = (α′ , r ′ , ǫ′ , β ′ ). Then the paths P = (E1 · ιE2 ) ◦ (τ E1 · E2 ), P′ = (ιE1 · E2 ) ◦ (E1 · τ E2 ) give two different ways of rewriting the word w = αrǫ βα′ rǫ′ ′ β ′ to the word ′ β ′ , where in P we first apply the left-hand relation and w = αr−ǫ βα′ r−ǫ ′ then the right-hand, while in P′ the relations are applied in the opposite order; see Figure 2. We want to regard these two paths as being essentially the same, and this is achieved by condition 1. Equivalent paths under this condition are said to be homotopic by disjoint derivations. This relation is also often refereed to as the exchange relation or the interchange law in the literature; see [40]. For a subset C of k, the homotopy relation ∼C generated by C is the smallest (with respect to inclusion) homotopy relation containing C. The homotopy relation generated by the empty set ∅ is denoted by ∼0 . If ∼C coincides with k, then C is called a homotopy base for Γ. The presentation hA | Ri is said to have finite derivation type if the derivation graph Γ of hA | Ri admits a finite homotopy base. A finitely presented monoid M is said to have finite derivation type, or to be fdt, if some (and hence any by [35, Theorem 4.3]) finite presentation for M has finite derivation type. ON HOMOGENEOUS MONOIDS 9 It is not difficult to see that a subset C of k is a homotopy base of Γ if and only if the set {(P ◦ Q−1 , 1ιP ) : (P, Q) ∈ C} is a homotopy base for Γ. Thus we say that a set D of closed paths is a homotopy base if the corresponding set {(P, 1ιP ) : P ∈ D} is a homotopy base. 2.3. Rational relations. For references purposes, we briefly recall here some basic definitions and results regarding rational relations; we only consider relations of the form R ⊆ A∗ ×B ∗ . The set of rational relations between A∗ and B ∗ is the smallest subset of PA∗ × B ∗ that contains the empty set ∅, all singleton sets {(u, v)}, and is closed under the operations of union, product, and the Kleene star ∞ [ ∗ X i. X 7→ X = i=0 Note that the set of rational relations is also closed under the Kleene plus operation X 7→ X + = X ∗ X. Proposition 2.1 ([47, Examples 5.1 & 5.5]). For any regular language L ⊆ A∗ , the relation { (u, u) : u ∈ L } ⊆ A∗ × A∗ is rational. Proposition 2.2. Let K ⊆ A∗ and L ⊆ B ∗ be regular languages. If R ⊆ A∗ × B ∗ is a rational relation, then R ∩ (K × L) is a rational relation. In particular, K × L is a rational relation. Proof. Let T be a transducer recognizing R and let M and N be finite automata recognizing K and L respectively. Adapt T to simulate M and N on the inputs from its first and second tapes, respectively, and to accept only if the simulated copies of M and N are in accept states. This adapted transducer recognizes R ∩ (K × L).  2.4. Automaticity and biautomaticity. Definition 2.3. Let A be an alphabet and let $ be a new symbol not in A. Define the mapping $ : A∗ × A∗ → ((A ∪ {$}) × (A ∪ {$}))∗ by (u1 · · · um , v1 · · · vn ) 7→   if m = n, (u1 , v1 ) · · · (um , vn ) (u1 , v1 ) · · · (un , vn )(un+1 , $) · · · (um , $) if m > n,   (u1 , v1 ) · · · (um , vm )($, vm+1 ) · · · ($, vn ) if m < n, and the mapping $ : A∗ × A∗ → ((A ∪ {$}) × (A ∪ {$}))∗ by (u1 · · · um , v1 · · · vn ) 7→   if m = n, (u1 , v1 ) · · · (um , vn ) (u1 , $) · · · (um−n , $)(um−n+1 , v1 ) · · · (um , vn ) if m > n,   ($, v1 ) · · · ($, vn−m )(u1 , vn−m+1 ) · · · (um , vn ) if m < n, where ui , vi ∈ A. 10 ALAN J. CAIN, ROBERT D. GRAY, AND ANTÓNIO MALHEIRO Definition 2.4. Let M be a finitely generated monoid. Let A be a finite set of generators for M and let L ⊆ A∗ be a regular language such that every element of M has at least one representative in L. For each a ∈ A ∪ {ε}, define the relations La = {(u, v) : u, v ∈ L, ua =M v} aL = {(u, v) : u, v ∈ L, au =M v}. The pair (A, L) is an automatic structure for M if L$a is a regular language over (A ∪ {$}) × (A ∪ {$}) for all a ∈ A ∪ {ε}. A monoid M is automatic, or auto, if it admits an automatic structure with respect to some finite generating set. The pair (A, L) is a biautomatic structure for M if L$a , a L$ , $ La , and $a L are regular languages over (A ∪ {$}) × (A ∪ {$}) for all a ∈ A ∪ {ε}. A monoid M is biautomatic, or biauto, if it admits a biautomatic structure with respect to some finite generating set. [Note that biauto implies auto.] Hoffmann & Thomas have made a careful study of biautomaticity for semigroups [53]. They distinguish four notions of biautomaticity for semigroups that require at least one of L$a and $ La and at least one of a L$ and $a L to be regular. These notions are all equivalent for groups and more generally for cancellative semigroups [53, Theorem 1] but distinct for semigroups [53, Remark 1 & § 4]. biauto clearly implies all four Hoffmann–Thomas notions of biautomaticity. However, we shall shortly prove that, within the class of homogeneous monoids, any of the Hoffmann–Thomas notions of biautomaticity implies biauto (see Proposition 2.7). In proving that R$ or $ R is regular, where R is a relation on A∗ , a useful strategy is to prove that R is a rational relation (that is, a relation recognized by a finite transducer [47, Theorem 6.1]) and then apply the following result, which is a combination of [54, Corollary 2.5] and [53, Proposition 4]: Proposition 2.5. If R ⊆ A∗ ×A∗ is rational relation and there is a constant k such that |u| − |v| ≤ k for all (u, v) ∈ R, then R$ and $ R are regular. Now we shall prove some results on automaticity and biautomaticity for the class of homogeneous monoids. Unlike the situation for groups, both automaticity and biautomaticity for monoids and semigroups are dependent on the choice of generating set [25, Example 4.5]. However, for monoids, biautomaticity and automaticity are independent of the choice of semigroup generating sets [55, Theorem 1.1]. In our particular case of homogeneous monoids, we do have independence of the choice of generating set: Proposition 2.6. Let M be a homogeneous monoid that is auto (respectively, biauto). Then for any finite generating set C of M there is a language K over C such that (C, K) is an automatic (respectively, biautomatic) structure for M . Proof. We first consider the case for auto. Suppose (B, L) is an automatic structure for M . Notice that both the alphabet B and the alphabet C must contain a subalphabet representing the unique minimal generating set of M . Without ON HOMOGENEOUS MONOIDS 11 loss of generality, assume that they both contain the alphabet A representing this minimal generating set. For each b ∈ B, let wb ∈ A∗ be such that wb =M b. Let Q ⊆ B ∗ × A∗ be the relation  ∗ (b, w) : b ∈ B . Since Q is simply the subset of B ∗ × A∗ obtained by taking the Kleene star of the finite set of elements of the form (b, wb ), it is by definition a rational relation. Let   K = L ◦ Q = v ∈ A∗ : (∃u ∈ L) (u, v) ∈ Q . Let a ∈ A ∪ {ε}. Then (u, v) ∈ Ka ⇐⇒ u ∈ K ∧ v ∈ K ∧ ua =M v ⇐⇒ (∃u′ , v ′ ∈ L)((u′ , u) ∈ Q ∧ (v ′ , v) ∈ Q ∧ u′ a =M v ′ ) ⇐⇒ (∃u′ , v ′ ∈ L)((u′ , u) ∈ Q ∧ (v ′ , v) ∈ Q ∧ (u′ , v ′ ) ∈ La ) ⇐⇒ (u, v) ∈ Q−1 ◦ La ◦ Q. Since a composition of rational relations is rational [47, Theorem 4.4], it follows that Ka = Q−1 ◦ La ◦ Q is a rational relation. Furthermore (u, v) ∈ Ka =⇒ ua =M v =⇒ (ua)λ = vλ =⇒ uλ + aλ = vλ =⇒ |u| + 1 = |v|; thus Ka$ is a regular language by Proposition 2.5. For c ∈ C − A, let u = u1 · · · um ∈ A∗ be such that u = c; then Kc$ = (Ku1 ◦ Ku2 ◦ · · · ◦ Kum )$ is regular by [25, Proposition 2.3] and similarly $ Kc is regular. Hence (C, K) is an automatic structure for M . For biauto, assume (B, L) is a biautomatic structure for M and follow the above reasoning to show that each of the languages Ka$ , a K $ , $ Ka , and $ K are regular.  a Proposition 2.7. Let M be a homogeneous monoid, let B be a finite generating set for M , and let L be a regular language over B such that every element of M has at least one representative in L and such that, for each b ∈ B ∪ {ε}, at least one of L$b and $ Lb and at least one of b L$ and $b L is regular. Then M is biauto. Proof. Suppose L$b and b L$ are regular; the other cases are similar. As in the proof of Proposition 2.6, the alphabet B must contain the unique minimal generating set A of M . Construct the relation Q ⊆ B ∗ × A∗ as in the proof of Proposition 2.6. Let K = L ◦ Q. Let a ∈ A ⊆ B. Then at least one of L$a and $ La and at least one of $ $ a L and a L is regular. In particular, La and a L are rational relations. So −1 Ka = Q ◦ La ◦ Q and a K = Q−1 ◦ a L ◦ Q are rational relations. If (u, v) is in Ka or a K, then |u| + 1 = |v|. Hence Ka$ , $ Ka , a K $ , and $a K are all regular by Proposition 2.5. Since a ∈ A ∪ {ε} was arbitrary, this proves that (A, K) is a biautomatic structure for M .  12 ALAN J. CAIN, ROBERT D. GRAY, AND ANTÓNIO MALHEIRO Despite the positive results obtained so far, note that auto does not imply biauto in the class of homogeneous monoids, as we shall see below in Example 3.1. 3. Fundamental examples 3.1. An fcrs, fdt, non-biauto, auto homogeneous monoid. In this subsection we present a homogeneous monoid that is fcrs and thus fdt, is auto, but is not biauto. By considering the reversal semigroup of this example we will get a homogeneous monoid that admits a finite complete rewriting system but is not automatic. Example 3.1. Let Mfcrs auto be the monoid defined by the presentation hA | Ri, where A = {a, b, c} and R consists of the rewriting rules cxyz → cxcz, cbca → cacb. (x, y, z ∈ {a, b}) Proposition 3.2. The monoid Mfcrs auto is fcrs. Proof. The rewriting system (A, R) is noetherian because every rewriting rule either decreases the number of non-c symbols, or it stays the same and decreases the number of symbols b to the left of symbols a. To see that it is confluent, notice that the only overlaps are those between the left-hand side of cbca → cacb and the left-hand side of a rule of the form cayz → cacz, where y, z ∈ {a, b}. However, they resolve since we have ( cacbyz → cacbcz cbcayz → , for any y, z ∈ {a, b}. cbcacz → cacbcz Therefore (A, R) is confluent. Proposition 3.3. The monoid  Mfcrs auto is auto, but non-biauto. Proof. Let L be the language of normal forms of (A, R). Since (A, R) is finite, L is regular [23, Lemma 2.1.3]. Let u ∈ L. Consider the following cases separately: (1) uc must also be in normal form, since no left-hand side of a rewriting rule ends in c. Hence Lc = { (u, u) : u ∈ L }(ε, c), and so Lc is rational by Proposition 2.1. (2) If ub is not in normal form, then ub must end with the left-hand side of a rewriting rule. Hence u = u′ cxy for some x, y ∈ {a, b}, then ub = u′ cxyb → u′ cxcb. This word u′ cxcb is in normal form since u′ cx (which is a prefix of u) is in normal form and no rewriting rule has left-hand side cxcb for any x ∈ {a, b}. Thus Lb = { (u, u)(ε, b) : u ∈ L, ub ∈ L } ∪ { (u′ cxy, u′ cxcb) : x, y ∈ {a, b}, u′ cxy ∈ L } = { (u, u)(ε, b) : u ∈ L, ub ∈ L }  ∪ { (u′ , u′ ) : u′ ∈ L }{ (cxy, cxcb) : x, y ∈ {a, b} } ∩ (L × L) , and so Lb is rational by Proposition 2.2. ON HOMOGENEOUS MONOIDS 13 (3) If ua is not in normal form, then ua must end with the left-hand side of a rewriting rule and so either u = u′ cbc or u = u′ cxy for some x, y ∈ {a, b}. (a) If u = u′′ (cb)α y, with y ∈ {a, b, c} and where α ≥ 1 is maximal, then ua = u′′ (cb)α ya →∗ u′′ ca(cb)α , since ua = u′′ (cb)α ya → u′′ (cb)α ca when y ∈ {a, b}, and then cbca → cacb. Now, u′′ ca(cb)α is in normal form since u′′ and ca(ab)α are in normal form and the only left-hand side of a rewriting rule of that ends in ca is cbca, and α is maximal. (b) If u = u′ cay, with y ∈ {a, b}, then ua = u′ caya → u′ caca and this word is in normal form since u′ ca is in normal form. Therefore La = { (u, ua) : u ∈ L, ua ∈ L } ∪ { (u′′ (cb)α y, u′′ ca(cb)α ) : α ∈ N, y ∈ {a, b, c}, u′′ (cb)α y ∈ L, u′′ ∈ / A∗ cb } ∪ { (u′ cay, u′ caca) : y ∈ {a, b}, u′ cay ∈ L }  = { (u, u)) : u ∈ L }(ε, a) ∩ (L × L) ∪ { (u′′ u′′ ) : u′′ ∈ L \ (A∗ cb) }(ε, ca)(cb, cb)+ { (y, ε) : y ∈ {a, b, c} } ∩ L × L  ∪ { (u′ , u′ ) : u′ ∈ L }{ (cay, caca) : y ∈ {a, b} } ∩ L × L , and so La is a union of relations, each of which is rational by Proposition 2.1 and 2.2. Note also that Lε = {(u, u) : u ∈ L} is rational. Hence Lx is a rational relation for any x ∈ A ∪ {ε}. Moreover, if (u, v) lies in one of these relations, then |u| − |v| ≤ 1 and so L$x is regular for all x ∈ A ∪ {ε} by Propositions 2.5 and 2.2. Hence Mfcrs auto is auto. Suppose, with the aim of obtaining a contradiction, that Mfcrs auto is biauto. Then by Proposition 2.6 it admits a biautomatic structure (A, L). Thus L is $ a regular language mapping onto Mfcrs auto and c L is regular. This contradicts Lemma 3.4 below.  Lemma 3.4. There is no regular language L ⊆ A∗ such that L maps onto $ Mfcrs auto and c L is regular. Proof. Suppose, with the aim of obtaining a contradiction, that such a language L exists. Then (c L ◦ c L−1 )$ is regular. Let n be an even number exceeding the number of states in an automaton recognizing (c L ◦ c L−1 )$ . Observe that −1 = {(u, v) ∈ L : cu =M cv}. cL ◦ cL Notice that an bn+1 is not represented by any other word over A and similarly bn an b is not represented by any other word over A. So an bn+1 , bn an b ∈ L. Furthermore, can bn+1 →∗ (ca)n/2 (cb)(n/2)+1 and cbn an b →∗ (cb)n/2 (ca)n/2 cb →∗ (ca)n/2 (cb)(n/2)+1  14 ALAN J. CAIN, ROBERT D. GRAY, AND ANTÓNIO MALHEIRO and so (an bn+1 , bn an b) ∈ c L ◦ c L−1 . Since n exceeds the number of states in an automaton recognizing (c L ◦ c L−1 )$ , we can apply the pumping lemma to a segment of the word that lies within the first n letters of (an bn+1 , bn an b)$ (that is, to a subword of the form (ak , bk )$ for some k ≥ 1) to see that (an+ik bn+1 , bn+ik an b) ∈ c L ◦ c L−1 for some k ≥ 1 and for all i ∈ N. Hence, by definition of the relation c L, we have can+ik bn+1 =M cbn+ik an b. But can+2k bn+1 →∗ (ca)n/2+k (cb)(n/2)+1 and cbn+2k an b →∗ (cb)n/2+k (ca)n/2 cb →∗ (ca)n/2 (cb)(n/2)+k+1 , and so the normal forms of can+ik bn+1 and cbn+ik an b are unequal; this contradicts the previous equality. Thus M is not biauto.  3.2. An fcrs, fdt, non-biauto, non-auto homogeneous monoid. Definition 3.5. Let S be a monoid defined by a presentation hA | Ri. Denote by M rev the monoid defined by the presentation hA | Rrev i, where Rrev = {(lrev , r rev ) : (l, r) ∈ R}, that is called the reversal monoid of M . [Note that (M rev )rev ≃ M .] fcrs rev , which is defined by the presenExample 3.6. Let Mfcrs nonauto = (Mauto ) tation hA | Rrev i, where hA | Ri is the presentation defining Example 3.1. rev i we can argue as in the proof Since Mfcrs nonauto is presented by hA | R of Proposition 3.2 that the rewriting system is noetherian and that the overlaps, that result in critical pairs, resolve in a similar way. Thus Mfcrs nonauto is also fcrs and thus fdt. Proposition 3.7. Mfcrs nonauto is non-auto. Proof. Suppose, with the aim of obtaining a contradiction, that Mfcrs nonauto $ is auto. Let (A, L) be an automatic structure for Mfcrs nonauto . Then La is fcrs regular for all a ∈ A ∪ {ε}. Since Mnonauto is homogeneous, if (u, v) ∈ La , then |u| − |v| ≤ 1 and so $ La is regular by [56, Corollary 4.2]. Notice $ that ($ La )rev = a (Lrev ) . Hence Lrev is a regular language mapping onto $ rev rev ≃ Mfcrs Mfcrs such that a (Lrev ) is regular. Since Mfcrs nonauto auto , nonauto fcrs  this contradicts Lemma 3.4 and so Mnonauto is indeed non-auto. 3.3. A non-fcrs, fdt, biauto, auto homogeneous monoid. The following homogeneous monoid was introduced by Katsura and Kobayashi [57, Example 3], who showed that it is non-fcrs, but is fdt. We shall prove that it is biauto and thus auto. Example 3.8. Let A = {a, bi , ci , di : i = 1, 2, 3} and let R consist of the rewriting rules (3.1) bi a → abi i ∈ {1, 2, 3}, (3.2) cj bj → c1 b1 j ∈ {2, 3}, (3.3) bj dj → b1 d1 j ∈ {2, 3}. ON HOMOGENEOUS MONOIDS 15 fdt Let Mfdt biauto = hA | Ri. Then Mbiauto is fdt [57, § 4] but is non-fcrs [57, Proposition 3]. Proposition 3.9. The monoid Mfdt biauto of Example 3.8 is biauto and thus auto. Proof. Let S consist of the following rewriting rules: (3.4) bi a → abi (3.5) cj ak bj → c1 ak b1 k i ∈ {1, 2, 3}, k (3.6) c1 a b1 dj → cj a b1 d1 (3.7) bj dj → b1 d1 j ∈ {2, 3}, k ∈ N ∪ {0}, j ∈ {2, 3}, k ∈ N ∪ {0}, j ∈ {2, 3}. Notice that every rule in S is a consequence of those in R. Indeed, using rules in R, we have cj ak bj ↔ cj ak−1 bj a ↔ . . . ↔ cj bj ak ↔ c1 b1 ak ↔ c1 ab1 ak−1 ↔ . . . ↔ c1 ak b1 ; and c1 ak b1 dj ↔ . . . ↔ c1 b1 ak dj ↔ cj bj ak dj ↔ . . . ↔ cj ak bj dj ↔ cj ak b1 d1 . Consider any ordering < of A satisfying b1 < bj < a < d1 < dj (for j ∈ {2, 3}). By [48, Lemma 2.4.3] the right-to-left length-plus-lexicographic order induced by < is noetherian. Moreover, any rewriting using a rule in S decreases a word with respect to this ordering. Thus the rewriting system (A, S) is noetherian. To see that (A, S) is confluent, notice that there are two possible overlaps of left-hand sides of rewriting rules: an overlap of (3.4) and (3.5), and an overlap of (3.5) and (3.7). However, critical pairs resolve, since ( cj ak+1 bj → c1 ak+1 b1 k cj a bj a → c1 ak b1 a → c1 ak+1 b1 and ( cj ak b1 d1 cj ak bj dj → c1 ak b1 dj → cj ak b1 d1 . Let L be the language of S-irreducible words of A∗ . That is,  L = A∗ − A∗ {b1 a, b2 a, b3 a} ∪ {c2 , c3 }a∗ {b2 , b3 }  ∪ c1 a∗ b1 {d2 , d3 } ∪ {b2 d2 , b3 d3 } A∗ ; thus L is regular. To prove that (A, L) is an automatic structure for Mfdt biauto, we first show that Lx and x L are rational relations for all x ∈ A ∪ {ε}. Since L is a cross-section for Mfdt biauto , the relations Lε and ε L are both equal to the equality relation and hence are trivially rational. So let x ∈ A and w ∈ L. Suppose first that x ∈ {b2 , b3 }, then there may be a left-hand side of a rewriting rule of type (3.5) at the rightmost end of the word wx. In this case, w must be of the form w′ cj ak for some w′ ∈ L (since a prefix of a irreducible word is irreducible), j ∈ {2, 3} and k ∈ N ∪ {0}; applying the rewriting rule yields w′ c1 ak b1 , which is in normal form since 16 ALAN J. CAIN, ROBERT D. GRAY, AND ANTÓNIO MALHEIRO no left-hand side of a rewrite rule contains c1 except for (3.6), which clearly cannot be applied. So when x ∈ {b2 , b3 }, at most one application of a rewrite rule at the rightmost end turns wx into a normal form word. Hence  Lbj = (w, wx) : w ∈ L \ Lcj a∗  ∪ (w′ cj ak , w′ c1 ak b1 ) : w′ ∈ L, k ∈ N ∪ {0}  = (w, w) : w ∈ L \ Lcj a∗ (ε, x)  ∪ (w′ , w′ ) : w′ ∈ L (cj , c1 )(a, a)∗ (ε, b1 ). Hence each Lbj is a rational relation by Proposition 2.2. Suppose now that x ∈ {d2 , d3 }. Reasoning similar to the previous paragraph shows that wx is in normal form, or one application of a rewrite rule of type (3.6) or (3.7) turns it into normal form. (Note that an application of a rule of type (3.7) might be followed by one of type (3.5), but these can be replaced by one of type (3.6).) Hence  Ldj = (w, wx) : w ∈ L \ (Lc1 a∗ b1 ∪ Ld2 ∪ Ld3 )  ∪ (w′ c1 ak b1 , w′ cj ak b1 d1 ) : w′ ∈ L, k ∈ N ∪ {0}  ∪ (w′ bj , w′ b1 d1 ) : w′ ∈ L \ Lc1 a∗  = (w, w) : w ∈ L \ (Lc1 a∗ b1 ∪ Ld2 ∪ Ld3 ) (ε, x)  ∪ (w′ , w′ ) : w′ ∈ L (c1 , cj )(a, a)∗ (b1 , b1 )(ε, d1 )  ∪ (w′ , w′ ) : w′ ∈ L \ Lc1 a∗ (bj , b1 )(ε, d1 ). Hence each Ldj is a rational relation by Proposition 2.2. Suppose that x = a. Then the only rewriting rules that can apply to / wx are a sequence of rule of type (3.4), rewriting w′ ybi1 · · · bik a (where y ∈ {b1 , b2 , b3 }) to w′ yabi1 · · · bik . This resulting word is in normal form, since the only way a rewriting rule could apply was if y = ci1 , but this means the word w would contain ci1 bi1 , which contradicts w ∈ L. Hence  La = (w′ ybj1 · · · bjk , w′ yabj1 · · · bjk ) : w′ y ∈ L, bj1 , . . . , bjk ∈ {1, 2, 3}, k ∈ N ∪ {0}  = (w′ y, w′ y) : w′ y ∈ L (ε, a){ (bj , bj ) : j ∈ {1, 2, 3} }∗ . Finally, if x ∈ {b1 , c1 , c2 , c3 , d1 }, then wx is already in normal form: hence, in this case, Lx = { (w, w)(ε, x) : w ∈ L }. In each case, Lx is a rational relation. Since Mfdt biauto is homogeneous, if (u, v) ∈ Lx for x ∈ A, then |v| = |ua| = |u| + 1. Furthermore, if (u, v) ∈ Lε , then |u| = |v|. Hence L$x and $ Lx are regular for all x ∈ A ∪ {ε} by Proposition 2.5. Similar reasoning shows that x L is a rational relation: if x ∈ {b1 , b2 , b3 } and w ∈ L, then rewriting xw to normal form can consist of a sequence of applications of rules of type (3.4) followed possibly by one of type (3.3); for all other x, at most one rewriting rule is required. Proposition 2.5 then applies to show that x L$ and $x L are regular. Hence (A, L) is a biautomatic structure for Mfdt  biauto . ON HOMOGENEOUS MONOIDS 17 3.4. A non-fcrs, non-fdt, biauto, auto homogeneous monoid. In this section we give an example of a homogeneous monoid that is non-fdt and thus non-fcrs, but which is biauto and thus auto. Example 3.10. Let A = {a, b} and let R be the rewriting system on A∪{c} consisting of the three rules: Ka : ac → ca Kb : bc → cb C : cab → cbb. Let P be the presentation hA ∪ {c} | Ri, and let Mnonfdt biauto be the monoid presented by P. Theorem 3.11. The monoid Mnonfdt biauto : ∗ + ∗ ∗ (1) has A ∪ c b a as set of unique normal forms (that is, it is a set, over the generating set A, in one-to-one correspondence with the elements of Mnonfdt biauto ); (2) is biauto and thus auto; (3) is non-fdt and thus non-fcrs. Part 1 of Theorem 3.11 will follow from Lemma 3.13 below, and part 2 is proved in Lemma 3.14. Then, the rest of the subsection will be devoted to proving that Mnonfdt biauto is non-fdt, thus establishing part 3. Remark 3.12. The methods we use here to prove that Example 3.10 is notfdt are similar to those used in the proof of [44, Theorem 1]. In particular we will use the notion of critical peaks, and resolution of critical peaks, in our proof. We refer the reader to [44, Section 2] for the definitions of these concepts, and their connection with complete rewriting systems and fdt. Let us begin by fixing some of the notation. We start by adding to P infinitely many rules of the form C u : cuab → cubb (u ∈ A∗ ) and denote by R′ the set of all these rules. Notice first that C ǫ is precisely the rule C defined above and that, for any word u ∈ A∗ the words cuab and cubb represent the same element of the monoid Mnonfdt biauto , since in the word cuab we can use relations of the form Kx to pass the letter c through the word u from left to right, then replace cab by cbb using the relation C, and finally move the c back through u again from right to left using the relations Kx . It follows that the presentations P = hA ∪ {c} | Ri and P = hA ∪ {c} | R ∪ R′ i are equivalent presentations, in the sense that two words u, v ∈ (A ∪ {c})∗ are equivalent modulo the relations R if and only if they are equivalent modulo the relations R ∪ R′ . In particular, the monoid Mnonfdt biauto is also defined by the infinite presentation P = A ∪ {c} | R ∪ R′ . Lemma 3.13. The infinite presentation P is a complete presentation of Mnonfdt biauto . The set of irreducible words with respect to this complete rewriting system is A∗ ∪ c+ b∗ a∗ = A∗ ∪ { ci bj cl : i ∈ N, j, k ∈ N ∪ {0} }. 18 ALAN J. CAIN, ROBERT D. GRAY, AND ANTÓNIO MALHEIRO Proof. The fact that P is a presentation for Mnonfdt biauto follows from the comments made before the statement of the lemma. By considering the (left-toright) length-plus-lexicographic ordering on {a, b, c}∗ induced by a > b > c one sees that the rewriting system P is noetherian. The set of irreducible words under this rewriting system is the set A∗ ∪ c+ b∗ a∗ . Indeed, if a irreducible word contains a symbol c, it cannot be to the left of a symbol from A, otherwise we could apply a relation Ka or Kb . Moreover, if the word also contains a symbol b, then all symbols a must be to the right of the rightmost symbol b, since otherwise we could use a relation of the form C u . Finally, to prove that P is confluent it suffices to consider all possible overlaps between left-hand sides of the rewriting rules Kx (x ∈ A) and C u (u ∈ A∗ ), showing that all critical peaks arising from these overlaps resolve (see [44, Section 2]). There are three different ways in which these rewrite rules can overlap, giving rise to three types of critical peaks, all of which can be resolved; see Figure 3. This proves that P is confluent and thus completes the proof of the lemma.  Lemma 3.14. The monoid Mnonfdt biauto is biauto. Proof. Let L = A∗ ∪ c+ b∗ a∗ . We will prove that (A∪ {c}, L) is a biautomatic structure for Mnonfdt biauto . By the previous lemma, L is a regular language such that every element of Mnonfdt biauto has a unique representative in L. Hence Lε = { (w, w) : w ∈ L }; thus Lε is a rational relation. Now let u ∈ L. Regardless of whether u ∈ A∗ or u ∈ c+ b∗ a∗ , the word ua also lies in L. Hence La = { (u, ua) : u ∈ L } = { (u, u) : u ∈ L }(ε, a) is a rational relation by Proposition 2.1. If u ∈ A∗ , then ub also lies in L. On the other hand, if u = ci bj ak , then ub = ci bj ak b →∗ ci bj+k+1 via a sequence of applications of rules C u . Hence Lb = { (u, ub) : u ∈ A∗ } ∪ { (ci bj ak , ci bj+k+1 ) : i ≥ 1, j, k ≥ 0 } = { (u, u) : u ∈ A∗ }(ε, b) ∪ (c, c)+ (b, b)∗ (a, b)∗ (ε, a) is a rational relation by Proposition 2.1. If u = ak , then uc = ak c →∗ cak using a sequence of applications of rules Ka . If u ∈ A∗ and u contains at least one symbol b, then u = u′ bak for ′ some u′ ∈ A∗ and k ∈ N ∪ {0} and so uc = u′ bak c →∗ cu′ bak →∗ cb|u |+1 ak by a sequences of applications of rules of Ka and Kb and a sequence of applications of rules C u . Hence Lc = { (ak , cak ) : k ≥ 0 } ∪ { (ubak , cb|u|+1 ak ) : u ∈ A∗ , k ≥ 0 } ∪ { (ci bj ak , ci+1 bj ak ) : i ≥ 1, j, k ≥ 0 } = (ε, c)(a, a)∗ ∪ (ε, c){(a, b), (b, b)}∗ (b, b)(a, a)∗ ∪ (ε, c)(c, c)+ (b, b)∗ (a, a)∗ ON HOMOGENEOUS MONOIDS 19 is a rational relation. Similar reasoning shows that aL = { (u, au) : u ∈ A∗ } ∪ { (ci ak , ci ak+1 ) : i ≥ 1, k ≥ 0 } ∪ { (ci bj ak , ci bj+1 ak ) : i, j ≥ 1, k ≥ 0 } = (ε, a){(a, a), (b, b)}∗ ∪ (c, c)+ (a, a)∗ (ε, a) ∪ (c, c)+ (b, b)+ (ε, b)(a, a)∗ ; bL = { (u, bu) : u ∈ A∗ } ∪ { (ci bj ak , ci bj+1 ak ) : i ≥ 1, j, k ≥ 0 } = (ε, b){(a, a), (b, b)}∗ ∪ (c, c)+ (ε, b)(b, b)+ (aa, a)∗ cL = { (ak , cak ) : k ≥ 0 }; ∪ { (ubak , cb|u|+1 ak ) : u ∈ A∗ , k ≥ 0 } ∪ { (ci bj ak , ci+1 bj ak ) : i ≥ 1, j, k ≥ 0 } = (ε, c)(a, a)∗ ∪ (ε, c){(a, b), (b, b)} ∗ (b, b)(a, a)∗ ∪ (ε, c)(c, c)+ (b, b)∗ (a, a)∗ ; thus a L, b L, and c L are all rational. Since (u, v) ∈ x L ∪ Lx for any x ∈ A ∪ ε implies |u| − |v| ≤ 1 , Proposition 2.5 shows that their images under $ and $ are regular. Hence (A, L) is a biautomatic structure for Mnonfdt  biauto . Let Γ denote the derivation graph of P, and Γ the derivation graph of P. Let ΓZ denote the connected components of Γ with vertex set the set of all words in A ∪ {c} with at least two occurrences of the letter c. Likewise let ΓZ be the connected component of Γ with the same vertex set as ΓZ . There are three infinite families (CT 1), (CT 2) and (CT 3) of closed paths in Γ, as displayed in Figure 3, that correspond to resolutions of all critical peaks. Each such closed path we obtain we shall call a critical circuit. Let us denote by C the critical circuits of the form (CT 1) and (CT 3) and denote by Z the critical circuits of the form (CT 2). Observe that the critical circuits in Z are in ΓZ since the words labelling vertices in (CT 2) all contain two occurrences of the letter c. The set of critical circuits C ∪ Z forms an infinite homotopy base for Γ (see [44, Lemma 3]). We now want to use the infinite homotopy base C ∪ Z for Γ to obtain an infinite homotopy base for Γ. In order to do this we need to take the critical circuits (CT 1)–(CT 3) and transform them into circuits in the derivation graph Γ by replacing each occurrence of an edge C u by a corresponding path in Γ. As mentioned above when proving that P and P are equivalent presentations, the edges C u can be realized in Γ by paths Cu which are defined 20 ALAN J. CAIN, ROBERT D. GRAY, AND ANTÓNIO MALHEIRO cuabc xcuab Kx · uab cxuab x · Cu (CT 1) xcubb Kx · ubb C xu cua · Kb Cu · c cxubb cubbc (CT 2) cuacb cub · Kb cu · Ka · b cubcb cucab cu · C cu · Kb · b cucbb cuabvab C uabv C u · vab cubbvab (CT 3) cuabvbb C ubbv C u · vbb cubbvbb Figure 3. Resolutions of the critical peaks in the derivation graph Γ of the presentation P. Here x, y ∈ A and u, v ∈ A∗ . inductively as follows: we first set Cǫ to be the rule C, and then for u = xu′ , with x ∈ A and u′ ∈ A∗ we set Cu to be the path (3.8) Cu : K −1 ·u′ ab x·C K ·u′ bb x x cxu′ ab −−− −−−→ xcu′ ab −−−u→ xcu′ bb −−− −−→ cxu′ bb. ′ So, Cu is the path in Γ from cuab to cubb given by commuting c through u using the relations Kx , applying the relation C to transform ucab into ucbb, and then commuting c back through u again using the relations Kx , ending at the vertex cubb. Now let us define a mapping ϕ from the set of paths P (Γ) in Γ to the set of paths P (Γ) in Γ. Let ϕ : P (Γ) → P (Γ) be the map given by (α·C u ·β)ϕ = α · Cu · β, for all α, β ∈ (A ∪ {c})∗ and u ∈ A∗ , and defined to be the identity on every other edge of Γ. Let C = (C)ϕ and Z = (Z)ϕ. Since C ∪ Z forms a homotopy base for Γ it follows that C ∪ Z is an infinite homotopy base for Γ (see [35, Corollary 3.7]). Observe that the infinite homotopy base C ∪ Z for Γ is nothing more than the set of circuits in Γ obtained by taking the set of circuits (CT 1)–(CT 3) and replacing each occurrence of the edge C u by the path Cu defined in (3.8). Let us denote this corresponding set of circuits C ∪ Z in Γ by (CT 1)–(CT 3). The monoid Mnonfdt biauto is presented by the finite presentation P and Γ is the derivation graph of P which has an infinite homotopy base C ∪ Z. Lemma 3.15 ([35, Discussion before Definition 3.3]). If Mnonfdt biauto were fdt then there would be a finite subset C0 ∪ Z0 of C ∪ Z which would be a finite homotopy base for Γ. Sketch. Since D is a finite homotopy base, each path in D is homotopic to an empty path using finitely many paths from C ∪ Z, and thus the finite subset of C ∪ Z consisting of all paths arising this way is a homotopy base.  ON HOMOGENEOUS MONOIDS 21 Our aim now is to show that this leads to a contradiction, and thus conclude that Mnonfdt biauto is not fdt. In order to do this we shall now define a mapping from the set of paths P (Γ) in Γ into the integral monoid ring ZM. Define Φ : P (Γ) → ZM to be the unique map which extends the mapping: • (α · Ka · β)Φ = α, (α · Kb · β)Φ = α, and • (α · C · β)Φ = α, nonfdt where α, β ∈ (A ∪ {c})∗ and α ∈ Mnonfdt biauto denotes the element of Mbiauto represented by the word α, to paths in such a way that (P ◦ Q)Φ = (P)Φ + (Q)Φ and (P−1 )Φ = −(P)Φ. The following basic properties of Φ are then easily verified for all paths P, Q ∈ P (Γ) and words α, β ∈ (A ∪ {c})∗ : (1) (α · P · β)Φ = α · (P)Φ (2) (P ◦ P−1 )Φ = 0 (3) ([P, Q])Φ = 0 where [P, Q] = (P · ιQ) ◦ (τ P · Q) ◦ (P−1 · τ Q) ◦ (ιP · Q−1 ). (4) If P ∼0 Q then (P)Φ = (Q)Φ. Here, property 4 follows from properties 1, 2 and 3. Note that property 4 implies that Φ induces a well-defined map on the homotopy classes of paths of Γ. In what follows we shall often omit bars from the top of words in the images under Φ and simply write words from (A ∪ {c})∗ with the obvious intended meaning. Recall that C is the set of critical circuits of the form (CT 1) and (CT 3), and that C = (C)ϕ is the corresponding set of circuits in Γ. Let F = A∗ denote the free monoid on the alphabet A. Lemma 3.16. If Mnonfdt biauto is fdt then the submodule h(C)ΦiZF , of the left ZF -module ZF , generated by (C)Φ is a finitely generated left ZF -module. Proof. Assume that Mnonfdt biauto is fdt and therefore P is fdt. Since C ∪ Z is a homotopy base for its derivation graph Γ, by Lemma 3.15 there are finite subsets C0 ⊆ C and Z0 ⊆ Z such that C0 ∪ Z0 is a finite homotopy base for Γ. Let P ∈ C be arbitrary. We claim that (P)Φ ∈ h(C0 )ΦiZF . Once established, this will prove the lemma, since (C0 )Φ is a finite subset of h(C)ΦiZF . By [44, Lemma 2], since P is a closed path in Γ and C0 ∪ Z0 is a homotopy base for Γ, we can write (3.9) −1 P ∼0 P−1 1 ◦ (α1 · Q1 · β1 ) ◦ P1 ◦ · · · ◦ Pn ◦ (αn · Qn · βn ) ◦ Pn , where each Pi ∈ P (Γ), αi , βi ∈ (A ∪ {c})∗ and Qi ∈ (C0 ∪ Z0 )±1 . Since the vertices of P have exactly one c, and all the relations in the presentation P involve the letter c, it follows that αi , βi ∈ A∗ and Qi ∈ C0 , for all i ∈ {1, . . . , n}. Applying Φ gives (P)Φ = α1 (Q1 )Φ + · · · + αn (Qn )Φ ∈ h(C0 )ΦiZF as claimed.  To complete our proof, it remains to compute the subset (C)Φ of ZF and then prove that the submodule h(C)ΦiZF of ZF is not finitely generated as a left ZF -module. Recall that C is the set of critical circuits of the form 22 ALAN J. CAIN, ROBERT D. GRAY, AND ANTÓNIO MALHEIRO (CT 1) and (CT 3), and that C = (C)ϕ. So C is the set of closed paths (CT 1) and (CT 3) obtained by applying the mapping ϕ to the closed paths (CT 1) and (CT 3), that is, obtained by taking each occurrence of C u and replacing it by the path Cu . From equation (3.8) we have, for any word u ∈ A∗ , if u = xu′ , with x ∈ A, the equality (Cu )Φ = −1M +x·(Cu′ )Φ+1M = x·(Cu′ )Φ, and thus we deduce that (Cu )Φ = u. Using this fact, the result of computing a critical circuit in C under the map Φ is given by: • (P)Φ = 0ZM , for a critical circuit P of the family (CT 1); • (P)Φ = u(ab − bb)v, for a critical circuit P of the family (CT 3). The next lemma completes the proof of Theorem 3.11. Lemma 3.17. The submodule h(C)ΦiZF of ZF , where (C)Φ = {u(ab − bb)v | u, v ∈ A∗ } ∪ {0ZM }, is not finitely generated as a left ZF -module, and therefore Mnonfdt biauto is not fdt. Proof. Suppose, with the aim of obtaining a contradiction, that h(C)ΦiZF is finitely generated as a left ZF -module. Then there exists a finite subset X of (C)Φ such that hXiZF ⊇ (C)Φ. Let n ∈ N be the maximal length of a word v where u(ab − bb)v ∈ X. We shall show that (ab − bb)an+1 belongs to (C)Φ but not to hXiZF . Suppose that in ZF we have n+1 (ab − bb)a = k X αi (ab − bb)vi , i=1 where αi , vi ∈ A∗ and |vi | ≤ n, for i = 1, . . . , k. Then for some j ∈ {1, . . . , k} we have either bban+1 = αj abvj or bban+1 = αj bbvj in the free monoid F = {a, b}∗ , which clearly contradicts the fact that |vi | ≤ n. We conclude that (C)Φ is not finitely generated as a left ZF -module, and it then follows from Lemma 3.16 that Mnonfdt  biauto is not fdt. 4. Free products of homogeneous monoids In Section 3, we gave four examples of homogeneous monoids that possess certain combinations of the properties fcrs, fdt, biauto, and auto. In this section, we use free products to construct examples with the remaining consistent combinations of these properties. Note that if monoids M1 and M2 have homogeneous presentations hA1 | R1 i and hA2 | R2 i, then their free product M1 ∗ M2 is defined by the presentation hA1 ∪ A2 | R1 ∪ R2 i and is thus also homogeneous. First we consider the interaction of the free product with biauto and auto. It is known that the free product of two monoids is auto if and only if each of the monoids is auto ([25, Theorem 6.2], [55, Theorem 1.2]). While it would be possible to extend this result to biautomaticity for general monoids, this generalization does not appear in the literature. This paper required the biautomaticity result only for homogeneous monoids, and the proofs are simpler in this case: ON HOMOGENEOUS MONOIDS 23 Proposition 4.1. Let M1 and M2 be homogeneous monoids. Then M1 ∗ M2 is auto (respectively, biauto) if and only if M1 and M2 are auto (respectively, biauto). Proof. Let hA1 | R1 i and hA2 | R2 i be homogeneous presentations for M1 and M2 , respectively. Suppose M1 ∗M2 is auto; the proof for biauto is similar. By Proposition 2.6, M1 ∗ M2 admits an automatic structure (A1 ∪ A2 , L). Since M1 is homogeneous, there is no non-empty word over A1 representing the identity of M1 ; hence every word in (A1 ∪ A2 )∗ representing an element of M2 must lie in A∗2 . Thus (A2 , L ∩ A∗2 ) is an automatic structure for M2 ; similarly, (A1 , L ∩ A∗1 ) is an automatic structure for M1 . On the other hand, suppose M1 and M2 are auto; again, the proof for biauto is similar. Then there are automatic structures (A1 , L1 ) and (A2 , L2 ) for M1 and M2 respectively. By [25, Corollary 5.5], assume without loss of generality that every element of M1 and M2 has a unique representative in L1 and L2 , respectively. Let (4.1) L = {ε}  ∪ (4.2)  ∪ (4.3)  ∪ (4.4)  ∪ (4.5)   + + + + L1 ∩ (A+ × A ) L ∩ (A × A ) 2 1 1 2 2   ∗  + + + + L1 ∩ (A+ × A ) L ∩ (A × A ) L1 ∩ (A+ 2 1 1 2 2 1 × A1 )   + + + + L2 ∩ (A+ × A ) L ∩ (A × A ) 1 2 2 1 1   ∗  + + + + L2 ∩ (A+ × A ) L ∩ (A × A ) L2 ∩ (A+ 1 2 2 1 1 2 × A2 ) ; note that L is a disjoint union of the languages (4.1)–(4.5). (Note that the language L is not equal to (L1 L2 )∗ : every word in L is a product of words strictly alternating between non-empty words from L1 and words from L2 .) Since every element of M1 ∗ M2 is represented by a unique element of L, Lε = { (u, u) : u ∈ L } is a rational relation. Now let a ∈ A1 , and let va be the unique word in L1 that is equal to a (note that va will either be a itself or another generator that is equal to a). Suppose that u ∈ L lies in (4.2) or (4.5). Then uva is the unique word in L that is equal to ua. On the other hand, if u ∈ L lies in (4.3) or (4.4), then it is of the form u′ s, where s ∈ L2 and s is the maximal suffix of u lying in A∗1 . In this case, the unique word in L equal to ua is u′ t, where t is the unique word in L1 equal to sa: that is, where (s, t) ∈ (L1 )a . Hence La = {(ε, va )}   + + + ∪ (L1 )ε ∩ (A+ 1 × A1 ) (L2 )ε ∩ (A2 × A2 ) (ε, va )   ∗  + + + + ∪ (L1 )ε ∩ (A+ × A ) (L ) ∩ (A × A ) (L1 )a ∩ (A+ 2 ε 1 1 2 2 1 × A1 )   ∗  + + + + + + ∪ (L2 )ε ∩ (A+ × A ) (L ) ∩ (A × A ) (L ) ∩ (A × A ) (L1 )a ∩ (A+ 1 ε 2 ε 2 2 1 1 2 2 1 × A1 )   ∗   + + + + + + ∪ (L2 )ε ∩ (A+ × A ) (L ) ∩ (A × A ) (L2 )ε ∩ (A+ 1 ε 2 2 1 1 2 × A2 ) (L1 )a ∩ (A1 × A1 ) . 24 ALAN J. CAIN, ROBERT D. GRAY, AND ANTÓNIO MALHEIRO Thus La is a rational relation. Since M1 ∗ M2 is homogeneous, if (u, v) ∈ Lx for x ∈ A, then |v| = |ua| = |u| + 1. Furthermore, if (u, v) ∈ Lε , then |u| = |v|. Hence L$x and $ Lx are regular for all x ∈ A ∪ {ε} by Proposition 2.5. Thus M1 ∗ M2 is automatic. (This reasoning is essentially [25, Proof of Theorem 6.2], but simplified because we consider only homogeneous semigroups.)  Now we consider the interaction of free product with fcrs within the class of homogeneous monoids. Theorem 4.2 ([58, Theorem D]). Let M1 and M2 be monoids. Suppose that M2 has no non-trivial left- or right-invertible elements. If M1 ∗ M2 is fcrs, then M1 and M2 are fcrs. Proposition 4.3. Let M1 and M2 be homogeneous monoids. Then M1 ∗M2 is fcrs if and only if M1 and M2 are fcrs. Proof. Suppose M1 ∗M2 is fcrs. Since M1 and M2 are homogeneous, neither contains any non-trivial left- or right-invertible elements. So M1 and M2 are both fcrs by Theorem 4.2. The converse part follows by [42, Proposition 4.3].  Finally, we recall the following result on the interaction of the free product and fdt: Theorem 4.4 ([41, 42]). Let M1 and M2 be monoids. Then M1 ∗ M2 is fdt if and only if M1 and M2 are fdt. Now, the examples in Section 3 suffice to construct the remaining examples in Figure 1 by taking their free products. Regarding Figure 1 as a semilattice, examples in Section 3 correspond to the elements of this semilattice that have no non-trivial decomposition. Proposition 4.3, Theorem 4.4, and Proposition 4.1 together show that by taking a free product, one obtains a new monoid whose properties are given by taking the logical conjunction (that is, the ‘and’ operation) of the corresponding properties. That is, given two monoids Mab and Mcd , their free product Mab ∗ Mcd will have the weaker of the two properties a and b (which lie in {fcrs, fdt, nonfdt}) and the weaker of the two properties c and d (which lie in {biauto, auto, nonauto}). Thus, to summarize: fdt • Mfcrs auto ∗ Mbiauto is non-fcrs, fdt, non-biauto, auto; fdt • Mbiauto ∗ Mfcrs nonauto is non-fcrs, fdt, non-biauto, non-auto; nonfdt is non-fcrs, non-fdt, non-biauto, auto; ∗ M • Mfcrs biauto auto nonfdt • Mfcrs nonauto ∗ Mbiauto is non-fcrs, non-fdt, non-biauto, non-auto. Theorem 4.5. For each consistent combination of the properties fcrs, fdt, biauto, auto, and their negations, there exists a homogeneous monoid with exactly that combination of properties. 5. From homogeneous to n-ary multihomogeneous monoids Thus far we have proved that for every consistent combination of the properties fcrs, fdt, biauto, auto, and their negations, there exists a homogeneous monoid with exactly those properties. In the remainder of ON HOMOGENEOUS MONOIDS 25 the paper, we show that such monoids exist in the more restricted class of n-ary homogenous monoids, and show that monoids with some consistent combinations of these properties exist in the even more restricted class of n-ary multihomogeneous monoids. The current section describes the overall strategy and results; the following two sections then develop the necessary concepts and techniques. First, we introduce and investigate the theory of abstractly Rees-commensuable semigroups in Section 6, ultimately proving Corollary 6.5, which implies that from each homogeneous monoid listed in Table 1, we can obtain an n-ary homogeneous monoid with the same combination of properties. Thus we have the following analogy of Theorem 4.5 for n-ary homogeneous monoids: Theorem 5.1. For each consistent combination of the properties fcrs, fdt, biauto, auto, and their negations, there exists an n-ary homogeneous monoid with exactly that combination of properties. Since we have examples of n-ary homogeneous monoids with all consistent combinations of the properties fcrs, fdt, biauto, auto, and their negations, the next step is to extend these examples to n-ary multihomogeneous monoids. With that aim, in Section 7 we define and investigate an embedding of a (n-ary) homogeneous monoid into a 2-generated (n-ary) multihomogeneous monoid. As stated below in Corollary 7.13, passing to and from the (n-ary) multihomogeneous monoid preserves fdt, auto, and biauto. Furthermore, passing to the (n-ary) multihomogeneous monoid preserves fcrs. It is unknown whether fcrs is preserved passing back to the original (n-ary) homogeneous monoid, or, equivalently, whether nonfcrs is preserved on passing to the (n-ary) multihomogeneous monoid. Applying this embedding technique to the list of n-ary homogeneous monoids we discussed above, we get the following results: Theorem 5.2. For each consistent combination of the properties fcrs, biauto, auto, and their negations, there exists an n-ary multihomogeneous monoid with exactly that combination of properties. Theorem 5.3. For each consistent combination of the properties fdt, biauto, auto, and their negations, there exists an n-ary multihomogeneous monoid with exactly that combination of properties. To obtain an analogue of Theorem 5.1 for n-ary multihomogeneous monoids it would be sufficient to find a multihomogeneous monoid that is non-fcrs, fdt, and biauto. Indeed, in that case, combining Theorems 5.2 and 5.3 with the results of Section 4 and noting that a free product of multihomogeneous monoids is again multihomogeneous, we would get, for any consistent combination of biauto, auto, and their negations, an example of an fdt, non-fcrs multihomogeneous monoid with exactly that combination of properties. Therefore, from Corollary 6.5 we would get examples of n-ary multihomogeneous monoids with exactly the same discussed properties. Joining these examples with the examples from Theorems 5.2 and 5.3 we would get the intended result. Thus we have the following question: Question 5.4. Does there exist a multihomogeneous monoid that is fdt, but non-fcrs? 26 ALAN J. CAIN, ROBERT D. GRAY, AND ANTÓNIO MALHEIRO 6. Abstractly Rees-commensurable semigroups We introduce a new definition which is inspired by the notions of abstractly commensurable groups [36, §§ iv.27ff.] and Rees index for semigroups [59]. A subsemigroup T of a given semigroup S has finite Rees index if S \ T is finite. In that case the semigroup S is said to be a small extension of T , and T a large subsemigroup of S. The main interest is that large subsemigroups and small extensions of a given semigroup share many important properties of that semigroup (see [60] for a survey). Definition 6.1. Two semigroups S1 and S2 are said to be abstractly Reescommensurable if there are finite Rees index subsemigroups Ti ⊆ Si (for i = 1, 2) with T1 ∼ = T2 . Is is easy to verify that abstract Rees-commensurability is an equivalence relation on semigroups. This notion can be naturally extended to ideals. Definition 6.2. Two semigroups S1 and S2 are said to be abstract Reesideal-commensurable if there are finite Rees index ideals Ui ⊆ Si (for i = 1, 2) with U1 ∼ = U2 . The idea behind these notions is that abstract Rees-ideal-commensurable semigroups share many important properties, such as fcrs, fdt, biauto, and auto. Proposition 6.3. fcrs, fdt, biauto, and auto are preserved under abstract Rees-ideal-commensurability: • It is known that fcrs is inherited by small extensions [43, Theorem 1] and by large subsemigroups [61, Theorem 1.1]. Although the result for small extensions was stated in the context of monoids, it can be naturally extended to semigroups. These two results imply that fcrs is preserved under abstract Rees(-ideal)-commensurability. • It is known that fdt is inherited by small extensions [43, Theorem 2] of monoids, and by large semigroup ideals [45, Theorem 1]. We recall that the notion of finite derivation type was first introduced for monoids, but it was naturally extended to the semigroup case [62, Section 2]. The result on small extensions can be easily adapted for the semigroup case. Indeed, let T be a semigroup and consider the monoid T 1 obtained from T by adding an identity. If T is fdt the derivation graph of T 1 can be obtained from the derivation graph of T by adding an extra connected component with a single vertex corresponding to the empty word. Thus T 1 is fdt. Now, if S is a small extension of the semigroup T , it turns out that the monoid S 1 is a small extension of the monoid T 1 . Therefore, by [43, Theorem 2] the monoid S 1 is fdt. But S is a large ideal of S 1 , and by [45, Theorem 1] we conclude that S is fdt. The two results on small extensions and large ideals of semigroups show that fdt is preserved under abstract Rees-ideal-commensurability. Proof. ON HOMOGENEOUS MONOIDS 27 • By [63, Theorem 1.1] and its natural analogue for biauto, both auto and biauto are inherited by small extensions and by large subsemigroups, and therefore auto and biauto are preserved under abstract Rees(-ideal)-commensurability.  The preceding result is important because, in the case of (multi)homogeneous and n-ary (multi)homogeneous monoids, the following result holds: Proposition 6.4. Every finitely presented (multi)homogeneous monoid is Rees-ideal-commensurable to an n-ary (multi)homogeneous monoid, where n can be chosen arbitrarily as long as it is greater than or equal to the length of the longest relation in R. Proof. Let hA | Ri be a finite homogeneous presentation of a monoid M . Let n be chosen arbitrarily, provided it is greater than or equal to the maximum length of a relation in R. We are going to construct an nary (multi)homogeneous monoid M ′ and show it is abstract Rees-idealcommensurable to M by finding isomorphic ideals I and I ′ of M and M ′ respectively. Let I = {[u]M ∈ M : |u| ≥ n}. Note that I is an ideal S of finite Rees index in M , since its complement in M is the finite set 0≤i<n {[a1 ]M · · · [ai ]M : a1 , . . . , ai ∈ A}. Let R′ = {(uℓv, urv) : (ℓ, r) ∈ R, u, v ∈ A∗ , |uℓv| = n}. Consider the n-ary (multi)homogeneous presentation hA | R′ i, and let M ′ be the monoid defined by it. The set I ′ = {[u]M ′ ∈ M ′ : |u| ≥ n} is an ideal of M ′ . Moreover, I ′ has finite Rees index in M ′ . Since R′ is contained in the Thue congruence generated by R, we can define a map ϕ : I ′ → I, with ([u]M ′ ) ϕ = [u]M . Given [u]M in I, thus with u ∈ A∗ and |u| ≥ n, we have [u]M ′ ∈ I ′ by definition of I ′ . Therefore ϕ is surjective. It is also injective since, for any [u]M ′ , [v]M ′ ∈ I ′ such that ([u]M ′ ) ϕ = ([v]M ′ ) ϕ, we get [u]M = [v]M , with |u| = |v| ≥ n, and therefore [u]M ′ = [v]M ′ . It is routine to check that ϕ is a homomorphism. Thus I and I ′ are isomorphic finite Rees index ideals of M and M ′ . So M and M ′ are abstract Rees-ideal-commensurable.  Corollary 6.5. Let P be a set of properties preserved under abstract Reesideal-commensurability. Then there exists a (multi)homogeneous monoid satisfying every property in P if and only if there exists an n-ary (multi)homogeneous monoid satisfying every property in P . Note that the set of properties P can contain ‘negative’ properties like ‘not finitely generated’. As an immediate consequence, we obtain Theorem 5.1 7. From n-ary homogeneous to n-ary multihomogeneous monoids We now develop the embedding technique that allows us to construct multihomogeneous examples. The technique embeds a homogeneous monoid into a multihomogenous monoid that shares several of the properties under 28 ALAN J. CAIN, ROBERT D. GRAY, AND ANTÓNIO MALHEIRO study. If the original monoid is n-ary homogeneous, then the monoid it is embedded into is n-ary multihomogenous, so we use the formulations ‘(n-ary) homogeneous’ and ‘(n-ary) multihomogeneous’ to indicate that statements apply to both the general and n-ary cases. Let us start by fixing some notation that will be maintained throughout this section. Let M be a finitely generated (n-ary) homogeneous monoid, and let hA | Ri be a (n-ary) homogeneous presentation defining M . Recall that A = {a1 , . . . , am } is minimal, so that any other generating set of M contains A (see discussion at the end of Subsection 2.1). We define a homomorphism φ : A∗ → {x, y}∗ , ai 7→ x2 y i xy m+1−i . Denote by N the finitely generated monoid presented by hx, y | Rφi, where Rφ denotes the set {(ℓφ, rφ) : (ℓ, r) ∈ R}. Proposition 7.1. The monoid N , defined by the presentation hx, y | Rφi, is (n(m + 4)-ary) multihomogeneous. Proof. The presentation hA | Ri is homogeneous hence, for any (u, v) ∈ R, we have |u| = |v|. Since ai φ contains 3 symbols x and m + 1 symbols y for all i ∈ {1, . . . , m}, it follows that |uφ|x = 3|u| = 3|v| = |vφ|x and |uφ|y = (m + 1)|u| = (m + 1)|v| = |vφ|y . Hence hx, y | Rφi is multihomogeneous. If the presentation hA | Ri is n-ary homogeneous, then also for any relation (u, v) ∈ R, we have |u| = |v| = n. But in that case we get |uφ| = |uφ|x + |uφ|y = 3|u| + (m + 1)|u| = 3n + (m + 1)n = n(m + 4), and similarly for |vφ|.  A subset C of {x, y}∗ is a code if it is a set of free generators for the submonoid of {x, y}∗ generated by C [64, Subsection 7.2]. That is the case for the set Aφ = {x2 y i xy m+1−i : i = 1, . . . , m}. Furthermore, Aφ is what is called a prefix code, since no word of Aφ is a proper prefix of another word in Aφ [7, Chapter 6]. By [7, Proposition 6.1.3], since φ induces a bijection from A to the code Aφ, we conclude that φ is injective, and for that reason φ is called a coding morphism for Aφ. Proposition 7.2. The monoid M presented by hA | Ri embeds into the monoid N presented by hx, y | Rφi via the map [u]M 7→ [uφ]N , and the words over {x, y} representing elements of (the image of ) M are precisely the words in (A∗ )φ. Proof. Consider the natural projection ρN of {x, y}∗ onto N , whose kernel is generated by Rφ. Since φ is injective, the kernel of the composition φ ◦ ρN : A∗ → N is the congruence generated by R. The natural projection of ρM of A∗ onto M has the same kernel has the map φ ◦ ρN . By [64, Theorem 1.5.2] there is a monomorphism φ : M → N  such that (M )φ = (A∗ )φ ◦ ρN and ([u]M )φ = (u)φ ◦ ρN = [uφ]N . We shall now turn our attention to investigating the relationship between fdt holding in M and fdt holding in N . For this we shall prove some results which relate the Squier graphs of M and N . ON HOMOGENEOUS MONOIDS 29 Let ∆ denote the subgraph of Γ(hx, y | Rφi) induced on the set of vertices (Aφ)∗ . Let us extend the mapping φ : A∗ → {x, y}∗ to a mapping from the derivation graph Γ(hA | Ri) to the derivation graph Γ(hx, y | Rφi) mapping an edge E = (w1 , (ℓ, r), ǫ, w2 ) to an edge Eφ = (w1 φ, (ℓφ, rφ), ǫ, w2 φ). The mapping φ extends to a mapping between paths by putting (E1 E2 . . . Ek )φ = (E1 φ)(E2 φ) . . . (Ek φ), for any edges E1 , E2 , . . . , Ek of Γ(hA | Ri). Lemma 7.3. The mapping φ : Γ(hA | Ri) → Γ(hx, y | Rφi) has the following properties. (1) φ maps A∗ bijectively to (Aφ)∗ ; (2) For every edge E in Γ(hA | Ri) we have ι(Eφ) = (ιE)φ, and τ (Eφ) = (τ E)φ; (3) For every edge E in Γ(hA | Ri) and every pair of words u, v ∈ A∗ we have (u · E · v)φ = uφ · Eφ · vφ; (4) φ maps the edge-set of Γ(hA | Ri) bijectively to the edge-set of ∆. Proof. (i) It follows from the fact that φ is an injective homomorphism from A∗ into {x, y}∗ , and thus φ maps bijectively A∗ to its image (A∗ )φ = (Aφ)∗ . (ii) & (iii) The identities follow from the definition of the extended map φ on edges and from the fact that φ is a homomorphism. (iv) The injectivity of the edge-set of Γ(hA | Ri) to the edge-set of ∆, follows from the injectivity of φ. Now, consider an edge F = (z1 , (ℓφ, rφ), ǫ, z2 ) of ∆, and suppose without lost of generality, that ǫ = +1. The word ιF = z1 (ℓφ)z2 decomposes as a concatenation of words in Aφ; that is, words of the form x2 y j xy m+1−j for various j ∈ {1, . . . , m}. Since subwords x2 only occur at the start of such words in Aφ, the x2 at the start of ℓφ lies at the start of a word from Aφ in the decomposition of ιF. Since all words in Aφ have the same length, ℓφ must also finish at the end of some word from Aφ in the decomposition of ιF. Hence z1 and z2 are (possibly empty) concatenations of words in Aφ, and so z1 = w1 φ and z2 = w2 φ for some w1 , w2 ∈ A∗ . Thus F = Eφ, for the edge E = (w1 , (ℓ, r), +1, w2 ) of Γ(hA | Ri).  Let ψ : (Aφ)∗ → A∗ be the right inverse of the injective mapping φ. Note that (w1 w2 )ψ = (w1 ψ)(w2 ψ), for any elements w1 , w2 ∈ (Aφ)∗ . By part (iv) of the above lemma we can extend ψ to a mapping of edges by simply setting (Eφ)ψ = E and using the fact that every edge of ∆ has the form Eφ for a unique edge E from Γ(hA | Ri). Lemma 7.4. The mapping ψ : ∆ → Γ(hA | Ri) has the following properties. (1) ψ maps (Aφ)∗ bijectively to A∗ ; (2) For every edge E in ∆ we have ι(Eψ) = (ιE)ψ, and τ (Eψ) = (τ E)ψ; 30 ALAN J. CAIN, ROBERT D. GRAY, AND ANTÓNIO MALHEIRO (3) For every edge E in ∆ and every pair of words u, v ∈ {x, y}∗ we have that u · E · v is an edge in ∆ if and only if u, v ∈ (Aφ)∗ in which case (u · E · v)ψ = uψ · Eψ · vψ. (4) ψ maps the edge-set of ∆ bijectively to the edge-set of Γ(hA | Ri). Proof. (i) Follows immediatly from the definition of ψ. (ii) From Lemma 7.3 each edge of ∆ has the form Eφ = (w1 φ, (ℓφ, rφ), ǫ, w2 φ), with w1 , w2 ∈ A∗ , (ℓ, r) ∈ R and ǫ = ±1. The image of the edge under ψ is E. Since φ is an homomorphism and from the definition of ψ we get ((w1 φ)(ℓφ)(w2 φ))ψ = w1 ℓw2 and ((w1 φ)(rφ)(w2 φ))ψ = w1 rw2 as required. (iii) Suppose that E is an edge in ∆ and that for some u, v ∈ {x, y}∗ we have u · E · v an edge in ∆. So the vertex u(ιE)v of E is a word in (Aφ)∗ . Arguing as in Lemma 7.3 (iv) we can conclude that u, v ∈ (Aφ)∗ . The converse part of the equivalence follows trivially. If E in ∆ and u, v ∈ (Aφ)∗ , there exists E′ in Γ(hA | Ri) and u′ , v ′ ∈ A∗ , such that (u · E · v) = u′ φ · Eφ · v ′ φ. From the definition of ψ we get (u · E · v)ψ = uψ · Eψ · vψ. (iv) It follows from the definition of ψ and Lemma 7.3.  From the above lemmas, we can regard, up to the given encoding, the graph Γ(hA | Ri) as a subgraph of Γ(hx, y | Rφi), identifying Γ(hA | Ri) with ∆. Lemma 7.5. Let C be a set of closed paths in Γ(hA | Ri). Then Cφ is a set of closed paths in ∆. Moreover, for every closed path P in Γ(hA | Ri), if P ∼C 1ιP in Γ(hA | Ri) then Pφ ∼Cφ 1(ιP)φ in Γ(hx, y | Rφi). Proof. The result follows by [35, Theorem 3.6].  At this point, our strategy starts to emerge. The identification between ∆ with the derivation graph Γ(hA | Ri), will allow us to get a finite homotopy base of Γ(hA | Ri), from a finite homotopy bases of Γ(hx, y | Rφi). Lemma 7.6. Let D be a set of closed paths in ∆. Then Dψ is a set of closed paths in Γ(hA | Ri). Moreover, for every closed path P in ∆, if P ∼D 1ιP in Γ(hx, y | Rφi) then Pψ ∼Dψ 1(ιP)ψ in Γ(hA | Ri). Proof. The result follows from [39, Lemma 1], where the author uses strict monoidal categories to prove an analogue of [35, Theorem 3.6]. Indeed, in that context, both Γ(hA | Ri) and ∆ are strict monoidal categories (notice that ∆ is not a derivation graph, and so we can not refer to [35, Theorem 3.6] to prove the lemma). The mapping ψ is a functor that preserves the multiplicative structure, by Lemma 7.4. The homotopy relation ∼Dψ is what is called a 2-congruence on ∆, satisfying Pψ ∼Dψ 1(ιP)ψ , for any closed path P in D. From [39, Lemma 1], it follows that Pψ ∼Dψ 1(ιP)ψ , for any closed path P of ∆ such that P ∼D 1ιP .  Next, we describe the remaining connected componnets of Γ(hx, y | Rφi). Lemma 7.7. The derivation graph Γ(hx, y | Rφi) has the following properties: ON HOMOGENEOUS MONOIDS 31 (1) If a vertex z has maximal factors (with respect to length) u and v in (Aφ)∗ , then either z = z0 uz2 = z0 vz2 , or z = z0 uz1 vz2 , or z = z0 vz1 uz2 , with z0 , z1 , z2 ∈ / (Aφ)+ and z1 non-empty; (2) Any vertex has a unique decomposition of the form w0 u1 w1 · · · wk−1 uk wk , where each ui is a maximal factor in (Aφ)∗ , and each wi has no factor in (Aφ)∗ ; (3) Any edge has the form z1 · (Eφ) · z2 , for some edge E in Γ(hA | Ri), where ιEφ and τ Eφ are maximal factors in (Aφ)∗ of the corresponding initial and terminal vertices of Eφ, and z1 , z2 are not in (Aφ)+ . Proof. (i) Let u and v be maximal factors in (Aφ)∗ of z. Suppose u and v overlap in the word z. Without lost of generality, suppose that z = u0 uu1 = v0 vv1 with |u0 | ≤ |v0 | < |u0 u|. Since v ∈ (Aφ)∗ is a sequence of words of the form x2 y j xy m+1−j for various j ∈ {1, . . . , m}, and subwords x2 only occur at the start of such words in Aφ, the x2 at the start of v lies at the start of a word from Aφ in the decomposition of u. By the maximality of v and since z = u0 uu1 = v0 vv1 we get u0 = v0 . Since all words in Aφ have the same length, u and v must also finish at the end of some word from Aφ. By the maximality of u and v we get u = v. (ii) The result follows from (i). (iii) From the definition of Γ(hx, y | Rφi), an edge has for initial and terminal vertices words t and s in {x, y}∗ where one is obtained from the other by a single application of a defining relation in Rφ, that is, s = w0 (ℓφ)w1 and t = w0 (rφ)w1 , with (ℓ, r) ∈ R. Notice that ℓφ, rφ ∈ (Aφ)∗ . So, we can consider maximal factors p and q in (Aφ)∗ having as factors ℓφ and rφ, respectively, in such a way that s = z1 (pφ)z2 , t = z1 (qφ)z2 . The words p and q are the initial and terminal vertices of an edge E in Γ(hA | Ri). The result follows as in the statement.  Lemma 7.8. A length-two path in Γ(hx, y | Rφi) has one of the forms: (1) (z0 · E1 φ · z2 ) ◦ (z0 · E2 φ · z2 ), and E1 ◦ E2 is a path in Γ(hA | Ri); or (2) (z0 · E1 φ · z1 (ιE2 φ)z2 ) ◦ (z0 (τ E1 φ)z1 · E2 φ · z2 ); or (3) (z0 (ιE2 φ)z1 · E1 φ · z2 ) ◦ (z0 · E2 φ · z1 (τ E1 φ)z2 ), for z0 , z1 , z2 ∈ / (Aφ)+ and z1 non-empty, and E1 , E2 edges in Γ(hA | Ri). Proof. By Lemma 7.7 (iii), the path of consecutive edges has the form (w1 · (E1 φ) · w2 ) ◦ (z1 · (E2 φ) · z2 ). In the conditions of that lemma the words τ E1 φ and ιE2 φ are maximal factors in (Aφ)∗ of the same word w1 (τ E1 φ)w2 = z1 (ιE2 φ)z2 . From Lemma 7.7 (i) we have three possible cases. Each of the cases corresponds to one the possible cases (i), (ii) and (iii) of the statement.  Lemma 7.9. Let P be a non-empty (closed) path in Γ(hx, y | Rφi). Then (7.1) P ∼0 P1 ◦ P2 ◦ · · · ◦ Pk , 32 ALAN J. CAIN, ROBERT D. GRAY, AND ANTÓNIO MALHEIRO for some k ∈ N, and where each Pi has the form w0 (τ Q1 φ)w1 · · · (τ Qi−1 φ)wi−1 · (Qi φ) · wi (ιQi+1 φ) · · · wk−1 (ιQk φ)wk , for some (closed) path Qi in Γ(hA | Ri), with w0 , . . . , wk ∈ / (Aφ)∗ and w1 , . . . , wk−1 non-empty. Proof. The key observation to prove the lemma is to note that in Lemma 7.8 the paths on items (ii) and (iii) are ∼0 -homotopic. Indeed, this is a consequence of disjoint derivations. By Lemma 7.7 (ii) the initial vertex of P can be factorized in the form w0 u1 w1 · · · wk−1 uk wk , where each ui is a maximal factor in (Aφ)∗ and each wi has no factor in (Aφ)∗ . Notice, also by the same lemma, that any edge in P has a factorization of the form z1 · (Eφ) · z2 , for some edge E in Γ(hA | Ri), where ιEφ and τ Eφ are maximal factors in (Aφ)∗ of the corresponding initial and terminal vertices of Eφ. Since wi ’s have no factor in (Aφ)∗ , no relation from Rφ is going to be applied to them, and hence they are fixed in this path. Also, for each i ∈ {1, . . . , k} we can identify Bi as the set of edges in P where the relation is applied to a word between wi−1 and wi . From Lemma 7.8 any two consecutive edges Ei ◦ Ej , with Ei ∈ Bi and Ej ∈ Bj , and i > j, we get Ei ◦ Ej ∼0 Ej ◦ Ei by disjoint derivations. Consequently, taking i = 1 we can group together all edges in B1 by finding a ∼0 -homotopic path in which all those edges are at the beginning of the path. Proceeding in this way with the remaining edges we get the intended result.  The following result can be viewed as a generalization of Lemma 2.3 in [65]. Proposition 7.10. The monoid M is fdt if and only if the monoid N is fdt. Proof. Suppose that M is fdt and let C be a finite homotopy base (of closed paths) for Γ(hA | Ri). We shall see that the finite set Cφ = {Pφ : P ∈ C} of closed paths is a homotopy base for Γ(hx, y | Rφi) . Let P be a non-empty closed path in Γ(hx, y | Rφi). By Lemma 7.9 there are closed paths Qi , for i = 1, . . . , k, in Γ(hA | Ri) such that P ∼0 P1 ◦ P2 ◦ · · · ◦ Pk , and each Pi = wi · Qi φ · wi′ , for some wi , wi′ ∈ {x, y}∗ . Since C is a homotopy base, for each i = 1, . . . , k, we have Qi ∼C 1ι(Qi ) . Thus Pi ∼Cφ 1ι(Pi φ) by Lemma 7.5, for all i = 1, . . . , k, which in turn implies that P ∼Cφ 1ι(Pφ) . Consequently, Cφ is a finite homotopy base for Γ(hx, y | Rφi), and so N is fdt. Conversely, suppose that N is fdt, and let E be a finite homotopy base (of closed paths) for Γ(hx, y | Rφi). Again by Lemma 7.9, for each P in E, there are closed paths Q1 , . . . , Qk in Γ(hA | Ri), such that P ∼0 P1 ◦ P2 ◦ · · · ◦ Pk , ON HOMOGENEOUS MONOIDS 33 and Pi = wi · Qi φ · wi′ , for some wi , wi′ ∈ {x, y}∗ . Denote by C the finite set of all Qi ’s, for all P ∈ E, and let Cφ denote the set {Pφ : P ∈ C}. From the definition of Cφ, the paths Pi satisfy Pi ∼Cφ 1ι(Pi ) , and so each closed path P in E satisfies P ∼Cφ 1ι(P) . Thus, the set Cφ generates the homotopy relation ∼E , and therefore also Cφ is a finite homotopy base of Γ(hx, y | Rφi). Note that Cφ is a set of closed paths in ∆ and that Cφψ = C. To conclude the proof, let P be a closed path in Γ(hA | Ri). Since Cφ is a homotopy base of Γ(hx, y | Rφi), we have Pφ ∼Cφ 1ι(Pφ) . By Lemma 7.6, we get Pφψ ∼Cφψ 1ι(Pφψ) . Since Pφψ = P we get P ∼C 1ι(P) as required. Therefore, C is a finite homotopy base of Γ(hA | Ri), and so M is fdt.  Proposition 7.11. The monoid M is auto (respectively, biauto) if and only if the monoid N is auto (respectively, biauto). Proof. We will prove the result for biauto; the result for auto follows by considering multiplication only on one side. Suppose that N is biauto. By Proposition 2.6, there is a biautomatic structure ({x, y}, K) for N . By Proposition 7.2, words over {x, y} representing elements of the image under φ of M are precisely those in (Aφ)∗ . So K ∩ (Aφ)∗ must map onto the image of M . The map φ is a rational relation, since φ = { (ai , x2 y i xy m+1i ) : ai ∈ A }∗ . Thus its converse φ−1 is also a rational relation. Let L = Kφ−1 ; note that L ⊆ A∗ . Since φ−1 is a rational relation and K is regular, it follows that L is also regular. Since K ∩ (Aφ)∗ must map onto the image of M , the language L maps onto M . For any a ∈ A ∪ {ε}, (u, v) ∈ La ⇐⇒ u ∈ L ∧ v ∈ L ∧ ua =M v ⇐⇒ (∃u′ , v ′ ∈ K) (u, u′ ) ∈ φ ∧ (v, v ′ ) ∈ φ ∧ u′ (aφ) =N v ′  ⇐⇒ (∃u′ , v ′ ∈ K) (u, u′ ) ∈ φ ∧ (v, v ′ ) ∈ φ ∧ (u′ , v ′ ) ∈ Kaφ ⇐⇒ (u, v) ∈ φ ◦ Kaφ ◦ φ−1 ;  thus La = φ ◦ Kaφ ◦ φ−1 . Since ({x, y}, K) is an automatic structure for N , each relation Kaφ is rational. Since φ and φ−1 are rational relations, it follows that La is a rational relation. Since M is homogeneous, (u, v) ∈ La =⇒ |u| − |v| ≤ 1, and so L$a and $ La are regular by Proposition 2.5. Symmetrical reasoning shows that a L$ and $a L are regular. Hence (A, L) is a biautomatic structure for M . Now suppose that M is biauto. By Proposition 2.6, there is a biautomatic structure (A, L) for M . The aim is to construct a biautomatic structure for N . Let J = {x, y}+ −{x, y}∗ A+ φ{x, y}∗ ; so J consists of all non-empty words over {x, y}∗ that do not contain subwords equal to elements M φ. Notice in particular that ε ∈ / J and that J is closed under taking non-empty subwords. Note further that J is regular. For future use, let ∆ = { (z, z) : z ∈ J }; note that ∆ is a rational relation by Proposition 2.1. 34 ALAN J. CAIN, ROBERT D. GRAY, AND ANTÓNIO MALHEIRO Consider a word w ∈ {x, y}+ . By Lemma 7.7, w can be uniquely factored into an alternating product of words from J and words from A+ φ. That is, (7.2) w = z0 u1 z1 · · · zk−1 uk zk , w where each ui lies in A+ φ and each zi lies in J, except that z0 and zk may also be ε. Note that each ui is equal to some word in Lφ−{ε}. The idea is to build an automatic structure where the language of representatives consists of alternating products of words from J and words from Lφ. That is, the language will consist of words (7.2) where each ui lies in Lφ − {ε}. More formally, let ∗ K = (J ∪ {ε}) (Lφ ∩ {x, y}+ )J (J ∪ {ε}); note that K is regular since J is regular and φ is a homomorphism, and that every element of N is equal to some word in K by the reasoning in the previous paragraph. Now let w ∈ K and factor w as (7.2) where each ui lies in Lφ − {ε} and each zi lies in J, except that z0 and zk may also be ε. Consider right-multiplication of w by a generator x. Since zk x cannot contain a subword from A+ φ (since zk contains no such subword, and such subwords do not end with symbols x), the words in L to which wx is equal are precisely words of the form z0 u′1 z1 · · · zk−1 u′k zk x, where each u′i is any word in Lφ that is equal to ui . (Recally that defining relations in Rφ only apply to words in A+ φ; thus the subwords zi are fixed.) Hence ∗  Kx = (∆ ∪ {(ε, ε)}) (φ−1 ◦ Lε ◦ φ)∆ Lε φ(ε, x) ∪ (ε, x) is a rational relation. Now consider right-multiplication of w by a generator y. The zk y may end with a subword x2 y i xy m−i+1 ∈ Aφ, and thus it is necessary to distinguish three cases: • zk = tx2 y i xy m−i , where t 6= ε. In this case, the factorization of wy into an alternating product of subwords from J and A+ φ is w = z0 u1 z1 · · · zk−1 uk tx2 y i xy m−i ; note that t ∈ J since J is closed under taking subwords. The words in L to which wy is equal are precisely words of the form z0 u′1 z1 · · · zk−1 u′k zk v, where each u′i is any word in Lφ that is equal to ui , and v is any word in Lφ that is equal to x2 y i xy m−i = ai φ. Let Hi = { p ∈ L : p = ai }; then Hi is regular by [25, Proposition 3.1]. (In fact, since M is homogeneous, H can contain only generators from A and so must be finite.) Let Ky(1) = (∆ ∪ m{(ε, ε)}) (φ−1 ◦ Lε ◦ φ)∆ m ∗ [ i=1  {x2 y i xy m−i } × Hi φ . Since Hi φ is regular, {x2 y i xy m−i } × Hi φ is a rational relation by (1) Proposition 2.2 and so Ky is a rational relation since it is a concatenation of rational relations. (1) Then Ky is a rational relation that describes right-multiplication by a generator y in this case. ON HOMOGENEOUS MONOIDS 35 • zk = x2 y i xy m−i . In this case, the factorization of wy into an alternating product of subwords from J and A+ φ is w = z0 u1 z1 · · · zk−1 uk x2 y i xy m−i ; note that the last factor is uk x2 y i xy m−i ∈ A+ φ. The words in L to which wy is equal are precisely words of the form z0 u′1 z1 · · · zk−1 v, where each u′i is any word in Lφ that is equal to ui , and v is any word in Lφ that is equal to uk x2 y i xy m−i . That is, v can be any word such that (uk , v) ∈ Lai φ. Let ∗ Ky(2) = (∆ ∪ {(ε, ε)}) (φ−1 ◦ Lε ◦ φ)∆ · n [ i=1 (2)  (φ−1 ◦ Lai ◦ φ)(x2 y i xy m−i , ε) . Then Ky is a rational relation that describes right-multiplication by a generator y in this case. • zk does not end with a suffix of the form x2 y i xy m−i . The words in L to which wy is equal are precisely words of the form z0 u′1 z1 · · · zk−1 u′k zk y, where each u′i is any word in Lφ that is equal to ui . Let ∗ Ky(3) = (∆ ∪ {(ε, ε)}) (φ−1 ◦ Lε ◦ φ)∆ (φ−1 ◦ Lε ◦ φ)  · (v, v) : v ∈ J − {x, y} (2) m [ x2 y i xy m−i (ε, y). i=1 Then Ky is a rational relation that describes right-multiplication by a generator y in this case. (1) (2) (3) Thus Ky = Ky ∪ Ky ∪ Ky is a rational relation. Since N is homogeneous, (u, v) ∈ Kt =⇒ |u| − |v| ≤ 1, and so Kt$ and $ K are regular by Proposition 2.5. t Similar reasoning shows that t K $ and $t K. Hence ({x, y}, K) is a biautomatic structure for N .  Proposition 7.12. If hB | Qi is a finite presentation for M , and so A ⊆ B, then P = hx, y, B | Q, (aφ, a) (∀a ∈ A)i is a finite presentation defining N . Moreover, the presentation hB | Qi is complete if and only if the presentation P is complete. Thus, if M is fcrs then N is fcrs. Proof. Using Tietze transformations we obtain from the presentation hx, y | Rφi a new presentation for N as follows: for each a ∈ A, insert a generator a and a relation (aφ, a), thus obtaining a Tietze equivalent presentation hx, y, A | Rφ, (aφ, a) (∀a ∈ A)i . Since φ is a homomorphism, identifying each symbol a with the word aφ, performing these substitutions on the words from Rφ, we obtain another Tietze equivalent presentation defining the same monoid: hx, y, A | R, (aφ, a) (∀a ∈ A)i . 36 ALAN J. CAIN, ROBERT D. GRAY, AND ANTÓNIO MALHEIRO As it is possible to obtain from the presentation hA | Ri the presentation hB | Qi using finitely many Tietze transformations, we can obtain from the presentation hx, y, A | R, (aφ, a) (∀a ∈ A)i the presentation P by using the same Tietze transformations. Suppose that hB | Qi is also complete. Observe that Q relates words from the alphabet B, and that a relation from the set E = {(aφ, a) : a ∈ A} has left-hand side in {x, y}∗ and right-hand side in A. Thus, if w →Q w′ →E w′′ , we can find w such that w →E w →Q w′′ . Indeed, since w′ →E w′′ the word w′ has a factor from the alphabet {x, y}∗ . Since w →Q w′ the word w′ is obtained from w by changing some factor in B ∗ . Thus, the word w also contains the left-hand side of the relation from E applied to w′ . This means that w has both left-hand sides of the relations being applied, and those lefthand sides do not overlap. So, we can alternatively apply first the relation from E, obtaining a word w, and then apply the relation from Q, obtaining the word w′′ . Hence, →E quasi-commutes over →Q , that is, →Q ◦→E ⊆ →E ◦→∗Q∪E . By [66, Theorem 1], the rewriting system ({x, y} ∪ A, Q ∪ E) is terminating if, and only if, both Q and E are terminating. By assumption Q is terminating and from where E is also terminating by length-reduction. As before, since Q relates words from the alphabet B, and that relations from E have left-hand side in {x, y}∗ and right-hand side in A, we can also deduce that whenever w′ ←∗Q w →∗E w′′ , there exists w such that w′ →∗E w ←∗Q w′′ . Therefore, the relations →∗E and ←∗Q commute, that is, ←∗Q ◦ →∗E ⊆ →∗E ◦ ←∗Q . By [48, Lemma 2.7.10], if E and Q are confluent and →∗E and ←∗Q commute, then Q ∪ E is also confluent. Since by assumption Q is confluent it remains to show that E is confluent. Observe that two left-hand sides ai φ and aj φ of rules in E can overlap if and only if ai φ = aj φ. Since φ is injective we get ai = aj . Therefore, E has no critical pairs and thus is also confluent. Conversely, suppose that P is a complete presentation. Since hB | Qi is contained in P, we deduce that hB | Qi is terminating. Confluence also holds from the fact that in P all critical pairs are resolved, in particular, those arising from relations in Q. Hence, each resolution associated to relations from Q, can only involve relations from Q, since left-hand sides of rules in E belong to {x, y}∗ . Therefore, hB | Qi is complete.  It is unknown if the property fcrs is preserved from N to M . If this were true, we would have an example satisfying the conditions of Question 5.4. Combining Propositions 7.10, 7.11, and 7.12, we conclude the following: Corollary 7.13. For each of the properties fcrs, (non-)fdt, (non-)auto and (non-)biauto, the (n-ary) homogeneous monoid M has that property if and only if the (n-ary) multihomogeneous monoid N has that property. References [1] P. Etingof, T. Schedler, A. Soloviev, Set-theoretical solutions to the quantum Yang-Baxter equation, Duke Math. J. 100 (2) (1999) 169–209. doi:10.1215/S0012-7094-99-10007-X. [2] E. Jespers, J. Okniński, Noetherian semigroup algebras, Vol. 7 of Algebras and Applications, Springer, Dordrecht, 2007. ON HOMOGENEOUS MONOIDS 37 [3] F. Cedó, E. Jespers, J. Okniński, Retractability of set theoretic solutions of the Yang-Baxter equation, Adv. Math. 224 (6) (2010) 2472–2484. doi:10.1016/j.aim.2010.02.001. [4] F. Cedó, E. Jespers, J. Okniński, Algebras and groups defined by permutation relations of alternating type, J. Algebra 324 (6) (2010) 1290–1313. doi:10.1016/j.jalgebra.2010.07.014. [5] T. Gateva-Ivanova, E. Jespers, J. Okniński, Quadratic algebras of skew type and the underlying monoids, J. Algebra 270 (2) (2003) 635–659. doi:10.1016/j.jalgebra.2003.06.005. [6] E. Jespers, J. Okniński, Quadratic algebras of skew type, in: Algebras, rings and their representations, World Sci. Publ., Hackensack, NJ, 2006, pp. 93–112. doi:10.1142/9789812774552\_0009. [7] M. Lothaire, Algebraic Combinatorics on Words, no. 90 in Encyclopedia of Mathematics and its Applications, Cambridge University Press, 2002. [8] F. Cedó, J. Okniński, Plactic algebras, J. Algebra 274 (1) (2004) 97–117. doi:10.1016/j.jalgebra.2003.12.004. [9] A. Lascoux, M.-P. Schützenberger, Le monoı̈de plaxique, in: Noncommutative structures in algebra and geometric combinatorics, no. 109 in Quaderni de ”La Ricerca Scientifica”, CNR, Rome, 1981, pp. 129–156. URL http://igm.univ-mlv.fr/~ berstel/Mps/Travaux/A/1981-1PlaxiqueNaples.pdf [10] J. Cassaigne, M. Espie, D. Krob, J.-C. Novelli, F. Hivert, The Chinese Monoid, Int. J. Alg. Comput. 11 (3) (2001) 301–334. doi:10.1142/S0218196701000425. [11] J. Jaszuńska, J. Okniński, Structure of Chinese algebras, J. Algebra 346 (1) (2011) 31–81. doi:10.1016/j.jalgebra.2011.08.020. [12] F. Cedó, J. Okniński, Minimal spectrum and the radical of chinese algebras, Algebr. Represent. Theor. 16 (4) (2013) 905–930. doi:10.1007/s10468-012-9339-1. [13] F. Cedó, E. Jespers, J. Okniński, Finitely presented algebras and groups defined by permutation relations, Journal of Pure and Applied Algebra 214 (7) (2010) 1095– 1102. doi:10.1016/j.jpaa.2009.09.015. [14] F. Cedó, E. Jespers, G. Klein, Finitely presented monoids and algebras defined by permutation relations of abelian type, Journal of Pure and Applied Algebra 216 (5) (2012) 1033–1039. doi:10.1016/j.jpaa.2011.10.021. [15] J.-C. Novelli, On the hypoplactic monoid, Discrete Mathematics 217 (1-3) (2000) 315–336. doi:10.1016/S0012-365X(99)00270-8. [16] L. Serrano, The shifted plactic monoid, Mathematische Zeitschrift 266 (2) (2009) 363–392. doi:10.1007/s00209-009-0573-0. [17] G. Duchamp, D. Krob, Plactic-growth-like monoids, in: M. Ito, H. Jürgensen (Eds.), Words, Languages and Combinatorics, II, World Scientific, River Edge, NJ, 1994, p. 124–142. [18] V. Diekert, Y. Métivier, Partial commutation and traces, in: Handbook of formal languages, Vol. 3, Springer, Berlin, 1997, pp. 457–533. [19] D. Kuske, Divisibility monoids: presentation, word problem, and rational languages, in: Fundamentals of computation theory (Riga, 2001), Vol. 2138 of Lecture Notes in Comput. Sci., Springer, Berlin, 2001, pp. 227–239. doi:10.1007/3-540-44669-9_23. [20] M. Huschenbett, D. Kuske, G. Zetzsche, The monoid of queue actions, in: E. CsuhajVarjú, M. Dietzfelbinger, Z. Ésik (Eds.), Mathematical Foundations of Computer Science 2014, no. 8634 in Lecture Notes in Comput. Sci., Springer, pp. 340–351. doi:10.1007/978-3-662-44522-8\_29. [21] J. Birman, K. H. Ko, S. J. Lee, A new approach to the word and conjugacy problems in the braid groups, Adv. Math. 139 (2) (1998) 322–353. doi:10.1006/aima.1998.1761. [22] P. Dehornoy, L. Paris, Gaussian groups and garside groups, two generalisations of artin groups, Proceedings of the London Mathematical Society 79 (3) (1999) 569– 604. doi:10.1112/S0024611599012071. [23] R. V. Book, F. Otto, String Rewriting Systems, Texts and Monographs in Computer Science, Springer, 1993. [24] D. B. Epstein, J. W. Cannon, D. F. Holt, S. V. Levy, M. S. Paterson, W. P. Thurston, Word Processing in Groups, Jones & Bartlett, Boston, MA, 1992. 38 ALAN J. CAIN, ROBERT D. GRAY, AND ANTÓNIO MALHEIRO [25] C. M. Campbell, E. F. Robertson, N. Ruškuc, R. M. Thomas, Automatic semigroups, Theoret. Comput. Sci. 250 (1-2) (2001) 365–391. doi:10.1016/S0304-3975(99)00151-6. [26] A. Heyworth, Rewriting as a special case of non-commutative Gröbner basis theory, in: M. Atkinson, N. Gilbert, J. Howie, S. Linton, E. Robertson (Eds.), Computational and Geometric Aspects of Modern Algebra, no. 275 in London Mathematical Society Lecture Note Series, Cambridge University Press, 2000, pp. 101–105. doi:10.1017/CBO9780511600609.009. [27] V. A. Ufnarovskij, Combinatorial and asymptotic methods in algebra, in: Algebra, VI, Vol. 57 of Encyclopaedia Math. Sci., Springer, Berlin, 1995, pp. 1–196. doi:10.1007/978-3-662-06292-0\_1. [28] A. J. Cain, R. D. Gray, A. Malheiro, Finite Gröbner–Shirshov bases for Plactic algebras and biautomatic structures for Plactic monoids, J. Algebra 423 (2015) 37–53. arXiv:1205.4885, doi:10.1016/j.jalgebra.2014.09.037. [29] A. J. Cain, R. D. Gray, A. Malheiro, Rewriting systems and biautomatic structures for Chinese, hypoplactic, and sylvester monoids, Internat. J. Algebra Comput. 25 (12). arXiv:1310.6572, doi:10.1142/S0218196715400044. [30] F. Cedó, J. Okniński, Gröbner bases for quadratic algebras of skew type, Proceedings of the Edinburgh Mathematical Society 55 (2) (2012) 387–401. doi:10.1017/S0013091511000447. [31] E. Güzel Karpuz, Complete rewriting system for the Chinese monoid, Appl. Math. Sci (Ruse) 4 (22) (2010) 1081–1087. URL http://www.m-hikari.com/ams/ams-2010/ams-21-24-2010/karpuzAMS21-24-2010-2.pdf [32] L. Kubat, J. Okniński, Gröbner-Shirshov bases for plactic algebras, Algebra Colloquium 21 (04) (2014) 591–596. arXiv:1010.3338v1, doi:10.1142/S1005386714000534. [33] Y. Chen, J. Qiu, Gröbner–Shirshov basis for the Chinese monoid, Journal of Algebra and Its Applications 07 (05) 623–628. arXiv:0804.0972v2, doi:10.1142/S0219498808003028. [34] F. Otto, A. Sattler-Klein, K. Madlener, Automatic monoids versus monoids with finite convergent presentations, in: T. Nipkow (Ed.), Rewriting Techniques and Applications, no. 1379 in Lecture Notes in Comput. Sci., Springer, 1998, pp. 32–46. doi:10.1007/BFb0052359. [35] C. C. Squier, F. Otto, Y. Kobayashi, A finiteness condition for rewriting systems, Theoret. Comput. Sci. 131 (2) (1994) 271–294. doi:10.1016/0304-3975(94)90175-9. [36] P. de la Harpe, Topics in Geometric Group Theory, University of Chicago Press, 2000. [37] F. Otto, Y. Kobayashi, Properties of monoids that are presented by finite convergent string-rewriting systems: a survey, in: D.-Z. Du, K.-I. Ko (Eds.), Advances in algorithms, languages, and complexity, Kluwer Academic Publishers, Dordrecht, 1997, p. 225–266. doi:10.1007/978-1-4613-3394-4\_12. [38] Y. Kobayashi, F. Otto, On homotopical and homological finiteness conditions for finitely presented monoids, International Journal of Algebra and Computation 11 (03) (2001) 391–403. doi:10.1142/S0218196701000577. [39] Y. Lafont, A new finiteness condition for monoids presented by complete rewriting systems (after Craig C. Squier), Journal of Pure and Applied Algebra 98 (3) (1995) 229 – 244. doi:10.1016/0022-4049(94)00043-I. [40] Y. Guiraud, P. Malbos, Higher-dimensional categories with finite derivation type, Theory Appl. Categ. 22 (2009) No. 18, 420–478. [41] F. Otto, Modular properties of monoids and string-rewriting systems., Nehaniv, Chrystopher L. (ed.) et al., Algebraic engineering. Proceedings of the international workshop on formal languages and computer systems, Kyoto, Japan, March 18–21, 1997 and proceedings of the first international conference on semigroups and algebraic engineering held in Aizu, Japan, March 24–28, 1997. Singapore: World Scientific. 538554 (1999). (1999). URL http://www.theory.informatik.uni-kassel.de/techreps/TR-97-6.ps ON HOMOGENEOUS MONOIDS 39 [42] F. Otto, On properties of monoids that are modular for free products and for certain free products with amalgama URL http://www.theory.informatik.uni-kassel.de/techreps/TR-97-6.ps [43] J. Wang, Finite Complete Rewriting Systems and Finite Derivation Type for Small Extensions of Monoids, J. Algebra 204 (2) (1998) 493–503. doi:10.1006/jabr.1997.7388. [44] R. Gray, A. Malheiro, S. Pride, On properties not inherited by monoids from their Schützenberger groups, Information and Computation 209 (7) (2011) 1120–1134. doi:10.1016/j.ic.2011.03.004. [45] A. Malheiro, Finite derivation type for large ideals, Semigroup Forum 78 (3) (2008) 450–485. doi:10.1007/s00233-008-9109-x. [46] J. E. Hopcroft, J. D. Ullman, Introduction to Automata Theory, Languages, and Computation, 1st Edition, Addison–Wesley, Reading, MA, 1979. [47] J. Berstel, Transductions and Context-Free Languages, no. 38 in Leitfäden der Angewandten Mathematik und Mechanik, B. G. Teubner, Stuttgart, 1979. [48] F. Baader, T. Nipkow, Term Rewriting and All That, Cambridge University Press, 1999. [49] M. Droste, W. Kuich, H. Vogler, Handbook of Weighted Automata, 1st Edition, Springer Publishing Company, Incorporated, 2009. [50] V. Guba, M. Sapir, Diagram groups, Mem. Amer. Math. Soc. 130 (620) (1997) viii+117. doi:10.1090/memo/0620. [51] Y. Guiraud, P. Malbos, Higher-dimensional normalisation strategies for acyclicity, Advances in Mathematics 231 (3-4) (2012) 2294–2351. doi:10.1016/j.aim.2012.05.010. [52] J.-P. Serre, Trees, Springer-Verlag, 1980. [53] M. Hoffmann, R. M. Thomas, Biautomatic semigroups, in: M. Liskiewicz, R. Reischuk (Eds.), Fundamentals of Computation Theory, no. 3623 in Lecture Notes in Computer Sciene, Springer, 2005, pp. 56–67. doi:10.1007/11537311\_6. [54] C. Frougny, J. Sakarovitch, Synchronized rational relations of finite and infinite words, Theoret. Comput. Sci. 108 (1) (1993) 45–82. doi:10.1016/0304-3975(93)90230-Q. [55] A. J. Duncan, E. F. Robertson, N. Ruškuc, Automatic monoids and change of generators, Mathematical Proceedings of the Cambridge Philosophical Society 127 (3) (1999) 403–409. doi:10.1017/S0305004199003722. [56] M. Hoffmann, R. M. Thomas, Notions of automaticity in semigroups, Semigroup Forum 66 (3) (2002) 337–367. doi:10.1007/s002330010161. [57] M. Katsura, Y. Kobayashi, Constructing finitely presented monoids which have no finite complete presentation, Semigroup Forum 54 (1) (1997) 292–302. doi:10.1007/BF02676612. [58] S. J. Pride, J. Wang, Rewriting systems, finiteness conditions, and associated functions, in: Algorithmic problems in groups and semigroups (Lincoln, NE, 1998), Trends Math., Birkhäuser Boston, Boston, MA, 2000, pp. 195–216. [59] A. Jura, Determining ideals of a given finite index in a finitely presented semigroup, Demonstratio Math. 11 (3) (1978) 813–827. [60] A. J. Cain, V. Maltcev, For a few elements more: A survey of finite Rees index, Tech. rep. (7 2013). arXiv:1307.8259. [61] K. Wong, P. Wong, On finite complete rewriting systems and large subsemigroups, J. Algebra 345 (1) (2011) 242–256. doi:10.1016/j.jalgebra.2011.08.022. [62] A. Malheiro, Finite derivation type for Rees matrix semigroups, Theoret. Comput. Sci. 355 (3) (2006) 274–290. doi:10.1016/j.tcs.2005.12.011. [63] M. Hoffmann, R. M. Thomas, N. Ruškuc, Automatic semigroups with subsemigroups of finite ress index, International Journal of Algebra and Computation 12 (03) (2002) 463–476. doi:10.1142/S0218196702000833. [64] J. M. Howie, Fundamentals of Semigroup Theory, no. 12 in London Mathematical Society Monographs: New Series, Clarendon Press, Oxford University Press, New York, 1995. [65] Y. Kobayashi, Finite Homotopy Bases of One-Relator Monoids, J. Algebra 229 (2) (2000) 547–569. doi:10.1006/jabr.1999.8251. 40 ALAN J. CAIN, ROBERT D. GRAY, AND ANTÓNIO MALHEIRO [66] L. Bachmair, N. Dershowitz, Commutation, transformation, and termination, in: J. H. Siekmann (Ed.), 8th International Conference on Automated Deduction, Vol. 230 of Lecture Notes in Computer Science, Springer Berlin Heidelberg, 1986, pp. 5–20. doi:10.1007/3-540-16780-3\_76. Centro de Matemática e Aplicações, Faculdade de Ciências e Tecnologia, Universidade Nova de Lisboa, 2829–516 Caparica, Portugal E-mail address: [email protected] School of Mathematics, University of East Anglia, Norwich NR4 7TJ, United Kingdom E-mail address: [email protected] Departamento de Matemática & Centro de Matemática e Aplicações, Faculdade de Ciências e Tecnologia, Universidade Nova de Lisboa, 2829–516 Caparica, Portugal E-mail address: [email protected]
4math.GR
A Proposed Algorithm for Minimum Vertex Cover Problem and its Testing Gang Hu Email: [email protected] Abstract The paper presents an algorithm for minimum vertex cover problem, which is an NP-Complete problem. The algorithm computes a minimum vertex cover of each input simple graph. Tested by the attached MATLAB programs, Stage 1 of the algorithm is applicable to, i.e., yields a proved minimum vertex cover for, about 99.99% of the tested 610,000 graphs of order 16 and 99.67% of the tested 1,200 graphs of order 32, and Stage 2 of the algorithm is applicable to all of the above tested graphs. All of the tested graphs are randomly generated graphs of random "edge density" or in other words, random probability of each edge. It is proved that Stage 1 and Stage 2 of the algorithm run in O(n5+logn) and O(n3(5+logn)/2) time respectively, where n is the order of input graph. Because there is no theoretical proof yet that Stage 2 is applicable to all graphs, further stages of the algorithm are proposed, which are in a general form that is consistent with Stages 1 and 2. 1. INTRODUCTION If the algorithm is to be classified as one algorithm design technique, then transform-and-conquer strategy maybe most suitable for it [1]. Suppose we need to find a minimum vertex cover of simple graph G, then the first part of the algorithm is to generate an auxiliary simple graph H, which satisfies the following four conditions: A. L(V(H)) ⊇ L(V(G)), of which L(X) denotes X’s label set, i.e., the set of X’s all vertex’s labels; B. Different vertices of H may share a same label. For any edge of H, however, the two endpoints have different labels; C. Of each component P of H, all maximal-clique’s vertex-sets have a same cardinal number, and thus this number is called "grade of component P" and denoted by g(P); D. For any nonempty subset T of L(V(G)), there exists a maximal clique Q in H such that L(V(Q))  T. Remark 1.1. H is generated by Steps 1 to 3 in Section 2, and it is not any other graph which satisfies the above conditions. The remaining part of the algorithm is to find out a maximal clique of H whose label set can be proved to be the label set of a minimum vertex cover of graph G. Let N[x] = N(x)∪{x}, of which N(x) is the neighbor set of vertex x. Suppose a subgraph of H which satisfies both of the following conditions. Condition 1. For any vertex v of the subgraph, there exists a vertex cover C of G such that L(N[v])  L(C). Condition 2. For any edge uv of the subgraph, there exists a vertex cover C of G such that L(N[uv])  L(C), where N[uv]  N[u]∩N[v]. Then for each component of H in ascending order of its grade, which is defined in Condition C, find out a maximal subgraph S of it which satisfies Conditions 1 and 2. Iterate this computation for the next component until S is nonempty. Then find out a minimal-order subgraph I of S which contains a nonempty subgraph that satisfies Conditions 1 and 2. If I is a clique, then it is proved by Claim 2.10 that L(V(I)) is the label set of a minimum vertex cover of graph G. If I is not a clique, then go to Stage 2 of the algorithm, which is introduced in Section 5 In Section 3, Stage 1 of the algorithm is proved to run in O(n5+logn) time. The algorithm was tested by MATLAB programs, and it was found that I is not a clique for only 44 of the tested 711,200 graphs. Then by Claim 2.10, Stage 1 of the algorithm cannot yield a minimum vertex cover for only about 0.0062% of all tested graphs. The test results are detailed in Section 4. For the graphs to which Stage 1 of the algorithm is not applicable, a stronger version of Condition 2 is introduced. With this change, the algorithm reaches Stage 2 for the graphs to which Stage 1 is not 1 applicable, and it was found that, with O(n3(5+logn)/2) time, Stage 2 is applicable to, i.e., yields a minimum vertex cover of, each of the 44 tested graphs. Because Stage 2 is same as Stage 1 except that Condition 2 is replaced by a stronger version, so Stage 2 actually works for all of the 711,200 tested graphs. Furthermore, if there exist graphs to which Stage 2 of the algorithm is not applicable, those graphs will go to further stages of the algorithm which are expressed in a general form that is consistent with Stages 1 and 2. Those stages are introduced in Section 6. 2. STEPS OF THE ALGORITHM Firstly, graph H is constructed by Steps 1 to 3. Step 1. Suppose L(V(G))  {1, 2, …, n}, and k  log2ni.e., k is the smallest integer which satisfies n  2k. Let L(V(H))  {1, 2, 3, …,2k}. Then define Z, which is a family of sets, as follows. Definition 2.1 Let L(V(H)) be the "first" member of Z. Then partition L(V(H)) into two equal-sized disjoint sets {1, 2, …, 2k1} and {2k11, 2k12, …,2k}, whose elements are consecutive numbers, and let the two sets become members of Z. For each of the two "new" members, if its cardinal number is larger than 1, then continue the partition and "member-assignment" process as described above. Keep on the process until the cardinal number of each "new" member is 1. ■ Z can also be generated in a reversed way, which is shown in the attached MATLAB program. For example, if k  3, then Z  {{1}, {2}, {3}, {4}, {5}, {6}, {7}, {8}, {1, 2}, {3, 4}, {5, 6}, {7, 8}, {1, 2, 3, 4}, {5, 6, 7, 8}, {1, 2, …, 8}}. Step 2.  l ∈ L(V(G)), generate one and only one first-grade component of H whose label is l, and denote this component by P({l}). Remark 2.2 The grade of H’s component is defined in Condition C of Section 1, it is obvious that the set of all first-grade components of H are actually the set of H’s all isolated vertices. ■ Step 3. Other components of H are generated in sequence by their grades. For example, all of the second-grade components are to be constructed before the construction of any higher-grade component. Components of any grade larger than 1 are defined in a general form as follows. But firstly, another definition is needed. Definition 2.3. Suppose A is a member of Z, which is defined by Definition 2.1, and b is a positive integer. Let U ∪P, of which P is H’s component which satisfies: L(V(P)) ⊆ A and g(P)  b. Then we call U a same-grade union of A and b, and denote it by U(A, b). (See Fig. 2.4.) 1 1 2 5 3 5 6 7 6 2 3 4 4 U({1,2,3,4}, 2) 7 8 8 U({5,6,7,8}, 3) Figure 2.4. Examples of same-grade unions Each component of U(A, b), where b is larger than 1, is defined as follows. Definition 2.5. If and only if P is a join of two same-grade unions U(A1, b1) and U(A2, b2), i.e., P  U(A1, b1)  U(A2, b2), of which A1, A2, b1 and b2 satisfy the following two conditions: 2.5.1 A1∩A2   and A1∪A2  A, of which A ∈ Z; 2.5.2 b1 and b2 are positive integers, and b1  b2  b, then let P be one of H’s components denoted by P(A1, b1, A2, b2) or P(A, b1, b2), of which b1 corresponds to A’s "first half" containing smaller numbers. After and only after for the same b, P of each A1, A2, b1 and b2 which satisfy conditions 2.5.1 and 2 2.5.2 is generated, we start to construct H’s components of grade b+1. When the highest-grade component of H, which is a 2k-clique, is generated, the construction of H is complete, then we call H a minimum-covering-computation graph. ■ Then we have Claim 2.6. For any nonempty subset T of L(V(G)) and any member A of Z which satisfies T  A, there exists a maximal clique Q in U(A, |T|) such that L(V(Q))  T. Proof. We use induction on |T|. The claim obviously holds when |T|  1. For the induction step, let T be a subset of L(V(G)) with |T|  2, then by Definition 2.1, we can suppose Am to be the only minimal member of Z which includes T. Because |T|  2, we can suppose that Am  A1∪A2 of which A1 and A2 are also Z’s members and A1∩A2  , then let T1  A1∩T and T2  A2 ∩T. Since Am is the minimal member of Z which includes T, it is obvious that T1,T2  . By the induction hypothesis, there exists a maximal clique Q1 in U(A1, |T1|) such that L(V(Q1))  T1, and there exists a maximal clique Q2 in U(A2, |T2|) such that L(V(Q2))  T2. Then by Definition 2.5, there exists a maximal clique Q in P(A1, |T1|, A2, |T2|)  U(A1, |T1|)  U(A2, |T2|) such that L(V(Q))  L(V(Q1)∪V(Q2))  T1∪T2  T. P(A1, |T1|, A2, |T2|) is a component of U(Am, |T|). Because Am is the only minimal member of Z which includes T, so for any member A of Z which includes T, A includes Am and P(A1, |T1|, A2, |T2|) is also a component of U(A, |T|), thus there exists a maximal clique Q in U(A, |T|) such that L(V(Q))  T. ■ We need a claim as follows to understand the next step. Claim 2.7. For any subgraph D of H, there is only one maximal subgraph of D which satisfies Conditions 1 and 2 in Section 1. Proof. Assume S1 and S2 are two maximal subgraphs of D which satisfy Conditions 1 and 2, then S1 ⊈ S2 and S2 ⊈ S1. Let S  S1∪S2, then S⊃S1 and S⊃S2. However, it is obvious that S also satisfies Conditions 1 and 2, which is contradictory to the assumption. ■ Step 4. For each component of H in ascending order of its grade, which is defined in Condition C of Section 1, by deleting a minimal subgraph of the component, get a maximal subgraph S of it which satisfies Conditions 1 and 2. Suppose the grade of the current component is b. If S is empty, iterate this computation for the next component, whose grade is also b or otherwise b+1 when all components of grade b have been computed. If S is nonempty, record S for the next step. ■ Then we have a claim as follows. Claim 2.8. For the recorded S of Step 4, the size of its maximum clique is no larger than the minimum size of graph G’s vertex cover. Proof. Suppose C is a minimum vertex cover of G, then by Claim 2.6, there exists a maximal clique Q in U(L(V(H)), |C|) such that L(V(Q))  L(C). Thus Q satisfies Conditions 1 and 2, so there exists component of U(L(V(H)), |C|) which has nonempty subgraph satisfying Conditions 1 and 2. Because each component P of H is computed in ascending order of its grade and by Claim 2.7 S is the only maximal subgraph of P which satisfies Conditions 1 and 2, so for the recorded nonempty S of Step 4, the size of its maximum clique is no larger than |C|. ■ Step 5. For the recorded S of Step 4, by deleting a maximal subset of V(S), get a minimal-order subgraph I of S which contains a nonempty subgraph SS that satisfies Conditions 1 and 2. Record this I for the next step. Remark 2.9. By Claim 2.7, we can tell whether I contains a nonempty subgraph that satisfies Conditions 1 and 2 by finding out the only one maximal subgraph of I which satisfies the two conditions. ■ Then for I recorded by Step 5, we have a claim as follows. Claim 2.10. If I is a clique, then L(V(I)) is the label set of a minimum vertex cover of graph G. Proof. By Step 5, I contains a nonempty subgraph that satisfies Conditions 1 and 2, so by Condition 1 or 2, we can tell that there exists a vertex cover C of G such that L(V(I))  L(C). Suppose b is the size of a maximum clique of the recorded S in Step 4. If I is a clique, then |V(I)|  b because I is a subgraph of S. By Claim 2.8, b and so |V(I)| are no larger than the minimum size of graph G’s vertex cover. Thus L(V(I))  L(C) is the label set of a minimum vertex cover of G. ■ 3 Thus we have Step 6. Check whether the recorded I of Step 5 is a clique. If I is a clique, then output L(V(I)). If I is not a clique, then go to the next stage of the algorithm. Remark 2.11. Sections 5 and 6 explain "the next stage of the algorithm". ■ 3. Claim 3.1 EFFICIENCY OF THE ALGORITHM For L(V(H))  {1, 2, 3, …,2k}(k  1), | V  H  |  k i 1 2 i  2 . Proof. When k  1, H has two first-grade components and one second-grade component, and so V(H)  4  (2k2). We use induction on k and assume the claim holds for any k when 1  k  h. Now for k  h 1, L(V(H))  {1, 2, 3, …,2h1}. By Steps 1 to 3 of the algorithm, we can suppose two isomorphic minimum-covering-computation graph H1 and H2 which satisfy: L(V(H1))  {1, 2, 3, …,2h} and L(V(H2))  {2h 1, 2h 2,…,2h1}. Then by the induction hypothesis, | V  H 1  |  h i 1 2  2 . i Because H2 is isomorphic to H1, V(H2)  V(H1). Suppose P is a component of H1 or H2, then by Steps 1 to 3 of the algorithm, we can tell that P is also a component of H. Thus we have Corollary 3.1.1. Let X ∪P, of which P is H’s component and P is also H1’s or H2’s component, h then | V  X  | 2 2i  2 . i 1   Now the other vertex-amount we need to count is of H’s components of which each is neither H1’s nor H2’s component. Suppose P* is such a kind of component, then by Definition 2.1 and 2.5, we can tell that L(V(P*)) ⊈ L(V(H1)), L(V(P*)) ⊈ L(V(H2)) and so L(V(P*))  L(V(H)). Thus by Definition 2.5, P*  U(A1, b1)  U(A2, b2)  U(L(V(H1)), b1)  U(L(V(H2)), b2). In the above formula, for each U(L(V(H1)), b1), b2 of U(L(V(H2)), b2) can be any integer from 1 to |L(V(H2))|  2h, which means that each U(L(V(H1)), b1) was copied for 2h times to generate different components of H. Because 2h   H1   b 1U L V  H1   , b1 , 1 so H1 was copied for 2h times to construct H. And there is a same conclusion for H2. Combine this conclusion with Corollary 3.1.1, then we have V(H)  V(X) + 2h (V(H1) + V(H2)) h h h 2  2  2 (  2  2    2  2)  i1 i1 i1 h 1    2  2 . i 1 i  2 h i i i Thus the induction succeeds and the claim is proved. ■ Claim 3.2. Suppose graph G of order n is the input and T1(n) is the running time of Stage 1 of the algorithm, then T1(n)  O(n5+logn). Proof. By Step 1, k is the smallest integer which satisfies n  2k, so 2k1  n. Then by Claim 3.1, | V  H  |  k i 1 2 i  2    k i 1 2   2 i 1 k ( k  3) / 2   2n  ( log 2 n 4 ) / 2 . Thus the asymptotic upper bounds for |V(H)| and |E(H)| can be n(5+logn)/2 and n5+logn, respectively, so the construction of H runs in O(n5+logn) time. Then in Step 4, the running time for computing subgraphs of H’s components by Conditions 1 and 2 is still no more than O(n5+logn), and this is also the case for Step 5. Therefore Stage 1 of the algorithm takes no more than O(n5+logn) time. ■ 4 4. TESTING OF THE ALGORITHM The algorithm was tested by the two attached programs, "Generating_k_and_H" and "Testing_G", on MATLAB (R2016a, trial use). The first file generates and saves k and H for the second file. The second file generates random graphs of random "edge density", i.e., random probability of each edge, for testing of the algorithm. "Edge density" in the program approximately equals to the ratio of |E(G)| to |E(K)|, of which K is a 2k-order complete graph, and it is generated from a normal distribution with mean 0.5 and standard deviation 0.2,0.3,0.4,0.5 or 0.6 for the testing. The reasons for the introduction of this distribution are that there exist the most graphs, no matter labelled or unlabeled, when "edge density" equals to 0.5, and there exists a same amount of graphs of "edge density" being d as that of "edge density" being 1  d. An ordinary personal computer is used for the testing. Testing parameters and results are listed as follows. k, |V(G)| 3, 8 4, 16 4, 16 4, 16 4, 16 4, 16 5, 32 5, 32 5, 32 Number of tested graphs 100,000 50,000 220,000 150,000 130,000 60,000 400 400 400 Table 4.1. Testing parameters and results Standard Approximate No. of graphs to deviation of running time which Stage 1 is "edge density" (for Testing_G.m) not applicable 0.3 16 minutes 0 0.2 10 hours 2 0.3 43 hours 19 0.4 29 hours 8 0.5 25 hours 9 0.6 12 hours 2 0.3 58 hours 1 0.4 58 hours 2 0.5 58 hours 1 No. of graphs to which Stage 2 is not applicable 0 0 0 0 0 0 0 0 0 Remark 4.2. Stage 2 is explained in Section 5. Remark 4.3. When k  5, the running time for the computer used for testing is so long that it is impossible to test a large number of graphs in a short period. There is no test data for k  5 for the same reason. k, |V(G)| 4, 16 5, 32 Table 4.4. Recorded "edge densities" of graphs to which Stage 1 is not applicable Recorded "edge densities" of graphs to which Stage 1 is not applicable 0.2410, 0.2599, 0.2973, 0.3170, 0.3173, 0.3204, 0.3323, 0.3359, 0.3533, 0.3551, 0.3642, 0.3773, 0.3774, 0.3942, 0.4089, 0.4232, 0.4436, 0.4475, 0.4495, 0.4500, 0.4509, 0.4539, 0.4821, 0.4919, 0.4938, 0.5032, 0.5318, 0.5337, 0.5343, 0.5356, 0.6200, 0.6476 0.1479, 0.1889, 0.2127, 0.2868 By Table 4.1, when k  3, Stage 1 is applicable to 100% of tested random graphs (i.e. Step 5 of Stage 1 yields a clique and, by Claim 2.10, Step 6 yields the label set of a minimum vertex cover of each tested graphs for k  3); when k  4, Stage 1 is applicable to about 99.99% of tested random graphs; and when k  5, Stage 1 is applicable to about 99.67% of tested random graphs. By Table 4.4, the recorded "edge densities" of tested graphs to which Stage 1 is not applicable scatter. Except for k  3, the numbers of tested graphs are much less than the numbers of unlabeled graphs of respective orders. However, because of the large number of tested graphs, and because the possibility of duplicated graphs to which the algorithm is applicable is same as that of duplicated graphs to which the algorithm is not applicable, it is reasonable to believe that the "applicability ratios" of tested graphs are close to the "applicability ratios" of all unlabeled (or labelled) graphs of respective orders. 5 5. STAGE 2 OF THE ALGORITHM For those graphs to which Stage 1 of the algorithm is not applicable, a stronger version of Condition 2 is introduced as follows. Condition 2+. For any edge uv of the subgraph, there exists a vertex cover C of G such that L(N[uv])  L(C), where N[uv]  {w ∈ N[u]∩N[v] : There exists a vertex cover C* of G such that L(N[u]∩N[v]∩N[w])  L(C*)}. ■ With this change, the algorithm goes to Stage 2 for those graphs to which Stage 1 is not applicable. Steps 1 to 3 are for construction of H and apparently they do not need to run again. Besides, for those components of H which have been computed in Step 4 of Stage 1 and concluded that they do not have nonempty subgraph satisfying Conditions 1 and 2, they do not need to be computed again in Stage 2 because Condition 2+ is stronger than Condition 2. Thus Stage 2 starts at Step 4 for the component of H which has nonempty subgraph satisfying Conditions 1 and 2, and the following computation is same as Stage 1 except that Condition 2 is substituted by Condition 2+. Stage 2 of the algorithm has been implemented in the attached MATLAB program. It was found that Stage 2 yielded cliques for all of the 44 tested graphs for which Stage 1 did not. Because Claims 2.8 and 2.10 still hold for Stage 2, so Stage 2 is applicable to all of the 44 tested graphs. Then since Condition 2+ is stronger than Condition 2, we can tell that Stage 2 actually works for all of the 711,200 tested graphs. By the definition of N[uv] in Condition 2+, 3-cliques of S in Step 4 and SS in Step 5 require computation, thus the running time for the algorithm that reaches Stage 2 as its final stage is O(n3(5+logn)/2). However, the definition of N[uv] in Condition 2+ looks "strange", so it requires an expression in a more general way as shown in the following section. 6. FURTHER STAGES OF THE ALGORITHM Because it has not been theoretically proved that Stage 2 of the algorithm is applicable to all graphs, it is worthwhile to conceive further stages of the algorithm which shall be in a general form that is consistent with Stages 1 and 2. Then the concept of hyperedge of hypergraph is needed. A hypergraph consists of a collection of vertices and a collection of hyperedges. If the vertex set is V, then the hyperedges are subsets of V. Then for Stage t of the algorithm, where t is a positive integer, we give the following five rules for the algorithm: 1. Suppose Es(H) is the set of all hyperedges of size s in H, then let Es(H) = {e : e is the vertex set of an s-clique in H and H is generated by Steps 1 to 3},  s  t+1; Es(H) = ,  s  t+1. 2. For any hyperedge e of size no larger than t, let N[e]  {x : {x}∪e is a subset of a hyperedge of H}. 3. For any hyperedge e of size t+1, let N[e]  {x : x ∈ N[{v}],  v ∈ e}. 4. By deleting hyperedges in H, subgraph S in Step 4 and subgraph SS in Step 5 shall satisfy Condition X. For any hyperedge e of the subgraph, there exists a vertex cover C of G such that L(N[e])  L(C). 5. If Stage t does not yield clique at Step 5, start Stage t+1 at Step 4 for the component of H where Stage t ends. Then it is not difficult to show that the above rules are consistent with Stages 1 and 2 of the algorithm. Claims 2.8 and 2.10 can be easily proved to hold for any stage of the algorithm, so Stage t yields a minimum vertex cover of graph G at Step 6 if it yields a clique at Step 5. Because in Stage t, hyperedges of size t+1, i.e., vertex sets of (t+1)-cliques, of S in Step 4 and SS in Step 5 require computation, the algorithm runs in O(n(t+1) (5+logn)/2) time if the "maximum" stage to 6 which it reaches is Stage t. 7. CONCLUSIONS Conclusions for this algorithm are summarized as follows. A. For minimum vertex cover problem of an order-n graph, the algorithm runs in O(n(t+1) (5+logn)/2) time if the "maximum" stage to which it reaches is Stage t, where t is a positive integer. Therefore, if the "maximum" stage to which the algorithm reaches for a graph is Stage 1 or 2, then the algorithm runs in O(n5+logn) or O(n3(5+logn)/2) time for the graph respectively. B. Stage 1 of the algorithm is applicable to, i.e., yields a proved minimum vertex cover for, each of more than 99% of tested graphs of order no larger than 32, while Stage 2 of the algorithm works for 100% of tested graphs of order no larger than 32. And it is reasonable to believe that the above ratios are close to the "real applicability ratios" for this algorithm to all unlabeled (or labelled) graphs of order no larger than 32. C. The "applicability ratio" of Stage 1 for all tested order-8 graphs, order-16 graphs and order-32 graphs is 100%, 99.99% and 99.67% respectively, so it is unlikely that the "applicability ratio" of Stage 1 decreases sharply when the order of graph increases. Besides, Stage 2 works for each of the tested graphs and we still have stages beyond Stage 2. Therefore it is an efficient algorithm which is already applicable to practical use. D. As summarized above, the performance of this algorithm is extraordinary for NP-Complete problems. Although there is no systematic and theoretical explanation for it yet, it is at least an important finding which is valuable for further research. However, like many findings or conjectures in mathematics, its theoretical explanation may take many years even decades to be found. Thus it is decided to make the algorithm public so that the explanation and improvement of it become possible. E. Further tests for graphs of order 64 or more are necessary and valuable. However, they require computer of large capacity which is not available for the author. Reference [1] Levitin, A.: Introduction to the Design and Analysis of Algorithms. Pearson Education, Boston (2007) Appendix 1. Generating_k_and_H.m % This MATLAB file is the first program to test the algorithm in the manuspcript and shall run before the running of file "Testing_G". function Generating_k_and_H k=input('When the order of each randomly generated graph is 2^k, k equals to:'); if (k<=0)||(k<ceil(k)) error('k must be positive interger') end if k==6 disp('Note: This program requires large memory when k is larger than 5. The size of the swap file is recommended to be set to 100GB-200GB for k=6.') 7 disp('And the running time for k=6 on an ordinary personal computer is about 2 to 3 hours.') end if k>=7 disp('Note: For k>6, this program requires large memory which may exceed the capacity of the computer,') disp('and the running time on an ordinary personal computer is very long.') end if k>7 error('For k>7, all of the uint8 class of matrix in this program shall be changed to other class.') end Z=Generating_Z(k); H=Generating_H(k,Z); disp('Saving file "k_and_H". Please wait.') % When k is larger than 5, the following saving of file 'k_and_H' may take a long time. save('k_and_H','k','H','-v7.3') end % Step 1 function Z=Generating_Z(k) % Cell-array Z represents the family of sets by Definition 2.1 of the algorithm, while its non-empty cells are arrays which represent the members of % family Z. Z's cells of size 1 are first generated as follows. Z=cell(k+1,2^k); for c=1:2^k M=c; Z{1,c}=M; end % Z's cells of larger size are generated as follows. Non-empty cells of the rth row of cell-array Z represent family Z's member of size 2^(r-1). for r=2:k+1 for c=1:2^(k+1-r) Z{r,c}=union(Z{r-1,2*c-1}, Z{r-1,2*c}); end end end % Steps 2&3 function H=Generating_H(k,Z) % In this program, component P of graph H is expressed by its adjacency matrix where diagonal numbers are the labels of corresponding vertices 8 % instead of zeros. For first-grade component P(Z{1,d2}), H{1,d2,1,1} is assigned to be its adjacency matrix. However, for higher-grade component % P(Z{d1,d2},d3,d4) where d1>1, H{d1,d2,d3,d4} is assigned to be its adjacency matrix. H=cell(k+1,2^k,2^(k-1),2^(k-1)); % k+1=size(Z,1). 2^k=size(Z,2). % When component P's grade is larger than 2^(k-1), P is the join of same-grade unions U(Z{k,1},d3) and U(Z{k,2},d4). Because |Z{k,1}|=|Z{k,2}|=2^(k-1), % so both d3 and d4 are no larger than 2^(k-1) for any H{d1,d2,d3,d4}. U=cell(k+1,2^k,2^(k-1)); % Same-grade union U(Z{d1,d2},D3) is expressed by its adjacency matrix U{d1,d2,D3} where diagonal numbers are the labels of corresponding vertices % instead of zeros. % Matrices for the first-grade components and first-grade unions are first generated as follows. for d2=1:2^k H{1,d2,1,1}=uint8(d2); % The uint8 class is used to save memory and time. However, it shall be changed to other class when k is larger than 7. U=Generating_U(U,k,H{1,d2,1,1},1,d2,1); end % Matrices for higher-grade components and higher-grade unions are generated as follows. for b=2:2^k disp(['Proceeding to b = ',num2str(b),' of ',num2str(2^k)]) % This command is to show the progress of the running program when k is large. for d3=max(1,b-2^(k-1)):min(b-1,2^(k-1)) % b=d3+d4. b3 and b4 are positive integers and both maximum values of d3 and d4 for H{d1,d2,d3,d4} are 2^(k-1). d4=b-d3; for d1=1:k if (size(Z{d1,1},2)<d3)||(size(Z{d1,1},2)<d4) % By Definition 2.5, for component P(Z{d1+1,*},d3,d4) and nonempty H{d1+1,*,d3,d4}, d3 and d4 are not larger than size(Z{d1,1},2). continue end for d2=1:2:2^k-1 if isempty(Z{d1,d2+1})==0 % Z{d1,d2} and Z{d1,d2+1} represent A1 and A2 in Definition 2.5, respectively. sx=size(U{d1,d2,d3},1); % Matrix U{d1,d2,d3} expresses same-grade union U(Z{d1,d2},d3) 9 sy=size(U{d1,d2+1,d4},1); % Matrix U{d1,d2+1,d4} expresses same-grade union U(Z{d1,d2+1},d4) H{d1+1,(d2+1)/2,d3,d4}=uint8([U{d1,d2,d3},ones(sx,sy);ones(sy,sx),U{d 1,d2+1,d4}]); % H{d1+1,(d2+1)/2,d3,d4} is the adjacency matrix of graph H's component P(Z{d1+1,(d2+1)/2},d3,d4), which is the join of % U(Z{d1,d2},d3) and U(Z{d1,d2+1},d4). % Z{d1+1,(d2+1)/2}=union(Z{d1,d2},Z{d1,d2+1}). if d1<k % When d1=k, H{d1+1,*,*,*} expresses component of same-grade union U(Z{k+1,1},*). Because |Z{k+1,1}| = 2^k, i.e., Z{k+1,1} % contains all labels, so U(Z{k+1,1},*) will not be used to generate any component of H and thus they are not generated here. U=Generating_U(U,k,H{d1+1,(d2+1)/2,d3,d4},d1+1,(d2+1)/2,b); end else % which indicates Z{d1,d2+1} is empty, then go to the next d1. break end end end end end end function U=Generating_U(U,k,P,a1,a2,b) % This function is to put component P(Z{a1,a2},b1,b2) into each same-grade union U(Z{d1,d2},b) of which b=b1+b2 and Z{a1,a2} is a subset of Z{d1,d2}. d1=a1; d2=a2; while d1<=k % As explained in lines 80 and 81, U(Z{k+1,*},*) will not be used to generate any cell of H and thus they are not generated here. sizeU=size(U{d1,d2,b},1); sizeP=size(P,1); U{d1,d2,b}=uint8([U{d1,d2,b},zeros(sizeU,sizeP);zeros(sizeP,sizeU),P] ); % The above command puts component P(Z{a1,a2},b1,b2) into same-grade union U(Z{d1,d2},b). d1=d1+1; % It is obvious that for any d1, there exists at most one Z{d1,d2} which includes Z{a1,a2}. 10 d2=ceil(d2/2); % If Z{d1,d2} includes Z{a1,a2}, then Z{d1+1,ceil(d2/2)} includes Z{a1,a2}. end end Appendix 2. Testing_G.m % This MATLAB file is the second program to test the algorithm in the manuspcript. Another file named "Generating_k_and_H.m" needs to run first. function Testing_G % By generating m random graphs, of which the order is 2^k, the program finds out how many of the tested random graphs do not yield clique in Step 5 % and thus are not the graphs to which the algorithm is applicable. (If a clique is yielded in Step 5, then by Claim 2.10, its label set is the label % set of a minimum vertex cover of the tested graph.) m=input('How many random graphs are to be generated and tested for the algorithm?'); if (m<=0) || (m<ceil(m)) error('m must be positive integer') end disp('Loading file "k_and_H". Please wait.') % When k is larger than 5, the following loading of file 'k_and_H' may take a long time. load('k_and_H'); % File "k_and_H.mat" is generated by "Generating_k_and_H.m". if k==5 disp('Note: When k=5, the running time for an ordinary personal computer to compute a graph is about 9 minutes.') end if k>5 disp('Note: When k>5, the running time for an ordinary personal computer to compute a graph is very long.') end n1=0; % n1 will be the number of tested graphs to which Stage 1 of the algorithm is not applicable. n2=0; % n2 will be the number of tested graphs to which Stage 2 is not applicable. d1=[]; % d1 will record the approximate edge density of each graph to which Stage 1 is not applicable. d2=[]; % d2 will record the approximate edge density of each graph to which Stage 2 is not applicable. 11 for h=1:m disp(['Computing the ',num2str(h),'th random graph']) density=2; while density<=0 || density>1 density=0.5+0.3*randn; end % "density" will approximately equals to the ratio of |E(G)| to |E(K)|, of which K is a 2^k-order complete graph, and it is generated from a normal % distribution with mean 0.5 and standard deviation 0.2,0.3,0.4,0.5 or 0.6. G=Generating_G(k,density); if G==zeros(size(G)) disp(['The ',num2str(h),'th random graph has no edge.']) continue end stage=1; bstart=2; [S1,bstart]=Step_4(stage,bstart,k,G,H); I1=Step_5(stage,S1,G); result1=Step_6(I1); if result1==1 % which indicates I1 is a clique. disp(['Stage 1 of the algorithm is applicable to the ',num2str(h),'th random graph.']); else disp(['Stage 1 of the algorithm is NOT applicable to the ',num2str(h),'th random graph.']); n1=n1+1; d1(length(d1)+1)=density; stage=2; [S2,~]=Step_4(stage,bstart,k,G,H); I2=Step_5(stage,S2,G); result2=Step_6(I2); if result2==1 % which indicates I2 is a clique. disp(['Stage 2 of the algorithm is applicable to the ',num2str(h),'th random graph.']); else disp(['Stage 2 of the algorithm is NOT applicable to the ',num2str(h),'th random graph.']); n2=n2+1; d2(length(d2)+1)=density; end end disp(['Currently, Stage 1 of the algorithm is NOT applicable to ',num2str(n1),' of ',num2str(h),' computed random graphs.']) 12 disp(['Currently, Stage 2 of the algorithm is NOT applicable to ',num2str(n2),' of ',num2str(h),' computed random graphs.']) end d1 disp('d1 records the approximate edge density of each graph to which Stage 1 is not applicable.') d2 disp('d2 records the approximate edge density of each graph to which Stage 2 is not applicable.') end function G=Generating_G(k,density) G=sprandsym(2^k,density,0.1); % sprandsym(n,density) is a symmetric random, n-by-n, sparse matrix with approximately density*n*n nonzeros. However, when density equals to 1, the % function still generates some zeros. For better performance, sprandsym(n,density,rc) is used here and it works much better, although ocassionly still % generates zeros, for density=1. G(logical(eye(2^k)))=0; G=spones(G); end function [S,bstart]=Step_4(stage,bstart,k,G,H) % For each component P of graph H in ascending order of its grade, by deleting a minimal subgraph of P, get P's maximal subgraph S which satisfies % Conditions 1 and 2 (or 2+ for Stage 2). Iterate this computation for the next component until P's S is nonempty. % In this program, component P of graph H is expressed by its adjacency matrix, where diagonal numbers are the labels of corresponding vertices % instead of zeros. For first-grade component P(Z{1,d2}), H{1,d2,1,1} is assigned to be its adjacency matrix. However, for higher-grade component % P(Z{d1,d2},d3,d4) where d1>1, H{d1,d2,d3,d4} is assigned to be its adjacency matrix. if stage==1 for d2=1:2^k % This "for loop" is only for graph H's first-grade components. Stage 2 never starts from any first-grade component because a % nonempty subgraph of a first-grade component is always a clique. P=H{1,d2,1,1}; S=Maximal_subgraph_satisfying_conditions_1and2_or_1and2plus(stage,P,G ); 13 if isempty(S)==0 % which indicates P(Z{1,d2}) has a nonempty subgraph S, which must be P(Z{1,d2}) itself, that satisfies Conditions 1 and 2. return end end end for b=bstart:2^k % This "for loop" is for graph H's components of grade larger than 1. Thus bstart=2 for Stage 1, while Stage 2 starts at the grade % of H's component which has nonempty subgraph satisfying Conditions 1 and 2. for d3=max(1,b-2^(k-1)):min(b-1,2^(k-1)) % b=d3+d4. d3 and d4 must be positive integers and both maximum values of d3 and d4 for H{d1,d2,d3,d4} are 2^(k-1). d4=b-d3; for d1=2:k+1 for d2=1:2^k P=H{d1,d2,d3,d4}; if isempty(P)==0 % which indicates this cell represents a nonempty component P(Z{d1,d2},d3,d4). S=Maximal_subgraph_satisfying_conditions_1and2_or_1and2plus(stage,P,G ); if isempty(S)==0 % which indicates P(Z{d1,d2},d3,d4) has a nonempty subgraph S which satisfies conditions 1 & 2(or 2+ for Stage 2). bstart=b; % This command records the grade of H's component at which the possible Stage 2 will start. return end end end end end end end function I=Step_5(stage,S,G) % For the recorded S of Step 4, by deleting a maximal subset of V(S), get a minimal-order subgraph I of S which contains a nonempty subgraph SS that % satisfies Conditions 1 and 2(or 2+ for Stage 2). Record this I for the next step. v=1; while v<=size(S,1) 14 % The vth vertex of S is to be checked whether it can be deleted, i.e., whether S still has a nonempty subgraph which satisfies Conditions 1 and 2 % (or 2+ for Stage 2) after the vth vertex of S is deleted. I=S; I(v,:)=[]; I(:,v)=[]; SS=Maximal_subgraph_satisfying_conditions_1and2_or_1and2plus(stage,I, G); if isempty(SS)==0 % which indicates that I still has a nonempty subgraph which satisfies Conditions 1 and 2(or 2+ for Stage 2). S=SS; % If this command were S=I instead of S=SS, then the next round of function "Maximal_subgraph_satisfying_conditions_1and2_or_1and2plus" % would delete again the edges of E(I)-E(SS). % For any i which satisfies 1 <= i < v, it is obvious that the ith vertex of the last S remains not deletable and so it is still the ith vertex % of the current S. else % which indicates the vth vertex of S shall not be deleted. v=v+1; end end I=S; end function result=Step_6(I) % This function checks whether I represents a clique. if size(I,1)==1 result=1; return end for i=1:size(I,1)-1 % Because of symmetry of matrix I, only the "upper half" of the matrix is checked. for j=i+1: size(I,1) if I(i,j)==0 result=0; return; end end end result=1; end 15 function M=Maximal_subgraph_satisfying_conditions_1and2_or_1and2plus(stage,D,G ) % For the graph defined by adjacency matrix D, this function finds out its maximal subgraph which satisfies Conditions 1 and 2 (or 2+ for Stage 2). if isempty(D)==1 M=D; return end x=1; while x==1 DD=A_round_of_edge_deleting_by_Condition_2or2plus(stage,D,G); if DD==D % which indicates all of the edges of the graph expressed by D satisfy Condition 2 (or 2+ for Stage 2). break end % At this point, DD~=D, which indicates certain edges of the graph expressed by D were deleted in the last round of edge-deleting and D becomes DD. % However,the graph expressed by DD may still have edges which do not satisfy Condition 2 (or 2+ for Stage 2), so the next round of edge-deleting % is necessary until DD=D. D=DD; end % At this point, all edges of the graph expressed by D satisfy Condition 2 (or 2+ for Stage 2). Then it is obvious that for any vertex which has % incident edge, Condition 1 is satisfied. Thus the following part of this function is to delete the isolated vertices which do not satisfy Condition 1. i=1; while i<=size(D,1) % The ith vertex of D will be checked whether it is an islated vertex and whether it satisfies Condition 1. A=D(i,:); % Thus A(i)=D(i,i) is the label of the ith vertex of D. A(i)=0; if A==zeros(size(A)) % which indicates the ith vertex of D has no incident edge, then we need to check whether the label of this vertex is also the label of a G's % vertex cover of size 1 as follows. GG=G; GG(D(i,i),:)=0; % The label of the xth vertex of G is x. GG(:,D(i,i))=0; % D(i,i) is the label of the ith vertex of D. Suppose j=D(i,i). 16 If j is the label of a G's vertex cover of size 1, then for any G(r,c)~=0, % r=j or c=j. (Note that all of the diagonal numbers of matrix G are zeros.) if GG==zeros(size(G)) % which indicates the label of the ith vertex of D is the label of a G's vertex cover of size 1, then this vertex satisfies Condition 1 % and shall not be deleted. i=i+1; else % Then this vertex does not satisfy Condition 1 and shall be deleted. D(i,:)=[]; D(:,i)=[]; end else % which indicates the ith vertex of D has incident edge and shall not be deleted. i=i+1; end end M=D; end function DD=A_round_of_edge_deleting_by_Condition_2or2plus(stage,D,G) % For each round of edge-deleting, all edges which do not satisfy Condition 2 (or 2+ for Stage 2) of the input graph expressed by D are deleted. % However, the deletion may cause some more edges which no longer satisfy Condition 2 (or 2+ for Stage 2), and these edges may not be all deleted in % this round of edge-deleting. i=2; while i<=size(D,1) for j=1:i-1 % Because matrix D is symmetrical, only the part under its diagonal is checked. if D(i,j)==1 dia=diag(D); % dia(1,x) is the label of the xth vertex of D. Ne2=D(i,:).*D(j,:); % ".*" is element-by-element multiplication, so Ne2(1,x) is non-zero only if both D(i,x) and D(j,x) are non-zero. Therefore, Ne2(1,x) is % non-zero only if x=i, x=j, or the xth vertex is adjacent to both the ith and the jth vertices, so Ne2=N[ij] for Stage 1. if stage==2 % then Condition 2+ shall be satisfied instead of Condition 2. for k=1:size(D,1) if k~=i && k~=j && Ne2(1,k)==1 % which indicates the 17 kth vertex is adjacent to both the ith and the jth vertices. Ne3=Ne2.*D(k,:); % Similar as explained for Ne2, Ne3(1,x) is non-zero only if x=i, x=j, x=k, or the xth vertex is adjacent to % all of the ith, jth and kth vertices. LNe3=dia(logical(Ne3)); % LNe3 is the label set of Ne3. C=Does_the_label_set_cover_E_of_G(LNe3,G); if C==0 % which indicates the 3-clique of vertices i,j and k does not satisfy the definition of N[uv] in Condition 2+, so % vertex k shall not be considered to be an element of N[ij] for Stage 2. Ne2(1,k)=0; end end end % At this point, Ne2=N[ij] for Stage 2. end LNe2=dia(logical(Ne2)); % LNe2 is the label set of Ne2=N[ij]. C=Does_the_label_set_cover_E_of_G(LNe2,G); if C==0 % which indicates the edge corresponding to D(i,j) does not satisfy Condition 2 (or 2+ for Stage 2). D(i,j)=0; D(j,i)=0; end end end i=i+1; end DD=D; end function C=Does_the_label_set_cover_E_of_G(LN,G) % This function checks whether LN is a label set of a vertex cover of G. G(LN,:)=0; G(:,LN)=0; if G==zeros(size(G)) C=1; else C=0; end end 18
8cs.DS
Working Paper Computing and Testing Pareto Optimal Committees arXiv:1803.06644v1 [cs.GT] 18 Mar 2018 Haris Aziz · Jérôme Lang · Jérôme Monnot Abstract Selecting a set of alternatives based on the preferences of agents is an important problem in committee selection and beyond. Among the various criteria put forth for desirability of a committee, Pareto optimality is a minimal and important requirement. As asking agents to specify their preferences over exponentially many subsets of alternatives is practically infeasible, we assume that each agent specifies a weak order on single alternatives, from which a preference relation over subsets is derived using some preference extension. We consider five prominent extensions (responsive, downward lexicographic, upward lexicographic, best, and worst). For each of them, we consider the corresponding Pareto optimality notion, and we study the complexity of computing and verifying Pareto optimal outcomes. We also consider strategic issues: for four of the set extensions, we present a linear-time, Pareto optimal and strategyproof algorithm that even works for weak preferences. Keywords committee selection · multiwinner voting · Pareto optimality · algorithms and complexity · set extensions. JEL Classification: C70 · D61 · D71 1 Introduction Pareto optimality is a central concept in economics and has been termed the “single most important tool of normative economic analysis” (Moulin, 2003). An outcome H. Aziz Data61, CSIRO and UNSW, Sydney 2052 , Australia Tel.: +61-2-8306 0490 Fax: +61-2-8306 0405 E-mail: [email protected] J. Lang and J. Monnot LAMSADE, Université Paris-Dauphine Paris, France E-mail: {lang, jerome.monnot}@lamsade.dauphine.fr 2 Haris Aziz et al. is Pareto optimal if there does not exist another outcome that all agents like at least as much and at least one agent strictly prefers. Although Pareto optimality has been considered extensively in single-winner voting and other social choice settings such as fair division or hedonic games, it has received only little attention in multiwinner voting, in which the outcomes are sets of alternatives. Multiwinner voting applies to selecting a set of plans or a committee, hiring team members, movie recommendations, and more. For convenience, we use the terminology “committee” even if our results have an impact far beyond committee elections (Faliszewski et al., 2017; Aziz et al., 2017). In single-winner voting setting, agents express preferences over alternatives and a single alternative is selected. Pareto optimality in this context is straightforward to define, achieve, and verify. In multiwinner voting, a well-known difficulty is that it is unrealistic to assume that agents will report preferences over all possible committees, since there is an exponential number of them. For this reason, most approaches assume that they only report a small part of their preferences, and that some extension principle is used to induce a preference over all possible subsets from this ‘small input’ over single alternatives (Barberà et al., 2004). Such preference extensions are also widely used in other social choice settings such as fair division or matching. The most two widely used choices of ‘small inputs’ in multiwinner voting are rankings (linear orders) over alternatives and sets of approved alternatives. In this paper we make a choice that generalizes both of them: agents report weak orders over single alternatives. Then we consider five prominent preference extension principles: the responsive extension, where a set of alternatives S is at least as preferred as a set of alternatives T if S is obtained from T by repeated replacements of an alternative by another alternative which is at least as preferred; the optimistic, or ‘best’ (respectively pessimistic, or ‘worst’) extension, which orders subsets of alternatives according to their most (respectively, least) preferred element; the downward lexicographic extension, a lexicographic refinement of the optimistic extension, and the upward lexicographic extension, a lexicographic refinement of the pessimistic (worst) extension. The responsive extension (Barberà et al., 2004; Roth and Sotomayor, 1990) can be seen as the ordinal counterpart of additivity. The downward lexicographic extension has been considered in various papers (Bossert, 1995; Lang et al., 2012; Klamler et al., 2012). The ‘best’ set extension has been considered in a number of approaches such as full proportional representation (Chamberlin and Courant, 1983; Monroe, 1995) and other committee voting settings Elkind et al. (2015). The ‘worst’ set extension, also used by Klamler et al. (2012) and Skowron et al. (2015b), captures settings where the impact of a bad alternative in the selection overwhelms the benefits of good alternatives: for instance, when the decision about a crucial issue will be made by one of the members of the committee but the agent ignores which one and is risk-averse; or the case of a parent’s preferences over a set of movies to be watched by a child. The ‘best’ and ‘worst’ set extensions have been used in coalition formation (Aziz and Savani, 2016; Cechlárová, 2008). Although set extensions have been implicitly or explicitly considered in multiwinner voting, most of the computational work has dealt with specific voting rules (see the related work section). Instead, we concentrate on Pareto optimality, consider the computation and verification of Pareto optimal committees, as well as the exis- Computing and Testing Pareto Optimal Committees 3 Computation Verification Responsive (RS) in PIC (Th. 5) coNP-C (Th. 2), W[2]-hard in P—dich. prefs and tw ≤ 2 (Th. 4) Downward Lexicographic (DL) in PIC (Th. 8) coNP-C (Th. 1), W[2]-hard Set Extension IC Upward Lexicographic (UL) in P Best (B) NP-hard (Th. 7) in P for strict prefs (Th. 11) coNP-C (Th. 2), W[2]-hard coNP-C, W[2]-hard (Th. 6) Worst (W) in PIC (Th. 10) in P (Th. 9) Table 1 Complexity of computing and verifying Pareto optimal committees. PIC (coined by Christos Papadimitriou in a seminar at Simons Institute in 2015) indicates a class of problems in which agents provide the input and the problems admit a strategyproof and polynomial-time algorithm. tence of a polynomial-time and strategyproof algorithm that returns Pareto optimal outcomes. Contributions We consider Pareto optimality with respect to the five aforementioned preference set extensions. We present various connections between the Pareto optimality notions. For each of the notions, we undertake a detailed study of complexity of computing and verifying Pareto optimal outcomes. Table 1 summarizes the complexity results. An important take-home message of the results is that testing Pareto optimality or obtaining Pareto improvements over status-quo committees is computationally hard even though computing some Pareto optimal committee is easy. For responsive and downward lexicographic extensions we give a complete characterization of the complexity of testing Pareto optimality when preferences are dichotomous and the size of top equivalence class is two: unless P = NP, Pareto optimality can be tested in polynomial time if and only if the size of the first equivalence classes is at most two. For the ‘best’ extension, we show that even computing a Pareto optimal outcome is NP-hard. Another interesting contrast with the responsive set extension is that even when preferences are dichotomous and the size of top equivalence class is two, testing Pareto optimality is coNP-complete. In contrast to the other extensions, for the ‘worst’ extension, both problems of computing and verifying Pareto optimal outcomes admit polynomial-time algorithms. We also consider the requirement of strategyproofness on top of Pareto optimality. We show that there exist linear-time Pareto optimal and strategyproof algorithms for committee voting even for weak preferences for four of the five set extensions. The algorithms can be considered as careful adaptations of serial dictatorship for committee voting. 2 Related Work A first related stream of work involves studying specific committee elections rules from a computational point of view (generally with little or no focus on Pareto opti- 4 Haris Aziz et al. mality). Our focus on determining whether a committee is Pareto optimal or on finding a Pareto optimal committee, is in some sense orthogonal to the study of committee election rules. The simplest (and most widely used) rules for electing a committee, called best-k rules, compute a score for each alternative based on the ranks, and the alternatives with the best k scores are elected Elkind et al. (2014); Faliszewski et al. (2016). Scoring-based extension principles have also been used by Darmann (2013). Note that the output of a best-k rule is obviously Pareto-optimal for the preferences induced by this scoring function, but not necessarily with respect to other set extensions. Klamler et al. Klamler et al. (2012) compute optimal committees under a weight constraint for a single agent (therefore optimality is equivalent to Pareto optimality), using several preference extensions including ‘worst’, ‘best’, and downward lexicographic. The ‘best’ (B) extension principle has been used in a number of papers on committee elections by full proportional representation, starting with (Chamberlin and Courant, 1983) and studied from a computational point of view in a long series of papers (e.g., (Procaccia et al., 2008; Lu and Boutilier, 2011; Betzler et al., 2013; Skowron et al., 2015a; Elkind and Ismaili, 2015). These rules obviously output Pareto optimal committees for B, but not necessarily for other extensions. Some of the set extensions considered in this paper have corresponding analogues when extending preferences over alternatives to preferences over ‘lotteries over alternatives.’ In particular, the RS set extension corresponds to SD (stochastic dominance) lottery extension. Also the DL and UL set extensions considered in this paper correspond to DL and UL lottery extensions considered in works in probabilistic social choice (Brandl, 2013; Aziz et al., 2013b; Cho, 2016). Some works are based on the Hamming extension. Each agent specifies his ideal committee and he prefers committees with less Hamming distance from the ideal committee. The Hamming distance notion can be used to define specific rules such as minimax approval voting (Brams et al., 2007), which selects the committee minimizing the maximum Hamming distance for the agents. Although the output of minimax approval voting is not always Pareto-optimal for the Hamming extension, there are good Pareto-optimal approximations of it Caragiannis et al. (2010). Note that for dichotomous preferences, the Hamming extension coincides with the responsive and the downward lexicographic extensions, therefore our computational results for responsive set extension for dichotomous preferences also hold for the Hamming and downward lexicographic extensions. A second line of work concerns understanding the classes of rules that result in Pareto optimal outcomes. Most works along this line bear on a different type of committee elections, called designated-seat voting, where candidates must declare the seat they contest (Benoı̂t and Kornhauser, 2010).1 Results about the existence or non-existence of Pareto optimal rules have been presented Özkal-Sanver and Sanver (2006); Benoı̂t and Kornhauser (2010); Cuhadaroǧlu and Lainé (2012). 1 If there are exactly two candidates per seat, then designated voting is equivalent to multiple referenda, where a decision has to be taken on each of a series of yes-no issues. Computing and Testing Pareto Optimal Committees 5 3 Setup We consider a set of agents N = {1, . . . , n}, a set of alternatives A = {a1 , . . . , am } and a preference profile %= (%1 , . . . , %n ) such that each %i is a complete and transitive relation over A. We write a %i b to denote that agent i values a at least as much as b and use ≻i for the strict part of %i , i.e., a ≻i b iff a %i b but not b %i a. Finally, ∼i denotes i’s indifference relation, i.e., a ∼i b iff both a %i b and b %i a. The relation %i results in equivalence classes Ei1 , Ei2 , . . . , Eiki for some ki such that ′ a ≻i a′ if a ∈ Eil and a′ ∈ Eil for some l < l′ . We will use these equivalence classes to represent the preference relation of an agent as a preference list i : Ei1 , Ei2 , . . . , Eiki . For example, we will denote the preferences a ∼i b ≻i c by the list i : {a, b}, {c}. An agent i’s preferences are strict if the size of each equivalence class is 1. An agent i’s preferences are dichotomous if he partitions the alternatives into just two equivalence classes, i.e., ki = 2. Let T opwidth(%) be the maximum size of the most preferred equivalence class, i.e., T opwidth(%) = maxi≤n |Ei1 |. For any S ⊆ A, we will denote by max%i (S ) and min%i (S ) the alternatives in S that are maximally and minimally preferred by i respectively. Thus, if q and r are respectively the smallest and the q q largest indices such that Ei ∩ S , ∅ and Eir ∩ S , ∅, then max%i (S ) = Ei ∩ S and min%i (S ) = Eir ∩ S . For k ≤ m, let S k (A) = {W ⊆ A : |W| = k}. 4 Set Extensions and Pareto Optimality Set Extensions Set extensions are used for reasoning about the preferences of an agent over sets of alternatives given their preferences over single alternatives. For fixed-size committee voting, the responsive extension is very natural and has been applied in various matching settings as well (Barberà et al., 2004; Roth and Sotomayor, 1990). For all V, W ∈ S k (A), we say that W %RS i V if and only if there is an injection f from V to W such that for each a ∈ V, agent i weakly prefers f (a) to a, i.e. f (a) %i a. We define the ‘best’ set extension and the ‘worst’ set extension which are denoted B and W respectively. For all W, V ∈ S k (A), W %B i V if and only if w %i v for w ∈ max%i (W) and v ∈ max%i (V). On the other side, W %W i V if and only if w %i v for w ∈ min %i (W) and v ∈ min%i (V). In the downward lexicographic (DL) extension, an agent prefers a committee that selects more alternatives from his most preferred equivalence class, in case of equality, the one with more alternatives for the second most preferred equivalence class, and so on. Formally, W ≻iDL V iff for the smallest (if any) l with |W ∩ Eil | , |V ∩ Eil | we have |W ∩ Eil | > |V ∩ Eil |. In the upward lexicographic (UL) extension, an agent prefers a committee that selects less alternatives from his least preferred equivalence class, in case of equality, the one with less alternatives for the second least preferred equivalence class, and so on. Formally, W ≻UL V iff for the largest (if any) l with |W ∩ Eil | , |V ∩ Eil | we have i l l |W ∩ Ei | < |V ∩ Ei |. Remark 1 Consider an agent i with preferences %i over A. Let S , T ⊂ W such that |S | = |T | = k. Then, 6 Haris Aziz et al. – – – – S S S S %RS i %RS i ≻RS i ≻RS i T T T T =⇒ =⇒ =⇒ =⇒ S S S S %iDL %UL i ≻iDL ≻UL i T =⇒ S %B i T T =⇒ S %W i T T T The relations follow from the definitions. Efficiency based on Set Extensions With each set extension E, we can define Pareto optimality with respect to E. A committee W ∈ S k (A) is Pareto optimal with respect to E, or simply E-efficient, if there exists no committee W ′ ∈ S k (A) such that W ′ %E i W for all i ∈ N and W ′ ≻E i W for some i ∈ N. Note that for each of our set extensions, E-efficiency coincides with standard Pareto optimality when k = 1. An outcome is a Pareto improvement over another if each agent weakly improves and at least one agent strictly improves. Example 1 Consider the preference profile: 1 : a, b, c, d 2 : d, c, b, a Suppose k = 2. Then, – – – – – The unique B-efficient committee is {a, d} The unique W-efficient committee is {b, c}. The DL-efficient committees are {a, d}, {a, b}, and {d, c}. The UL-efficient committees are {b, c}, {a, b}, and {d, c}. The RS-efficient committees are {a, d}, {b, c}, {a, b}, and {d, c}, Remark 2 Consider a committee S . – If S is DL-efficient, then S is RS -efficient – If S is UL-efficient, then S is RS -efficient The argument is as follows. Suppose S is not RS -efficient, then there exists some RS other outcome T such that T %RS i S for all i ∈ N and T ≻i S for some i ∈ N. In that DL DL case T %i S for all i ∈ N and T ≻i S for some i ∈ N. Also T %UL S for all i ∈ N i S for some i ∈ N. Hence S is neither DL-efficient not UL-efficient. and T ≻UL i Remark 3 There always exists a B-efficient committee that is also DL-efficient: DL Pareto improvements over a B-efficient does not harm any agent with respect to the B relation. Remark 4 There always exists a W-efficient committee that is also UL-efficient: UL Pareto improvements over a W-efficient does not harm any agent with respect to the W relation. In Figure 1, we illustrate the relations between the different efficiency notions. Later on in the paper we will present an algorithm that returns a committee that is UL-efficient and DL-efficient, and hence RS -efficient. We also make the following general observation. Computing and Testing Pareto Optimal Committees 7 B-efficiency W-efficiency DL-efficiency U L-efficiency RS -efficiency Fig. 1 Relations between the five notions of efficiency. An arrow from E1 -efficiency to E2 -efficiency means that E1 -efficiency implies E1 -efficiency; a dashed line means there always exists a committee that is both E1 - and E2 -efficient; absence of arrow or line means that the sets of E1 - and E2 -efficient committees can be disjoint. Lemma 1 If there is a polynomial-time algorithm to compute a Pareto improvement over a committee, then there exists a polynomial-time algorithm to compute an Eefficient committee under set extensions E ∈ {RS , DL, UL, W, B}. Proof. Here, we start from any committee and we recursively apply Pareto improvement until we reach a Pareto optimal committee. For the ‘best’ and ‘worst’ extensions, there can be at most mn Pareto improvements because for one agent there can be at most m improvements. Since an RS -improvement implies an DL-improvement, let us bound the number of Pareto-improvements with respect to DL. In each Paretoimprovement, for the agent who strictly improves, the most preferred equivalence class that has different number of alternative in the outcome increases by at least one. Therefore the most preferred equivalence class can be the improving class in at most m of the Pareto improvements. Similarly, the number of Pareto improvements in the subsequent less preferred equivalence class improves in a Pareto improvement can be at most m of the Pareto improvements. Therefore the total number of DL Paretoimprovements is bounded by m2 n. A similar argument holds for UL as well. ⊔ ⊓ We end this section by observing that, under any of the set extensions we consider, a set of Pareto optimal alternatives may be Pareto dominated. Consider the following example. Example 2 1 : a, c, b, d 3 : b, c, a, d 2 : a, d, b, c 4 : b, d, a, c The set {c, d} consists of Pareto optimal alternatives but is Pareto dominated by {a, b} under any of our set extensions. 8 Haris Aziz et al. 5 Responsive Set Extension There is a trivial way to achieve Pareto optimality under the responsive set extension by taking any decreasing scoring vector consistent with the ordinal preferences, finding the total score of each alternative and returning the set of k alternatives with the maximum scores. For instance, on Example 2, the outcome of the rule that outputs the alternatives with the best k Borda scores is {a, b}. Theorem 1 A Pareto optimal committee under the responsive set extension committee can be computed in linear time. In many situations, one may already have a status-quo committee and one may want to find a Pareto improvement over it. This problem of testing Pareto optimality and finding a Pareto improvement under the responsive set extension turns out to be a much harder task. Note that if there exists a polynomial-time algorithm to compute a Pareto improvement, then it means that testing Pareto optimality is also polynomialtime solvable. Theorem 2 Checking whether a committee is Pareto optimal under the responsive set extension is coNP-complete, even for dichotomous preferences and T opwidth(% ) ≥ 3, or for strict preferences. Proof. We only present the case where T opwidth(%) = 3. The reduction is from the NP-complete problem vertex cover Garey and Johnson (1979). Given a simple graph G = (V, E), the minimum vertex cover problem consists in finding a subset C ⊆ V of minimum size such that every edge e ∈ E is incident to some node of C. Its decision version vertex cover takes as input a simple graph G = (V, E) and an integer k and problem is deciding if there exists a vertex cover C ⊆ V of G with |C| ≤ k. Let h(V, E), ki be an instance of vertex cover, with [x, y] being one arbitrary edge in E. We build the following instance of Pareto optimality under RS : • N = ∪e∈E Ne ∪ {a}, where for each edge e ∈ E, Ne is a set of k agents, and a is a special agent. • A = V ∪ D, where D = {d1 , . . . , dk }. • For each e = [u, v] ∈ E, the preferences of agent ei , for i = 1, . . . , k, and of agent a, are ei : {u, v, di }, (D − di ) ∪ (V \ {u, v}) a : {x, y}, D ∪ (V \ {x, y}) The reduction is clearly done within polynomial time and preferences are dichotomous. We can check easily that committee D (of size k) is not Pareto optimal under RS if and only if there exists a vertex cover of G of size at most k. For strict preferences, in the previous reduction we replace {u, v, di }, . . . by {u}, {v}, {di }, . . . in the preferences of ei . It is easy to see that the proof is similar. ⊓ ⊔ Using a similar reduction from the Hitting Set problem, we can also prove Theorem 3 that concerns a parametrized complexity intractability result Downey and Fellows (2013). Hitting Set is defined as follows: given a ground set X of elements, and a collection C = {C1 , . . . , Cℓ } of subsets of X, does there exist a H ⊂ X such that |H| ≤ k and H ∩ C , ∅ for all C ∈ C? Computing and Testing Pareto Optimal Committees 9 Theorem 3 Checking whether a committee is Pareto optimal under the responsive set extension is W[2]-complete under parameter k, even for dichotomous preferences. For dichotomous preferences we present a complete characterization of the complexity according to the T opwidth(%) parameter. If T opwidth(%) = 1, then in any Pareto improvement over committee D, any alternative in D that is most preferred by some agent needs to be kept selected, and therefore the problem of checking RS efficiency is easy. If T opwidth(%) ≥ 3, from Theorem 2, the problem is hard. Remains the case T opwidth(%) = 2. Theorem 4 For dichotomous preferences, a Pareto improvement over a committee with respect to the responsive set extension can be computed in polynomial time when T opwidth(%) ≤ 2. Proof. Consider a preference profile %= (%1 , . . . , %n ) where each %i is dichotomous and verifies T opwidth(%) = 2, and let D ∈ S k (A). For each i ∈ N, let (Ei1 , Ei2 ) be the partition associated with %i . First, if for all i ∈ N, Ei1 ⊆ D, then D is obviously RS -efficient. Assume it is not the case, that is, (1) for some i ∈ N, Ei1 \ D , ∅. Let – N ′ = {i ∈ N : Ei1 ∩ D = Ei1 }, W ′ = ∪i∈N ′ Ei1 (by construction, W ′ ⊆ D), and k′ = |W ′ |. – N ′′ = {i ∈ N \ N ′ : Ei1 ∩ (D \ W ′ ) , ∅} and A′′ = ∪i∈N ′′ Ei1 . Now, we build a graph G = (V, E) with V = {v1 , . . . , vr } isomorphic to A′′ , and [v p , vq ] ∈ E iff Ei1 = {a p , aq } for some i ∈ N ′′ : each edge of G corresponds to the top two alternatives of some agent, provided one of them is in D \ W ′ . Let τ(G) be the size of an optimal vertex cover of G. We first claim that there is a Pareto improvement over D if and only if one of follows two conditions is satisfied: (i) τ(G) < k − k′ , or (ii) τ(G) = k − k′ , and there is an optimal vertex cover of G containing either at least an element of Ei1 for some i < N ′ ∪ N ′′ , or two elements of Ei1 for some i ∈ N ′′ . We first show that (i) and (ii) are sufficient. If (i) holds then take a committee corresponding to a minimum vertex cover of G, add to it the k′ alternatives of W ′ , and add (k − k′ ) − τ(G) alternatives, with at least one in ∪i (Ei1 \ D); this is possible because of (1). If (ii) holds, then take a committee corresponding to a minimum vertex cover of G, and add to it the k′ alternatives of W ′ . In both cases, the obtained committee contains Ei1 for all i ∈ N ′ , contains at least one element of Ei1 for all i ∈ N ′ , and contains either two elements of Ei1 for some i ∈ N ′′ , or an element of Ei1 for some i < N ∪ N ′′ . Therefore it is a Pareto-improvement over D. Now, we show that (i) and (ii) are necessary. Let W ∈ S k (A) be a Pareto improvement of D containing a maximum number of alternatives from D. We have the following two properties: W ′ ⊆ W and W \ W ′ is a vertex cover of G. W ′ ⊆ W holds, since otherwise there would be an i ∈ N ′ such that W ′ %RS W does not hold. For i similar reasons, C ′ = (W \ W ′ ) ∩ A′′ is a vertex cover of G. If |(W \ W ′ ) ∩ A′′ | < τ(G), then by adding to it any set of D \ C ′ of size k − k′ − τ(G) we obtain a set of size k 10 Haris Aziz et al. which constitutes a Pareto improvement of D because now, Ei1 ⊆ W for some i ∈ N ′′ . If |(W \ W ′ ) ∩ A′′ | = τ(G), then (W \ W ′ ) ∩ A′′ = W \ W ′ and necessarily either Ei1 ∩ C , ∅ for some i < (N ′ ∪ N ′′ ) or Ei1 ⊆ C for some i ∈ N ′′ . It remains to be shown that (i) and (ii) can be checked in polynomial time. (i) can be done in polynomial-time because G is bipartite: indeed, by construction, G is two-colorable with color sets A′′ ∩ D and A′′ \ D, and by König’s theorem, for bipartite graphs, the problem of finding the minimum vertex cover is equivalent to computing a maximum matching, hence solvable in polynomial time. As for (ii), if τ(G) = k − k′ , we have to check whether for some optimal vertex cover C of G, either (ii.1) Ei1 ∩ C , ∅ holds for some i < (N ′ ∪ N ′′ ), or (ii.2) Ei1 ⊆ C for some i ∈ N ′′ . In order to check (ii.1), for each i < (N ′ ∪ N ′′ ) such that there exists x ∈ Ei1 ∩ A′′ , we transform G into a new bipartite graph G{x} where we add a new vertex x′ and an edge [x, x′ ]. In order to check (ii.2), for each i < N ′′ , let Ei1 = {x, y}; we transform G into a new bipartite graph G{x,y} where we add two new vertices x′ and y′ , and two edges [x, x′ ] and [y, y′ ]. Finally, we test if τ(G) = τ(G{x} ) or if τ(G) = τ(G{x,y} ) for one of these graphs, because all optimal vertex covers of G{x} (respectively G{x,y} ) must contain x (respectively {x, y}). ⊔ ⊓ Example 3 We illustrate the algorithm in the proof of Theorem 4. Let k = 2 and consider the dichotomous profile, where we specify only the top equivalence class of each agent: 1 : {a, c} 4 : {d, e} 2 : {b, c} 5 : {e, f } 3 : {b, d} Let D = {a, b}. We have N ′ = W ′ = ∅, k′ = 0, D \ W ′ = {a, b}, N ′′ = {1, 2, 3}, and A′′ = {a, b, c, d}. We construct the graph G = (V, E): V = {va , vb , vc , vd } and E = {{va , vc }, {vb , vc }, {vb , vd }}. We have τ(G) = 2 = k − k′ . Now we consider the four graphs G{d} , resulting from the addition to G of a new vertex vd′ and edge [vd , vd′ ], and G{a,c} , G{b,c} and G{b,d} : G{a,c} results from the addition to G of two new vertices va′ , vc′ and edges [va , va′ ] and [vc , vc′ ], etc. Two of these graphs have an optimal cover of size 2: G{d} , with optimal cover {vc , vd }, and G{b,c} , with optimal cover {vb , vc }. Therefore, {c, d} and {b, c} are RS -Pareto-improvements over {a, b}, and {a, b} is not RS -efficient. va vc G vb va vd vc vb vd G {d} vb va vd′ vc′ vb′ vd vc G {b,c} Fig. 2 Graphs corresponding to Example 3 Note that finding an algorithm that computes a Pareto improvement over a committee can be used to decide whether a given a committee D of size k, is Pareto optimal under the responsive set extension. Computing and Testing Pareto Optimal Committees 11 Pareto optimality and Strategyproofness We now try to achieve both RS -efficiency and strategyproofness simultaneously. A mechanism f is strategyproof if reporting truthful preferences is a dominant strategy with respect to the responsive set extension: f (%) %RS f (%′i , %−i ) for all preference profiles % and (%′i , %−i ). Note that defining i strategyproofness in this way with respect to the RS extension is stronger than defining it for any of the other four extensions considered in this paper. Nonetheless, we will present some positive results with respect to strategyproofness. A naive way of achieving RS -efficiency and Pareto optimality is to enumerate the list of possible winning sets and implement serial dictatorship over the possible outcomes as is done in voting (Aziz et al., 2013b). However, the number of possible outcomes is exponential and responsive preferences result in a partial order over the possible winning sets and not a complete and transitive order. This problem is solved by Algorithm 1 which can be viewed as a computationally efficient serial dictatorship. Algorithm 1 Committee Voting Serial Dictatorship Input: (N, A, %, k, permutation π of N) Output: W ∈ S k (A). 1 2 3 4 5 6 7 8 9 10 11 12 13 14 L (last set to be refined) ←− A r (number of alternatives yet to be fixed) ←− k; W ←− ∅ i′ (index of the permutation π) ←− 1 while r , 0 or i′ , n do S S j j Agent i = π(i′ ) selects first t equivalence classes such that | tj=1 Ei ∩ L| ≥ r and | t−1 j=1 Ei ∩ L| < r. S St−1 j j W ←− W ∪ ( t−1 j=1 Ei ∩ L) (we say agent i fixes the alternatives in j=1 Ei ); S S j j r ←− | tj=1 Ei ∩ L| − | t−1 E ∩ L| j=1 i L ←− Eit ; ri′ ←− r ′ Increment i by one end while if r > 0 then pick any r alternatives from L and add them to W end if return W Theorem 5 There exists a linear-time and strategyproof algorithm that returns a committee that is Pareto optimal under the responsive set extension. Proof. Consider Algorithm 1. We show that at each stage i′ , agent π(i′ ), implicitly refines the set of feasible committees to the maximal set of most preferred outcomes from the set by providing additional constraints. This is true for the base case i′ = 1. Now assume it holds from 1 to i′ . Note that L contains all those alternatives that are strictly less preferred by agents in {π(1), . . . , π(i′ )} than the ones they respectively fixed. Moreover, each agent in {1, . . . , π(i′ )} is indifferent between the alternatives in S j L. As for π(i′ + 1), he fixes the best | t−1 j=1 E π(i′ +1) ∩ L| alternatives in L where t is the St−1 j S j t value such that |( tj=1 Eπ(i ′ +1) ) ∩ L| ≥ ri′ and | j=1 E π(i′ +1) ∩ L| < ri′ . For E π(i′ +1) , the St−1 j St−1 j agent only requires that ri′ +1 = |( j=1 Eπ(i′ +1) )∩L|−|( j=1 Eπ(i′ +1) )∩L| alternatives are t selected from his equivalence class Eπ(i ′ +1) which is ensured by the definition of the 12 Haris Aziz et al. algorithm. It follows from the argument that the returned set is Pareto optimal under the responsive set extension. For strategyproofness, when an agent π(i′ ) turn comes, it only has a choice over fixing the alternatives in L and requiring ri′ alternatives from t his equivalence class Eπ(i ′ ) . In this case the algorithm already chooses one of the best possible committees for the agent. ⊔ ⊓ Note that for k = 1, the algorithm is equivalent to serial dictatorship as formalized by Aziz et al. (2013a). Note that a committee that is Pareto optimal under the responsive set extension may not be a result of serial dictatorship. This holds even for k = 1 and the basic voting setting. The problem with the serial dictatorship algorithm formalized is that it overly favours the agent that is the first in the permutation. One way to limit his power is to let him choose only ⌈k/n⌉ alternatives. We note that this attempt at having a fairer extension of serial dictatorship comes at an expense because strategyproofness is compromised. Consider the profile in which 1 has preferences a, b, c and 2 has preferences a, c, b. For k = 2, and permutation 12, the outcome is {a, c}. But if agent 1 reports b, a, c, then the outcome is {a, b}. 6 ‘Best’ Set Extension Next, we consider Pareto optimality with respect to B, which has been used for defining many rules (see Section 2). Theorem 6 Unless P=NP, there is no polynomial-time algorithm to compute a Pareto improvement over a committee with respect to B, even for dichotomous preferences and T opwidth(%) = 2. Proof. We show that if it is not the case, then we can solve polynomially the vertex cover decision problem. Consider an instance of vertex cover given by a simple graph G = (V, E) with V = {v1 , . . . , vq } and E = {e1 , . . . , er }, and an integer k. Assume the existence of a polynomial-time algorithm Algo that computes a Pareto improvement over a committee with respect to B when T opwidth(%) ≤ 2: given a profile % and a set of k alternatives W, Algo(%, W) returns, in time polynomial in | % |, Yes if W is Pareto optimal with respect to B, and otherwise returns a k-set U of alternatives which Pareto dominates W. We will now prove by applying at most n times Algo with different inputs that we can decide in polynomial if G has a vertex cover C ⊆ V of G with |C| ≤ k. We construct the following profile P: • The set of agents is N = {1, . . . , q + r − k}, where agent i ≤ r corresponds to edge ei ∈ E. • The set of 2q − k alternatives is A = V ∪ D where D = {d1 , . . . , dq−k }. • Let ei = [u, v] ∈ E be an edge of G; the preferences of agent i for i = 1, . . . , r are: i : {u, v}, D ∪ (V \ {u, v}). The preferences of the last set of q − k agents {r + 1, . . . , q + r − k} are given by: for i = 1, . . . , q − k, r + i : di , V ∪ (D \ {di }). Computing and Testing Pareto Optimal Committees 13 The reduction is clearly done within polynomial time and the set of preferences given by % are dichotomous. Consider the following inductive procedure: W0 = V and for i ≥ 1, Wi = Algo (%, Wi−1 ) if Wi−1 is not Pareto optimal with respect to B, otherwise we return Wi−1 . Let W = Wq−k be the solution output after q − k calls. Because Algo is polynomial, the whole procedure is polynomial. We claim that G has a vertex cover of size k iff D ⊆ W. We will first prove by induction that at each step i, Wi \ D is a vertex cover of G. For the initial step, it is valid because V is a vertex cover of G. Assume that it is true for i < q − k and let us prove that Wi+1 \ D is a vertex cover of G. If it is not the case, some edge e j = [u, v] ∈ E is not covered. By assumption, e j is covered by Wi \ D. This implies B Wi ≻B j Wi+1 , which is a contradiction. Hence, Wi+1 % j Wi . From this hypothesis, we deduce D \ Wi+1 %B j D \ Wi for j = n + 1, . . . , 2n − k with a strict preference for some agent. Equivalently, D \ Wi ⊂ D \ Wi+1 . In conclusion, after q − k recursive calls, |W \ D| ≤ k if and only if D ⊆ W. ⊔ ⊓ Theorem 7 Computing a B-efficient committee is NP-hard, even for dichotomous preferences. Proof. We give a reduction from Hitting Set. Let N = {1, . . . , ℓ}, A = X and for each i ∈ N, i’s dichotomous preferences are i : Ci , (X \ Ci ). If there exists a polynomialtime algorithm to compute a B-efficient committee, it will return a committee in which each agent gets a most preferred alternative if such a committee exists. But such a committee corresponds to a hitting set of size k. ⊔ ⊓ 7 Downward Lexicographic Set Extension We point out that for dichotomous preferences, the responsive set extension coincides with the downward lexicographic set extension. Hence we get a corollary of our results for responsive preferences: Corollary 1 Checking whether a committee is DL-efficient is coNP-complete, even for dichotomous preferences and T opwidth(%) ≥ 3. Note that Algorithm 1 returns a DL-efficient committee. The reason is that each agent in her turn refines the set of possible outcomes to her most preferred subset of outcomes. Each committee is the refined set is at least as preferred with respect to RS (and hence with respect to DL) to all committees in the set of possible outcomes. Theorem 8 There exists a linear-time and strategyproof algorithm that returns a DLefficient committee. 8 ‘Worst’ Set Extension In contrast to all the other set extensions considered in the paper, Pareto optimality with respect to the ‘worst’ set extension can be checked in polynomial time. 14 Haris Aziz et al. Theorem 9 There exists a polynomial-time algorithm that checks whether a committee is W-efficient and computes a Pareto improvement over it if possible. Proof. Let W ∈ S k (A). For each i ∈ N, let Eiti be the least preferred equivalence class such that Eiti ∩ W , ∅. We want to check whether there is a k-set D of alternatives in which at least some agent i ∈ N gets a strictly better outcome and all the other agents get at least as preferred an outcome. We check this as follows. For i ∈ N, Si S Sk j let Bi = A \ (( kℓ=t Eiℓ ) ∪ j∈N\{i} ℓ=t E ℓj )). We check whether |Bi | ≥ k or not. i j +1 If |Bi| ≥ k, we know that there exists a subset of Bi , that is strictly more preferred by i ∈ N and at least as preferred by each agent. The reason is that Bi contains a more preferred worst alternative for agent i than D and contains at least as preferred worst alternative for other agents j than D. If |Bi| < k, then this means that a Pareto improvement with i strictly improving is only possible if the size of the winning set is less than k which is not feasible. ⊔ ⊓ We now consider strategyproofness together with W-efficiency. We first note that Algorithm 1 may not return a W-efficient outcome. However, we construct a suitable strategyproof and W-efficient by formalising an appropriate serial dictatorship algorithm for the worst set extension. Theorem 10 There exists a linear-time and strategyproof algorithm that returns a W-efficient committee. Proof. Consider the agents in a permutation π. The set of alternatives A′ is initialized to A. We reduce the set A′ while ensuring that it of size at least k. The next agent i in the permutation comes and deletes the maximum number of least preferred equivalence classes from his preferences and the corresponding alternatives in A′ while ensuring that |A′ | ≥ k. Each successive agent in the permutation gets a most preferred outcome while ensuring that agents before him in the permutation get at least as preferred an outcome as before. Thus the algorithm is strategyproof and Pareto optimal with respect to the ‘worst’ set extension. ⊔ ⊓ 9 Upward Lexicographic Set Extension We point out that for dichotomous preferences, the responsive set extension coincides with the upward lexicographic set extension. Hence we get a corollary of our results for responsive preferences: Corollary 2 Checking whether a committee is UL-efficient is coNP-complete, even for dichotomous preferences and T opwidth(%) ≥ 3. Note that Algorithm 1 returns a UL-efficient committee. The reason is that each agent in her turn refines the set of possible outcomes to her most preferred subset of outcomes. Each committee is the refined set is at least as preferred with respect to RS (and hence with respect to UL) to all committees in the set of possible outcomes. Theorem 11 There exists a linear-time and strategyproof algorithm that returns a UL-efficient committee. Computing and Testing Pareto Optimal Committees 15 10 Conclusions We considered Pareto optimality in multi-winner voting with respect to a number of prominent set extensions. We presented results on the relations between the notions as well as complexity of computing and verifying Pareto optimal outcomes. Further directions of future work include considering Pareto optimality with respect to other set extensions (Brandt and Brill, 2011). Another direction is consider the compatibility of Pareto optimality concepts with other axioms. Finally, we remark that our serial dictatorship algorithm can be used to define a multiwinner generalization of random serial dictatorship, which is worth investigating and raises interesting computational problems. Acknowledgments This is the extended version of the IJCAI conference paper (Aziz et al., 2016). The authors thank Felix Brandt for useful pointers and comments. They also thanks the reviewers and attendees of IJCAI 2016 and COMSOC 2016 for useful comments. Jérôme Lang and Jérôme Monnot thank the ANR project CoCoRICo-CoDec. References H. Aziz and R. Savani. Hedonic games. In F. Brandt, V. Conitzer, U. Endriss, J. Lang, and A. D. Procaccia, editors, Handbook of Computational Social Choice, chapter 15. Cambridge University Press, 2016. H. Aziz, F. Brandt, and M. Brill. The computational complexity of random serial dictatorship. Economics Letters, 121(3):341–345, 2013a. H. Aziz, F. Brandt, and M. Brill. On the tradeoff between economic efficiency and strategyproofness in randomized social choice. In Proceedings of the 12th International Conference on Autonomous Agents and Multi-Agent Systems (AAMAS), pages 455–462. IFAAMAS, 2013b. H. Aziz, J. Lang, and J. Monnot. Computing Pareto Optimal Committees. In Proceedings of the 25th International Joint Conference on Artificial Intelligence (IJCAI), pages 60–66, 2016. H. Aziz, F. Brandt, E. Elkind, and P. Skowron. Computational social choice: The first ten years and beyond. In B. Steffen and G. Woeginger, editors, Computer Science Today, volume 10000 of Lecture Notes in Computer Science (LNCS). SpringerVerlag, 2017. Forthcoming. S. Barberà, W. Bossert, and P. K. Pattanaik. Ranking sets of objects. In S. Barberà, P. J. Hammond, and C. Seidl, editors, Handbook of Utility Theory, volume II, chapter 17, pages 893–977. Kluwer Academic Publishers, 2004. J.-P. Benoı̂t and L. Kornhauser. Only a dictatorship is efficient. Games and Economic Behavior, 70(2):261–270, 2010. N. Betzler, A. Slinko, and J. Uhlmann. On the computation of fully proportional representation. JAIR, 47:475–519, 2013. 16 Haris Aziz et al. W. Bossert. Preference extension rules for ranking sets of alternatives with a fixed cardinality. Theory and Decision, 39:301—317, 1995. S. Brams, D. Kilgour, and R. Sanver. A minimax procedure for electing committees. Public Choice, 3-4(132):401–420, 2007. F. Brandl. Efficiency and incentives in randomized social choice. Master’s thesis, Technische Universität München, 2013. F. Brandt and M. Brill. Necessary and sufficient conditions for the strategyproofness of irresolute social choice functions. In Proceedings of the 13th Conference on Theoretical Aspects of Rationality and Knowledge (TARK), pages 136–142. ACM Press, 2011. I. Caragiannis, D. Kalaitzis, and E. Markakis. Approximation algorithms and mechanism design for minimax approval voting. In Proceedings of the 24th AAAI Conference on Artificial Intelligence (AAAI), pages 737–742, 2010. K. Cechlárová. Stable partition problem. In Encyclopedia of Algorithms, pages 885– 888. Springer, 2008. J. R. Chamberlin and P. N. Courant. Representative deliberations and representative decisions: proportional representation and the Borda rule. American Political Science Review, 77(3):718–733, 1983. W. J. Cho. Incentive properties for ordinal mechanisms. Games and Economic Behavior, 95:168–177, 2016. T. Cuhadaroǧlu and J. Lainé. Pareto efficiency in multiple referendum. Theory and Decision, 72(4):525–536, 2012. A. Darmann. How hard is it to tell which is a condorcet committee? Mathematical Social Sciences, 66(3):282–292, 2013. doi: 10.1016/j.mathsocsci.2013.06.004. URL http://dx.doi.org/10.1016/j.mathsocsci.2013.06.004. R. G. Downey and M. R. Fellows. Fundamentals of Parameterized Complexity. Texts in Computer Science. Springer, 2013. E. Elkind and A. Ismaili. OWA-Based Extensions of the Chamberlin-Courant Rule. In Proceedings of the 4th International Conference on Algorithmic Decision Theory (ADT), pages 486–502. Springer-Verlag, 2015. E. Elkind, P. Faliszewski, P. Skowron, and A. Slinko. Properties of multiwinner voting rules. In Proceedings of the 13th International Conference on Autonomous Agents and Multi-Agent Systems (AAMAS), pages 53–60, 2014. E. Elkind, J. Lang, and A. Saffidine. Condorcet winning sets. Social Choice and Welfare, 44(3):493–517, 2015. P. Faliszewski, P. Skowron, A. Slinko, and N. Talmon. Multiwinner analogues of the plurality rule: Axiomatic and algorithmic views. In Proceedings of the 28th AAAI Conference on Artificial Intelligence (AAAI), 2016. P. Faliszewski, P. Skowron, A. Slinko, and N. Talmon. Multiwinner voting: A new challenge for social choice theory. In U. Endriss, editor, Trends in Computational Social Choice, chapter 2. 2017. Forthcoming. M. R. Garey and D. S. Johnson. Computers and Intractability: A Guide to the Theory of NP-Completeness. W. H. Freeman, 1979. C. Klamler, U. Pferschy, and S. Ruzika. Committee selection under weight constraints. Mathematical Social Sciences, 64(1):48–56, 2012. Computing and Testing Pareto Optimal Committees 17 J. Lang, J. Mengin, and L. Xia. Aggregating conditionally lexicographic preferences on multi-issue domains. In Principles and Practice of Constraint Programming, pages 973–987, 2012. T. Lu and C. Boutilier. Budgeted social choice: From consensus to personalized decision making. In Proceedings of the 22nd International Joint Conference on Artificial Intelligence (IJCAI), pages 280–286. AAAI Press, 2011. B. L. Monroe. Fully proportional representation. The American Political Science Review, 89(4):925–940, 1995. H. Moulin. Fair Division and Collective Welfare. The MIT Press, 2003. İ. Özkal-Sanver and R. Sanver. Ensuring Pareto-optimality by referendum voting. Social Choice and Welfare, 27:211–219, 2006. A. D. Procaccia, J. S. Rosenschein, and A. Zohar. On the complexity of achieving proportional representation. Social Choice and Welfare, 30:353–362, 2008. A. E. Roth and M. A. O. Sotomayor. Two-Sided Matching: A Study in Game Theoretic Modelling and Analysis. Cambridge University Press, 1990. P. Skowron, P. Faliszewski, and A. Slinko. Achieving fully proportional representation: Approximability results. Artif. Intell., 222:67–103, 2015a. P. K. Skowron, P. Faliszewski, and J. Lang. Finding a collective set of items: From proportional multirepresentation to group recommendation. In Proceedings of the 23rd International Joint Conference on Artificial Intelligence (IJCAI), pages 2131– 2137. AAAI Press, 2015b.
8cs.DS
Evolutionary Design: Philosophy, Theory, and Application Tactics 1 V.V. Kryssanov1, H. Tamaki2, S. Kitamura2 College of Information Science and Engineering, Ritsumeikan University, Kusatsu, Japan 2 Faculty of Engineering, Kobe University, Kobe, Japan Abstract Although it has contributed to remarkable improvements in some specific areas, attempts to develop a universal design theory are generally characterized by failure. This paper sketches arguments for a new approach to engineering design based on Semiotics – the science about signs. The approach is to combine different design theories over all the product life cycle stages into one coherent and traceable framework. Besides, it is to bring together the designer’s and user’s understandings of the notion of ‘good product’. Building on the insight from natural sciences that complex systems always exhibit a self-organizing meaninginfluential hierarchical dynamics, objective laws controlling product development are found through an examination of design as a semiosis process. These laws are then applied to support evolutionary design of products. An experiment validating some of the theoretical findings is outlined, and concluding remarks are given. Keywords: Design, Lifecycle, Semiotics 1 INTRODUCTION Historically, design tasks have been verifying theories, challenging their value in a number of domains varied from quite ‘objectivistic’ but highly abstract, such as philosophy and mathematics, to rather situated but pragmatic, such as economics and management, and further to essentially subjective and loosely structured, such as art and sociology. It is then not surprising that in the present era of technocratic civilization, design receives significant research attention, having been studied first as a craft and later – as a field of engineering that promises to eventually grow into an ‘independent’ discipline developed in line with the traditions of classical science. In an effort to contribute to the development of this discipline, both academic researchers and practitioners, although seeing the problem from fairly different perspectives, have been trying to understand and justify if and how one or another theory can be useful for solving design tasks. Adherents of mathematical approaches habitually assess the usefulness of a theory from the standpoint of its logical consistency and tractability: only those theories are considered good, which allow for the generation of true theorems. When it comes to product design, such theorems can be reduced to statements of the following form: ‘a design is right if π,’ where π is a formally determinable quality or property (see, for example, reference [1] and, to some extent, reference [2]). The role of the theories is seen to build an apparatus (terminology, axiomatic basis, inference methods, etc.) for the design science, while their main target is to achieve better control over the design process. However, there are many obstacles preventing the broad introduction of these theories into practice. The most fundamental obstacle is the ontological contradiction between the notions of ‘objectively’ good (i.e. right) design and always subjectively good product. This contradiction makes the development of a ‘general’ design theory hardly feasible unless a universal notion of ‘good’ product is formally clarified. Proponents of a different viewpoint claim that theories are good if they allow for understanding design processes and products better. Having an obvious analytical flavor, these theories are expected to incorporate a large amount of domain-specific knowledge to assist the designer in his or her decision-making (e.g. [3, 4]). It is assumed that the quality of a product solely depends on knowledge possessed by the designer, and the problem of designing good products is, in the main, a problem of professional expertise. A weak point here is that possessing even ‘ideal’ knowledge is neither necessary nor sufficient condition for the creation of a commercially successful product, while the history witnesses that individuals with little qualification and experience but well developed creative abilities invented many great products. In the spirit of recent advances in psychology, ethnomethodology, anthropology, and cognitive sciences, some put forward suggestions, highlighting a need for observationally and analytically studying gifted people, who seem to be able to design, devise, and develop without any systematic guidance from the outside (see reference [5]). It is believed that research of this kind would ultimately lead one to discovering a set of thinking techniques and methodologies that can be taught to designers to make them designing better products (e.g. [6]). An obvious danger, however, is that apart from the usual difficulties with the application of any cognitive model, many factors affecting designing will necessarily be missed in the resultant techniques because of the complexity and instability of the ‘network’ topology of social and psychological relationships: the process of product concept creation is not limited by activities at the designer’s side, and it is generally not homogeneous in terms of space- as well as time-situated interactions [7]. The latter could question the applicability and usefulness of the obtained techniques at all. It is now well recognized that there are multiple perspectives on the building of the design discipline, each of which contains part of the truth, but none of which contains the entire solution [8]. Leaving alone marginal and unconstructive claims like ‘to design, we should only learn from nature’ or ‘design is art and never be science,’ which nonetheless reflect opinions of some professionals, a principal question then arises: whether it is possible to bridge all the different viewpoints and attitudes toward design within one scientific framework, and if so – what would be the basis for that? It is our strong belief that Semiotics – a science about signs, sign systems, and signification – is exceptionally well suited to link the mathematical, social, and cognitive theories together to provide insights about design as a single discipline and encourage the design community to develop new methods and tools to aid designers and lighten the routine burden but improve the quality and ‘goodness’ of products. To justify this supposition, we will discuss a semiotic approach to the design study and illustrate it with an example in the following sections. This paper continues the investigation, which the authors started with the Semiotic Theory of Creativity for engineering design [9] that later gave rise to the development of a more general Semiotic Theory of Evolutionary Design [10]. 2 SEMIOTICS AND THE 3-LEVEL PARADIGM Perhaps the most significant thing missing from the traditional design theories is the failure to appreciate how products are conceived by people as opposed to simply perceived by people. Indeed, a product, as we comprehend it in everyday life, is always more than just an artifact – a physical entity to which human must adapt, while all the product life-cycle processes have a complex, meaning-influential dynamics with regard to the product, its concept, and use-environments. People, through their activities and practice, originate an ‘objective’ need for the creation of the product by subjectively assigning its intended meaning and, at a later time but also subjectively, evaluate the product’s value in an environment, i.e. its actual or emergent meaning, yet having many different views and opinions while doing so. Semiotics studies this essentially meaning-making process, where the product among other phenomena of the environment is construed as a sign, which needs to be interpreted to allow for the use of the product throughout its life cycle. By Peirce, Semiotics deals with three subjects [11]: the representamen – the sign itself, the object – that which is signified, and the interpretant – the meaning that follows semantically from the process of interpretation of the representamen. The main postulate of Peircean Semiotics is that no representamen directly points us to an object, and a sign has a meaning only for a system of interpretance that is, by its very nature, a system of other signs – a sign system. Therefore, a representamen is a sign of an object only for some sign system and not necessarily for all sign systems: the same representamen may signify a different object, or the same object may be signified by a different representamen, etc. – the variety of possible combinations is not limited by one-to-one relations. Modern biology, sociology, and physics teach us that the richness of the complexity of many natural systems derives from a strategy to organize smaller units into larger ones, which are in turn to be arranged into still larger ones, and so on [12]. As we shall further see, all the meaning-making processes – the semiosis processes – reveal a similar hierarchical organization, and sing systems generally have a multi-level structure subject to these processes. Let us assume that in a multi-level sign system, signs on level N are dynamically composed of signs of level N-1 so that only those of all the possible combinations of that lower-level signs occur, which are allowed by boundary conditions set at level N+1; signs at level N-1 are then constitutive for level N signs, and signs at level N+1 are constraining for level N. The dynamics of semiosis can be described in terms of the interactions among the adjacent levels of such a sign system [13]. Most naturally for the designer, semiosis is a material process, which necessarily involves a translation or rerepresentation – re-interpretation – of information from one meaning-making level to another. Signs on level N can be representamina of the objects and phenomena at level N-1 for processes and structures at level N+1, which form a system of interpretance. The lowest-level signs (e.g. physical objects, phenomena, behavioral dispositions, emotions, and the like) are perceived or realized through their distinctions and get a representation at the ‘intermediary’ level of the designer’s cognition in respect to the interpretive laws of the highest, experiential and environmentally (culturally, socially, technically, economically, etc.) induced level, which accommodates interpretants and assigns a meaning to the representamina. The design process is the process of introducing a sign at level N with a meaning for both level N-1 (as an entity materially grounded there) and level N+1 (as an entity having a material relevance at this level). Generally, the sign is allowed to have many possible meanings, depending on contextual constraints from higher interpretive levels. People perceive a completed product through its distinctions that need to be interpreted and may acquire a meaning for a sign system. Although human perception is relatively uniform and consistent, it is natural that the meaning assigned to a representamen can vary significantly, depending on the subjective dynamics of perception (level N) and interpretation (level N+1) as well as on relations between the adjacent semiotic levels. With a potentially infinite hierarchy of interpretative levels, where signs on level N+1 can in their turn be constitutive, i.e. be objects for a higher level and so on, a product is perceived and conceived in the same (ensemble of) sign system(s) that makes up a language (here understood in a very general sense and not limited to handling verbal constructions). A product can be considered as a ‘text’ written in this language, which has a syntax constraining the product organization, semantics defining the meaning(s) of the product, and pragmatics reflecting various use-effects (e.g. physiological, psychological, or social) associated with the product. The design science may be seen as a science about the evolution of the language – a science that studies fundamental laws of the semiosis processes, which govern the product life cycle. 3 ELEMENTS OF THE THEORY 3.1 Industrial Semiosis The concept of Industrial Semiosis categorizes the product life-cycle processes along three semiotic levels of meaning emergence [14]: 1) the ontogenic level that deals with the life history data and future expectations about a single occurrence of a product; 2) the typogenic level that holds the processes related to a product type or generation; and 3) the phylogenic level that embraces the meaning-affecting processes common to all of the past and current types and occurrences of a product. The three levels naturally differ by the characteristic durational times of the grouped semiosis processes: as one moves from the lowest, ontogenic level to the higher levels, the objects become larger and more complicated and have slower dynamics in both original interpretation and meaning change. A product (as concept) starts its development with initially coinciding onto-, typo-, and phylogenesis processes but distinct and pre-existing semiotic levels of interpretation. The concept is evolved, and typogenesis works to reorganize the relationships between the onto- and phylogenesis processes, as the variety of objects involved in product development increases. Product types and their interactions mediate – filter and buffer – between the levels above and below: not all variety of distinctions remains available for re-organization as phylos, nor every lowest-level object have a material relevance there. The phylogenic level is buffered against variations at the ontogenic level by the stabilizing mediations at the typogenic level. (Note that all the three levels of product definition are to mediate between more global levels of product environments.) The dynamics of the interactions between the semiotic levels can well be described in terms of the basic processes of variation and selection [15]. In complex system evolution, variation stands for the generation of a variety of simultaneously present, distinct entities (synchronic variety), or of subsequent, distinct states of the same entity (diachronic variety). Variation makes variety increase and produces more distinctions. Selection means, in essence, the elimination of certain distinct entities and/or states, and it reduces the number of remaining entities and/or states. From a semiotic point of view, the variety of a product intended to operate in an environment is determined by the devised product structure (i.e. the relations established between product parts – its synchronic variety) and the possible relations between the product and the anticipated environment (i.e. the product feasible states – its potential diachronic variety), which together aggregate the product possible configurations. The variety is defined on the ontogenic level that includes elements for description of both the structure and environment. The ontogenesis is driven by variation that goes through different configurations of the product and eventually discovers (by distinction selection at every stage of the product life cycle) configurations, which are stable on one or another time-scale. A constraint on the configurations is then imposed, resulting in the selective retention – emergence of a new meaning for a (not necessarily new) sign – at the typogenic level. The latter decreases the variety but specializes the ontogenic level so that only those distinctions ultimately remain, which fit to the environment (i.e. only dynamically stable relation patterns are preserved). Analogously but at a slower timescale, the typogenesis results in the emergence of a new meaning on the phylogenic level that consecutively specializes the lower levels. Thus, the main semiotic principle of product development is such that the dynamics of the meaning-making processes always seeks to decrease the number of possible relations between the product and its environment and hence, the semiosis of product life cycle is naturally simplified. At the same time, however, the ‘natural’ dynamics is such that augments the evolutive potential of the product concept for increasing its organizational richness: the emergence of new signs (that may lead to the emergence of new levels of interpretation) requires a new kind of information and new descriptive categories must be given to deal with the still same product. 3.2 On Formalization Among many possible approaches to formalization of design semiosis, we have chosen Algebraic Semiotics (see reference [16]) for its expressiveness, clarity, and freshness. Algebraic Semiotics deals with signs as members of sign systems defined to be algebraic theories with extra structure, and semiosis processes are specified through semiotic morphisms to be a kind of mapping of algebraic theories. Instead of defining properties of a sign system by reference to its members, Algebraic Semiotics, unlike other approaches but Category Theory, does so by reference to its external relationships with other sign systems. A sign system is represented as a five-tuple Ξ = 〈S, V, C, R, A〉, where S is a sort-set for signs in the system, V is a sort-set for data, C is a set of operations called ‘constructors’ that are used to create signs from other signs, R is a set of relations defined on the system signs, and A is a set of axioms that constrain the possible signs. S and C are partially ordered: by subsort and by level, respectively; in turn, constructors are partially ordered by priority within each level. A semiotic morphism м: Ξ → Ξ′ is a translation that consists of partial functions, which map sorts, constructors, predicates and functions of a sign system Ξ to sorts, constructors, predicates and functions of a sign system Ξ′ and retain some of the structure of Ξ: the mapping of sorts to sorts preserves arguments and result sorts of constructors and predicates as well as the subsort ordering, and it does not change data sorts. 3.3 Semiosis Laws In this section, we will put forward a bold conjecture that (the dynamics of) all the life-cycle meaning-making processes can be described in terms of basic semiotic components – algebraic constructions of the following form: Pn(мn: fn [Ξn] → Ξn+1), (1) where Ξn is a sign system corresponding to a representation of a (design) problem at time t1, Ξn+1 is a sign system corresponding to a representation of the problem at time t2, t2 > t1, fn is a composition of semiotic morphisms that specifies the interaction of variation and selection under the condition of information closure, which requires no external elements be added to the current sign system; мn is a semiotic morphism, and Pn is the probability associated with мn, ΣPn = 1, n=1,…,M, where M is the number of the meaningful transformations of the resultant sign system after fn. There is a partial ranking – importance ordering – on the constraints of A in every Ξn, such that lower ranked constraints can be violated in order for higher ranked constraints to be satisfied. The morphisms of fn preserve the ranking. The Semiotic Theory of Self-Organizing Systems postulates that in the scale hierarchy of dynamical organization, a new level emerges if and only if a new level in the hierarchy of semiotic interpretance emerges [13]. As the development of a new product always and naturally causes the emergence of a new meaning, the above-cited Principle of Emergence directly leads us to the formulation of the first law of life-cycle semiosis as follows: I. The semiosis of a product life cycle is represented by a sequence of basic semiotic components, such that at least one of the components is well defined in the sense that not all of its morphisms of м and f are isomorphisms, and at least one м in the sequence is not level-preserving in the sense that it does not preserve the original partial ordering on levels. For the present (i.e. for an on-going process), there exists a probability distribution over the possible мn for every component in the sequence. For the past (i.e. retrospectively), each of the distributions collapses to a single mapping with Pn=1, while the sequence of basic semiotic components is degenerated to a sequence of functions. For the future, the life-cycle meaning-making process can be considered in a very general probabilistic sense only (e.g. in terms of probability distributions that are characteristic of a specific domain, social group, design approach, or the like). It seems logical to assume that the successful (perhaps, in any sense) introduction of a product to the market effects the introduction and settlement of the corresponding meanings at the onto-, typo-, and phylogenic semiotic levels. Let us denote the number of relations between the product and its environment as ε. We can now formulate the second law of life-cycle semiosis as follows: II. A component Pn(мn: fn [Ξn] → Ξn+1) represents a successful life-cycle semiosis process if the morphism мn is natural in the sense that εn > εn+1. Although the above laws have been formulated with sufficient precision, it is recommended to apply them (alike Algebraic Semiotics in general) in an informal way, calling for details only in boundary and difficult situations. The main purpose of these as well as other not-yetformulated laws of life-cycle semiosis is to guide the examination of the product development and usage processes, no matter which design theory or even paradigm is employed at the lower, applied level. 4 EVOLUTIONARY DESIGN Evolutionary Design is a relatively new paradigm that encompasses the recently popular design approaches, such as Sustainable Design, Design for X, Green Design, and the like, which explicitly recognize the social, evolutionary, and error-prone nature of product development and postulate the tentative character of design solutions, making them dependent on the dynamics of product use-environments. In the following paragraphs, we will give a semiotic interpretation for this paradigm and show how the laws of life-cycle semiosis could be applied to support evolutionary design. 4.1 Semiosis of Evolutionary Design Every design is based on some expectations, which explicitly or implicitly determine the product intended meaning and which are realized as design requirements – once conceived relation patterns. These expectations always fit particular environmental conditions, which often become obsolete before the product reaches into the market place. A universal and obvious solution to this problem is to increase as much as possible the synchronic variety of the product by contriving appropriate decisions in design (the notorious idea of re-configurable products). Indeed, the more elaborate the structure of the product (or its concept), the larger the number of environmental situations in which it can maintain. Different product configurations can fit (or be adapted to) different situations and, therefore, in the case of dynamic environments, design evolution should increase the synchronic variety, making the product more complex to adequately react to the environmental changes. Although the latter statement does not contradict the lifecycle semiosis laws and is, perhaps, true in general, this does not mean that the ‘best’ product must always be the most complex one, i.e. be the product with the maximal synchronic variety. Due to many reasons – economical (costs), technical (reliability), ecological (energy and material consumption, pollution), social and ergonomic (safety, convenience and easiness in production and operation), etc., the best is the product with the simplest possible structure for the given functionality, i.e. with the least possible (for the given environment) synchronic variety. In this sense, the ‘goodness’ or, better say, adequacy of the product depends on the characteristics of product environment in relation to the implemented design expectations, i.e. it depends on how well the intended meaning matches the meanings emerging through onto-, typo-, and phylogenesis (if any). Design expectations can roughly be classified into two categories [17]: a) functional – the expectations about operation of the product and its functional parameters, and b) environmental – the expectations about the product-environment interaction. In the product life cycle, the distinction dynamics is driven by violations of design expectations. The dynamics of ontogenesis processes, where relation patterns are originally detected to be further interpreted and accepted or rejected for an action, is subject to psychological and physiological laws, such as, for instance, the well-known law of Weber-Fechner. Having been differentiated by the time-scale of the corresponding meaning-making processes, violations of functional expectations control the product typogenesis, while violations of environmental expectations influence both the typo- and phylogenesis semiosis processes. Resolving the product intended meaning mismatch is a critical task in design and life cycle engineering that requires the development of the appropriate information technologies and tools. Below, we will outline an agentbased technology that was developed to detect violations of design expectations and support, in this way, evolutionary design of high-tech products, as well as to assess the successfulness of the life cycle of an individual product, product type, or product family on the whole (also see reference [18]). 4.2 Computer-aided Evolutionary Design The main idea of the developed technology of evolutionary design support is to allow for evaluation and change of the most important design expectations using programmable mobile agents, called expectation agents, which utilize design requirements represented explicitly to monitor product functionality, usage, and operational environment. An expectation agent typically consists of a static hardware unit (including transducers, processing and preprocessing blocks, etc.) integrated with the product and a mobile software part, which allows the agent to demonstrate a certain level of autonomy, intelligence, and proactivity in respect to the product and act on behalf of the designer or manufacturer. The agent can execute various control procedures, transfer the registered data via a communication line, assist the product user, collect feedback directly from the user, and update its own code. Data obtained with the agent can be analyzed and used to detect when the usage and environmental patterns shift thereby necessitating optimization of the synchronic variety of the product by adjusting its configuration. To provide for the evolutionary support of the life cycle semiosis processes, an effective information infrastructure connecting products supplied with agents, service centers, manufacturers, and designers is to be developed. Figure 1 gives an example of the agent networking that would be arranged using, for instance, the existing infrastructure of the World-Wide Web. There are three distinct but overlapping layers of networking driven by the onto-, typo-, and phylogenesis meaning-making processes. At the ontogenic layer, expectation agents monitor individual products and their actual environments. The agents communicate with each other as well as with the design, manufacturing, maintenance, and other involved parties. They create product life histories and try for optimization of technical, PHYLOGENESIS Designer’s cluster Environmental cluster Communication node Environmental cluster product product product product product product product product ONTOGENESIS Figure 1: Expectation agent networking. technologic, and usage processes associated with the products. Both the product operation and the expectation agent functionality can be changed by updating the agent’s program code. The ontogenic layer comprises single products installed in dynamic environments. An essential feature of the layer is that no order is imposed from the outside on the agents’ communication, but the agents are to be evolutionary grouped by the environmental characteristics into specific clusters. The emergence of a cluster at the typogenic layer implies the emergence of a new meaning – a product type – at the corresponding level of semiotic interpretance. In an ideal case, the number of active clusters indicates the number of product types requisite for the given environment covered by the agent network. The typogenic layer provides for systematization of the design information flows generated by the agents. Information and data are sorted and stored, depending on the product type (version or generation). A majority of actions and processes of this layer are defined on a population of products grouped into an environmental cluster. Of course, environmental clusters may naturally be grouped into still larger units of characteristic dynamics, e.g. by different manufacturers. Such upperscale grouping would initiate the emergence of a new meaning – product family – at the phylogenic level of interpretance. The phylogenic layer links all the design, production, maintenance, utilization, etc. processes required for or associated with the realization of a distinct product or technology concept. Information flows of this layer are relatively stable and depend on the global (e.g. cultural and ecological) rather than specific (e.g. technical and economic) factors. The first law of life-cycle semiosis regulates the main processes of phylogenesis and makes the agent networking really possible. Figure 2: Refrigerator with an installed expectation agent. N of interactions Service center Time-scale (from Fast to Slow) T Y Manufacturer’s P cluster O G E N E S I S Environmental cluster Adaptation Normal functioning Breakdown Time Figure 3: The dynamics of product-environment interaction. Figure 2 presents a product – refrigerator – with an embedded expectation agent that is part of the experimental setup built through our study. The setup is to compare the behavior of virtual products (i.e. product intended meanings reconstructed with virtual objects) and real products by means of multi-media, haptic devices, and remote sensors (see reference [10] that gives a detailed account of the experiment). An analysis of empirical data collected with the setup showed us that the dynamics of product-environment interactions could serve as an indicator of the ‘successful’ (for the given environment) operation of the product. Figure 3 depicts the characteristic change of the number of product-environment interactions, such as product part movements and working mode switchings, registered by the expectation agent (high-frequency fluctuations have been filtered out of the data set by a pre-processing block of the agent). Although it is admitted that a larger scale empirical study is required to prove the efficiency of the evolutionary design support based on the expectation agent networking, the obtained results principally confirmed our theoretical conjectures and demonstrated the technological feasibility of the approach (also, see reference [17] that discusses the case of violations of design expectations as well as possible strategies to react to detected violations in the light of the Evolutionary Design Theory). 5 CONCLUSIONS We would like to conclude this paper by the following remarks. First, the idea of semiotic interpretation of the design process is not new; moreover, it has become almost a ‘fashion’ for the design community in the last few years, and there are many publications on this subject. One principal difference of our work is that we have not limited the investigation by a semiotic analysis and classification of design objects and signs representing them but, instead, focused on the processes responsible for the development of these objects and their meanings. Second, we see the rôle of the semiotic approach to design as not to discriminate true from false, correct from incorrect, bad from good, etc., but to provide designers with a new perspective on design theories and techniques, to better understand how this or that process goes on, and what are the factors, subjective and objective, affecting it. Further elaboration of the semiotic approach will, we believe, shed light upon many nonobvious consequences and causes of the application of a particular design theory or technique. [8] Finally, we come clean that Semiotics alone cannot account for all the results and insights brought out by all the design and life cycle theories. Rather, Semiotics can help us merge all the stages of product development together within a uniform and universal scientific framework. The latter could be seen as the ultimate goal of our research. [13] 6 ACKNOWLEDGMENTS The authors would like to acknowledge the financial support of the Japan Society for the Promotion of Science (project No 96P00702) that made this research possible. We are greatly indebted to Dr. I. Goncharenko for his key contribution of the experimental part of the study. 7 REFERENCES [1] Suh, N.P., 1999, Applications of Axiomatic Design, In: H. Kals and F. van Houten (eds), Integration of Process Knowledge into Design Support Systems, pp.1-46, Kluwer Academic Publishers [2] Yoshikawa, H., 1981, General Design Theory and a CAD System, In: T. Sata and E.A. Warman (eds), Man-Machine Communication in CAD/CAM, pp. 3558, North-Holland [3] Klein, R., 1998, A Knowledge Level Theory of Design and Engineering, In: G. Jacucci, G.J. Olling, K. Preiss, M.J. Wozny (eds), Globalization of Manufacturing in the Digital Communication Era of the 21st Century: Innovation, Agility, and the Virtual Enterprise, pp. 271-286, Kluwer Academic Publishers [4] Hubka, V., Eder, W.E., 1996, Design Science: Introduction to the needs, scope and organization of Engineering Design knowledge, Springer-Verlag, London [5] Eder, W.E. (ed.), 1996, WDK 24. Engineering Design and Creativity, The proceedings of the Workshop EDC, 1995, Pilsen, Czech Republic, Heurista [6] Ullman, D.G., Herling, D., D’Ambrosio, B., 1997, What to do next: Using the problem status to determine the course of action, Research in Engineering Design, 9/4:214-227. [7] Latour, B., 1996, On interobjectivity, Mind, Culture, and Activity, 3/4:228-245. [9] [10] [11] [12] [14] [15] [16] [17] [18] Cavallucci, D., Lutz, P., 2000, Intuitive Design Method (IDM): A New Framework for Design Method Integration, In: M. Shpitalni (ed.), Proceedings of the 2000 International CIRP Design Seminar, pp. 447452, Haifa, Israel Kryssanov V.V., Tamaki, H., Kitamura, S., 2001, Understanding Design Fundamentals: How Synthesis and Analysis Drive Creativity, Resulting in Emergence, Artificial Intelligence in Engineering, 15/4:329-342. Kryssanov, V.V., Goossenaerts, J., Goncharenko, I., Tamaki, H., 2000, A Semiotic theory of evolutionary design: concepts and an illustration, In: F. Kimura (ed.), Proceedings of the 7th CIRP International Seminar on Life Cycle Engineering, pp. 68-75, Tokyo Hartshorne, C., Weiss, P. (eds), 1960, Collected papers of Charles Sanders Peirce, 6 volumes, The Belknap Press of Harvard University Press, Cambridge, MA Salthe, S., 1993, Development and Evolution, MIT Press, Cambridge, MA Lemke, J.L., 2000, Opening Up Closure: Semiotics Across Scales, In: J. Chandler and G. van de Vijver (eds), Closure: Emergent Organizations and their Dynamics, Annals of the New York Academy of Science, 901:100-111. Goossenaerts, J.B.M., 2000, Industrial Semiosis: Founding the deployment of the Ubiquitous Information Infrastructure, Computers in Industry, 43:189-201. Heylighen, F., 1995, (Meta)systems as Constraints on Variation: a classification and natural history of metasystem transitions, World Futures: the Journal of General Evolution, 45:59-85. Goguen, J.A., 1999, An introduction to algebraic semiotics, with applications to user interface design, In: C. Nehaniv (ed.), Computation for Metaphor, Analogy and Agents, Springer Lecture Notes in Artificial Intelligence, 1562:242-291. Goncharenko, I., Kryssanov, V.V., Tamaki, H., 1999, An Agent-based Approach for Collecting and Utilizing Design Information Throughout the Product Life Cycle, In: J.M. Fuertes (ed.), Proceedings of the 7th IEEE International Conference on Emerging Technologies and Factory Automation ETFA’99, pp. 175-182, UPC, Barcelona, Spain Kryssanov, V.V., Tamaki, H., Ueda, K., 2001, An internet-enabled technology to support evolutionary design, Journal of Engineering Manufacture, 215/B5:647-655.
5cs.CE
Igor O. Zavadskyi (Taras Shevchenko National University of Kyiv) [email protected] A family of fast exact pattern matching algorithms Abstract. A family of comparison-based exact pattern matching algorithms is described. They utilize multi-dimensional arrays in order to process more than one adjacent text window in each iteration of the search cycle. This approach leads to a lower average time complexity by the cost of space. The algorithms of this family perform well for short patterns and middle size alphabets. In such case the shift of the window by several pattern lengths at once is quite probable, which is the main factor of algorithm success. Our algorithms outperform the Boyer-Moore-Horspool algorithm, either in the original version or with Sunday’s “Quick search” modification, in a wide area of pattern length / alphabet size plane. In some subareas the proposed algorithms are the fastest among all known exact pattern matching algorithms. Namely, they perform best when alphabet size is about 30–40 and pattern length is about 4–10. Such parameters are typical for search in natural language text databases. Key words: pattern matching, Boyer-Moore, fast search, text search, multi-window. 1 Introduction Pattern matching is one of the most fundamental techniques used in computer science. The most common pattern matching problem is formulated as finding all the exact occurrences of a given substring in a larger body of text. Through the entire presentation we use the following notation: T – input text P – pattern to be searched n – length of the input text m – length of the pattern Σ – alphabet of input text and pattern |Σ| – size of alphabet Σ |ΣP| – number of different symbols in the pattern This problem has been systematically studied since the beginning of seventies. The number of algorithms more efficient than the simplest straight forward search (SF) has been discovered. The most famous of them are the Knuth-Morris-Pratt algorithm [1], which improves the worst-case time complexity of the SF from O(nm) to O(n+m) and Boyer-Moore algorithm [2], which significantly outperforms the SF in the average. Almost all known pattern matching algorithms include the preprocessing stage, when some preliminary values are obtained basing on the pattern, and the main search cycle, when the text body is scanned. In most cases the algorithm efficiency strongly depends not only on the pattern and text lengths, but also on the alphabet size. Since, as a rule, the dependence of the main search cycle on the text length is linear and time complexity of the preprocessing stage is negligibly small, it is worthwhile to compare the algorithm efficiency on the (|Σ|,m)-plane. Our research concerns the left up area, where m is small, |Σ| is large. In this area two modifications of BM algorithm, namely Boyer-Moore-Horspool algorithm (BMH) [3] and Sunday’s “Quick Search” (QS) [4] were considered the best for a decades. However, in 2000s a number of more efficient exact pattern matching algorithms were invented. According to [5] they are FJS for m<8 and |Σ|>32, TVSBS for m=2 and 8≤|Σ|≤32, EBOM for 4≤m≤16 and 8≤|Σ|≤32, SBNDM for 8≤m≤16 and |Σ|>32 and FSBNDM for m>16 and |Σ|>8. The algorithms mentioned cover all three known types of patternmatching algorithms: FJS and TVSBS are comparison-based; EBOM is automata based, while SBNDM and FSBNDM algorithms utilize the bit-parallel operations. We propose the new comparison-based algorithms. Almost all algorithms of this type, including FJS, TVSBS and our new algorithms, exploit the idea of badcharacter shift, which originates from BM search. It is to compare the last character of the search window and the last character of the pattern and, if they do not match, shift the window as long as possible. The BMH algorithm is based on this idea only. We develop a generalization of BMH algorithm, which allows performing several badcharacter shifts at each iteration. The search cycle of the BMH algorithm is shown in Fig. 1. Since we analyze the algorithms in operation level, we try to remove the unnecessary subtractions denoting n–m by nm and m–1 by m1; these values can be calculated in a preprocessing stage. The bad character shift is performed in the row 7 and its length is equal to D[T[pos+m–1]], where pos is the current position of the search window and D is the shift array calculated in a preprocessing stage. If the ratio |ΣP|/|Σ| is small enough, the symbol T[pos+m–1] most likely does not occur in the pattern and the length of this shift is maximum, i.e. it stands m. These maximum length shifts are the main factor responsible for the efficiency of BMH in the left up area of the (|Σ|,m)plane. And we are interested in the most left upper subarea, where the ratio |ΣP|/|Σ| is particularly small. In this case one can assume that probably not only character T[pos+m–1] does not belong to the pattern, but the characters T[pos+2m–1], T[pos+3m–1] etc. as well. This means that the search window can be shifted by several window lengths at once, or, in other words, several adjacent search windows can be processed at iteration of the search cycle. This is the main idea of the multiwindow search algorithms. 1. while pos<nm 2. j ← m1; 3. while j>0 AND T[pos+j]=P[j] 4. j ← j–1; 5. if j=0 6. output pos; 7. pos ← pos+D[T[pos+m1]]; Fig. 1. The main search cycle of the BoyerMoore-Horspool algorithm Of course, at least k symbols of input text must be read and processed in each substring of the length km in order not to miss the possible pattern occurrence. Thus, at least k readings of input text characters should be done for each window of the length km – just the same number as at k iterations of the single-window algorithm like BMH or QS. However, we can reduce the number of other operations using the k-dimensional arrays. Such arrays occupy rather more memory than the pattern shift arrays for single-window search algorithms and their filling takes more preprocessing time. Nevertheless, as will be shown below, these space overheads are not that big comparing to memory size of modern computers, while time overheads are more than covered in the main search cycle, resulting in a significant gain in the total for the wide range of alphabet size / pattern length combinations. The idea of using two text windows while searching all occurrences of the pattern is not new. It was utilized in Two-Sliding-Windows (TSW) algorithm [6]. However, these windows were supposed to be processed in parallel and thus TSW algorithm is suitable for parallel processor structures only. Also the idea of two-dimensional search array was already implemented in a number of algorithms, for instance, in Berry-Ravindran algorithm [7], TVSBS and EBOM. However, it was always proposed to use two adjacent characters of a text as indices. This significantly increases the probability of the maximum length shift if it is low for single-character check but otherwise leads to superfluous density of the checks. In other words, if even single-character check causes the maximum shift with high probability, there is no need to check two adjacent characters to shift the text window by m or m+1 positions. In this case it may be better to perform double-check of the characters T[pos] and T[pos+m–1], which could shift the text window by 2m positions at once. 2 Double window algorithm Let us discuss how to process two adjacent search windows of the length m, which could be considered as one window of the double length 2m. We try to reduce the total number of computing operations required to process the substring of the length 2m. Let us examine the main cycle of BMH algorithm shown in Fig. 1. Two reads from shift table D in row 7 in two iterations can be replaced by one if we use two-dimensional shift table D2|Σ|x|Σ| defined as follows. D2[i][j] is the leftmost possible position of the first character of the pattern under assumption that T[m–1]=i and T[2m–1]=j. All shifts defined by the table D2 can be divided in 4 types shown in Fig. 2. a) Neither i nor j belong to pattern P. Then P can be safely shifted by 2m positions forward. b) Character i doesn’t belong to pattern P but j belongs. In this case P can be safely shifted by more than m–1 symbols but less than 2m. Namely, the rightmost occurrence of j in P should be aligned with T[2m–1]. c) Character i belongs to P and P[m–1]≠i. Then P can be safely shifted forward by less than m symbols. Namely, the rightmost occurrence of i in P should be aligned with T[m–1]. d) P[m–1]=i. This is the case when the pattern can be matched in the current position. One should check if T[0]…T[m–1] coincides with the pattern before proceed forward. 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. Fig. 2. Pattern shifts in Double window algorithm while pos<nm r ← D2[T[pos]][T[pos+m]]; if r=0 j ← 0; while j<m AND T[pos-m1+j]=P[j] j ← j+1; if k=m output pos-m1; pos ← pos+D[T[pos]]; else pos ← pos+r; Fig. 3. The Double window algorithm main search cycle Let us calculate the number of operations in BMH and Double window (DW) algorithms required for the shift of the text window by 2m characters forward in the case of the maximum possible shift. This is the most probable case when pattern length is very small compared to alphabet size. In this case only rows 1, 2, 3 and 7 in two iterations of BMH algorithm and only rows 1, 2, 3 and 10 in one iteration of Double window algorithm are executed. Note that getting the element of one-dimensional array like D[x] is equivalent to *(D+x) in C notation, which requires one addition and two readings from memory, while getting the element of two-dimensional |Σ|x|Σ| array like D2[x][y] is equivalent to *(D2+|Σ|*x+y), which requires two additions, one multiplication and three readings from memory (|Σ| is a constant). The calculations are shown in Table 1. The number of operations in Double window algorithm is more than twice less compared to BMH. Also, it should be noted that memory reads generally take longer time than operations that could be performed using processor registers only, e.g. arithmetic operations. If someone implements the discussed algorithms in assembler language, the values of variables pos, m1, m, j etc. can be stored in processor registers, while the arrays T, D and D2 cannot. In such implementation 8 memory reads are performed in two iterations of BMH (2 in row 3 and 2 in row 7 in each iteration) and only 3 memory reads needed in one iteration of Double window algorithm, they are T[pos], T[pos+m] and D2[T[pos]][T[pos+m]] in row 3. Thus, in the case of efficient assembler implementation, the Double window algorithm main cycle outperforms the BMH main cycle even more than in the case of implementation in the high-level programming language, if the longest possible shifts are performed (Figure 2a). Table 1. The operational complexity of BoyerMoore-Horspool and Double window algorithms Operation Boyer-MooreDouble window Horspool compari- 4 – (rows 1 and 2 (rows 1 and 3) son 3)x2 assign4 – (rows 2 and 2 (rows 2 and 10) ment 7)x2 memory 28 – (2 in row 1; 10 (2 in row 1; 6 reads 1 in row 2; 6 in in row 2; 2 in row row 3; 5 in row 10) 7)x2 additions 14 – (3 in row 3; 6 (5 in row 2 and 4 in row 7)x2 1 in row 10) multipli– 1 (row 2) cation Total 50 21 One can observe that even one iteration of Double window algorithm main cycle requires fewer operations than one iteration of BMH main cycle in the case when the condition r=0 is not met. Therefore, in the cases shown in figures 2b and 2c the Double window algorithm main cycle still executes faster than BMH main cycle. Note that in the case (c) the equality D2[i][j]=D[i] holds, i.e. the shift length in Double window algorithm is just the same as in BMH. Of course, the advantage of DW main cycle over BMH main cycle in the case (b) is lower than in the case (a) and in the case (c) is lower than in the case (b). While the ratio |Σ|P/|Σ| increases, the balance between cases (a), (b) and (c) moves to (b) and (c) and then to (c) only. If |Σ|P/|Σ| is close to 1, the case (c) occurs almost always and outperformance of DW main cycle over BMH main cycle is small. The case shown in Figure 2d for random text and pattern occurs with the probability 1/|Σ| regardless of |ΣP| value. In this case the internal cycle of DW in rows 5 and 6 executes and the internal cycle of BMH in rows 3 and 4 has more than one iteration. Each iteration of DW internal cycle requires more time than that one of BMH, because the comparison T[pos–m1+j]=P[j] requires 4 additions/subtractions and 6 readings from memory, while the comparison T[pos+j]=P[j] consists of only 3 additions and 5 readings from memory. As a result, the main cycle of the DW algorithm is essentially faster than the main cycle of BMH algorithm when the following conditions are met: (1) the alphabet is large enough to make the case (d) not frequent; (2) the ratio |ΣP|/|Σ| is small enough to make the case (c) not frequent. The simulation shows that only when alphabet size is up to 4, the condition (1) violation forces the DW algorithm main cycle to run slower than BMH main cycle on random pattern and text. Any alphabet of size greater than 4 could be considered as “large enough”. The violation of condition (2) forces the DW algorithm main cycle to run approximately at the same speed as the BMH main cycle. However, for the wide range of pattern length / alphabet size combinations the DW is essentially faster than BMH. This range covers m in the range 20–30 and |Σ|>4. 3 Multi-window extension Let us consider the possibility of processing more than 2 adjacent text windows in one iteration. The modification of the DW algorithm is simple: the N-dimensional array DN should be used instead of D2. It is defined as follows. DN[i1]…[iN] is the leftmost possible position of the beginning of the pattern under assumption that T[km–1]=ik, k=1,..,N. In Figure 3 only row 2 should be changed in a following way: r ← DN[T[pos]][T[pos+2m]]…[T[pos+Nm]]; Thus we obtain the Triple Window (TW), Quadruple Window (QW) and other Multi-window algorithms. Using C notation this assignment can be rewritten as r=*(DN+bN–1pos+…+b1(pos+(N–1)m) +pos+Nm), where bk=|Σ|k. Of course, in order to reduce the number of multiplications, the values 2m,…,Nm can be calculated in the preprocessing stage, while the values bk could be considered as constants. However, every next dimension adds two additions, one multiplication and two memory reads to the calculation routine. This overhead is covered by longer shifts until the value of |ΣP|/|Σ| is small enough, but in the case N≥3 the preprocessing begins to play an important role, since its time and space complexity grows exponentially depending on N. The preprocessing stage is discussed in the next section. 4 Preprocessing On the preprocessing stage of the N-window algorithm the values km, k=1,…,N are calculated and arrays D containing |Σ| elements and DN with |Σ|n elements are filled with the values. Filling the array D is just the same as in the BMH algorithm and runs in O(|Σ|). Obtaining values km is O(N) time, which is ignorable small for realistic values of N. Filling the array DN takes up almost all the time. The following procedure completes this task. 1. Assign the value Nm to all elements. 2. Replace the values D[i1]…[iN], where iN∈P, with Nm–qN–1, where qN is the rightmost position of the character iN in the pattern P. … N+1. Replace the values D[i1]…[iN], where i1∈P, with m–q1–1, where q1 is the rightmost position of the character i1 in the pattern P. The first step takes O(|Σ|N) time, while each other step – O(m|Σ|N–1) time. The overall time complexity of preprocessing stage is O(|Σ|N+Nm|Σ|N–1). Using the special functions that copy memory blocks, like memcpy from memory.h C library, one can build the implementation that is faster in times than the conventional method given above. The space complexity of Multi-window algorithms is, of course, strongly greater than that one for BMH/QS. However, memory requirements of D2 array even for relatively large alphabet containing 256 symbols are only 64 Kb, which is absolutely admissible for present-day computers and programs. The TW algorithm, as computational experiment shows, is efficient only for b values around 32. Then the size of D3 (32x32x32) array is only 32 Kb. The QW algorithm could be efficient for b=16 at maximum and the size of the respective D4 array is 64 Kb. 5 Unrolling cycle The algorithms based on bad character rule, such as BMH or Multi-window, could be accelerated using the unrolling cycle technique. It consist of applying “blind” shifts, without checking the end of file, until shift value is not positive. In order not to miss the end of the file, the text is appended by the fictitious pattern. This technique could be applied to Multiwindow algorithms in a following way: - Row 1 should be replaced with the endless cycle “while 1”. After row 3 we should check the condition pos≥nm and break the cycle if it is met. This allows us to check the end of the file only when the shift array element is equal to zero and speed up the multi-window algorithms by 2–4%. 6 Computational experiment We implement the unrolled versions of Double window, Triple-window (TW), Quadruple-window (QW) and a number of other known algorithms in C language, use the Microsoft Visual studio compiler to build the executables and run them on the Athlon II X2 245 processor, 2.9 GHz, Windows 7 platform. Preprocessing stage of the TW and QW algorithms is implemented using the fast memory fill functions. The text containing 10 MB characters is randomly built and the patterns as well. The distribution of characters is uniform. The results for alphabet of size 32 and different pattern lengths are presented in Table 2. The total running time of 1000 runs is shown. The QW results are not shown, since they are significantly worse than DW and TW results for alphabet size 32. The QW algorithm could be efficient for smaller alphabets and very short patterns. Table 2. The total running time of pattern matching algorithms, 10 MB of text × 1000, in seconds BMH m=2 m=3 m=4 m=5 m=6 m=7 m=8 m=9 m=10 m=11 m=12 45,326 33,320 24,552 19,919 16,458 15,049 14,279 12,170 11,097 10,541 9,874 QS 31,678 25,596 20,366 17,358 14,583 13,724 13,213 11,327 10,411 9,788 9,432 DW 34,030 24,429 18,836 15,558 13,313 11,957 11,704 10,181 9,363 9,088 8,522 TW 27,229 21,396 15,812 13,630 11,623 10,706 10,913 9,316 8,990 8,547 8,198 7 Conclusions As is seen, the Triple Window algorithm is superior over all known algorithms for pattern lengths from 4 to 9 and alphabet size 32. Both DW and TW algorithms outperform classical comparison-based algorithms, such as BMH and QS for all considered values of m. The TVSBS, FJS and SBNDM are better for very short patterns, EBOM 90,742 52,538 33,695 25,020 19,524 17,003 15,945 13,299 11,667 10,673 9,949 FJS 26,169 22,890 19,420 16,397 13,926 12,880 12,550 10,846 9,826 9,175 8,859 TVSBS 24,186 21,109 18,182 16,025 13,824 13,002 12,680 11,212 10,218 9,454 9,071 SBNDM FSBNDM 25,689 20,034 16,071 14,127 12,328 11,855 11,725 10,391 10,076 9,401 9,271 36,091 26,177 19,477 16,273 13,250 11,930 11,451 9,624 8,963 8,103 7,726 while for pattern length 10 and more the FSBNDM algorithm becomes superior. The technique used in Multi-window algorithm family could be applied in order to accelerate the algorithms based on comparisons of adjacent characters, which is a future research direction. References 1. KNUTH D. E., MORRIS J. H., and PRATT V. R. (1977) Fast pattern matching in strings, SIAM J. Comput. 6 (1), pp. 323–350. 2. BOYER R. S. and MOORE J. S. (1977) A fast string searching algorithm, Commun. ACM 20, 10, pp. 762–772. 3. HORSPOOL R. N. (1980) Practical fast search in strings, Softw.Pract. Exp. 10, 6, 501–506. 4. SUNDAY D. M. (1990) A very fast substring search algorithm, Commun. ACM 33, 8, pp. 132–142. 5. FARO S., LECROQ T. The Exact Online String Matching Problem: a Review of the Most Recent Results (2013), ACM Computing Surveys (CSUR) Surveys Homepage archive. Volume 45 Issue 2, Article No. 13. 6. HUDAIB A., AL-KHALID R., SULEIMAN D., ITRIQ M., AL-ANANI A. (2008), A fast pattern matching algorithm with two sliding windows (TSW), J. Comput. Sci. 4, 5, pp. 393-401. 7. BERRY T., RAVINDRAN S. (1999) A fast string matching algorithm and experimental results, In Proceedings of the Prague Stringology Club Workshop ’99, pp. 16–28.
8cs.DS
SECOND-ORDER MATRIX CONCENTRATION INEQUALITIES arXiv:1504.05919v2 [math.PR] 3 Aug 2016 JOEL A. TROPP A BSTRACT. Matrix concentration inequalities give bounds for the spectral-norm deviation of a random matrix from its expected value. These results have a weak dimensional dependence that is sometimes, but not always, necessary. This paper identifies one of the sources of the dimensional term and exploits this insight to develop sharper matrix concentration inequalities. In particular, this analysis delivers two refinements of the matrix Khintchine inequality that use information beyond the matrix variance to reduce or eliminate the dimensional dependence. 1. M OTIVATION Matrix concentration inequalities provide spectral information about a random matrix that depends smoothly on many independent random variables. In recent years, these results have become a dominant tool in applied random matrix theory. There are several reasons for the success of this approach. • Flexibility. Matrix concentration applies to a wide range of random matrix models. In particular, we can obtain bounds for the spectral norm of a sum of independent random matrices in terms of the properties of the summands. • Ease of Use. For many applications, matrix concentration tools require only a small amount of matrix analysis. No expertise in random matrix theory is required to invoke the results. • Power. For a large class of examples, including independent sums, matrix concentration bounds are provably close to optimal. See the monograph [Tro15] for an overview of this theory and a comprehensive bibliography. The matrix concentration inequalities in the literature are suboptimal for certain examples because of a weak dependence on the dimension of the random matrix. Removing this dimensional term is difficult because there are many situations where it is necessary. The purpose of this paper is to identify one of the sources of the dimensional factor. Using this insight, we will develop some new matrix concentration inequalities that are qualitatively better than the current generation of results, although they sacrifice some of our desiderata. Ultimately, we hope that this line of research will lead to general tools for applied random matrix theory that are flexible, easy to use, and that give sharp results in most cases. 2. T HE M ATRIX K HINTCHINE I NEQUALITY To set the stage, we present and discuss the primordial matrix concentration result, the matrix Khintchine inequality, which describes the behavior of a special random matrix model, called a matrix Gaussian series. This result already exhibits the key features of more sophisticated matrix concentration inequalities, and it can be used to derive concentration bounds for more general models. As such, the matrix Khintchine inequality serves as a natural starting point for deeper investigations. 2.1. Matrix Gaussian Series. In this work, we focus on an important class of random matrices that has a lot of modeling power but still supports an interesting theory. Definition 2.1 (Matrix Gaussian Series). Consider fixed Hermitian matrices H1 , . . . , Hn with common dimension d, and let {γ1 , . . . , γn } be an independent family of standard normal random variables. Construct the random matrix Xn X := i=1 γi Hi . (2.1) Date: 13 March 2015. Revised 21 April 2015 and 3 August 2016. 2010 Mathematics Subject Classification. Primary: 60B20. Secondary: 60F10, 60G50, 60G42. Key words and phrases. Concentration inequality, moment inequality, random matrix. Email: [email protected] . Tel: 626.395.5957. 1 2 J. A. TROPP We refer to a random matrix with this form as a matrix Gaussian series with Hermitian coefficients or, for brevity, an Hermitian matrix Gaussian series. Matrix Gaussian series enjoy a surprising amount of modeling power. It is easy to see that we can express any random Hermitian matrix with jointly Gaussian entries in the form (2.1). More generally, we can use matrix Gaussian series to analyze a sum of independent, zero-mean, random, Hermitian matrices Y 1 , . . . , Y n . Indeed, for any norm |||·||| on matrices, ii h h ¯¯¯X ¯¯¯Xn ¯¯¯ p ¯¯¯ ¯ n (2.2) E ¯¯¯ i=1 Y i ¯¯¯ ≤ 2π · E E ¯¯¯ i=1 γi Y i ¯¯¯ ¯ Y 1 , . . . , Y n . The process of passing from an independent sum to a conditional Gaussian series is called symmetrization. See [LT91, Lem. 6.3 and Eqn. (4.8)] for details about this calculation. Furthermore, some techniques for Gaussian series can be adapted to study independent sums directly without the artifice of symmetrization. Note that our restriction to Hermitian matrices is not really a limitation. We can also analyze a rectangular matrix Z with jointly Gaussian entries by working with the Hermitian dilation of Z , sometimes known as the Jordan– Wielandt matrix. See [Tro15, Sec. 2.1.16] for more information on this approach. 2.2. The Matrix Variance. Many matrix concentration inequalities are expressed most naturally in terms of a matrix extension of the variance. Definition 2.2 (Matrix Variance). Let X be a random Hermitian matrix. The matrix variance is the deterministic matrix Var(X ) := E X 2 − (E X )2 . We use the convention that the power binds before the expectation. P In particular, consider a matrix Gaussian series X := ni=1 γi Hi . It is easy to verify that Xn Xn Var(X ) = E X 2 = i,j =1 E[γi γ j ] · Hi H j = i=1 Hi2 . We see that the matrix variance has a clean expression in terms of the coefficients of the Gaussian series, so it is easy to compute in practice. 2.3. The Matrix Khintchine Inequality. The matrix Khintchine inequality is a fundamental fact about the behavior of matrix Gaussian series. The first version of this result was established by Lust-Piquard [LP86], and the constants were refined in the papers [Pis98, Buc01]. The version here is adapted from [MJC+ 14, Sec. 7.1]. P Proposition 2.3 (Matrix Khintchine). Consider an Hermitian matrix Gaussian series X := ni=1 γi Hi , as in (2.1). Introduce the matrix standard deviation parameter °¡X ° ° ¢1/2 ° ° ° n for q ≥ 1. (2.3) σq (X ) := °Var(X )1/2 °q = ° i=1 Hi2 ° q Then, for each integer p ≥ 1, σ2p (X ) ≤ ¡ 2p ¢1/(2p) E kX k2p The symbol k·kq denotes the Schatten q-norm. ≤ p 2p − 1 · σ2p (X ). (2.4) The lower bound in (2.4) is simply Jensen’s inequality. Section 7 contains a short proof of the upper bound. The matrix Khintchine inequality also yields an estimate for the spectral norm of a matrix Gaussian series. This type of result is often more useful in practice. P Corollary 2.4 (Matrix Khintchine: Spectral Norm). Consider an Hermitian matrix Gaussian series X := ni=1 γi Hi with dimension d, as in (2.1). Introduce the matrix standard deviation parameter °1/2 °Xn σ(X ) := kVar(X )k1/2 = ° i=1 Hi2 ° . Then q 1 e (1 + 2log d) · σ(X ). p · σ(X ) ≤ E kX k ≤ 2 The symbol k·k denotes the spectral norm, also known as the ℓ2 operator norm. (2.5) SECOND-ORDER MATRIX CONCENTRATION INEQUALITIES 3 Proof Sketch. For the upper bound, observe that ´ ³ p p ° ° 2p 1/(2p) ≤ 2p − 1 · °Var(X )1/2 °2p ≤ d 1/(2p) 2p − 1 · kVar(X )k1/2 . E kX k ≤ E kX k2p Indeed, the spectral norm is bounded above by the Schatten 2p-norm, and we can apply Lyapunov’s inequality to increase the order of the moment from one to 2p. Invoke Proposition 2.3, and bound the trace in terms of the spectral norm again. Finally, set p = ⌈log d⌉, and simplify the constants. For the lower bound, note that °2 ´1/2 ¢1/2 1 ³ °Xn 1 ¡ 1 E kX k ≥ p E ° i=1 γi Hi ° = p E kX 2 k ≥ p kVar(X )k1/2 . 2 2 2 The first relation follows from the optimal Khintchine–Kahane inequality [LO94]; the last is Jensen’s.  2.4. Two Examples. The bound (2.5) shows that the matrix standard deviation controls the expected norm of a matrix Gaussian series up to a factor that is logarithmic in the dimension of the random matrix. One may wonder whether the lower branch or the upper branch of (2.5) gives the more accurate result. In fact, natural examples demonstrate that both extremes of behavior occur. For an integer d ≥ 1, define   γ1   γ2     γ3 . (2.6) X diag := X diag (d) :=    ..   .   γd That is, X diag is a d × d diagonal matrix whose entries {γi : 1 ≤ i ≤ d} are independent standard normal variables. Second, define   γ11 γ12 . . . γ1d  γ  21 γ22 . . . γ2d  1 ∗  (2.7) X goe := X goe (d) := p (G + G ) where G := G(d) :=  . ..  .. ..  . 2d  .. .  . γd 1 γd 2 . . . γd d The symbol ∗ denotes conjugate transposition. Up to scaling, the d × d random matrix X goe is the Hermitian part of a matrix G whose entries {γi j : 1 ≤ i , j ≤ d} are independent standard normal variables. The sequence {X goe (d) : d = 1, 2, 3, . . . } is called the Gaussian orthogonal ensemble (GOE). To apply the matrix Khintchine inequality, we represent each matrix as an Hermitian Gaussian series: X diag = Xd i=1 γi 1 X and X goe = p 1≤i,j ≤d γi j (Ei j + E j i ). 2d Eii We have written Ei j for the d × d matrix with a one in the (i , j ) position and zeros elsewhere. Respectively, the matrix variances satisfy ¡ ¢ Var(X diag ) = I and Var(X goe ) = 1 + d −1 · I. The bound (2.5) delivers 1 p 2 ≤ E kX k / q 2e log d for X = X diag or X = X goe . (2.8) The relations / and ≈ suppress lower-order terms. In each case, the ratio between the lower and upper bound has p order log d. The matrix Khintchine inequality does not provide more precise information. On the other hand, for these examples, detailed spectral information is available: q (2.9) E kX goe k ≈ 2 and E kX diag k ≈ 2log d. See [Tao12, Sec. 2.3] for a proof of the result on the GOE matrix; the bound for the diagonal matrix depends on the familiar calculation of the expected maximum of d independent standard normal random variables. We see that the norm of the GOE matrix is close to the lower bound provided by (2.5), while the norm of the diagonal matrix is close to the upper bound. 4 J. A. TROPP 2.5. A Question. Corollary 2.4 shows that the matrix variance controls the expected norm of a matrix Gaussian series. On the other hand, the two examples in the previous section demonstrate that we need more information than the variance to determine the norm up to a constant factor. Therefore, we must ask... Are there parameters that allow us to calculate the norm of a matrix Gaussian series more precisely than the matrix variance? This paper provides the first affirmative answer to this question. 3. B EYOND THE M ATRIX K HINTCHINE I NEQUALITY This section presents new results that improve on the matrix Khintchine inequality, Proposition 2.3. First, we motivate the type of parameters that arise when we try to refine this result. Then we define a quantity, called the matrix alignment parameter, that describes how the coefficients in the matrix Gaussian series interact with each other. In Section 3.3, we use the alignment parameter to state a new bound that provides a uniform improvement over the matrix Khintchine inequality. Further refinements are possible if we consider random matrices with highly symmetric distributions, so we introduce the class of strongly isotropic random matrices in Section 3.5. Section 3.6 contains a matrix Khintchine inequality for matrix Gaussian series that are strongly isotropic. This bound is good enough to compute the norm of a large GOE matrix exactly. Finally, in Sections 3.7 and 3.8, we discuss extensions and related work. 3.1. Prospects. What kind of parameters might allow us to refine Proposition 2.3? The result is already an identity for p = 1. For inspiration, let us work out what happens when p = 2: ¡Xn ¢4 Xn £ ¤ E kX k44 = E tr = i,j ,k,ℓ=1 E[γi γ j γk γℓ ] · tr Hi H j Hk Hℓ i=1 γi H i ´2 ³X ³X ´ n n 2 + tr = 2tr =: 2tr Var(X )2 + tr ∆. H H H H H i j i j i,j =1 i,j =1 i We use the convention that powers bind before the trace. The product of Gaussian variables has expectation zero unless the indices are paired. In the last expression, the first term comes from the cases where i = j and k = ℓ or where i = ℓ and j = k; the second term comes from the case where i = k and j = ℓ. Once again, the matrix variance Var(X ) emerges, but we have a new second-order term ∆ that arises from the summands where the indices alternate: (i , j , i , j ).1 In a sense, the matrix ∆ reflects the extent to which the coefficient matrices are aligned. When the family {Hi } commutes, the matrix ∆ = Var(X )2 , so the second-order term provides no new information. More generally, when2p ever the coefficients commute, the quantity (E kX k2p )1/(2p) can be expressed in terms of the matrix variance and the number p, and the matrix Khintchine inequality, Proposition 2.3, gives an estimate of the correct order. In other words, commuting coefficients are the worst possible circumstance. Most previous work on matrix concentration implicitly uses this worst-case model in the analysis. To achieve better results, we need to account for how the coefficient matrices Hi interact with each other. The calculation above suggests that the matrix ∆ might contain the information we need. Heuristically, when the coefficients fail to commute, the matrix ∆ should be small. As we will see, this idea is fruitful, but we need a parameter more discerning than ∆. Let us summarize this discussion in the following observation: To improve on the matrix Khintchine inequality, we must quantify the extent to which the coefficient matrices commute. Our work builds on this intuition to establish new matrix concentration inequalities. 3.2. The Matrix Alignment Parameter. In this section, we introduce a new parameter for a matrix Gaussian series that describes how much the coefficients commute with each other. In later sections, we will present extensions of the matrix Khintchine inequality that rely on this parameter. Definition 3.1 (Matrix Alignment Parameter). Let H1 , . . . , Hn be Hermitian matrices with dimension d. For each p ≥ 1, the matrix alignment parameter of this sequence is the quantity °¯ ¯1/4 ° °¯Xn ¯ ° ° and w := w ∞ . (3.1) w p := max °¯ i,j =1 Hi Q 1 H j Q 2 Hi Q 3 H j ¯ ° ° Qℓ p 1A related observation animates the theory of free probability, which gives a fine description of certain large random matrices. The key fact about centered, free random variables Y and Z is that crossing moments, such as ϕ(Y Z Y Z ), must vanish [NS06]. SECOND-ORDER MATRIX CONCENTRATION INEQUALITIES 5 The maximum takes place over a triple (Q 1 ,Q 2 ,Q 3 ) of unitary matrices with dimension d. The matrix absolute value is defined as |B | := (B ∗ B )1/2 . Roughly, the matrix alignment parameter (3.1) describes how well the matrices H1 , . . . , Hn can be aligned with each other under the worst choices of coordinates. The quantity (3.1) appears mysterious, so it is worth a few paragraphs to clarify its meaning. First, let us compare the alignment parameter with the matrix standard deviation parameter (2.3) that appears in the matrix Khintchine inequality. Proposition 3.2 (Standard Deviation versus Alignment). Let H1 , . . . , Hn be Hermitian matrices. Define the standard deviation and alignment parameters °¯ °¡X ¯1/4 ° °¯Xn ¢1/2 ° ° n ° ¯ ° ° σp := ° i=1 Hi and w p := max °¯ i,j =1 Hi Q 1 H j Q 2 Hi Q 3 H j ¯ ° for p ≥ 1. ° ° p Q p ℓ Then w p ≤ σp for all p ≥ 4. The proof of Proposition 3.2 appears in Section 8.9. Next, let us return to the examples in the introduction. In Section 4, we provide detailed calculations of the standard deviation and alignment parameters. For the diagonal Gaussian series X diag defined in (2.6), we have σ(X diag ) = 1 and w(X diag ) = 1. For the GOE matrix X goe defined in (2.7), σ(X goe ) = 1 + d −1 and w(X goe ) ≤ (4d)−1/4 . (3.2) The matrix alignment parameter can tell the two examples apart, while the matrix standard deviation cannot! Remark 3.3 (Notation for Alignment). Here and elsewhere, we abuse notation by writing w p (X ) and w(X ) for the P alignment parameter of a matrix Gaussian series X := ni=1 γi Hi , even though w is a function of the coefficient matrices Hi in the representation of the series. Remark 3.4 (Are the Unitaries Necessary?). At this stage, it may seem capricious to include the unitary matrices in the definition (3.1). In fact, the example in Section 4.3 demonstrates that the alignment parameter would lose its value if we were to remove the unitary matrices. On the other hand, there are situations where the unitary matrices are not completely arbitrary, as discussed in Section 8.1. 3.3. A Second-Order Matrix Khintchine Inequality. The first major result of this paper is an improvement on the matrix Khintchine inequality. This theorem uses the second-order information in the alignment parameter to obtain better bounds. P Theorem 3.5 (Second-Order Matrix Khintchine). Consider an Hermitian matrix Gaussian series X := ni=1 γi Hi , as in (2.1). Define the matrix standard deviation and matrix alignment parameters °¯ ¯1/4 ° °¡X °¯Xn ¢ ° ¯ ° ° n 2 1/2 ° ° for q ≥ 1. and w q (X ) := max °¯ i,j =1 Hi Q 1 H j Q 2 Hi Q 3 H j ¯ ° σq (X ) := ° i=1 Hi ° ° q Q q ℓ The maximum takes place over a triple (Q 1 ,Q 2 ,Q 3 ) of unitary matrices. Then, for each integer p ≥ 3, p p ¡ 2p ¢1/(2p) E kX k2p ≤ 3 4 2p − 5 · σ2p (X ) + 2p − 4 · w 2p (X ). (3.3) The symbol k·kq denotes the Schatten q-norm. The proof of Theorem 3.5 appears in Section 8. We can also derive bounds for the spectral norm of a matrix Gaussian series. Corollary 3.6 (Second-Order Matrix Khintchine: Spectral Norm). Consider an Hermitian matrix Gaussian series P X := ni=1 γi Hi with dimension d ≥ 8, as in (2.1). Define the matrix standard deviation and matrix alignment parameters °1/4 °X °1/2 °Xn ° ° n and w(X ) := max ° σ(X ) := ° H 2° Hi Q 1 H j Q 2 Hi Q 3 H j ° . i=1 i Qℓ i,j =1 The maximum ranges over a triple (Q 1 ,Q 2 ,Q 3 ) of unitary matrices. Then q q E kX k ≤ 3σ(X ) 4 2e log d + w(X ) 2e log d. (3.4) 6 J. A. TROPP The symbol k·k denotes the spectral norm. The result follows from Theorem 3.5 by setting p = ⌈log d⌉. The potential gain in (3.4) over (2.5) comes from the reduction of the power on the first logarithm from one-half to one-quarter. 3.4. Matrix Khintchine versus Second-Order Matrix Khintchine. Let us make some comparisons between Proposition 2.3 and Theorem 3.5. First, recall that the alignment parameter is dominated by the standard deviation parameter: w q (X ) ≤ σq (X ) for q ≥ 4 because of Proposition 3.2. Therefore, the bound (3.3) implies that p ¡ ¡ p ¢ 2p ¢1/(2p) E kX k2p ≤ 3 4 2p − 1 + 2p − 1 · σ2p (X ) for p = 3, 4, 5, . . . . This is very close to the prediction from Proposition 2.3, so Theorem 3.5 is never significantly worse. On the other hand, there are situations where Theorem 3.5 gives qualitatively better results. In particular, for the GOE matrix X goe (d), the bound (3.3) and the calculation (3.2) yield p q 2e log d for d ≥ 8. E kX goe (d)k ≤ 3 4 2e log d + p 4 4d This estimate beats our first attempt in (2.8), but it still falls short of the correct estimate E kX goe k ≈ 2. 3.5. Strongly Isotropic Random Matrices. As we have seen, Theorem 3.5 offers a qualitative improvement over the matrix Khintchine inequality, Proposition 2.3. Nevertheless, the new result still lacks the power to determine the norm of the GOE matrix correctly. We can obtain more satisfactory results by specializing our attention to a class of random matrices with highly symmetric distributions. Definition 3.7 (Strong Isotropy). Let X be a random Hermitian matrix. We say that X is strongly isotropic when ¡ ¢ ¯ X p · I for p = 0, 1, 2, . . . . E X p = E tr ¯ denotes the normalized trace: tr ¯ A := d −1 tr A when A has dimension d. The symbol tr The easiest way to check that a random matrix is strongly isotropic is to exploit symmetry properties of the distribution. We offer one of many possible results in this direction [CT14, Lem. 7.1]. Proposition 3.8 (Strong Isotropy: Sufficient Condition). Let X be a random Hermitian matrix. Suppose that the distribution of X is invariant under signed permutation: X ∼ Π∗ X Π for every signed permutation Π. Then X is strongly isotropic. The symbol ∼ refers to equality of distribution. A signed permutation is a square matrix that has precisely one nonzero entry in each row or column, this entry taking the values ±1. Proof. Suppose that Π is a signed permutation, drawn uniformly at random. For p = 0, 1, 2, 3, . . . , ¯ ¤¤ £ ¤ £ £ £¡ ¢ ¤ ¡ ¢ ¯ X p · I = E tr ¯ X p ·I E X p = E (Π∗ X Π)p = E E Π∗ X p Π ¯ X = E tr The first relation uses invariance under signed permutation, and the second relies on the fact that signed permutations are unitary. Averaging a fixed matrix over signed permutations yields the identity times the normalized trace of the matrix.  Proposition 3.8 applies to many types of random matrices. In particular, the diagonal Gaussian matrix X diag and the GOE matrix X goe are both strongly isotropic because of this result. Other types of distributional symmetry can also lead to strong isotropy. Remark 3.9 (Group Orbits). Here is a more general class of matrix Gaussian series where we can verify strong isotropy using abstract arguments. Let G be a unitary representation of a finite group, and let A be a fixed Hermitian matrix with the same dimension. Consider the random Hermitian matrix X X := γU ·U AU ∗ U ∈G where {γU : U ∈ G } is an independent family of standard normal variables. Since G acts on itself by permutation, U XU∗ ∼ X for each U ∈ G . This observation allows us to perform averaging arguments like the one in Proposition 3.8. SECOND-ORDER MATRIX CONCENTRATION INEQUALITIES 7 There are several ways to apply this property to argue that X is strongly isotropic. For example, it suffices that G ′ := {M : MU = U M for all U ∈ G } = {zI : z ∈ C}. It is also sufficient that {U a : U ∈ G } forms a (complete) tight frame for every vector a; see the paper [VW08] for some situations where this condition holds. Remark 3.10 (Spherical Designs). A spherical t -design is a collection {ui : i = 1, . . . , N } of points on the unit sphere Sd −1 in Rd with the property that Z N 1 X ϕ(ui ) ϕ(u) dµ(u) = N i=1 Sd−1 where ϕ is an arbitrary algebraic polynomial in d variables with degree t and dµ is the Haar measure on the sphere Sd −1 . See the paper [BRV13] for existence results and background references. Given a spherical t -design, consider the random matrix X := N X i=1 γi ui ui∗ . where {γi : i = 1, . . . , N } is an independent family of standard normal variables. By construction, this random matrix has the property that ¯ X p ) · I for p = 0, 1, 2, . . . , ⌊t /2⌋. E X p = (E tr This variant of the strong isotropy property is sufficient for many purposes, provided that t ≈ log d. 3.6. A Second-Order Khintchine Inequality under Strong Isotropy. The second major result of this paper is a second-order matrix Khintchine inequality that is valid for matrix Gaussian series with the strong isotropy property. Like Theorem 3.5, this result uses the alignment parameter to control the norm of the random matrix. Theorem 3.11 (Second-Order Khintchine under Strong Isotropy). Consider an Hermitian matrix Gaussian series P X := ni=1 γi Hi with dimension d, as in (2.1), and assume that X is strongly isotropic. Introduce the matrix standard deviation and matrix alignment parameters: °1/4 °X °1/2 °Xn ° ° n and w(X ) := max ° i,j =1 Hi Q 1 H j Q 2 Hi Q 3 H j ° . σ(X ) := ° i=1 Hi2 ° Qℓ The maximum ranges over a triple (Q 1 ,Q 2 ,Q 3 ) of unitary matrices. Then, for each integer p ≥ 1, ¡ £ ¤ 2p ¢1/(2p) E kX k2p ≤ 2σ(X ) + 21/4 p 5/4 w(X ) · d 1/(2p) . The symbol k·k refers to the spectral norm, while k·kq is the Schatten q-norm. The proof of this result appears in Section 9, where we also establish a lower bound. Theorem 3.11 shows that the moments of the random matrix X are controlled by the standard deviation σ(X ) whenever p 5/4 w(X ) ≪ σ(X ). If we take p = ⌈log d⌉, the Schatten 2p-norm is essentially the same as the spectral norm, and the dimensional factor on the right-hand side is negligible. Therefore, w(X ) log5/4 d ≪ σ(X ) implies E kX k / 2σ(X ). In the presence of strong isotropy, the spectral norm of a matrix Gaussian series is comparable with the standard deviation σ(X ) whenever the alignment parameter w(X ) is relatively small! In particular, we can apply this result to the GOE matrix X goe because of Proposition 3.8. The calculation (3.2) of the standard deviation and alignment parameters ensures that E kX goe k / 2. As we observed in (2.9), this bound is sharp. For this example, we can even take p ≈ d 1/5 , which leads to very good probability bounds via Markov’s inequality. Furthermore, a more detailed version of Theorem 3.11, appearing in Section 9, is precise enough to show that the semicircle law is the limiting spectral distribution of the GOE. On the other hand, the dependence on the exponent p in Theorem 3.11 is suboptimal. This point is evident when we consider the diagonal Gaussian matrix X diag (d). Indeed, Theorem 3.11 only implies the bound E kX diag k ≤ const · log5/4 d. As we observed in (2.9), the power on the logarithm should be one-half. 8 J. A. TROPP 3.7. Discussion. This paper opens a new chapter in the theory of matrix concentration and noncommutative moment inequalities. Our main technical contribution is to demonstrate that the matrix Khintchine inequality, Proposition 2.3, is not the last word on the behavior of a matrix Gaussian series. Indeed, we have shown that the matrix variance does not contain sufficient information to determine the expected norm of a matrix Gaussian series. We have also identified another quantity, the matrix alignment parameter, that allows us to obtain better bounds for every matrix Gaussian series. Furthermore, in the presence of more extensive distributional information, it is even possible to obtain numerically sharp bounds for the norm of certain matrix Gaussian series. There are a number of ways to extend the ideas and results in this paper: Higher-Order Alignment: If we consider alignment parameters involving 2k coefficient matrices, it is possible to improve the term p 1/4 σ2p in Theorem 3.5 to p 1/(2k)σ2p . See Section 8.1 for some additional details. Other Matrix Series: We can use exchangeable pairs techniques [MJC+ 14] to study matrix series of the form X := Pn i=1 ξi H i where {ξi } is an independent family of scalar random variables. This approach is potentially quite interesting when the ξi are Bernoulli (that is, 0–1) random variables. Independent Sums: We can use conditioning and symmetrization, as in (2.2), to apply Theorem 3.5 to a sum of independent random matrices. See [CGT12, App.] for an example of this type of argument. Rectangular Matrices: The techniques here also give results for rectangular random matrices by way of the Hermitian dilation [Tro15, Sec. 2.1.16]. In this setting, a different notion of strong isotropy becomes relevant; see Section 9.1. We have not elaborated on these ideas because there is also evidence that alignment parameters will not lead to final results on matrix concentration. 3.8. Related Work. There are very few techniques in the literature on random matrices that satisfy all three of our three requirements: flexibility, ease of use, and power. In particular, for many practical applications, it is important to be able to work with an arbitrary sum of independent random matrices. We have chosen to study matrix Gaussian series because they are the simplest instance of this model, and they may lead to further insights about the general problem. Most classical work in random matrix theory concerns very special classes of random matrices; the books [BS10, Tao12] provide an overview of some of the main lines of research in this field. There are some specific subareas of random matrix theory that address more general models. The monograph [NS06] gives an introduction to free probability. The book chapter [Ver12] describes a collection of methods from Banach space geometry. The monograph [Tro15] covers the theory of matrix concentration. The last three works have a wide scope of applicability, but none of them provides the ultimate description of the behavior of a sum of independent random matrices. There is one specific strand of research that we would like to draw out because it is very close in spirit to this paper. Recently, Bandeira & van Handel [BV14] and van Handel [vH15] have studied the behavior of a real symmetric Gaussian matrix whose entries are independent and centered but have inhomogeneous variances (the independent-entry model). A d × d random matrix from this class can be written as X indep := Xd i,j =1 a i j γi j · (Ei j + E j i ) for ai j ∈ R. As usual, {γi j } is an independent family of standard normal random variables, and we assume that ai j = a j i without loss of generality. To situate this model in the context of our work, observe that matrix Gaussian series are significantly more general than the independent-entry model. The strongly isotropic model is incomparable with the independententry model. To see why, recall that strongly isotropic matrices can have dependent entries. At the same time, p E X indep is diagonal for each integer p ≥ 0, but it need not be a scalar matrix. For the independent-entry model, Bandeira & van Handel [BV14] established the following (sharp) bound: q E kX indep k / 2σ(X indep ) + const · maxi j |ai j | · log d (3.5) The maximum entry maxi j |ai j | plays the same role in this formula as the matrix alignment parameter plays in this paper. The paper [BV14] leans heavily on the independence assumption, so it is not clear whether the ideas extend to a more general setting. SECOND-ORDER MATRIX CONCENTRATION INEQUALITIES 9 To compare the result (3.5) with the work here, we can compute the matrix alignment parameter for the independententry model using a difficult extension of the calculation in Section 4.2. This effort yields ³ ´1/4 X w(X indep ) ≈ maxi j |ai j |4 . We see that the matrix alignment parameter is somewhat larger than the maximum entry maxi j |ai j |. Thus, for the independent model, Theorem 3.5 gives us a better result than the classical Khintchine inequality, Proposition 2.3, but it is somewhat weaker than (3.5). Theorem 3.11 would give a result close to the bound (3.5), but it does not always apply because the independent-entry model need not be strongly isotropic. The independent-entry model is not adequate to reach results with the same power and scope as the current generation of matrix concentration bounds [Tro15]. Nevertheless, the estimate (3.5) strongly suggests that there are better ways of summarizing the interactions of the coefficients in an Hermitian matrix Gaussian series X := Pn i=1 γi H i than the alignment parameter w(X ). One possibility is the weak variance parameter: ¡Xn ¢1/2 |〈u, Hi v〉|2 σ⋆ (X ) := sup . i=1 kuk=kv k=1 For the independent-entry model, this quantity reduces to const · maxi j |ai j |. The idea of considering σ⋆ (X ) is motivated by the discussion in [Tro12, Sec. 4], as well as the work in [BV14, vH15]. Unfortunately, at this stage, it is not clear whether there are any parameters that allow us to obtain a simple description of the behavior of a Gaussian matrix in the absence of burdensome independence or isotropy assumptions. This is a frontier for future work. 4. C OMPUTATION OF THE M ATRIX A LIGNMENT PARAMETERS In this section, we show how to compute the matrix alignment parameter for the two random matrices in the introduction, the diagonal Gaussian matrix and the GOE matrix. Afterward, we show by example that neither Theorem 3.5 nor Theorem 3.11 can hold if we remove the unitary factors from the matrix alignment parameter. 4.1. A Diagonal Gaussian Matrix. The diagonal Gaussian matrix takes the form Xd X diag := i=1 γi Eii . 2 The matrix variance Var(X diag ) = E X diag = I. It follows that the matrix standard deviation parameters, defined in (2.3), satisfy ° ° σp (X diag ) = °Var(X diag )1/2 ° = d 1/p for 1 ≤ p ≤ ∞. p We will show that the matrix alignment parameters, defined in (3.1), satisfy w p (X diag ) = d 1/p for 4 ≤ p ≤ ∞. Thus, for this example, the second-order matrix Khintchine inequalities, Theorem 3.5 and Theorem 3.11, do not improve over the matrix Khintchine inequality, Proposition 2.3. This outcome is natural, given that the classical result is essentially optimal in this case. Let us evaluate the matrix alignment parameter. For a triple (Q, S,U ) of unitary matrices, form the sum Xd Xd W (Q, S,U ) := i,j =1 Eii QE j j SEii U E j j = i,j =1 q i j s j i ui j · Ei j = Q ⊙ S t ⊙U . We have written ⊙ for the Schur (i.e., componentwise) product, and t is the transpose operation. When Q = S = U = I, the sum collapses: W (I, I, I) = I. Therefore, ° ° w p (X diag ) = max °|W (Q, S,U )|1/4 °p ≥ kIkp = d 1/p for p ≥ 1. Q,S,U But Proposition 3.2 shows that w p (X diag ) ≤ σp (X diag ) = d 1/p for each p ≥ 4. Therefore, w p (X diag ) = σp (X diag ) = d 1/p for p ≥ 4. The result for p = ∞ follows when we take limits. Remark 4.1 (Commutativity). A similar calculation is valid whenever the family {Hi } of coefficient matrices in the matrix Gaussian series (2.1) commutes. 10 J. A. TROPP 4.2. A GOE Matrix. The GOE matrix takes the form 1 Xd X goe := p i,j =1 γi j (Ei j + E j i ). 2d An easy calculation shows that the matrix variance satisfies 1 Xd 2 Var(X goe ) = E X goe = (Ei j + E j i )2 = (1 + d −1 ) · I. 2d i,j =1 Therefore, the matrix standard deviation parameters, defined in (2.3), equal p ° ° σp (X goe ) = °Var(X goe )1/2 °p = 1 + d −1 · d 1/p for 1 ≤ p ≤ ∞. We will demonstrate that the matrix alignment parameters, defined in (3.1), satisfy ¡ ¢1/4 1/p w p (X goe ) ≤ d −1 + 3d −2 ·d for 4 ≤ p ≤ ∞. When d is large, the matrix alignment parameters are much smaller than the matrix standard deviation parameters. As a consequence, the second-order matrix Khintchine inequalities deliver a substantial gain over the classical matrix Khintchine inequality. Let us compute the matrix alignment parameter. For a triple (Q, S,U ) of unitary matrices, introduce the (unnormalized) sum Xd W (Q, S,U ) := i 1 ,i 2 ,j 1 ,j 2 =1 (Ei 1 i 2 + Ei 2 i 1 )Q(E j 1 j 2 + E j 2 j 1 )S(Ei 1 i 2 + Ei 2 i 1 )U (E j 1 j 2 + E j 2 j 1 ). It is not hard to evaluate this sum if we take care. First, distribute terms: h¡ Xd ¢ W (Q, S,U ) = i 1 ,i 2 ,j 1 ,j 2 =1 q i 2 j 1 s j 2 i 1 ui 2 j 2 + q i 2 j 1 s j 2 i 2 ui 1 j 2 + q i 2 j 2 s j 1 i 1 ui 2 j 2 + q i 2 j 2 s j 1 i 2 ui 1 j 2 · Ei 1 j 1 ¡ ¢ + q i 2 j 1 s j 2 i 1 ui 2 j 1 + q i 2 j 1 s j 2 i 2 ui 1 j 1 + q i 2 j 2 s j 1 i 1 ui 2 j 1 + q i 2 j 2 s j 1 i 2 ui 1 j 1 · Ei 1 j 2 ¡ ¢ + q i 1 j 1 s j 2 i 1 ui 2 j 2 + q i 1 j 1 s j 2 i 2 ui 1 j 2 + q i 1 j 2 s j 1 i 1 ui 2 j 2 + q i 1 j 2 s j 1 i 2 ui 1 j 2 · Ei 2 j 1 i ¡ ¢ + q i 1 j 1 s j 2 i 1 ui 2 j 1 + q i 1 j 1 s j 2 i 2 ui 1 j 1 + q i 1 j 2 s j 1 i 1 ui 2 j 1 + q i 1 j 2 s j 1 i 2 ui 1 j 1 · Ei 2 j 2 . In each line, we can sum through the two free indices to identify four matrix products. For example, in the first line, we can sum on i 2 and j 2 . This step yields Xd ¡ ¢ W (Q, S,U ) = i 1 ,j 1 =1 S tU tQ +U SQ + tr(Q tU ) · S t +U Q t S t i 1 j 1 · Ei 1 j 1 Xd ¡ ¢ + i 1 ,j 2 =1 tr(Q tU ) · S t +U Q t S t + S tU tQ +U SQ i 1 j 2 · Ei 1 j 2 Xd ¡ ¢ + i 2 ,j 1 =1 U SQ + S tU tQ +U Q t S t + tr(QU ) · S t i 2 j 1 · Ei 2 j 1 i Xd ¡ ¢ + i 2 ,j 2 =1 U Q t S t + tr(QU ) · S t +U SQ + S tU tQ i 2 j 2 · Ei 2 j 2 . Sum through the remaining indices to reach ¡ ¢ W (Q, S,U ) = S tU tQ +U SQ + tr(Q tU ) · S t +U Q t S t ¡ ¢ + tr(Q tU ) · S t +U Q t S t + S tU tQ +U SQ ¡ ¢ + U SQ + S tU tQ +U Q t S t + tr(QU ) · S t ¡ ¢ + U Q t S t + tr(QU ) · S t +U SQ + S tU t Q . Twelve of the sixteen terms are unitary matrices, and the remaining four are scaled unitary matrices. Furthermore, each trace is bounded in magnitude by d, the worst case being Q = U = I. Applying the definition of the Schatten norm, the triangle inequality, and unitary invariance, we find that ° ° ¢ ¡ °|W (Q, S,U )|1/4 ° = kW (Q, S,U )k1/4 ≤ (4d + 12) · kIkp/4 1/4 = (4d + 12)1/4 · d 1/p for p ≥ 4. p/4 p To compute w p (X goe ), we must reintroduce the scaling (2d)−1/2 , which gives the advertised result: ¡ ¢1/4 1/p w p (X goe ) ≤ (2d)−1/2 · (4d + 12)1/4 · d 1/p = d −1 + 3d −2 ·d . To obtain the bound for p = ∞, we simply take limits. SECOND-ORDER MATRIX CONCENTRATION INEQUALITIES 11 P 4.3. The Unitaries are Necessary. Suppose that X := ni=1 γi Hi is an Hermitian matrix Gaussian series with dimension d, and let σ(X ) be the matrix standard deviation (2.3). Consider the alternative alignment parameter °1/4 °X ° ° n δ(X ) := ° i,j =1 Hi H j Hi H j ° . This quantity is suggested by the discussion in Section 3.1. Consider a general estimate of the form E kX k ≤ f (d) · σ(X ) + g (d) · δ(X ). (4.1) p We will demonstrate that, for every choice of the function g , there is a lower bound f (d) ≥ const · log d. From this claim, we deduce that it is impossible to improve over the classical Khintchine inequality by using the secondorder quantity δ(X ). Therefore, the unitary matrices in the alignment parameter w(X ) play a critical role. Most of this argument was developed by Afonso Bandeira; we are grateful to him for allowing us to include it. Introduce the Pauli spin matrices ¸ ¸ · ¸ · · 0 i 0 1 1 0 . H3 := H2 := H1 := −i 0 1 0 0 −1 These matrices are Hermitian and unitary, so Hi2 = I for i = 1, 2, 3. Furthermore, they satisfy the relations (Hi H j )2 = p p −I when i 6= j . Next, define H0 := α I, where α := 2 3 − 3. Calculate that X3 X4 X3 X3 X3 4 i,j =1 H i H j H i H j i,j =0 H i H j H i H j = i=0 H i + j =1 H 0 H j H 0 H j + i=1 H i H 0 H i H 0 + 2 2 i6= j = (α + 3) I + 6αI − 6I = (α + 6α − 3) I = 0. Indeed, α is a positive root of the quadratic. Consider the two-dimensional Gaussian series Y generated by the matrices H0 , . . . , H3 : X3 Y := i=0 γi Hi . As usual, {γi } is an independent family of standard normal variables. For the series Y , we have already shown that the alternative alignment parameter δ(Y ) = 0. Let us compute the variance and standard deviation: X3 p Var(Y ) = i=0 Hi2 = (α + 3) I = 2 3 I and σ(Y ) = kVar(Y )k1/2 = 121/4 . Expanding the random matrix Y in coordinates, we also find that ¸ ·p α γ0 + γ1 γ2 + iγ3 p . Y= αγ0 − γ1 γ2 − iγ3 p Therefore, the top-left entry (Y )11 is a centered normal random variable with variance 1 + α = 2( 3 − 1). To obtain the counterexample to the bound (4.1), fix an integer d ≥ 1. Let Y 1 , . . . , Y d be independent copies of the two-dimensional Gaussian series Y , and construct the 2d-dimensional matrix Gaussian series Xd Xd X3 X spin := Y 1 ⊕ · · · ⊕ Y d = j =1 E j j ⊗ Y j ∼ j =1 i=0 γi j (E j j ⊗ Hi ). We have written ⊕ for direct sum and ⊗ for the Kronecker product; the matrices E j j are the diagonal units with dimension d × d; and {γi j } is an independent family of standard normal variables. Extending the calculations above, we find that σ(X spin ) = 121/4 and δ(X spin ) = 0. Meanwhile, the norm of X spin is bounded below by the absolute value of each of its diagonal entries. In particular, ¢1/2 q ¡ p · log d. E kX spin k ≥ E max j |(Y j )11 | ≥ const · 2( 3 − 1) We p have used the fact that the expected maximum of d independent standard normal variables is proportional to log d. Assuming that (4.1) is valid, we can sequence these estimates to obtain q const · log d ≤ f (d) · σ(X spin ) + g (d) · δ(X spin ) = 121/4 · f (d). p Therefore, the function f (d) must grow at least as fast as log d . We conclude that a bound of the form (4.1) can never improve over the classical matrix Khintchine inequality. 12 J. A. TROPP 5. N OTATION & B ACKGROUND Before we enter into the body of the paper, let us set some additional notation and state a few background results. First, Md denotes the complex linear space of d ×d matrices with complex entries. We write Hd for the reallinear subspace of Md that consists of Hermitian matrices. The symbol ∗ represents conjugate transposition. We write 0 for the zero matrix and I for the identity. The matrix Ei j has a one in the (i , j ) position and zeros elsewhere. The dimensions of these matrices are typically determined by context. For an Hermitian matrix A, we define the integer powers A p for p = 0, 1, 2, 3, . . . in the usual way by iterated multiplication. For a positive-semidefinite matrix P, we can also define complex powers P z by raising each eigenvalue of P to the power z while maintaining the eigenvectors. In particular, P 1/2 is the unique positive-semidefinite square root of P. The matrix absolute value is defined for a general matrix B by the rule |B | := (B ∗ B )1/2 . Note that |P| = P when P is positive semidefinite. The trace and normalized trace of a matrix are given by tr B := Xd i=1 b ii and ¯ B := tr 1 Xd b ii d i=1 for B ∈ Md . We use the convention that a power binds before the trace to avoid unnecessary parentheses; powers also bind before expectation. The Schatten p-norm is defined for an arbitrary matrix B via the rule ¢1/p ¡ kB kp := tr |B |p for p ≥ 1. The Schatten ∞-norm k·k∞ coincides with the spectral norm k·k. This work uses both trace powers and Schatten norms, depending on which one is conceptually clearer. We require some Hölder inequalities involving the trace and the Schatten norms. For matrices A, B ∈ Md and ̺ ≥ 1, ¢1/̺ ¡ ¡ ′ ¢1/̺′ |tr(AB )| ≤ tr |A|̺ where ̺′ := ̺/(̺ − 1). (5.1) · tr |B |̺ Furthermore, kA ∗ B k2̺ ≤ kA ∗ Ak̺ · kB ∗ B k̺ . (5.2) These results are drawn from [Bha97, Chap. IV]. 6. T HE T RACE M OMENTS OF A M ATRIX G AUSSIAN S ERIES For each major result in this paper, the starting point is a formula for the trace moments of a matrix Gaussian series. P Lemma 6.1 (Trace Moment Identity). Let X := ni=1 γi Hi be an Hermitian matrix Gaussian series, as in (2.1). For each integer p ≥ 1, we have the identity X2p−2 Xn £ ¤ q 2p−2−q . (6.1) E tr X 2p = q=0 i=1 E tr H i X H i X The easy proof of Lemma 6.1 appears in the next two subsections. Integration by parts is not foreign in the study of Gaussian random matrices; for example, see [AGZ10, Sec. 2.4.1] or [Kem13, Sec. 9]. The exchangeable pairs method for establishing matrix concentration is also based on an elementary, but conceptually challenging, analog of integration by parts [MJC+ 14, Lem. 2.4]. Aside from these works, we are not aware of any application of related techniques to prove results on matrix concentration. 6.1. Preliminaries. To obtain Lemma 6.1, the main auxiliary tool is the classical integration by parts formula for a function of a standard normal vector [NP12, Lem. 1.1.1]. In the form required here, the result can be derived with basic calculus. Fact 6.2 (Gaussian Integration by Parts). Let γ ∈ Rn be a vector with independent standard normal entries, and let f : Rn → R be a function whose derivative is absolutely integrable with respect to the standard normal measure. Then Xn £ ¤ Xn £ ¤ i=1 E γi · f (γ) = i=1 E (∂i f )(γ) . The symbol ∂i denotes differentiation with respect to the i th coordinate. We also use a well-known formula for the derivative of a matrix power [Bha97, Sec. X.4]. SECOND-ORDER MATRIX CONCENTRATION INEQUALITIES Fact 6.3 (Derivative of a Matrix Power). Let A : R → Md be a differentiable function. For each integer ̺ ≥ 1, ¢ X̺−1 d d ¡ A(u) · A(u)̺−1−k . A(u)̺ = k=0 A(u)̺ · du du In particular, · ¸ d d tr A(u)̺ = ̺ · tr A(u)̺−1 · A(u) . du du 13 (6.2) The symbol · refers to ordinary matrix multiplication. 6.2. Proof of Lemma 6.1. Let us treat the random matrix X as a matrix-valued function of the standard normal vector γ := (γ1 , . . . , γn ). That is, Xn X = X (γ) = i=1 γi Hi . Write X = X · X 2p−1 and distribute the sum in the first factor: £ £ ¤¤ ¢ 2p−1 ¤ Xn £¡Xn = i=1 E γi · tr Hi X 2p−1 E tr X 2p = E tr i=1 γi H i X The Gaussian integration by parts formula, Fact 6.2, implies that Xn £ ¡ ¢¤ E tr X 2p = i=1 E tr Hi · ∂i X 2p−1 . Since ∂i X = Hi , the derivative formula (6.2) yields i X h Xn X2p−2 £ ¤ 2p−2 Xn q 2p−2−q . E tr X 2p = i=1 tr Hi · q=0 X q Hi X 2p−2−q = q=0 i=1 tr H i X H i X This completes the proof of the formula (6.1). 7. A S HORT P ROOF OF THE M ATRIX K HINTCHINE I NEQUALITY Historically, proofs of the matrix Khintchine inequality have been rather complicated, but the result is actually an immediate consequence of Lemma 6.1. We will present this argument in detail because it has not appeared in the literature. Furthermore, the approach serves as a template for the more sophisticated theorems that are the main contributions of this paper. Let us restate Proposition 2.3 in the form that we will establish it. P Proposition 7.1 (Matrix Khintchine). Let X := ni=1 γi Hi be an Hermitian matrix Gaussian series, as in (2.1). Define the matrix variance and standard deviation parameters Xn ¡ ¢1/(2q) V := Var(X ) = i=1 Hi2 and σ2q := trV q for each q ≥ 1. (7.1) Then, for each integer p ≥ 1, ¡ E tr X 2p ¢1/(2p) ≤ p 2p − 1 · σ2p . The short proof of Proposition 7.1 appears in the next two sections. The approach parallels the exchangeable pairs method that has been used to establish the matrix Khintchine inequality for Rademacher series [MJC+ 14, Cor. 7.3]. Here, we replace exchangeable pairs with the conceptually simpler argument based on Gaussian integration by parts. To reach the statement of Proposition 2.3, we simply rewrite the trace in terms of a Schatten norm. Remark 7.2 (Noninteger Moments). Our proof of Proposition 7.1 can be adapted to obtain moment bounds for all p ≥ 2. See [MJC+ 14, Cor. 7.3] for a closely related argument. 7.1. Preliminaries. The main idea in the proof is to simplify the trace moment identity (6.1) with an elementary matrix inequality. Anticipating subsequent arguments, we state the inequality in greater generality than we need right now. Proposition 7.3. Suppose that H and A are Hermitian matrices of the same size. Let q and r be integers that satisfy 0 ≤ q ≤ r . For each real number s in the range 0 ≤ s ≤ min{q, r − q}, ¤ £ ¤ £ tr H A q H A r −q ≤ tr H |A|s H |A|r −s . The proof of Proposition 7.3 depends on a numerical fact. For nonnegative numbers α and β, the function θ 7→ αθ β1−θ + α1−θ βθ is convex on the interval [0, 1], and it achieves its minimum at θ = 12 . Therefore, © ª ′ ′ ′ ′ αθ β1−θ + α1−θ βθ ≤ αθ β1−θ + α1−θ βθ when 0 ≤ θ′ ≤ min θ, 1 − θ . (7.2) We need to lift this scalar inequality to matrices. 14 J. A. TROPP P Proof. Without loss of generality, we may change coordinates so that A is diagonal: A = i ai Eii . Expanding both copies of A, ¡ q r −q £ ¤ £ ¤ X £ ¤ X r −q q ¢ q r −q tr H A q H A r −q = i,j ai a j · tr H Eii H E j j = i,j 21 ai a j + ai a j · tr H Eii H E j j . After we take absolute values, the inequality (7.2) implies that q r −q r −q q a j ≤ |ai |s |a j |r −s + |ai |r −s |a j |s . £ ¤ The remaining trace is nonnegative: tr H Eii H E j j = |hi j |2 , where hi j are the components of the matrix H . As a consequence, £ ¤ X ¡ ¢ £ ¤ ¤ £ tr H A q H A r −q ≤ i,j 12 |ai |s |a j |r −s + |ai |r −s |a j |s · tr H Eii H E j j = tr H |A|s H |A|r −s . ai a j + ai To reach the last identity, we reversed our steps to reassemble the sum into a trace.  7.2. Proof of the Matrix Khintchine Inequality. We may now establish Proposition 7.1. Let us introduce notation for the quantity of interest: E 2p := E tr X 2p . Use the integration by parts result, Lemma 6.1, to rewrite the trace moment: X2p−2 Xn £ ¤ q 2p−2−q . E 2p = q=0 i=1 E tr H i X H i X For each choice of q, apply the matrix inequality from Proposition 7.3 with r = 2p − 2 and s = 0 to reach Xn £ ¤ £ ¤ E 2p ≤ (2p − 1) i=1 E tr Hi2 X 2(p−1) = (2p − 1) · E tr V X 2(p−1) We have identified the matrix variance V defined in (7.1). Next, let us identify a copy of E on the right-hand side and solve the resulting algebraic inequality. To that end, invoke Hölder’s inequality (5.1) for the trace with ̺ = p and ̺′ = p/(p − 1): ¡ ¢1/p ¡ ¢(p−1)/p E 2p ≤ (2p − 1) · trV p · E tr X 2p ¡ ¢(p−1)/p ≤ (2p − 1) · σ22p · E tr X 2p = (2p − 1) · σ22p · E 2(p−1) . We have identified the quantity σ2p from (7.1). The second inequality is Lyapunov’s. Since the unknown E is nonnegative, we can solve the polynomial inequality to reach p E ≤ 2p − 1 · σ2p . This is the required result. 8. A S ECOND -O RDER M ATRIX K HINTCHINE I NEQUALITY In this Section, we prove Theorem 3.5, the second-order matrix Khintchine inequality. Let us restate the result in the form that we will establish it. P Theorem 8.1 (Second-Order Matrix Khintchine). Let X = ni=1 γi Hi be an Hermitian matrix Gaussian series, as in (2.1). Define the matrix variance and standard deviation parameter Xn ¡ ¢1/(2p) V := Var(X ) = i=1 Hi2 and σ2p := trV p for p ≥ 1. (8.1) Define the matrix alignment parameter µ ¯ ¯p/2 ¶1/(2p) ¯ ¯Xn w 2p := max tr ¯ i,j =1 Hi Q 1 H j Q 2 Hi Q 3 H j ¯ Qℓ for p ≥ 1 where the maximum ranges over a triple (Q 1 ,Q 2 ,Q 3 ) of unitary matrices. Then, for each integer p ≥ 3, p p ¡ ¢1/(2p) E tr X 2p ≤ 3 4 2p − 5 · σ2p + 2p − 4 · w 2p . (8.2) (8.3) The proof of Theorem 8.1 will occupy us for the rest of the section. To reach the statement in the introduction, we rewrite traces in terms of Schatten norms. We also provide the proof of Proposition 3.2 in Section 8.9. SECOND-ORDER MATRIX CONCENTRATION INEQUALITIES 15 8.1. Discussion. Before we establish Theorem 8.1, let us spend a moment to discuss the proof of this result. Theorem 8.1 is based on the same pattern of argument as the matrix Khintchine inequality, Proposition 7.1. This time, we apply Proposition 7.3 more surgically to control the terms in the trace moment identity from Lemma 6.1. The most significant new observation is that we can use complex interpolation to reorganize the products of matrices that arise during the calculation. We can refine this argument in several ways. First, if we apply complex interpolation with more care, it is possible to define the matrix alignment parameter (8.2) as a maximum over the set © ª Q 1 ,Q 2 ,Q 3 are commuting unitaries and Q ℓ = I for some ℓ . Given that commuting matrices are simultaneously diagonalizable, this improvement might make it easier to bound the matrix alignment parameters. Second, it is quite clear from the proof that we can proceed beyond the second-order terms. For example, for an integer p ≥ 3, we can obtain results in terms of the third-order quantities µ ¯ ¯p/3 ¶1/(2p) ¯Xn ¯ w 2p,1 := max tr ¯ i,j ,k=1 Hi Q 1 H j Q 2 Hk Q 3 Hi Q 4 H j Q 5 Hk ¯ Qℓ µ ¯ ¯p/3 ¶1/(2p) ¯Xn ¯ w 2p,2 := max tr ¯ i,j ,k=1 Hi Q 1 H j Q 2 Hk Q 3 Hi Q 4 Hk Q 5 H j ¯ . Qℓ The ordering of indices is (i , j , k, i , j , k) and (i , j , k, i , k, j ), respectively. This refinement allows us reduce the order of coefficient on the standard deviation term σ2p in (8.3) to p 1/6 . Unfortunately, we must also compute both alignment parameters w 2p,1 and w 2p,2 , instead of just w 2p . This observation shows why it is unproductive to press forward with this approach. Indeed, the number of orderings of indices grows super-exponentially as we consider longer products, which is an awful prospect for applications. 8.2. Preliminaries. In the proof of Theorem 8.1, we will use two interpolation results to reorganize products of matrices. The first one is a type of matrix Hölder inequality [LP86, Cor. 1]. Here is a version of the result specialized to our setting. Fact 8.2 (Lust-Piquard). Consider a finite sequence (A 1 , . . . , A n ) of Hermitian matrices with the same dimension, and let B be a positive-semidefinite matrix of the same dimension. For each number ̺ ≥ 2, ³ ¡X ¢1/̺ ¢ ´1/̺ ¡ ¢̺/2 ´2/̺ ³ ¡Xn n 2 ̺ · tr B ̺ . tr A B A ≤ tr A i i i=1 i=1 i See [PX97, Lem. 1.1] for a proof based on the Hadamard Three-Lines Theorem [Gar07, Prop. 9.1.1]. The second result is a more complicated interpolation for a multilinear function whose arguments are powers of random matrices. Proposition 8.3 (Multilinear Interpolation). Suppose that F : (Md )k → C is a multilinear function. Fix nonnegaP tive integers α1 , . . . , αk with ki=1 αi = α. Let Y i ∈ Hd be random matrices, not necessarily independent, for which E kY i kα < ∞. Then ¯ ¡ ¯ ¡ α1 ¢¯ ¢¯ ¯E F Y , . . . , Y αk ¯ ≤ max E max ¯F Q 1 , . . . , Q i−1 , Q i Y α , Q i+1 , . . . , Q k ¯ . 1 k i=1,...,k Qℓ i In this expression, each Q ℓ is a (random) unitary matrix that commutes with Y ℓ . As with Fact 8.2, the proof of Proposition 8.3 depends on the Hadamard Three-Lines Theorem [Gar07, Prop. 9.1.1]. The argument is standard but somewhat involved, so we postpone the details to Appendix A. 8.3. The Overture. Let us commence with the proof of Theorem 8.1. The initial steps are similar with the argument that leads to the matrix Khintchine inequality, Proposition 7.1. Introduce notation for the quantity of interest: X2p−2 Xn £ ¤ q 2p−2−q . (8.4) E 2p := E tr X 2p = q=0 i=1 E tr H i X H i X The identity follows from the integration by parts result, Lemma 6.1. This time, © we make finerªestimates for the summands in (8.4). Apply Proposition 7.3 with s = 0 to the terms where q ∈ 0, 1, 2p − 3, 2p − 2 . For the remaining 2p − 5 values of the exponent q, apply Proposition 7.3 with s = 1. We reach the bound Xn Xn £ ¤ £ ¤ E 2p ≤ 4 i=1 E tr Hi2 X 2p−2 + (2p − 5) i=1 E tr Hi X 2 Hi X 2p−4 . (8.5) We can take advantage of the fact that the Hi are interleaved with the powers X r of the random matrix in the second term. 16 J. A. TROPP 8.4. The First Term. To treat the first term on the right-hand side of (8.5), simply repeat the arguments from Section 7.2 to obtain a bound in terms of the quantity E . We have Xn i=1 £ ¤ £ ¤ ¡ ¢1/p ¡ ¢2(p−1) E tr Hi2 X 2p−2 = E tr V X 2p−2 ≤ trV p · E tr X 2p = σ22p · E 2(p−1) . (8.6) The quantities V and σ2p are defined in (8.1), and we have identified a copy of E . 8.5. Integration by Parts, Again. To continue, we want to break down the matrix X 2 that appears in the second term on the right-hand side of (8.5). To do so, we perform another Gaussian integration by parts. Write X 2 = Pn j =1 γ j H j X , and invoke Fact 6.2 to obtain Xn i=1 £ ¤ Xn £ £ ¤¤ E tr Hi X 2 Hi X 2p−4 = i,j =1 E γ j · tr Hi H j X Hi X 2p−4 ³X ´i h Xn £ ¤ Xn 2p−5 r 2p−5−r . = i,j =1 E tr Hi H 2j Hi X 2p−4 + i,j =1 E tr Hi H j X Hi r =0 X H j X (8.7) This result follows from the product rule and the formula (6.2) for the derivative of a power. We will bound the first term on the right-hand side of (8.7) in terms of the standard deviation parameter σ2p , and the second term will lead to the matrix alignment parameter w 2p . 8.6. Finding the Standard Deviation Parameter. Let us address the first term on the right-hand side of (8.7). First, draw the sum back into the trace and identify the matrix variance V , defined in (8.1): Xn £ ¤ £¡Xn ¢ 2(p−2) ¤ 2 2p−4 = E tr . i,j =1 E tr H i H j H i X i=1 H i V H i X To isolate the random matrix X , apply Hölder’s inequality (5.1) with exponents ̺ = p/2 and ̺′ = p/(p − 2), and follow up with Lyapunov’s inequality. Thus, E tr ¢ 2(p−2) ¤ ³ ¡Xn ¢(p−2)/p ¢p/2 ´2/p ¡ H V H X ≤ tr H V H · E tr X 2p . i i i i i=1 i=1 £¡Xn The Lust-Piquard inequality, Fact 8.2, with ̺ = p implies that ³ ¡X ¢1/p ¡ ¢2/p ¢ ´1/p ¡ ¢p/2 ´2/p ³ ¡Xn n 2 p · trV p = trV p = σ42p . ≤ tr tr i=1 H i i=1 H i V H i Once again, we identified V and σ2p from (8.1). Combine the last three displays to arrive at Xn i,j =1 E tr £ ¤ ¡ ¢(p−2)/p Hi H 2j Hi X 2p−4 ≤ σ42p · E tr X 2p = σ42p · E 2(p−2) . (8.8) We have identified another copy of E . 8.7. Finding the Matrix Alignment Parameter. It remains to study the second term on the right-hand side of (8.7). Rearranging the sums, we write this object as X2p−5 Xn r =0 i,j =1 E tr £ ¤ Hi H j X Hi X r H j X 2p−5−r . We can apply the interpolation result, Proposition 8.3, to consolidate the powers of the random matrix X . Consider the multilinear function Xn £ ¤ F (A 1 , A 2 , A 3 ) := i,j =1 tr Hi H j A 1 Hi A 2 H j A 3 . Since X is a matrix Gaussian series, it has moments of all orders. Therefore, for each index r , ¯ £ ¤¯ ¯E tr Hi H j X Hi X r H j X 2p−5−r ¯ ¾ ½ ¯ ¡ ¯ ¡ ¯ ¡ ¢¯ ¢¯ ¢¯ ≤ max E max ¯F Q 1 X 2p−4 ,Q 2 ,Q 3 ¯ , E max ¯F Q 1 ,Q 2 X 2p−4 ,Q 3 ¯ , E max ¯F Q 1 ,Q 2 ,Q 3 X 2p−4 ¯ . Qℓ Qℓ Qℓ SECOND-ORDER MATRIX CONCENTRATION INEQUALITIES 17 All three terms in the maximum admit the same bound, so we may as well consider the third one: ¯X ¯ ¯ £ ¤¯¯ ¯ n E max ¯F (Q 1 ,Q 2 ,Q 3 X 2p−4 )¯ = E max ¯ i,j =1 tr Hi H j Q 1 Hi Q 2 H j Q 3 X 2(p−2) ¯ Qℓ Qℓ ¯ h³X i¯ ´ ¯ n 2(p−2) ¯ X Q H H Q H Q H = E max ¯tr ¯ 3 1 2 i j i j i,j =1 Qℓ # "µ ¯X ¯p/2 ¶2/p ¡ ¢ ¯ ¯ n 2p (p−2)/p · tr X ≤ E max tr ¯ i,j =1 Hi H j Q 1 Hi Q 2 H j ¯ Qℓ µ ¯ ¯p/2 ¶2/p ¡ ¢(p−2)/p ¯ ¯Xn ≤ max tr ¯ i,j =1 Hi H j Q 1 Hi Q 2 H j ¯ · E tr X 2p Qℓ 4 ≤ w 2p · E 2(p−2) . The first step is the definition of F . To reach the second line, we use the fact that Q 3 commutes with X , then we cycle the trace. The third line is Hölder’s inequality (5.1) with ̺ = p/2 and ̺′ = p/(p − 2), and we have used the left unitary invariance of the matrix absolute value to delete Q 3 . Next, take the maximum over all unitary matrices, and apply Lyapunov’s inequality to draw the expectation into the term involving X . Finally, identify the quantity E 4 and note that the maximum is bounded by the alignment parameter w 2p , defined in (8.2). Similar calculations are valid for the other two terms, whence ¯ £ ¤¯ ¯E tr Hi H j X Hi X r H j X 2p−5−r ¯ ≤ w 4 · E 2(p−2) . 2p Since there are 2p − 4 possible choices of r , we determine that X2p−5 Xn ¤ £ r 2p−5−r 4 · E 2(p−2) . ≤ (2p − 4) · w 2p i,j =1 E tr H i H j X H i X H j X r =0 (8.9) The main part of the argument is finished. 8.8. Putting the Pieces Together. To conclude, we merge the bounds we have obtained and solve the resulting inequality for the quantity E . Combine (8.5), (8.6), (8.7), (8.8), and (8.9) to reach i h 4 · E 2(p−2) . E 2p ≤ 4σ22p · E 2(p−1) + (2p − 5) · σ42p + (2p − 4) · w 2p Clearing factors of E , we reach the inequality i h 4 . E 4 ≤ 4σ22p · E 2 + (2p − 5) · σ42p + (2p − 4) · w 2p If α andp β are nonnegative numbers, each nonnegative solution to the quadratic inequality t 2 ≤ αt +β must satisfy t ≤ α + β. It follows that i1/2 h p 4 E 2 ≤ 4σ22p + 2p − 5 · σ42p + (2p − 4) · w 2p . Take the square root, and invoke subadditivity of the square root (twice) to reach p p ¢ ¡ E ≤ 2 + 4 2p − 5 · σ2p + 4 (2p − 5)(2p − 4) · w 2p . Finally, we simplify the numerical constants to arrive at (8.3). 8.9. Comparison of Standard Deviation and Alignment Parameters. Our last task in this section is to establish Proposition 3.2, which states that the alignment parameter w 2p never exceeds the standard deviation σ2p . The easiest way to obtain this result is to use block matrices and inequalities for the Schatten norm. Fix an integer p ≥ 2, and fix a triple (Q 1 ,Q 2 ,Q 3 ) of unitary matrices. Consider the quantity µ ¯ ¯p/2 ¶2/p ¯Xn ¯ S := tr ¯ i,j =1 Hi Q 1 H j Q 2 Hi Q 3 H j ¯ . To establish Proposition 3.2, it suffices to show that S ≤ σ42p . Using block matrices and converting the trace into a Schatten norm, we can write ° ∗  ° ° ° .. .. ° ° . . °   ° ° ∗ °    S = °Q 2 H j Q 1∗ Hi  Hi Q 3 H j ° . ° °    .. .. ° ° ° ° . . p/2 18 J. A. TROPP The entries of the block column matrices are indexed by pairs (i , j ), arranged in lexicographic order. Invoke the Cauchy–Schwarz inequality (5.2) for Schatten norms with ̺ = p/2: ° ° ° ∗  ° ∗  ° ° ° ° .. .. .. .. ° ° ° ° . . . . °   ° °   ° °   ° °   ∗ ° ∗ 2 ∗ ∗ S ≤ °Q 2 H j Q 1 Hi  Q 2 H j Q 1 Hi ° × °Hi Q 3 H j  Hi Q 3 H j ° . ° ° °   °   .. .. .. .. ° ° ° ° ° ° ° ° . . . . p/2 p/2 Write each product of two block matrices as a sum: ° °X ° ° n S 2 ≤ ° i,j =1 Hi Q 1∗ H 2j Q 1 Hi ° p/2 ° °X ° ° n × ° i,j =1 H j Q 3∗ Hi2Q 3 H j ° p/2 . The two factors have the same form, so it suffices to bound the first one. Indeed, ° °X ° ° ° ° °Xn °Xn ° ° n = ° i=1 Hi Q 1∗V Q 1 Hi °p/2 ≤ ° i=1 Hi2 °p · °Q 1∗V Q 1 °p = kV k2p = σ42p . ° i,j =1 Hi Q 1∗ H 2j Q 1 Hi ° p/2 We have identified the matrix variance V , defined in (8.1), and then we applied the Lust-Piquard inequality, Fact 8.2, with ̺ = p. We identified V again, invoked unitary invariance of the Schatten norm, and then we recognized the quantity σ2p from (8.1). In summary, we have established that S 2 ≤ σ82p . This is what we needed to show. 9. S ECOND -O RDER M ATRIX K HINTCHINE UNDER S TRONG I SOTROPY In this section, we prove an extension of Theorem 3.11 that gives both lower and upper bounds for the trace moments of a strongly isotropic matrix Gaussian series. P Theorem 9.1 (Second-Order Matrix Khintchine under Strong Isotropy). Let X := ni=1 γi Hi be an Hermitian matrix Gaussian series, as in (2.1). Assume that X has the strong isotropy property ¯ X p ) · I for each p = 0, 1, 2, . . . . E X p = (E tr Define the matrix standard deviation parameter and matrix alignment parameter °1/4 °X °1/2 °Xn ° ° n and w := max ° i,j =1 Hi Q 1 H j Q 2 Hi Q 3 H j ° . σ := ° i=1 Hi2 ° Qℓ (9.1) (9.2) The maximum ranges over a triple (Q 1 ,Q 2 ,Q 3 ) of unitary matrices. Then, for each integer p ≥ 1, £ ¤1/(2p) ¡ ¢ 1/(2p) ¯ X 2p 1/(2p) ≤ Cat1/(2p) Catp · σ · 1 − (pw/σ)4 + ≤ E tr · σ + 21/4 p 5/4 · w. p The lower bound also requires that p 7/4 w ≤ 0.7σ. We have written Catp for the pth Catalan number, the function ¯ is the normalized trace. [a]+ := max{a, 0}, and tr The proof of this result appears below, starting in Section 9.3. To reach the statement of Theorem 3.11 in the introduction, we rewrite normalized traces in terms of Schatten norms. Fact 9.2 (below) states that the Catalan numbers satisfy the bound Catp ≤ 4p for each p = 1, 2, 3, . . . , which gives an explicit numerical form for the upper bound. 9.1. Discussion. Before we establish Theorem 9.1, let us comment on the proof and the meaning of this result. The most important observation is that the estimate is extremely accurate, at least for some examples. In particular, for the GOE matrix X goe defined in (2.7), we showed in Section 4.2 that the standard deviation parameter σ ≈ 1 while the alignment parameter w ≈ d −1/4 . Therefore, Theorem 9.1 implies that 2p ¯ X goe ≈ Catp E tr when p ≪ d 1/7 . This estimate is sufficient to prove that the limiting spectral distribution of the GOE is the semicircle law. See [Tao12, Sec. 2.3] for details about how to derive the law from the trace moments. Furthermore, Markov’s inequality implies that the norm kX goe k ≈ 2 with high probability. The proof of Theorem 9.1 has a lot in common with the arguments leading up to Proposition 7.1 and Theorem 8.1. The main innovation is that we can use the strong isotropy to imitate a moment identity that would hold in free probability. This idea allows us to remove the dependence on p from the standard deviation term. Although it may seem that the proof requires the matrix X to be a Gaussian series, there are analogous techniques, based on the theory of exchangeable pairs [MJC+ 14], that allow us to deal with other types of random matrix series. This observation has the potential to lead to universality laws. It is also clear from the argument that we could prove related results with an approximate form of strong isotropy. SECOND-ORDER MATRIX CONCENTRATION INEQUALITIES In addition, it is possible to extend these ideas to a rectangular matrix Gaussian series Z := In this case, we consider the Hermitian dilation: ¸ · 0 Z . H (Z ) = ∗ Z 0 19 Pn i=1 γi S i ∈ Cd1 ×d2 . The correct analog of strong isotropy is that E H (Z )2p = · ¯ Z ∗ )p ) · I (E tr(Z 0 0 ¯ ∗ Z )p ) · I (E tr(Z ¸ for p = 0, 1, 2, . . . . This observation allows us to obtain sharp bounds for the trace moments of rectangular Gaussian matrices. In this fashion, we can even show that the limiting spectral density of a sequence of rectangular Gaussian matrices is the Marcenko–Pastur distribution, provided that the aspect ratio of the sequence is held constant. Finally, we remark that similar arguments can be applied to obtain algebraic relations for the Stieltjes transform of the matrix X . This approach may lead more directly to limit laws for sequences of random matrices with increasing dimension. See [AGZ10, Sec. 2.4.1] or [Kem13, Sec. 9] for an argument of this species. 9.2. Preliminaries. Aside from the results we have collected so far, the proof of Theorem 9.1 requires a few additional ingredients. First, we state some of the basic and well-known properties of the Catalan numbers. Fact 9.2 (Catalan Numbers). The pth Catalan number is defined by the formula à ! 1 2p Catp := for p = 0, 1, 2, . . . . p +1 p (9.3) In particular, p 7→ Catp is nondecreasing, and Catp ≤ 4p for each p. The Catalan numbers satisfy the recursion Cat0 = 1 and Catp+1 = Xp q=0 Catq Catp−q . (9.4) The next result is a covariance identity for a product of centered functions of a Gaussian vector [NP12, Thm. 2.9.1]. It can be regarded as a refinement of the Poincaré inequality, which provides a bound for the variance of a centered function of a Gaussian vector. Fact 9.3 (Gaussian Covariance Identity). Let γ, γ′ ∈ Rn be independent standard normal vectors. Let f , g : Rn → C be functions whose derivatives are square integrable with respect to the standard normal measure, and assume that E f (γ) = E g (γ) = 0. Then £ ¤ E f (γ) · g (γ) = Z∞ 0 p £ ¤ dt Xn −t E (∂ f )(γ) · (∂ g )(γ ) where γ := e γ + 1 − e−2t γ′ . t t j j j =1 et The symbol ∂ j refers to differentiation with respect to the j th coordinate. The usual statement of this result involves the Ornstein–Uhlenbeck semigroup, but we have given a more elementary formulation. Finally, we need a bound for the solution to a certain type of polynomial inequality. This estimate is related to Fujiwara’s inequality [Mar66, Sec. 27]. We include a proof sketch since we could not locate the precise statement in the literature. Proposition 9.4 (Polynomial Inequalities). Consider an integer k ≥ 3, and fix positive numbers α and β. Then u k ≤ α + βu k−2 implies u ≤ α1/k + β1/2 Proof Sketch. Consider the polynomial ϕ : u 7→ u k − βu k−2 − α. The Descartes Rule of Signs implies that ϕ has exactly one positive root, say u+ . Furthermore, ϕ(u) ≤ 0 for a positive number u if and only if u ≤ u+ because ϕ(0) < 0. By direct calculation, one may verify that u⋆ = α1/k + β1/2 satisfies ϕ(u⋆ ) > 0, which means that u+ < u⋆ . We conclude that ϕ(u) ≤ 0 implies u ≤ u+ < u⋆ .  20 J. A. TROPP 9.3. The Normalized Trace Moments. Let us commence the proof of Theorem 9.1. First, we introduce notation for the normalized trace moments of the matrix Gaussian series: ¯ Xp µp := E tr for p = 0, 1, 2, . . . . It is clear that µ0 = 1. Since X is a symmetric random variable, the odd trace moments are zero: µ2p+1 = 0 for p = 0, 1, 2, . . . . It remains to calculate the even trace moments. We can obtain the second moment from a simple argument: Xn ¡ ¢ 2 2 ¯ 2 · I = µ2 · I. i=1 H i = E X = E tr X (9.5) The first identity follows from a direct calculation using the definition (2.1) of the matrix Gaussian series. The second identity is the strong isotropy hypothesis (9.1), and the last relation is the definition of µ2 . Take the spectral norm of (9.5) to see that µ2 = σ2 . (9.6) We have identified the standard deviation parameter, defined in (9.2). 9.4. Representation of Higher-Order Moments. The major challenge is to compute the rest of the even moments. As usual, the first step is to invoke Gaussian integration by parts. For each integer p ≥ 1, Lemma 6.1 implies that X2p Xn £ ¤ ¯ Hi X q Hi X 2p−q . µ2(p+1) = q=0 i=1 E tr We are considering µ2(p+1) instead of µ2p because it makes the argument cleaner. To analyze this expression, we will examine each index q separately and subject each one to the same treatment. Fix an index 0 ≤ q ≤ 2p. First, we center both X q and X 2p−q by adding and subtracting their expectations: Xn £ ¤ X £ ¡ ¢ ¡ ¢¤ ¯ Hi X q Hi X 2p−q = n tr ¯ Hi E X q Hi E X 2p−q E tr i=1 i=1 Xn £ ¡ ¢ ¡ ¢¤ ¯ Hi X q − E X q Hi X 2p−q − E X 2p−q . + i=1 E tr The cross-terms vanish because each one has zero mean. It is productive to think of the first sum on the right-hand side as an approximation to the left-hand side, while the second sum is a perturbation. Let us focus on the first sum on the right-hand side of the last display. We can use the strong isotropy hypothesis (9.1) to simplify this expression: Xn £ ¡ ¢ ¡ ¢¤ Xn £ ¡¡ ¢ ¢ ¡¡ ¢ ¢¤ q ¯ ¯ Hi E tr ¯ X q · I Hi E tr ¯ X 2p−q · I Hi E X 2p−q = i=1 tr i=1 tr H i E X ¡ Xn ¢¡ ¢¡ ¢ 2 ¯ ¯ X q E tr ¯ X 2p−q = tr E tr i=1 H i = σ2 · µq µ2p−q . The last identity follows from (9.5) and (9.6). As a side note, our motivation here is to imitate the moment identity that would hold if X and Hi were free from each other, in the sense of free probability. Finally, we combine the last three displays to reach Xp X2p−1 Xn £ ¡ q ¢ ¡ 2p−q ¢¤ q ¯ Hi X − E X 2p−q . (9.7) µ2(p+1) = σ2 · q=0 µ2q µ2(p−q) + q=1 i=1 E tr H i X − E X Observe that we have modified the indexing of both sums. This step depends on the facts that µq = 0 for odd q and that X 0 = I. 9.5. The Perturbation Term. The next step in the argument is to bound the perturbation term in (9.7) in terms of the alignment parameter w, defined in (9.2). We will use the Gaussian covariance identity, Fact 9.3. To that end, let us explain how to write each summand in the perturbation term as a covariance. Let H be a real, diagonal matrix: H = diag(h1 , . . . , hd ). Expanding the normalized trace, using α, β for coordinate indices, we find that £ ¡ ¢ ¡ ¢¤ 1 Xd £¡ ¢ ¡ ¢ ¤ ¯ H X q − E X q H X 2p−q − E X 2p−q = E tr hα hβ · E X q − E X q αβ X 2p−q − E X 2p−q βα . d α,β=1 To apply the Gaussian covariance identity to the expectation, we introduce a parameterized family {X t : t ≥ 0} of random matrices where p Xn ¡ ¢ X t := k=1 e−t γk + 1 − e−2t γ′k · Hk where γ′ is an independent copy of γ. SECOND-ORDER MATRIX CONCENTRATION INEQUALITIES 21 Observe that X and X t have the same distribution, although they are dependent. Fact 9.3 and Fact 6.3 deliver £¡ ¢ ¡ ¢ ¤ E X q − E X q αβ X 2p−q − E X 2p−q βα Z∞ h³ X ´ ³X ´ i dt Xn q−1 r 2p−q−1 s 2p−q−1−s q−1−r = E X H X X H X j j t t j =1 r =0 s=0 et αβ βα 0 Xq−1 X2p−q−1 Z∞ dt Xn £¡ r ¢ ¡ s 2p−q−1−s ¢ ¤ q−1−r = r =0 s=0 βα . αβ X t H j X t j =1 E X H j X et 0 Combining these formulas and expressing the result in terms of the normalized trace again, we find that £ ¡ ¢ ¡ ¢¤ ¯ H X q − E X q H X 2p−q − E X 2p−q E tr Xq−1 X2p−q−1 Z∞ dt Xn ¢¤ £ ¡ ¢ ¡ ¯ H X r H j X q−1−r H X ts H j X t2p−q−1−s . = r =0 s=0 E tr j =1 t e 0 In fact, this expression is valid for any Hermitian matrix H because of the unitary invariance of the trace. Summing the last identity over H = Hi , we reach Xn £ ¡ q ¢ ¡ 2p−q ¢¤ q ¯ − E X 2p−q i=1 E tr H i X − E X H i X Xq−1 X2p−q−1 Z∞ dt Xn £ 2p−q−1−s ¤ r q−1−r ¯ . (9.8) Hi X ts H j X t = r =0 s=0 i,j =1 E tr H i X H j X et 0 At this point, the alignment parameter w starts to become visible. 9.6. Finding the Matrix Alignment Parameter. Our next goal is to control the expression (9.8) in terms of the alignment parameter w. To do so, we use the interpolation result, Proposition 8.3, to bound the sum over (i , j ). For each choice of indices (q, r, s), we obtain the estimate ¯X ¯X n ¤¯ £ ¤¯ £ ¯ n ¯ Hi Q 1 X 2p−2 H j Q 2 Hi Q 3 H j Q 4 ¯¯ , ¯ Hi X r H j X q−1−r Hi X ts H j X t2p−q−1−s ¯¯ ≤ max E max ¯¯ n tr ¯ i,j =1 E tr i,j =1 Qℓ ¯X £ ¤¯ ¯ n ¯ Hi Q 1 H j Q 2 X 2p−2 Hi Q 3 H j Q 4 ¯¯ , E max ¯ i,j =1 tr Qℓ ¯X ¤¯ £ ¯ n ¯ Hi Q 1 H j Q 2 Hi Q 3 X t2p−2 H j Q 4 ¯¯ , E max ¯ i,j =1 tr Qℓ ¯X ¤¯ o £ ¯ n ¯ Hi Q 1 H j Q 2 Hi Q 3 H j Q 4 X t2p−2 ¯¯ . E max ¯ i,j =1 tr Qℓ Each random unitary matrix Q ℓ commutes with the corresponding random matrix X or X t . As in Section 8.7, we can bound each term in the maximum in the same fashion. For example, consider the fourth term: ¯X h°X ° ¡ ¢i ¤¯ £ ¯ n ° ¯ 2p−2 ¯ Hi Q 1 H j Q 2 Hi Q 3 H j Q 4 X t2p−2 ¯¯ ≤ E max ° n E max ¯ i,j =1 tr i,j =1 H i Q 1 H j Q 2 H i Q 3 H j · tr X t Qℓ Qℓ °Xn ° ¡ ¢ ¯ X t2p−2 ≤ max ° i,j =1 Hi Q 1 H j Q 2 Hi Q 3 H j ° · E tr Qℓ = w 4 · µ2(p−1) . The first step is Hölder’s inequality for the trace, and the second step is Hölder’s inequality for the expectation. In the last line, we recall that X t has the same distribution as X to identify µ2(p−1) . Finally, we recognize the matrix alignment parameter w, defined in (9.2). In summary, we have shown that ¯X ¤¯ £ ¯ n ¯ Hi X r H j X q−1−r Hi X ts H j X t2p−q−1−s ¯¯ ≤ w 4 · µ2(p−1) . ¯ i,j =1 E tr Introduce this bound into (9.8) to arrive at ¯Xn £ ¡ q ¢ ¡ 2p−q ¢¤¯ q ¯ ¯ Hi X − E X 2p−q ¯ ≤ q(2p − q) · w 4 · µ2(p−1) ≤ p 2 · w 4 · µ2(p−1) . i=1 E tr H i X − E X We have used the numerical inequality u(a − u) ≤ a 2 /4, valid for u ∈ R. Finally, we sum this expression over the index q to conclude that ¯X £ ¡ ¢ ¡ ¢¤¯ ¯ 2p−1 Xn ¯ Hi X q − E X q Hi X 2p−q − E X 2p−q ¯¯ ≤ 2p 3 · w 4 · µ2(p−1) . E tr (9.9) ¯ q=0 i=1 This is the required bound for the perturbation term in (9.7). 22 J. A. TROPP 9.7. A Recursion for the Trace Moments. In view of (9.7) and (9.9), we have shown that Xp µ2(p+1) = σ2 · q=0 µ2q µ2(p−q) ± 2p 3 · w 4 · µ2(p−1) for p = 1, 2, 3, . . . . (9.10) We have written ± to indicate that the expression contains both a lower bound and an upper bound for the normalized trace moment µ2(p+1) . In the next two sections, we will solve this recursion to obtain explicit bounds on the trace moments. First, we obtain the upper bound 1/(2p) µ2p 1/(2p) ≤ Catp · σ + 21/4 p 5/4 · w for p = 1, 2, 3, . . . . (9.11) 7/4 This result gives us a Khintchine-type inequality. Afterward, assuming p w ≤ 0.7σ, we establish the lower bound £ ¤1/(2p) 1/(2p) 1/(2p) µ2p ≥ Catp · σ · 1 − (pw/σ)4 + for p = 1, 2, 3, . . . . (9.12) Together these estimates yield the statement of Theorem 9.1. 9.8. Solving the Recursion: Upper Bound. We begin with the proof of the upper bound (9.11). The first step in the argument is to remove the lag term µ2(p−1) from the recursion (9.10) using moment comparison. Fix an integer p ≥ 1. Observe that ¡ ¢ ¡ ¢ ¯ X 2(p−1) ≤ E tr ¯ X 2(p+1) (p−1)/(p+1) ≤ E tr ¯ X 2(p+1) (p−1)/(p+1) = µ(p−1)/(p+1) . µ2(p−1) = E tr 2(p+1) ¯ A q )1/q is increasing for any positive-semidefinite matrix A, while the The first inequality holds because q 7→ (tr second inequality is Lyapunov’s. Introduce this estimate into the recursion (9.10) to obtain Xp (p−1)/(p+1) . µ2(p+1) ≤ σ2 · q=0 µ2q µ2(p−q) + 2p 3 w 4 · µ2(p+1) This is a polynomial inequality of the form u p+1 ≤ α+ βu p−1 , so Proposition 9.4 ensures that u ≤ α1/(p+1) + β1/2 . In other words, ´1/(p+1) p ³ Xp 1/(p+1) + 2 p 3/2 · w 2 for p = 1, 2, 3, . . . . µ2(p+1) ≤ σ2 · q=0 µ2q µ2(p−q) (9.13) Using this formula, we will apply induction to prove that p 1/p 1/p µ2p ≤ Catp · σ2 + 2 p 5/2 · w 2 when p = 1, 2, 3, . . . . (9.14) The stated result (9.11) follows from (9.14) once we take the square root and invoke subadditivity. Let us commence the induction. The formula (9.14) holds for p = 1 because µ2 = σ2 , as noted in (9.6). Assuming that the bound (9.14) holds for each integer p in the range 1, 2, 3, . . . , r , we will verify that the same bound is also valid for p = r + 1. For any integer q in the range 1 ≤ q ≤ r , the bound (9.14) implies that à ! Ãp p 5/2 2 !q 2q w 2 q 7/2 w 2 2q 2q µ2q ≤ Catq · σ · 1 + . (9.15) ≤ Catq · σ · exp 1/q σ2 Cat σ2 q −1/q Using the definition (9.3) of the Catalan numbers, one may verify that q 7→ q 5/2 Catq is increasing, so à !q p 2(r + 1)5/2 w 2 for q = 0, 1, 2, . . . , r . µ2q ≤ Catq · σ2q · 1 + +1) 2 Cat1/(r σ r +1 The case q = 0 follows by inspection. Now, the latter bound and the recursion (9.4) for Catalan numbers together imply that à !r p Xr 2 (r + 1)5/2 w 2 2 2(r +1) . σ · q=0 µ2q µ2(r −q) ≤ Catr +1 · σ · 1+ +1) 2 Cat1/(r σ r +1 Take the r + 1 root to determine that à ´1/(r +1) ³ Xr 1/(r +1) 2 2 ≤ Catr +1 · σ · 1 + σ · q=0 µ2q µ2(r −q) ! p r 2 (r + 1)5/2 w 2 , · +1) 2 r +1 Cat1/(r σ r +1 p p +1) = Cat1/(r · σ2 + 2 (r + 1)5/2 w 2 − 2 (r + 1)3/2 w 2 . r +1 We have used the numerical inequality (1 + x)α ≤ 1 + αx, valid for 0 ≤ α ≤ 1 and x ≥ 0. Combine this estimate with the recursive bound (9.13) for p = r to obtain p +1) 1/(r +1) µ1/(r · σ2 + 2(r + 1)5/2 w 2 . 2(r +1) ≤ Catr +1 SECOND-ORDER MATRIX CONCENTRATION INEQUALITIES 23 We see that (9.14) holds for p = r + 1, and the induction may proceed. 9.9. Solving the Recursion: Lower Bound. We turn to the proof of the lower bound (9.12). Assuming that p 7/4 w ≤ 0.7σ, we will use induction to show that £ ¤ (9.16) µ2p ≥ σ2p · Catp · 1 − (pw/σ)4 + for p = 0, 1, 2, 3, . . . . The result (9.12) follows once we take the (2p)th root. To begin the induction, recall that µ0 = 1, so the formula (9.16) is valid for p = 0. Suppose now that (9.16) is valid for each integer p in the range 0, 1, 2, . . . , r . We will verify the formula for p = r + 1. The lower branch of the recursion (9.10) states that Xr µ2(r +1) ≥ σ2 · q=0 µ2q µ2(r −q) − 2r 3 w 4 µ2(r −1) . The induction hypothesis (9.16) yields Xr Xr £ ¤ σ2 · q=0 µ2q µ2(r −q) ≥ σ2(p+1) · q=0 Catq Catr −q · 1 − (q w/σ)4 − ((r − q)w/σ)4 ≥ Catr +1 · σ2(p+1) · (r w/σ)4 . We have used the fact that q 7→ q 4 + (r − q)4 achieves its maximum value on [0, r ] at one of the endpoints because of convexity. We also applied the recursive formula (9.4) for the Catalan numbers. The bound (9.15) implies that s r 7/4 w log 2 2(r −1) ≤ µ2(r −1) ≤ 2Catr −1 σ when p ≈ 0.7. σ 2 Therefore, 2r 3 w 4 µ2(r −1) ≤ 4Catr −1 · σ2(r −1) · r 3 w 4 ≤ 4Catr +1 · σ2(r +1) · r 3 (w/σ)4 . The second inequality holds because the Catalan numbers are nondecreasing. Combine the last three displays to arrive at £ ¤ £ ¤ µ2(r +1) ≥ Catr +1 · σ2(r +1) · 1 − (r 4 + 4r 3 )(w/σ)4 ≥ Catr +1 · σ2(r +1) · 1 − (r + 1)4 (w/σ)4 . We have verified the formula (9.16) for p = r + 1, which completes the proof. A PPENDIX A. I NTERPOLATION R ESULTS In this appendix, we establish Proposition 8.3, the interpolation inequality for a multilinear function of a random matrix, whose proof appears below in Appendix A.4. A.1. Multivariate Complex Interpolation. The interpolation result we use in the body of the paper is a consequence of a more general theorem on interpolation for a function of several complex variables. Proposition A.1 (Multivariate Complex Interpolation). Let k be a natural number. For a positive number α, define the simplicial prism n o Xk ∆k (α) := (c 1 , . . . , c k ) ∈ Ck : Re c i ≥ 0 for each i and i=1 Re c i ≤ α . Consider a bounded, continuous function G : ∆k (α) → C. For each pair (i , j ) of distinct indices and each c ∈ ∆k (α), assume that G has the analytic section property: z 7→ G(c 1 , . . . , c i + z, . . . , c j − z, . . . , c k ) is analytic on − Re c i < Re z < Re c j . P Then, for each z ∈ ∆k (α) with β := ni=1 Re zi > 0, |G(z1 , . . . , zk )| ≤ ³Y k i=1 ¯Re z ´1/β ¯ . suptℓ ∈R ¯G(it1 , . . . , iti−1 , β + iti , iti+1 , . . . , itk )¯ i (A.1) (A.2) We establish Proposition A.1 in the next two sections. The argument relies on the same principles that support standard univariate complex interpolation. Although it seems likely that a result of this form already appears in the literature, we were not able to locate a reference. 24 J. A. TROPP A.2. Preliminaries. Proposition A.1 depends on Hadamard’s Three-Lines Theorem [Gar07, Prop. 9.1.1]. Proposition A.2 (Three-Lines Theorem). Consider the vertical strip ∆1 (1) in the complex plane: ∆1 (1) := {z ∈ C : 0 ≤ Re z ≤ 1}. Consider a bounded, continuous function f : ∆1 (1) → C that is analytic in the interior of ∆1 (1). For each θ ∈ [0, 1], sup | f (θ + it )| ≤ sup | f (1 + it )|θ · sup | f (it )|1−θ . t ∈R t ∈R t ∈R As we will see, this result delivers the k = 2 case of Proposition A.1. A.3. Proof of Proposition A.1. The proof of the multivariate interpolation result, Proposition A.1, follows by induction on the number k of arguments. Let us begin with the base cases. When the function G has one argument only, the inequality (A.2) is obviously true. Next, consider a bivariate function G 2 : ∆2 (α) → C that is bounded and continuous and has the analytic section property (A.1). Fix a point z ∈ ∆2 (α) with β := Re z1 + Re z2 > 0. Define the bounded, continuous function f (y) := G 2 (βy + i Im z1 , β(1 − y) + i Im z2 ) for y ∈ ∆1 (1). The assumption (A.1) implies that f is analytic on 0 < Re y < 1. Select θ = Re z1 /β, which gives 1 − θ = Re z2 /β. An application of the Three-Lines Theorem, Proposition A.2, implies that ¯ ¯ ¯ ¯θ ¯ ¯1−θ |G 2 (z1 , z2 )| = ¯ f (θ)¯ ≤ supt ∈R ¯ f (1 + it )¯ · sup t ∈R ¯ f (it )¯ . Introducing the definition of f and simplifying, ¯Re z /β ¯ |G 2 (z1 , z2 )| ≤ supt ∈R ¯G 2 (β(1 + it ) + i Im z1 , −βit + i Im z2 )¯ 1 ¯ ¯Re z /β × supt ∈R ¯G 2 (βit + i Im z1 , β(1 − it ) + i Im z2 )¯ 2 ³ ¯ ¯Re z ¯ ¯Re z ´1/β ≤ sups 1 ,s 2 ∈R ¯G 2 (β + is1 , is2 )¯ 1 · sups 1 ,s 2 ∈R ¯G 2 (is1 , β + is2 )¯ 2 . (A.3) This is the k = 2 case of Proposition A.1. Fix a positive integer k, and suppose that we have established the inequality (A.2) for functions with k − 1 arguments. In other words, assume that G k−1 : ∆k−1 (α′ ) → C is bounded and continuous, and it has the analytic section Pk−1 property (A.1). Then, for z ∈ ∆k−1 (α′ ) with β′ := i=1 Re zi > 0, |G k−1(z1 , . . . , zk−1 )| ≤ ³Y k−1 i=1 supt ℓ ∈R ´1/β′ ¯ ¯ ¯G k−1 (it1 , . . . , β′ + iti , . . . , itk−1 )¯Re zi . (A.4) We need to extend this result to functions with k variables. Consider a bounded, continuous function G k : ∆k (α) → C with the analytic section property (A.1). Fix a complex P Pk−1 vector z ∈ ∆k (α) with β := ki=1 Re zi > 0. Define the number β′ := i=1 Re zi . When β′ = 0, the formula (A.2) is trivial for G = G k because Re z1 = · · · = Re zk−1 = 0. Therefore, we may assume that β′ > 0. Introduce the function G k−1 (y 1 , . . . , y k−1 ) := G k (y 1 , . . . , y k−1 , zk ) for y ∈ ∆k−1 (β′ ). One may verify that G k−1 inherits boundedness, continuity, and analytic sections from G k . Therefore, the induction hypothesis (A.4) gives |G k (z1 , . . . , zk−1, zk )| ≤ ³Y k−1 i=1 supt ℓ ∈R ´1/β′ ¯ ¯ ¯G k (it1 , . . . , β′ + iti , . . . , itk−1 , zk )¯Re zi . (A.5) For each fixed choice of the index i and of the numbers t1 , . . . , tk−1 ∈ R, consider the function G 2 (y i , y k ) := G k (it1 , . . . , y i , . . . , itk−1 , y k ) for (y i , y k ) ∈ ∆2 (α). Since β′ + Re zk = β, the bivariate case (A.3) provides that ¯ ¯ ¯ ¯β′ /β ¯G k (it1 , . . . , β + iti , . . . , itk−1 , zk )¯ ≤ sup ¯ ¯ s i ,s k ∈R G k (it 1 , . . . , β + is i , . . . , it k−1 , is k ) ¯ ¯1−β′ /β × sups i ,s k ∈R ¯G k (it1 , . . . , isi , . . . , itk−1 , β + isk )¯ . (A.6) SECOND-ORDER MATRIX CONCENTRATION INEQUALITIES 25 Combine the bounds (A.5) and (A.6) to reach ³Y ¯ ¯Re zi ´1/β k−1 ¯ ¯ |G k (z1 , . . . , zk−1 , zk )| ≤ i=1 supt ℓ ∈R G k (it 1 , . . . , β + it i , . . . , it k ) × ³Y k−1 suptℓ ∈R i=1 ´(β−β′ )/(β′ β) ¯ ¯ ¯G k (it1 , . . . , iti , . . . , β + itk )¯Re zi Pk−1 Since β′ = i=1 Re zi and β − β′ = Re zk , we see that the second product has the same form as the i = k term of the first product. Thus, ³Y ¯Re zi ´1/β ¯ k ¯ ¯ |G k (z1 , . . . , zk )| ≤ . i=1 sup t ℓ ∈R G k (it 1 , . . . , β + it i , . . . , it k ) This step completes the induction. We have established Proposition A.1. A.4. Interpolation for a Multilinear Function of Random Matrices. We are now prepared to establish the interpolation result, Proposition 8.3, for a multilinear function of random matrices. We will actually establish a somewhat more precise version, which we state here. Proposition A.3 (Refined Multilinear Interpolation). Suppose that F : (Md )k → C is a multilinear function. Fix P nonnegative integers α1 , . . . , αk with ki=1 αk = α. Let Y i ∈ Hd be random Hermitian matrices, not necessarily independent, for which E kY i kα < ∞. Then ¶ µ Yk h ¯ ¡ ¯ ¡ α1 ¢¯ iαi 1/α ¢¯ α ¯ ¯ ¯E F Y , . . . , Y αk ¯ ≤ . 1 i=1 E max F Q 1 , . . . , Q i−1 , Q i Y i , Q i+1 , . . . , Q k k Qℓ Each Q ℓ is a unitary matrix that commutes with Y ℓ . We establish this result in the next section. Observe that Proposition A.3 immediately implies Proposition 8.3, the interpolation result that we use in the body of the paper. Indeed, we recognize the large parenthesis on the right-hand side as a geometric mean, and we bound the geometric mean by the maximum of its components. A.5. Proof of Proposition A.3. By a perturbative argument, we may assume that each matrix Y i is almost surely nonsingular. Indeed, for a parameter ε > 0, we can replace each Y i by the modified matrix Yei := Y i + εγi I, where {γi } is an independent family of standard normal variables. After completing the argument, we can draw ε down to zero to obtain the inequality for the original random matrices. The first step in the argument is to perform a polar factorization of each random Hermitian matrix: Y i = Ui P i where Ui is unitary, P i is almost surely positive definite, and the two factors commute with Y i for each index i . For α clarity of argument, we introduce the unitary matrices S i = Ui i . With this notation, ¯ ¡ α1 ¢¯ ¯ ¡ ¢¯ ¯E F Y , . . . , Y αk ¯ = ¯E F S 1 P α1 , . . . , S k P αk ¯ (A.7) 1 1 k k We will perform interpolation only on the positive-definite matrices. Next, we introduce a complex-valued function by replacing the powers αi with complex variables: ¡ z ¢ z G : (z1 , . . . , zk ) 7→ E F S 1 P 1 1 , . . . , S k P k k for z ∈ ∆k (α). The set ∆k (α) is the simplicial prism defined in the statement of Proposition A.1. Claim A.4. The function G is bounded, continuous, and has analytic sections. These are the properties required to apply the interpolation result, Proposition A.1. Let us assume that Claim A.4 holds so that we can complete the proof. The relation (A.7) and Proposition A.1 imply that ¯ ¯ ¯ ¯ ¯E F (Y α1 , . . . , Y αk )¯ = ¯E F (S 1 P α1 , . . . , S k P αk )¯ 1 1 k k ¯ ´1/α ¯ ¡ ³Y k ¯ it k ¢¯αi α+it i it 1 . , . . . , S P , . . . S P F S P ≤ sup ¯ ¯E 1 i k t ∈ R 1 i=1 i k ℓ it Fix an index i in the product. Introduce the unitary matrix Q ii (ti ) = S i P i i Ui−α , where Ui is the polar factor of Y i . It follows that ¡ ¢¡ ¢ α+it it S i P i i = S i P i i Ui−α Uiα P iα = Q ii (ti )Y iα 26 J. A. TROPP it Similarly, for each ℓ 6= i , we can define Q iℓ (tℓ ) = S ℓ P ℓ ℓ . Therefore, !1/α à Yk ¯ ¡ ¯ ¡ α1 ¢¯αi ¢¯ α ¯ ¯ ¯E F Y , . . . , Y αk ¯ ≤ 1 i=1 sup E F Q i1 (t 1 ), . . . , Q ii (t i )Y i , . . . , Q ik (t k ) k ≤ µ t ℓ ∈R Yk i=1 h ¯ ¡ ¢¯ iαi E max ¯F Q 1 , . . . , Q i Y iα , . . . , Q k ¯ Qℓ ¶1/α . By construction Q iℓ (tℓ ) commutes with Y ℓ for each index ℓ. In the second line, we apply Jensen’s inequality. Then we relax the supremum to include all unitary matrices Q ℓ that commute with the corresponding Y ℓ . We can replace the supremum with a maximum since the unitary group is compact and the function F is continuous. This is what we needed to show. Finally, we must verify Claim A.4. Each multilinear function F : (Md )k → C is bounded and continuous: Yk |F (A 1 , . . . , A k )| ≤ Const · i=1 kA i k . P Fix a point z ∈ ∆k (α), and let β := ki=1 Re zi . Applying this observation to the function G, hY i ¯ k z ¯ z |G(z1 , . . . , zk )| = ¯E F (S 1 P 1z1 , . . . , S k P k k )¯ ≤ Const · E kS i P i i k i=1 · ¸β hY i 1 Xk k Re z i kY i k kY i k . = Const · E ≤ Const · E i=1 β i=1 The first estimate follows from Jensen’s inequality and the bound on the multilinear function F . The second inequality depends on the unitary invariance of the spectral norm, the identity kP z k = kPkRe z , and the polar decomposition Y i = Ui P i . The last bound is the inequality between the geometric and arithmetic mean. Since E kY i kα < ∞, and β ≤ α, we conclude that G is bounded. Since F is continuous, an application of the Dominated Convergence Theorem shows that G is a continuous function as well. The proof that G has analytic sections is similar. Fix a vector c ∈ ∆k (α). Since F is multilinear, it is easy to check that the map ¡ c j −z c ¢ c +z c z 7→ F S 1 P 11 , . . . , S i P i i , . . . , S j P j , . . . , S k P1k is analytic on − Re c i < z < Re c j for any fixed choice of S ℓ and P ℓ and any pair (i , j ) of distinct indices. Together, the Morera Theorem and the Fubini–Tonelli Theorem allow us to conclude that ¡ c j −z c ¢ c +z c z 7→ E F S 1 P 11 , . . . , S i P i i , . . . , S j P j , . . . , S k P1k also is analytic. Therefore, the analytic section property (A.1) is in force. Claim A.4 is established. A CKNOWLEDGMENTS Afonso Bandeira is responsible for the argument in Section 4.3, and Ramon van Handel has offered critical comments. Parts of this research were completed at Mathematisches Forschungsinstitut Oberwolfach (MFO) and at Instituto Nacional de Matemática Pura e Aplicada (IMPA) in Rio de Janeiro. The author gratefully acknowledges support from ONR award N00014-11-1002, a Sloan Research Fellowship, and the Gordon & Betty Moore Foundation. R EFERENCES [AGZ10] [BV14] [Bha97] [BRV13] [BS10] [Buc01] [CGT12] [CT14] G. W. Anderson, A. Guionnet, and O. Zeitouni. An introduction to random matrices, volume 118 of Cambridge Studies in Advanced Mathematics. Cambridge University Press, Cambridge, 2010. A. Bandeira and R. van Handel. Sharp nonasymptotic bounds on the norm of random matrices with independent entries. Available at http://www.arXiv.org/abs/1408.6185 , Aug. 2014. R. Bhatia. Matrix analysis, volume 169 of Graduate Texts in Mathematics. Springer-Verlag, New York, 1997. A. Bondarenko, D. Radchenko, and M. Viazovska. Optimal asymptotic bounds for spherical designs. Ann. of Math. (2), 178(2):443– 452, 2013. Z. Bai and J. W. Silverstein. Spectral analysis of large dimensional random matrices. Springer Series in Statistics. Springer, New York, second edition, 2010. A. Buchholz. Operator Khintchine inequality in non-commutative probability. Math. Ann., 319:1–16, 2001. R. Y. Chen, A. Gittens, and J. A. Tropp. The masked sample covariance estimator: an analysis using matrix concentration inequalities. Inf. Inference, 1(1):2–20, 2012. R. Y. Chen and J. A. Tropp. Subadditivity of matrix ϕ-entropy and concentration of random matrices. Electron. J. Probab., 19:no. 27, 30, 2014. SECOND-ORDER MATRIX CONCENTRATION INEQUALITIES [Gar07] [Kem13] 27 D. J. H. Garling. Inequalities: a journey into linear analysis. Cambridge University Press, Cambridge, 2007. T. Kemp. Math 247a: Introduction to random matrix theory. Available at http://www.math.ucsd.edu/~tkemp/247A/247A.Notes.pdf , Nov. 2013. [LO94] R. Latała and K. Oleszkiewicz. On the best constant in the Khinchin-Kahane inequality. Studia Math., 109(1):101–104, 1994. [LP86] F. Lust-Piquard. Inégalités de Khintchine dans C p (1 < p < ∞). C. R. Math. Acad. Sci. Paris, 303(7):289–292, 1986. [LT91] M. Ledoux and M. Talagrand. Probability in Banach Spaces: Isoperimetry and Processes. Springer, Berlin, 1991. [Mar66] M. Marden. Geometry of polynomials. Second edition. Mathematical Surveys, No. 3. American Mathematical Society, Providence, R.I., 1966. [MJC+ 14] L. Mackey, M. I. Jordan, R. Y. Chen, B. Farrell, and J. A. Tropp. Matrix concentration inequalities via the method of exchangeable pairs. Ann. Probab., 42(3):906–945, 2014. [NP12] I. Nourdin and G. Peccati. Normal approximations with Malliavin calculus, volume 192 of Cambridge Tracts in Mathematics. Cambridge University Press, Cambridge, 2012. From Stein’s method to universality. [NS06] A. Nica and R. Speicher. Lectures on the combinatorics of free probability, volume 335 of London Mathematical Society Lecture Note Series. Cambridge University Press, Cambridge, 2006. [Pis98] G. Pisier. Non-commutative vector valued L p -spaces and completely p-summing maps. Astérisque, (247):vi+131, 1998. [PX97] G. Pisier and Q. Xu. Non-commutative martingale inequalities. Comm. Math. Phys., 189(3):667–698, 1997. [Tao12] T. Tao. Topics in random matrix theory, volume 132 of Graduate Studies in Mathematics. American Mathematical Society, Providence, RI, 2012. [Tro12] J. A. Tropp. User-friendly tail bounds for sums of random matrices. Found. Comput. Math., 12(4):389–434, 2012. [Tro15] J. A. Tropp. An Introduction to Matrix Concentration Inequalities. Foundations and Trends in Machine Learning. Now, 2015. To appear. Available at http://www.arXiv.org/abs/1501.01571 . [vH15] R. van Handel. On the spectral norm of inhomogeneous random matrices. Available at http://www.arXiv.org/abs/1502.05003 , Feb. 2015. [Ver12] R. Vershynin. Introduction to the non-asymptotic analysis of random matrices. In Compressed sensing, pages 210–268. Cambridge Univ. Press, Cambridge, 2012. [VW08] R. Vale and S. Waldron. Tight frames generated by finite nonabelian groups. Numer. Algorithms, 48(1-3):11–27, 2008.
10math.ST
Deep Transform: Cocktail Party Source Separation via Complex Convolution in a Deep Neural Network Andrew J.R. Simpson #1 # Centre for Vision, Speech and Signal Processing, University of Surrey Guildford, UK 1 [email protected] Abstract—Convolutional deep neural networks (DNN) are state of the art in many engineering problems but have not yet addressed the issue of how to deal with complex spectrograms. Here, we use circular statistics to provide a convenient probabilistic estimate of spectrogram phase in a complex convolutional DNN. In a typical cocktail party source separation scenario, we trained a convolutional DNN to re-synthesize the complex spectrograms of two source speech signals given a complex spectrogram of the monaural mixture – a discriminative deep transform (DT). We then used this complex convolutional DT to obtain probabilistic estimates of the magnitude and phase components of the source spectrograms. Our separation results are on a par with equivalent binary-mask based non-complex separation approaches. Index terms—Deep learning, supervised learning, complex convolution, deep transform. I. INTRODUCTION Convolutional deep neural networks (DNN) [1]-[3] are capable of exploiting geometric assumptions about data structure in order to share network weights. When the convolutional DNN is applied in a sliding window fashion, predictions for a given datapoint may be made for multiple alternate (windowed) contexts and from this distribution of predictions a probabilistic estimate may be obtained. In computer vision problems [1]–[3], the datapoints representing pixel intensities are positive real numbers. Therefore, if the convolutional DNN is used to make predictions about intensity for a given pixel, parametric statistics may be used to obtain a probabilistic estimate of pixel intensity [4] that summarizes the predictions made in the various different contexts of the sliding window (containing the pixel in question). While the audio spectrogram provides an intuitive visual counterpart to the 2D image of the computer vision problem, the equivalent application of convolutional DNNs to computer audition is less straight forward. In particular, the equivalence of the 2D spectrogram and the 2D image holds only for interpretations of the complex spectrogram that are limited to the magnitude component [5]-[7]. The approach of ignoring the phase component of the complex spectrogram does not imply serious limitations for classification problems (where phase may not be critical) but for audio synthesis phase is critical. Furthermore, if the convolutional DNN is applied to the phase component of the spectrogram it is not appropriate to compute probabilistic estimates of phase (from the overlapping windowed predictions) using parametric statistics. Here, we use circular statistics to obtain probabilistic estimates of phase computed using a convolutional DNN. We illustrate our approach in the context of a typical cocktail party source separation problem featuring complex spectrograms. We trained a complex convolutional DNN to separate and re-synthesize speech in a two-speaker cocktail party scenario [7]-[8]. The DNN was used as a complex convolutional deep transform (DT) and trained to separate the speech of two concurrent speakers. At the input layer, the DT DNN was provided the complex spectrogram. At the output layer, the DT DNN was trained to re-synthesize the respective complex spectrograms of the two speakers. We then used the trained complex convolutional DT to make probabilsitic predictions about new concurrent speech mixtures of the same speakers. Using objective source separation quality metrics, we analyzed the separation quality. Our results are on a par with equivalent convolutional-DNN probabilsitic binary-mask source separation techniques [7] but offer slightly better sound quality. II. METHOD We consider a typical simulated cocktail party listening scenario featuring a male voice and a female voice speaking concurrently. The speakers were each separately recorded (in mono) reading from a story. The two speech signals were then equalized in intensity and linearly summed (superposed) to produce a competing voice scenario. The speech signals were decimated to a sample rate of 4 kHz and transformed into spectrograms using the short-time Fourier transform (STFT) with window size of 128 samples, overlap interval of 1 sample and a Hanning window. This provided complex spectrograms with 65 frequency bins. The spectrograms computed from the first 2 minutes of the speech signals were used as training data. A subsequent 10 seconds of data were held back for later use in testing the separation of the model. Fig. 1. Probabilistic cocktail party source separation via complex convolutional deep transform. The upper pair of spectrograms plot a ~2-second excerpt from the original (test) speech audio. The single (central) spectrogram plots the linear mixture of the two speech signals. The lower pairs of spectrograms plot the respective source signals separated and re-synthesized using complex CDT both with and without output gain adaptation. For training data, the mixture and component speech spectrograms were cut up into windows (i.e., in time) of 20 samples. The windows overlaped at intervals of 10 samples. Thus, for every 20-sample window, for training the model there was mixture spectrogram matrix of size 65x20 samples and a corresponding pair of male/female source spectrograms. This gave approximately 50,000 training examples. For the testing stage, 10 seconds of speech spectrogram was used at overlap intervals of 1 sample, giving approximately 40,000 test frames (which would ultimately be applied in an overlaping convolutional output stage). Prior to windowing, the complex spectrogram data was separated into magnitude and phase spectrograms respectively, and each spectrogram was normalized to unit scale (i.e., both the magnitude and phase data were mapped to the range [0,1]). We used a feed-forward DNN of size 2600x2600x5200 units (65 x 20 x 2 = 2600, and 2600 x 2 = 5200). Each spectrogram (magnitude and phase) window of size 65 x 20 was unpacked into a vector of length 1300, giving two respective vectors of the same size. The DNN was configured such that the input layer was a vector concatenated from the mixture magnitude spectrogram (1300 samples) followed by the mixture phase spectrogram (1300 samples), giving a total vector of length 2600 (1300 x 2). The output layer was trained to synthesize a vector featuring the sequential concatenation of the magnitude and phase spectrograms of the respective male and female speech component signals. This meant that the DNN was trained to re-synthesize the respective components into the respective concatenated locations in the output layer (vector). The DNN employed the biased-sigmoid activation function [9] throughout with zero bias for the output layer. The DNN was trained using 500 full iterations of stochastic gradient descent (SGD). Each iteration of SGD featured a full sweep of the training data. Dropout was not used in training. DT Probabilistic Re-Synthesis. In the testing stage the model was used as a feed-forward signal processing device and the output layer activations were taken as synthetic output. For the test data, there was an overlap interval of 1 sample. This means that the test data described the speech spectrogram in terms of a sliding window and the output of the model was in the same sliding window format (i.e., it was a convolutional model). Each frame of input mixture spectrogram was passed through the model to produce the respective predictions of the respective magnitude and phase spectrograms for the male and female voice respectively. An SGD trained autoencoder type DNN can feature neurons in the output layer with some degree of invariant or persistent activity [4]. To account for this activity, as in [4], we included an ‘output gain adaptation’ stage, where the mean activation across all test frames was subtracted from the individual activations for each frame (i.e., there was no time constant). These ‘adapted’ output layer predictions were then accumulated as the sliding window, W, (size 20) moved by 1sample steps. Thus, 20 separate predictions were obtained for each column of the output spectrograms. For each of the male/female speakers, and for each of the respective magnitude and phase spectrograms, this gave an output distribution of spectrograms contained within a 3D matrix indexed using time (t), frequency (f) and window index (w). From the 3D magnitude matrices (M), the running average magnitude spectrogram ( ) was calculated as; = , 1 , , (1) From the 3D phase spectrogram matrices ( ) an equivalent circular mean phase angle was computed as follows. The phase spectrograms predicted in the output layer were first remapped from the range [0,1] to the range [0, 2π] (not shown here for convenience) and then transformed into a matrix of unit vectors (R) in the 2D plane using the following elementwise matrix operation (subscript indices t,f,w are dropped for convenience); = cos( ( 2 ) 2 ) = , , (2) The circular sum ( ), over window size (W = 20), is computed in an element-wise matrix operation; , (3) Then, in a further element-wise matrix operation, the circular mean angle matrix ( ̅ ) is computed by taking the fourquadrant inverse tangent (indices from here onwards are dropped for convenience); ̅ = "#" 2( ) (4) The respective estimated magnitude ( ) and phase ( ̅ ) spectrograms were then recombined into a complex spectrogram ( $% ) with the following element-wise matrix operation; $% = exp( ̅ ) (5) The estimated complex spectrogram ( $% ) was then subjected to an inverse STFT using an overlap-and-add procedure. Separation quality for the resulting separated audio (with respect to the original time domain audio signals) was measured using the BSS-EVAL toolbox [10] and is quantified in terms of signal-to-distortion ratio (SDR), signal-tointerference ratio (SIR) and signal-to-artefact ratio (SAR). Separation quality was assessed after each iteration of SGD training in order to evaluate the trajectory of performance (with training) in each measure. III. RESULTS Fig. 1 plots spectrograms illustrating the stages of mixture and separation for a brief excerpt (~2 seconds) from the test data. The model had been trained for 500 iterations (i.e., N = 500). The top spectrograms plot the original male and female speech audio. The single (central) spectrogram plots the linear mixture, illustrating a large degree of overlap in this feature space. Next (downwards) are plotted the spectrograms for the complex convolutional DT probabilistic re-synthesized audio where no output gain adaptation was employed. Finally, at the bottom are plotted spectrograms representing the respective complex convolutional DT probabilistic re-synthesized audio featuring output gain adaptation. Both sets of output spectrograms illustrate features which closely resemble those of the original signals. By visual inspection, the output gain adaptation results in less noise and somewhat better definition of the features. Both output spectrograms appear to have captured most of the bandwidth of the original signals but the fricative (noise) components of the originals have not been replicated very faithfully in either case. Informal listening revealed that the respective separated output audio was of good quality but was noisy (as Fig. 1 illustrates) in the case of the model that did not feature output gain adaptation (this model was not tested further). Fig. 2 plots the mean objective separation quality measures (SDR, SIR, SAR), computed over the entire 10-second test data (with respect to the original audio) and averaged across the male and female voice signals, as a function of training iteration (N) between the range of 1 and 500. All three functions appear to be nearing convergence after around 300 iterations and all three functions are more or less monotonic. Peak separation quality (around 500 iterations), averaged across the two voices, is SDR: 8.1, SIR: 17.2, SAR: 8.9 dB. This compares well with the equivalent DNN binary mask approach reported previously (for identical data and conditions), which achieved slightly worse artefact performance (for an equivalent SIR of 17.2 – see Fig. 2 of [7]); SDR: 7.5, SAR: 8.2 dB. This minor advantage is presumably due to the ability of the present approach to employ phase directly, where in the convolutional DNN binary mask approach phase is taken from the mixture spectrogram. The present results also compare reasonably well with the ideal binary mask computed for the same test data (i.e., using a mask computed from the source spectrograms), which achieves SDR: 11.3, SIR: 21.6, SAR: 11.7. The present results are also much better than the time-domain convolutional DT probabilistic re-synthesis approach reported previously [11]. To some degree, it may be that the inclusion of both phase and magnitude in the present approach provides some small advantage in terms of sampling that may be broadly equivalent to over-sampling [12]. We also note that, similar to the binary-mask based convolutional DNN approach reported previously [7], the present performance appears superior to earlier non-negative matrix factorization (NMF) based approaches [5], [6], which featured small scale DNN within the NMF pipeline. However, the results of the NMF-based methods are not directly comparable with the present results. some insight into the neural processing of the auditory system and its associated perceptual illusions and function. ACKNOWLEDGMENT AJRS was supported by grant EP/L027119/1 from the UK Engineering and Physical Sciences Research Council (EPSRC). REFERENCES Fig. 2. Complex convolutional DT: Separation quality as a function of training iterations (N). Mean signal-to-interference ratio (SIR), signal-to-distortion ratio (SDR) and signal-to-artefact ratio (SAR) computed from the audio separated using complex convolutional DT as a function of training iteration (N). The measures were computed from the 10-second test audio using the BSS-EVAL toolkit [10] and averaged across the two voices. IV. DISCUSSION AND CONCLUSION We have introduced a complex convolutional DT approach to cocktail party source separation using spectrograms. Our probabilistic approach features both parametric statistical estimation of spectrogram magnitude and circular statistical estimation of phase. The convolutional DNN was trained on two minutes of the speech of two speakers and tested on 10 seconds of new speech from the same speakers. Separation quality is similar to binary mask based convolutional DNN aproaches but features slightly improved artefact performance. Although the DNN employed here is of only 3 layers, if we consider the degree of abstraction already provided by the STFT and inverse STFT (giving an effective ‘depth’ of 5 layers of demodulation [9] and synthesis [4]) then it is not surprising that the approach works as well as it does [7]. Furthermore, the ability of the model to operate with full phase information, whilst retaining the 2D topographic projection of the STFT, appears an advantage. It may also be that performance in the present model is further enhanced by the use of the Hanning window, which acts (similarly to oversampling) to mitigate aliasing that has been suggested to affect DNN learning and performance [12]. More generally, the circular statistical process of probabilistic synthesis described here may be useful for more general probabilistic synthesis at the level of the complex spectrogram. At a more general level, if our model is interpreted as an auditory model, the featured output gain adaptation appears similar to that observed in the early auditory system [13]-[18]. Auditory gain adaptation is temporal and occurs on various timescales up to tens of seconds and even minutes [13]-[18]. In principle, the output gain adaptation of the present model may be interpreted as featuring a rectangular temporal integration window of length 10 seconds (the entire test data). Hence, the present model may be interpreted as demonstrating that neuronal output gain adaptation may be useful in terms of synthesis noise reduction. Hence, our findings may provide [1] LeCun Y, Bengio Y (1995) “Convolutional networks for images, speech, and time series”, The handbook of brain theory and neural networks 3361: 310. [2] Lawrence S, Giles CL, Tsoi AC, Back AD (1997) “Face Recognition: A Convolutional Neural Network Approach”, Neural Networks, IEEE Transactions on, 8: 98–113. [3] Krizhevsky A, Sutskever I, Hinton GE (2012) “Imagenet classification with deep convolutional neural networks”, In Advances in neural information processing systems, pp. 1097-1105. [4] Simpson AJR (2015) “Deep Transform: Error Correction via Probabilistic Re-Synthesis”, arxiv.org abs/1502.04617. [5] Grais E, Sen M, Erdogan H (2014) “Deep neural networks for single channel source separation”, in Acoustics, Speech and Signal Processing (ICASSP), 2014 IEEE Int. Conf. on, pp. 3734-3738. [6] Huang PS, Kim M, Hasegawa-Johnson M, Smaragdis P, “Deep learning for monaural speech separation”, in Acoustics, Speech and Signal Processing (ICASSP), 2014 IEEE Int. Conf. on., pp. 1562-1566. [7] Simpson AJR (2015) “Probabilistic Binary-Mask Cocktail-Party Source Separation in a Convolutional Deep Neural Network”, arxiv.org abs/1503.06962 [8] McDermott JH (2009) “The cocktail party problem”, Curr. Biol. 19: R1024-R1027. [9] Simpson AJR (2015) “Abstract Learning via Demodulation in a Deep Neural Network”, arxiv.org abs/1502.04042 [10] Vincent E, Gribonval R, Févotte C (2006) “Performance measurement in blind audio source separation”, IEEE Trans. on Audio, Speech and Language Processing, 14:1462-1469. [11] Simpson AJR (2015) “Deep Transform: Time-Domain Cocktail Party Source Separation via Probabilistic Re-Synthesis”, arxiv.org abs/1502.06046. [12] Simpson AJR (2015) “Over-Sampling in a Deep Neural Network”, arxiv.org abs/1502.03648. [13] Dean I, Harper NS, McAlpine D. (2005) “Neural population coding of sound level adapts to stimulus statistics”, Nat. Neurosci. 8, 1684 – 1689 (2005). [14] Watkins PV, Barbour DL. (2008) “Specialized neuronal adaptation for preserving input sensitivity”, Nat. Neurosci. 11, 1259-1261. [15] Rabinowitz NC, Willmore DB, Schnupp JWH, King AJ (2011) “Contrast gain control in auditory cortex”, Neuron. 70, 1178-1191. [16] Ulanovsky N, Las L, Nelken I. (2003) “Processing of low-probability sounds by cortical neurons”, Nat. Neurosci. 6, 391-398. [17] Ulanovsky N, Las L, Farkas D, Nelken I. (2004) “Multiple time scales of adaptation in auditory cortical neurons”, J. Neurosci. 24, 10440 – 10453. [18] Simpson AJR, Harper NS, Reiss JD, McAlpine D (2014) “Selective Adaptation to “Oddball” Sounds by the Human Auditory System”, J Neurosci 34:1963-1969.
9cs.NE
Half-integral linkages in highly connected directed graphs∗ arXiv:1611.01004v1 [math.CO] 3 Nov 2016 Katherine Edwards† Irene Muzi‡ Paul Wollan§ November 4, 2016 Abstract We study the half-integral k-Directed Disjoint Paths Problem ( 12 kDDPP) in highly strongly connected digraphs. The integral kDDPP is NP-complete even when restricted to instances where k = 2, and the input graph is L-strongly connected, for any L ≥ 1. We show that when the integrality condition is relaxed to allow each vertex to be used in two paths, the problem becomes efficiently solvable in highly connected digraphs (even with k as part of the input). Specifically, we show that there is an absolute constant c such that for each k ≥ 2 there exists L(k) such that 21 kDDPP is solvable in time O(|V (G)|c ) for a L(k)-strongly connected directed graph G. As the function L(k) grows rather quickly, we also show that 12 kDDPP is solvable in time O(|V (G)| f (k) ) in (36k3 + 2k)-strongly connected directed graphs. We also show that for each ε < 1 deciding half-integral feasibility of kDDPP instances is NP-complete when k is given as part of the input, even when restricted to graphs with strong connectivity εk. 1 Introduction Let k ≥ 1 be a positive integer. An instance of a directed k-linkage problem is an ordered tuple (G, S, T ) where G is a directed graph and S = (s1 , . . . , sk ) and T = (t1 , . . . ,tk ) are each ordered sets of k distinct vertices in G. The instance is integrally feasible if there exist paths P1 , . . . , Pk such that Pi is a directed path from si to ti for 1 ≤ i ≤ k and the paths Pi are pairwise vertex disjoint. The paths P1 , . . . , Pk will be referred to as an integral solution to the linkage problem. The k-Directed Disjoint Paths Problem (kDDPP) takes as input an instance of a directed k-linkage problem. If the problem is integrally feasible, we output an integral solution and otherwise, return that the problem is not feasible. The kDDPP is notoriously difficult. The problem was shown to be NP-complete even under the restriction that k = 2 by Fortune, Hopcroft and Wyllie [3]. In an attempt to make the kDDPP more tractable, Thomassen asked if the problem would be easier if we assume the graph is highly connected. Define a separation in a directed graph G as a pair (A, B) with A, B ⊆ V (G) such that A ∪ B = V (G) and where there does not exist an edge (u, v) with u ∈ A \ B and v ∈ B \ A. The order of the separation (A, B) is |A ∩ B|. The separation is trivial if A ⊆ B or B ⊆ A. The graph ∗ Supported by the European Research Council under the European Unions Seventh Framework Programme (FP7/20072013)/ERC Grant Agreement no. 279558 † [email protected] ‡ Department of Computer Science, University of Rome, “La Sapienza”, Rome, Italy. § Department of Computer Science, University of Rome, “La Sapienza”, Rome, Italy. email: [email protected]. 1 G is strongly k-connected if |V (G)| ≥ k + 1 and there does not exist a nontrivial separation of order at most k − 1. Let k ≥ 1 and define a directed graph G to be integrally k-linked if every linkage problem (G, S, T ) is integrally feasible. Thomassen conjectured [15] that there exists a function f such that every f (k)-strongly connected digraph G is integrally k-linked. He later answered his own conjecture in the negative [16], showing that no such function f (k) exists. Moreover, he also showed [16] for all L ≥ 1, the 2DDPP is NP-complete even when restricted to problem instances where the graph is L-strongly connected. In this article, we relax the kDDPP problem by requiring that a potential solution not use any vertex more than twice. Define a directed k-linkage problem (G, S, T ) to be half-integrally feasible if S = (s1 , . . . , sk ), and T = (t1 , . . . ,tk ) and there exist paths P1 , . . . , Pk such that: • for all 1 ≤ i ≤ k, Pi is a directed path from si to ti , and • for every vertex v ∈ V (G), v is contained in at most two distinct paths Pi . The paths P1 , . . . , Pk form a half-integral solution. The main result of this article is that the 21 kDDPP is polynomial time solvable (even with k as part of the input) when the graph is sufficiently highly connected. Define a graph G to be half-integrally k-linked if every k disjoint paths problem (G, S, T ) is half-integrally feasible. Theorem 1. For all integers k ≥ 1, there exists a value L(k) such that every strongly L(k)-connected graph is half-integrally k-linked. Moreover, there exists an absolute constant c such that given an instance (G, S, T ) of the 21 kDDPP where G is L(k)-connected, we can find a solution in time O(|V (G)|c ). The assumption that G is highly connected in Theorem 1 cannot be omitted under the usual complexity assumptions. Theorem 2. For all ε < 1, it is NP-complete to determine whether a given kDDPP instance (G, S, T ) halfintegrally feasible, even under the assumption that G is εk-strongly connected. The value for L(k) in Theorem 1 grows extremely quickly. However, when we fix k, we can still efficiently solve the 12 kDDPP with a significantly weaker bound on the connectivity than that given in Theorem 1. Theorem 3. There exists a function f satisfying the following. Let k ≥ 1 be a positive integer. Given a k-linkage problem (G, S, T ) such that G is (36k3 + 2k)-strongly connected, we can determine if the problem is half-integrally feasible and if so, output a half-integral solution, in time O(|V (G)| f (k) ). Given that the kDDPP is NP-complete even in the case k = 2, previous work on the problem has focused on various relaxations of the problem. Schrijver [13] showed that for fixed k, the kDDPP is polynomial time solvable when the input graph is assumed to be planar. Later, Cygan et al [1] improved this result, showing that the kDDPP is fixed parameter tractable with the assumption that the input graph is planar. In their recent series of articles [8, 7, 9] leading to the breakthrough showing the grid theorem holds for directed graphs, Kawarabayashi and Kreutzer and Kawarabayashi et al showed the following relaxation of the kDDPP can be efficiently resolved for fixed k. They showed that there exists a polynomial algorithm which, given an instance (G, S = (s1 , . . . , sk ), T = (t1 , . . . ,tk )) of the kDDPP, does one of the following: • find directed paths Pi , 1 ≤ i ≤ k, such that Pi links si to ti and for every vertex v of G, v is in at most four distinct Pi , or 2 • determine that no integral solution to (G, S, T ) exists. In terms of hardness results, Slivkins [14] showed that the kDDPP is W [1]-complete even when restricted to acyclic graphs. Kawarabayashi et al [7] announced that the proof of Slivkins result can be extended to show that the 12 kDDPP is also W [1]-complete. There are two primary steps in the proof of Theorem 1. First, we show that any highly connected graph contains a large structure which we can use to connect up the appropriate pairs of vertices. The exact structure we use is a bramble of depth two. A bramble is a set of pairwise touching, connected (strongly connected) subgraphs; they are widely studied certificates of large tree-width both in directed and undirected graphs. See Sections 2 and 3 for the exact definitions and further details. The existence of such a bramble of depth two follows immediately from Kawarabayashi and Kreutzer’s proof of the grid theorem [5]; however, the algorithm given in [5] only runs in polynomial time for fixed size of the bramble. We show in Section 4 that from appropriate assumptions which will hold both in the proof of Theorem 1 and Theorem 3, we are able to find a large bramble of depth two in time O(nc ) for a graph on n vertices and some absolute constant c. The second main step in the proof of Theorem 1 is to show how we can use such a bramble of depth two to find the desired solution to a given instance of the 12 kDDPP. Define a linkage to be a set of pairwise disjoint paths. We show in Section 5 that given an instance (G, S, T ) and a large bramble B of depth two, we can find a smaller, sub-bramble B 0 ⊆ B along with a linkage P of order k such that every element of P is a path from an element of S to a distinct subgraph in B 0 . Moreover, the linkage P is internally disjoint from B 0 . At the same time, we find a linkage Q from distinct subgraphs of B 0 to the vertices T . Thus, by linking the appropriate endpoints of Q and P in the bramble B 0 , we are able to find the desired solution to (G, S, T ). The fact that the bramble B 0 has depth two ensures that the solution we find uses each vertex at most twice. This result is given as Theorem 15; the statement and proof are presented in Section 5. Linking to a well-behaved structure (the bramble of depth two in the instance above) is a common technique in disjoint path and cycle problems in undirected graphs. See [6, 12] for examples. The main contribution of Theorem 15 is to extend the technique to directed graphs, and in particular, simultaneously find the linkage from S to B 0 and the linkage Q from B 0 to T . This is made significantly more difficult in the directed case by the directional nature of separations in directed graphs and the fact that there is no easy way to control how the separations between S and B 0 and those between B 0 and T cross. The proofs of Theorems 1 and 3 are given in Section 6 and the construction showing NP-completeness in Theorem 2 is given in Section 7. 2 Directed tree-width An arborescence is a directed graph R such that R has a vertex r0 , called the root of R, with the property that for every vertex r ∈ V (R) there is a unique directed path from r0 to r. Thus every arborescence arises from a tree by selecting a root and directing all edges away from the root. If r, r0 ∈ V (R) we write r0 > r if r0 6= r and there exists a directed path in R from r to r0 . If (u, v) ∈ E(R) and r ∈ V (R), we write r > (u, v) if r > v or r = v. Let G be a directed graph and Z ⊆ V (G). A set S ⊆ V (G) \ Z is Z-normal if there is no directed walk in G − Z with the first and last vertex in S which also contains a vertex of V (G) \ (S ∪ Z). Note that every Z-normal set is a union of strongly connected components of G − Z. Let G be a directed graph. A tree decomposition of G is a triple (R, β , γ), where R is an arborescence, 3 β : V (R) → 2V (G) and γ : E(R) → 2V (G) are functions such that: 1. {β (r) : r ∈ V (R)} is a partition of V (G) into non-empty sets and 2. if e ∈ E(R), then {β (r) : r ∈ V (R), r > e} is γ(e)-normal. The sets β (r) are called the bags of the decomposition and the sets γ(e) are called the guards of the decomposition. For any r ∈ V (R), we define Γ(r) := β (r) ∪ {γ(e) : e incident to r}. The width of (R, β , γ) is the smallest integer w such that |Γ(r)| ≤ w + 1 for all r ∈ V (R). The directed tree-width of G is the minimum width of a tree decomposition of G. Johnson, Robertson, Seymour, and Thomas showed that if we assume k and w are fixed positive integers, then we can efficiently resolve the kDDPP when restricted to directed graphs of tree-width at most w [4]. Theorem 4 ([4], Theorem 4.8). For all t ≥ 1, there exists a function f satisfying the following. Let k ≥ 1, and let (G, S, T ) be an k-linkage problem such that the directed tree-width of G is at most t. Then we determine if (G, S, T ) is integrally feasible and if so, output an integral solution, in time O(|V (G)| f (k) ). A simple construction shows that the same result holds to efficiently resolve k-linkage problems halfintegrally when k and the tree-width of the graph are fixed. We first define the following operation. To double a vertex v in a directed graph G, we create a new vertex v0 and add the edges (u, v0 ) for all edges (u, v) ∈ E(G), the edges (v0 , u) for all edges (v, u) ∈ E(G) and the edges (v, v0 ) and (v0 , v). Corollary 5. For all t ≥ 1, there exists a function f satisfying the following. Let k ≥ 1, and let (G, S, T ) be an instance of a k-linkage problem such that the directed tree-width of G is at most t. Given in input (G, S, T ) and a directed tree-decomposition of G of width at most t, we can determine if the problem is half-integrally feasible and if so, output a half-integral solution, in time O(|V (G)| f (k) ). Proof. Fix w ≥ 1 to be a positive integer. Let (G, S = (s1 , . . . , sk ), T = (t1 , . . . ,tk )) be an instance of a klinkage problem where G has tree-width at most w. Let G0 be the directed graph obtained by doubling every vertex v ∈ V (G). Define the k-linkage problem (G0 , S∗ = (s∗1 , . . . , s∗k ), T ∗ = (t1∗ , . . . ,tk∗ )) by letting s∗i = si and ti∗ = ti0 for 1 ≤ i ≤ k. Thus, (G, S, T ) is half-integrally feasible if and only if (G0 , S∗ , T ∗ ) is integrally feasible. Moreover, any integral solution to (G0 , S∗ , T ∗ ) can be easily converted to a half-integral solution for the original problem (G, S, T ). Let (R, β , γ) be a tree decomposition of G of width w. Observe that (R, β 0 , γ 0 ) defined by β 0 (r) = {{v, v0 } : v ∈ β (r)} and γ 0 (r) = {{v, v0 } : v ∈ γ(r)} yields a tree decomposition of G0 of width at most 2w. Thus, by Theorem 4, we can determine if (G0 , S∗ = (s∗1 , . . . , s∗k ), T ∗ = (t1∗ , . . . ,tk∗ )) is integrally feasible and find an solution when it is, in polynomial time assuming k and w are fixed, proving the claim. 3 Certificates for large directed tree-width A bramble in a directed graph G is a set B of strongly connected subgraphs B ⊆ G such that if B, B0 ∈ B, then V (B) ∩V (B0 ) 6= 0/ or there exists edges e, e0 ∈ E(G) such that e links B to B0 and e0 links B0 to B. A cover of B is a set X ⊆ V (G) such that V (B) ∩ X 6= 0/ for all B ∈ B. The order of a bramble is the minimum size of a cover of B. The bramble number, denoted bn(G), is the maximum order of a bramble in G. The elements of a bramble are called bags, and the size of a bramble, denoted |B|, is the number of bags it contains. 4 The bramble number of a directed graph gives a good approximation of the tree-width, as seen by the following theorem of [11] as formulated by [9]. Theorem 6 ([11],[9]). There exist constants c, c0 such that for all directed graphs G, it holds that bn(G) ≤ c · tw(G) ≤ c0 · bn(G). Johnson, Robertson, Seymour, and Thomas showed one can efficiently either find a large bramble in a directed graph or explicitly find a directed tree-decomposition. Note that the result is not stated algorithmically, but that the algorithm follows from the construction in the proof. Additionally, they looked at an alternate certificate of large tree-width, namely havens, but a haven of order 2t immediately gives a bramble of order t by the definitions. Theorem 7 ([4], 3.3). There exist constants c1 , c2 such that for all t and directed graphs G, we can algorithmically find in time |V (G)|c1 either a bramble in G of order t or a tree-decomposition of G of order at most c2t. Moreover, if we find the bramble, it has at most |V (G)|2t elements. A long open question of Johnson, Robertson, Seymour, and Thomas [4] was whether sufficiently large treewidth in a directed graph would force the presence of a large directed grid minor. Let r ≥ 2 be a positive integer. The directed r-grid Jr is the graph defined as follows. Let C1 , . . . ,Cr be directed cycles of length 2r. Let the vertices of Ci be labeled vi1 , . . . , vi2r for 1 ≤ i ≤ r. For 1 ≤ i ≤ 2r, i odd, let Pi be the directed 1 path v1i , v2i , . . . , vri . For 1 ≤ i ≤ 2r, i even, let Pi be the directed path vri , vr−1 i , . . . , vi . The directed grid Sr S2r Jr = 1 Ci ∪ 1 Pi . In a major recent breakthrough, Kreutzer and Kawarabayashi have confirmed the conjecture of Johnson et al. Theorem 8 ([9]). There is a function f : N → N such that given any directed graph and any fixed constant k, in polynomial time, we can obtain either 1. a cylindrical grid of order k as a butterfly minor, or 2. a directed tree decomposition of width at most f (k). For our purposes, we will use brambles when attempting to solve the 21 kDDPP. However, in order to ensure that the paths we find don’t use any vertex more than twice, we require the bramble to have depth two. Define the depth of a bramble B = {B1 , . . . , Bt } in a directed graph G to be the maxv∈V (G) |{i : v ∈ V (Bi )}|; in other words, a bramble has depth at most k for some positive integer k if no vertex is contained in more than k distinct subgraphs in the bramble. Note that if B has depth k and size t, then it has order at least dt/ke. Lemma 9. For all t ≥ 2, the directed t-grid contains a model of a bramble B of size t and depth two. Proof. Let the cycles C1 , . . . ,Ck , paths P1 , . . . , P2k , and vertex labels vij , 1 ≤ i ≤ 2k, 1 ≤ j ≤ k, be as in the definition of the cylindrical grid. For every l, 1 ≤ l ≤ k, and for every i, 1 ≤ i ≤ 2k, let Pi (l) be the subpath of Pi with endpoints v1i and vli . For 1 ≤ i ≤ k − 1, let Ci0 be the (unique) cycle in Ci ∪C1 ∪ P2i−1 (i) ∪ P2i (i) which contains all the vertices v1j , 1 ≤ j ≤ 2k. Let Ck0 = Ck . The cycles C10 , . . . ,Ck0 form a bramble of depth two and size k, as desired. 5 4 Finding a bramble of depth two In this section, we show that given what we call a sufficiently large well-linked set of vertices in a directed graph, we are able to efficiently find a large bramble of depth two. The argument in many ways follows Diestel et al’s proof of Robertson and Seymour’s grid theorem (see [2] for the proof) for undirected graphs. We begin with a collection of disjoint linkages and show that in each of the linkages we can find a sublinkage which are pairwise disjoint. We will need two classic results in graph theory, namely Ramsey and Menger’s theorems. Theorem 10 (Menger’s theorem [10]). Let G be a directed graph and S, T subsets of V (G). The maximum number of vertex-disjoint S − T paths equals the minimum order of a separation which separates S from T . Moreover, there exists an algorithm to find a maximum set of vertex-disjoint S − T paths and a minimum order separation in time O(|V (G)|2 ). Theorem 11 (Ramsey’s theorem). Let r,t be positive integers. For every (improper) two coloring of the edges of the undirected clique K2r+t by red and blue, there exists either a subgraph Kr with every edge is colored red or a subgraph Kt with every edge colored blue. Moreover, the desired Kr or Kt subgraph can be found in time O(kc ) for some absolute constant c. We first give two preparatory lemmas before presenting the main result of this section. Lemma 12. Let G be a digraph on n vertices and let t, k ≥ 2 be positive integers. Let T = (10k)22(t+k) . Let X = {x1 , x2 , . . . , xT } and Y = {y1 , y2 , . . . , yT } be two disjoint sets of vertices of order T . Let P = {P1 , P2 , . . . , PT } be a linkage from X to Y and Q = {Q1 , Q2 , . . . , QT } a linkage from Y to X, each of size T . Assume each Pi has endpoints xi and yi and assume that there exists a permutation π of [T ] such that Qi has endpoints yi and xπ(i) . Then one of the following holds: 1. there exist B1 , . . . , Bt subgraphs of G forming a bramble of size t and depth two, or 2. there exists a subset J ⊆ [T ] with |J| = k such that the subgraphs Pj ∪ Q j ∪ Pπ( j) ∪ Qπ( j) ∪ Pπ(π( j)) are pairwise disjoint for all j ∈ J. Moreover, given G, P, and Q in input, we can find either B1 , . . . , Bt or J in time O(nc ) for some absolute constant c. Proof. Define an auxiliary undirected bipartite graph H with vertex set x1 , x2 , . . . , xT , y1 , y2 , . . . , yT and edges xi yi and xπ(i) yi for all 1 ≤ i ≤ T . Thus, H is the union of two perfect matchings and each component is either S S → − a cycle or a single edge. For any induced subgraph C of H, let C = i:xi yi ∈E(C) Pi ∪ i:xπ(i) yi ∈E(C) Qi . Note → − that if C is a connected component of H, then C is a strongly connected subgraph of G. Assume, as a case, that there are at least T 0 = 2k+t distinct components C1 , . . . ,CT 0 . By Theorem 11, there exists I ⊆ [T 0 ] such that one of the following holds: → − • |I| = t and the subgraphs Ci pairwise intersect for i ∈ I, or → − • |I| = k and the subgraphs Ci are pairwise disjoint for i ∈ I. 6 Moreover, we can find I in time O(nc ). → − In the first case, we claim that {Ci : i ∈ I} form a bramble of depth two; clearly by construction, the sets → − {Ci : i ∈ I} form a bramble. To see that it has depth two, observe that Q and P are both linkages and given → − the fact that for any vertex v such that v is contained in V (Ci ), it must be the case that v is contained in some → − → − → − P ∈ P or Q ∈ Q which is a subpath of Ci . As the set elements of P and Q forming Ci and C j are disjoint → − → − for all i 6= j, at most two Ci and C j can intersect in the vertex v. Thus the bramble is of depth two. → − In the second case, for every i ∈ I, we fix j = j(i) such that Pj is contained in Ci . It follows that J = { j(i) : i ∈ I} satisfies outcome 2 in the statement of the lemma. We conclude that there are at most 2k+t distinct components, and thus, there exists a component C of size at least (10k) · 2k+t . Let P1 , . . . , P2k+t be disjoint paths in C, each of length at least 10k. Assume that there exists an index i, 1 ≤ i ≤ 2k+t such that for all edges e and f in E(Pi ) at distance at least → − − six, → e ∩ f = 0. / Fix pairwise disjoint subpaths P10 , . . . , Pk0 of P, such that − • for 1 ≤ i ≤ k, the path Pi0 has length five and contains exactly three edges e such that → e ∈ P; • for 1 ≤ i < i0 ≤ k, Pi0 and Pi00 are at distance at least five. By our assumption on Pi , the fact that each Pi0 starts and ends with an edge corresponding to a path in P, → − → − and the fact that the elements of P are pairwise disjoint, it follows that for all 1 ≤ i < i0 ≤ k, Pi0 ∩ Pi00 = 0, / as in the outcome 2 of the lemma. We conclude that for all 1 ≤ i ≤ 2k+t , the subgraph Pi has two edges at distance at least six such that their corresponding paths in P ∪ Q intersect. It follows that there exists a five edge path Pi0 of Pi containing three → − − edges e such that → e ∈ P and a strongly connected subgraph Hi of G containing Pi0 . By the same Ramsey argument as above applied to the subgraphs H1 , . . . , H2k+t , we see that one of the desired outcomes holds for G. A subset X ⊆ V (G) of vertices of a directed graph G is well-linked if for any pair of subsets U1 ,U2 ⊆ X with |U1 | = |U2 |, there exists a directed U1 to U2 linkage of order |U1 |. Lemma 13. Let X be a well-linked set in a directed graph G on n vertices. Let k,t ≥ 2 be positive integers. Let X1 , X2 ,Y1 ,Y2 ⊆ X be pairwise disjoint subsets of X. Let P be a linkage of order 2k 2T from X1 to X2 where T = (10t)24t . Let R be a linkage of order 2k 2T from Y1 to Y2 . Then one of the following holds: 1. there exist P 0 ⊂ P and R 0 ⊂ R with |P 0 | = |R 0 | = k such that for all P ∈ P 0 and R ∈ R 0 , it holds that P ∩ R = 0, / or 2. there exists B1 , . . . , Bt forming a bramble of size t and depth two. Moreover, we can find the linkages satisfying outcome 1 or the bramble in 2 in time O(nc ) for some absolute constant c. Proof. By Theorem 11, we may assume that there exist P 0 ⊆ P and R 0 ⊆ R, each of order T such that every element of P 0 intersects every element of R 0 . By the definition of well-linked set, there exists a 7 linkage Q X from X2 ∩V (P 0 ) to X1 ∩V (P 0 ) and similarly, a linkage QY from Y2 ∩V (R 0 ) to Y1 ∩V (R 0 ). By Theorem 10, we can find the linkages Q X and QY in time O(n2 ). Label the elements of R 0 as R1 , . . . , RT and the elements of P 0 as P1 , . . . , PT . Let πX and πY be two permutations of [T ] such that we can label the elements of Q X and QY as QX1 , . . . , QXT and QY1 , . . . , QYT such that QXi has a common endpoint with Pi in X2 and a common endpoint with PπX (i) in X1 . Similarly, QYi has a common endpoint with Ri in Y2 and a common endpoint with RπY (i) in Y1 . Apply Lemma 12 to the linkages P1 , . . . , PT and QX1 , . . . , QXT . We may assume that we get outcome 2 in the lemma. Without loss of generality, we may assume that πX (i) = i + 1 for 1 ≤ i ≤ 3k − 1 and that the subgraphs P3 j+1 ∪ QX3 j+1 ∪ P3 j+2 ∪ QX3 j+2 ∪ P3 j+3 are pairwise disjoint for 0 ≤ j ≤ k − 1. Similarly, by applying Lemma 12 to R1 , . . . , RT and QY1 , . . . , QYT that πY (i) = i + 1 for 1 ≤ i ≤ 3k − 1 and that the subgraphs R3 j+1 ∪ QY3 j+1 ∪ R3 j+2 ∪ QY3 j+2 ∪ R3 j+3 are pairwise disjoint for 0 ≤ j ≤ k − 1. Since for all 0 ≤ j ≤ k − 1, the paths P3 j+3 intersects R3 j+1 and R3 j+3 intersects P3 j+1 , we conclude that the subgraph P3 j+1 ∪ Q3 j+1 ∪ P3 j+2 ∪ Q3 j+2 ∪ P3 j+3 ∪ R3 j+1 ∪ QY3 j+1 ∪ R3 j+2 ∪ QY3 j+2 ∪ R3 j+3 contains a strongly connected subgraph B j which contains both P3 j+2 and R3 j+2 . Since every Pi intersects every Ri0 , we have that {B0 , . . . , Bk−1 } forms a bramble of size k and depth two, as required. We now show the main result of the section which is that given a sufficiently large well-linked set, we can efficiently find a large bramble of depth two. Theorem 14. There exists a function f which satisfies the following. Let G be a directed graph on n vertices and t ≥ 1 a positive integer. Let P be a directed path and X ⊆ V (P) a well-linked set with |X| ≥ f (t). Then G contains a bramble B = B1 , . . . , Bt of depth two. Moreover, given G, P, and X in input, we can find B in time O(nc ) for some absolute constant c. 4t Proof. For a given k ≥ 1, let ft (k) = 2k 2(10t)2 . We will use the notation ftl (k) for the function ft iterated l times, beginning with input k, i.e. ft ( ft ( ft (. . . ( ft (k)) . . . ))). Let T = 22t . Fix pairwise disjoint subsets Xiin , Xiout for 1 ≤ i ≤ T 2 in X such that there exist subpaths P1 , . . . , PT 2 of P which satisfy the following: • for all 1 ≤ i < j ≤ T 2 , Pi ∩ Pj = 0; / • for all i, Xiin ∪ Xiout ⊆ V (Pi ) and traversing the directed path Pi , the vertices of Xiin occur before the vertices of Xiout . Moreover, we pick Xiin , Xiout , 1 ≤ i ≤ T 2 such that 8 |Xiin |, |Xiout | ≥ ftT (2). 8 By assuming that the function f in the statement of the theorem satisfies f (t) ≥ T 4 ftT (2), we see that such Xiin , Xiout exist. 8 For all 1 ≤ i ≤ T 2 , 1 ≤ j ≤ T 2 , i 6= j, fix a directed linkage Q(i, j) from Xiout to X jin of order ftT (1). By Theorem 10, we can find such linkages Q(i, j) in time O(T 4 n2 ). Fix a enumeration of A := {((i, j), (i0 , j0 )) : 1 ≤ i, i0 , j, j0 ≤ T 2 , i 6= j, i0 6= j0 } and let α = |A| = T 8 − 2T 6 + T 4 . For 0 ≤ l ≤ α, we define linkages 8 Q(i, j)l ⊆ Q(i, j) of order ftT −l (1) as follows. Let Q(i, j)0 = Q(i, j). For l = 1, . . . , α, let ((i, j), (i0 , j0 )) be the l th pair in A. Apply Lemma 13 to the linkages Q(i, j)l−1 and Q(i0 , j0 )l−1 . We may assume that there exist 8 8 disjoint sublinkages of Q(i, j)l−1 and Q(i0 , j0 )l−1 , each of size ftT −l (1). Call them Q(i, j)l and Q(i0 , j0 )l , respectively. For (i00 , j00 ) distinct from (i, j) and (i0 , j0 ), fix Q(i00 , j00 )l to be an arbitrary subset of Q(i00 , j00 )l−1 8 of order ftT −l (1). We fix Q(i, j) to be an element of the linkage Q(i, j)α . By construction, the paths Q(i, j) and Q(i0 , j0 ) are disjoint if (i, j) 6= (i0 , j0 ). Define strongly connected subgraphs Ci and Ri for 1 ≤ i ≤ T as follows. Fix i, 1 ≤ i ≤ T . The subgraph S −1 Ci = Tj=0 Q(i + jT, i + ( j + 1)T ) along with the subpath of Pi+ jT linking endpoints of Q(i + ( j − 1)T, i + jT ) and Q(i + jT, i + ( j + 1)T ) for 0 ≤ j ≤ T − 1 where the values are taken modulo T 2 . Similarly, we define S −1 Ri = Tj=1 Q(iT + j, iT + j + 1) ∪ Q(iT + T, iT + 1) along with the subpaths of PiT + j linking the endpoints of Q(iT + j − 1, iT + j) and Q(iT + j, iT + j + 1) for 2 ≤ j ≤ T − 1 along with the analogous subpaths of PiT +1 and PiT +T . If we think of the paths Pi laid out in a T × T grid, the subgraphs C j are the natural strongly connected graphs formed by following the Q(i0 , j0 ) through a column of the grid, and the R j are the strongly connected graphs formed by the rows. Every vertex in one of the subgraphs Ci is either in a path Q(i0 , j0 ) or Pl 0 ; moreover, the subset of Pl 0 contained in Ci are disjoint from those contained in Ci00 for i0 6= i00 . Thus, it is possible that two Ci and Ci0 intersect in a vertex, but not for three distinct Ci , Ci0 and Ci00 to all intersect in a common vertex. By Theorem 11, there exists I ⊆ [T ] of size t such that for i, i0 ∈ I, either Ci intersect or they are pairwise disjoint. By the above observation, if they are pairwise intersecting, then {Ci : i ∈ I} forms a bramble of size t and depth two. Thus, we may assume that Ci ∩Ci0 = 0/ for all distinct i, i0 ∈ I. Similarly, there exists J ⊆ [T ], |J| = t such that for all distinct j, j0 ∈ J, R j ∩ R j0 = 0. / Without loss of generality, assume that I = J = [t]. The set {Ci ∪ Ri : i ∈ [t]} then forms a bramble of size t and depth two, completing the proof. 5 Linking in a bramble of depth two The main result of this section is the following which shows that if we have a sufficiently large bramble of depth two, we can use it to efficiently resolve a given instance of the 12 kDDPP under a modest assumption on the connectivity of the graph. Theorem 15. For all k ≥ 1, there exists a positive integer t such that if G is a (36k3 + 2k)-strongly connected directed graph, and G contains a bramble B of depth two and size t, then for every k-linkage problem instance (G, S, T ) is half-integrally feasible. Moreover, given (G, S, T ) and the bags of B, we can find a solution in time O(k4 n2 ). We begin with some notation. Recall that the doubling of a vertex in a directed graph was defined in Section 2. To contract a set of vertices U inducing a strongly connected subgraph of G is to delete U and create a new vertex v, then add edges (w, v) for all edges (w, u) ∈ E(G) with u ∈ U, w ∈ / U and edges (v, w) for all edges (v, u) ∈ E(G) with u ∈ U, w ∈ / U. Let B be a depth two bramble in a directed graph G and B1 ⊆ B. Define the graph G(B1 ; B) as follows: First, let G0 be the graph obtained from G by doubling every vertex belonging to two bags of B and to at least one bag of B1 . For each such vertex v, denote its double by v0 . Let B 0 be the collection of |B1 | subsets of V (G0 ) obtained from B1 by replacing each vertex v belonging to a bag of B with v0 in exactly one of the bags it belongs to. Thus, the elements of B 0 are pairwise disjoint and each induces a strongly connected subgraph of G0 , so B 0 is a depth 1 bramble in G0 . Let G(B1 ; B) be the graph obtained from G0 by contracting each element of B 0 . Denote by KB1 the set of contracted vertices in G(B1 ; B); note that the vertices of KB1 form a bidirected clique. Observe that every double of a vertex of G0 gets contracted, so 9 V (G(B1 ; B)) \ KB1 ⊆ V (G). For a vertex v ∈ KB1 , we write im(v) for the bag of B1 corresponding to the vertices contracted to v. We stress that each im(v) is a bag of B1 ; in particular im(v) ⊆ V (G). Let S, T be disjoint subsets of the vertices of a directed graph G. A separation (A, B) separates S from T if S ⊆ A and T ⊆ B. The separation (A, B) properly separates S from T if S \ B and T \ A are both nonempty. For a positive integer α, we say S is α-connected to T if every separation separating S from T has order at least α. Let G be a directed graph, and B 0 ⊆ B be brambles of depth two. Let X ⊆ V (G(B 0 ; B)) \ KB0 . We say a X − KB0 or KB0 − X linkage P1 , . . . , P|X| is B-minimal if none of the paths contains internally a vertex in KB0 or in im(v) for some v ∈ KB \ ∪i Pi . We now give a quick outline of how the proof will proceed. Let us denote S = (s1 , . . . , sk ) and T = (t1 , . . . ,tk ). Our approach to proving half-integral feasability is in two steps. We find three sets of paths, one set of k paths linking S to the bramble B, another set linking B to T , and a third linking the appropriate ends of paths in the first two sets to each other inside of B. To get the first two sets of paths, we take advantage of the high connectivity of the graph. Linking half-integrally inside of the bramble is easy, and its structure allows us to link any pairs of vertices we like half-integrally. We need the union of the three sets of paths to form a half-integral solution, so we will choose the first and second sets each to be (almost) vertex-disjoint, and to intersect the bramble B in a very limited way. The third set of paths will be half-integral and completely contained in B. The underlying idea behind our approach to finding the first two sets of paths is to contract each bag of the bramble (after doubling vertices in two bags) and try to apply Menger’s theorem. In trying to do this, some issues arise. First, we want the ends of all 2k paths to belong to distinct bags of B. More concerningly, contracting the bags of the bramble may destroy the connectivity between the bramble and the terminals S and T . We solve this by throwing away a bounded number of bags from the bramble until we are left with a sub-bramble that is highly connected to S and from T . In Subsection 5.1, we will show how to find the first two sets of paths (Lemma 16), modulo finding the sub-bramble (Lemma 17), and the third set of paths (Lemma 18). Then we show how to put these pieces together to prove Theorem 15. In Subsection 5.2 we prove Lemma 17. 5.1 Linking into and inside of a depth two bramble Lemma 16. Let G be a (36k3 + 2k)-strongly connected directed graph and B be a bramble of depth two and size > 188k3 in G. Let (G, S = (s1 , . . . , sk ), T = (t1 , . . . ,tk )) be a k-linkage problem instance. Then we can find paths P1s , . . . , Pks , P1t , . . . , Pkt and B 0 ⊆ B satisfying the following: A1 : For each i, Pis is a directed path from si to some vertex s0i , and Pit is a directed path from some vertex ti0 to ti . A2 : The vertices s01 , . . . , s0k ,t10 , . . . ,tk0 belong to distinct bags of B 0 , say Bs1 , . . . , Bsk , Bt1 , . . . , Btk , respectively. A3 : Every vertex belongs to at most two of P1s , . . . , Pks , and if a vertex v does belong to two paths, say Pis and Pjs (i 6= j), then v = s0i or v = s0j . A4 : Similarly, every vertex belongs to at most two of P1t , . . . , Pkt , and if a vertex v does belong to two paths, say Pit and Ptj (i 6= j), then v = ti0 or v = t 0j . A5 : For each i, the internal vertices of Pis and of Pit belong to at most one bag of B 0 . 10 A6 : For each i, j, ` all distinct , Pis ∩ Ptj ∩ (Bs` ∪ Bt` ) = 0. / A7 : Every vertex belongs to at most two of P1s , . . . , Pks , P1t , . . . , Pkt . Moreover, given the bags of B, we can find the paths P1s , . . . , Pks , P1t , . . . , Pkt in time O(k4 n2 ). We will prove the following lemma as an intermediate step to Lemma 17 in Section 5.2. Lemma 17. Let G be a (36k3 + 2k)-strongly connected directed graph and B be a bramble of depth two and size > 188k3 in G. Let (G, S, T ) be a k-linkage problem instance. Assume B is disjoint from {si ,ti ; 1 ≤ i ≤ k}. Then there exist brambles BS and BT with BT ⊆ BS ⊆ B such that S is (36k3 + 2k)-connected to KBS in G(BS ; B) and T is 3k-connected to KBT in G(BT ; BS ). Also |BS | − |BT | < 36k3 . Moreover we can find BS and BT in time O(k4 n2 ). But first, let’s see how Lemma 17 implies Lemma 16. Proof of Lemma 16. Consider the brambles BS and BT given by Lemma 17. Denote by W the vertices in G(BT ; B) that belong to exactly one bag in BT and to two bags in BS . Claim. There exist k vertex-disjoint paths P1 , . . . , Pk in G(BT ; B) \ W where Pi links si to vi , for some vi ∈ KBT . Suppose not; then by Menger’s theorem there exists a separation (A, B) of order < k in G(BT ; B) \ W separating S from KBT . But then consider the following separation in G(BS ). Let A0 = (A ∩V (G(BS ; B))) ∪ {v ∈ KBS : im(v) ∩ A 6= 0} / ∪ (KBS \ KBT ) and B0 = (B ∩V (G(BS ; B))) ∪ {v ∈ KBS : im(v) ∩ B 6= 0} / ∪ (KBS \ KBT ). Intuitively, (A0 , B0 ) is the separation (A, B) viewed in the graph G(BS ; B), plus we add the vertices of KBS \ KBT to each side. It’s easy to check that (A0 , B0 ) is a separation in G(BS ; B), since every vertex in V (G(BT ; B)) \V (G(BS ; B)) belongs to im(v) for some v ∈ KBS . Also, we have |A0 ∩ B0 | ≤ 2|A ∩ B| + 36k3 because every vertex belongs to at most two bags of BS and every vertex in W belongs to one bag of BS \BT . But this contradicts Lemma 17 and proves the claim. Choose the paths P1 , . . . , Pk so that they are BT -minimal in G(BT ; B). Let us now view these as paths in the original graph G: Since V (G(BT ; B)) \ KBT ⊆ V (G), each vertex in Pi except vi is a vertex of G, for each 1 ≤ i ≤ k. So choose s0i ∈ im(vi ) such that there exists an edge from the second to last vertex of Pi to s0i . Then let Pis be the path obtained from Pi by replacing vi with s0i . Notice that Pis is a path in G. The paths P1s , . . . , Pks are internally disjoint, so they satisfy A3 . Claim. There exist vertex-disjoint paths Q1 , . . . , Qk in G(BT ; BS ) \ {v1 , . . . , vk , s01 , . . . , s0k } where Qi links wi to ti for some wi ∈ KBT . Moreover, the vertices v1 , . . . , vk , w1 , . . . , wk are distinct. Suppose not; then by Menger’s theorem, in the graph G(BT ; BS ) \ {v1 , . . . , vk , s01 , . . . , s0k } there is a separation (A, B) of order < k properly separating KBT from T . But then (A ∪ {v1 , . . . , vk , s01 , . . . , s0k }, B ∪ {v1 , . . . , vk , s01 , . . . , s0k }) has order < 3k and properly separates KBT from T in G(BT ; BS ), contradicting Lemma 17. This proves the claim. 11 We may also choose the paths Q1 , . . . , Qk to be BT -minimal in G(BT ; BS ). Viewing these paths as paths in G as above (symmetrically), we obtain paths P1t , . . . , Pkt , with Pit joining ti0 to ti . These paths satisfy A4 . Let B 0 = {im(v) : v ∈ {v1 , . . . , vk , w1 , . . . , wk }}. For each i, set Bsi = im(vi ) and Bti = im(wi ). We now check that the paths P1s , . . . , Pks , P1t , . . . , Pkt satisfy the seven assertions in the lemma statement. A1 , A2 , A3 and A4 have already been established. To see that A5 holds, note that each of P1 , . . . , Pk is internally disjoint from KBT in G(BT ; B). Similarly, the Q1 , . . . , Qk paths are internally disjoint from KBT in G(BT ; BS ). Moreover, by the definition of G(BT ; B) and G(BT ; BS ), every vertex not in KBT in either of those graphs belongs to at most one bag of BT and therefore to at most one bag of B 0 . It follows that for each i, each internal vertex of Pis and Pit belongs to at most one bag of B 0 , proving A5 . To see A6 , let 1 ≤ i, j, ` ≤ k be distinct. Suppose for contradiction that some vertex v belongs to Pis ∩ Ptj ∩ (Bs` ∪ Bt` ). If v is an internal vertex of either Pis or Ptj then v belongs to only one bag of B 0 by A5 . Also, if v = s0i or t 0j then v belongs to two bags of B 0 . We deduce that v is an internal vertex of both Pis and Ptj . Since we found Pi in the graph G(BT ; B) \W , we know v ∈ / W so v belongs to one bag in BT and one bag of BS . But we found Q j in the graph G(BT ; BS ), so v belongs to one bag of BT and two bags of BS . This is a contradiction, proving A6 . Finally, let us check A7 . Suppose for contradiction’s sake that some vertex v ∈ V (G) belongs to three paths. By A3 and A4 , we must have v ∈ Pis ∩ Pjs ∩ P`t or v ∈ Pit ∩ Ptj ∩ P`s for some 1 ≤ i, j, ` ≤ k. If v ∈ Pis ∩ Pjs ∩ P`t , then by A3 we may assume without loss of generality that v = s0i . But the path Q` was found in a graph not containing vi or s0i , so we must have s0i ∈ Bt` ∩ Bsi . Since B 0 is depth two, v ∈ / Bsj so v is an internal vertex s t t s of Pj , contradicting A5 . If v ∈ Pi ∩ Pj ∩ P` , then without loss of generality v = ti0 ∈ Bti = im(wi ). By the BT -minimality of P1 , . . . , Pk , v cannot be an internal vertex of P` so we have v = s0` ∈ Bs` . Since v belongs to two bags, A5 implies that v = t 0j , a contradiction. It remains to check that we can indeed find these paths in time O(k4 n2 ). Indeed finding the brambles BS and BT takes time O(k4 n2 ) using Lemma 17. Then, the sets of paths P1 , . . . , Pk and Q1 , . . . , Qk can be found in time O(n2 ) according to Theorem 10, and from these we can easily get P1s , . . . , Pks , P1t , . . . , Pkt in linear time. The following lemma shows how to solve any linkage problem half-integrally in a depth two bramble, provided the terminals belong to distinct bags. Lemma 18. For all k ≥ 2, let G be a directed graph and let S0 = (s01 , . . . , s0k ) and T 0 = (t10 , . . . ,tk0 )) be two ordered k-tuples of vertices in G. Suppose B is a bramble of depth two in G, and s01 , . . . , s0k ,t10 , . . . ,tk0 belong to distinct bags Bs1 , . . . , Bsk , Bt1 , . . . , Btk , respectively of B. Then there exist paths P1 , . . . , Pk such that Pi links s0i to ti0 and, additionally, every vertex of G is in at most two distinct paths Pi . Finally, it also holds that Pi ⊆ Bsi ∪ Bti for each i, and we can find the paths P1 , . . . , Pk in time O(kn2 ). Proof. For each i, we obtain Pi as follows. By the definition of a bramble, there exist vertices vi ∈ Bsi and wi ∈ Bti with either vi = wi or (vi , wi ) ∈ E(G). Since Bsi and Bti are both strongly connected, there exist a directed path from s0i to vi contained in Bsi and a directed path from wi to ti0 contained in Bti . Take Pi to be the concatenation of these two paths. By construction, each Pi belongs to Bsi ∪ Bti . Further, since the bags Bs1 , . . . , Bsk , Bt1 , . . . , Btk are distinct, and every vertex in G belongs to at most two distinct bags, it follows that P1 , . . . , Pk is the desired collection of paths. Each Pi can be found in time O(n2 ), and so the overall running time of O(kn2 ) follows. 12 We can deduce Theorem 15 from Lemmas 16 and 18 as follows. Proof of Theorem 15. Let P1s , . . . , Pks , P1t , . . . , Pkt and s01 , . . . , s0k ,t10 , . . . ,tk0 and B 0 = Bs1 , . . . , Bsk , Bt1 , . . . , Btk satisfy A1 - A7 , as given by Lemma 16. By A2 , G, S0 = (s01 , . . . , s0k ) and T 0 = (t10 , . . . ,tk0 )) satisfying the hypothesis of Lemma 18. Let P1 , . . . , Pk be the paths guaranteed by that lemma. For each 1 ≤ i ≤ k, let Qi = Pis Pi Pit be the concatenation of these three paths. Clearly, each Qi is a directed walk linking si to ti and therefore contains a directed path from si to ti . We just need to check that the k paths are half-integral. Suppose for contradiction’s sake that some vertex v ∈ Qi ∩ Q j ∩ Q` for some 1 ≤ i, j, ` ≤ k all distinct. By symmetry, we can consider four cases. Case 1: v ∈ Pi ∩ Pj . Then, by Lemma 18, v ∈ (Bsi ∪ Bti ) ∩ (Bsj ∪ Btj ), so v belongs to two bags of B 0 . Then by A5 v is not an internal vertex of P`s or P`t , a contradiction. Case 2: v ∈ Pis ∩ Pjs ∩ P` . By A3 in Lemma 16, we may assume v = s0i , so v ∈ Pi . Since v ∈ P` , it follows v ∈ Bsi ∩ (Bs` ∪ Bt` ). By A5 , v is not an internal vertex of Pjs , so v ∈ Bsj as well, a contradiction. Case 3: v ∈ Pit ∩ Ptj ∩ P` . By A4 in Lemma 16, we may assume v = ti0 , so v ∈ Pi . Again, since v ∈ P` , it follows v ∈ Bti ∩ (Bs` ∪ Bt` ). By A5 , v is not an internal vertex of Ptj so v ∈ Bsj as well, a contradiction. Case 4: v ∈ Pis ∩ Ptj ∩ P` . By Lemma 18 P` ⊆ (Bs` ∩ Bt` ), but this contradicts A6 . By A6 v ∈ / Bs` ∩ Bt` so v ∈ / P` , a contradiction. The running time bound of O(k4 n2 ) follows from the bounds given by Lemmas 16, 17 and 18. 5.2 Finding a bramble to link to In this section we prove Lemma 17. We will need the following easy combinatorial lemma. Lemma 19. For k ≥ 1, let A be a set of k elements and suppose A1 , . . . , Ak+1 are proper subsets of A. Then there exist i 6= j with Ai ∪ A j 6= A. Proof. We prove the lemma by induction on k. The base case k = 1 is trivial. Assume that the lemma holds for k − 1, we will show it must also hold for k. Let A and A1 , . . . , Ak+1 be as in the lemma statement. Choose an element v ∈ A so that (possibly after relabelling) A1 \ {v}, . . . , Ak \ {v} are proper subsets of A \ v. By induction, there exist i 6= j with (Ai ∪ A j ) \ {v} 6= A \ {v}. We deduce that Ai ∪ A j 6= A. We will actually prove Lemma 17 one side at a time, applying the following lemma and then a symmetric version of it. Lemma 20. Let k, α, β be integers with β ≥ α ≥ k. Suppose (G, S = (s1 , . . . , sk ), T = (t1 , . . . ,tk )) is a klinkage problem instance where G is a β -strongly connected directed graph and B be a bramble of depth two and size > 4kα 2 in G. Assume B is disjoint from {si ,ti ; 1 ≤ i ≤ k}. Then there exists a bramble BS ⊆ B such that S is α-connected to KBS in G(BS ; B). Also |B| − |BS | < 4kα 2 . Moreover we can find BS in time O(kαn2 ). 13 Proof of Lemma 17. Assume G is (36k3 + 2k)-strongly connected and B is a bramble of depth two and size > 188k3 in G. By Lemma 20, there is a bramble BS ⊆ B such that S is (36k3 + 2k)-connected to KBS in G(BS ; B). We have |BS | > 188k4 − (144k3 + 8k2 ) > 36k3 . With a proof symmetric to that of Lemma 20, one can show that there exists a bramble BT ⊆ BS such that T is 3k-connected to KBT in G(BT ; BS ). Moreover |BS | − |BT | < 36k3 . The running time of O(k4 n2 ) follows from the running time bound given in Lemma 20. Proof of Lemma 20. Let G0 = G(B; B) and let K0 = KB be the clique of contracted vertices in G0 . Set M = 2kα. To find the bramble BS we are looking for, we will generate a sequence of brambles, each contained in the previous one, until we find one that S is sufficiently highly connected to for our purposes. Consider Algorithm 1, a procedure to find the sequence of brambles B ⊇ B1 ⊇ · · · ⊇ BM and graphs G1 , . . . , GM = G(B1 ; B), . . . , G(BM ; B), as well as separations (A0i , B0i ) and (Ai , Bi ) separating S from the bramble in the graphs Gi−1 and Gi , respectively. Algorithm 1: Generating the brambles B1 , . . . , BM 1 2 3 4 5 6 7 8 9 10 for i = 1 to M − 1 do Let (A0i , B0i ) be the separation in Gi−1 that properly separates S from Ki−1 of minimum order. Ci ←− Ki−1 ∩ (A0i ∩ B0i ). Ki ←− Ki−1 \Ci . Ci ←− {im(v) : v ∈ Ci }. Bi ←− Bi−1 \ Ci . Gi ←− G(Bi ; B). Ai ←− (A0i \Ci ) ∪ (∪C∈Ci C). Bi ←− (B0i \Ci ) ∪ (∪C∈Ci C). end We remark that for each i (A0i , B0i ) is a separation in the graph Gi−1 while (Ai , Bi ) is a separation in Gi . Obesrve that (A0i , B0i ) properly separates S from Ki−1 and (Ai , Bi ) properly separates S from Ki . Observe also that Ai ∩ Bi is disjoint from Ki . Our main claim is the following. Claim 1. For some 1 ≤ m ≤ M, the separation (A0m , B0m ) has order at least α. Let’s first check that Claim 1 implies the lemma. Using Algorithm 1, we can find Gm−1 and the separation (A0m , B0m ) given by Claim 1 in time O(Mn2 ) = O(kαn2 ). Take BS = Bm−1 . In each loop of Algorithm 1, we remove less than 2α bags from the bramble. It follows that |Bm−1 | > |B| − 2Mα ≥ |B| − 4kα 2 . To prove Claim 1 we need the following intermediate claim. Suppose for the sake of contradiction that |A0m ∩ B0m | < α for each 1 ≤ m ≤ M. Claim 2. We can find indices 1 ≤ i < j ≤ M with 1. A0j ∩ B0j ∩C = 0, / for each C ∈ Ci and with 2. (Ai ∩ A0j ) \ (Bi ∩ B0j ) nonempty. 14 Proof. We first obtain a set of k + 1 indices J ⊂ [M] such that for each i < j ∈ J we have A0j ∩ B0j ∩C = 0, / for each C ∈ Ci . Algorithm 2 gives a procedure to find J. Algorithm 2: Generating the set J 1 2 3 4 5 6 7 J1 ←− {M} M1 ←− [M] \ (J1 ∪ {i : ∃C ∈ Ci with A0M ∩ B0M ∩C 6= 0}) / for i=2 to k do Ji ←− Ji−1 ∪ {max ` : ` ∈ Mi−1 } Mi ←− Mi−1 \ (Ji ∪ {i : ∃C ∈ Ci with A0` ∩ B0` ∩C 6= 0/ for some ` ∈ Ji }) end J = Jk+1 ←− Jk ∪ {max ` : ` ∈ Mi−1 } Let us first check that J is well-defined. Observe that |M1 | > M − 2α, since the sets {C` : ` ∈ [M]} correspond to distinct sets of bags of B and no vertex of A0M ∩ B0M belongs to more than two bags. (Recall that |A0M ∩ B0M | < α.) Similarly |Mi | ≥ |Mi−1 | − 2α for each i ≥ 2. Since M = 2kα, we have |Mk | > M − 2kα ≥ 1. Thus |J| = k + 1. Now let us check that any pair of indices i < j ∈ J satisfies the first property in the claim, that is that A0j ∩ B0j ∩ C = 0/ for each C ∈ Ci . We will show this holds for J1 , . . . , Jk+1 = J inductively. Since |J1 | = 1, the base case holds trivially. Assuming the property holds for J`−1 , let us show it holds for J` . Observe that M`−1 ⊂ M`−2 ⊂ · · · ⊂ M. The unique element i ∈ J` \ J`−1 is the smallest index in J` , so we just need to show that for each j ∈ J`−1 we have A0j ∩ B0j ∩C = 0/ for each C ∈ Ci . But i ∈ M j−1 for each j so this is true by the choice of i. Now, we want two indices i < j ∈ J satisfying the second property in the claim. For each ` ∈ J, recall that S ⊆ A0` and S ⊆ A` and that S ∩ A0` ∩ B0` = S ∩ A` ∩ B` 6= S. It follows from Lemma 19 that there exist indices i < j with (S ∩ Ai ∩ Bi ) ∪ (S ∩ A0j ∩ B0j ) 6= S. Since S ⊆ Ai ∩ A0j , it follows that (Ai ∩ A0j ) \ (Bi ∩ B0j ) nonempty. This proves Claim 2. We can now prove Claim 1. Proof of Claim 1. Recall our assumption that |A0m ∩ B0m | < α for each 1 ≤ m ≤ M. Fix i and j as in Claim 2. The separation (A0j , B0j ) is a separation in G j−1 . Let Āi = Ai and let B̄i = Bi \(K j \Ki )∪{C : C ∈ C` : i < ` < j}. Observe that (Āi , B̄i ) is also a separation in G j−1 and (Āi ∩ B̄i ) does not meet K j−1 . Further, since each C ∈ Ci is strongly connected and meets B0j and, by the choice of i and j, doesn’t meet A0j ∩ B0j , we have that each C ∈ Ci belongs to B̄i \ A0j . This implies that (Āi ∩ B̄i ) ∩ A0j = (Ai ∩ Bi ) ∩ A0j = (A0i ∩ B0i ) ∩ A0j . Similarly, (A0j ∩ B0j ) \ B̄i = (A0j ∩ B0j ) \ Bi = (A0j ∩ B0j ) \ B0i . Now, Āi ∩ A0j ⊆ V (G), that is, it contains no contracted vertices in G j−1 . Thus, while (Āi ∩ A0j , B̄i ∪ B0j ) is a separation in G j−1 , we may view it as a separation in G, namely as (Ai ∩ A0j ,V (G) \ (Ai ∩ A0j \ Bi ∪ B0j )). By the second property in Claim 2, this separation is nontrivial. So, by the strong connectivity of G it must have order at least β ≥ α and we deduce that |(Ai ∩ A0j ) ∩ (Bi ∪ B0j )| ≥ β . Rewriting |(Ai ∩ A0j ) ∩ (Bi ∪ B0j )| as 15 |(Ai ∩ Bi ) ∩ A0j | + |(A0j ∩ B0j ) \ Bi | we conclude that |(A0i ∩ B0i ) ∩ A0j | + |(A0j ∩ B0j ) \ B0i | ≥ β . We have |A0i ∩ B0i | < α and |A0j ∩ B0j | < α by assumption, so we can assume that |(A0i ∩ B0i ) \ A0j | + |(A0j ∩ B0j ) ∩ B0i | < |A0i ∩ B0i |. (1) Now, let us turn our attention to the graph Gi−1 and define A∗j = (A0j ∩V (Gi−1 )) ∪ {u : u ∈ K` and im(u) ∩ A0j 6= 0/ for some j > ` ≥ i} and B∗j = (B0j ∩V (Gi−1 )) ∪ {u : u ∈ K` and im(u) ∩ A0j 6= 0/ for some j > ` ≥ i} In other words we obtain A∗j and B∗j from A0j and B0j by replacing any vertices belonging to bags B that were ‘expanded’ to obtain the intermediate graphs Gi , . . . , G j−1 by the corresponding contracted vertices. Note that A∗j ∩ A0i = A0j ∩ Āi . We view (A∗j , B∗j ) as a separation in Gi−1 and note that |(A∗j ∩ B∗j ) ∩ B0i | ≤ |(A0j ∩ B0j ) ∩ B0i | and |(A0i ∩ B0i ) \ A∗j | ≤ |(Ai ∩ Bi ) \ A0j |. Consider the separation (A0i ∪ A∗j , B0i ∩ B∗j ) in Gi−1 . Its order is |(A0i ∩ B0i ) \ A∗j | + |(A∗j ∩ B∗j ) ∩ B0i | ≤ |(A0i ∩ B0i ) \ A0j | + |(A0j ∩ B0j ) ∩ B0i | < |A0i ∩ B0i | by (1). This contradicts the minimality of (A0i , B0i ) in Gi−1 . This proves Claim 1. This completes the proof of the theorem. 6 Proofs of Theorems 1 and 3 Given Theorems 14 and 15, it is now easy to complete the proofs of Theorems 1 and 3. We begin with Theorem 1. Proof of Theorem 1. Let f1 be the function from Theorem 14. Let t = t(k) be the value necessary for the size of the bramble in order to apply Theorem 15 and resolve an instance of 12 kDDPP. Let G be an f (t)-strongly connected graph on n vertices, and let (G, S = (s1 , . . . , sk ), T = (t1 , . . . ,tk )) be an instance of the 12 kDDPP. We can greedily find a path P with |V (P)| ≥ f (k). Note that any subset of at most f (k) vertices is well-linked, and thus, V (P) is a well-linked set. By Theorem 14, we can find in time O(nc1 ) a bramble B of size at least t. As f (t) ≥ 36k3 + 2k, by Theorem 15, we can find a solution to (G, S, T ) in time O(k4 n2 ), completing the proof of the theorem. For the proof of Theorem 3, we will need two additional results from [5]. Note that in [5], neither statement is algorithmic, but the existence of the algorithm follows immediately from the constructive proof. 16 Lemma 21 ([5], 4.3). Let G be a directed graph on n vertices and B a bramble in G. Then there is a path P intersecting every element of B and given G and B in input, we can find the path P in time O(|B|n2 ). Lemma 22 ([5], 4.4). Let G be a directed graph graph on n vertices, B a bramble of order k(k + 2) and P a path intersecting every element of B. Then there exists a set X ⊆ V (P) of order 4k which is well-linked. Given P, B, and G in input, we can algorithmically find X in time |B|nO(k) . Proof of Theorem 3. Let (G, S = (s1 , . . . , sk ), T = (t1 , . . . ,tk )) be an instance of the 21 kDDPP. Let n = |V (G)|. Let t be the necessary size of a bramble in order to apply Theorem 15 to resolve an instance of the 12 kDDPP. Let f be the function in Theorem 14. By Theorem 7, we can either find a tree decomposition of G of width at most c2 (( f (t) + 2)2 ) or a bramble B of order ( f (t) + 2)2 . Given the tree decomposition, by Corollary 5, we can solve (G, S, T ) in time 2 O(n f1 (c2 ( f (t)+2) ) ) for some function f1 . If instead with find the bramble B, in order to apply Theorem 15, we will have to convert it to a bramble 2 2 of depth two. By Theorem 7, we may assume that |B| ≤ n2( f (t)+2) . Thus, in time nO( f (t) ) , we can find a 2 path P intersecting every element of B by Lemma 21. By Lemma 22, again in time nO( f (t) ) , we can find a well-linked subset X ⊆ V (P) with |X| ≥ f (t). Finally, applying Theorem 14, we find can find a bramble B 0 of size t and depth two. Finally, by Theorem 15, we can resolve (G, S, T ) in time O(k4 n2 ). In total, the algorithm takes time O(n f2 (k) ) for some function f2 , as desired. 7 Lower Bounds In this section, we give the proof of Theorem 2. Proof of Theorem 2. We give a reduction from the satisfiablity problem for Boolean formulas in 3-CNF (3SAT). The reduction is a variant on the one given in [3] which shows NP-completeness of the integral 2DDPP in directed acyclic graphs. ε ε Fix a formula F with variables x1 , . . . , xn and clauses c1 , . . . , cm . Set k0 = 3+m = n, choose M ∈ {d 1−ε k0 e, d 1−ε k0 e+ 0 1} so that M is even, and set k = k + M. Noting that M ≥ εk, we will construct a k-linkage problem instance with strong connectivity M. We construct the graph G(F) = (V, E) as follows (see Figure 1 for an example). Let V1 = {vi, j : xi ∈ c j }∪{vi, j : xi ∈ c j }∪{c j , c0j : 1 ≤ j ≤ m}∪{s1 , s2 , s3 ,t1 ,t2 ,t3 }∪{ui , vi , ui , vi }∪{bi , b0i ; 1 ≤ i ≤ n} and W = {w1 , . . . , wM }. Let V = V1 ∪W . For each variable i, create a directed path Pi from ui to vi containing internally each vertex of the form vi, j , and a directed path Pi from ui to vi containing each vertex of the form vi, j . 17 W c1 c2 c3 s1 u1 v1,1 v1,2 b3 b2 b1 v1 v2,1 v3,1 v3,2 t1 s2 s3 t2 u1 v1,3 v1 v2,2 v2,3 t3 v3,3 b03 b02 b01 c03 c02 c01 Figure 1: Illustration of the graph G(F) for the formula F = (x1 ∨ x2 ∨ x3 ) ∧ (x1 ∨ x2 ∨ x3 ) ∧ (x1 ∨ x2 ∨ x3 ) Let E1 = {E(Pi ) ∪ E(Pi ) : 1 ≤ i ≤ n}; E2 = {(vi , ui+1 ), (vi , ui+1 ), vi , ui+1 ), (vi , ui+1 ) : 1 ≤ i < n}; E3 = {(c j , vi, j ), (vi, j , c0j ) : vi, j ∈ V1 } ∪ {(c j , vi, j ), (vi, j , c0j ) : vi, j ∈ V1 }; E4 = {(bi , vi ), (bi , vi ), (vi , bi ), (vi , bi )}; E5 = {(si , u1 ), (si , u1 ) : i ∈ {1, 2, 3}} ∪ {(vn ,ti ), (vn ,ti ) : i ∈ {1, 2, 3}}; E6 = {{(wi , v), (v, wi ) : v ∈ V1 ∪ {w j : j < i}} : 1 ≤ i ≤ M}. Set E = E1 ∪ E2 ∪ E3 ∪ E4 ∪ E5 ∪ E6 . Observe that G(F) has strong connectivity at least M, since each wi is adjacent to and from each other vertex. Consider the k-linkage problem instance (G(F), S, T ) where S = {s1 , s2 , s3 , c1 , . . . , cm , b1 , . . . , bn , w1 , . . . , w M , w M 2 2 +1 , . . . , wM } and T = {t1 ,t2 ,t3 , c01 , . . . , c0m , b01 , . . . , b0n , w M 2 +1 , . . . , wM , w1 , . . . , w M }. 2 This is clearly a polynomial reduction. We need to show that F is satisfiable if and only if (G(F), S, T ) is half-integrally feasible. Claim. If F is satisfiable then (G(F), S, T ) is half-integrally feasible. Fix a satisfying assignment of F and consider the S-T linkage consisting of • the paths s1 P1 . . . Pnt1 , s2 P1 . . . Pnt2 ; • the s3 − t3 path whose interior is the concatenation of Pi if xi is set to false or Pi if xi is set to true, for each 1 ≤ i ≤ n; 18 • for each 1 ≤ j ≤ m, a path c j vi, j c0j if c j contains a variable xi that is true, or the path c j vi, j c0j if c j contains the negation of a variable xi that is false; • for each 1 ≤ i ≤ n, the path bi vi b0i if xi is true, or the path bi vi b0i if xi is false; • the 1-edge paths (wi , w M ) and (w M , wi ) for each 1 ≤ i ≤ 2 +i 2 +i M 2. It is straightforward to check that each vertex is used at most twice in this linkage, proving that (G(F), S, T ) is half-integrally feasible. Claim. If (G(F), S, T ) is half-integrally feasible then F is satisfiable. Suppose (G(F), S, T ) has a half-integral solution. Observe that each vertex in W belongs to both S and T and therefore cannot belong to any path in the solution for which it is not a terminal. Thus, for j = 1, 2, 3, every s j − t j path must use either Pi or Pi , for each 1 ≤ i ≤ n. We will show that the following assignment satisfies F: set variable xi to false if the path Pi is used by two of those paths, and to true if the path Pi is used twice by those paths. Every bi − b0i path must use vi or vi . By half-integrality, the bi − b0i path uses vi if Pi is used by two of the s j − t j paths, and uses v̄i if Pi is used by two of those paths. In particular, each vi and v̄i must be used exactly twice by the union of the s j − t j and bi − b0i paths. We deduce that each c j − c0j path contains two edges. Moreover, the middle vertex of that path is either vi, j where the variable xi belongs to ci and is set to true, or vi, j where the negation of variable xi belongs to ci and xi is set to false. This proves that F is satisfiable. References [1] M. Cygan, D. Marx, M. Pilipczuk, and M. Pilipczuk. The planar directed k-vertex-disjoint paths problem is fixed-parameter tractable. In Foundations of Computer Science (FOCS), 2013 IEEE 54th Annual Symposium on Foundations of Computer Science, pages 197–206, Oct 2013. [2] Reinhard Diestel, Tommy R Jensen, Konstantin Yu Gorbunov, and Carsten Thomassen. Highly connected sets and the excluded grid theorem. Journal of Combinatorial Theory, Series B, 75(1):61–73, 1999. [3] Steven Fortune, John Hopcroft, and James Wyllie. The directed subgraph homeomorphism problem. Theoretical Computer Science, 10(2):111–121, 1980. [4] Thor Johnson, Neil Robertson, Paul D Seymour, and Robin Thomas. Directed tree-width. Journal of Combinatorial Theory, Series B, 82(1):138–154, 2001. [5] K.-i. Kawarabayashi and S. Kreutzer. The Directed Grid Theorem. ArXiv e-prints, November 2014. [6] Ken-ichi Kawarabayashi. An improved algorithm for finding cycles through elements. In International Conference on Integer Programming and Combinatorial Optimization, pages 374–384. Springer, 2008. [7] Ken-ichi Kawarabayashi, Yusuke Kobayashi, and Stephan Kreutzer. An excluded half-integral grid theorem for digraphs and the directed disjoint paths problem. In Proceedings of the 46th Annual ACM Symposium on Theory of Computing, STOC ’14, pages 70–78, New York, NY, USA, 2014. ACM. 19 [8] Ken-Ichi Kawarabayashi and Stephan Kreutzer. An Excluded Grid Theorem for Digraphs with Forbidden Minors, pages 72–81. [9] Ken-ichi Kawarabayashi and Stephan Kreutzer. The directed grid theorem. In Proceedings of the Forty-Seventh Annual ACM on Symposium on Theory of Computing, pages 655–664. ACM, 2015. [10] Karl Menger. Zur allgemeinen kurventheorie. Fundamenta Mathematicae, 1(10):96–115, 1927. [11] Bruce Reed. Introducing directed tree width. Electronic Notes in Discrete Mathematics, (3):1–8, 2000. [12] N. Robertson and P.D. Seymour. Graph minors .xiii. the disjoint paths problem. Journal of Combinatorial Theory, Series B, 63(1):65 – 110, 1995. [13] Alexander Schrijver. Finding k disjoint paths in a directed planar graph. SIAM Journal on Computing, 23(4):780–788, 1994. [14] Aleksandrs Slivkins. Parameterized tractability of edge-disjoint paths on directed acyclic graphs. SIAM Journal on Discrete Mathematics, 24(1):146–157, 2010. [15] Carsten Thomassen. 2-linked graphs. European Journal of Combinatorics, 1(4):371–378, 1980. [16] Carsten Thomassen. Highly connected non-2-linked digraphs. Combinatorica, 11(4):393–395, 1991. 20
8cs.DS
arXiv:1708.04770v1 [math.AC] 16 Aug 2017 GENERATORS OF REDUCTIONS OF IDEALS IN A LOCAL NOETHERIAN RING WITH FINITE RESIDUE FIELD LOUIZA FOULI AND BRUCE OLBERDING A BSTRACT. Let (R, m) be a local Noetherian ring with residue field k. While much is known about the generating sets of reductions of ideals of R if k is infinite, the case in which k is finite is less well understood. We investigate the existence (or lack thereof) of proper reductions of an ideal of R and the number of generators needed for a reduction in the case k is a finite field. When R is one-dimensional, we give a formula for the smallest integer n for which every ideal has an n-generated reduction. It follows that in a one-dimensional local Noetherian ring every ideal has a principal reduction if and only if the number of maximal ideals in the normalization of the reduced quotient of R is at most |k|. In higher dimensions, we show that for any positive integer, there exists an ideal of R that does not have an n-generated reduction and that if n ≥ dim R this ideal can be chosen to be m-primary. 1. I NTRODUCTION Let R be a (commutative) Noetherian ring, and let I be an ideal of R. A reduction of I is a subideal J of I such that I n+1 = JI n for some n > 0; equivalently, J is a subideal of I such that I = J, where denotes the integral closure of the corresponding ideal in R. Northcott and Rees [10] proved that if R is a local Noetherian ring with infinite residue field and Krull dimension d, then every ideal of R has a d-generated reduction, that is, a reduction that can be generated by d elements. This result and its generalizations involving analytic spread underlie many of the applications of the theory of reductions to local algebra. For example, reductions and analytic spread have been instrumental in describing the asymptotic properties of an ideal I of R, the Cohen-Macaulay property of the Rees algebra R (I) of I, and the blowup Proj R (I) of Spec R along the subscheme defined by I. However, if the residue field of R is finite, then there may exist ideals of R that do not have a d-generated reduction, and so the applicability of reductions in the case of local rings with finite residue field is more limited. 2010 Mathematics Subject Classification. 13A30, 13B22, 13A15. Key words and phrases. reduction, integral closure, finite field, analytic spread. The first author was partially supported by a grant from the Simons Foundation, grant #244930. 1 2 L. FOULI AND B. OLBERDING In this article, we examine the extent to which the result of Northcott and Rees involving d-generated reductions fails in the case of finite residue field. We prove two main results, the first of which is devoted to one-dimensional rings and the second to rings of higher dimension. In the one-dimensional case we find the optimal choice for replacing d in the result of Northcott and Rees with the smallest possible positive integer, an integer that depends only on the size of the residue field and the cardinality | Max(Rred )| of the set of maximal ideals in the normalization √ Rred of the reduced quotient Rred = R/ 0 of R. Theorem A. Let R be a one-dimensional local Noetherian ring with finite residue field k. The smallest positive integer n for which every ideal of R has an n-generated reduction is  n = ⌈ −1 + log|k| |k| + (|k| − 1) · | Max(Rred )| ⌉. For a one-dimensional local Noetherian ring R of multiplicity e, every ideal of R can be generated by e elements [11, Theorem 1.1, p. 49]. Thus, the number n in the theorem is at most e. If R is a one-dimensional local Noetherian ring with infinite residue field, then every ideal of R has a principal reduction. Using Theorem A, we extend this result to one-dimensional local rings with residue field of any size (see Corollary 3.3). Corollary. Let R be a one-dimensional local Noetherian ring with residue field k. Every ideal of R has a principal reduction if and only if | Max(Rred )| ≤ |k|. In particular, if R is a complete local Noetherian domain, then every ideal of R has a principal reduction (Corollary 3.7). Thus in dimension one there are interesting local Noetherian rings with finite residue field for which the result of Northcott and Rees holds, i.e., every ideal of R has a reduction generated by dim(R)-many elements. Moreover, in dimension one, even if there are ideals without a principal reduction, we are at least guaranteed the existence of a bound on the number of elements needed to generate a reduction. Moving beyond dimension one, we use Theorem A to show (see Theorem 3.8) that unlike in the case of infinite residue field, no such bound exists for a local Noetherian ring with finite residue field and dimension at least 2: Theorem B. Let (R, m) be a local Noetherian ring of dimension d ≥ 2. If the residue field of R is finite, then for each positive integer n there is an ideal of R that is minimally generated by n elements and does not have a proper reduction. If also n ≥ d, this ideal can be chosen to be m-primary. REDUCTIONS OF IDEALS 3 Notation. Throughout the article, Q(R) denotes the total quotient ring of the ring R, and R is the integral closure of R in Q(R). We denote by Rred the reduced ring √ √ R/ 0, where 0 is the nilradical of R. The set of maximal ideals of R is denoted Max(R). 2. P RELIMINARIES In this section we develop a criterion for when every ideal in a local Noetherian ring with finite residue field has an n-generated reduction. This criterion, Proposition 2.4, will be used in the proofs of the main results in the next section. The first lemma, which is a routine application of well-known properties of reductions, concerns the transfer of reductions in a ring R to its reduced quotient Rred . Lemma 2.1. Let R be a ring and let n be a positive integer. A finitely generated ideal I of R has an n-generated reduction if and only if IRred has an n-generated reduction. Proof. It is clear that if every ideal of R has n-generated reduction, then every ideal of Rred has an n-generated reduction. Conversely, let I be an ideal of R and suppose that J is an n-generated ideal of R such that JRred is a reduction of IRred . √ √ Then J ⊆ I + 0. Write J = (x1 , . . . , xn )R. For each i, there is yi ∈ I and zi ∈ 0 √ √ such that xi = yi + zi . Thus J + 0 = (y1 , . . . , yn )R + 0. Let K = (y1 , . . . , yn )R. Then K ⊆ I and KRred = JRred . Thus KRred is a reduction of IRred . We claim that K is a reduction of I. Since KRred = IRred we have by [13, Proposition 1.1.5] √ that KRred = IRred . By [13, Remark 1.1.3(5)], the nilradical 0 of R is contained in every integrally closed ideal of R, so we conclude that K = I. Thus K is an n-generated reduction of I.  As discussed in the introduction, if R is a one-dimensional local Noetherian ring with infinite residue field, then every ideal of R has a principal reduction. Removing the restriction to infinite residue field, we can assert in general only that every height 0 ideal has a principal reduction: Proposition 2.2. Let R be a one-dimensional local Noetherian ring. Then every height 0 ideal of R has a principal reduction. Proof. Let I be a height 0 ideal of R. By Lemma 2.1, it suffices to show that IRred has a principal reduction, so we may assume without loss of generality that R is a reduced ring and I 6= 0. Let P1 , . . . , Pn denote the minimal prime ideals of R. Since I has height 0 and R is local and one-dimensional, we may assume P1 , . . . , Pt are 4 L. FOULI AND B. OLBERDING the minimal prime ideals of I, where 1 ≤ t ≤ n. Since R is reduced and I 6= 0, we have t < n. By Prime Avoidance there exists x ∈ I \ (Pt+1 ∪ · · · ∪ Pn ). Since √ I = P1 ∩ · · · ∩ Pt and the only prime ideals of R are P1 , . . . , Pn and the maximal √ √ ideal of R, it follows that xR = I. We claim xR = IR. Since I has height 0, every element of I is a zero divisor of R. Thus the ideal IR of R consists of zerodivisors of R. Since R is a reduced Noetherian ring, R is a finite product of integral domains R1 , . . . , Rk (see for example [5, p. 64]). The fact that IR consists of zero divisors implies that for each 1 ≤ i ≤ k, we have √ √ IRi = 0 or IRi = Ri . Moreover, since xR = I, some power of I is contained in xR. Thus, in the domain Ri we have IRi = 0 if and only if xRi = 0. Since R = R1 × · · · × Rk , we conclude that IR = xR. By [13, Proposition 1.6.1], the fact that R ⊆ R is an integral extension implies I = IR ∩ R and xR = xR ∩ R. Since  IR = xR, we have I = xR. Also, xR ⊆ I, so xR is a reduction of I. The next lemma and proposition give criteria for when every ideal in a Noetherian ring R has an n-generated reduction. The stronger result, Proposition 2.4, requires that R is also reduced, local and one-dimensional. In light of Theorem B, the one-dimensional assumption is necessary in the proposition. To state Lemma 2.3, we recall that the arithmetic rank, ara(I), of a proper ideal I of a Noetherian ring R p √ is the least number n such that I = (x1 , . . . , xn )R for some x1 , . . . , xn ∈ I. Lemma 2.3. Let R be a Noetherian ring, let I be a proper ideal of R and let n be an √ √ integer such that n ≥ ara(I). If each (n + 1)-generated ideal J ⊆ I with J = I has an n-generated reduction, then I has an n-generated reduction. Proof. Let I be a proper ideal of R and let √ √ F = {J : J ⊆ I, J = I and J is an n-generated ideal of R}. Since R is a Noetherian ring and n ≥ ara(I), the set F is nonempty and contains √ √ a maximal element J, where J is an n-generated ideal with J ⊆ I and J = I. Suppose that J ( I. Then I 6⊆ J and we may choose y ∈ I \ J. Now J + yR is an (n+ 1)-generated ideal, and hence by assumption there is an n-generated ideal K of R such that K ⊆ J + yR and K = J + yR. But then J ⊆ K ∈ F , so that the maximality of J in F forces J = J + yR, a contradiction to the fact that y 6∈ J. Therefore, J = I and J is an n-generated reduction of I.  Proposition 2.4. Let R be a reduced one-dimensional local Noetherian ring and let n be a positive integer. Then the following are equivalent: (1) Every ideal of R has an n-generated reduction. REDUCTIONS OF IDEALS 5 (2) For all x1 , . . . , xn+1 ∈ R for which (x1 , . . . , xn+1 )R = R, there is an n-generated R-submodule of (x1 , . . . , xn+1 )R that does not survive in R. Proof. In the proof we use the fact that every ideal of R is a principal ideal of R. This can be seen as follows. By [5, Theorem 12.3, p. 66], the fact that R is a reduced local Noetherian ring of dimension ≤ 2 implies R is a finite product of Noetherian integrally closed domains. Since also dim R = dim R = 1, we have that R is a finite product of Dedekind domains. The fact that R is semilocal implies these Dedekind domains are principal ideal domains. As a finite product of principal ideal domains, the ring R has the property that every ideal is a principal ideal. Let m denote the maximal ideal of R. First, suppose every ideal of R has an n-generated reduction and let x1 , . . . , xn+1 ∈ R such that (x1 , . . . , xn+1 )R = R. Let A = (x1 , . . . , xn+1 )R. Then there is a nonzerodivisor r ∈ R such that I := rA is an ideal of R. Since AR = R, we have AQ(R) = Q(R), and hence A contains a nonzerodivisor of R. Therefore, I = rA also contains a nonzerodivisor of R. By assumption, there is an n-generated reduction J of I. Let m > 0 be such that I m+1 = JI m . As we have established, every ideal of R is a principal ideal. Thus IR is a principal ideal of R that is necessarily generated by a nonzerodivisor of R since I contains a nonzerodivisor. Since I m+1 R = JI m R and principal ideals generated by a nonzerodivisor admit no proper reductions, we obtain IR = JR. Therefore, R = AR = r−1 IR = r−1 JR. Since J ⊆ I, we have r−1 J ⊆ A, and hence r−1 J is an n-generated R-submodule of A that does not survive in R. Conversely, suppose that for all x1 , . . . , xn+1 ∈ R with (x1 , . . . , xn+1 )R = R, there is an n-generated R-submodule of (x1 , . . . , xn+1 )R that does not survive in R. To prove that every ideal of R has an n-generated reduction, it suffices by Lemma 2.3 to show that every (n + 1)-generated ideal of R has an n-generated reduction, since ara(I) = 1 for any proper non-trivial ideal I of R. Let a1 , . . . , an+1 ∈ R and let I = (a1 , . . . , an+1 )R. If I = R, then clearly I has an n-generated reduction. If I has height 0, then by Proposition 2.2, I has a principal reduction. Thus it remains to consider the case in which I is m-primary. Since every ideal of R is a principal ideal, we have IR = tR for some t ∈ R. Since I is m-primary and R is reduced, I contains a nonzerodivisor, so t is a nonzerodivisor in R. For each i ∈ {1, . . . , n + 1}, let xi = ai t −1 . Then R = t −1 tR = t −1 IR = (x1 , . . . , xn+1 )R. By assumption there exists an n-generated R-submodule A of (x1 , . . . , xn+1 )R that does not survive in R. Since we have (x1 , . . . , xn+1 )R = R = AR, it follows that IR = t(x1 , . . . , xn+1 )R = tAR. 6 L. FOULI AND B. OLBERDING Moreover, tA ⊆ t(x1 , . . . , xn+1 )R = I. As in the proof of Lemma 2.2, the fact that IR = tAR implies I = tA. Since tA ⊆ I, this proves that tA is an n-generated reduction of I.  3. M AIN RESULTS In this section we prove the main results of the paper. After proving the first theorem, which deals with the one-dimensional case, we indicate how Theorem A of the introduction follows. At the end of the section in Theorem 3.8, we prove Theorem B of the introduction. Theorem 3.1. Let R be a one-dimensional local Noetherian ring with finite residue field k, and let n be a positive integer. Then every ideal of R has an n-generated reduction if and only if | Max(Rred )| ≤ |k|n+1 − |k| . |k| − 1 Proof. By Lemma 2.1, every ideal of R has an n-generated reduction if and only if every ideal of Rred has an n-generated reduction. Thus it suffices to prove the theorem in the case where R is a reduced ring. Throughout the proof, we let U denote a set of |k|-many elements of R such that R/m = {u + m : u ∈ U }, where m is the maximal ideal of R. We assume 0 ∈ U . Since R is a local ring, all the nonzero elements of U are units in R. We denote the elements of the Cartesian product U n by u = (u1 , . . . , un ). Let J = {(i, u) ∈ {1, . . . , n + 1} ×U n : u j = 0 for all j ≥ i}. Then |J | = 1 + |k| + |k|2 + · · · + |k|n = Now we prove the theorem. Suppose first that | Max(R)| > |k|n+1 − 1 . |k| − 1 |k|n+1 − |k| . |k| − 1 We show there is an ideal of R that does not have an n-generated reduction. By Proposition 2.4, it suffices to show that there are x1 , . . . , xn+1 ∈ R such that R = (x1 , . . . , xn+1 )R and every n-generated R-submodule of (x1 , . . . , xn+1 )R survives in R. By assumption, | Max(R)| ≥ |k|n+1 − |k| |k|n+1 − |k| + |k| − 1 +1 = = |J |. |k| − 1 |k| − 1 REDUCTIONS OF IDEALS 7 Therefore, we may index a set {Mi,u : (i, u) ∈ J } of |J |-many maximal ideals of R by J . Since the ideals Mi,u of R are maximal, the diagonal map φ : R −→ ∏ (i,u)∈J R/Mi,u : x 7→ (x + Mi,u ) is a surjective ring homomorphism. Thus we may choose x1 , . . . , xn+1 ∈ R such that for each (i, u) ∈ J and j = 1, . . . , n + 1, we have   if i < j 0 + Mi,u x j + Mi,u = 1 + Mi,u if i = j .   u j + Mi,u if i > j Let K = (x1 , . . . , xn+1 )R. We claim that R = (x1 , . . . , xn+1 )R and every n-generated R-submodule of K survives in R. To show this we first show that K/mK has dimension n + 1 as a k-vector space. Indeed, suppose i ∈ {1, . . . , n + 1} and xi + mK = ∑ r j x j + mK j6=i for some r j ∈ R. For each j 6= i, the choice of x j implies x j ∈ Mi,0 (with 0 = (0, . . . , 0)). Since xi − ∑ r j x j ∈ mK ⊆ Mi,0 , j6=i we conclude that xi ∈ Mi,0 , contrary to the fact that by the choice of xi , we have xi + Mi,0 = 1 + Mi,0 . This contradiction shows that K/mK has dimension n + 1 as a k-vector space. In particular, K cannot be generated as an R-module by fewer than n + 1 elements. Let I be an n-generated R-submodule of K = (x1 , . . . , xn+1 )R. We claim that I survives in R. Since I can be generated as an R-module by n elements, the dimension of the k-vector space I/mI is at most n. Since K cannot be generated by fewer than n + 1 elements, by adding as many of the elements xi to I as needed we can assume without loss of generality that I is an R-submodule of K such that I can be generated by n but no fewer elements. In particular, the k-dimension of I/mI is n. Then Nakayama’s Lemma implies that I is generated by n elements y1 , . . . , yn of the form y j = u j,1 x1 + u j,2 x2 + · · · + u j,n+1 xn+1 , where u j,i ∈ U . Since I/mI is a k-vector space of dimension n, the n × (n + 1) matrix (u j,i + m : j = 1, . . . , n, i = 1, . . . , n + 1), whose entries are in the field k, has rank n. Elementary row operations produce a rank n matrix in reduced row echelon form such that for some i = 1, . . . , n + 1, 8 L. FOULI AND B. OLBERDING deleting the i-th column yields the n × n identity matrix. It follows from this observation and Nakayama’s Lemma that there are u1 , . . . , ui−1 ∈ U such that I = ({x j − u j xi : j < i} ∪ {xi+1 , . . . , xn+1 })R. Let u = (u1 , . . . , ui−1 , 0, . . . , 0) ∈ U n so that (i, u) ∈ J . We claim that I ⊆ Mi,u . First, observe that xi+1 , . . . , xn+1 ∈ Mi,u by the choice of these elements, so it remains to show that for each j < i, we have x j − u j xi ∈ Mi,u . Let j < i and notice that by the choice of xi , we have xi + Mi,u = 1 + Mi,u and x j + Mi,u = u j + Mi,u . Therefore, x j − u j xi + Mi,u = u j − u j · 1 + Mi,u = 0 + Mi,u , so that x j − u j xi ∈ Mi,u , proving the claim that I ⊆ Mi,u . We conclude that I survives in R. This shows that every n-generated R-submodule of K = (x1 , . . . , xn+1 )R survives in R. Therefore, R has an ideal that does not have an n-generated reduction. Conversely, suppose that | Max(R)| ≤ |k|n+1 − |k| . |k| − 1 To prove that every ideal of R has an n-generated reduction, it suffices by Proposition 2.4 to show that for all x1 , . . . , xn+1 ∈ R with (x1 , . . . , xn+1 )R = R, there is an n-generated R-submodule I of (x1 , . . . , xn+1 )R such that IR = R. Let x1 , . . . , xn+1 ∈ R such that (x1 , . . . , xn+1 )R = R. For each (i, u) ∈ J with u = (u1 , . . . , un ), consider the n-generated R-submodule of (x1 , . . . , xn+1 )R defined by Ii,u = (x1 − u1 xi , x2 − u2 xi , . . . , xi−1 − ui−1 xi , xi+1 , . . . , xn+1 )R. We claim first that if (s, u), (t, v) ∈ J and Is,u and It,v are contained in a common maximal ideal of R, then s = t and u = v. Suppose M is a maximal ideal of R with Is,u + It,v ⊆ M. Suppose by way of contradiction that s 6= t. Without loss of generality, we can assume that s < t. Then xt ∈ Is,u , so that since x1 − v1 xt , x2 − v2 xt , . . . , xt−1 − vt−1 xt ∈ It,v ⊆ M, we have x1 , x2 , . . . , xt−1 ∈ M. Also, since s < t, we have xt , . . . , xn+1 ∈ Is,v ⊆ M. But then R = (x1 , . . . , xn+1 )R ⊆ M, a contradiction that implies s = t. Next we claim that u = v. Since s = t, we have x1 − u1 xt , . . . , xt−1 − ut−1 xt ∈ Is,u ⊆ M. REDUCTIONS OF IDEALS 9 Similarly, we have x1 − v1 xt , . . . , xt−1 − vt−1 xt ∈ It,v ⊆ M. Therefore, for each i < t, we have xi − ui xt − (xi − vi xt ) = (vi − ui )xt ∈ M. An argument similar to the one in the preceding paragraph shows that xt 6∈ M, since otherwise every x j ∈ M, for j = 1, 2, . . . , n + 1, a contradiction. Thus, for each i < t we have vi − ui ∈ M ∩ R = m, where the last equality follows from the fact that as a maximal ideal of an integral extension of R, M lies over m. Consequently, for each i < t we have ui + m = vi + m, which, since ui , vi ∈ U , forces ui = vi . Since this holds for all i < t, we conclude u = v. This proves that if Is,u and It,v are contained in a common maximal ideal of R, then s = t and u = v. Next, since no two distinct R-submodules of (x1 , . . . , xn+1 )R from the set {Is,u : (s, u) ∈ J } are contained in the same maximal ideal of R, it follows that either one of these R-submodules does not survive in R or there are at least |J |-many maximal ideals of R. As established at the beginning of the proof, |J | = |k|n+1 − 1 , |k| − 1 so if every Is,u survives in R, we conclude that |k|n+1 − |k| |k|n+1 − 1 ≤ | Max(R)| ≤ , |k| − 1 |k| − 1 where the last inequality is given by assumption. This implies |k|n+1 − 1 ≤ |k|n+1 − |k|, which is impossible since |k| > 1. This contradiction implies some Is,u does not survive in R. In particular, some n-generated R-submodule of (x1 , . . . , xn+1 )R does not survive in R. Therefore, by Proposition 2.4 every ideal of R has an n-generated reduction.  Theorem A now follows easily from Theorem 3.1: In the setting of the theorem, we seek the smallest positive integer n such that |k|n+1 − |k| ; |k| − 1 that is, we need the smallest positive integer n such that | Max(Rred )| ≤ |k| + (|k| − 1) · | Max(Rred )| ≤ |k|n+1 . Equivalently,  log|k| |k| + (|k| − 1) · | Max(Rred )| ≤ n + 1, 10 L. FOULI AND B. OLBERDING which yields the conclusion of Theorem A. Remark 3.2. If R is a one-dimensional Noetherian local domain, then the number of maximal ideals of R is the same as the number of minimal prime ideals in Rb [6, Corollary 5]. Moreover, if R is a reduced local Noetherian ring with geometrically regular formal fibers, then the number of maximal ideals of R is the same as the number of minimal prime ideals of the completion Rb of R [1, Theorem 6.5]. Thus for excellent local Noetherian rings R, the bound in Theorem 3.1 can be restated using the completion of Rred rather than the normalization of Rred . Corollary 3.3. Let R be a one-dimensional local Noetherian ring with residue field k. Then every ideal of R has a principal reduction if and only if | Max(Rred )| ≤ |k|. Proof. Apply Theorem 3.1 in the case n = 1.  Corollary 3.4. Let R be a one-dimensional local Noetherian domain with residue field k. If the multiplicity of R is at most |k|, then every ideal of R has a principal reduction. Proof. The completion of a one-dimensional local Noetherian domain of multiplicity e has at most e minimal prime ideals (e.g., this follows from the multiplicity formula given in [9, Theorem 14.7]). By Remark 3.2, | Max(R)| ≤ e ≤ |k|. Thus the corollary is a consequence of Corollary 3.3.  Remark 3.5. It follows from Corollary 3.4 that if a one-dimensional Noetherian local domain R has multiplicity 2, then every ideal of R has a principal reduction. This is known already for other reasons. In a one-dimensional local CohenMacaulay ring of multiplicity e, every ideal can be generated by e elements [11, Theorem 1.1, p. 49]. Since R has multiplicity 2, every ideal of R is 2-generated. In [12, Theorem 3.4], Sally and Vasconcelos prove that a ring in which every ideal is 2-generated has the property that every m-primary ideal has a principal reduction of reduction number at most 1; see also [8, Lemma 1.11]. Corollary 3.6. Let (R, m) be a one-dimensional Noetherian local domain whose completion has at most two minimal prime ideals. Then every ideal of R has a principal reduction. Proof. Apply Remark 3.2 and Corollary 3.3.  REDUCTIONS OF IDEALS 11 Corollary 3.7. Every ideal of a one-dimensional complete local domain has a principal reduction. Proof. Apply Corollary 3.6.  Next we use the one-dimensional case in Theorem 3.1 to show the absence of a bound on the number of generators of reductions in higher dimensions. Theorem 3.8. Let (R, m) be a local Noetherian ring of dimension d ≥ 2. If the residue field of R is finite, then for each positive integer n there is an ideal of R that is minimally generated by n elements and does not have a proper reduction. If also n ≥ d, this ideal can be chosen to be m-primary. Proof. Let n > 0 and let k denote the residue field of R. For the first assertion in the theorem, it suffices to show that there exists an ideal of R that is generated by n elements and has no (n − 1)-generated reduction, see for example [13, Proposition 8.3.3]. Since R is Noetherian and R has dimension d > 1, there are infinitely many prime ideals of R of dimension one. Choose a positive integer t with |k|n − |k| . t > |k| − 1 Let P1 , . . . , Pt be distinct dimension one prime ideals of R. Let A = R/(P1 ∩ · · · ∩ Pt ). Then A is a reduced one-dimensional local Noetherian ring with t minimal prime ideals. As such, A is a direct product of t integrally closed domains [5, p. 64]. Consequently, A has at least t maximal ideals. By Lemma 2.3 and Theorem 3.1 there is an n-generated ideal I of A that does not have an (n − 1)-generated reduction. Let J be an n-generated ideal of R such that JA = I. If J has an (n − 1)generated reduction K ⊆ J, then there is m > 0 such that J m+1 = J m K. But then I m+1 = J m+1 A = J m KA = I m KA, so that KA is an (n − 1)-generated reduction of I, contrary to the choice of I. We conclude that the n-generated ideal J has no (n − 1)-generated reduction. Hence J is minimally generated by n elements and has no proper reduction. It remains to prove the second assertion in the theorem. Suppose n ≥ d. If n = d, then we may choose any n-generated m-primary ideal of R. By Krull’s height theorem such an ideal must exist and cannot have an (n − 1)-generated reduction since such a reduction would be an m-primary ideal generated by d − 1 elements. Thus, if n = d, the proof is complete. Assume n > d. With I as above, choose J to be an m-primary ideal of R with P1 ∩ · · · ∩ Pt ⊆ J and JA = I. Since J is m-primary, Krull’s height theorem implies 12 L. FOULI AND B. OLBERDING that the arithmetic rank of J is d. Therefore, since n − 1 ≥ d, Lemma 2.3 implies √ that there is an n-generated ideal J ′ ⊆ J such that J ′ = m and J ′ does not have an (n − 1)-generated reduction. This shows that J ′ is an n-generated m-primary ideal with no (n − 1)-generated reduction, so we conclude that J ′ is minimally generated by n elements and J ′ has no proper reduction.  Remark 3.9. In [3, Example 2.3] an example is given of a two-dimensional CohenMacaulay local ring R such that R has finite residue field and the maximal ideal m of R fails to have a 2-generated reduction. In [4, Example 5.4], Abhyankar showed that certain canonically defined m-primary ideals of a two-dimensional regular local ring (R, m) have 2-generated reductions. This motivates the question of Heinzer and Shannon in [4, Question 5.6] of whether every integrally closed m-primary ideal of a two-dimensional regular local ring (R, m) with finite residue field has a 2-generated reduction. Theorem 3.8 guarantees the existence of m-primary ideals without 2-generated reductions, but it is unclear whether these ideals can be chosen to be integrally closed. In general, a d-dimensional local Noetherian ring can have the property that every integrally closed ideal has a d-generated reduction yet still possess non-integrally closed ideals that do not have a d-generated reduction; see Example 4.1. 4. E XAMPLES In this section we give several examples to illustrate some of the ideas in Section 3. In the first example, we show that in order for each ideal of a one-dimensional local Noetherian domain to have a principal reduction, it is not sufficient that every integrally closed ideal has a principal reduction. Example 4.1. For each integer n ≥ 1, there exists a one-dimensional local Noetherian domain R such that every integrally closed ideal has a principal reduction, yet R has an ideal that is minimally generated by n elements and does not have a proper reduction. Let n ≥ 1. If n = 1, then any one-dimensional local Noetherian domain suffices as an example, since a nonzero principal ideal does not have a principal reduction. Suppose n > 1. Choose 2n − 1 maximal ideals M1 , . . . , M2n −1 of the ring Z2 [x], and let S = Z2 [x] \ (M1 ∪ · · · ∪ M2n −1 ). Let J denote the Jacobson radical of the localization Z2 [x]S of Z2 [x] at the multiplicatively closed set S, and let R = Z2 + J. Then R is a one-dimensional local Noetherian domain with maximal ideal J and normalization R = Z2 [x]S ; see for example [2, Lemma 1.1.4 and Proposition 1.1.7]. Thus R is a PID with | Max(R)| = 2n − 1. Observe that REDUCTIONS OF IDEALS 13 (J :Q(R) J) = R, and thus since R is a PID, the blow up of the maximal ideal J of R in the sense of Lipman [8, p. 651] is R. This ring has the property that each localization at a maximal ideal has its embedding dimension (which is 1) equal to its multiplicity. Therefore, by [8, Theorem 2.2], every integrally closed ideal of R has a principal reduction of reduction number at most 1. However, since the residue field k of R has two elements and |k|n − |k| | Max(R)| = |k|n − 1 > , |k| − 1 Lemma 2.3 and Theorem 3.1 imply that R has an ideal that is minimally generated by n elements and does not have an (n − 1)-generated reduction. By [13, Proposition 8.3.3], this ideal does not have a proper reduction. Corollary 3.4 implies that the maximal ideal of a one-dimensional local Noetherian domain of multiplicity 2 has a principal reduction. Corollary 3.3 guarantees that there exist one-dimensional local Cohen-Macaulay rings of multiplicity 3 that have ideals without a principal reduction (and necessarily such a local ring has residue field the two-element field). The next example, which appears in [13, Example 8.3.2], shows that there exists a one-dimensional local Cohen-Macaulay ring of multiplicity 3 whose maximal ideal does not have a principal reduction. Example 4.2. (See [13, Example 8.3.2]) Let R be the ring given by Z2 [[x, y]] . R= (xy(x + y)) The multiplicity of R is 3. Let m denote the maximal ideal of R, and let x′ , y′ denote the images of x and y in R, respectively. Suppose that m has a principal reduction J = ( f ). Write f = r1 x′ + r2 y′ , for some r1 , r2 ∈ R. Since R = Z2 + m, there are a1 , a2 ∈ Z2 such that for each i, ri − ai ∈ m. Let f ′ = a1 x′ + a2 y′ , and let J ′ = ( f ′ ). Then J ⊆ J ′ + mI ⊆ I and thus J ′ = I by [13, Lemma 8.1.8]. In this way, we may assume that any principal reduction of m is generated by an element of the form f = a1 x′ + a2 y′ , with a1 , a2 ∈ Z2 . Thus, the only possible generators for principal reductions of m are x′ , y′ , x′ + y′ , but each of these is in a minimal prime ideal of R. However, any reduction of m will be an m-primary ideal, and thus m has no principal reductions. Although the ring R in Example 4.2 is not a domain, it can be used to produce similar examples that are domains. We recall a theorem of Lech [7, Theorem 1]: A complete local Noetherian ring R with maximal ideal m is the completion of a local Noetherian domain if and only if (i) m = 0 or m 6∈ Ass(R), and (ii) no nonzero integer of R is a zerodivisor. 14 L. FOULI AND B. OLBERDING Example 4.3. A one-dimensional local Noetherian domain whose maximal ideal does not have a principal reduction. Let R be as in Example 4.2. Since R is CohenMacaulay, m 6∈Ass(R), and since the only nonzero integer of R is 1, it follows from the theorem of Lech that there exists a local Noetherian domain A with completion R. As in the preceding example, the maximal ideal m of R does not have a principal reduction. Since the maximal ideal of R is extended from the maximal ideal of A, it follows that the maximal ideal of A does not have a principal reduction. Moreover, since R is a complete intersection of multiplicity 3, so is A. The following example was suggested to us by Bill Heinzer. Example 4.4. Let R = Z2 [[x, y, z]]/(z2 − xy, xy(x + y)(x + y + z)). One can show that Min(R) = {(x, z), (y, z), (x + z, y + z), (x + y + z)}. Every linear form belongs to some minimal prime of R and hence there is no principal reduction of the maximal ideal m = (x, y, z). On the other hand, the number of minimal primes is 4 and thus the number of maximal ideals of Rred is 4 by Remark 3.2. Since also |k| < 4, Corollary 3.3 and Remark 3.2 imply that there exists an ideal of R that does not have a principal reduction. In this case, m = (x, y, z)R is such an ideal. The following example was suggested to us by Bernd Ulrich. Example 4.5. Let R = Z2 [[x, y, z]]/(z2 −xy, xy(x+y)). One can show that Min(R) = {(x, z), (y, z), (x + z, y + z)}. It is straightforward to show that J1 = (x + y + z) is the only principal reduction of m = (x, y, z). The number of minimal primes is 3 and even though |k| < 3 it is the case that m has a principal reduction. By Remark 3.2, Corollary 3.3 and Remark 3.2 there must exist a different ideal of R that does not have a principal reduction. One can verify that J2 = (x, y) is such an ideal. Moreover, J2 is another proper reduction of m and there is no principal reduction contained in J2 . Hence there are minimal reductions of m having minimal generating sets of different sizes. All the examples in this section have been devoted to the one-dimensional case. In the next example, we illustrate the failure of 2-generated reductions for the maximal ideal of a two-dimensional ring. As mentioned in Remark 3.9, Heinzer, Ratliff and Rush [3, Example 2.3] have given for each finite field F an example of a two-dimensional Cohen-Macaulay local ring R such that R has residue field F, the associated graded ring of m is Cohen-Macaulay, and the maximal ideal m of R fails to have a 2-generated reduction. For the case F = Z2 , we give a simple example of this phenomenon that has the same properties. REDUCTIONS OF IDEALS 15 Example 4.6. Let R = Z2 [[x, y, z]]/(xy(x+y)(x+y+z)). Then R is a 2-dimensional Cohen-Macaulay ring and the associated graded ring of m, grm (R) = ∞ L mi /mi+1 , i=0 is Cohen-Macaulay. We claim that m = (x, y, z)R does not have a 2-generated reduction. Indeed, as in Example 4.2, if m has a 2-generated reduction, then one can assume that the two generators of the reduction are linear forms. Since the residue field is Z2 there are only 7 linear forms in x, y, and z. It is straightforward to check that any ideal in R generated by two linear forms has height 1 and therefore cannot be a reduction of m. ACKNOWLEDGEMENTS We thank Bill Heinzer and Bernd Ulrich for suggesting Examples 4.4 and 4.5, which served as our original motivation for this article. R EFERENCES [1] J. Dieudonné, Topics in local algebra, Notre Dame Mathematical Lectures 10, University of Notre Dame Press, 1967. [2] M. Fontana, J. Huckaba, and I. Papick, Prüfer Domains, Monographs and Textbooks in Pure and Applied Mathematics 203, Marcel Dekker, New York, 1997. [3] W. Heinzer, L. J. Ratliff, Jr., and D. E. Rush, Reductions of ideals in local rings with finite residue fields, Proc. Amer. Math. Soc., 138 (2010) 1569–1574. [4] W. Heinzer and D. Shannon, Abhyankar’s work on dicritical divisors, available at arXiv:1707.06733 [math.AC]. [5] J. Huckaba, Commutative rings with zero divisors, Monographs and Textbooks in Pure and Applied Mathematics 117, Marcel Dekker, New York, 1988. [6] D. Katz, On the number of minimal prime ideals in the completion of a local domain, Rocky Mountain J. Math. 16 (1986), 575–578. [7] C. Lech, A method for constructing bad noetherian local rings, Lecture Notes in Math. 1183, Springer, Berlin, 1986, 241–247. [8] J. Lipman, Stable ideals and Arf rings, Amer. J. Math. 93 (1971), 649–685. [9] H. Matsumura, Commutative ring theory, Cambridge University Press, 1989. [10] D.G. Northcott and D. Rees, Reductions of ideals in local rings, Proc. Camb. Phil. Soc. 50 (1954), 145–158. [11] J. Sally, Numbers of generators of ideals in local rings, Marcel Dekker, Inc., New York-Basel, 1978. [12] J. Sally, W. Vasconcelos, Stable rings, J. Pure Appl. Algebra 4 (1974), 319–336. [13] I. Swanson and C. Huneke, Integral Closure of Ideals, Rings, and Modules, London Mathematical Society Lecture Note Series 336, Cambridge University Press, Cambridge, (1994). D EPARTMENT OF M ATHEMATICAL S CIENCES , N EW M EXICO S TATE U NIVERSITY, L AS C RUCES , N EW M EXICO 88003, USA E-mail address: [email protected] D EPARTMENT OF M ATHEMATICAL S CIENCES , N EW M EXICO S TATE U NIVERSITY, L AS C RUCES , N EW M EXICO 88003, USA E-mail address: [email protected]
0math.AC
Zeitschrift für Angewandte Mathematik und Mechanik, 18/4/2016 C 1 -continuous space-time discretization based on Hamilton’s law of varying action arXiv:1510.07863v2 [math.NA] 15 Apr 2016 Janine C. Mergel1 , Roger A. Sauer1,∗ , and Sina Ober-Blöbaum2 1 AICES Graduate School, RWTH Aachen University, Templergraben 55, 52056 Aachen, Germany 2 Department of Engineering Science, University of Oxford, Parks Road, Oxford, OX1 3PJ, United Kingdom Received XXXX, revised XXXX, accepted XXXX Published online XXXX Key words Hamilton’s law of varying action, Hermite interpolation, nonlinear elastodynamics, symplectic integration, variational integrators MSC (2010) 37M15, 65P10, 70H25, 74B20, 74H15, 74S05 We develop a class of C 1 -continuous time integration methods that are applicable to conservative problems in elastodynamics. These methods are based on Hamilton’s law of varying action. From the action of the continuous system we derive a spatially and temporally weak form of the governing equilibrium equations. This expression is first discretized in space, considering standard finite elements. The resulting system is then discretized in time, approximating the displacement by piecewise cubic Hermite shape functions. Within the time domain we thus achieve C 1 -continuity for the displacement field and C 0 -continuity for the velocity field. From the discrete virtual action we finally construct a class of one-step schemes. These methods are examined both analytically and numerically. Here, we study both linear and nonlinear systems as well as inherently continuous and discrete structures. In the numerical examples we focus on one-dimensional applications. The provided theory, however, is general and valid also for problems in 2D or 3D. We show that the most favorable candidate — denoted as p2-scheme — converges with order four. Thus, especially if high accuracy of the numerical solution is required, this scheme can be more efficient than methods of lower order. It further exhibits, for linear simple problems, properties similar to variational integrators, such as symplecticity. While it remains to be investigated whether symplecticity holds for arbitrary systems, all our numerical results show an excellent long-term energy behavior. Copyright line will be provided by the publisher 1 Introduction In this work we derive a class of time integration methods for the computational analysis of deformable solids. We consider a discrete version of Hamilton’s law of varying action to obtain space-time discretization schemes based on cubic Hermite functions in time. ∗ Corresponding author E-mail: [email protected], Phone: +49 241 80 99129, Fax: +49 241 80 628498 Copyright line will be provided by the publisher J.C. Mergel, R.A. Sauer, and S. Ober-Blöbaum: C 1 -continuous space-time discretization based on Hamilton’s law 2 1.1 Overview of existing methods One very common approach for the numerical analysis of elastodynamic problems is the application of so-called semidiscrete procedures: Here, the (spatially and temporally) continuous system is discretized in space and time separately. First, the mechanical equilibrium equations, describing the deformation of the body, are discretized in space by means of the finite element method (FEM). At this point we refer to any standard literature on nonlinear finite elements for solids; see e.g. Ref. [8, 78, 79]. The spatially discrete system is then discretized in time, using for instance a finite difference scheme or collocation based on Taylor series expansion. Discretization schemes of this type include many well-known methods, such as the Newmark algorithm [61], the HHT-α method [31], the WBZ-α (or Bossak-α) method [77], and the generalizedα method [14]. Besides methods fulfilling the equilibrium equations at single time steps, there exist various approaches based on weighted residuals; these consider equilibrium in an weighted-average sense and go back to the publication by Zienkiewicz [80]. A weighted residual approach based on cubic Hermite interpolation in time, for instance, is discussed in Ref. [21]. See also the generalized method proposed by Modak and Sotelino [60]. In addition, there exists a broad literature on methods combining finite elements (FE) in both space and time. In general, these solution schemes can be constructed by forming a (spatially and temporally) weak form of the equations of motion, and discretizing the resulting statement by means of finite elements. The first approaches accounting for finite elements in time go back to Ref. [1, 20, 65]. Early publications on space-time FE methods include Ref. [36, 38, 39]. A broader literature review on time integration methods in structural mechanics can be found e.g. in Ref. [7, 10, 25, 45]. A special class of time integration schemes applied to mechanical systems is formed by geometrical integrators. Geometric integration enables the design of robust methods that provide both quantitatively and qualitatively accurate results. Since these methods preserve the geometric properties of the flow of a differential equation, they are able to exactly represent the main characteristic properties of the physical process [26, 59, 67]. Geometric integration methods can be mainly divided into two classes: 1) energy-momentum integrators and 2) symplectic momentum-conserving integrators. The first class of methods fulfills the conservation laws of energy and momentum automatically; for methods of this type we refer e.g. to Simo and Tarnow [72], Simo et al. [73], Gonzalez [24], Betsch and Steinmann [10], Groß et al. [25], Leyendecker et al. [54], Hesch and Betsch [29,30], Gautam and Sauer [22] and Krenk [44], Betsch and Janz [9], and the references therein. See also the generalized energy-momentum method discussed in Ref. [45–47]. The second class preserves both the symplectic form and — in the presence of symmetries — momentum maps; it additionally shows excellent long-term energy behavior. Symplectic-momentum integrators can be represented by the class of variational integrators [59, 74]. For conservative systems, these methods are constructed by forming a discrete version of Hamilton’s principle, choosing both a finite-dimensional function space and a suitable numerical quadrature. See Ref. [52, 53] for an overview. For dissipative or controlled mechanical systems, they can be derived from a discrete version of the Lagrange-d’Alembert principle [41, 62]. Within the last years variational integrators have been extended towards constrained [15, 42, 55, 57], non-smooth [19, 40], stochastic [12], multirate and multiscale [56, 75] systems as well as to electric circuits [64]. For variational integrators in combination with spatial discretization we refer to Ref. [18, 51, 76] and the references therein. Besides these semi-discrete approaches, there exists a covariant space-time discretization method by Marsden et al. [58]. This multi-symplectic scheme allows for symplecticity in both space and time. Copyright line will be provided by the publisher ZAMM header will be provided by the publisher 3 In most of the previously mentioned work the solution is approximated by using piecewise Lagrange interpolation. For a mechanical system, this leads to a smooth approximation of the position, but to discontinuities in the velocity at the discrete time steps. Besides this approach, Leok and Shingel [50] have developed a variational integrator based on piecewise Hermite interpolation. In their prolongation-collocation approach, not only the solution of the discrete EulerLagrange equations, but also its time derivatives are approximated with sufficient accuracy. This leads to a globally smooth approximation of the solution. Note that Ref. [50] does not include the combined discretization in both space and time. To incorporate any initial conditions of the mechanical system explicitly, early publications on structural dynamics have considered the so-called Hamilton’s law of varying action; see e.g. Argyris and Scharpf [1], Fried [20], Bailey [2–5], Simkins [70, 71], and Borri et al. [11]. This law can be regarded as a generalization of Hamilton’s principle: It accounts for any initial and final velocities by considering non-zero variations in the displacement at the boundaries of the time domain. Some of the studies mentioned above also include cubic Hermite interpolation in time for the displacement. Based on this law, a family of methods has been proposed [6, 69] that combines different zero-variations of the displacement or velocity at initial and final time. In addition, Géradin [23] has constructed from a subsequent application of Hamilton’s law a time integration method based on Hermite interpolation. While variational integrators are automatically symplectic (due to the discretized action integral serving as generating function [26]), it is not clear if the same properties hold for integration schemes constructed from Hamilton’s law. 1.2 Objectives In this paper we derive a class of space-time integration methods that are based on piecewise cubic Hermite interpolation in time. To this end, we consider Hamilton’s law of varying action. We thus directly incorporate the additional boundary terms (arising from the non-zero variations) into our time integration method. Using a semi-discrete approach, we first discretize our resulting equilibrium equation in space and then in time. Instead of deriving additional conditions on the time derivatives of the approximated solution (as it is done in Ref. [50]) we consider independent variations of the position and velocities. In general, one could then construct a variational integrator by 1) varying the action of the entire temporal domain, and 2) deriving from the variation a set of discrete Euler-Lagrange equations. Since for a cubic Hermite approximation, however, this would lead to an (unconditionally) unstable numerical method, we pursue a different approach: We vary the action for each discrete time interval individually, which leads to an overdetermined system of four equations. By choosing different combinations of equations, we derive a family of six different one-step methods. One of these schemes coincides with the method proposed by Géradin [23]. In fact, our time integration methods are not variational in the sense that they are not derived from the virtual action of the total time domain. We will demonstrate numerically, however, that the most favorable of our schemes — denoted in the following as p2-scheme — shows similar properties like true variational integrators: an excellent long-term behavior and, for a simple harmonic oscillator, symplecticity. Interestingly, this is not the case for the variant discussed in Ref. [23]. We emphasize that the aim of this work is to both present the construction of our time integration methods, and to demonstrate their most important features by means of various numerical examples. A further analytical investigation Copyright line will be provided by the publisher J.C. Mergel, R.A. Sauer, and S. Ober-Blöbaum: C 1 -continuous space-time discretization based on Hamilton’s law 4 (including e.g. the proof of the order of convergence) goes beyond the scope of this paper; instead, this should be addressed in future work. Note that like other methods based on C 1 -continuous approximations in time, our integration schemes are not favorable for the simulation of discontinuous changes (such as shock waves) in mechanical systems. Instead, we apply the p2scheme to temporally smooth examples; these include both linear and nonlinear as well as intrinsically discrete and spatially continuous problems. Here, we focus on one-dimensional applications; the theory, however, is also valid for conservative systems in 2D and 3D. Compared to both the formulation of Géradin and the method of Leok and Shingel based on cubic Hermite interpolation, our p2-scheme exhibits a higher order of convergence. In addition, based on the desired accuracy, it may be more efficient than classical methods like the Newmark algorithm. 1.3 Outline The remainder of this paper is structured as follows. Section 2 introduces the action integral of a continuous body deforming over time. From Hamilton’s law of varying action a (spatially and temporally) weak form of the mechanical equilibrium equation is derived. Section 3 briefly outlines its spatial discretization by means of standard finite elements. The temporal discretization is discussed in Section 4, providing a solution strategy that leads to a class of different integration methods. These methods are then related to other approaches from the literature. In Section 5, we study the main characteristic properties of our integration schemes, such as symplecticity and the long-term and convergence behavior. The most favorable scheme is then applied to investigate several numerical examples (Section 6). Section 7 finally concludes this paper. 2 Hamilton’s law of varying action In this section we summarize the governing equations describing a body undergoing finite motion and deformation. For the general theory of continuum mechanics, the reader is referred to text books [13, 33]. Consider a body deforming within the time domain [0, T ]. In the initial configuration, at t = 0, the body is denoted by B0 ; its boundary is denoted by ∂B0 . The body can be subjected to volumetric loads, B̄ (applied in B0 ), deformations, ϕ̄ (prescribed on ∂ϕ B0 ⊆ ∂B0 ), and surface loads, T̄ (applied on ∂t B0 ⊆ B0 ).1 At any time t ∈ (0, T ], the deformation of the body is characterized by a unique mapping of a material point, X ∈ B0 , to its current position, x = ϕ(X, t) ∈ B. The material time derivative v := ∂x/∂t corresponds to the velocity of a material particle located at x; in short we will also write v = ẋ. 2.1 Action of the continuous system In the following we assume 1) conservation of mass, 2) hyperelastic material behavior, and 3) that the external forces do not depend on the deformation. We start with the action integral of the continuous system, defined as Z T S= L(x, v) dt. (1) 0 The integrand corresponds to the Lagrangian of our system, given by L(x, v) = K(v) − Π(x). (2) 1 We assume that ∂ B ∪ ∂ B = ∂B and ∂ B ∩ ∂ B = ∅. ϕ 0 ϕ 0 t 0 t 0 0 Copyright line will be provided by the publisher ZAMM header will be provided by the publisher 5 Here, K is the kinetic energy, and Π is the potential energy due to both internal strains and external forces; Z 1 K(v) = ρ0 v · v dV, 2 B0 Z Z Z Π(x) = W (x) dV − x · ρ0 B̄ dV − x · T̄ dA. B0 B0 (3) (4) ∂t B0 The terms ρ0 and W (x) respectively denote the initial material density and an energy density function characterizing the material behavior; a detailed description of W (x) for different material models can be found e.g. in Ref. [8, 78, 79]. 2.2 Variation of the action We now consider an admissible variation of the deformation, δx ∈ V, n o V = δx : B0 × [0, T ] → Rd δx(X, t)|∂ϕ B0 = 0 . (5) Here, d is the dimension of Euclidean space. Varying the action integral (1) yields Z T δS = δL(x, v) dt, δL(x, v) = δK(v) − δΠ(x), (6) 0 where the variations of the energy terms are given by Z δK(v) = δv · ρ0 v dV, Z ZB0 Z δx · ρ0 B̄ dV − δΠ(x) = grad δx : σ dv − B B0 (7) δx · T̄ dA. (8) ∂t B0 The tensor σ denotes the Cauchy stress, which is derived from the strain energy density function, W , appearing in Eq. (4). If we enforce the deformation at t = 0 and t = T to be fixed (s.t. the variations δx(X, 0) and δx(X, T ) become zero), we arrive at the classical Hamilton’s principle, δS = 0 n o ∀ δx ∈ δx ∈ V δx(X, 0) = 0, δx(X, T ) = 0 , (9) see e.g. the book by Lanczos [48]. Instead, however, we leave the variations δx(X, 0) and δx(X, T ) arbitrary for now. In this case, δS is equal to the following boundary term evaluated at t = 0 and t = T : T  ∂L(x, v) ∀ δx ∈ V. δS = δx , ∂v 0 (10) The term in angle brackets corresponds to the scalar product of the variation δx and the linear momentum of the body, i.e.   Z ∂L(x, v) δx , = δx · ρ0 v dV. (11) ∂v B0 A more detailed discussion of arbitrary variations at the boundaries can be found in Ref. [48] (see Chapter V.3 there). Due to the scalar product, Eq. (10) depends on the system’s initial momentum (and thus on its initial velocity) explicitly. This is the reason why expression (10) has been discussed in several early publications studying initial value problems in structural dynamics, such as Ref. [1–3, 6, 70, 71]; an overview can also be found in Ref. [66]. Following the terminology used in several of these papers, we refer to Eq. (10) as “Hamilton’s law of varying action”.2 A very interesting comment 2 Alternatively, this equation has been referred to as “Hamilton’s weak principle” (HWP); see e.g. Ref. [32]. Copyright line will be provided by the publisher J.C. Mergel, R.A. Sauer, and S. Ober-Blöbaum: C 1 -continuous space-time discretization based on Hamilton’s law 6 on its origin can be found in a paper by Bailey (Ref. [3], p. 434): “When copies of Hamilton’s original papers [27, 28] were obtained, it was found that Hamilton had furnished what he called the ‘law of varying action’. He did not furnish what is now known as ‘Hamilton’s principle’. Evidently, in the latter part of the 19th century, application of the concepts of the variational calculus of Euler and Lagrange reduced Hamilton’s law to Hamilton’s principle.” We will explain later why the two additional boundary terms (caused by the non-zero variations) are important for the derivation of our final integration schemes; see Section 4.2. Equation (10) finally represents the (spatially and temporally) weak form of the governing equilibrium equations. Note that this expression is general and valid for elastodynamic problems in Rd , d ∈ {1, 2, 3}. Nevertheless, since we focus on the development and analysis of a new time integration method, we numerically investigate only one-dimensional problems with B̄ = T̄ = 0 in this paper. A detailed study of problems in both 2D or 3D may be the subject of future work. 3 Spatial discretization We now briefly outline the spatial discretization by means of the finite element method. Regarding nonlinear finite elements for solids we refer to text books such as Ref. [8, 78, 79]. We spatially discretize Eq. (10) by using nel finite elements; for each element, Ωe , the initial position, X, the deformation, x(X, t), and the velocity, v(X, t), are approximated by X h (X) = Ne (X) Xe , xh (X, t) = Ne (X) xe (t), v h (X, t) = Ne (X) ẋe (t), where the dot indicates the derivative with respect to time. The vectors       ẋ1 (t) X1 x1 (t)        .   .   .  ẋe (t) =  ..  Xe =  ..  , xe (t) =  ..  ,       ẋnne (t) xnne (t) Xnne (12) (13) contain the initial and current positions as well as the velocities of those nne nodes belonging to element Ωe . These   quantities are still continuous with respect to time. The array Ne = N1 I d , . . . , Nnne I d contains the nodal shape functions N1 – Nnne associated with Ωe . Using an isoparametric concept, we discretize the variations by means of the same shape functions, δxh (X, t) = Ne (X) δxe (t), δv h (X, t) = Ne (X) δ ẋe (t). (14) We can further write grad δxh = Be (X) δxe (t) (15) for a suitable definition of the strain operator Be . By inserting these relations into Eq. (10) and (11), we obtain δS h = nel h iT X δxT m ẋ , e e e (16) 0 e=1 where δS h can be computed from δS h = Z 0 T δLh (x, ẋ) dt, δLh (x, ẋ) = nel X  T  e δ ẋe me ẋe − δxT ; e f (17) e=1 Copyright line will be provided by the publisher ZAMM header will be provided by the publisher 7 cf. Eq. (6) – (8). Here, the vectors x(t) and ẋ(t) denote the deformation and velocity at all spatial FE nodes. The elemental e e mass matrices, me , and the force vectors, f e := fint − fext , are computed through Z me := ρ0 NT e Ne dV, (18) Ωe0 e fint := e fext := Z Ωe Z Ωe0 BT e σ dv, (19) ρ0 NT e B̄ dV + Z Γe0t NT e T̄ dA, (20) introducing Γe0t = Ωe0 ∩ ∂t B0h . To obtain a shorter notation we will later refer to the global mass matrix, m, and the global force vectors, f := fint − fext , assembled from the elemental contributions. Equation (16) finally corresponds to the spatially discrete version of Hamilton’s law of varying action. 4 Temporal discretization We now discretize the (spatially discrete) virtual action, δS h , in time. To achieve temporal C 1 -continuity, we approximate the nodal deformation of element Ωe by cubic Hermite shape functions; xe (t) ≈ xte (t) with e xte (t) = R1 (t) x̂en + R2 (t) x̂en+1 + H1 (t) v̂ne + H2 (t) v̂n+1 , t ∈ [tn , tn+1 ], (21) where n = 0, . . . , N −1, t0 = 0, and tN = T . The vectors x̂en and x̂en+1 contain the nodal deformations at tn and tn+1 ; e are the corresponding nodal velocities. See Appendix A.1 for the definition of the shape functions the vectors v̂ne and v̂n+1 R1 , R2 , H1 , and H2 . We can further write e ẋte (t) = Ṙ1 (t) x̂en + Ṙ2 (t) x̂en+1 + Ḣ1 (t) v̂ne + Ḣ2 (t) v̂n+1 , (22) e δxte (t) = R1 (t) δx̂en + R2 (t) δx̂en+1 + H1 (t) δv̂ne + H2 (t) δv̂n+1 , (23) e δ ẋte (t) = Ṙ1 (t) δx̂en + Ṙ2 (t) δx̂en+1 + Ḣ1 (t) δv̂ne + Ḣ2 (t) δv̂n+1 . (24) In order to improve readability, we will also use the assembled counterparts accounting for all spatial FE nodes at once. We will denote them e.g. by x̂n instead of x̂en ; see the analogy to x(t) / xe (t) introduced in the previous section. 4.1 Virtual action for a single time interval Approximations (21) – (24) are now inserted into the virtual action for a single time interval, [tn , tn+1 ]; this yields ht δSn+1 = Z tn+1  δLht xt , ẋt dt,  T T  δLht xt , ẋt = δ ẋt m ẋt − δxt f xt . (25) tn ht depends on four variables: x̂n , x̂n+1 , v̂n , and v̂n+1 ; it can thus be reformulated to The increment δSn+1 ht δSn+1 = δx̂n · ht ht ht ht ∂Sn+1 ∂Sn+1 ∂Sn+1 ∂Sn+1 + δx̂n+1 · + δv̂n · + δv̂n+1 · . ∂ x̂n ∂ x̂n+1 ∂ v̂n ∂ v̂n+1 (26) Following the terminology of Marsden and West [59], we now define the discrete momenta p̂− n := − ht ∂Sn+1 , ∂ x̂n p̂+ n+1 := ht ∂Sn+1 . ∂ x̂n+1 (27) Copyright line will be provided by the publisher J.C. Mergel, R.A. Sauer, and S. Ober-Blöbaum: C 1 -continuous space-time discretization based on Hamilton’s law 8 We further introduce two analogous variables that appear due to the Hermite discretization (21), q̂− n := − ht ∂Sn+1 , ∂ v̂n q̂+ n+1 := ht ∂Sn+1 . ∂ v̂n+1 (28) + Since q̂− n and q̂n+1 have the unit “momentum × time”, we refer to them as discrete “pseudo-momenta”. The four terms ht can be computed from the discrete action, Sn+1 , given in Appendix A.2; this results in p̂− n =− q̂− n =− Z tn+1 h tn Z tn+1 h Ṙ1 (t) m ẋt − R1 (t) f xt i Ḣ1 (t) m ẋt − H1 (t) f xt i dt, dt, p̂+ n+1 = q̂+ n+1 = Z tn+1 h tn Z tn+1 h Ṙ2 (t) m ẋt − R2 (t) f xt i dt, (29) i dt. (30) Ḣ2 (t) m ẋt − H2 (t) f xt tn tn By inserting these (pseudo-)momenta, we can simplify Eq. (26) to + + ht − δSn+1 = −δx̂n · p̂− n + δx̂n+1 · p̂n+1 − δv̂n · q̂n + δv̂n+1 · q̂n+1 . (31) ht In addition, since the variations δx̂n and δx̂n+1 remain arbitrary, δSn+1 must fulfill Hamilton’s law of varying action applied to the interval [tn , tn+1 ], ht δSn+1 = δx̂n+1 · m v̂n+1 − δx̂n · m v̂n . (32) After inserting Eq. (31), we finally obtain the spatially and temporally discrete version of Eq. (10) for a single time interval: h i h i h i h i + + − δx̂n · m v̂n − p̂− n + δx̂n+1 · p̂n+1 − m v̂n+1 + δv̂n · −q̂n + δv̂n+1 · q̂n+1 = 0 (33) for arbitrary variations δx̂n , δx̂n+1 , δv̂n , and δv̂n+1 . Note that we derive Eq. (33) by first varying the continuous action integral, and then discretizing its variation in space and time. We would, however, obtain the same expression if we first discretized the action itself, and then varied the discrete action for a single time interval. 4.2 Solution strategy In general, variational integrators are constructed by 1) summing up the discrete action for all time intervals, 2) taking its variation, and 3) re-arranging the summands. Doing so for Eq. (33), we would arrive at the following statement: −1 h i NX h i h i + − δx̂0 · m v̂0 − p̂− δx̂n · p̂+ n − p̂n + δx̂N · m v̂N − p̂N 0 + n=1 −1 h i NX h i h i + − + δv̂0 · − q̂− + δv̂n · q̂+ n − q̂n + δv̂N · q̂N = 0. 0 (34) n=1 This expression is equivalent to Eq. (33) summed up over the entire time domain. Solving Eq. (34) subsequently, however, results in a two-step method that is unconditionally unstable (i.e. for which the spectral radius is larger than one). This observation is also discussed in Ref. [68]. Instead, we develop a class of one-step methods arising from the virtual action for the individual time interval [tn , tn+1 ]. If the virtual displacements and velocities are presumed to be arbitrary, Eq. (33) Copyright line will be provided by the publisher ZAMM header will be provided by the publisher 9 provides us with (4 · d nno ) equations, p̂− n = m v̂n , (35) p̂+ n+1 = m v̂n+1 , (36) q̂− n = 0, (37) q̂+ n+1 = 0, (38) where nno is the number of finite element nodes. Physically, the first two equations relate the discrete momenta, p̂− n and p̂+ n+1 , to the linear momenta at tn and tn+1 ; see Fig. 1. The second two equations arise from the chosen Hermite approach. Assuming that the displacement and velocity of the previous time step, x̂n and v̂n , are given, we need only given: find: interval Fig. 1 Equilibrium equations for time interval [tn , tn+1 ]. (2 · d nno ) equations to determine the new state, x̂n+1 and v̂n+1 . The system (35) – (38) is thus over-determined. For this reason, we set two of the (so far arbitrary) variations, δx̂n , δx̂n+1 , δv̂n , and δv̂n+1 , to zero; this approach is further motivated in the following. The new deformation and velocity are then computed from the remaining two equations. We finally obtain six methods, which are illustrated in Fig. 2. p2-scheme: δv̂n = δv̂n+1 = 0 p̂− n = m v̂n , p̂+ n+1 = m v̂n+1 . (39) This seems to be the most promising approach: From its definition follows that it enforces a matching of the momenta + at the discrete time steps, i.e. that p̂− n = p̂n = m v̂n . q2-scheme: δx̂n = δx̂n+1 = 0 q̂− n = 0, q̂+ n+1 = 0. (40) This method can be seen as the counterpart of the p2-scheme. p+ q− -scheme: δx̂n = δv̂n+1 = 0 p̂+ n+1 = m v̂n+1 , q̂− n = 0. (41) This is one of four mixed methods, varying once the displacement and once the velocity. Copyright line will be provided by the publisher J.C. Mergel, R.A. Sauer, and S. Ober-Blöbaum: C 1 -continuous space-time discretization based on Hamilton’s law 10 p+ q+ -scheme: δx̂n = δv̂n = 0 p̂+ n+1 = m v̂n+1 , q̂+ n+1 = 0. (42) This scheme corresponds to the formulation proposed by Géradin [23]. p− q− -scheme: δx̂n+1 = δv̂n+1 = 0 p̂− n = m v̂n , p− q+ -scheme: q̂− n = 0. (43) δx̂n+1 = δv̂n = 0 p̂− n = m v̂n , q̂+ n+1 = 0. (44) (a) p2-scheme (b) q2-scheme (c) p+ q− -scheme (d) p+ q+ -scheme (e) p− q− -scheme (f) p− q+ -scheme Fig. 2 Illustration of the six integration schemes. Interestingly, the resulting six methods have completely different characteristics; it is not surprising that some of them are more favorable than others. In Section 5 we numerically investigate the properties of each scheme in terms of preservation of energy and convergence behavior. Furthermore, for linear systems we analyze the stability and symplecticity of the schemes. For several reasons we especially focus on the first, i.e. on the p2-scheme. Here, the discrete velocities, v̂n and v̂n+1 — appearing in the Hermite ansatz (21) — are connected to the displacements by setting the linear momenta, m v̂n + and m v̂n+1 , equal to the discrete momenta, p̂− n and p̂n+1 . Note that this approach is only possible because we explicitly Copyright line will be provided by the publisher ZAMM header will be provided by the publisher 11 account for the boundary terms appearing in Hamilton’s law of varying action. Second, since from definition (39) directly − + − follows that p̂+ n = p̂n , the discrete Euler-Lagrange equations, p̂n − p̂n = 0, are fulfilled automatically (cf. Chapter VI, Eq. (6.7) of Hairer et al. [26]). Interestingly, the p2-scheme satisfies balance of linear momentum (a generalization of conservation of momentum) averaged over the time step (Appendix A.4): Z tn+1  m ẍt + f xt dt = 0; (45) tn Nevertheless, we must point out that our six integrators are not variational; this becomes apparent especially for the four mixed methods, where we use one zero-variation for the displacement, and one for the velocity. We will show, however, that — at least for simple linear problems — the first two methods (39) and (40) have similar properties like variational integrators, such as symplecticity. In addition, we numerically demonstrate that these methods show a very good energypreserving behavior even for nonlinear problems with multiple degrees of freedom. In future work it would be interesting to compare these schemes with variational integrators in more detail, and to investigate symplecticity for arbitrary systems. It would be further interesting to examine whether the p2-schemes conserves momentum maps associated with symmetries of the Lagrangian. 4.3 Implementation In general, equations (35) – (38) are nonlinear. They thus must be linearized by using e.g. Newton’s method; this provides a system of linear equations that is iteratively solved for the new positions and velocities of the finite element nodes. For linearization, the derivatives of the discrete (pseudo-)momenta are required; see Appendix A.3. In analogy to the + + − force vectors and the mass matrix, the terms p̂− n , p̂n+1 , q̂n , and q̂n+1 can be computed by assembling the contributions + + − of each spatial element, denoted by p̂− e,n , p̂e,n+1 , q̂e,n , and q̂e,n+1 . Where possible, the integrals should be computed analytically; this can be done for the contributions due to 1) the kinetic energy and due to 2) any linear elastic internal energy (Appendix A.3). The remaining integrals are evaluated by Gaussian quadrature, choosing a sufficient number of quadrature points. For our time integration schemes, neither the kinetic/potential energy nor the total energy of the system must be evaluated explicitly. Since we want to investigate them in our numerical examples, however, we discuss these quantities in Appendix A.2. 4.4 Relation to other methods The idea of applying Hamilton’s law of varying action to initial value problems in structural dynamics goes back to the first approaches using finite elements in both space and time; see e.g. Ref. [1, 2, 20]. Instead of zero-variations of the displacement at initial and final time (as required for Hamilton’s principle), these publications account for zero-variations of both the initial displacement and velocity: δx(0) = δ ẋ(0) = 0. This idea has motivated Baruch and Riff [6] to combine different zero-variations of either the displacement or velocity at both t = 0 and t = T . Their approach results in six different methods that can be related — with several important differences — to our schemes. Since the same authors have discovered in a previous work [68] the instability of the solution scheme given by Eq. (34), they propose a modified discretization of the virtual displacements in Ref. [69]. In their approach, δx(t) is discretized by considering the second derivatives of the shape functions, R̈• (t) and Ḧ• (t); the variation of the Copyright line will be provided by the publisher J.C. Mergel, R.A. Sauer, and S. Ober-Blöbaum: C 1 -continuous space-time discretization based on Hamilton’s law 12 displacement is thus approximated by a linear (instead of a cubic) function in time. This modification leads to different partial derivatives of the action, and therefore to a different integration method. An even more important difference to our schemes concerns the zero-variations at the boundaries: While Riff and Baruch [69] consider the boundaries of the entire time domain (t = 0 and t = T ), we derive our schemes from zero-variations within each time interval, [tn , tn+1 ]. Our approach results in six different one-step methods solving the equations subsequently. In contrast, this is possible only for the so-called F4-method of Ref. [6, 69], where δx(T ) = δ ẋ(T ) = 0. For the remaining formulations in Ref. [6, 69], all equations would have to be solved simultaneously. In summary, one could loosely relate our six schemes to a subsequent application of the methods by Riff and Baruch [69] for each time interval, [tn , tn+1 ]. The underlying equations, however, are approximated differently. Besides that, the references mentioned above discuss only linear dynamic systems (where the forces depend on the displacement linearly). Recently, Leok and Shingel [50] have proposed a variational integrator based on Hermite finite elements in time. Their formulation is derived from a prolongation-collocation approach: In addition to the discrete Euler-Lagrange equations this method accounts for the system’s equation of motion in strong form,   m ẍt (t• ) + f xt (t• ) = 0, • ∈ {n, n + 1}. (46) For cubic Hermite shape functions — as they are used in our schemes — the velocities, v̂n and v̂n+1 , are computed from Eq. (46), using ẍt (t) = R̈1 (t) x̂n + R̈2 (t) x̂n+1 + Ḧ1 (t) v̂n + Ḧ2 (t) v̂n+1 ; (47) t cf. Eq. (22). These expressions are inserted into the temporally discrete action for one time interval, Sn+1 , which then depends only on the displacements, x̂n and x̂n+1 . The final time integration method of Leok and Shingel is obtained by t 1) varying the incremental action, Sn+1 , with respect to the displacements, and 2) setting the total virtual action to zero. Compared to our six Hermite formulations, the resulting method requires only half the number of unknowns to be solved within each time step. Its rate of convergence, however, is lower than the best of our schemes; see Section 5.4. Note that the combination of both spatial and temporal discretizations is not discussed in Ref. [50]. 5 Properties of the six schemes We now investigate the different properties of the six formulations, first focusing on a linear problem with a single degree of freedom. 5.1 Long-term behavior Consider a simple harmonic oscillator (i.e. a spring pendulum) with mass m and stiffness k. For an initial elongation of u0 = u(0), the displacement and velocity of the oscillator can be computed analytically: uan (t) = u0 cos(ω t) and p van (t) = −ω u0 sin(ω t). The frequency of oscillation is given by ω = k/m; the period length (i.e. the duration of one oscillation) is determined through T0 = 2π/ω. In the following, the numerical results are normalized by u0 , ω, T0 , and by the initial energy of the system, E0 = 1 2 k u20 . Copyright line will be provided by the publisher ZAMM header will be provided by the publisher 13 We now compare our Hermite schemes with the implicit Newmark algorithm [61], choosing the Newmark parameters as β = 1/4 and γ = 1/2. Regarding linear systems, this method is then not only unconditionally stable; it can further conserve the energy (see e.g. Ref. [35] or [43]). Besides, it is discussed in Ref. [41] that for γ = 1/2, the Newmark is variational. In addition to the Newmark algorithm, we consider a variational integrator based on linear finite elements in time (see Appendix B). We will refer to this method as L1-integrator. Fig. 3 shows the displacement and the velocity of the oscillator for three periods and a very coarse time discretization. As expected, for our six schemes the displacement (velocity) is C 1 -continuous (C 0 -continuous) at the discrete time steps. In contrast, the L1-integrator approximates the velocity as a constant along each time interval; this leads to discontinuities at the interval boundaries. For the Newmark algorithm, the displacement and velocity are evaluated only at the discrete 1.5 1.5 1 1 0.5 0.5 v / (ω u0) u / u0 time steps, tn . We observe that the oscillation period increases for both Newmark’s method and the L1-integrator. 0 −0.5 0 −0.5 −1 −1.5 −2 0 −1 NM, β = 1/4, γ = 1/2 L1 integrator p+q+ / Geradin (’74) p+q− scheme 0.5 1 −1.5 1.5 t / T0 2 2.5 3 −2 0 p2 scheme q2 scheme p−q+ scheme p−q− scheme 0.5 1 (a) Displacement 1.5 t / T0 2 2.5 3 (b) Velocity Fig. 3 Harmonic oscillator: Displacement and velocity for three periods of oscillation; the six Hermite schemes are compared with the Newmark algorithm (NM) and with the L1-integrator; ∆t = T0 /6. Regarding the maximum displacement, for two of our mixed methods (p− q+ and p− q− ) the amplitude of oscillation seems to increase remarkably (Fig. 3(a)). This indicates that these methods may be unstable. For the remaining mixed schemes (p+ q+ /Géradin and p+ q− ) the amplitudes in both the displacement and velocity decrease. In contrast, both the amplitude and the period of oscillation are well-preserved for our p2- and q2-schemes. Fig. 4 shows the total energy of the system over 100 oscillation periods. We observe that the schemes p− q+ and p− q− are unstable, while the schemes p+ q+ and p+ q− are strongly dissipative. This agrees with the results shown in Fig. 3. As expected, for both the remaining two schemes, p2 and q2, and for the L1-integrator, the total energy is qualitatively preserved. Interestingly, the p2- and the q2-scheme are more accurate; this is indicated by smaller amplitudes of oscillation in Fig. 4(b). Compared to the linear integrator, the maximum relative errors are smaller by one order of magnitude for the q2-scheme, and even by two orders for the p2-scheme; see Table 1. Copyright line will be provided by the publisher J.C. Mergel, R.A. Sauer, and S. Ober-Blöbaum: C 1 -continuous space-time discretization based on Hamilton’s law 14 1.6 1.01 1.4 1 1.2 E / E0 E / E0 1 0.8 0.6 0.4 0.2 0.98 L1 integrator p+q+ / Geradin (’74) p+q− scheme p2 scheme q2 scheme p−q+ scheme p−q− scheme 0 0 20 40 0.99 0.97 t / T0 60 80 (a) Total energy, E = K + Π 100 0.96 80 L1 integrator p2 scheme q2 scheme 85 90 t / T0 95 100 (b) Zoom of (a) Fig. 4 Harmonic oscillator: Long-term energy behavior for 100 periods of oscillation; the six Hermite schemes are compared with the L1-integrator; ∆t = T0 /10. Table 1 Harmonic oscillator: Maximum error in the total energy for the methods shown in Fig. 4(b). emax E 5.2 p2 q2 L1 0.023 % 0.653 % 3.29 % Stability We now investigate the stability of the six schemes by means of the harmonic oscillator. For this purpose, we introduce the normalized time step γ := ω ∆t and insert it into Eq. (39) – (44). Following Ref. [49,63], the six schemes can be expressed in the form  vn+1   vn    = A , ω un+1 ω un (48) where A is the amplification matrix given in Appendix C. The terms un and vn denote the displacement and the velocity at time step tn . Fig. 5 shows the spectral radius, ρ(A), for each of the schemes. Table 2 shows the maximum permitted time step, ∆tstab , for which the schemes are stable, i.e. for which ρ(A) ≤ 1. Both the table and Fig. 5(b) show that the last two schemes, p− q− and p− q+ , are unstable even for very small time steps. In contrast, the schemes p+ q− and p+ q+ seem to be stable for large time steps; nevertheless, these methods are numerically dissipative because of ρ(A) < 1 for γ < γstab (see Fig. 5(b)). The most promising methods seem to be the p2-scheme and the q2-scheme; they show both excellent stability and energy preservation. 5.3 Symplecticity As discussed in Section 5.1, for the linear oscillator both the p2-scheme and the q2-scheme preserve the energy of the system well. This motivates us to investigate whether these methods are generally symplectic. One way to prove symplecticity is to investigate the derivatives of the phase state, (p̂n+1 , x̂n+1 ), w.r.t. the previous state, (p̂n , x̂n ). Here, p̂• is the linear Copyright line will be provided by the publisher ZAMM header will be provided by the publisher 15 1+1e−9 p+q+ / Geradin (’74) p+q− scheme p2 scheme q2 scheme p−q+ scheme p−q− scheme 1 p+q+ / Geradin (’74) p+q− scheme p2 scheme q2 scheme p−q+ scheme p−q− scheme ρ(A) ρ(A) 10 1 0 10 −2 −1 10 0 10 1 10 10 1−1e−9 −2 10 −1 10 γ γ (a) Spectral radius of A (b) Zoom of (a); the purple line is hidden behind the blue one Fig. 5 Harmonic oscillator: Spectral radius for the six Hermite schemes as a function of the normalized time step, γ. Table 2 Harmonic oscillator: Maximum time steps, γstab and ∆tstab , for which the schemes are stable. p2 q2 p+ q− p+ q+ p− q− p− q+ γstab [−] 3.144 3.055 3.083 9.165 – – ∆tstab [T0 ] 0.500 0.486 0.491 1.459 – – momentum, given by p̂• = m v̂• . This results in the Jacobian ∂ p̂n+1  ∂ p̂n :=   ∂ x̂n+1 ∂ p̂n  Bn+1   ∂ p̂n+1 ∂ v̂n+1 −1 m m  ∂ x̂n  ∂ v̂n = ∂ x̂n+1   ∂ x̂n+1 −1 m ∂ x̂n ∂ v̂n  ∂ v̂n+1 ∂ x̂n  . ∂ x̂n+1  ∂ x̂n m (49) According to Ref. [26], the mapping (p̂n , x̂n ) 7→ (p̂n+1 , x̂n+1 ) is symplectic if Bn+1 is symplectic, i.e. if   0 I d·n no , BT J= n = 0, . . . , N −1, n+1 J Bn+1 = J, −I d·nno 0 where I d·nno is the identity matrix of dimension d · nno . For the harmonic oscillator, the Jacobian reduces to   ∂vn+1 ∂vn+1 m  ∂vn ∂un  . Bn+1 =   1 ∂u ∂un+1  n+1 m ∂vn ∂un (50) (51) In this case one can show that the determinant of Bn+1 is equal to the determinant of the amplification matrix introduced in Eq. (48): det (Bn+1 ) = det (A). With this relation the condition for symplecticity (50) is fulfilled if the determinant of A is equal to one,  0  − det (A)   det (A) 0 = 0 −1  1  0 ⇒ det (A) = 1. (52) Copyright line will be provided by the publisher J.C. Mergel, R.A. Sauer, and S. Ober-Blöbaum: C 1 -continuous space-time discretization based on Hamilton’s law 16 By means of Appendix C one can show that both our p2-scheme and q2-scheme fulfill det (A) = 1 ∀ γ. This implies that — at least for the harmonic oscillator — these schemes are symplectic. It remains to be subject of further investigation whether this is also true for arbitrary systems with multiple degrees of freedom. 5.4 Convergence behavior We now focus on the four stable schemes: p2, q2, p+ q− , and p+ q+ (which is equivalent to the method of Géradin [23]). In order to study convergence for the harmonic oscillator we consider the maximum errors of the displacement, velocity, and total energy at the discrete time steps; these are given by emax = • max |e• (tn )|, • ∈ {u, v, E}, n=0,...,N (53) where eu (t) = |u(t) − uan (t)| / |u0 |, ev (t) = |v(t) − van (t)| / |ω u0 |, eE (t) = |E(t) − E0 | / E0 . (54) Fig. 6 shows the convergence behavior of these errors for our stable schemes, the Newmark algorithm, and the L1-integrator. In addition, we account for the results discussed in Ref. [50] for cubic Hermite interpolation. Note that compared to the last three methods, our time integration schemes must account for twice the number of unknowns in each step: the nodal displacements and the nodal velocities. This has been considered in the scaling of the abscissae by introducing the factor cDOF (cDOF = 1/2 for our schemes, otherwise cDOF = 1). As already shown in Fig. 3(b), for the L1-integrator the piecewise approximation of the velocity is discontinuous at the discrete time steps. Nevertheless, we can determine the discrete velocity at tn by computing the momentum from a discrete Legendre transformation [26]. This approach is also discussed by Ober-Blöbaum et al. [62] considering boundary conditions for the velocity. For the L1-integrator the maximum errors in both the velocity and in the energy (Fig. 6(b) and 6(c)) are finally obtained by v̂n = m−1 p̂n , p̂n := − ht ∂Sn+1 (x̂n , x̂n+1 ) ∂Snht (x̂n−1 , x̂n ) = . ∂ x̂n ∂ x̂n (55) As expected, Newmark’s method can conserve the energy of the (linear) system; the corresponding error thus lies in the range of machine precision. The errors in the displacement and in the velocity, however, are of order p = 2. The same rate of convergence can be observed for the L1-integrator. This agrees with the discussion in Ref. [63] that integrators interpolating the displacement linearly in time can be at most of second order. Our schemes p+ q+ [23], p+ q− , and q2 also show an order of p = 2. Since their computational effort is higher than for both Newmark’s method and the L1-integrator, these methods are not favorable. In comparison, Leok and Shingel prove convergence with order three for their integrator based on cubic Hermite interpolation (i.e. n = 2 in Theorem 2 of Ref. [50]). An even better rate of convergence is achieved with our favorite candidate, the p2-scheme: All of the errors in the displacement, the velocity, and the energy converge with order p = 4. Copyright line will be provided by the publisher ZAMM header will be provided by the publisher 17 0 0 10 10 p=2 p=2 −5 −5 emax v 10 max 10 eu p=4 −10 −15 10 −10 NM, β = 1/4, γ = 1/2 L1 integrator p+q+ / Geradin (’74) p+q− scheme p2 scheme q2 scheme 10 0 −1 10 10 p=4 10 εN εN steps steps −15 −2 10 (∆t / ∆t0) ⋅ cDOF −3 −4 10 10 10 (a) Maximum error in the displacement 0 −1 10 10 −2 10 (∆t / ∆t0) ⋅ cDOF −3 10 −4 10 (b) Maximum error in the velocity 0 10 p=2 −5 eE max 10 p=4 −10 10 ε Nsteps −15 10 0 −1 10 10 −2 10 (∆t / ∆t0) ⋅ cDOF −3 10 −4 10 (c) Maximum error in the energy Fig. 6 Harmonic oscillator: Convergence behavior for T = 2 T0 , ∆t0 = T0 /8; cDOF = 1/2 for our Hermite schemes, otherwise cDOF = 1; the dashed line labeled with ε Nsteps denotes the estimated machine precision multiplied with the number of computed steps. 6 Numerical results for 1D elastodynamics As shown in the previous sections, our p2-scheme is symplectic for the harmonic oscillator; it further possesses the highest rate of convergence. So far we have studied only linear problems with a single degree of freedom. In the following section we apply the p2-scheme to spatially continuous problems. 6.1 Axial vibration of a linear elastic bar We now discuss the free axial vibration of a linear elastic bar (Appendix D). For the spatial discretization we either use linear Lagrange or cubic Hermite finite elements; see Appendix A.1 and text books such as Ref. [78]. The second type of element yields a C 1 -continuous approximation of the displacement also in space. Copyright line will be provided by the publisher J.C. Mergel, R.A. Sauer, and S. Ober-Blöbaum: C 1 -continuous space-time discretization based on Hamilton’s law 18 Consider the bar vibrating in the first (i.e. the lowest) characteristic eigenmode. For this test case, the corresponding displacement, velocity, and energy can be analytically computed from the one-dimensional wave equation; this yields  uan (X, t) = u0 · cos πX L   · cos (ωan t), van (X, t) = −u0 · cos πX L  · ωan sin (ωan t) , and E0 = EA/(4 L) · (π u0 )2 . Here, X ∈ [0, L], u0 is the amplitude of oscillation, and ωan = π p (56) E/(ρ0 L2 ) is the first natural frequency. The deformation of the bar vibrating in the first mode is shown in Fig. 7. Here, six linear elements are used for the spatial discretization. As expected, the bar performs sinusoidal oscillations. Due to the coarse finite element mesh, however, the structure oscillates with a frequency slightly higher than the analytical solution: |ω − ωan | / ωan ≈ 1.15 %. The oscillation period of the discrete system, T0 , is thus smaller than the analytical solution, T0an = 2π/ωan . 2 t / T0 1.5 1 0.5 0 −0.2 0 0.2 0.4 0.6 0.8 1 1.2 x/L Fig. 7 Linear elastic bar: Two oscillations in the first natural frequency using the p2-scheme and linear FE. Like variational integrators, our p2-scheme does not incorporate any numerical dissipation to damp spurious oscillations; we thus must carefully adjust the size of the time step, ∆t, to the spatial FE element mesh. Since a stability analysis including spatial discretization can be quite tedious, we roughly estimate the maximum permitted time step for either linear or Hermite elements. We therefore consider the Courant-Friedrichs-Lewy (CFL) condition for one-dimensional problems, CCFL ≤ C max , where cW = CCFL := cW · ∆t , ∆L (57) p E/ρ0 is the velocity of wave propagation, and ∆L is the characteristic discretization length. For a linearly interpolated element applies ∆L := Le ; for a Hermite finite element, we choose ∆L := Le /2 to take into account that it has twice the number of unknowns (and thus higher accuracy). We now vary the CFL number for a bar vibrating for at least 1000 oscillations. The estimated maximum values are useful to choose appropriate parameters for the following numerical examples. Of course we cannot ensure, however, stability for arbitrary CFL numbers smaller than these estimates. As shown in the stability analysis for a single degree of freedom (Section 5.2), the methods may also become unstable for small ranges of parameters. This becomes apparent in Fig. 5(a), where the spectral radius of the p2-scheme exceeds the limit (one) for a small range of time steps, while being stable again for larger steps. Apart from that, the CFL condition does not serve as sufficient condition for stability. For linear finite max max elements we estimate CL1 ≈ 1.00 and Cp2 ≈ 0.90; this implies that the time step should fulfill ∆t ≤ 1.00 ∆L/cW Copyright line will be provided by the publisher ZAMM header will be provided by the publisher 19 max for the L1-integrator, and ∆t ≤ 0.90 ∆L/cW for the p2-scheme. For Hermite finite elements we obtain CL1 ≈ 0.72 and max Cp2 ≈ 0.96. In the case of linear problems Newmark’s method is unconditionally stable if β = 1/4 and γ = 1/2. 6.2 Convergence for the linear bar Reconsider the axial vibration discussed in the previous section. Following Ref. [18], we introduce for the displacement and velocity discrete L2 -norms including the relative errors at all time steps and finite element nodes: v u N nno u X X |e• (XI , tn )|2 , • ∈ {u, v}. ||e• ||Σ := t (N +1) · nno n=0 (58) I=1 This corresponds to the Frobenius norm of the arrays eu (XI , tn ) and ev (XI , tn ) normalized by (the square roots of) the numbers of nodes and time steps. The relative errors are defined as eu (X, t) = |u(X, t) − uan (X, t)| / |u0 |, ev (X, t) = |v(X, t) − van (X, t)| / |ωan u0 |. In analogy to Eq. (58), we define a discrete L2 -norm for the error in the energy, v uN u X |eE (tn )|2 , ||eE ||Σ := t N +1 n=0 (59) (60) using eE (t) from Eq. (54). Fig. 8 shows the convergence behavior of the displacement, the velocity, and the energy. For the spatial discretization, we either use linear and Hermite elements. We further consider two fixed CFL numbers, while refining both the mesh and the time step simultaneously. For a linear finite element mesh (left column of Fig. 8), the three time discretization methods converge with the same order. This indicates that for this specific problem, the error caused by the spatial discretization predominates. In contrast, the error due to the spatial Hermite discretization (right column of Fig. 8) carries considerably less weight. The p2-scheme yields a significantly higher convergence than for both the Newmark algorithm and the L1-integrator. Note that if the bar is discretized with linear elements, the resulting system can be treated as a naturally discrete springmass system consisting of linear springs. For such a spring-mass system, the (temporally) analytical solution is       π XI π XI h h · cos (ω t), van (XI , t = −u0 · cos · ω sin (ω t), uan (XI , t = u0 · cos L L (61) I = 1, . . . , nno ; cf. Eq. (56). The natural frequency, ω, can be determined by analyzing the eigenmodes of the discrete system. Fig. 9(a) and 9(b) show the maximum errors in the displacement and velocity arising from the temporal discretization. Here, the errors ehu and ehv are determined from Eq. (59), inserting the analytical solutions given by Eq. (61). As expected, the orders of convergence agree with those studied for a single degree of freedom (Section 5.4). Table 3 compares the computational cost of the three methods for those results shown in the right column of Fig. 8, CCFL = 0.5. Here, we measure the computation time that is required to obtain an error in the displacement smaller either than 1 %, 0.1 %, or 0.01 %; see Fig. 8(b). Although the p2-scheme must account for twice the number of unknowns within each time step, it takes — due to its higher order of convergence — less computation time than both the L1-integrator and Newmark’s method. Note that for this linear example, the integrals in the discrete momenta can be evaluated analytically, i.e. without numerical quadrature. For an example requiring quadrature also in time, we refer to the following section. Copyright line will be provided by the publisher J.C. Mergel, R.A. Sauer, and S. Ober-Blöbaum: C 1 -continuous space-time discretization based on Hamilton’s law 20 NM, β = 1/4, γ = 1/2 L1 integrator p2 scheme −1 10 NM, β = 1/4, γ = 1/2 L1 integrator p2 scheme −2 10 1 −2 10 || eu ||Σ || eu ||Σ −4 10 (linear FE) (Hermite FE) −6 10 −3 10 2 2 4.5 −8 10 1 −4 10 −1 1 −2 10 −3 10 ∆s −1 10 −2 10 −3 10 10 ∆s (a) Error in the displacement for spatially linear FE (b) Error in the displacement for spatial Hermite FE −2 10 −1 10 1 10 || ev ||Σ || ev ||Σ −4 10 (linear FE) −2 (Hermite FE) −6 10 −3 10 2 3.5 2 1 −8 10 1 −4 10 −1 −2 10 −3 10 ∆s −1 10 −2 10 −3 10 10 ∆s (c) Error in the velocity for spatially linear FE (d) Error in the velocity for spatial Hermite FE −2 10 −1 10 1 10 || eE ||Σ || eE ||Σ −4 10 (linear FE) −2 −3 10 2 (Hermite FE) −6 10 2 4 −8 10 1 −4 10 −1 10 −2 10 ∆s (e) Error in the energy for spatially linear FE −3 10 1 −1 10 −2 −3 10 10 ∆s (f) Error in the energy for spatial Hermite FE Fig. 8 Linear elastic bar: Convergence behavior of the displacement, the velocity, and the energy refining both the mesh and time step; the parameter ∆s is given by ∆s = ∆t/T0an = CCFL · ∆L/(2 L); dashed line: CCFL = 0.5, solid line: CCFL = 0.125; T = 1 T0an . Copyright line will be provided by the publisher ZAMM header will be provided by the publisher 21 0 0 10 10 p=2 p=2 −5 −5 || ehv ||Σ 10 || ehu ||Σ 10 p=4 −10 10 10 (linear FE) NM, β = 1/4, γ = 1/2 L1 integrator p2 scheme −15 10 p=4 −10 0 −1 10 10 (linear FE) −15 −2 −3 10 ∆t / T0an 10 −4 10 10 0 10 (a) Temporal error in the displacement −1 −2 10 10 ∆t / T0an −3 10 −4 10 (b) Temporal error in the velocity Fig. 9 Linear elastic bar: Convergence of the temporal errors in the displacement and the velocity for linear Lagrange FE; T = 1 T0an , ∆t0 = T0an /4. Table 3 Linear elastic bar: Step size, ∆s, and computation time, Tct , of the test cases from Fig. 8(b) (CCFL = 0.5), for which the error in the displacement is smaller than 1 %, 0.1 %, and 0.01 %; Tct denotes the time for one oscillation. Newmark ∆s Tct [ms] L1-integrator ∆s Tct [ms] p2-scheme ∆s Tct [ms] ||eu ||Σ < 1 % 1/32 79.6 1/32 105.0 1/16 44.9 ||eu ||Σ < 0.1 % 1/128 815.8 1/64 416.3 1/32 135.7 ||eu ||Σ < 0.01 % 1/256 2,919.4 5,381.3 1/64 574,3 6.3 1/256 Vibration of a nonlinear bar The numerical examples discussed in the previous sections cover both naturally discrete and (spatially discretized) continuum systems. So far only linear problems (for which the internal forces depend on the displacement linearly) have been investigated. We therefore consider a nonlinear Neo-Hooke material behavior, which is described in Appendix D. The bar is initially deformed by prescribing the same displacement and velocity as in Eq. (56). Fig. 10 shows the deformation of the bar (a) at the very beginning and (b) after a long period of oscillations. Here, a Hermite finite element mesh with eight elements is chosen. For a better comparison with the results from the previous section, the time step is normalized by the period length of the first eigenmode, T0an . Since the mechanical response of the system differs from the linear case, however, the initially sinusoidal oscillations turn into a set of different interfering oscillations (Fig. 10(b)). Fig. 11 shows the long-term behavior for a nonlinear bar, comparing the system’s total energy for the p2-scheme, the Newmark algorithm, and the L1-integrator. Like for the harmonic oscillator from Section 5.1, the energy oscillates while being qualitatively preserved. In comparison with the other methods the relative error of the p2-scheme is smaller by five orders of magnitude. Copyright line will be provided by the publisher J.C. Mergel, R.A. Sauer, and S. Ober-Blöbaum: C 1 -continuous space-time discretization based on Hamilton’s law 3 200 2.5 199.5 2 199 0 t / T an t / T0an 22 1.5 198.5 1 198 0.5 197.5 0 197 0 0.25 0.5 x/L 0.75 1 0 (a) Deformation for t / T0an ∈ [0, 3] 0.25 0.5 x/L 0.75 1 (b) Deformation for t / T0an ∈ [197, 200] Fig. 10 Nonlinear bar: Deformation of the bar (a) at the beginning of the oscillation, and (b) after a long time period, using the p2-scheme and Hermite FE; T = 200 T0an , ∆t = T0an /512, Le = L/8. −5 x 10 (E − E0) / E0 1 0.5 0 −0.5 −1 0 NM, β = 1/4, γ = 1/2 L1 integrator p2 scheme 20 40 60 80 100 t / T0an 120 140 160 180 200 Fig. 11 Nonlinear bar: Long-term energy behavior for approximately 200 periods of oscillation using Hermite FE; the maximum relative error of the p2-scheme is 3.7 · 10−10 ; ∆t = T0an /256, Le = L/4. In addition, we investigate the convergence behavior for a nonlinear bar, considering Hermite finite elements in space. Since for this case the deformation cannot be computed analytically, we compare our results with a fine reference solution, using both a very fine FE mesh and a small time step. Like for the examples shown in the previous section, we refine both discretizations simultaneously. The results are shown in Fig. 12(a) – 12(c). The accuracy of our scheme becomes most apparent for the displacement and the total energy; for these quantities we observe a significantly higher convergence. Note that caused by the nonlinear material law, both the p2-scheme and the L1-integrator require numerical quadrature to evaluate the time integral over the internal forces; see also Appendix A.3. If we demand, however, a sufficient high accuracy w.r.t. the fine solution, the computational cost may still be lower for the p2-scheme than for the Newmark algorithm. An error in the displacement smaller than 10−5 (Fig. 12(a)), for instance, requires a step size of ∆s = 1/2048 for Newmark’s Copyright line will be provided by the publisher ZAMM header will be provided by the publisher 23 method. In contrast, the p2-scheme achieves this accuracy already for ∆s = 1/512. Therefore, the measured computation time is significantly lower: 48.7% of the time required for the Newmark algorithm. We finally investigate how well the (spatially discrete) initial energy is preserved over time; see Fig. 12(d). The error plotted here thus arises only from the temporal discretization. A comparison with Fig. 6(c) shows that — for both the linear oscillator and the nonlinear bar — we achieve with the p2-scheme the same high order of convergence: p = 4. −2 −2 10 10 NM, β = 1/4, γ = 1/2 L1 integrator p2 scheme −4 −4 || eref ||Σ v 10 || eref ||Σ u 10 −6 −6 10 10 (Hermite FE) (Hermite FE) −8 10 −8 −2 −3 10 10 ∆s 10 −4 10 −2 −3 10 (a) Error in the displacement (w.r.t. reference solution) 10 ∆s −4 10 (b) Error in the velocity (w.r.t. reference solution) −4 −5 10 10 −6 10 || ehE ||Σ || eref ||Σ E p=2 −8 10 −10 10 p=4 −10 10 (Hermite FE) (Hermite FE) −12 10 −15 −2 −3 10 10 ∆s (c) Error in the total energy (w.r.t. reference solution) −4 10 10 −2 10 −3 10 ∆s −4 10 (d) Error in the total energy (w.r.t. E0 ) Fig. 12 Nonlinear bar: Relative errors with respect to (a) – (c) a very fine reference solution and (d) to the initial energy of the spatially discrete system, refining both the mesh and time step; ∆s = ∆t/T0an = ∆L/(16 L); shown is CCFL = 0.125 for Hermite FE and ref T = 2 T0an ; the reference solution is computed with the p2-scheme using Lref = T0an /8192. e = L/256 and ∆t 7 Conclusion In this work we derive a class of C 1 -continuous time integration methods for conservative elastodynamic problems. Using piecewise Hermite interpolation, we approximate the displacement of a deformable solid by C 1 -continuous functions in time. The velocity of the body is thus C 0 -continuous in the entire time domain. To explicitly account for any initial velocities in the system, we consider a generalization of Hamilton’s principle, referred to as Hamilton’s law of varying action. Copyright line will be provided by the publisher J.C. Mergel, R.A. Sauer, and S. Ober-Blöbaum: C 1 -continuous space-time discretization based on Hamilton’s law 24 From the action integral of the continuous system we derive the spatially and temporally weak form of the equilibrium equation in elastodynamics. This expression is first discretized in space, using a standard (Galerkin) finite element method. Afterwards, the spatially discrete system is discretized in time by 1) subdividing the temporal domain into a set of smaller time intervals, and 2) approximating the displacement by cubic Hermite shape functions. Generally, methods belonging to the class of variational integrators can be constructed by varying the action integral over the entire time domain. From this equation one can derive the discrete Euler-Lagrange equations in order to develop a subsequent time integration method. For cubic Hermite interpolation, however, the resulting variational integrator is unconditionally unstable; this issue has been discussed also by Riff and Baruch [68]. Therefore, we first vary the action of each time interval individually, and then derive different one-step methods to solve for the new (unknown) displacement and velocity. This yields six time integration schemes with different properties. Technically, these methods are not variational in the sense that they are not derived from the virtual action of the total domain. Interestingly, the most favorable of these methods — denoted as p2-scheme — offers similar advantageous properties like variational integrators: 1) a qualitatively accurate long-term behavior, and 2) symplecticity for simple linear systems. We first investigate the properties of our schemes by considering a harmonic oscillator. We then demonstrate numerically that the p2-scheme shows both conditional stability and convergence of order four. Afterwards, we examine both linear and nonlinear problems accounting either for inherently continuous or spatially discrete systems. Our results show that for an appropriate spatial discretization, the p2-scheme provides both reasonable computational effort and remarkably higher accuracy than variational integrators based on linear interpolation in time. This scheme also well-preserves the energy of the system for long-time integration. It remains to be seen whether our method is symplectic for arbitrary nonlinear systems. This and other properties (such as the convergence behavior and the preservation of momentum maps in the presence of symmetries) should be addressed in an analytical study in the future. Since the scope of this work is the construction of time integration methods, we here focus on one-dimensional elastodynamic problems. An elaborate study of elastodynamic problems in either two or three dimensions may be the scope of future work. In addition, since the numerical results obtained within this study for spatial Hermite finite elements look very promising, it would be interesting to apply our time integrator in combination with other spatially C 1 -continuous FE discretizations and — in particular — to isogeometric approaches [16, 34]. In contrast to higher-order Lagrangian finite elements, isogeometric elements can prevent high-frequency errors [17, 37] that require unnecessarily small time steps. Acknowledgements We are grateful to the German Research Foundation (DFG) supporting J. C. Mergel and R. A. Sauer through grants SA1822/5-1 and GSC111. We further thank Prof. Yuri B. Suris (Technical University of Berlin), Prof. Sachin S. Gautam (IIT Guwahati), and Marcus G. Schmidt (formerly RWTH Aachen University) for their helpful comments. A Implementation of our schemes This section contains helpful details for the implementation of our time integration schemes. Copyright line will be provided by the publisher ZAMM header will be provided by the publisher A.1 25 Shape functions In both the spatial and temporal discretizations, we consider either linear Lagrange or cubic Hermite shape functions. Usually, these functions are defined on master domains, denoted e.g. by τ ∈ [−1, 1] for the discretization in time. The mapping from the master to the temporal domain, τ 7→ t (t ∈ [tn , tn+1 ]), is characterized by the Jacobian determinant Jτ := ∂t/∂τ ; this determinant is given by Jτ = (tn+1 − tn )/2 for both the L1-integrator and our six schemes. • Linear Lagrange shape functions (for the L1-integrator): R1 (τ ) = 1 (1 − τ ), 2 R2 (τ ) = 1 (1 + τ ). 2 (62) • Cubic Hermite shape functions (for our schemes): R1 (τ ) H1 (τ ) A.2 = = 1 (2 + τ )(1 − τ )2 , 4 Jτ (τ + 1)(1 − τ )2 , 4 R2 (τ ) H2 (τ ) = = 1 (2 − τ )(1 + τ )2 = 1 − R1 (τ ), 4 Jτ (τ − 1)(1 + τ )2 . 4 (63) Discrete Lagrangian and action integral The discrete (pseudo-)momenta (27) and (28) are obtained by taking the derivatives of the spatially and temporally discrete action S ht = N −1 X ht Sn+1 , ht Sn+1 = n=0 Z tn+1  Lht xt , ẋt dt. (64) tn    Here, the discrete Lagrangian, Lht xt , ẋt = K ht ẋt − Πht xt , can be determined from K ht ẋ  t  nel  X 1 t T t = ẋ me ẋe , 2 e e=1 Πht x  t = "Z nel X e=1 Ωe0 #  t  t T W xe dV − xe  t e fext xe . (65)   In Eq. (29) and (30) we additionally use the relation f xt = ∂Πht xt /∂xt .    If required, the total energy of the system can be computed from E ht xt , ẋt = K ht ẋt + Πht xt . A.3 Implementation of the integrals As pointed out in Section 4.3, some of the integrals in the discrete (pseudo-)momenta can be computed analytically. For this purpose, we split the internal force into a linear and into a nonlinear part,   fint xt = k ut + fnlin xt , (66) where ut = xt − X, and where k is a linear stiffness matrix. The case fnlin = 0 corresponds to linear elasticity, while k = 0 represents the fully nonlinear case. Further let   e f xt := fnlin xt − fext . (67) Copyright line will be provided by the publisher J.C. Mergel, R.A. Sauer, and S. Ober-Blöbaum: C 1 -continuous space-time discretization based on Hamilton’s law 26 Inserting Eq. (21) and (22) into Eq. (29) and (30) yields with ∆t := tn+1 − tn h i Z tn+1  1 m 12 ûn+1 − 12 ûn − ∆t v̂n+1 − ∆t v̂n + R1 (t) e f xt dt 10 ∆t tn i ∆t h k 54 ûn+1 + 156 ûn − 13 ∆t v̂n+1 + 22 ∆t v̂n , + 420 h i Z tn+1  1 m 12 ûn+1 − 12 ûn − ∆t v̂n+1 − ∆t v̂n − R2 (t) e f xt dt = 10 ∆t tn i ∆t h + k − 156 ûn+1 − 54 ûn + 22 ∆t v̂n+1 − 13 ∆t v̂n 420 p̂− n = p̂+ n+1 (68) (69) and h i Z tn+1  1 H1 (t) e f xt dt m 3 ûn+1 − 3 ûn + ∆t v̂n+1 − 4 ∆t v̂n + 30 tn h i 2 ∆t k 13 ûn+1 + 22 ûn − 3 ∆t v̂n+1 + 4 ∆t v̂n , + 420 h i Z tn+1  1 m − 3 ûn+1 + 3 ûn + 4 ∆t v̂n+1 − ∆t v̂n − H2 (t) e f xt dt = 30 tn i ∆t2 h + k 22 ûn+1 + 13 ûn − 4 ∆t v̂n+1 + 3 ∆t v̂n . 420 q̂− n = q̂+ n+1 (70) (71) The derivatives with respect to x̂n+1 and v̂n+1 (required for linearization, see Section 4.3) are given by ∂ p̂+ n+1 ∂ x̂n+1 ∂ q̂− n ∂ x̂n+1 ∂ q̂+ n+1 ∂ x̂n+1 tn+1  ∂e f xt R1 (t) R2 (t) dt, ∂xt tn  Z tn+1 ∂e f xt 6 13 ∆t 2 R2 (t) = m− k− dt, 5 ∆t 35 ∂xt tn  Z tn+1 ∂e f xt 13 ∆t2 1 m+ k+ H1 (t) R2 (t) = dt, 10 420 ∂xt tn  Z tn+1 ∂e f xt 1 11 ∆t2 =− m+ k− H2 (t) R2 (t) dt 10 210 ∂xt tn ∂ p̂− 6 9 ∆t n = m+ k+ ∂ x̂n+1 5 ∆t 70 Z (72) (73) (74) (75) and ∂ p̂+ n+1 ∂ v̂n+1 ∂ q̂− n ∂ v̂n+1 ∂ q̂+ n+1 ∂ v̂n+1 A.4 tn+1  ∂e f xt dt, ∂xt tn  Z tn+1 ∂e f xt 1 11 ∆t2 =− m+ k− R2 (t) H2 (t) dt, 10 210 ∂xt tn  Z tn+1 ∂e f xt ∆t ∆t3 = m− k+ H1 (t) H2 (t) dt, 30 140 ∂xt tn  Z tn+1 ∂e f xt 2 ∆t ∆t3 2 = m− k− H2 (t) dt. 15 105 ∂xt tn 1 13 ∆t2 ∂ p̂− n =− m− k+ ∂ v̂n+1 10 420 Z R1 (t) H2 (t) (76) (77) (78) (79) Alternative representation of the p2-scheme + By integrating p̂− n and p̂n+1 from Eq. (29) by parts, we obtain p̂− n Z tn+1 h t t R1 (t) ẍ + f x = m v̂n + tn i dt, p̂+ n+1 Z tn+1 = m v̂n+1 − h i R2 (t) ẍt + f xt dt; (80) tn Copyright line will be provided by the publisher ZAMM header will be provided by the publisher 27 the p2-scheme (39) thus fulfills Z tn+1 h i R1 (t) ẍt + f xt dt = 0, tn Z tn+1 h i R2 (t) ẍt + f xt dt = 0. (81) tn Since further R1 (t), R2 (t) ≥ 0 and R1 (t) + R2 (t) = 1 (see Eq. (63)), we arrive at Eq. (45). B Linear variational integrator (L1) This section outlines the linear variational integrator (L1) that we use for comparison in Section 5 and 6. Here, the deformation and velocity are approximated by x(t) ≈ xt (t) and ẋ(t) ≈ ẋt (t), xt (t) = R1 (t) x̂n + R2 (t) x̂n+1 , ẋt (t) = Ṙ1 (t) x̂n + Ṙ2 (t) x̂n+1 , t ∈ [tn , tn+1 ], (82) where R1 and R2 are defined by Eq. (62). In analogy, we introduce δxt (t) = R1 (t) δx̂n + R2 (t) δx̂n+1 , δ ẋt (t) = Ṙ1 (t) δx̂n + Ṙ2 (t) δx̂n+1 . (83) With this interpolation the discretized action becomes S h ≈ S ht , S ht = N −1 X ht Sn+1 (x̂n , x̂n+1 ) . (84) n=0 From the discretization of the virtual action then follows that N −1  X n=0  ht ht ∂Sn+1 ∂Sn+1 δx̂n + δx̂n+1 = δxN · m ẋt (T ) − δx0 · m ẋt (0). ∂ x̂n ∂ x̂n+1 (85) Since the nth time step belongs to two time intervals, [tn−1 , tn ] and [tn , tn+1 ], we obtain ∂S1ht (x̂0 , x̂1 ) = 0, ∂ x̂0 ht (x̂n , x̂n+1 ) ∂Snht (x̂n−1 , x̂n ) ∂Sn+1 + = 0, ∂ x̂n ∂ x̂n m ẋt (0) + (86) n = 1, . . . , N −1. (87) ht The integrals within the partial derivatives of Sn+1 are also evaluated by Gaussian quadrature. Copyright line will be provided by the publisher J.C. Mergel, R.A. Sauer, and S. Ober-Blöbaum: C 1 -continuous space-time discretization based on Hamilton’s law 28 C Amplification matrices for the simple harmonic oscillator The amplification matrices of our six schemes (39) – (44) (required for Eq. (48)) are given by     26γ 4 −876γ 2 +2016 204γ 3 −2016γ 1  , Ap2 = 4 8γ +132γ 2 +2016 3γ 5 −204γ 3 +2016γ  26γ 4 −876γ 2 +2016  Aq2 Ap+ q−    4 2 3 7γ −192γ +420 45γ −420γ 1  = 4   , 2γ +18γ 2 +420 γ 5 −52γ 3 +420γ 7γ 4 −192γ 2 +420     4 2 3 65γ −1692γ +3780 390γ −3780γ 1  =   , 26γ 4 +198γ 2 +3780 7γ 5 −432γ 3 +3780γ 46γ 4 −1692γ 2 +3780  Ap+ q+ Ap− q− Ap− q+ D  13γ 4 −291γ 2 +630 1  =  10γ 4 +24γ 2 +630 γ 5 −81γ 3 +630γ   10γ 4 −582γ 2 +1260 1  = 4 γ +48γ 2 +1260 2γ 5 −162γ 3 +1260γ  60γ 3 −630γ    , 5γ 4 −291γ 2 +630   3 120γ −1260γ  , 26γ 4 −582γ 2 +1260   46γ 4 −1692γ 2 +3780 1  =  10γ 4 +198γ 2 +3780 7γ 5 −432γ 3 +3780γ 390γ 3 −3780γ    . 65γ 4 −1692γ 2 +3780 Equations for the 1D bar In Section 6 we investigate the axial deformation of a thin bar that is characterized by its length, L, density, ρ0 , cross section area, A, and Young’s modulus, E. We study both linear and nonlinear problems by considering different material behavior for the bar. Let X, x, and v denote the 1D equivalents of the terms written in bold font. We further assume that B̄ = T̄ = 0. For the 1D case the virtual kinetic energy, given by Eq. (7), reduces to Z L δK(v) = ρ0 A δv · v dX. (88) 0 For a linear elastic bar (discussed in Section 6.1 and 6.2), the virtual work (8) is given by Z L δΠ(x) = A δε · E ε dX, ε := λ − 1, (89) 0 where λ := ∂x/∂X. In Section 6.3 we consider a Neo-Hooke material with Poisson’s ratio ν = 0; see e.g. Ref. [79]: Z L  E δΠ(x) = A δλ · P dX, P := λ − λ−1 . (90) 2 0 For the spatial discretization of Eq. (88) – (90) by means of 1D finite elements, we refer e.g. to Ref. [78]. References [1] J. H. Argyris and D. W. Scharpf, Finite elements in time and space, Nucl. Eng. Des. 10(4), 456–464 (1969). [2] C. D. Bailey, Application of Hamilton’s law of varying action, AIAA J. 13(9), 1154–1157 (1975). [3] C. D. Bailey, A new look at Hamilton’s principle, Found. Phys. 5(3), 433–451 (1975). Copyright line will be provided by the publisher ZAMM header will be provided by the publisher 29 [4] C. D. Bailey, Hamilton, Ritz, and elastodynamics, J. Appl. Mech. 43(4), 684–688 (1976). [5] C. D. Bailey, The method of Ritz applied to the equation of Hamilton, Comput. Methods Appl. Mech. Eng. 7, 235–247 (1976). [6] M. Baruch and R. Riff, Hamilton’s principle, Hamilton’s law – 6n correct formulations, AIAA J. 20(5), 687–692 (1982). [7] O. A. Bauchau and T. Joo, Computational schemes for non-linear elasto-dynamics, Int. J. Numer. Methods Eng. 45, 693–719 (1999). [8] T. Belytschko, W. K. Liu, and B. Moran, Nonlinear Finite Elements for Continua and Structures (Wiley, Chichester, 2000). [9] P. Betsch and A. Janz, An energy-momentum consistent method for transient simulations with mixed finite elements developed in the framework of geometrically exact shells, Int. J. Numer. Methods Eng. (2016), DOI: 10.1002/nme.5217. [10] P. Betsch and P. Steinmann, Conservation properties of a time FE method – part II: Time-stepping schemes for non-linear elastodynamics, Int. J. Numer. Methods Eng. 50, 1931–1955 (2001). [11] M. Borri, G. L. Ghiringhelli, M. Lanz, P. Mantegazza, and T. Merlini, Dynamic response of mechanical systems by a weak Hamiltonian formulation, Comput. Struct. 20(1–3), 495–508 (1985). [12] N. Bou-Rabee and H. Owhadi, Stochastic variational integrators, IMA J. Numer. Anal. 29, 421–443 (2008). [13] P. Chadwick, Continuum Mechanics: Concise Theory and Problems (Dover Publications, 1999). [14] J. Chung and G. M. Hulbert, A time integration algorithm for structural dynamics with improved numerical dissipation: The generalized-α method, J. Appl. Mech. 60, 371–375 (1993). [15] J. Cortés and S. Martı́nez, Nonholonomic integrators, Nonlinearity 14(5), 1365–1392 (2001). [16] J. A. Cottrell, T. J. Hughes, and Y. Bazilevs, Isogeometric Analysis: Toward Integration of CAD and FEA (Wiley, 2009). [17] J. A. Cottrell, A. Reali, Y. Bazilevs, and T. J. R. Hughes, Isogeometric analysis of structural vibrations, Comput. Methods Appl. Mech. Eng. 195, 5257–5296 (2006). [18] F. Demoures, F. Gay-Balmaz, S. Leyendecker, S. Ober-Blöbaum, T. S. Ratiu, and Y. Weinand, Discrete variational Lie group formulation of geometrically exact beam dynamics, Numer. Math. 130(1), 73–123 (2015). [19] R. C. Fetecau, J. E. Marsden, M. Ortiz, and M. West, Nonsmooth Lagrangian mechanics and variational collision integrators, SIAM J. Appl. Dyn. Syst. 2(3), 381–416 (2003). [20] I. Fried, Finite-element analysis of time-dependent phenomena, AIAA J. 7(6), 1170–1173 (1969). [21] T. C. Fung, Unconditionally stable higher-order accurate Hermitian time finite elements, Int. J. Numer. Methods Eng. 39, 3475– 3495 (1996). [22] S. S. Gautam and R. A. Sauer, An energy-momentum-conserving temporal discretization scheme for adhesive contact problems, Int. J. Numer. Methods Eng. 93(10), 1057–1081 (2013). [23] M. Géradin, On the variational method in the direct integration of the transient structural response, J. Sound Vib. 34(4), 479–487 (1974). [24] O. Gonzalez, Exact energy and momentum conserving algorithms for general models in nonlinear elasticity, Comput. Methods Appl. Mech. Eng. 190, 1763–1783 (2000). [25] M. Groß, P. Betsch, and P. Steinmann, Conservation properties of a time FE method. Part IV: Higher order energy and momentum conserving schemes, Int. J. Numer. Methods Eng. 63, 1849–1897 (2005). [26] E. Hairer, C. Lubich, and G. Wanner, Geometric Numerical Integration, 2nd edition (Springer, Berlin Heidelberg, 2006). [27] W. R. Hamilton, On a general method in dynamics; by which the study of the motions of all free systems of attracting or repelling points is reduced to the search and differentiation of one central relation, or characteristic function, Phil. Trans. R. Soc. London 124, 247–308 (1834). [28] W. R. Hamilton, Second essay on a general method in dynamics, Phil. Trans. R. Soc. London 125, 95–144 (1835). [29] C. Hesch and P. Betsch, A mortar method for energy-momentum conserving schemes in frictionless dynamic contact problems, Int. J. Numer. Methods Eng. 77, 1468–1500 (2009). Copyright line will be provided by the publisher J.C. Mergel, R.A. Sauer, and S. Ober-Blöbaum: C 1 -continuous space-time discretization based on Hamilton’s law 30 [30] C. Hesch and P. Betsch, Transient three-dimensional domain decomposition problems: Frame-indifferent mortar constraints and conserving integration, Int. J. Numer. Methods Eng. 82, 329–358 (2010). [31] H. M. Hilber, T. J. R. Hughes, and R. L. Taylor, Improved numerical dissipation for time integration algorithms in structural dynamics, Earthq. Eng. Struct. Dyn. 5, 283–292 (1977). [32] D. H. Hodges and R. R. Bless, Weak Hamiltonian finite element method for optimal control problems, J. Guidance Control Dyn. 14(1), 148–156 (1991). [33] G. A. Holzapfel, Nonlinear Solid Mechanics: A Continuum Approach for Engineering (Wiley, Chichester, 2000). [34] T. J. R. Hughes, , J. A. Cottrell, and Y. Bazilevs, Isogeometric analysis: CAD, finite elements, NURBS, exact geometry and mesh refinement, Comput. Methods Appl. Mech. Eng. 194, 4135–4195 (2005). [35] T. J. R. Hughes, Stability, convergence and growth and decay of energy of the average acceleration method in nonlinear structural dynamics, Comput. Struct. 6(4–5), 313–324 (1976). [36] T. J. R. Hughes and G. M. Hulbert, Space-time finite element methods for elastodynamics: Formulations and error estimates, Comput. Methods Appl. Mech. Eng. 66, 339–363 (1988). [37] T. J. R. Hughes, A. Reali, and G. Sangalli, Duality and unified analysis of discrete approximations in structural dynamics and wave propagation: Comparison of p-method finite elements with k-method NURBS, Comput. Methods Appl. Mech. Eng. 197, 4104–4124 (2008). [38] G. M. Hulbert, Time finite element methods for structural dynamics, Int. J. Numer. Methods Eng. 33, 307–331 (1992). [39] G. M. Hulbert and T. J. R. Hughes, Space-time finite element methods for second-order hyperbolic equations, Comput. Methods Appl. Mech. Eng. 84, 327–348 (1990). [40] G. Johnson, S. Leyendecker, and M. Ortiz, Discontinuous variational time integrators for complex multibody collisions, Int. J. Numer. Methods Eng. 100, 871–913 (2014). [41] C. Kane, J. E. Marsden, M. Ortiz, and M. West, Variational integrators and the Newmark algorithm for conservative and dissipative mechanical systems, Int. J. Numer. Methods Eng. 49, 1295–1325 (2000). [42] M. Kobilarov, J. E. Marsden, and G. S. Sukhatme, Geometric discretization of nonholonomic systems with symmetries, Discrete Contin. Dyn. Syst. Ser. S 3(1), 61–84 (2010). [43] S. Krenk, Energy conservation in Newmark based time integration algorithms, Comput. Methods Appl. Mech. Eng. 195, 6110– 6124 (2006). [44] S. Krenk, Global format for energy-momentum based time integration in nonlinear dynamics, Int. J. Numer. Methods Eng. 100, 458–476 (2014). [45] D. Kuhl and M. A. Crisfield, Energy-conserving and decaying algorithms in non-linear structural dynamics, Int. J. Numer. Methods Eng. 45, 569–599 (1999). [46] D. Kuhl and E. Ramm, Generalized energy-momentum method for non-linear adaptive shell dynamics, Comput. Methods Appl. Mech. Eng. 178, 343–366 (1999). [47] D. Kuhl and E. Ramm, Time integration in the context of energy control and locking free finite elements, Arch. Comput. Methods Eng. 7(3), 299–332 (2000). [48] C. Lanczos, The Variational Principles of Mechanics, 4th edition (Dover Publications, New York, 1970). [49] B. Leimkuhler and S. Reich, Simulating Hamiltonian Dynamics (Cambridge University Press, Cambridge, 2005). [50] M. Leok and T. Shingel, Prolongation-collocation variational integrators, IMA J. Numer. Anal. 32(3), 1194–1216 (2012). [51] A. Lew, J. E. Marsden, M. Ortiz, and M. West, Asynchronous variational integrators, Arch. Rational Mech. Anal. 167(2), 85–146 (2003). [52] A. Lew, J. E. Marsden, M. Ortiz, and M. West, An overview of variational integrators, in: Finite Element Methods: 1970’s and Beyond, edited by L. P. Franca, T. E. Tezduyar, and A. Masud (CIMNE, Barcelona, 2004). Copyright line will be provided by the publisher ZAMM header will be provided by the publisher 31 [53] A. Lew, J. E. Marsden, M. Ortiz, and M. West, Variational time integrators, Int. J. Numer. Methods Eng. 60, 153–212 (2004). [54] S. Leyendecker, P. Betsch, and P. Steinmann, Objective energy-momentum conserving integration for the constrained dynamics of geometrically exact beams, Comput. Methods Appl. Mech. Eng. 195, 2313–2333 (2006). [55] S. Leyendecker, J. E. Marsden, and M. Ortiz, Variational integrators for constrained dynamical systems, Z. angew. Math. Mech. (ZAMM) 88(9), 677–708 (2008). [56] S. Leyendecker and S. Ober-Blöbaum, A variational approach to multirate integration for constrained systems, in: Multibody Dynamics, edited by J. C. Samin and P. Fisette, Computational Methods in Applied Sciences Vol. 28 (Springer Netherlands, 2013), pp. 97–121. [57] S. Leyendecker, S. Ober-Blöbaum, J. E. Marsden, and M. Ortiz, Discrete mechanics and optimal control for constrained systems, Optim. Control Appl. Methods 31(6), 505–528 (2010). [58] J. E. Marsden, G. W. Patrick, and S. Shkoller, Multisymplectic geometry, variational integrators, and nonlinear PDEs, Commun. Math. Phys. 199(2), 351–395 (1998). [59] J. E. Marsden and M. West, Discrete mechanics and variational integrators, Acta Numer. 10, 357–514 (2001). [60] S. Modak and E. D. Sotelino, The generalized method for structural dynamics applications, Adv. Eng. Softw. 33, 565–575 (2002). [61] N. M. Newmark, A method of computation for structural dynamics, ASCE J. Eng. Mech. Div. 85(EM3), 67–94 (1959). [62] S. Ober-Blöbaum, O. Junge, and J. E. Marsden, Discrete mechanics and optimal control: An analysis, ESAIM Control Optim. Calc. Var. 17(2), 322–352 (2011). [63] S. Ober-Blöbaum and N. Saake, Construction and analysis of higher order Galerkin variational integrators, Adv. Comput. Math. 41, 955–986 (2015). [64] S. Ober-Blöbaum, M. Tao, M. Cheng, H. Owhadi, and J. E. Marsden, Variational integrators for electric circuits, J. Comput. Phys. 242, 498–530 (2013). [65] J. T. Oden, A general theory of finite elements II. Applications, Int. J. Numer. Methods Eng. 1, 247–259 (1969). [66] D. A. Peters and A. P. Izadpanah, hp-version finite elements for the space-time domain, Comput. Mech. 3, 73–88 (1988). [67] S. Reich, Momentum conserving symplectic integrators, Physica D 76, 375–383 (1994). [68] R. Riff and M. Baruch, Stability of time finite elements, AIAA J. 22(8), 1171–1173 (1984). [69] R. Riff and M. Baruch, Time finite element discretization of Hamilton’s law of varying action, AIAA J. 22(9), 1310–1318 (1984). [70] T. E. Simkins, Unconstrained variational statements for initial and boundary-value problems, AIAA J. 16(6), 559–563 (1978). [71] T. E. Simkins, Finite elements for initial value problems in dynamcs, AIAA J. 19(10), 1357–1362 (1981). [72] J. C. Simo and N. Tarnow, The discrete energy-momentum method. Conserving algorithms for nonlinear elastodynamics, Z. angew. Math. Phys. (ZAMP) 43, 757–792 (1992). [73] J. C. Simo, N. Tarnow, and K. K. Wong, Exact energy-momentum conserving algorithms and symplectic schemes for nonlinear dynamics, Comput. Methods Appl. Mech. Eng. 100, 63–116 (1992). [74] Y. B. Suris, Hamiltonian methods of Runge-Kutta type and their variational interpretation, Math. Model. 2(4), 78–87 (1990). [75] M. Tao, H. Owhadi, and J. E. Marsden, Non-intrusive and structure preserving multiscale integration of stiff ODEs, SDEs and Hamiltonian systems with hidden slow dynamics via flow averaging, Multiscale Model. Simul. 8(4), 1269–1324 (2010). [76] S. Wolff and C. Bucher, Asynchronous variational integration using continuous assumed gradient elements, Comput. Methods Appl. Mech. Eng. 255, 158–166 (2013). [77] W. L. Wood, M. Bossak, and O. C. Zienkiewicz, An alpha modification of Newmark’s method, Int. J. Numer. Methods Eng. 15, 1562–1566 (1980). [78] P. Wriggers, Nonlinear Finite Element Methods (Springer, Berlin Heidelberg, 2008). [79] O. C. Zienkiewicz and R. L. Taylor, The Finite Element Method for Solid and Structural Mechanics, 6th edition (Elsevier Ltd., Butterworth-Heinemann, 2005). [80] O. C. Zienkiewicz, A new look at the Newmark, Houbolt and other time stepping formulas. A weighted residual approach, Earthq. Eng. Struct. Dyn. 5, 413–418 (1977). Copyright line will be provided by the publisher
5cs.CE
Towards a Constructive Version of Banaszczyk’s Vector Balancing Theorem Daniel Dadush∗1 , Shashwat Garg†2 , Shachar Lovett‡3 , and Aleksandar Nikolov§4 arXiv:1612.04304v1 [cs.DS] 13 Dec 2016 1 Centrum Wiskunde & Informatica, Amsterdam, [email protected] 2 3 Department of Mathematics and Computer Science, Eindhoven University of Technology, [email protected] Department of Computer Science and Engineering, University of California, San Diego, [email protected] 4 Department of Computer Science, University of Toronto, [email protected] Abstract An important theorem of Banaszczyk (Random Structures & Algorithms ‘98) states that for any sequence of vectors of `2 norm at most 1/5 and any convex body K of Gaussian measure 1/2 in Rn , there exists a signed combination of these vectors which lands inside K. A major open problem is to devise a constructive version of Banaszczyk’s vector balancing theorem, i.e. to find an efficient algorithm which constructs the signed combination. We make progress towards this goal along several fronts. As our first contribution, we show an equivalence between Banaszczyk’s theorem and the existence of O(1)-subgaussian distributions over signed combinations. For the case of symmetric convex bodies, our equivalence implies the existence of a universal signing algorithm (i.e. independent of the body), which simply samples from the subgaussian sign distribution and checks to see if the associated combination lands inside the body. For asymmetric convex bodies, we provide a novel recentering procedure, which allows us to reduce to the case where the body is symmetric. As our second main contribution, √ we show that the above framework can be efficiently implemented when the vectors have length O(1/ log n), recovering Banaszczyk’s results under this stronger assumption. More precisely, we use random walk techniques to produce the required O(1)-subgaussian signing √ distributions when the vectors have length O(1/ log n), and use a stochastic gradient ascent method to implement the recentering procedure for asymmetric bodies. 1 Introduction Given a family of sets S1 , . . . , Sm over a universe U = [n], the goal of combinatorial discrepancy minimization isPto find a bi-coloring χ : U → {−1, 1} such that the discrepancy, i.e. the maximum imbalance maxj∈[m] | i∈Sj χ(i)|, is made as small as possible. Discrepancy theory, where discrepancy minimization plays a major role, has a rich history of applications in computer science as well as mathematics, and we refer the reader to [22, 11, 12] for a general exposition. A beautiful question regards the discrepancy of sparse set systems, i.e. set systems in which each element appears in at most t sets. A classical √ theorem of Beck and Fiala [8] gives an upper bound of 2t − 1 in this setting. They also conjectured an O( t) bound, which if true would be tight. An improved Beck-Fiala bound of 2t−log∗ t was given by Bukh [10], where log∗ t is√the iterated logarithm function in base 2. Recently, it was shown by Ezra and Lovett [15] that a bound of O( t log t) holds with high probability when m ≥ n and each element is assigned to t sets uniformly at random. The best general bounds having sublinear dependence in t currently depend on n or m. Srinivasan [30] used Beck’s partial coloring method [7] to give a bound ∗ Supported by by ‡ Supported by § Supported by † Supported the NWO Veni grant 639.071.510. the Netherlands Organisation for Scientific Research (NWO) under project no. 022.005.025. an NSF CAREER award 1350481 and a Sloan fellowship an NSERC Discovery Grant 1 √ of O( t log min {n, m}). Using techniques from convex p geometry, Banaszczyk [2] proved a general result on vector balancing (stated below) which implies an O( t log min {n, m}) bound. The proofs of both Srinivasan’s and Banaszczyk’s bounds were non-constructive, that is, they provided no efficient algorithm to construct the guaranteed colorings, short of exhaustive enumeration. In the last 6 years, tremendous progress has been made on the question of matching classical discrepancy bounds algorithmically. Currently, essentially all discrepancy bounds proved using the partial coloring method, including Srinivasan’s, have been made constructive [4, 21, 17, 27, 14]. Constructive versions of Banaszczyk’s result have, however, proven elusive until very recently. In recent work [5], the first and second named authors jointly with Bansal gave a constructive algorithm for recovering Banaszczyk’s bound in the Beck-Fiala setting as well as the more general Komlós setting. An alternate algorithm via multiplicative weight updates was also given recently in [19]. However, finding a constructive version of Banaszczyk’s more general vector balancing theorem, which has further applications in approximating hereditary discrepancy, remains an open problem. This theorem is stated as follows: m Theorem 1 (Banaszczyk [2]). Let v1 , . . . , vn ∈ Rm satisfy kvi k2 ≤ 1/5. PnThen for any convex body K ⊆ R n of Gaussian measure at least 1/2, there exists χ ∈ {−1, 1} such that i=1 χi vi ∈ K. The lower bound 1/2 on the Gaussian measure of K is easily seen to be tight. In particular, if all the vectors are equal to 0, we must have that 0 ∈ K. If we allow Gaussian measure < 1/2, then K = {x ∈ Rn : x1 ≥ ε}, for ε > 0 small enough, is a clear counterexample. On the other hand, it is not hard to see that if K has Gaussian measure 1/2 then 0 ∈ K. Otherwise, there exists a halfspace H containing K but not 0, where H clearly has Gaussian measure less than 1/2. Banaszczyk’s theorem gives the best known bound for the notorious Komlós conjecture [29], a generalization of the Beck-Fiala conjecture, which states thatPfor any sequence of vectors v1 , . . . , vn ∈ Rm of `2 n n norm at most 1, there exists χ ∈ {−1, 1} such that k i=1√ χi vi k∞ is a constant independent of m and n. √ In this context, Banaszczyk’s theorem gives a bound of O( log m), because an O( log m) scaling of the unit ball of `m ∞ has Gaussian measure 1/2. Banaszczyk’s theorem together with estimates on the Gaussian √ measure of slices of the `m ∞ ball due to Barthe, Guedon, Mendelson, and Naor [6] give a bound of O( log d), where d ≤ min{m, n} is the dimension of the span of v1 , . . . , vn . A well-known reduction (see e.g. Lecture p 9 in [29]), shows that this bound for the Komlós problem implies an O( t log min{m, n}) bound in the Beck-Fiala setting. While the above results only deal with the case of K being a cube, Banaszczyk’s theorem has also been applied to other cases. It was used in [3] to give the best known bound on the Steinitz conjecture. In this problem, the input is a set of vectors v1 , . . . , vn in Rm of norm at most one and summing to 0. The aim is to find a permutation π : [n] → [n] to minimise the maximum sum prefix of the vectors rearranged according Pk to √ π i.e. to minimize maxk∈[n] k i=1 vπ(i) k. The Steinitz conjecture is that this bound should always be O( m), irrespective √of the number of vectors, and using the vector balancing theorem Banaszczyk proved a √ bound of O( m + log n) for the `2 norm. More recently, Banaszczyk’s theorem was applied to more general symmetric polytopes in Nikolov and Talwar’s approximation algorithm [25] for a hereditary notion of discrepancy. Hereditary discrepancy is defined as the maximum discrepancy of any restriction of the set system to a subset of the universe. In [25] it was shown that an effan efficiently computable quantity, denoted γ2 , bounds hereditary discrepancy from above and from below for any given set system, up to polylogarithmic factors. For the upper bound they used Banaszczyk’s theorem for a natural polytope associated with the set system. However, since there is no known algorithmic version of Banaszczyk’s theorem for a general body, it is not known how to efficiently compute colorings that achieve the discrepancy upper bounds in terms of γ2 . The recent work on algorithmic bounds in the Komlós setting does not address this more general problem. Banaszczyk’s proof of Theorem 1 follows an ingenious induction argument, which folds effect of Pthe n choosing the sign of vn into the body K. The first observation is that finding a point of the set i=1 {−vi , vi } Pn−1 inside K is equivalent to finding a point of i=1 {−vi , vi } in K − vn ∪ K + vn . Inducting on this set is not immediately possible because it may no longer be convex. Instead, Banaszczyk shows that a convex subset K ∗ vn of (K − vn ) ∪ (K + vn ) has Gaussian measure at least that of K, as long as K has measure at least 1/2, which allows him to induct on K ∗ vn . In the base case, he needs to show that a convex body of Gaussian measure at least 1/2 must contain the origin, but this fact follows easily from the hyperplane 2 separation theorem, as indicated above. While extremely elegant, Banaszczyk’s proof can be seen as relatively mysterious, as it does not seem to provide any tangible insights as to what the colorings look like. 1.1 Our Results As our main contribution, we help demystify Banaszczyk’s theorem, by showing that it is equivalent, up to a constant factor in the length of the vectors, to the existence of certain subgaussian coloring distributions. Using this equivalence, as our p second main contribution, we give an efficient algorithm that recovers Banaszczyk’s theorem up to a O( log min {m, n}) factor for all convex bodies. This improves upon the best previous algorithms of Rothvoss [27], Eldan and Singh [14], which only recover the theorem for symmetric convex bodies up to a O(log min {m, n}) factor. As a major consequence of our equivalence, we show that for any sequence v1 , . . . , vn ∈ Rm of short enough n vectors there exists a probability distribution χ ∈ {−1, 1} over colorings P such that, for any symmetric n m convex body K ⊆ R of Gaussian measure at least 1/2, the random variable i=1 χi vi lands inside K with probability at least 1/2. Importantly, if such a distribution can be efficiently sampled, we immediately get a universal sampler for constructing Banaszczyk colorings for all symmetric convex bodies (we remark that the recent work of [5] constructs a more restricted form of such distributions). Using random walk techniques, we show how to implement an approximate version of this sampler efficiently, which guarantees the same p conclusion when the vectors are of length O(1/ log min {m, n}). We provide more details on these results in Sections 1.1.1 and 1.1.2. To extend our results to asymmetric convex bodies, we develop a novel recentering procedure and a corresponding efficient implementation which allows us to reduce the asymmetric setting to the symmetric one. After this reduction, a slight extension of the aforementioned sampler again yields the desired colorings. We note that our recentering procedure in fact depends on the target convex body, and hence our algorithms are no longer universal in this setting. We provide more details on these results in Sections 1.1.3 and 1.1.4. Interestingly, we additionally show that this procedure can be extended to yield a completely different p coloring algorithm, i.e. not using the sampler, achieving the same O( log min {m, n}) approximation factor. Surprisingly, the coloring outputted by this procedure is essentially deterministic and has a natural analytic description, which may be of independent interest. Before we continue with a more detailed description on our results, we begin with some terminology and a well-known reduction. Given a set of vectors v1 , . . . , vn ∈ Rm , we shall call a property hereditary if it holds for all subsets of the vectors. We note that Banaszczyk’s vector balancing bounds restricted to a set of vectors are hereditary, since a bound on the maximum `2 norm of the vectors is hereditary. We shall say that a property of Pn def Pn n colorings holds in the linear setting, if when given any shift t ∈ i=1 [−vi , vP i] = { i=1 λi vi : λ ∈ [−1, 1] }, one n n can find a coloring (or distribution on colorings) χ ∈ {−1, 1} such that i=1 χi vi − t satisfies the property. It is well-known that Banaszczyk’s theorem also extends by standard arguments to the linear setting after reducing the `2 norm bound from 1/5 to 1/10 (a factor 2 drop). This follows, for example, from the general inequality between hereditary and linear discrepancy proved by Lovasz, Spencer, and Vesztergombi [20]. All the results in this work will in fact hold in the linear setting. When treating the linear setting, it is well known that one can always reduce to the case where the vectors v1 , . . . , vn P are linearly independent, and in n our setting, when m = n. In particular, assume we are given some shift t ∈ i=1 [−vi , vi ] and that v1 , . . . , vn are not linearly independent. Then, Pn using a standard linear algebraic technique, we can find a “fractional coloring” x ∈ [−1, 1]n such that i=1 xi vi = t, and the vectors (vi : i ∈ Ax ) are linearly independent, where def Ax = {i : xi ∈ (−1, 1)} is the set of fractional coordinates (see Lecture 5 in [29], or Chapter 4 in [22]). We can think of this as a reduction to coloring the linearly independent vectors indexed by Ax . Specifically, given x as above, define the lifting function Lx : [−1, 1]Ax → [−1, 1]n by ( zi : i ∈ Ax Lx (z)i = , ∀i ∈ [n] . (1) xi : i ∈ [n] \ Ax A This map takes any coloring χP ∈ {−1, 1} x P and “lifts” it to a full coloring Lx (χ) ∈ {−1, 1}n . It also satisfies Ax the P property that P Lx (χ)−t = i∈Ax χi vi − i∈Ax xi vi . So, if we can find a coloring χ ∈ {−1, 1} such that K, then we would if we define W as the i∈Ax χi vi − i∈Ax xi vi ∈P P have Lx (χ) − t ∈ K as well. P Moreover, P span of (vi : i ∈ Ax ), then i∈Ax χi vi − i∈Ax xi vi ∈ K if and only if i∈Ax χi vi − i∈Ax xi vi ∈ K ∩ W , 3 so we can replace K with K ∩ W , and work entirely inside W . For convex bodies K with Gaussian measure at least 1/2, the central section K ∩ W has Gaussian measure that is at least as large, so we have reduced the problem to the case of |Ax | linearly independent vectors in an |Ax |-dimensional space. (See Section 2 for the full details.) We shall thus, for simplicity, state all our results in the setting where the vectors v1 , . . . , vn are in Rn and are linearly independent. 1.1.1 Symmetric Convex Bodies and Subgaussian Distributions In this section, we detail the equivalence of Banaszczyk’s theorem restricted to symmetric convex bodies with the existence of certain subgaussian distributions. We begin with the main theorem of this section, which we note holds in a more general setting than Banaszczyk’s result. Theorem 2 (Main Equivalence). Let T ⊆ Rn be a finite set. Then, the following parameters are equivalent up to a universal constant factor independent of T and n: 1. The minimum sb > 0 such that for any symmetric convex body K ⊆ Rn of Gaussian measure at least 1/2, we have that T ∩ sb K 6= ∅. 2. The minimum sg > 0 such that there exists an sg -subgaussian random variable Y supported on T . We recall that a random vector Y ∈ Rn is s-subgaussian, or subgaussian with parameter s, if for any unit 2 vector θ ∈ S n−1 and t ≥ 0, Pr[|hY, θi| ≥ t] ≤ 2e−(t/s) /2 . In words, Y is subgaussian if all its 1-dimensional marginals satisfy the same tail bound as the 1-dimensional Gaussian of mean 0 and standard deviation s. Pn To apply the above to discrepancy, we set T = i=1 {−vi , vi }, i.e. all signed combinations of the vectors v1 , . . . , vn ∈ Rn . In this context, Banaszczyk’s theorem directly implies that sb ≤ 5 maxi∈[n] kvi k2 , and hence by our that sg = O(1) i∈[n] kvi k2 . Furthermore, the above extends to the linear setting letting Pequivalence Pmax n n T = i=1 {−vi , vi } − t, for t ∈ i=1 [−vi , vi ], because, as mentioned above, Banaszczyk’s theorem extends to this setting as well. The existence of the universal sampler claimed in the previous section is in fact the proof that sb = O(sg ) in the above Theorem. In particular, it follows directly from the following lemma. Lemma 3. Let Y ∈ Rn be an s-subgaussian random variable. There exists an absolute constant c > 0, such for any symmetric convex body K ⊆ Rn of Gaussian measure at least 1/2, Pr[Y ∈ s · cK] ≥ 1/2. Pn Here, if Y is the sg -subgaussian distribution Pn supported on i=1 {−vi , vi } − t as above, we simply let χ denote the random variable such that Y = i=1 χi vi −t. That χ now yields the desired universal distribution on colorings is exactly the statement of the lemma. As a consequence of the above, we see that to recover Banaszczyk’s theorem for symmetric convex bodies, it suffices to be ableP to efficiently sample from an O(1)-subgaussian distribution over sets of the type Pn n n i=1 {−vi , vi } − t, for t ∈ i=1 [−vi , vi ], when v1 , . . . , vn ∈ R are linearly independent and have `2 norm at Pnmost 1. Here we rely on homogeneity, that is,Pifn Y is an s-subgaussian random variable supported on i=1 {−vi , vi } − t then αY is αs-subgaussian on i=1 {−αvi , αvi } − αt, for α > 0. The proof of Lemma 3 (see section 3 for more details) follows relatively directly from well-known convex geometric estimates combined with Talagrand’s majorizing measures theorem, which gives a powerful characterization of the supremum of any Gaussian process. Unfortunately, Lemma 3 does not hold for asymmetric convex bodies. In particular, if Y = −e1 , the negated first standard basis vector, and K = {x ∈ Rn : x1 ≥ 0}, the conclusion is clearly false no matter how much we scale K, even though Y is O(1)-subgaussian and K has Gaussian measure 1/2. One may perhaps hope that the conclusion still holds if we ask for either Y or −Y to be in s · cK in the asymmetric setting, though we do not know how to prove this. We note however that this only makes sense when the support of Y is symmetric, which does not necessarily hold in the linear discrepancy setting. We now describe the high level idea of the proof for the reverse direction, namely, that sg = O(sb ). For this purpose, we show that the existence of a O(sb )-subgaussian distribution on T can be expressed as a two player zero-sum game, i.e. the first player chooses a distribution on T and the second player tries to find a non-subgaussian direction. Here the value of the game will be small if and only if the O(sb )-subgaussian distribution exists. To bound the value of the game, we show that an appropriate “convexification” of the space of subgaussianity tests for the second player can be associated with symmetric convex bodies of 4 Gaussian measure at least 1/2. From here, we use von Neumann’s minimax principle to switch the first and second player, and deduce that the value of the game is bounded using the definition of sb . 1.1.2 The Random Walk Sampler From the algorithmic perspective, it turns out that subgaussianity is a very natural property in the context of random walk approaches to discrepancy minimization. Our results can thus be seen as a good justification for the random walk approaches to making Banaszczyk’s theorem constructive. At a high level, in such approaches one runs a random walk over the coordinates of a “fractional coloring” χ ∈ [−1, 1]n until all the coordinates hit either 1 or −1. The steps of such a walk usually come from Gaussian increments (though not necessarily spherical), which try to balance the competing goals of keeping n discrepancy low and moving the fractional coloring χ closer to {−1, 1} . Since a sum of small centered Gaussian increments is subgaussian with the appropriate parameter, it is natural to hope that the output of a correctly implemented random walk is subgaussian. Our main result in this setting is that this is indeed possible to a limited extent, with the main caveat being that the walk’s output will not be “subgaussian enough” to fully recover Banaszczyk’s theorem. Pn Theorem 4. Let v1 , . . . , vn ∈ Rn be vectors of `2 norm at most 1 and let t ∈ i=1 [−vi , vi ]. Then, there is n an expected algorithm which outputs a random coloring χ ∈ {−1, 1} such that the random Pnpolynomial time √ variable i=1 χi vi − t is O( log n)-subgaussian. To achieve the above sampler, we guide our random walk using solutions to the so-called vector Kómlos program, whose feasibility was first given by Nikolov [24], and show subgaussianity using well-known martingale concentration bounds. Interestingly, the random walk’s analysis does not rely on phases, and is instead based on a simple relation between the walk’s convergence time and the subgaussian parameter. As an added bonus, we also give a new and simple constructive proof of the feasibility of the vector Kómlos program (see section 10 for details) which avoids the use of an SDP solver. Given the results of the previous section, the above random walk is a universal sampler for constructing the following colorings. Pn Corollary 5. Let v1 , . . . , vn ∈ Rn be vectors of `2 norm at most 1, let t ∈ i=1 [−vi , vi ], and let K ⊆ Rn be a symmetric convex body of Gaussian measure 1/2 (given by a membership oracle). Pn Then, there is√an expected n polynomial time algorithm which outputs a coloring χ ∈ {−1, 1} such that i=1 χi vi − t ∈ O( log n)K. As mentioned previously, the best previous algorithms in this setting are due to Rothvoss [27], Eldan and Singh [14], which find a signed combination inside O(log n)K. Furthermore, these algorithms are not universal, i.e. they heavily depend on the body K. We note that these algorithms are in fact tailored to find partial colorings inside a symmetric convex body K of Gaussian measure at least 2−cn , for c > 0 small enough, a setting in which our sampler does not provide any guarantees. We now recall prior work on random walk based discrepancy minimization. The random walk approach was pioneered by Bansal [4], who √ used a semidefinite program to guide the walk and gave the first efficient algorithm matching the classic O( n) bound of Spencer [28] for the combinatorial discrepancy of set systems satisfying m = O(n). Later, Lovett and Meka [21] provided a greatly simplified walk, removing the need for the semidefinite program, which recovered the full power of Beck’s entropy method for constructing partial colorings. Harvey, Schwartz, and Singh [17] defined another random walk based algorithm, which, unlike previous work and similarly to our algorithm, doesn’t explicitly use phases or produce partial colorings. The random walks of [21] and [17] both depend on the convex body K; the walk in [21] is only well-defined in a polytope, while the one in [17] remains well-defined in any convex body, although the analysis still applies only to the polyhedral setting. Most directly related to this paper is the recent work [5], which gives a walk that can be viewed as a randomized variant of the original 2t − 1 Beck-Fiala P proof. This n n walk induces a distribution χ ∈ {−1, 1} on colorings for which each coordinate of the output i=1 χi vi is O(1)-subgaussian. From the discrepancy perspective, this gives a sampler which finds colorings inside any axis parallel box of Gaussian measure at least 1/2 (and their rotations, though not in a universal manner), matching Banaszczyk’s result for this class of convex bodies. 5 1.1.3 Asymmetric Convex Bodies In this section, we explain how our techniques extend to the asymmetric setting. The main difficulty in the asymmetric setting is that one cannot hope to increase the Gaussian mass of an asymmetric convex body by simply scaling it. In particular, if we take K ⊆ Rn to be a halfspace through the origin, e.g. {x ∈ Rn : x1 ≥ 0}, then K has Gaussian measure exactly 1/2 but sK = K for all s > 0. At a technical level, the lack of any measure increase under scaling breaks the proof of Lemma 3, which is crucial for showing that subgaussian coloring distributions produce combinations that land inside K. The main idea to circumvent this problem will be to reduce to a setting where the mass of K is “symmetrically distributed” about the origin, in particular, when the barycenter of K under the induced Gaussian measure is at the origin. For such a body K, we show that a constant factor scaling of K ∩ −K also has Gaussian mass at least 1/2, yielding a direct reduction to the symmetric setting. To achieve this reduction, we will use a novel recentering procedure, which will both carefully fix certain coordinates of the coloring as well as shift the body K to make its mass more “symmetrically distributed”. The guarantees of this procedure are stated below: Pn Theorem 6 (Recentering Procedure). Let v1 , . . . , vn ∈ Rn be linearly independent, t ∈ i=1 [−vi , vi ], and K ⊆ Rn be a convex body P of Gaussian measure at least 1/2. Then, there exists a fractional coloring n x ∈ [−1, 1]n , such that for p = i=1 xi vi − t, Ax = {i ∈ [n] : xi ∈ (−1, 1)} and W = span(vi : i ∈ Ax ), the following holds: 1. p ∈ K. 2. The Gaussian measure of (K − p) ∩ W on W is at least the Gaussian measure of K. R 2 3. The barycenter of (K − p) ∩ W is at the origin, i.e. (K−p)∩W ye−kyk /2 dy = 0. n By convention, if the procedure returns a full coloring x ∈ {−1, 1} (in which case, since p ∈ K, we are done), we shall treat conditions 2 and 3 as satisfied, even though W = {0}. At a high level, the recentering procedure allows us to reduce the initial vector balancing problem to one in a possibly lower dimension with respect to “well-centered” convex body of no smaller Gaussian measure, and in particular, of Gaussian measure at least 1/2. Interestingly, as mentioned earlier in the introduction, the recentering procedure can also be extended to yield a full coloring algorithm. We explain the high level details of its implementation together with this extension in the next subsection. To explain how to use the fractional coloring x from Theorem 6 to get a useful reduction, recall the lifting function Lx : [−1, 1]Ax → [−1, 1]n defined in (1). WePreduce the initial P vector balancing problem to Ax such that χ v − the problem of finding a coloring χ ∈ {−1, 1} i∈Ax i i i∈Ax xi vi ∈ (K − p) ∩ W (note P P that i∈Ax χi vi − i∈Ax xi vi ∈ W by construction). Then we can lift this coloring to Lx (χ), which satisfies X i∈Ax χ i vi − X xi vi ∈ (K − p) ∩ W ⇔ n X Lx (χ)i vi − t ∈ K. i=1 i∈Ax def From here, the guarantee that K 0 = (K − p) ∩ W has Gaussian measure at least 1/2 and barycenter at the origin allows a direct reduction to the symmetric setting. Namely, we can replace K 0 by the symmetric convex body K 0 ∩ −K 0 without losing “too much” of the Gaussian measure of K 0 . This is formalized by the following extension of Lemma 3, which directly implies a reduction to subgaussian sampling as in section 1.1.1. Lemma 7. Let Y ∈ Rn be an s-subgaussian random variable. There exists an absolute constant c > 0, such for any convex body K ⊆ Rn of Gaussian measure at least 1/2 and barycenter at the origin, Pr[Y ∈ s · c(K ∩ −K)] ≥ 1/2. P P A In particular, if there exists a distribution over colorings χ ∈ {−1, 1} x such that i∈Ax χi vi − i∈Ax xi vi as above is 1/c-subgaussian, Lemma 7 implies that the random signed combination lands inside K 0 with probability at least 1/2. Thus, the asymmetric setting can be effectively reduced to the symmetric one, as claimed. 6 Crucially, the recentering procedure in Theorem 6 can be implemented in probabilistic polynomial time if one relaxes the barycenter condition from being exactly 0 to having “small” norm (see section 6 for details). Furthermore, the estimate in Lemma 7 will be robust to such perturbations. Thus, to constructively recover the colorings in the asymmetric setting, it will still suffice to be able to generate good subgaussian coloring distributions. Combining the sampler from Theorem 4 together with the recentering procedure, we constructively √ recover Banaszczyk’s theorem for general convex bodies up to a O( log n) factor. Theorem 8 (Weak Constructive Banaszczyk). There exists a probabilistic polynomial time √ algorithm which, n on input a linearly independent set of vectors v , . . . , v ∈ R of ` norm at most c/ log n, c > 0 small 1 n 2 Pn enough, t ∈ i=1 [−vi , vi ], and a (not necessarily symmetric) convex body K ⊆ Rn of Gaussian measure at n least Pn 1/2 (given by a membership oracle), computes a coloring χ ∈ {−1, 1} such that with high probability i=1 χi vi − t ∈ K. As far as we are aware, the above theorem gives the first algorithm to recover Banaszczyk’s result for asymmetric convex bodies under any non-trivial restriction. In this context, we note that the algorithm of Eldan and Singh [14] finds “relaxed” partial colorings, i.e. where the fractional coordinates of the coloring are allowed to fall outside [−1, 1], lying inside an n-dimensional convex body of Gaussian measure at least 2−cn . However, it is unclear how one could use such partial colorings to recover the above result, even with a larger approximation factor. 1.1.4 The Recentering Procedure In this section, we describe the details of the recentering procedure. We leave a thorough description of its algorithmic implementation however to section 6, and only provide its abstract instantiation here. Before we begin, we give a more geometric view of the vector balancing problem and the recentering procedure, which help clarify the exposition. Let v1 , . . . , vn ∈ Rn be linearly independent vectors and Pn t ∈ i=1 [−vi , vi ]. Given the target body K ⊆ Rn of Gaussian measure at least 1/2, weP can restate the n vector balancing problem geometrically as that of finding a vertex of the parallelepiped P = i=1 [−vi , vi ]−t lying inside K. Here, the choice of t ensures that 0 ∈ P . Note that this condition is necessary, since otherwise there exists a halfspace separating P from 0 having Gaussian measure at least 1/2. Recall now that in the linear setting, and using this geometric language, Banaszczyk’s theorem implies that if P contains the origin, and maxi∈[n] kvi k2 ≤ 1/10 (which we do not need to assume here), then any convex body of Gaussian measure at least 1/2 contains a vertex of P . Thus, for our given target body K, we should make our situation better replacing P and K by P − q and K − q, if q ∈ P is a shift such that K − q has higher Gaussian measure than K. In particular, given the symmetry of Gaussian measure, one would intuitively expect that if the Gaussian mass of K is not symmetrically distributed around 0, there should be a shift of K which increases its Gaussian measure. In the current language, fixing a color Pχi ∈ {−1, 1} for vector vi , corresponds to restricting ourselves to finding a vertex in the facet F = χi vi + j6=i [−vj , vj ] − t of P lying inside K. Again intuitively, restricting to a facet of P should improve our situation if the Gaussian measure of the corresponding slice of K in the lower dimension is larger than that of K. To make this formal, note that when inducting on a facet F of P (which is an n − 1 dimensional parallelepiped), we must choose a center q ∈ F to serve as the new origin in the lower dimensional space. Precisely, this can be expressed as inducting on the parallelepiped F − q and shifted slice (K − q) ∩ span(F − q) of K, using the n − 1 dimensional Gaussian measure on span(F − q). With the above viewpoint, one can restate the goal of the recentering procedure as that of finding a point q ∈ P ∩K, such that smallest facet F of P containing q, satisfies that (K −q)∩span(F −q) has its barycenter at the origin and Gaussian measure no smaller than that of K. Recall that as long as (K − q) ∩ span(F − q) has Gaussian measure at least 1/2, we are guaranteed that 0 ∈ K − q ⇒ q ∈ K. With this geometry in mind, we implement the recentering procedure as follows: Compute q ∈ P so that the Gaussian mass of K − q is maximized. If q is on the boundary of P , letting F denote a facet of P containing q, induct on F − q and the slice (K − q) ∩ span(F − q) as above. If q is in the interior of P , replace P and K by P − q and K − q, and terminate. We now explain why the above achieves the desired result. Firstly, if the maximizer q is in a facet F of P , then a standard convex geometric argument reveals that the Gaussian measure of (K − q) ∩ span(F − q) is no 7 smaller than that of K − q, and in particular, no smaller than that of K. Thus, in this case, the recentering procedure fixes a color for “free”. In the second case, if q is in the interior of P , then a variational argument gives that the barycenter of K − q under the induced Gaussian measure must be at the origin, namely, R −x2 /2 xe dx = 0. K−q To conclude this section, we explain how to extend the recentering procedure to directly produce a deterministic √ coloring satisfying Theorem 8. For this purpose, we shall assume that v1 , . . . , vn have length at most c/ log n, for a small enough constant c > 0. To begin, we run the recentering procedure as above, which returns P and K, with K having its barycenter at the origin. We now replace P, K by a joint scaling αP, αK, for α > 0 a large enough constant, so that αK has Gaussian mass at least 3/4. At this point, we run the original recentering procedure again with the following modification: every time we get to the situation where K has its barycenter at the origin, induct on the closest facet of P closest to the origin. More precisely, in this situation, compute a point p on the boundary of P closest to the origin, and, letting F denote the facet containing p, induct on F − p and (K − p) ∩ span(F − p). At the end, return the final found vertex. Notice that, as claimed, the coloring (i.e. vertex) returned by the algorithm is indeed deterministic. The reason the above algorithm works is the following. While we cannot guarantee, as in the original recentering procedure, that the Gaussian mass of (K − p) ∩ span(F − p) does not√decrease, we can instead show that it decreases only very slowly. In particular, we use the bound of O(1/ log n) on the length of the vectors v1 , . . . , vn to show that every time we induct, the Gaussian mass drops by at most a 1 − c/n factor. More generally, if the vectors had length at most d > 0, for d small enough, the drop would be of the order 2 1 − ce−1/(cd) , for some constant c > 0. Since we “massage” K to have Gaussian mass at least 3/4 before applying the modified recentering algorithm, this indeed allows to induct n times while keeping the Gaussian mass above 1/2, which guarantees that the final vertex is in K. To derive the bound on the rate of decrease of Gaussian mass, we prove a new inequality on the Gaussian mass of sections of a convex body near the barycenter (see Theorem 41), which may be of independent interest. As a final remark, we note that unlike the subgaussian sampler, the recentering procedure is not scale invariant. Namely, if we jointly scale P and K by some factor α, the output of the recentering procedure will not be an α-scaling of the output on the original K and P , as Gaussian measure is not homogeneous under scalings. Thus, one must take care to appropriately normalize P and K before applying the recentering procedure to achieve the desired results. We now give the high level overview of our recentering step implementation. The first crucial observation in this context, is that the task of finding t ∈ P maximizing the Gaussian measure of K − t is in fact a convex program. More precisely, the objective function (Gaussian measure of K − t) is a logconcave function of t and the feasible region P is convex. Hence, one can hope to apply standard convex optimization techniques to find the desired maximizer. It turns out however, that one can significantly simplify the required task by noting that the recentering strategy does not in fact necessarily need an exact maximizer, or even a maximizer in P . To see this, note that if p is a shift such that K − p has larger Gaussian measure than K, then by logconcavity the shifts K − αp, 0 < α ≤ 1, also have larger Gaussian measure. Thus, if a we find a shift p ∈ / P with larger Gaussian measure, letting αp be the intersection point with the boundary ∂P , we can induct on the facet of P − αp containing 0 and the corresponding slice of K − αp just as before. Given this, we can essentially “ignore” the constraint p ∈ P and we treat the optimization problem as unconstrained. This last observation will allow us to use the following simple gradient ascent strategy. Precisely, we simply take steps in the direction of the gradient until either we pass through a facet of P or the gradient becomes “too small”. As alluded to previously, the gradient will exactly equal a fixed scaling of the barycenter of K − p, p the current shift, under the induced Gaussian measure. Thus, once the gradient is small, the barycenter will be very close to the origin, which will be good enough for our purposes. The last nontrivial technical detail is how to efficiently estimate the barycenter, where we note that the barycenter is the expectation of a random point inside K − p. For this purpose, we simply take an average of random samples from K − p, where we generate the samples using rejection sampling, using the fact that the Gaussian measure of K is large. Conclusion and Open Problems In conclusion, we have shown a tight connection between the existence of subgaussian coloring distributions and Banaszczyk’s vector balancing theorem. Furthermore, we make use 8 of this connection to constructively recover a weaker version of this theorem. The main open problem we leave is thus to fully recover Banaszczyk’s result. As explained above, this reduces to finding a distribution on colorings such that the output random signed combination is O(1)-subgaussian, when the input vectors have `2 norm at most 1. We believe this approach is both attractive and feasible, especially given the recent work [5], which builds a distribution on colorings for which each coordinate of the output random signed combination is O(1)-subgaussian. Organization In section 2, we provide necessary preliminary background material. In section 3, we give the proof of the equivalence between Banaszczyk’s vector balancing theorem and the existence of subgaussian coloring distributions. In section 5, we give our random walk based coloring algorithm. In section 6, we describe the implementation of the recentering procedure. In section 7, we give the algorithmic reduction from asymmetric bodies to symmetric bodies, giving the proof of Theorem 8. In section 8, we show how extend the recentering procedure to a full coloring algorithm. In section 9, we prove the main technical estimate on the Gaussian measure of slices of a convex body near the barycenter, which is needed for the algorithm in 8. Lastly, in section 10, we give our constructive proof of the feasibility of the vector Kómlos program. Acknowledgments We would like to thank the American Institute for Mathematics for hosting a recent workshop on discrepancy theory, where some of this work was done. 2 Preliminaries Basic Concepts We write log x and logp for the logarithm base e and base 2 respectively. 2 x, Pnx > 0, 2 to be its Eucliean norm. Let B n = {x ∈ Rn : kxk ≤ 1} x For a vector x ∈ Rn , we define kxk2 = 2 2 i=1 i denote the unit Euclidean ball and S n−1 = {x ∈ P Rn : kxk2 = 1} = ∂Bn2 denote the unit sphere in Rn . For n x, y ∈ Rn , we denote their inner product hx, yi = i=1 xi yi . For subsets A, B ⊆ Rn , we denote their Minkowski sum A + B = {a + b : a ∈ A, b ∈ B}. Define span(A) to be the smallest linear subspace containing A. We denote the boundary of A by ∂A. We use the phrase ∂A relative to span(A) to specify that we are computing the boundary with respect to the subspace topology on span(A). A set K ⊆ Rn is convex if for all x, y ∈ K,λ ∈ [0, 1], λx + (1 − λ)y ∈ K. K is symmetric if K = −K. We shall say that K is a convex body if additionally it is closed and has non-empty interior. We note that the usual terminology, a convex body is also compact (i.e. bounded), but we will state this explicitly when it is necessary. If convex body contains the origin in its interior, we say that K is 0-centered. We will need the concept of a gauge function for 0-centered convex bodies. For bounded symmetric convex bodies, this functional will define a standard norm. Proposition 9. Let K ⊆ Rn be a 0-centered convex body. Defining the gauge function of the body K by kxkK = inf {s ≥ 0 : x ∈ sK}, the following holds: 1. Finiteness: kxkK < ∞, for x ∈ Rn . 2. Positive homogeneity: kλxkK = λkxkK , for x ∈ Rn , λ ≥ 0. 3. Triangle inequality: kx + ykK ≤ kxkK + kykK , for x, y ∈ Rn . Furthermore, if K is additionally bounded and symmetric, then k·kK is a norm which we call the norm induced by K. In particular, k · kK additionally satisfies that kxkK = 0 iff x = 0 and kxkK = k − xkK ∀x ∈ Rn . Gaussian and subgaussian random variables We define n-dimensional standard Gaussian X ∈ Rn to 1 −kxk22 /2 be the random variable with density √2π for x ∈ Rn . ne Definition 10 (Subgaussian Random Variable). A random variable X ∈ R is σ-subgaussian, for σ > 0, if ∀t ≥ 0, 2 1 Pr[|X| ≥ t] ≤ 2e− 2 (t/σ) . 9 We note that the canonical example of a 1-subgaussian distribution is the 1-dimensional standard Gaussian itself. For a vector valued random variable X ∈ Rn , we say that X is σ-subgaussian if all its one dimensional marginals are. Precisely, X is σ-subgaussian if ∀θ ∈ S n−1 , the random variable hX, θi is σ-subgaussian. We remark that from definition 10, it follows directly that if X is σ-subgaussian then αX is |α|σsubgaussian for any α ∈ R. The following standard lemma allows us to deduce subgaussianity from upper bounds on the Laplace transform of a random variable. We include a proof in the appendix for completeness. Lemma 11. Let cosh(x) = 21 (ex + e−x ) for x ∈ Rn . Let X ∈ Rn be a random vector. Assume that 2 E[cosh(hw, Xi)] ≤ βekσwk2 /2 , ∀w ∈ Rn , p for some σ > 0 and β ≥ 1. Then X is σ log2 β + 1-subgaussian. Furthermore, for X ∈ Rn standard 2 Gaussian, E[cosh(hw, Xi)] = ekwk2 /2 for w ∈ Rn . Gaussian measure We define γn to be the n-dimensional Gaussian measure on Rn . Precisely, for any measurable set A ⊆ Rn , Z 2 1 γn (A) = √ n e−kxk2 /2 dx, (2) 2π A noting that γn (Rn ) = 1. We will also need lower dimensional Gaussian measures restricted to linear subspaces of Rn . Thus, if A ⊆ W , W ⊆ Rn a linear subspace of dimension k, then γk (A) should be understood as the Gaussian measure of A within W , where W is treated as the whole space. When convenient, we will also use the notation γW (A) to denote γdim(W ) (A ∩ W ). When treating one dimensional Gaussian measure, we will often denote γ1 ((a, b)), where (a, b) is an interval, simply by γ1 (a, b) for notational convenience. By convention, we define γ0 (A) = 1 if 0 ∈ A and 0 otherwise. An important concept used throughout the paper is that of the barycenter under the induced Gaussian measure. Definition 12 (Barycenter). For a convex body K ⊆ Rn , we define its barycenter under the induced Gaussian measure, by Z 2 1 dx b(K) = √ n xe−kxk2 /2 . γn (K) 2π K 2 1 −kxk2 /2 Note that b(K) = E[X], if X is the random variable supported on K with probability density √2π /γn (K). ne n Extending the definition to slices of K, for any linear subspace W ⊆ R , we refer to the barycenter of K ∩ W to denote the one relative to the dim(W )-dimensional Gaussian measure on W (i.e. treating W as the whole space). Throughout the paper, we will need many inequalities regarding the Gaussian measure. The first important inequality is the Prékopa-Leindler inequality, which states that for λ ∈ [0, 1] and A, B, λA+(1−λ)B ⊆ Rn measurable subsets, that γn (λA + (1 − λ)B) ≥ γn (A)λ γn (B)1−λ . (3) We note that the Prékopa-Leindler inequality applies more generally to any logconcave measure on Rn , i.e. a measure defined by a density whose logarithm is concave. Importantly, this inequality directly implies that if A ⊆ Rn is convex, then log γn (A + t), for t ∈ Rn , is a concave function of t. We will need the following powerful inequality of Ehrhard, which provides a crucial strengthening of Prékopa-Leindler for Gaussian measure. Theorem 13 (Ehrhard’s inequality [13, 9]). For Borel sets A, B ⊆ Rn and 0 ≤ λ ≤ 1, Φ−1 (γn (λA + (1 − λ)B)) ≥ λΦ−1 (γn (A)) + (1 − λ)Φ−1 (γn (B)) where Φ(a) = γ1 ((−∞, a]) for all a ∈ R. 10 The power of the Ehrhard inequality is that it allows us to reduce many non-trivial inequalities about Gaussian measure to two dimensional ones. One can use it to show the following standard inequality on the Gaussian measures of slices of a convex body. We include a proof for completeness. Lemma 14. Given a convex body K ⊆ Rn with γn (K) ≥ 1/2, and a linear subspace H ⊆ Rn of dimension k. Then, γk (K ∩ H) ≥ γn (K). Proof. Clearly it suffices to prove the lemma for k = n − 1. Since Gaussian distribution is rotation invariant, without loss of generality, H = {x ∈ Rn : x1 = 0}. Let Kt = {x ∈ K : x1 = t} denote a slice of K at x1 = t. Then, Z ∞ −t2 /2 e √ γn−1 (Kt − te1 )dt γn (K) = 2π −∞ where γn−1 (Kt − te1 ) = 0 outside support of K. Define W ⊆ R2 as W = {(x, y) : y ≤ f (x)} where f : R → R is defined as f (t) = Φ−1 (γn−1 (Kt − te1 )) and f (t) = −∞ outside the support of K. It follows that γ2 (W ) = γn (K) ≥ 1/2. By Ehrhard’s inequality, f is concave on its support. Hence, W is a closed convex body. Let g = Φ−1 (γn (K)) ≥ 0. γn−1 (K ∩ H) ≥ γn (K) is then equivalent to showing (0, g) ∈ W . If (0, g) 6∈ W , then there exists a halfspace L such that W ⊆ L and (0, g) 6∈ L. Let d be the distance of origin (0, 0) from ∂L, the boundary of L. Since (0, g) 6∈ L and γ2 (L) ≥ 1/2, d < g. But this implies γ2 (L) = γ1 (−∞, d) < γ1 (−∞, g) = γn (K) = γ2 (W ) contradicting W ⊆ L. Vector Balancing: Reduction to the Linearly Independent Case In this section, we detail the standard vector balancing reduction to the case where the vectors are linearly independent. We will also cover some useful related concepts and definitions, which will be used throughout the paper. Definition 15 (Lifting Function). For a fractional coloring x ∈ [−1, 1]n , denote the set of fractional coordinates by Ax = {i ∈ [n] : xi ∈ (−1, 1)}. From here, for z ∈ [−1, 1]Ax , we define the lifting function Lx : [−1, 1]Ax → [−1, 1]n by ( zi : i ∈ Ax Lx (z)i = , ∀i ∈ [n] . xi : i ∈ [n] \ Ax Importantly, for χ ∈ {−1, 1} n to full colorings in {−1, 1} . Ax n we have that Lx (χ) ∈ {−1, 1} . Thus, Lx sends full colorings in {−1, 1} Ax The lifting function above is useful in that it allows us, given a fractional coloring x ∈ [−1, 1] with some of its coordinates set to {−1, 1}, to reduce any linear vector balancing problem to one on a smaller number of coordinates. We detail this in the following lemma. Pn n Lemma 16. Let v1 ,P . . . , v m ∈ Rm , t ∈ i=1 [−vi , vi ], and K ⊆ R . Then given a fractional coloring n n x ∈ [−1, 1] and p = i=1 xi vi − t, the following holds: 1. For z ∈ [−1, 1]Ax , we have that X zi vi − i∈Ax X x i vi + p = n X Lx (z)i vi − t . i=1 i∈Ax 2. For z ∈ [−1, 1]Ax , we have that X i∈Ax zi vi − X x i vi ∈ K − p ⇔ n X i=1 i∈Ax 11 Lx (z)i vi − t ∈ K . Proof. The first part follows from the computation X X Lx (z)i vi − t = zi vi + i∈Ax i∈[n] = X X xi v i − t i∈[n]\Ax zi vi − i∈Ax = X X x i vi + ( i∈Ax zi vi − i∈Ax X X xi vi − t) i∈[n] x i vi + p . i∈Ax The second part follows since X zi vi − X x i vi ∈ K − p ⇔ i∈Ax i∈Ax i∈Ax X zi vi − X x i vi + p ∈ K ⇔ n X Lx (z)i vi − t ∈ K , i=1 i∈Ax where the last equivalence is by part (1). In terms of a reduction, the above lemma says in words that the linear vector balancing problem with respect to the vectors P (vi : i ∈ [n]), shift t and set K, reduces to the linear discrepancy problem on (vi : i ∈ Ax ), shift i∈Ax xi vi and set K − p. We now give the reduction to the linearly independent setting. Pn Lemma 17. Let v1 , . . . , vn ∈ Rm , t ∈ i=1 [−vi , vi ]. Then, there is a polynomial time algorithm computing a fractional coloring x ∈ [−1, 1]n such that: Pn 1. i=1 xi vi = t. 2. The vectors (vi : i ∈ Ax ) are linearly independent. P P Pn 3. For z ∈ [−1, 1]Ax , i∈Ax zi vi − i∈Ax xi vi = i=1 Lx (z)i vi − t. Proof. Let x denote a basic feasible solution to the linear system ( ) n X n y∈R : yi vi = t, yi ∈ [−1, 1] ∀i ∈ [n] , i=1 which clearly can be computed in polynomial time. Note the system is feasible by construction of t. We now show that x satisfies the required conditions. Let r ≤ n denote the rank of the matrix (v1 , . . . , vn ). Since x is basic, it must satisfy at least n least of the constraints at it equality. In particular, at least n − r of the bound constraints must be tight. Thus, since Ax is the set of fractional coordinates, we must have |Ax | ≤ r. Furthermore, the vectors (vi : i ∈ Ax ) must be linearly independent, since otherwise x is not basic. Finally, for z ∈ [−1, 1]Ax , we have that X X X X X X zi vi − x i vi = zi vi + x i vi − x i vi = Lx (z)i vi − t , i∈Ax i∈Ax i∈Ax i∈[n]\Ax i∈[n] i∈[n] as needed. Let us now apply the above lemma to both the vector balancing problem and the subgaussian sampling problem. we have a vector balancing problem with respect to v1 , . . . , vn ∈ Rm , shift Pn First assume that m t ∈ i=1 [−vi , vi ], and K ⊆ R a convex body of Gaussian measure at least 1/2. Then applying the above n lemma, P we get x ∈ [−1, P 1] , such that our vector balancing reduces to the one with respect to (vi : i ∈ Ax ), shift i∈Ax xi vi ∈ i∈Ax [−vi , vi ], and K. This follows directly from Lemma 17 part 3 using the lifting function Lx . Now let W = span(vi : i ∈ Ax ), where dim(W ) = |Ax | by linear independence. Clearly, the reduced vector balancing problem looks for signed combinations in W , and hence we may replace K by K ∩ W . Here, note that by Lemma 14, γ|Ax | (K ∩ W ) ≥ γm (K) ≥ 1/2. Hence, this reduction reduces to a problem of the same type, where in addition, the vectors form a basis of the ambient space W . For the 12 n subgaussian sampling problem, by the identity 3 in Lemma 17, sampling a random coloring χ ∈ {−1, 1} Pn Ax such P that i=1 χi vP i − t is subgaussian clearly reduces to sampling Pn a random coloring χ ∈ {−1, 1} such that i∈Ax χi vi − i∈Ax xi vi is subgaussian since this equals i=1 Lx (χ)i vi − t. Furthermore, since the support support distribution lives in W , to test subgaussianity we need only check the marginals P of such aP hθ, i∈Ax χi vi − i∈Ax xi vi i for θ ∈ W ∩ S m−1 . Thus, we may assume that W is the full space. This completes the needed reductions. Computational Model To formalize how our algorithms interact with convex bodies, we will use the following computational model. To interact algorithmically with a convex body K ⊆ Rn , we will assume that K is presented by a membership oracle. Here a membership oracle OK on input x ∈ Rn , outputs 1 if x ∈ K and 0 otherwise. Interestingly, since we will always assume that our convex bodies have Gaussian measure at least 1/2, we will not need any additional centering (known point inside K) or well-boundedness (inner contained and outer containing ball) guarantees. The runtimes of our algorithms will be measured by the number of oracle calls and arithmetic operations they perform. We note that we use a simple model of real computation here, where we assume that our algorithms can perform standard operations on real numbers (multiplication, division, addition, etc.) in constant time. 3 Banaszczyk’s Theorem and Subgaussian Distributions In this section, we give the main equivalences between Banaszczyk’s vector balancing theorem and the existence of subgaussian coloring distributions. The fundamental theorem which underlies these equivalences is known as Talagrand’s majorizing measure theorem, which provides a nearly tight characterization of the supremum of any Gaussian process using chaining techniques. We now state an essential consequence of this theorem, which will be sufficient for our purposes. For a reference, see [31]. Theorem 18 (Talagrand). Let K ⊆ Rn be a 0-centered convex body and Y ∈ Rn be an s-subgaussian random vector. Then for X ∈ Rn the n-dimensional standard Gaussian, we have that E[kY k] ≤ s · CT · E[kXk] , where CT > 0 is an absolute constant. As a consequence of the above theorem together with geometric estimates proved in subsection 4.2, we derive the following lemma, which will be crucial to our equivalences and reductions. Lemma 19 (Reduction to Subgaussianity). Let Y ∈ Rn be s-subgaussian. Then, 1. If K ⊆ Rn is a symmetric convex body with γn (K) ≥ 1/2, then E[kY kK ] ≤ 1.5 · CT · s. In particular, Pr[Y ∈ 3 · CT · sK] ≥ 1/2. 2. If K ⊆ Rn is a convex body with γn (K) ≥ 1/2 and kb(K)k2 ≤ 1 √ , 32 2π then √ E[kY kK∩−K ] ≤ 2(1 + π 8 ln 2) · CT · s. √ In particular, Pr[Y ∈ 4(1 + π 8 ln 2) · CT · s(K ∩ −K)] ≥ 1/2. Proof of Lemma 19. The proof follows immediately by combining Lemmas 26, 30 and Theorem 18. We note that the lower bounds on the probabilities follow directly by Markov’s inequality. To state our equivalence, we will need the definitions of the following geometric parameters. 13 Definition 20 (Geometric Parameters). Let T ⊆ Rn be a finite set. • Define sg (T ) > 0 to be least number s > 0 such that there exists an s-subgaussian random vector Y supported on T . • Define sb (T ) > 0 to be the least number s > 0 such that for any symmetric convex body K ⊆ Rn , γn (K) ≥ 1/2, T ∩ sK 6= ∅. We now state our main equivalence, which gives a quantitative version of Theorem 2 in the introduction. Theorem 21. For T ⊆ Rn be a finite set, the following holds: 1. sb (T ) ≤ 1.5CT · sg (T ). √ 2. sg (T ) ≤ 2 · sb (T ). Using the above language, we can restate Banaszczyk’s vector balancing theorem restricted to symmetric convex bodies as follows: Pn Theorem 22 ([2]). Let v1 , . . . , vm ∈ Rn . Then sb ( i=1 {−vi , vi }) ≤ 5 maxi∈[m] kvi k2 . As an immediate corollary of Theorems 21 and 22 (extended to the linear setting) we deduce: √ Pn Corollary 23. Let v1 , . . . , vm ∈ Rn . Then sg ( i=1 {−vi , vi }) ≤ 2 · 5 maxi∈[m] kvi k2 . Furthermore, for √ Pm Pn t ∈ i=1 [−vi , vi ], sg ( i=1 {−vi , vi } − t) ≤ 2 · 10 maxi∈[m] kvi k2 . As explained in the introduction, the above equivalence shows the existence of a universal sampler for recovering Banaszczyk’s vector balancing theorem for symmetric convex bodies up to a constant factor in the length of the vectors. Precisely, this follows directly from Lemma 19 part 1 and Corollary 23 (for more details see the proof of Theorem 21 below). The following theorem, which we will need, is the classical minimax principle of Von-Neumann. Theorem 24 (Minimax Theorem [23]). Let X ⊆ Rn , Y ⊆ Rm be compact convex sets. Let f : X × Y → R be a continuous function such that 1. f (·, y) : X → R is convex for fixed y ∈ Y . 2. f (x, ·) : Y → R is concave for fixed x ∈ X. Then, min max f (x, y) = max min f (x, y) . x∈X y∈Y y∈Y x∈X We now proceed to the proof of Theorem 21. Proof of Theorem 21. Proof of 1: Let Y ∈ T be the sg (T )-subgaussian random variable. Let K ⊆ Rn be a symmetric convex body such that γn (K) ≥ 1/2. By Lemma 19 part 1, we have that E[kY kK ] ≤ 1.5CT · sg (T ). Thus, there exists x ∈ T such that x ∈ 1.5CT · sg (T )K. Since this holds for all such K, we have that sb (T ) ≤ 1.5CT · sg (T ) as needed. 14 Proof of 2: Recall the definition of cosh(x) = 12 (ex + e−x ) for x ∈ R. Note that cosh is convex, symmetric (cosh(x) = cosh(−x)), and non-negative. For w ∈ Rn , define gw : Rn → R≥0 by gw (x) = 2 cosh(hx, wi)/ekwk2 /2 . By Lemma 11, note that E[gw (X)] = 1 for X an n-dimensional standard Gaussian. Let D denote√the set of probability distributions on T . Our goal is to show that there exists D ∈ D such that Y ∼ D is 2 · sb (T )-subgaussian. By homogeneity, we may replace T by T /sb (T ), and thus assume that sb (T ) = 1. To show the existence of the subgaussian distribution, we will show that inf sup E [gw (Y )] ≤ 2 . (4) D∈D w∈Rn Y ∼D √ Before proving the bound (4), we show that this suffices to show the existence of the desired 2subgaussian distribution. Let D∗ ∈ D denote the minimizing distribution for (4). Then by definition of gw , we have that 2 E ∗ [cosh(hw, Y i)] ≤ 2ekwk2 /2 ∀ w ∈ Rn . (5) Y ∼D With the bounds p √ on the Laplace transform in (5), by Lemma 11 with β = 2 and σ = 1, we have that Y is log2 2 + 1 = 2-subgaussian as needed. We now prove the estimate in (4). Let C denote the closed convex hull of the functions gw . More precisely, C is the closure of the set of functions ( ) k k X X n f : T → R≥0 |f = λi gwi , k ∈ N, λi = 1, λi ≥ 0 ∀ i ∈ [k], wi ∈ R ∀ i ∈ [k] . i=1 i=1 By continuity, we clearly have that inf sup E [gw (Y )] = inf sup E [f (Y )] . D∈D w∈Rn Y ∼D D∈D f ∈C Y ∼D (6) The strategy will now be to apply the minimax theorem 24 to (6). For this to hold, we first need that both D and C are both convex and compact. This is clear for D, since D can be associated with the standard simplex in R|T | . By construction C is also convex, hence we need only prove compactness. Since T is finite and C is a closed subset of non-negative functions on T , C can be associated in the natural way with a |T | closed subset of R≥0 . To show compactness, it suffices to show that this set is bounded. In particular, it suffices to show that for f ∈ C, maxx∈T f (x) ≤ M for some universal constant M < ∞. Since every f ∈ C is a limit of convex combinations of the functions gw , w ∈ Rn , it suffices to show that sup max gw (x) ≤ ∞ . w∈Rn x∈T We prove this with the following computation: cosh(hw, xi) 2 ekwk2 /2 cosh(maxx∈T kxkkwk2 ) ≤ sup 2 n ekwk2 /2 w∈R sup max gw (x) = sup max w∈Rn x∈T w∈Rn x∈T 2 ≤ sup e(maxx∈T kxk2 )kwk2 −kwk2 /2 w∈Rn = e(maxx∈T kxk2 ) 2 /2 < ∞. Thus C is compact as needed. Lastly, note that the function EY ∼D [f (Y )] from D × C is bilinear, and hence is both continuous and satisfies (trivially) the convexity-concavity conditions in Theorem 24. By compactness of D and C and continuity, we have that inf sup E [f (Y )] = min max E [f (Y )] . D∈D f ∈C Y ∼D D∈D f ∈C Y ∼D 15 Next, by the minimax theorem 24, we have that min max E [f (Y )] = max min E [f (Y )] = max min f (x) D∈D f ∈C Y ∼D f ∈C D∈D Y ∼D = f ∈C x∈T sup P min f (x) . f= k i=1 λi gwi i=1 λi =1, λi ≥0 ∀i∈[k] wi ∈Rn ∀ i∈[k], k∈N x∈T Pk Pk Take f = i=1 λi gwi as above (now as a function on Rn ) and let Kf = {x ∈ Rn : f (x) ≤ 2}. Our task now reduces to showing that ∃x ∈ T such that x ∈ Kf . Since sb (T ) ≤ 1, it suffices to show that γn (Kf ) = Pr[X ∈ Kf ] ≥ 1/2, for X the n-dimensional standard Gaussian, and that Kf is symmetric and convex. Since f is a convex combination of symmetric and convex functions, it follows that Kf is symmetric and convex. Since f is non-negative, by Markov’s inequality k Pr[X ∈ / Kf ] = Pr[f (X) ≥ 2] ≤ k 1X 1X 1 E[f (X)] = λi E[gwi (X)] = λi = . 2 2 i=1 2 i=1 2 Hence Pr[X ∈ Kf ] = 1 − Pr[X ∈ / Kf ] ≥ 1/2, as needed. 4 Analysis of the Recentering Procedure We now give the crucial tool to reduce the asymmetric setting to the symmetric setting, namely, the recentering procedure corresponding to Theorem 6 in the introduction. In the next subsection (subsection 4.1), we detail how to use this procedure to yield the desired reduction. Proof of Theorem 6 (Recentering Procedure). We first recall the desired guarantees. For linearly independent Pn vectors v1 , . . . , vn ∈ Rn , a shift t ∈ i=1 [−vi , vi ], and a convex body K ⊆ RnPof Gaussian measure at least n 1/2, we would like to find a fractional coloring x ∈ [−1, 1]n , such that for p = i=1 xi vi − t and the subspace W = span(vi : i ∈ Ax ), the following holds: 1. p ∈ K. 2. γ|Ax | ((K − p) ∩ W ) ≥ γn (K). 3. b((K − p) ∩ W ) = 0. We shall prove this by induction on n. Note that the base case n = 0, reduces to the statement that 0 ∈ K, which is trivial. For a fractional coloring x ∈ [−1, 1]n , we remember first that Ax denotes the set of fractional coordinates and that Lx P : [−1, 1]Ax → [−1, 1]n is the lifting function (see Definition 15 for details). n Let P = i=1 [−vi , vi ] − t. Define the function Pnf (p) = log γn (K − p) for p ∈ P . Compute the maximizer p of f over P . Let x ∈ [−1, 1]n satisfy that p = i=1 xi vi − t and let W = span(vi : i ∈ Ax ). Note first that since γn (K − p) ≥ γn (K) ≥ 1/2, by Lemma 27 part 1 we have that 0 ∈ K − p ⇒ p ∈ K. Assume first that p is in the interior of P . Then, since p is a maximizer and does not touch the boundary of P , by the KKT conditions we must have that ∇f (p) = 0. From here, direct computation reveals that ∇f (p) = b(K − p). Again, since y does not touch again constraints of P , we see that Ax = [n] and hence W = Rn . Thus, as claimed, x satisfies the conditions of the theorem. Assume now that p ∈ ∂P . From here, we must have that |Ax | < n and hence dim(W ) = |Ax | < n. Next, by Lemma 14, we see that γ|Ax | ((K − p) ∩ W ) ≥ γn (K − p) ≥ γn (K) ≥ 1/2 . By Lemma 16 part 2, for z ∈ [−1, 1]Ax , we have that X i∈Ax zi vi − X xi vi ∈ K − p ⇔ n X i=1 i∈Ax 16 Lx (z)i vi − t ∈ K . P Thus, we may apply induction on the vectors (vi : i ∈ Ax ), the shift i∈Ax xi vi and convex body (K −p)∩W , and recover z ∈ [−1, 1]Ax , such that for Wz = span(vi : i ∈ Az ), we get X zi vi − X def xi vi = pz ∈ K − p , (7) i∈Ax i∈Ax and γ|Az | ((K − p − pz ) ∩ Wz ) ≥ γ|Ax | (K − p) , (8) b((K − p − pz ) ∩ Wz ) = 0 . (9) and We now claim that w = Lx (z) satisfies the conditions of the theorem. To see this, note that by Lemma 16 part 1, n n X X X X x i vi + p = p z + p . wi vi − t = zi vi − Lx (z)i vi − t = i=1 i=1 i∈Ax i∈Ax Furthermore, since pz ∈ K − p we have that pz + p ∈ K. Next, clearly Aw = Az and hence span(vi : i ∈ Aw ) = Wz . The claim thus follows by combining (7), (8), (9). 4.1 Reduction from Asymmetric to Symmetric Convex Bodies As explained in the introduction, the recentering procedure allows us to reduce Banaszczyk’s vector balancing theorem for all convex bodies to the symmetric case, and in particular, to the task of subgaussian sampling. We give this reduction in detail below. n Let v1 , . . . , vn , t, and K be as in Theorem 6, and let Pnx ∈ [−1, 1] the fractional coloring guaranteed by the recentering procedure. As in Theorem 6, let p = i=1 xi vi − t and W = span(vi : i ∈ Ax ). We shall now assume that maxi∈[n] kvi k2 ≤ c, a constant to be chosen later. From here, by Lemma 16 part 2, for A χ ∈ {−1, 1} x , X X X χi vi − xi vi ∈ (K − p) ∩ W ⇔ Lx (χ)i vi − t ∈ K . i∈Ax i∈Ax i∈[n] Let C = (K − p) ∩ W and d = |Ax |. By the guarantees on the recentering procedure, we know that γd (C) ≥ 1/2 and b(C) = 0. Then by Lemma 30 in section 4.2, for X ∈ W the d-dimensional standard Gaussian on W , we have that √ E[kXkC∩−C ] ≤ 2 E[kXkC ] ≤ 2(1 + π 8 ln 2) . √ Hence by Markov’s inequality, Pr[X ∈ 4(1 + π 8 ln 2)(C ∩ −C))] ≥ 1/2. At this point, using Banaszczyk’s theorem in the linear setting for symmetric bodies (which loses a factor of 2), if the `2 norm bound c satisfies √ 1/c ≥ 10 · 4(1 + π 8 ln 2) , Ax then by homogeneity there exists χ ∈ {−1, 1} X i∈Ax χi vi − X such that xi vi ∈ C ∩ −C ⇒ n X Lx (χ)i vi − t ∈ K . i=1 i∈Ax Hence, the reduction to the symmetric case follows. We can also achieve the same with a subgaussian sampler, though the vectors should be shorter. In particular, applying corollary 23, if √ √ 1/c ≥ 2 · 10 · CT · 4(1 + π 8 ln 2), 17 P P A then there exists a distribution on colorings χ ∈ {−1, 1} x such that i∈Ax χi vi − i∈Ax xi vi is (CT · 4(1 + √ π 8 ln 2))−1 -subgaussian. From here, by Lemma 19 part 2 applied to C, " # X X Pr ( χ i vi − xi vi ) ∈ C ∩ −C ≥ 1/2 , i∈Ax i∈Ax as needed. 4.2 Geometric Estimates In this section, we present the required estimates for the proof of Lemma 19. The following theorem of Latala and Oleszkiewicz will allow us to translate bounds on Gaussian measure to bounds on Gaussian norm expectations. Theorem 25 ([18]). Let X ∈ Rn be a standard n-dimensional Gaussian. Let K ⊆ Rn be a symmetric convex body, and let α ≥ 0 be chosen such that Pr[X ∈ K] = Pr[|X1 | ≤ α]. Then the following holds: 1. For t ∈ [0, 1], Pr[X ∈ tK] ≤ Pr[|X1 | ≤ tα]. 2. For t ≥ 1, Pr[X ∈ tK] ≥ Pr[[X1 | ≤ tα]. Using the above theorem we derive can derive bound goods bounds on Gaussian norm expectations. We note that much weaker and more elementary estimates than those given in 25 would suffice (e.g. Borell’s inequality), however we use the stronger theorem to achieve a better constant. Lemma 26. Let X ∈ Rn be a standard n-dimensional Gaussian. Let K ⊆ Rn be a symmetric convex body such that Pr[X ∈ K] ≥ 1/2. Then E[kXkK ] ≤ 1.5. Proof. Let m > 0 satisfy Pr[X ∈ mK] = Pr[kXkK ≤ m] = 21 . Note that m ≤ 1 by our assumption on K. Let α > 0 denote the number such that Pr[|X1 | ≤ α] = γ1 ([−α, α]) = 21 . Here a numerical calculation reveals α ≥ .67. By Theorem 25, we have that Pr[kXkK ≥ tm] ≤ Pr[|X1 | ≥ tα] for t ≥ 1. Thus, Z ∞ Z ∞ Z ∞ αt E[kXkK ] = ]dt Pr[kXkK ≥ t]dt ≤ m + Pr[kXkK ≥ t]dt ≤ m + Pr[|X1 | ≥ m 0 m m Z Z 1 ∞ 1 ∞ = (1 + Pr[|X1 | ≥ t]dt)m ≤ 1 + Pr[|X1 | ≥ t]dt α α α α r r Z 2 1 ∞ 2 1 2 −α2 /2 2 e−α /2 −t2 /2 √ (t − α)e =1+ dt = 1 + ( e − α/2) = 1/2 + α α α π π α 2π r 2 2 e−(.67) /2 ≤ 1/2 + ≤ 1.5 π .67 The following lemma shows that we can find a large ball in K centered around the origin, if either its Gaussian mass is large or its barycenter is close to the origin. Lemma 27. Let K ⊆ Rn be a convex body. Then the following holds: 1. If for r ≥ 0, γ1 ((−∞, r]) ≤ γn (K), then rB2n ⊆ K. √ In particular, if γn (K) = 1/2 + ε, for ε ≥ 0, this holds for r = 2πε. 2. If for 0 ≤ r ≤ 1/2, γ1 ([−2r, 2r]) ≤ γn (K) and kb(K)k2 γn (K) ≤ this holds for r = 1/4 if γn (K) ≥ 1/2 and kb(K)k2 ≤ 32√1 2π . 18 √1 2π 2 · r2 , then rB2n ⊆ K. In particular, Proof. We begin with part (1). Assume for the sake of contradiction that there exist x ∈ Rn , kxk2 ≤ r, such that x ∈ / K. Then, by the separator theorem there exists a unit vector θ ∈ S n−1 , such that maxz∈K hθ, zi < hθ, xi. In particular, K is strictly contained in the halfspace H = {z ∈ Rn : hθ, zi ≤ g} where g = hθ, xi. Thus γn (K) < γn (H) = γ1 ((−∞, g]). But note that by Cauchy-Schwarz g ≤ kθk2 kxk2 = r, a clear contradiction to the assumption on r. For the furthermore, we first see that √ 1 √ 2π Z 2πε e −x2 /2 0 √ ( 2πε) dx ≤ √ =ε. 2π √ Hence, γ1 ((−∞, 2πε]) ≤ 1/2 + ε = γn (K), as needed. We now prove part (2). Similarly to the above, if K does not contain a ball of radius r, then there exists a halfspace H = {z ∈ Rn : hθ, zi ≤ r − ε}, for some 0 < ε ≤ r, such that K ⊆ H. By rotational invariance of the Gaussian measure, we may assume that θ = e1 . Now let Kt = {x ∈ K : x1 = t} and let f (t) = γn−1 (Kt − te1 ), where clearly f (t) ∈ [0, 1]. From here, we see that Z r−ε −∞ 2 f (t) e−t /2 dt = t √ R 2 /2 2π r−ε e−t √ f (t)dt −∞ 2π Z r−ε −∞ 2 e−t /2 γn−1 (Kt − te1 ) t √ dt γn (K) 2π (10) = b(K)1 ≥ −kb(K)k2 . Thus to get a contradiction, it suffices to show that Z r−ε −∞ 2 e−t /2 f (t)dt < −γn (K)kb(K)k2 , t √ 2π (11) for any function f : (−∞, r − ε] → [0, 1] satisfying Z r−ε −∞ 2 e−t /2 √ f (t)dt = γn (K). 2π (12) From here, it is easy to see that the function f maximizing the left hand side of (11) satisfying (12) must be the indicator function of an interval with right end point r − ε, i.e. the function f which pushes mass “as far to the right” as possible. Now let l ≤ r − ε denote the unique number such that γ1 ([l, r − ε]) = γn (K), noting that the optimizing f is now the indicator function of [l, r − ε]. From here, a direct computation reveals that Z l r−ε 2 2 2 2 2 e−t /2 1 1 t √ = √ (e−l /2 − e−(r−ε) /2 ) < √ (e−l /2 − e−r /2 ) . 2π 2π 2π Now since γ1 ([l, r]) > γn (K) ≥ γ1 ([−2r, 2r]), we must have that l ≤ −2r. Using the inequalities 1 + x ≤ ex ≤ 1 + x + x2 , for |x| ≤ 1/2, we have that 2 2 2 2 1 1 √ (e−l /2 − e−r /2 ) ≤ √ (e−(2r) /2 − e−r /2 ) 2π 2π 1 ≤ √ (1 − (2r)2 /2 + (2r)4 /4 − (1 − r2 /2)) 2π 1 1 = √ ((4r2 )r2 − 3r2 /2) ≤ − √ · r2 /2 . ( since r ≤ 1/2 ) 2π 2π But by assumption − √12π · r2 /2 ≤ −γn (K)kb(K)k2 , yielding the desired contradiction. For the furthermore, it follows by a direct numerical computation. We will now extend the bound to asymmetric convex bodies having their barycenter near the origin. To do this, we will need the standard fact that the gauge function of a body is Lipschitz when it contains a large ball. We recall that a function f : Rn → R is L-Lipschitz if for x, y ∈ Rn , |f (x) − f (y)| ≤ Lkx − yk2 . 19 Lemma 28. Let K ⊆ Rn be a convex body satisfying rB2n ⊆ K for some r > 0. Then, the gauge function k · kK : Rn → R+ of K is (1/r)-Lipschitz. Proof. We need to show |kxkK − kykK | ≤ 1 kx − yk2 r for all x, y ∈ Rn . To see this, note that kxkK = k(x − y) + ykK ≤ kx − ykK + kykK ≤ kx − ykrB2n + kykK 1 = kx − yk2 + kykK , r (by triangle inequality) (since rB2n ⊆ K ) yielding kxkK − kykK ≤ 1r kx − yk2 . The other inequality follows by switching x and y. We will also need the following concentration inequality of Maurey and Pisier. Theorem 29 (Maurey-Pisier). Let f : Rn → R be an L-Lipschitz function. Then for X ∈ Rn standard Gaussian and t ≥ 0, we have the inequalities 2t2 Pr[f (X) − E[f (X)] ≥ tL] ≤ e− π2 and 2t2 Pr[f (X) − E[f (X)] ≤ −tL] ≤ e− π2 . We now prove the main estimate for asymmetric convex bodies. Lemma 30. Let K ⊆ Rn be a 0-centered convex body and X ∈ Rn be the standard n-dimensional Gaussian. Then the following holds: 1. E[kXkK∩−K ] ≤ 2 E[kXkK ]. 2. If γn (K) ≥ 1/2 and kb(K)k2 ≤ 1 √ , 32 2π √ then E[kXkK ] ≤ (1 + π 8 ln 2). Proof. We prove part (1). By symmetry of the Gaussian measure E[kXkK∩−K ] = E[max {kXkK , k − XkK }] ≤ E[kXkK + k − XkK ] = 2 E[kXkK ] , as needed. √ We prove part (2). Let c = π 8 ln 2. First, by Lemma 27 part 2 and our assumptions on K, we have that (1/4)B2n ⊆ K. Thus, by Lemma 28 k · kK is 4-Lipschitz. Assume for the sake of contradiction that E[kXkK ] > 1 + c. Then, since 1/2 ≤ γn (K) = Pr[X ∈ K] = Pr[kXkK ≤ 1] , we must have that Pr[kXkK − E[kXkK ] ≤ −c] > 1/2. But by Theorem 29 and the Lipschitz proporties of k · kK , Pr[kXkK − E[kXkK ] ≤ −c] ≤ e− 2(c/4)2 π2 = 1/2 , a clear contradiction. 5 √ An O( log n)-subgaussian Random Walk √ The O( log n)-subgaussian random walk algorithm is given as Algorithm 1. Step 8 can be executed in polynomial time by either calling an SDP solver, or executing the algorithm from Section 10. The feasibility of the program is guaranteed by Theorem 49, and also by the results of [24]. The matrix U (t) in step 10 can be computed by Cholesky decomposition. Let us first make some observations that will be useful throughout the analysis. Notice first that the random process χ(0), . . . , χ(T ) is Markovian. Let ui (t) be the i-th row of U (t). By the definition of Σ(t) 20 √ Algorithm 1 O( log n)-subgaussian Random Walk Algorithm Pn Input: v1 , . . . , vn ∈ Rm such that maxni=1 kvi k2 ≤ 1; a vector , vi ]. Pn y ∈ i=1 [−vi√ Output: random signs χ1 , . . . , χn ∈ {−1, 1} such that i=1 χi vi − y is O( log n)-subgaussian. Let V = (vi )ni=1 . √ 2 2 ln 2 log 2n 2 2 2 2n Let γ = 2 log ;δ= n n5/2 P; T = d2/γ e · dlog2 2ne; n Let χ(0) ∈ [−1, 1] be such that i χ(0)i vi = y. Let A(1) = {1, . . . , n} for t = 1, . . . , T do Compute Σ(t) ∈ Rn×n , Σ(t)  0, such that Σ(t)ii = 1 ∀i ∈ A(t) Σ(t)ii = 0 ∀i 6∈ A(t) V Σ(t)V T  Im , Pick r(t) ∈ {−1, +1}n uniformly at random. χ(t) = χ(t − 1) + γU (t)r(t), where U (t)U (t)| = Σ(t). A(t + 1) = {i : |χ(t)i | < 1 − δ}. end for Set χi = sign(χ(T )i ) for all i ∈ {1, . . . , n}. if A(T ) = ∅ then Return χ else Restart algorithm from line 5. end if and U (t), kui (t)k2 = Σ(t)ii equals 1 if i ∈ A(t), and 0 otherwise. We have χ(t)i − χ(t − 1)i = γhui (t), r(t)i, and, because r(t) ∈ {−1, 1}n , by Cauchy-Schwarz we get ( √ γ n if i ∈ A(t) |χ(t)i − χ(t − 1)i | ≤ . (13) 0 otherwise We first analyze the convergence of the algorithm: we show that, with constant probability, the random walk fixes all coordinates to have absolute value between 1 − δ and 1. First we prepare a lemma. Lemma 31. Let X0 , X1 , X2 , . . . form a martingale sequence adapted to the filtration {Ft } such that X0 ∈ [−1, 1], and for every t ≥ 1 we have E[(Xt − Xt−1 )2 | Ft−1 ] = σ 2 , and |Xt − Xt−1 | ≤ δ. Denote τ = inf{t : 1−X 2 |Xt | ≥ 1 − δ}. Then E[τ ] < σ2 0 . Proof. Define Y0 , Y1 , Y2 , . . . to be a martingale with respect to X0 , X1 , X2 , . . . defined by Yt = Xmin{t,τ } . Because |Xt − Xt−1 | < δ, we easily see by induction that |Yt | < 1 for all t ≥ 0. Therefore, for any t ≥ 1, we compute 1> E Yt2 = = t X s=1 t X E E[(Yt − Yt−1 )2 | Ft−1 ] + X02 σ 2 Pr[τ ≥ s] + X02 s=1 = σ 2 E[min{t, τ }] + X02 . By the monotone convergence theorem, we have that σ 2 E[τ ] < 1 − X02 , which was to be proved. The next lemma gives our convergence analysis of the random walk. 21 Lemma 32. With probability 1, |χ(t)i | ≤ 1 for all 1 ≤ t ≤ T and all 1 ≤ i ≤ n. With probability at least 1/2, |χ(T )i | ≥ 1 − δ for all 1 ≤ i ≤ n. Proof. We prove the first claim by induction on t. It is clearly satisfied for t = 0; assume then that the claim holds up to t − 1, and we will prove it for t. If i 6∈ A(t), then χ(t)i = χ(t − 1)i by (13), and the claim follows by the inductive hypothesis. If i ∈ A(t), then |χi (t)| < 1 − δ, and by (13) √ and the triangle inequality, we √ have |χi (t)| < 1 − δ + γ n < 1, where the final inequality follows because γ n < δ. To prove the second claim, we will show that Pr[|χ(T )i | < 1 − δ] ≤ 1/2n holds for every i. The claim will then follow by a union bound. Let us fix an arbitrary i ∈ {1, . . . , n}. Define ∆ = d2/γ 2 e, and let Ej , 0 ≤ j ≤ (T − ∆)/∆ be the event that |χ(t)i | < 1 − δ for all t ∈ [j∆ + 1, (j + 1)∆]. Observe that if |χ(t)i | ≥ 1 − δ, then |χ(s)i | = |χ(t)i | ≥ 1 − δ for all t ≤ s ≤ T , and, therefore χ(T )i < 1 − δ if and only if all the events E0 , . . . , E(T −∆)/∆ hold simultaneously. By this observation, and the Markov property, we have T /∆−1 Pr[|χ(T )i | < 1 − δ] = Y Pr[Ej | χ(j∆)]. (14) j=0 Let τj = (j + 1)∆ if Ej holds and τj = min{t ≥ j∆ : |χ(t)i | ≥ 1 − δ}, otherwise. The sequence χ(j∆)i , . . . , χ(τj )i , conditioned on χ(j∆), is a martingale. Moreover, since for any t ∈ [j∆, τj ] we have i ∈ A(t), for all such t we get E[(χ(t)i − χ(t − 1)i )2 | χ(t − 1)] = γ 2 E |hui (t), r(t)i|2 = γ 2 kui k22 = γ 2 . (15) By (13) and (15), the sequence χ(j∆)i , . . . , χ(τj )i , conditioned on χ(j∆), satisfies the assumptions of Lemma 31. By the lemma, we have E[τj − j∆ | χ(j∆)] ≤ 1 1 − χ(j∆)2i ≤ 2. γ2 γ Since the event Ej holds only if τj ≥ (j + 1)∆, by Markov’s inequality we have Pr[Ej | χ(j∆)] ≤ 1 γ2∆ ≤ 1 . 2 This bound and (14) imply that Pr[|χ(T )i | < 1 − δ] ≤ 2−T /∆ ≤ 1/2n, which was to be proved. To prove that the walk is subgaussian, we will need the following martingale concentration inequality due to Freedman. Theorem 33 ([16]). Pt Let Z1 , . . . , ZT be a martingale Ptadapted to the filtration {Ft } |Zt − Zt−1 | ≤ M for all t, and let Wt = j=1 Ej−1 [(Zj − Zj−1 )2 | Fj−1 ] = j=1 Var[Zj | Fj−1 ]. Then for all λ ≥ 0 and σ 2 ≥ 0, we have   λ2 2 . Pr[∃t s.t. |Zt − Z0 | ≥ λ and Wt ≤ σ ] ≤ 2 exp − 2(σ 2 + M λ) Next we state the main lemma, which, together with an estimate on the error due to rounding, implies subgaussianity. √ Pn Lemma 34. The random variable i=1 χ(T )i vi − y is (γ 2T )-subgaussian. Pn Proof. Define Yt = i=1 χ(t)i vi for all t = 1, . . . , T . Notice that Y0 = y. Let us fix a θ ∈ S n−1 once and for 2 2 all, and let Zt = hθ, Yt i for t = 0, . . . , T . We need to show that for every λ > 0, Pr[|ZT | ≥ λ] ≤ 2e−λ /2σ . We first Pnobserve that Zt is bounded, so we only need to consider λ in a finite range. Pn Indeed, by Lemma 32, Yt ∈ i=1 [−vi , vi ] with probability 1, so by the triangle inequality, kYt k2 ≤ i=1 kvi k2 ≤ n. Then, by Cauchy-Schwarz, |Zt | ≤ n as well, and, therefore, Pr[|ZT | > n] = 0. For the rest of the proof we will assume that 0 < λ ≤ n. 22 Observe that Z0 , . . . , ZT is a martingale. First we prove that the increments are bounded: this follows from the boundedness of the increments of the coordinates of χ(t). Indeed, by the triangle inequality and (13), n n X X kYt − Yt−1 k2 = (χ(t)i − χ(t − 1)i )vi ≤ |χ(t)i − χ(t − 1)i |kvi k2 ≤ γn3/2 . i=1 2 i=1 Then, it follows from Cauchy-Schwarz that |Zt − Zt−1 | ≤ γn3/2 . Next we bound the variance of the increments. By the Markov property of the random walk, Zt − Zt−1 is entirely determined by χt−1 . Denoting V = (vi )ni=1 as in the description of Algorithm 1, we have E[(Zt − Zt−1 )2 | χt−1 ] = θ| E[(Yt − Yt−1 )(Yt − Yt−1 )| ]θ = θ| V E[(χ(t) − χ(t − 1))(χ(t) − χ(t − 1))| ]V | θ = γ 2 θ| V U (t) E[r(t)r(t)| ]U (t)| V | θ = γ 2 θ| V Σ(t)V | θ ≤ γ2. The penultimate equality follows because E[r(t)r(t)| ] = In and U (t)U (t)| = Σ(t), and the final inequality follows because Σ(t) was chosen so that V Σ(t)V |  Im . We are now ready to apply Theorem 33. Using the notation from the theorem, we have shown that M ≤ γn3/2 , and that Wt ≤ γ 2 t for all t, and both bounds hold with probability 1. Let σ 2 = γ 2 T . First we claim that for any λ ≤ n, M λ ≤ σ 2 . Indeed, M λ ≤ γn5/2 ≤ 2 log2 (2n) ≤ γ 2 T = σ 2 . 2 Now, Theorem 33 and the above calculation imply that Pr[|ZT − Z0 | ≥ λ] ≤ 2e−λ This proves the lemma. /4σ 2 for all 0 < λ ≤ n. Finally we state our main theorem. Theorem 35 (Restatement of Theorem 4). Algorithm 1 runs in expected polynomial time, and outputs a √ Pn random vector χ such that the random variable i=1 χi vi − y is O( log n)-subgaussian. Proof. Let E be the event that for all i, |χ(T )i | ≥ 1 − δ (equivalently, that A(T ) = ∅). The algorithm takes returns if E holds, and otherwise it restarts. By Lemma 32 this event occurs with probability at least 1/2, so there will be a constant number of restarts in expectation. Since the random walk talks T steps, where T is polynomial in the input size, and each step can also be executed in polynomial time, it follows that the expected running time of the algorithm is polynomial. Because the algorithm returns an output exactly when E holds, the output is distributed as the random vector χ conditioned on E. Let us fix a vector θ ∈ S n−1 once and for all. Let Y be the random variable √ Pn i=1 χi vi − y and let Z = hθ, Y i. Let Yt and Zt be defined as in the proof of Lemma 34. Let s = γ 2T be the parameter with which we proved ZT − Z0 is subgaussian in Lemma 34. We will show that Z − Z0 , 2 2 conditioned on E, is 2s-subgaussian, i.e. we will √ prove that Pr[|Z − Z0 | ≥ λ | E] ≤ 2e−λ /8s . Observe that this inequality is trivially satisfied for λ ≤ λ0 = 2 2 ln 2s, since the right hand side is at least 1 in this range. For the rest of the proof we will assume that λ > λ0 . Conditional on E, and using the triangle inequality, we can bound the distance between Y and Y (T ) by kY − Y (T )k2 = ≤ n X (sign(χ(T )i ) − χ(T )i )vi i=1 n X 2 (1 − |χ(T )i |)kvi k2 ≤ δn. i=1 By Cauchy-Schwarz, we get that, conditional on E, |Z−ZT | ≤ δn, which implies that |Z−Z0 | ≤ |ZT −Z0 |+δn, by the triangle inequality. Then, we have that, conditional on E, |Z − Z0 | ≥ λ ⇒ |ZT − Z0 | ≥ λ − δn. For 23 p every λ > λ0 , δn ≤ 2 2 ln 2 log2 2n ≤ λ0 /2 < λ/2. Therefore, conditional on E and for every λ > λ0 , |Z − Z0 | ≥ λ ⇒ |ZT − Z0 | ≥ λ/2. By Lemma 34 we have 2 Pr[|Z − Z0 | ≥ λ | E] ≤ Pr[|ZT − Z0 | ≥ λ/2 | E] ≤ 2 Pr[|ZT − Z0 | ≥ λ/2] ≤ 4e−λ 2 2 2 /4s2 . 2 Recall that for every λ > λ0 , e−λ /8s < 1/2, so the right hand side above √ is at most 2e−λ /8s , as claimed. Therefore, Z − Z0 , conditioned on E, is 2s-subgaussian, and, since s = O( log n), this suffices to prove the theorem. 6 Recentering procedure In this section we will give an algorithmic variant of the recentering procedure in Theorem 6. Given a convex body K ⊆ Rn , let b be its barycenter under the Gaussian distribution. The following lemma shows that if we have an estimate b0 of the barycenter, which is close to b but farther from the origin, then shifting K to K − b0 , increases the Gaussian volume of K. Lemma 36. Let b be the barycenter of K ⊆ Rn and b0 a point in Rn satisfying kb −b0 k2 ≤ δ/3 and kb0 k2 ≥ δ. 2 Then, γn (K − b0 ) ≥ eδ /6 γn (K) Proof. Let η = b − b0 . γn (K − b0 ) γn (K) = = 1 n/2 ( 2π ) R 2 x∈K−b0 e−kxk2 /2 dx 2 1 n/2 ( 2π ) e−kxk2 /2 dx x∈K R 2 0 2 0 1 n/2 ( 2π ) e−kyk2 /2−kb k2 /2+hy,b i dy y∈K R 2 1 n/2 ( 2π ) e−kxk2 /2 dx x∈K R (change of variables y = x + b0 ) Let Y be a random variable drawn from the n-dimensional Gaussian distribution restricted to the body K. Then the right hand side above is equal to 0 2 0 e−kb k2 /2 E[ehY,b i ] ≥ 0 2 = e 6.1 0 e−kb k2 /2 ehE[Y ],b i −kb0 k22 /2+hb,b0 i 2 (by Jensen’s inequality) −kb0 k22 /2+hb0 ,b0 i+hη,b0 i =e 0 2 0 = ekb k2 /2+hη,b i 2 = ekbk2 /2−kηk2 /2 ≥ e(2δ/3) 2 /2−(δ/3)2 /2 = eδ 2 /6 (kbk2 ≥ kb0 k2 − kηk2 ≥ 2δ/3) Algorithm In our recentering P algorithm we use the geometric language of section 1.1.4. Instead Pnof the vectors v1 , . . . , vn n and the shift t ∈ i=1 [−vi , vi ], we work directly with the parallelepiped P = i=1 [−vi , vi ] − t. Notice that a facet of P corresponds to a fractional coloring with some coordinates fixed. P Indeed, a facet P F of P is determined by a subset S ⊆ [n], and a coloring χ ∈ {−1, 1}S , and equals F = i6∈S [−vi , vi ] + i∈S χi vi − t. The size of the set S is equal to the co-dimension of F , so a vertex (face of dimension 0) is equivalent to full coloring χ ∈ {−1, 1}n . The edges (faces of dimension 1) are linear segments that have length exactly twice the length of the corresponding vectors. We say that P has side lengths at most ` if each edge of P has length at most `: this corresponds to requiring that maxi kvi k2 ≤ `/2. Given a point p ∈ P , we denote by FP (p) the face of P that contains p and has minimal dimension. We denote by WP (p) the subspace span(FP (p) − p) In this language, the (linear) discrepancy problem is translated to the problem of finding a vertex of P inside K. The recentering problem can also be expressed in this way: we are looking for a point p ∈ P ∩K such that the Gaussian measure of (K−p)∩WP (p), restricted to WP (p), is at least that of K, and b((K−p)∩WP (p)) is close to 0. To do this, we start out by approximating b = b(K), the barycenter of K. If b is close to the origin, then we are already done and can return. If b is far from origin, then moving the origin to b (i.e. 24 shifting K and P to K − b, P − b respectively), should only help us by increasing the Gaussian volume of K. But we cannot make this move if b lies outside P . In this case, we start moving towards b; when we hit ∂P , the boundary of P , we stop and induct on the facet we land on, choosing the point on boundary of P we stopped on as our new origin. We show that even this partial move towards b does not decrease the volume of K. Moreover, it ensures that the origin always stays inside P . One difficulty is that we cannot efficiently compute the barycenter of K exactly. To get around this, we use random sampling from Gaussian distribution restricted to K to estimate the barycenter with high accuracy. We will then return a shift of the body K such that its barycenter is δ-close to the origin, where the running time is polynomial in n and (1/δ) and it suffices to choose δ as inversely polynomial in n. We assume that we have access to a membership oracle for the convex body K. Algorithm 2 Recentering procedure 1: 2: 3: 4: 5: 6: 7: 8: 9: 10: 11: 12: 13: 14: 15: 16: 17: 18: Input: Convex body K ⊆ Rn with γn (K) ≥ 1/2, an n-dimensional parallelepiped P 3 0, δ ≥ 0 and error probability ε ∈ (0, 1). Output: See statement of Theorem 37. If 0 6∈ P ∩ K, return FAIL. Set N = d24/δ 2 e + n. Set q = 0, W = WP (0), K̄ = K ∩ W , P̄ = FP (0). for i = 1, . . . , N do Compute an estimate b0 of the barycenter b of K̄ restricted to the subspace W , satisfying kb − b0 k2 ≤ δ/6 with probability at least 1 − ε/N . If b0 6∈ K̄, return FAIL, otherwise continue. if kb0 k2 ≤ δ/2 then Return q. else if kb0 k2 > δ/2 and b0 6∈ P̄ then Compute λ ∈ (0, 1) be such that λb0 ∈ ∂ P̄ relative to W . Set s = λb0 . else Set s = b0 . end if Set q = q + s. Set W = WP̄ (s), P̄ = FP̄ (s) − s, K̄ = (K̄ − s) ∩ W . end for Return FAIL. The following theorem is an algorithmic version of Theorem 6. We note that the guarantees of the algorithm are relatively robust. This is to make it simpler to use within other algorithms, since it may be called on invalid inputs as well as output incorrectly with small probability. Theorem 37. Let P be a parallelepiped in Rn containing the origin and K ⊆ Rn be a convex body of Gaussian measure at least 1/2, given by a membership oracle, and let δ ≥ 0 and ε ∈ (0, 1). Then, Algorithm 2 on these inputs either returns FAIL or a point p ∈ P ∩ K. Furthermore, if the input is correct, then with probability at least 1 − ε, it returns p satisfying 1. The Gaussian measure of (K − p) ∩ WP (p) on WP (p), is at least that of K; 2. kb((K − p) ∩ WP (p))k2 ≤ δ. Moreover, Algorithm 2 runs in time polynomial in n, 1/δ and ln(1/ε). Proof. Firstly, it easy to check by induction, that at the beginning of each iteration of the for loop that q ∈ P ∩ K, W = WP (q), K̄ = (K − q) ∩ WP (q), P̄ = FP (q) − q . (16) To prove correctness of the algorithm, we must show that the algorithm returns a point q satisfying the conditions of Theorem 37 with probability at least 1 − ε. 25 For this purpose, we shall condition on the event that all the barycenter estimates computed on line 7 are within distance δ/6 of the true barycenters, which we denote by E. Since we run the barycenter estimator at most N times, by the union bound, E occurs with probability at least 1 − ε. We defer the discussion of how to implement the barycenter estimator till the end of the analysis. With this conditioning, we prove a lower bound on the Gaussian mass as a function of the number of iterations, which will be crucial for establishing the correctness of the algorithm. Claim 38. Let W, K̄, P̄ denote the state after t ≥ 0 non-terminating iterations. Let kt ≥ 0 denote number of iterations before time t, where the dimension of W decreases. Then, conditioned on E, we have that γW (K̄) ≥ e(t−kt )δ 2 /24 γn (K) . Proof. We prove the claim by induction on t. At the base case t = 0 (i.e. at the beginning of the first iteration), note that kt = 0 by definition. If W = Rn , the inequality clearly holds since K̄ = K. If W ⊂ Rn , then since γn (K) ≥ 1/2 by Lemma 14, we have γW (K̄) ≥ γn (K). The base case holds thus holds. We now assume that the bound holds at time t and prove it for t + 1, assuming that iteration t + 1 is non-terminating. Let b,b0 ,s denote the corresponding loop variables, and W 0 , K̄ 0 , P̄ 0 denote the new values of W, K̄, P̄ after line 16. Since the iteration is non-terminating, we have that kb0 k2 > δ/2. Since by our conditioning kb0 −bk2 ≤ δ/6, by Lemma 36 and the induction hypothesis, we have that γW (K̄ − b0 ) ≥ eδ 2 /24 γW (K̄) ≥ e(t+1−kt )δ 2 /24 γn (K) . (17) Note that we drop in dimension going from W to W 0 if and only if s lies on the boundary of P̄ relative to W (since then the minimal face of P̄ containing s is lower dimensional). We now examine two cases. In the first case, we assume b0 is in the relative interior of P̄ . In this case, we have s = b0 , and hence W = W 0 and K̄ 0 = K̄ − b0 . Given this, kt+1 = kt (no drop in dimension) and the desired bound is derived directly from Equation (17). In the second case, we assume that b0 is not in the interior of P̄ relative to W . In this case, s = λb0 ∈ ∂ P̄ relative to W , for some λ ∈ [0, 1]. Furthermore, W 0 ⊂ W and kt+1 = kt + 1. From here, by Ehrhard’s inequality and Equation 17, we get that γW (K̄ − s) ≥ Φ((1 − λ)Φ−1 (γW (K̄)) + λΦ−1 (γW (K̄ − b0 ))) ≥ γW (K̄) ≥ e(t−kt )δ 2 /24 γn (K) = e(t+1−kt+1 )δ 2 /24 γn (K) ≥ 1/2 . (18) Lastly, by Lemma 14 since γW (K̄ − s) ≥ 1/2, we have that γW 0 (K̄ 0 ) = γW 0 (K̄ − s) ≥ γW (K̄ − s) . (19) The desired bound now follows combining Equations (18),(19). We now prove correctness of the algorithm conditioned on E. We first show that conditioned on E, the algorithm returns q from line 8 during some iteration of the for loop. For the sake of contradiction, assume instead that the algorithm returns FAIL. Let W, K̄, P̄ denote the state after the end of the loop. Then, by Claim 38, we have that γW (K̄) ≥ e(N −kN )δ 2 /24 γn (K) ≥ e(N −n)δ 2 /24 γn (K) ≥ eγn (K) > 1, where we used that fact kN ≤ n, since dimension cannot drop more than n times. This is clear contradiction however, since Gaussian measure is always at most 1. Given the above, we can assume that the algorithm returns q during some iteration of the for loop. Let W, K̄, P̄ , b0 denote the state at this iteration. Since we return at this iteration, we must have that kb0 k2 ≤ δ/2. Given E, we have that the barycenter b of K̄ satisfies kbk2 ≤ kb0 k2 + kb − b0 k2 ≤ δ/2 + δ/6 < δ . By Claim 38, we also know that γW (K̄) ≥ γn (K). Since by Equation 16, q ∈ P and K̄ = (K − q) ∩ WP (q), the correctness of the algorithm follows. 26 For the runtime, we note that it is dominated by the N = O(1/δ 2 + n) calls to the barycenter estimator. Thus, as long as the estimator runs in poly(n, ln(1/(εδ))) time, the desired runtime bound holds. It remains to show that we can estimate the barycenter efficiently. We show how to do this in appendix in Theorem 54 with failure probability at most ε/N in time poly(n, 1/δ, ln(N/ε)) = poly(n, 1/δ, ln(1/ε)), as needed. 7 Algorithmic Reduction from Asymmetric to Symmetric Banaszczyk In this section, we make algorithmic the reduction in section 4.1 from the asymmetric to the symmetric case. This will directly imply that given an algorithm to return a vertex of P contained in a symmetric convex body K of Gaussian volume at least a half, we can also efficiently find a vertex of P contained in an asymmetric convex body of Gaussian measure at least a half. Definition 39 (Symmetric Body Coloring Algorithm). We shall say that A is a symmetric body coloring algorithm, if given as input an n-dimensional parallelepiped P 3 0 of side lengths at most lA (n), lA a nonnegative non-increasing function of n, and a symmetric convex body K ⊆ Rn satisfying γn (K) ≥ 1/2, given by a membership oracle, it returns a vertex of P contained in K with probability at least 1/2. √ Let α = 4(1 + π 8 ln 2). We now present an algorithm, which uses A as a black box and achieves the same guarantee for asymmetric convex bodies, with only a constant factor loss in the length of the vectors. Algorithm 3 Reducing asymmetric convex bodies to symmetric convex bodies 1: 2: 3: 4: 5: Input: Algorithm A as in (39), K ⊆ Rn convex body, given by membership oracle, with γn (K) ≥ 1/2, P 3 0 an n-dimensional parallelepiped of side lengths at most lA (n)/α. Output: A vertex v of P contained in K. Call Recentering Procedure on K and P and δ = 32√1 2π and ε = 1/4. Restart from line 3 if the call outputs FAIL, and otherwise let q be the output. Call A on α(FP (q) − q) and α(K − q) ∩ (q − K) ∩ WP (q) inside WP (q). Let v be the output. If v/α + q ∈ K and is a vertex of P , return v/α + q. Else, restart from line 3. Theorem 40. Algorithm 3 is correct and runs in expected polynomial time. Proof. Clearly, by line 5 correctness is trivial, so we need only argue that it runs in expected polynomial time. Since the runtime of the recentering procedure (Algorithm 2) is polynomial, and the runs are independent, we need only argue that line 5 accepts with constant probability. Since the recentering procedure outputs correctly with probability at least 1 − ε = 3/4, we may condition on the correctness of the output q in line 3. Under this conditioning, by the guarantees of the recentering algorithm, letting d = dim(FP (q)), W = WP (q) and C = (K − q) ∩ W , we have that γW (C) ≥ 1/2 kb(C)k2 ≤ and 1 √ . 32 2π Thus by Lemma 30, for X ∈ W the d-dimensional standard Gaussian on W , we have that √ E[kXkC∩−C ] ≤ 2 E[kXkC ] ≤ 2(1 + π 8 ln 2) . √ Hence by Markov’s inequality, Pr[X ∈ α(C ∩ −C)] = Pr[X ∈ 4(1 + π 8 ln 2)(C ∩ −C))] ≥ 1/2. Now by construction αP has side lengths at most lA (n), and hence α(FP (q) − q) also has side lengths at most lA (n) ≤ lA (d). Thus, A on input α(FP (q) − q) and α(C ∩ −C), outputs a vertex v of α(FP (q) − q) contained in α(C ∩ −C) ⊆ α(K − p) ∩ W with probability at least 1/2. Hence, the check in line 5 succeeds with constant probability, as needed. The above directly implies Theorem 8, as shown below. 27 Proof of√Theorem 8. Let P ⊆ Rn be an n-dimensional parallelepiped P containing the origin of side lengths at n c , and t ∈ most c/ log n. Let v1 , . . . , vn ∈ Rn , maxi∈[n] kvi k ≤ √log i=1 [−vi , vi ], denote the vectors such n Pn that P = i=1 [−vi , vi ] − t. On input v1 , . . . , vn and t, theP random walk sampler (Algorithm 1) outputs in expected polynomial time n n a random χ ∈ {−1, 1} such that i=1 χi vi −t is O(c)-subgaussian and supported on the vertices of P . Thus n by Lemma 19 part 1, we can pick Pn c > 0 small enough such that for any symmetric convex body K ⊆ R with γn (K) ≥ 1/2, we have Pr[ i=1 χi vi − t ∈ K] ≥ 1/2. Thus, letting A denote the above sampler, we see that A satisfies the conditions 39 with lA (n) = √ 2c/ log n. The theorem now follows by combining Algorithm 3 with A. 8 Body Centric Algorithm for Asymmetric Convex Bodies In this section, we give the algorithmic implementation of the extended recentering procedure, which returns full colorings matching the guarantees of Theorem 8. Interestingly, the coloring output by the procedure will be essentially deterministic. The only randomness will be in effect due to the random errors incurred in estimating barycenters. For a convex body K ⊆ Rn , unit vector θ ∈ Rn ,kθk2 = 1, and v ∈ R, we define the shifted slice θ Kv = (K − vθ) ∩ {x ∈ Rn : hθ, xi = 0}. The main technical estimate we will require in this section, is the following lower bound on the gaussian measure of shifted slices. We defer the proof of this estimate to section 9. Theorem 41. There exists universal constants v0 , η0 , c0 > 0, such that for any n ≥ 1, convex body K ⊆ Rn satisfying kb(K)k2 = η ≤ η0 and γn (K) = α ≥ 3/5, v ∈ [−v0 , v0 ] and θ ∈ Rn , kθk2 = 1, we have that 1 γn−1 (Kvθ ) ≥ (α − c0 η)(1 − e− 100v2 √ ). 4 2π The above inequality says that if barycenter of K is close to the origin, then the Gaussian measure of parallel slices of K does not fall off too quickly as we move away from the origin. Recall that the problem can be recast as P finding a vertex of a parallelepiped P contained inside the Pn n convex body K, where the parallelepiped P = i=1 [−vi , vi ] − t and t ∈ i=1 [−vi , vi ]. Thus, 0 ∈ P . We start out by calling the recentering procedure to get the barycenter, b, close to the origin. This recentering allows us to rescale K by a constant factor √ such that√the Gaussian volume of K increases i.e. we replace P by βP and K by βK where β = 1 + π 8 log 2 + 4π log 2 is chosen such that the volume of K after rescaling is at least 3/4. Then we find a point q ∗ on ∂P , the boundary of P which is closest to the origin. We recurse by taking a (n − 1)-dimensional slice of K(here we abuse notation by calling the convex body after rescaling as also K) with the facet containing q ∗ . A crucial point here is that we choose q ∗ as the origin of the (n − 1)-dimensional space we use in the induction step. This is done to maintain the induction hypothesis that the parallelepiped contains the origin. Theorem 41 guarantees that in doing so, we do not lose too much Gaussian volume. Lemma 42. Given a convex body K in Rn such that γn (K) ≥ 1/2 and kb(K)k2 ≤ √ √ 3/4, where β = 1 + π 8 log 2 + 4π log 2. 1 √ , 32 2π then γn (βK) ≥ √ Proof. Let X be the standard n-dimensional Gaussian. From Lemma 30, E[kXkK ] ≤ 1 + π 8 log 2. This gives Pr[kXkK > β] Pr[kXkK − E[kXkK ] > β − E[kXkK ]] p ≤ Pr[kXkK − E[kXkK ] > β − 1 − π 8 log 2] = By Lemma 27 and Lemma 28, the function k.kK is 4−Lipschitz. Then, by Theorem 29 2 Pr[kXkK > β] ≤ e− π2 ( √ β−1−π 8 log 2 2 ) 4 = 1/4 . Thus, γn (βK) = Pr[X ∈ βK] = 1 − Pr[kXkK > β] ≥ 1 − 1/4 = 3/4, as needed. 28 Algorithm 4 Body centric algorithm for general convex bodies 1: 2: 3: 4: 5: 6: 7: 8: 9: 10: 11: 12: 13: Input: Convex body K ⊆ Rn , given by a membership oracle, with γn (K) ≥ 1/2, an n-dimensional parallelepiped P 3 0 of side lengths at most 2αn . Output: A vertex of P contained in K. 1 . Call Recentering Procedure on K and P with parameters δ = ηn and ε = 2(n+1) Restart from line 3 if the call outputs FAIL, and otherwise let q denote the output. Set q̄ = 0, W̄ = WP (q), K̄ = β((K − q) ∩ W̄ ), P̄ = β(FP (q) − q). repeat 1 . Call Recentering Procedure on P̄ and K̄ with δ = ηn and ε = 2(n+1) Restart from line 3 if the call outputs FAIL, and otherwise let s denote the output. Set q̄ = q̄ + s, W̄ = WP̄ (s), K̄ = (K̄ − s) ∩ W̄ , P̄ = (FP̄ (s) − s). if dim(W̄ ) 6= 0 then  Compute s ∈ argmin kpk2 : p ∈ ∂ P̄ relative to W̄ . Set q̄ = q̄ + s, W̄ = WP̄ (s), K̄ = (K̄ − s) ∩ W̄ , P̄ = (FP̄ (s) − s). end if until dim(W̄ ) = 0 If q + q̄/β ∈ K and is a vertex of P , return q + q̄/β. Else, restart from line 3. For Algorithm 4, we use the parameters ( ) 1 αn = min v0 , p , 10 log(2n)  ηn = min η0 , 1 32 2π 14c0 n 1 √  , , where v0 , η0 , c0 are as in Theorem 41. We now give the formal analysis of the algorithm. We begin by explaining how to compute the minimum norm point on the boundary of a parallelepiped. Pk n Lemma 43. Let P = i=1 [−vi , vi ] − t ⊂ R be a parallelepiped of side lengths at most 2α containing the origin, with v1 , . . . , vk linearly independent. Let v1∗ , . . . , vk∗ denote the dual basis, i.e. the unique set of vectors lying inside W := span(v1 , . . . , vk ) satisfying hvi∗ , vj i = 1 if i o = j and 0 otherwise, and let s denote n an element of minimum `2 norm in the set ±1+hvi∗ ,ti kvi∗ k2 · vi∗ kvi∗ k2 : i ∈ [k] . Then, the following holds: 1. s ∈ argmin {kpk : p ∈ ∂P relative to W }. 2. WP (s) ⊆ {x ∈ W : hs, xi = 0}. 3. ksk2 ≤ α. Furthermore, s can be computed in polynomial time. Pk Pk Proof. Note that for any x ∈ W , we have that x = i=1 hvi∗ , xivi . From here, given that P = i=1 [−vi , vi ]− t, it is easy to check that P = {x ∈ W : −1 + hvi∗ , ti ≤ hvi∗ , xi ≤ 1 + hvi∗ , ti, ∀i ∈ [k]} . (20) We now show that s ∈ argmin {kpk2 : p ∈ ∂P relative to W }. Since 0 ∈ P , we must show that x ∈ P if kxk2 ≤ ksk2 and x ∈ W , and that s ∈ ∂P relative to W . Given that the vectors vi∗ /kvi∗ k2 have unit `2 norm, the norm of s is equal to   | ± 1 + hvi∗ , ti| ω := min : i ∈ [k] . kvi∗ k2 Now assume x ∈ W and kxk2 ≤ ω. Since by assumption 0 ∈ P , we must have −1 + hvi∗ , ti ≤ 0 ≤ 1 + hvi∗ , ti, ∀i ∈ [k]. Therefore, for i ∈ [k], by Cauchy-Schwarz hvi∗ , xi ≤ kvi∗ k2 · ω ≤ 1 + hvi∗ , ti, hvi∗ , xi ≥ −kvi∗ k2 · ω ≥ −1 + hvi∗ , ti . 29 Hence x ∈ P , as needed. Next, we must show that s ∈ ∂P relative to W . Firstly, clearly s ∈ W since each v1∗ , . . . , vk∗ ∈ W , and thus by the above argument s ∈ P . Now choose i ∈ [k], r ∈ {−1, 1} such that v∗ r+hv ∗ ,ti s = kv∗ ik2 · kv∗ik2 . Then, by a direct calculation hvi∗ , si = r + hvi∗ , ti, and hence s satisfies one of the i i inequalities of P (see Equation 20) at equality. Thus, s ∈ ∂P relative to W (note that P is full-dimensional in W ), as needed. We now show that WP (s) ⊆ {x ∈ W : hs, xi = 0}. By the above paragraph, every element x of the minimal face FP (s) of P containing s satisfies hvi∗ , xi = r + hvi∗ , ti = hvi∗ , si. In particular hvi∗ , x − si = 0. Since s is collinear with vi∗ (s may be 0), we have hvi∗ , x − si = 0 ⇒ hs, x − si = 0. The claim now follows since WP (s) is the span of FP (s) − s and FP (s) − s ⊆ {x ∈ W : hs, xi = 0} by the previous statement. We now show that ksk2 ≤ α. Firstly, by minimality of s, note that |r + hvi∗ , ti| ≤ 1, for r and i as above. Thus, by Cauchy-Schwarz, ksk = 1 hvi , vi∗ i kvi k2 kvi∗ k2 r + hvi∗ , ti ≤ = ≤ = kvi k . kvi∗ k2 kvi∗ k kvi∗ k2 kvi∗ k2 Since P has side lengths at most 2α, we have kvi k ≤ α. Thus, ksk2 ≤ α, as claimed. We now prove the furthermore. Let V denote the matrix whose columns are v1 , . . . , vk . By linear independence of v1 , . . . , vk , the matrix V T V is invertible. Since then (V (V T V )−1 )T V = Ik , we see that v1∗ , . . . , vk∗ are the columns of V (V T V )−1 (note that these lie in W by construction), and hence can be constructed in polynomial time. Since s can clearly be constructed in polynomial time from the dual basis and t, the claim is proven. Theorem 44. Algorithm 4 is correct and runs in expected polynomial time. Proof. Clearly, by the check on line 13, correctness is trivial. So we need only show that the algorithm terminates in expected polynomial time. In particular, it suffices to show the probability that a run of the algorithm terminates without a restart is at least 1/2. For this purpose, we will show that the algorithm terminates correctly conditioned on the event that each call to the recentering procedure terminates correctly, which we denote E. Later, we will show that this event occurs with probability at least 1/2, which will finish the proof. Let W1 , K1 , P1 denote the values W̄ , K̄, P̄ after line 4. During the iterations of the repeat loop, it is easy to check by induction that after the execution of either line 7 or 10, the variables q̄, W̄ , K̄, P̄ satisfy: q̄ ∈ P1 , W̄ = WP1 (q̄), K̄ = (K1 − q̄) ∩ WP1 (q̄), P̄ = FP1 (q̄) − q . (21) We now establish the main invariant of the loop, which will be crucial in establishing correctness conditioned on E: Claim 45. Let W̄ , K̄, P̄ denote the state after k ≥ 0 successful iterations of the repeat loop. Then, the following holds: 1. dim W ≤ n − k. 2. Conditioned on E, γW̄ (K̄) ≥ 3/4 − k 7n > 3/5. Proof. We prove the claim by induction on k. For k = 0, the state corresponds to W1 , K1 and P1 . Trivially, dim(W1 ) ≤ n = n − k, so the first condition holds. Conditioned on E, we have that K1 /β has Gaussian mass at least 1/2 restricted to W1 and its barycenter has `2 norm at most ηn . Since ηn ≤ 32√1 2π by Lemma 42, we have that γW1 (K1 ) ≥ 3/4. Thus, the second condition holds as well. We now assume the statement holds after k iterations, and show it holds after iteration k + 1, assuming that we don’t terminate after iteration k and that we successfully complete iteration k + 1. Here, we denote the state at the beginning of iteration k + 1 by W̄ , K̄, P̄ , after line 7 by W̄1 , K̄1 , P̄1 and at the end the iteration by W̄2 , K̄2 , P̄2 . 30 We first verify that W̄2 ≤ n − (k + 1). By the induction hypothesis n − k ≥ dim(W̄ ) and by construction W̄2 ⊆ W̄1 ⊆ W̄ . Thus, we need only show that dim(W̄2 ) < dim(W̄ ). Given that we successfully complete the iteration, namely the call to the recentering algorithm on line 6 doesn’t return FAIL, we may distinguish two cases. Firstly, if dim(W̄2 ) = 0, then we must have dim(W̄2 ) < dim(W̄ ), since otherwise dim(W̄ ) = 0 and the loop would have exited after the previous iteration. Second if dim(W̄2 ) > 0, we must have entered the if statement on line 8 since dim(W̄2 ) ≤ dim(W̄1 ). From here, we see that dim(W̄2 ) corresponds to the dimension of the minimal face of P̄1 containing s. Since s is on the boundary of P̄1 relative to W̄1 , we get that dim(W̄2 ) < dim(W̄1 ) ≤ dim(W̄ ), as needed. Thus, condition 1 holds at the end of the iteration as claimed. We now show that conditioned E, γW̄2 (K̄2 ) ≥ 3/4 − (k + 1)/(7n). By the induction hypothesis, recall that γW̄ (K̄) ≥ 3/4−k/(7n), thus it suffices to prove that γW̄2 (K̄2 ) ≥ γW̄ (K̄)−1/(7n). Note that since we decrease dimension at every iteration (as argued in the previous paragraph), the number of iterations of the loop can never exceed n. Thus, after any valid number of iterations l, we always have 3/4 − l/(7n) ≥ 3/4 − 1/7 > 3/5. In particular, we have γW̄ (K̄) ≥ 3/5. We now track the change in Gaussian mass going from K̄ to K̄2 . Since the recentering procedure on line 6 terminates correctly by our conditioning on E, we get that γW̄1 (K̄1 ) ≥ γW̄ (K̄) and kb(K̄1 )k2 ≤ ηn . If dim(W̄1 ) = 0, then clearly W̄2 = W̄1 and K̄2 = K̄1 , and hence γW̄2 (K̄2 ) ≥ γW̄ (K̄) as needed. If dim(W̄1 ) > 0, we enter the if statement at line 8. Since P̄1 is a parallelepiped containing 0 of side length 2αn , by Lemma 43 we have that ksk ≤ αn and W̄2 = WP̄1 (s) ⊆ Hs where Hs := x ∈ W̄1 : hs, xi = 0 . Now if s = 0, then K̄2 = K̄1 ∩ W̄2 , and thus by Lemma 14, we have γW̄2 (K̄2 ) ≥ γW̄1 (K̄1 ) ≥ γW̄ (K̄), as needed. If s 6= 0, given that ksk ≤ αn ≤ v0 , kb(K̄1 )k2 ≤ ηn ≤ η0 and γW̄1 (K̄1 ) ≥ 3/5, by applying Theorem 41 on K̄1 with v = ksk2 and θ = s/v, we get that − 1 e 100α2n ) γHs ((K̄1 − s) ∩ Hs ) ≥ (γW̄1 (K̄1 ) − c0 ηn )(1 − √ 4 2π − 1 (22) 1 e 100α2n ≥ γW̄ (K̄) − ≥ γW̄ (K̄) − c0 ηn − √ . 7n 4 2π Since K̄2 = (K̄1 − s) ∩ W̄2 , W̄2 ⊆ Hs and γHs ((K̄1 − s) ∩ Hs ) ≥ 3/4 − (k + 1)/(7n) > 1/2, by Lemma 14 γW̄2 (K̄2 ) ≥ γHs ((K̄1 − s) ∩ Hs ). (23) The desired estimate follows combining (22) and (23). By Claim 45, we see that the number of iterations of the repeat loop is always bounded by n. Furthermore, conditioned on E, the loop successfully terminates with W̄ ,K̄,P̄ satisfying γW̄ (K̄) > 0 and dim(W̄ ) = 0. Since dim(W̄ ) = 0, this implies that W̄ = K̄ = {0}. Furthermore, by Equation 21, this implies that q̄ ∈ K1 ∩ P1 and dim(WP1 (q̄)) = 0, and hence q̄ is a vertex of P1 . Since K1 = β(K − q) and P1 = β(P − q), we get that q + q̄/β is a vertex of P contained in K, as needed. Thus, conditioned on E, the algorithm returns correctly. To lower bound E, by the above analysis, note that we never call the recentering procedure more than n + 1 times, i.e. once on line 3 and at most n times on line 6. By the union bound, the probability that one of these calls fails is at most (n + 1) · 1/(2(n + 1)) = 1/2. Thus, E occurs with probability at least 1/2, as needed. 9 An estimate on the Gaussian measure of slices In this section, we prove Theorem 41. We will need the following estimate on Gaussian tails [1, Formula 7.1.13]. 31 Lemma 46 (Gaussian Tailbounds). Let X ∼ N (0, 1). Then for any t ≥ 0, r r 2 2 2 e−t /2 2 e−t /2 √ p ≤ Pr[X ≥ t] ≤ . π t + t2 + 4 π t + t2 + 8/π Before proving Theorem 41, we first prove a similar result for a special class of convex bodies in R2 . We define a convex body K in R2 to be downwards closed if (x, y) ∈ K implies (x, y 0 ) ∈ K for all y 0 ≤ y. For notational convenience, we shall denote the first and second coordinate of a vector in R2 respectively as the x and y coordinates. We shall say the slice of K at x = t or y = t to denote either the vertical slice of K having x-coordinate t or horizontal slice having y-coordinate t. We define the height of K at x = t to be maximum y-coordinate of any point (t, y) ∈ K. By convention, we let the height of K at x = t be −∞ if K does not a contain a point with x-coordinate t. Lemma 47. Let K ⊆ R2 be a downwards closed convex body with γ2 (K) = α ≥ 1/2 and barycenter b = b(K) satisfying b1 ≥ 0, and let g = Φ−1 (α) ≥ 0. Then, there exists auniversal constant v0> 0 such that for all 0 ≤ v ≤ v0 , the height of K at x = v is least f (v, g) := g − min e g2 2 1 − 8ev 2 2 , (4e + 2) vg . Proof. Step 1: Reduction to a wedge We first show that the worst-case bodies for the lemma are “wedgeshaped” (see the illustration in Figure 1). Namely, the worst case down closed convex bodies are of form  (x, y) ∈ R2 : x ≥ −c, sx + ty ≤ d where d, s, t ≥ 0, s2 + t2 = 1, c ∈ R≥0 ∪ {∞} . (24) More precisely, we will show that given any body K satisfying the conditions of the theorem, there exists a wedge W satisfying the conditions of the theorem whose height at x = v is at most that of K. Let K ⊆ R2 satisfy the conditions of the theorem. We first show that K contains a point on the line at x = v. If not, we claim that K has Gaussian mass at most γ1 (−v, v) ≤ γ1 (−v0 , v0 ) < 1/2 by choosing v0 small enough, a clear contradiction. To see this, note that by pushing the mass of K to the right as much as possible towards the line x = v, we can replace K by a band [a, v] × R with the same Gaussian mass, and barycenter to the right of b(K). Clearly, such a band has barycenter to the right of the y-axis iff a ≥ −v, and hence K has Gaussian mass at most γ2 ([−v, v] × R) = γ1 (−v, v), as needed. Now assume that K has height at least g at x = v, where we recall that g = Φ−1 (α). Note now that the band W = R × (−∞, g] (corresponding to s = 0, t = 1, d = g, c = ∞) has height at x = v at most that of K and satisfies the conditions of the theorem. Thus, we may assume that the height of K at x = v is f , where −∞ < f < g. Note that (v, f ) is now a point on the boundary of K. Let g 0 denote the height of K at x = 0. Since γ2 (K) ≥ 1/2, by Lemma 14 we have that γ1 (∞, g 0 ) ≥ γ2 (K), and hence g 0 ≥ g ≥ 0. Thus g 0 ≥ g > f , and hence v > 0 (since otherwise we would have f = g 0 ). By convexity of K, we may choose a line ` tangent to K passing through (v, f ). We may now choose  t ≥ 0, s, d ∈ R, such that s2 + t2 = 1 and ` = (x, y) ∈ R2 : sx + ty = d . Since K is downwards-closed, t ≥ 0 and ` is tangent to K, we must have that K ⊆ H` := {(x, y) : sx + ty ≤ d}. Since 0 is below (0, g 0 ) ∈ K, we have that 0 ∈ H` , and hence d ≥ 0. Given the (0, g 0 ) ⊆ H` , we have that tg 0 ≤ d, and, because ` is tangent at (v, f ), also sv + tf = d; using that v > 0and g 0 > f , we conclude that s > 0. We will now show that the wedge W = H` ∩ (x, y) ∈ R2 : x ≥ −c satisfies our requirements for an appropriate choice of c (note the conditions   for s, t, d are already satisfied by the above paragraph). Let Bv− = (x, y) ∈ R2 : x ≤ v and Bv+ = (x, y) ∈ R2 : x ≥ v . Choose c ≥ −v such that γ2 (W ∩ Bv− ) = γ2 (K ∩ Bv− ). Note that such a c must exist since K ⊆ H` . Now by construction, note that W has the same height as K at x = v, so it remains to check that c ≥ 0, γ2 (W ) ≥ 1/2 and b(W )1 ≥ 0. To bound the Gaussian mass, again by construction, we have that γ2 (W ) = γ2 (W ∩ Bv− ) + γ2 (W ∩ Bv+ ) = γ2 (K ∩ Bv− ) + γ2 (W ∩ Bv+ ) ≥ γ2 (K ∩ Bv− ) + γ2 (K ∩ Bv+ ) = γ2 (K) ≥ 1/2 . 32 Figure 1: B is the triangular region beneath the red line Given that γ2 (W ) ≥ 1/2, we must have that 0 ∈ W and hence c ≥ 0, as needed. It remains to check that b(W )1 ≥ 0. For this purpose, note first that we can transform K ∩ Bv− into W ∩ Bv− by only pushing mass to the right, and hence Z Z 2 2 xe−(x+y) /2 dy dx . (25) xe−(x+y) /2 dy dx ≤ W ∩Bv− K∩Bv− Since v ≥ 0 and K ∩ Bv+ ⊆ W ∩ Bv+ , we also immediately get that Z Z 2 −(x+y)2 /2 xe−(x+y) /2 dy dx . xe dy dx ≤ (26) W ∩Bv+ K∩Bv+ We derive b(W )1 ≥ 0 by combining (25), (26) and our assumption that b(K)1 ≥ 0. above reduction, we may now assume that K is a wedge of the form  Given the (x, y) ∈ R2 : x ≥ −c, sx + ty ≤ d , d, s, t ≥ 0, s2 + t2 = 1, as in equation (24). We first take care of some trivial cases. Firstly, if s = 0, t = 1, we have K = [−c, ∞) × (−∞, d]. Then the height at x = v is clearly d, and since γ1 (−∞, d) ≥ γ2 (K), we get d ≥ g as is needed. Now assume that s = 1, t = 0, then K = [−c, d]×R, and hence the height at x = v is infinite (note that K always intersects the line at x = v by the first part), and thus the desired bound trivially  holds. We may thus assume that both s, t > 0. In this setting, the line ` = (x, y) ∈ R2 : sx + ty = d intersects the x-axis at a = d/s and forms an angle θ ∈ (0, π/2) with the x-axis as in Figure 1. Given the normalization s2 + t2 = 1, note that d is the perpendicular distance from 0 to the edge K ∩ ` of K. In what follows, we maintain the parametrization of the wedge K in terms of a,θ,c, using the relations d = a sin θ, s = sin θ and t = cos θ to recover d, s, t when needed. Recall that γ2 (K) ≥ α = γ1 (−∞, g) and b(K)1 ≥ 0. Let f ∗ = f (v, g) and let f be the height of K at x = v. We want to prove that f ≥ f ∗ . If f ≥ g, we are already done since f ∗ ≤ g. Note that  by Lemma 14, f ≥ gif v = 0 and hence we may assume v > 0. Our goal is now to show that g − f ≤ min e g2 2 1 − 8ev 2 2 , (4e + 2) vg . Step 2: Using the barycenter condition We now derive a bound on how large d must be, given c and θ, such that the x-coordinate ofbarycenter is non-negative. Let H denote the halfspace (x, y) ∈ R2 : sx + ty ≤ d and let E = H \ K. A simple computation shows R −d2 /2 2 2 x 1 e−1/2(x +y ) dy dx = − e √2π sin θ. Now from the fact that b(K)1 ≥ 0, and E = H \ K, we get H 2π −d2 /2 − e √2π sin θ ≥ 1 R E 2 It follows that sin θ ≤ e− 2 (c 1 −1/2(x x 2π e −d2 ) 2 +y 2 ) dy dx ≥ R x≤−c 2 √1 xe−1/2x dx 2π −c2 /2 = − e √2π . . When c2 ≥ −2 log sin θ, we get the following bound on d: p d ≥ c2 + 2 log sin θ . 33 (27) When c2 < −2 log sin θ, this gives no useful bound on d since in that case the barycenter is non-negative even for d = 0. But d ≥ 0 always as the Gaussian measure of K is at least half. Thus, p (28) d ≥ max{0, c2 + 2 log sin θ} . Step 3: Getting a bound on f By construction of K, the point (v, f ) lies on the boundary of H, and hence vs + f t = v sin θ + f cos θ = a sin θ = d . (29) Now, 1 2 e− 2 c 1 1 √ √ ≤ γ1 (c, ∞) ≤ γ2 (E) 2 2π c + c2 + 4 (using lemma 46) . Also, 1 2 1 γ2 (E) = γ2 (H) − γ2 (K) = γ1 (−∞, d) − γ1 (−∞, g) = γ1 (g, d) ≤ √ (d − g)e− 2 g 2π (since d ≥ g ≥ 0) . Combining the above two, we get 1 2 2 e 2 (g −c ) √ ≤d−g . c + c2 + 4 (30) From (28) and (30), 2 2 1 p e 2 (g −c ) √ }. d ≥ max{ max{0, c2 + 2 log sin θ}, g + c + c2 + 4 Putting the above in (29), p  max{0, c2 + 2 log sin θ} − v sin θ g + , f ≥ max  cos θ 1 2 2 −c ) e 2 (g √ c+ c2 +4 cos θ  − v sin θ  .  Observe that γ1 (−∞, g) = γ2 (K) ≤ γ1 (−c, ∞) = γ1 (−∞, c), giving c ≥ g. Also θ ∈ [0, π/2]. Thus, the above lower bound on f holds if we minimize over all c ≥ g and θ ∈ [0, π/2].   1 (g 2 −c2 )  pmax{0, c2 + 2 log sin θ} − v sin θ g + e 2 √ 2 − v sin θ  c+ c +4 f≥ min max , .   cos θ cos θ c≥g,θ∈[0,π/2] We will first minimize with respect to c. For this, we make the following observations: • for a fixed θ, the first term inside the maximum is a non-decreasing function of c while the second is a decreasing function of c. p • for c = g 2 − 2 log sin θ ≥ g, the first term is smaller than the second term p • for c = g 2 − 2 log sin θ + 1 ≥ g, the first term is greater than the second term. Thus, the two terms must become equal somewhere in the range p p c ∈ [ g 2 − 2 log sin θ, g 2 − 2 log sin θ + 1] . 34 In particular, substituting c = f ≥ p g 2 − 2 log sin θ + 1 in the second term provides a lower bound for f : √ sin θ √ g 2 −2 log sin θ+1+ g 2 −2 log sin θ+5) g+ √ g+ sin θ √ √ 2 e g 2 −2 log sin θ+5 min e( cos θ θ∈[0,π/2] ≥ − v sin θ min − v sin θ . cos θ θ∈[0,π/2] This expression goes to g as θ → 0 and to ∞ as θ → π/2. If it is increasing in this whole interval, we are already done. Else, it achieves its minimum somewhere in (0, π/2). Let this be at θ∗ . Setting the derivative to zero, we get f sin 2θ∗ ≥ g cos θ∗ − √ p 3 4 e g 2 − 2 log sin θ∗ + 5 sin 2θ∗ = g − 2g sin2 (θ∗ /2) − √ p 3 , 4 e g 2 − 2 log sin θ∗ + 5 where θ∗ satisfies (31) 1 v = g sin θ∗ + √ p . 2 2 e g − 2 log sin θ∗ + 5 From the two terms above, we can get two upper bounds on sin θ∗ : sin θ∗ ≤ sin θ∗ ≤ v/g , eg 2 /2+5/2 . 1 e 8ev2 Using these, we can simplify (31) as f ≥ g − 2g sin2 (θ∗ /2) − 2e sin 2θ∗ (v − g sin θ∗ )3 ≥ g − 2g sin2 (θ∗ /2) − 2ev sin 2θ∗ ≥ g − 2g sin2 (θ∗ ) − 4ev sin θ∗ . We derive two bounds on the above expression, one which will be useful when g is small and other when g is large. For the small g bound, using that v < v0 for v0 small enough, 2 2g sin2 (θ∗ ) + 4ev sin θ∗ ≤ (2g 2 eg /2+5/2 eg /2 v + 4ev) ≤ . 1 1 g e 8ev2 e 8ev2 For the large g bound, 2g sin2 (θ∗ ) + 4ev sin θ∗ ≤ 2g v2 v2 4ev 2 = (4e + 2) . + 2 g g g Thus, f ≥ g − min{e g2 2 1 − 8ev 2 , (4e + 2) v2 } = f ∗ , as needed. g We now prove Theorem 41 in the special case where the barycenter lies to the right of the hyperplane θ⊥ . We show later how to reduce Theorem 41 to this case. Lemma 48. There exists universal constants v0 , c0 > 0, such that for any n ≥ 1, v ∈ [0, v0 ] and θ ∈ Rn , kθk2 = 1, convex body K ⊆ Rn satisfying γn (K) = α ≥ 1/2 and hb(K), θi ≥ 0, we have that 1 γn−1 (Kvθ ) ≥ α(1 − 35 e− 100v2 √ ). 4 2π Proof. We split the proof into two steps. In step one, we reduce to a 2-dimensional problem and show that it suffices to prove our theorem for a downwards closed convex body K 0 ⊆ R2 . This reduction will guaranteee that K 0 has barycenter on the y-axis and that the Gaussian measure of slices of K 0 parallel to the y-axis will correspond in the natural way to that of slices of K parallel to the hyperplane θ⊥ = {x ∈ Rn : hx, θi = 0}. We then invoke Lemma 47 to get a lower bound on the height of K 0 at x = v. Lastly, in step 2, we show that implies the required lower bound on the slice measure. Let g be s.t. γ1 (−∞, g) = α, i.e. g = Φ−1 (α). Note that g ≥ 0 since α ≥ 1/2. Step 1: reduction to a 2-dimensional case We will reduce our problem to one for a 2-dimensional downwards closed convex body K 0 . To specify K 0 , we need only specify the height of the boundary at each x-coordinate. At x-coordinate t, we define the height of K 0 to be the yt satisfying γ1 (−∞, yt ) = γn−1 (Ktθ ). From Ehrhard’s inequality, we see that K 0 is in fact convex. Furthermore, it is easy to check that γ2 (K 0 ) = γn (K) and b(K 0 )1 = hb(K), θi ≥ 0. Thus, K 0 is a downwards closed convex body in R2 with γ2 (K 0 ) = α, b(K 0 )1 ≥ 0. From here, we may invoke Lemma 47 to conclude that the height of K 0 at x = v is at least f ∗ := f (v, g). We now have that γn−1 (Ktθ ) = γ1 (−∞, yt ) ≥ γ1 (−∞, f ∗ ) . From the above, it suffices to give a lower bound on γ1 (−∞, f ∗ ) in order to derive the theorem. − 1 2 100v to show γ1 (f ∗ , g) ≤ α e 4√ 2π 1 − Step 2: Bounding γ1 (−∞, f ∗ ) 2 100v ). Clearly, it suffices Our goal is to show that γ1 (−∞, f ∗ ) ≥ α(1 − e 4√ 2π  2  g 1 2 . Let εg = g − f ∗ = min e 2 − 8ev2 , (4e + 2) vg . We split the analysis in two cases depending on whether g is small or big. Step 2a: g ≤ 1 5v g2 1 1 1 1 1 e 2 − 8ev2 e 50v2 − 8ev2 e− 100v2 e− 100v2 εg √ ≤ √ ≤ ≤ √ ≤α √ . γ1 (f ∗ , g) ≤ √ 2π 2π 2π 8 2π 4 2π The penultimate inequality holds for an appropriate choice of v0 , and the last inequality uses α ≥ 1/2. Step 2b: g > 1 5v Here we will use the other bound for εg . γ1 (f ∗ , g) ≤ ≤ ∗ 2 2 2 ε ε √ g e−(f ) /2 = √ g e−g /2 egεg −εg /2 2π 2π 2 ε (4e + 2)v 2 −g2 /2+(4e+2)v2 √ √ g e−g /2+gεg ≤ e 2π g 2π 1 ≤ 1 e− 100v2 e− 100v2 5(4e + 2)v 3 − 1 2 +(4e+2)v2 √ e 50v ≤ √ ≤α √ . 2π 8 2π 4 2π The penultimate inequality holds for an appropriate choice of v0 , and the last inequality uses α ≥ 1/2. We now come to the proof of Theorem 41. Theorem 41 (restated): There exist universal constants v0 , η0 , c0 > 0, such that for any n ≥ 1, convex body K ⊆ Rn satisfying kb(K)k2 = η ≤ η0 and γn (K) = α ≥ 3/5, v ∈ [−v0 , v0 ] and θ ∈ Rn , kθk2 = 1, we have that 1 e− 100v2 θ √ γn−1 (Kv ) ≥ (α − c0 η)(1 − ). 4 2π 36 Proof. By rotational invariance, we may assume that θ = e1 , the first standard basis vector. By possibly replacing K by −K, we may also assume that v ≥ 0. If b(K)1 ≥ 0, the desired lower bound follows directly from Lemma 48. Given this, we may assume that −η ≤ b(K)1 < 0. To deal with this second case, the main idea is to remove some portion of K lying to the n ⊥ left of the hyperplane e⊥ 1 = {x ∈ R : x1 = 0} so that the barycenter of the remaining body lies on e1 . After this, we apply Lemma 48 again on the truncated body. Define Z 2 1 e− 2 kxk2 b := b(K)1 γn (K) = x1 √ n dx < 0 . 2π K − + n n Let Ht = {x ∈ R : x1 ≤ t} and Ht = {x ∈ R : x1 ≥ t} for t ∈ R. Let z < 0 be defined as the smallest negative number satisfying Z 2 1 e− 2 kxk2 (32) x1 √ n dx = 0 . 2π K∩Hz+ By continuity, such a z must exists, since as z → −∞ the left hand side tends to b < 0 and at z = 0 it is positive. Given the above, note that b(K ∩ Hz+ )1 = 0. We will now show that γn (K ∩ Hz+ ) ≥ α − c0 η if η ≤ η0 , for c0 , η0 appropriately chosen constants. By our choice of z, we have the equality Z 2 1 e− 2 kxk2 x1 √ n dx = b . 2π K∩Hz− From here, we see that γn (K ∩ Hz− ) 2 1 Z = K∩Hz− e− 2 kxk2 √ n dx ≤ 2π 2 1 Z K∩Hz− x1 e− 2 kxk2 b b . √ n dx = = z z z 2π Given this, we get that η b ≥α− . z z γn (K ∩ Hz+ ) = γn (K) − γn (K ∩ Hz− ) = α − γn (K ∩ Hz− ) ≥ α − We now show that there exists a constant c0 s.t. 1/|z| ≤ c0 . Let β = γn (K ∩ H0+ ), and note that β = γn (K) − γn (K ∩ H0− ) ≥ α − 1/2 ≥ 3/5 − 1/2 = 1/10 . Let τ > 0 be positive number satisfying γ1 (0, τ ) = β, i.e. τ = Φ−1 (1/2 + β). By pushing the mass of K ∩ H0+ to the left towards e⊥ 1 as much as possible, we see that Z Z 2 2 1 1 2 e− 2 kxk2 e− 2 kxk2 1 x1 √ n dx ≥ x1 √ n dx = √ (1 − e−τ /2 ) . (33) + n 2π 2π 2π K∩H0 {x∈R :0≤x1 ≤τ } Next, by inclusion Z 2 1 e− 2 kxk2 x1 √ n dx ≥ 2π K∩{x∈Rn :z≤x≤0} 1 2 2 e− 2 kxk2 1 x1 √ n dx = √ (e−z /2 − 1) . n 2π 2π {x∈R :z≤x≤0} Z Given that z satisfies (32), combining equations (33), (34), we must have that 0 ≥ e−z 2 /2 − e−τ 2 Thus, we may set c0 = 1/Φ−1 (6/10). Set η0 = /2 ⇒ |z| ≥ τ ≥ Φ−1 (6/10) > 0 . 1 10c0 . Since η ≤ η0 , we have that γn (K ∩ Hz+ ) ≥ α − c0 η ≥ 3/5 − 1/10 = 1/2 . Lastly, using Lemma 48 on K ∩ Hz+ , we now get that 1 γn−1 (Kve1 ) = γn−1 ((K ∩ Hz+ )ev1 ) as needed. 37 e− 100v2 ≥ (α − c0 η)(1 − √ ), 4 2π (34) 10 Constructive Vector Komlós In this section we give a new proof of the main result of [24] that the natural SDP for the Komlós problem has value at most 1. While the proof in [24] used duality, our proof is direct and immediately yields an algorithm to compute an SDP solution which only uses basic linear algebraic operations, and does not need a general SDP solver. We state the main theorem next. Theorem 49. Let v1 , . . . , vn ∈ Rm be vectors of Euclidean length at most 1, and let α1 , . . . , αn ∈ [0, 1]. There exists an n × n PSD matrix X such that Xii = αi V XV T ∀1 ≤ i ≤ n  Im , where V = (v1 , . . . , vm ) is the n × m matrix whose columns are the vectors vi . To prove Theorem 49 we make use of a basic identity about inverses of block matrices. This is a standard use of the Schur complement and we will not prove it here. Lemma 50. Let  A= A11 A21 A12 A22  be a (k + `) × (k + `) block matrix, where A11 is a k × k matrix, A12 is a k × ` matrix, A21 is a ` × k matrix, and A22 is a ` × ` matrix. Assume A and A22 are invertible, and write B = A−1 in block form as   B11 B12 B= , B21 B22 −1 where Bij has the same dimensions as Aij . Then B11 = (A11 − A12 A−1 (i.e. the inverse of the Schur 22 A21 ) complement of A11 in A). From Lemma 50 we derive the main technical claim used in the proof of Theorem 49. Lemma 51. Let A = V T V be an n × n positive definite matrix, and let v1 , . . . , vn be the columns of V . Let B = A−1 . Then, for each 1 ≤ i ≤ n Bii = 1 1 ≥ , 2 k(I − Π−i )vi k2 kvi k22 where Π−i is the orthogonal projection matrix onto span{vj : j 6= i}. Proof. It is sufficient to prove the lemma for i = 1. Let U be the matrix with columns v2 , . . . , vn . Since A is positive definite, the principal minor U T U is positive definite as well, and, therefore, invertible. By Lemma 50, 1 B11 = . kv1 k22 − v1T U (U T U )−1 U T v1 Let Π = U (U T U )−1 U T . Since Π is symmetric and idempotent (i.e. Π2 = Π), it is an orthogonal projection matrix. Moreover ΠU = U and Π has the same rank as U , so Π is the orthogonal projection matrix onto the column span of U , i.e. U (U T U )−1 U T = Π−1 and the lemma follows. Proof of Theorem 49. We prove the theorem by induction on n. In the base case m = 1, we have a single vector v ∈ Rm , kvk2 ≤ 1, and an α ∈ [0, 1]. We set x = α, and we clearly have vxv T  αI  I. We now proceed with the inductive step. Consider first the case that V T V is singular. Then there exists a vector x 6= 0 such that V x = 0. Scale x so that x2i ≤ αi for all i, and there exists k such that x2k = αk2 . Apply the inductive hypothesis to the vectors (vi : i 6= k) and the reals (αi0 = αi − x2i : i 6= k) to get a matrix Y ∈ R([m]\{k})×([n]\{k}) . Extend Y to a matrix Ỹ ∈ Rn×n by padding with 0’s, i.e. Ỹij = Yij if i, j 6= k and Ỹij = 0, otherwise. Define X = xxT + Ỹ : it is easy to verify that both conditions of the theorem are satisfied. 38 Finally, assume that V T V is invertible, and let B = (V T V )−1 . Define β = min αi /Bii , i k = arg min αi /Bii , i γ = max αi − βBii . i Apply the inductive hypothesis to the vectors (vi : i 6= k) and the reals (αi0 = (αi − βbii )/γ : i 6= k) to get a matrix Y ∈ R([n]\{k})×([n]\{k}) , which we then pad with 0’s to an n × n matrix Ỹ , as we did in the first case above. Define X as X = βB + γ Ỹ . It is easy to verify that Xii = αi for all i. We have V XV T = βV BV T + γV T Ỹ V = βV (V T V )−1 V T + γU T Y U, where U is the submatrix of V consisting of all columns of V except vk . U T Y U  I by the induction hypothesis. Since V (V T V )−1 V T is symmetric and idempotent, it is an orthogonal projection matrix, and therefore V (V T V )−1 V T  I. Because Bii ≥ kvi k−2 2 ≥ 1 by Lemma 51, we have γ ≤ maxi αi − β. Therefore, V XV T = βV (V T V )−1 V T + γU T Y U  (β + γ)In  (max αi )In  In . i This completes the proof. Observe that the proof of Theorem 49 can be easily turned into an efficient recursive algorithm. References [1] Milton Abramowitz and Irene A. Stegun, editors. Handbook of mathematical functions with formulas, graphs, and mathematical tables. Dover Publications, Inc., New York, 1992. Reprint of the 1972 edition. [2] Wojciech Banaszczyk. Balancing vectors and Gaussian measures of n-dimensional convex bodies. Random Structures Algorithms, 12(4):351–360, 1998. [3] Wojciech Banaszczyk. On series of signed vectors and their rearrangements. Random Struct. Algorithms, 40(3):301–316, 2012. URL: http://dx.doi.org/10.1002/rsa.20373, doi:10.1002/rsa.20373. [4] Nikhil Bansal. Constructive algorithms for discrepancy minimization. In 2010 IEEE 51st Annual Symposium on Foundations of Computer Science FOCS 2010, pages 3–10. IEEE Computer Soc., Los Alamitos, CA, 2010. [5] Nikhil Bansal, Daniel Dadush, and Shashwat Garg. An algorithm for Komlós conjecture matching Banaszczyk’s bound. In 57th Annual IEEE Symposium on Foundations of Computer Science, FOCS 2016, New Brunswick, NJ, USA, October 9-11, 2016, pages 788–799, 2016. [6] Franck Barthe, Olivier Guédon, Shahar Mendelson, and Assaf Naor. A probabilistic approach to the geometry of the lpn -ball. Ann. Probab., 33(2):480–513, 2005. [7] József Beck. Roth’s estimate of the discrepancy of integer sequences is nearly sharp. Combinatorica, 1(4):319–325, 1981. [8] József Beck and Tibor Fiala. “Integer-making” theorems. Discrete Appl. Math., 3(1):1–8, 1981. [9] Christer Borell. The Ehrhard inequality. C. R. Math. Acad. Sci. Paris, 337(10):663–666, 2003. [10] Boris Bukh. An improvement of the Beck-Fiala theorem. CoRR, abs/1306.6081, 2013. [11] Bernard Chazelle. The discrepancy method. Cambridge University Press, Cambridge, 2000. Randomness and complexity. [12] William Chen, Anand Srivastav, Giancarlo Travaglini, et al. A Panorama of Discrepancy Theory, volume 2107. Springer, 2014. 39 [13] Antoine Ehrhard. Symétrisation dans l’espace de Gauss. Math. Scand., 53(2):281–301, 1983. [14] Ronen Eldan and Mohit Singh. Efficient algorithms for discrepancy minimization in convex sets. CoRR, abs/1409.2913, 2014. [15] Esther Ezra and Shachar Lovett. On the Beck-Fiala conjecture for random set systems. Electronic Colloquium on Computational Complexity (ECCC), 22:190, 2015. [16] David A. Freedman. On tail probabilities for martingales. Ann. Probability, 3:100–118, 1975. [17] Nicholas J. A. Harvey, Roy Schwartz, and Mohit Singh. Discrepancy without partial colorings. In Approximation, randomization, and combinatorial optimization, volume 28 of LIPIcs. Leibniz Int. Proc. Inform., pages 258–273. Schloss Dagstuhl. Leibniz-Zent. Inform., Wadern, 2014. [18] Rafal Latala and Krzysztof Oleszkiewicz. Gaussian measures of dilatations of convex symmetric sets. Ann. Probab., 27(4):1922–1938, 1999. [19] Avi Levy, Harishchandra Ramadas, and Thomas Rothvoss. Deterministic discrepancy minimization via the multiplicative weight update method. arXiv preprint arXiv:1611.08752, 2016. [20] L. Lovász, J. Spencer, and K. Vesztergombi. Discrepancy of set-systems and matrices. European J. Combin., 7(2):151–160, 1986. URL: http://dx.doi.org/10.1016/S0195-6698(86)80041-5, doi: 10.1016/S0195-6698(86)80041-5. [21] Shachar Lovett and Raghu Meka. Constructive discrepancy minimization by walking on the edges. SIAM J. Comput., 44(5):1573–1582, 2015. Preliminary version in FOCS 2012. [22] Jiřı́ Matoušek. Geometric discrepancy, volume 18 of Algorithms and Combinatorics. Springer-Verlag, Berlin, 1999. An illustrated guide. [23] John Von Neumann. Zur theorie der gesellschaftsspiele. Mathematische Annalen, 100(1):295–320, 1928. [24] Aleksandar Nikolov. The Komlós conjecture holds for vector colorings. arXiv preprint arXiv:1301.4039, 2013. [25] Aleksandar Nikolov and Kunal Talwar. Approximating hereditary discrepancy via small width ellipsoids. In Symposium on Discrete Algorithms, SODA, pages 324–336, 2015. [26] G. Paouris. Concentration of mass on convex bodies. Geom. Funct. Anal., 16(5):1021–1049, 2006. [27] Thomas Rothvoss. Constructive discrepancy minimization for convex sets. In 55th Annual IEEE Symposium on Foundations of Computer Science—FOCS 2014, pages 140–145. IEEE Computer Soc., Los Alamitos, CA, 2014. [28] Joel Spencer. Six standard deviations suffice. Trans. Amer. Math. Soc., 289(2):679–706, 1985. [29] Joel Spencer. Ten lectures on the probabilistic method, volume 52. SIAM, 1987. [30] Aravind Srinivasan. Improving the discrepancy bound for sparse matrices: better approximations for sparse lattice approximation problems. In Proceedings of the Eighth Annual ACM-SIAM Symposium on Discrete Algorithms (New Orleans, LA, 1997), pages 692–701. ACM, New York, 1997. [31] Michel Talagrand. The generic chaining. Springer Monographs in Mathematics. Springer-Verlag, Berlin, 2005. Upper and lower bounds of stochastic processes. 40 11 11.1 Appendix Estimating the Barycenter In this section we show how to efficiently estimate the barycenter of K up to a small accuracy in `2 -norm. For a convex body K ⊆ Rn , we let γK denote the Gaussian measure restricted to K. For a random variable X in Rn , we denote the covariance of X by cov[X] = E[(X − E[X])(X − E[X])T ]. The following lemma shows that the covariance of a Gaussian random vector shrinks when restricted to a convex body. We include a short proof for completeness. Lemma 52. Given a convex body K in Rn , let γK be the Gaussian distribution restricted to K, and let X be a random variable distributed according to γK . Then, cov[X]  In . Proof. Consider f (t) = ln γn (K + t). f is concave in t. This follows from log-concavity of γn , an easy consequence of the Prekopa-Leindler inequality. Hence, the Hessian of f , H(f ), is negative semi-definite. It can be calculated that H(f ) = H(ln γn (K + t)) = cov[X + t] − In , where X ∼ γK . Setting t = 0 completes the proof. We will also need to use Paouris’ inequality [26], which we restate slightly: Theorem 53. If X ⊆ Rn is a log-concave random vector with mean 0 and positive-definite covariance matrix C, then for every t ≥ 1, √ √ √ Pr[ X T C −1 X ≥ βt n] ≤ e−t n where β > 0 is an absolute constant. Theorem 54. Let K be a convex body in Rn , given by a membership oracle, with γn (K) ≥ 1/2. For any δ > 0 and ε ∈ (0, 1), there is an algorithm which computes the barycenter of K within accuracy δ in `2 -norm with probability at least 1 − ε in time polynomial in n, 1/δ and log(1/ε). Proof. Let b be the barycenter of K and Xi for 1 ≤ i ≤ N be i.i.d generated from γK , where N = d(β/δ)2 log2 (e/ε)ne. Here β is the constant from Theorem 53. Defining the following quantities N 1 X Xi N i=1 b0 = Yi = Xi − b N 1 X = Yi N i=1 Y C = E [(X − b)(X − b)T ] X∼γK we can see that b0 is an estimate of the barycenter, generated by averaging random samples from the distribution γK and Y is the difference vector between the true barycenter and b0 . Thus it suffices to bound the probability that Y is large and then show how to efficiently generate random samples from the distribution γK . It holds that E[Yi ] = E[Xi − b] = b − b = 0 Also, using Lemma 52, E[Yi YiT ] = cov[Xi ] = C  In Thus, E[Y ] = 0 and cov[Y ] = C/N  In /N 41 Since γK is a log-concave distribution, Xi and hence Yi are log-concave random vectors. It is easily checked (using the Prekopa-Leindler inequality) that the average of log-concave random variables is also log-concave and hence Y is a log-concave random vector. Now,  s  −1 √ I n Y ≥ δ N Pr[kY k2 ≥ δ] = Pr  Y T N s   −1 √ C ≤ Pr  Y T Y ≥ δ N (using C/N  In /N ) N Putting N = d(β/δ)2 log2 (e/ε)ne and using Theorem 53 with t = log(e/ε), we get Pr[kY k2 ≥ δ] ≤ e− √ n log(e/ε) ≤ ε/e ≤ ε/2. (35) We can generate the random points Xi using rejection sampling. For each i, we generate a sequence of (1) (k) i.i.d. standard Gaussian random variables Xi , . . . , Xi ∈ Rn , k = dlog2 (2N/ε)e. We set Xi to the first (j) (j) Xi in the sequence that belongs to K; if no such Xi exists, we set Xi arbitrarily. Clearly, conditional on (j) the existence of a j ≤ k such that Xi ∈ K, Xi ∼ γK . Furthermore, because K has Gaussian measure at (j) least 1/2, for every j we have Pr[Xi 6∈ K] ≤ 1/2, so (j) Pr[∀j : Xi 6∈ K] ≤ 2−k ≤ ε/2N. By a union bound, with probability at least 1 − ε/2, all Xi are distributed according to γK ; let us call this event E. Conditional on E, inequality (35) holds, and Pr[kb − b0 k2 ≥ δ] = Pr[kY k2 ≥ δ] = Pr[kY k2 ≥ δ | E] · Pr[E] + Pr[kY k2 ≥ δ | E c ](1 − Pr[E]) ≤ ε/2 + ε/2 = ε. The algorithm needs to generate O(N log(N/ε)) d-dimensional Gaussian random variables, check membership in K for each of them, and compute the average of N points. Since each of these operations takes polynomial time, and N is polynomial in n, δ, and log(1/ε), the running time of the algorithm is polynomial. 11.2 Proof of Lemma 11 Proof. We first prove subgaussianity. Let θ ∈ S n−1 , t ≥ 0. By assumption on X, 2 Pr[|hX, θi| ≥ t] = min Pr[cosh(λhX, θi) ≥ cosh(λt)] ≤ min β · λ>0 λ>0 ≤ min 2β · e σ 2 λ2 /2−λt λ>0 ≤ 2β · e − 21 (t/σ)2 2 eσ λ /2 cosh(λt) , 2 where the last p inequality follows by setting λ = t/σ . Let α = log2 β + 1. To prove that X is ασ-subgaussian, since probabilities are always at most one, it suffices to prove that n o 2 2 1 1 min 1, 2β · e− 2 (t/σ) ≤ 2e− 2 (t/(ασ)) , ∀t ≥ 0. √ Replacing t ← 2σt, the above simplifies to showing n o 2 2 min 1, 2β · e−t ≤ 2e−(t/α) , ∀t ≥ 0. (36) From here, we see that β·e −t2 ≤e −(t/α)2 ⇔β≤e (1−1/α2 )t2 42 r ⇔t≥ ln β · p α2 = ln(2β). 2 α −1 (37) p 2 2 Let r = ln(2β), noting that 1 = 2β · e−r = 2e−(r/α) , we have that for t ≤ r, the LHS of 36 is 1 and 2 the RHS is at least 1, for t > r, the LHS is equal to 2β · e−t and the RHS is larger by 37. Thus, X is ασ-subgaussian as needed. We now prove the furthermore. For X an n-dimensional standard Gaussian, note that hX, wi is distributed like σY , where Y ∼ N (0, 1) and σ = kwk2 . Hence, Z ∞ 2 1 eσx e−x /2 dx E[ehX,wi ] = E[eσY ] = √ 2π −∞   Z ∞ 2 2 2 1 = eσ /2 √ e−(x−σ) /2 dx = eσ /2 , 2π −∞ as needed. 43
8cs.DS
Modeling the Formation of Social Conventions in Multi-Agent Populations Ismael T. Freire¹ ³ , Clément Moulin-Frier², Marti Sanchez-Fibla², Xerxes D. Arsiwalla¹ ² ³, Paul Verschure¹ ² ³ * ¹ IBEC, Instituto de Bioingeniería de Cataluña, Barcelona, Spain ² UPF, Universitat Pompeu Fabra, Barcelona, Spain ³ BIST, Barcelona Institue of Science and Technology, Barcelona, Spain * ICREA Institució Catalana de Recerca i Estudis Avançats, Barcelona, Spain Abstract In order to understand the formation of social conventions we need to know the specific role of control and learning in multi-agent systems. To advance in this direction, we propose, within the framework of the Distributed Adaptive Control (DAC) theory, a novel Control-based Reinforcement Learning architecture (CRL) that can account for the acquisition of social conventions in multi-agent populations that are solving a benchmark social decision-making problem. Our new CRL architecture, as a concrete realization of DAC multi-agent theory, implements a low-level sensorimotor control loop handling the agent’s reactive behaviors (pre-wired reflexes), along with a layer based on model-free reinforcement learning that maximizes long-term reward. We apply CRL in a multi-agent game-theoretic task in which coordination must be achieved in order to find an optimal solution. We show that our CRL architecture is able to both find optimal solutions in discrete and continuous time and reproduce human experimental data on standard game-theoretic metrics such as efficiency in acquiring rewards, fairness in reward distribution and stability of convention formation. [email protected] I. Introduction The formation of social conventions In his seminal work “Convention” 1, David Lewis defines social conventions as regularities in action that emerge to solve coordination problems and possess two main characteristics: conventions are self-sustaining and arbitrary. Self-sustaining, in the sense that a group of agents in a given population will continue to conform to it as long as they expect the others to do so; and arbitrary, because there are other equally acceptable possibilities to solve the same coordination problem. Understanding under which conditions these conventions can be formed and how, is still an open question, traditionally studied in cooperation games under the umbrella of Game Theory studies 2, and later within Evolutionary Game Theory 3–5. The most iconic example of Game Theory is the Prisoner’s Dilemma. The game proposes a situation in which two arrested criminals have to decide, without communication, whether to testify against the other (defect) or to remain silent (cooperate). If both cooperate, they will spend just 1 year in jail. If both defect, they will spend 6 years. If one cooperates and the other defects, the former will spend 10 years in jail while the latter will be freed. In game theory, the combination of possible actions and its subsequent rewards it’s represented by a payoff matrix like the one shown in Figure 1. One key concept on game theory is the so-called Nash Equilibrium 6, that is a set of strategies in which no player has the interest to change unilaterally her or his own strategy. In the case of the classical Prisoner’s Dilemma, and if the game is only played once, the only Nash Equilibrium is mutual defection, because ‘defect’ will always render a higher payoff, regardless of what the other player chooses. Figure 1: Payoff matrix of the Prisoner’s Dilemma. Each cell of the matrix shows the reward that each player gets for any combination of their respective choices. For example, if player 1 (red) chooses to cooperate and player 2 (blue) chooses to defect (as in the upper right cell), player 1 receives a reward of -10 and player 2 receives a reward of 0. There is a particularly interesting version of this game called Iterated Prisoner's Dilemma (IPD), thoroughly studied by Robert Axelrod, that consists in playing several consecutive rounds of the game. If one player chooses to ‘defect’ in a given round, the other player has the chance to retaliate in the next round by ‘defecting’ back. In this case, if the number of rounds is random or unknown to the players, ‘mutual defection’ is no longer the only Nash Equilibrium, because the incentive to defect is countered by the fear of retaliation, thus, leading to the emergence of cooperation as a Nash Equilibrium. As proven by Axelrod’s seminal work 7, the IPD shows that cooperation can emerge out of repeated interactions by pure natural selection. Following Axelrod’s findings, Russell Hardin postulated that social conventions could be originated in large populations through the same type of repeated dyadic interactions due to the capacity of each individual to generalize to similar cases and the overlapping nature of group activities 8. However, although the classical game theoretic approach remained hegemonic for more than three decades in studying how humans and other animals cooperate 9,10, flaws in this approach led to alternate models 11,12 . One of the major concerns was related to the ecological validity of the experiments based on the IPD, arguing that the conditions under which these experiments are conducted are hardly (if ever) found in nature 9,11,13 . Particularly, many studies pointed to the fact that cooperation between animals (humans and non-humans) usually requires a continuous exchange of information in order to emerge, a feature that the IPD and other similar cooperation games lack, precisely because they are based on discrete-time turns that impose a significant delay between actions 13– 15 . In order to tackle this issue, several investigations have devised ways to modify standard game theory discrete-time tasks into dynamic versions where individuals can respond to each other’s actions in continuous-time 16–21. Their results point out that cooperation can be more easily achieved in the dynamic version of the task due to the rapid flow of information between individuals and their capacity to react in continuous-time 20,22. One example of this can be found in 23 , where Hawkins and Goldstone show that continuous-time interaction helps to converge to more stable strategies in a game theoretical task compared to the same task modeled in discrete-time. They also show that the involved payoffs affect the formation of social conventions. According to these results, they suggest that real-life coordination problems can be solved either by convention or through spontaneous coordination and that these solutions depend on what is at stake if the coordination fails. To illustrate this point, they make the comparison between two real-life examples of a coordination problem: On one hand, when we drive a car, the stakes are high because if we fail to coordinate the outcome could be fatal, so we resort to a convention – e.g. to drive on the right side of the road. On the other hand, when we try to avoid people on a crowded street, we do it “on the fly” because the stakes are low, so it’s not risky to rely on purely reactive behaviors (e.g. avoidance behavior) to solve it. In this paper, we propose a computational model of cognitive agents involved in a social decision-making task called The Battle of the Exes and we confront our results to human data obtained in 23. For this purpose, we develop a Control-based Reinforcement Learning (CRL) cognitive architecture based on the principles of the Distributed Adaptive Control multi-agent theory (DACma). Our architecture integrates both a low-level reactive control loop to manage within-round conflicts, and a policy learning algorithm to acquire across-round strategies. We run simulations showing that the modeled cognitive agents rely more on across-round policy learning when the stakes of the game are higher and that reactive control helps to acquire better outcomes in terms of efficiency and fairness. This provides a computational hypothesis explaining key aspects of the emergence of social conventions (e.g. turn-taking or pure dominance) in game-theoretic setups and provides new experimental predictions to be tested in human coordination tasks. Multi-Agent Reinforcement Learning Regarding the computational modeling of game-theoretical tasks, there is already extensive literature where the study of the emergence of conflict and cooperation in agent populations has been tackled, especially through the use of multi-agent reinforcement learning (for extensive reviews, check 24–26). In this direction, a lot of focus has been put recently on developing enhanced versions of the Deep Q-Learning Network architecture proposed in 27, particularly on their extensions to the social domain 27–31. This architecture uses a reinforcement learning algorithm that extracts abstract features from raw pixels through a deep convolutional network. Along those lines, some researchers 28–30 are modeling the type of conflicts represented in the classic game-theoretic tasks (e.g. the IPD) into more ecologically valid environments 28 where agent learning is based on deep Q-networks 29,30. For instance, agents based on this cognitive model are already capable or learning how to play a two-player video game such as Pong from raw sensory data and achieve human-level performance cooperative and competitive modes 31 27 , both in . Other approaches are paying more attention to how to develop agents that achieve good outcomes in general-sum games and complex social dilemmas, by focusing on maintaining cooperation 32, by making an agent prosocial (taking into account other’s rewards)33 or by conditioning its behavior solely on its outcomes 34. While the computational approaches described above are able to reproduce some of the key aspects of the formation of social behaviors in agent populations, they are not suited for disentangling the role of reactive control and policy learning in this process. Even when the coordination task is being modeled in real-time and the agents are biologically and environmentally constrained, these approaches are not considering lower-level sensorimotor control loops bootstrapping learning in higher levels of the cognitive architecture. In contrast, the Control-based Reinforcement Learning (CRL) architecture we propose is based on the Distributed Adaptive Control multi-agent (DACma)35,36 theory, where learning processes are bootstrapped from sensorimotor control loops, as we will see in the next section. Moreover, we systematically confront our results to the experimental human data collected in 23 for studying the conditions under which such agents are able to converge towards social conventions. For this purpose, we use an already designed and tested game-theoretical task called The Battle of the Exes 23, which we explain in the end of the following section. In Section II, we describe the CRL architecture and its two layers: one dealing with the low-level intrinsic behaviors of the agent and another based on model-free reinforcement learning, allowing the agents to acquire rules for maximizing long-term reward 37 . In Section III we compare the results of our model against existing human data. Finally, we conclude this study by analyzing in Section IV its main results and implications, by discussing the limitations and possible extensions of the current model and by posing several experimental predictions. Foundations of our approach Our approach relies on two main contributions from the literature that we describe in detail in this section. Firstly, the CRL architecture of our agents follows the principles of the DACma theory, where learning processes are bootstrapped from pre-existing reactive control loops. Secondly, we use an existing game-theoretical task called The Battle of the Exes 23, for which human data is available in various experimental conditions. A. The Distributed Adaptive Control theory DAC is a theory of brain and mind that proposes that cognition is based on four control layers that operate at different levels of abstraction 35,36,38. The first level, the Soma layer, contains the whole body of the agent with all the sensors and actuators and represents the interface between the agent and its environment. This layer also contains the physiological needs of the agent, which are the driving force of the whole system. In the Reactive layer, those physiological needs are satisfied through the self-regulation of internal drives, implemented as reactive sensorimotor loops for maintaining them stable (in homeostasis). These reactive interactions bootstrap the learning of instantaneous policies implemented in the Adaptive layer for acquiring a statespace of the agent-environment interaction. Outside the scope of this paper, the Contextual layer acquires temporally extended policies that contribute to the acquisition of more abstract cognitive abilities such as goal selection, memory and planning 36. These higher-level representations, in turn, affect the behavior of the lower layers in a top-down fashion. Control in this architecture is therefore distributed between all layers thanks to the interactions in both directions, top-down and bottom-up, as well as laterally within each layer. DAC makes explicit the distinction between real-time control on one hand (Reactive layer) and perceptual and behavioral learning on the other hand. It is, therefore, an adequate theoretical framework for understanding the specific roles of reactive control and policy learning in the formation of social conventions, which is the aim of the present paper. This allows the identification of the functions the agents will need in both the ballistic and the dynamic conditions of the Battle of the Exes. On one hand, in the ballistic condition, where the players can only make a decision at the beginning of each round, the cognitive agents will only need to use the adaptive layer for solving the task. On the other hand, in the dynamic condition, the agents will need both the reactive and the adaptive layer, since they will be moving through the environment, sensing and acting in continuous-time, and not only making abstract discrete decisions. In section II, we describe in detail the novel Control-based Reinforcement Learning (CRL) architecture, composed of both a reactive and an adaptive control layer. This results in a hybrid control-learning model where reinforcement learning interacts with a feedback controller by inhibiting specific reactive behaviors. B. Benchmark In 23, Hawkins and Goldstone conducted a study to investigate how two factors – the continuity of the interaction (ballistic vs. dynamic) and the stakes of the interaction (high vs. low payoff) – affected the formation of social conventions between humans in a social decision-making task called The Battle of the Exes. The Battle of the Exes is a coordination game similar to the classic Battle of the Sexes 39, that proposes the following situation: A couple just broke up and they don’t want to see each other. Both have their coffee break at the same time, but there are only two coffee shops in the neighborhood: one with great coffee (high reward) and one with okay coffee (low reward). If both go to the great coffee shop they will come across into each other and will not enjoy the break at all. So basically, if they want to enjoy their coffee break, they will have to coordinate in a way that they avoid each other every day. This situation can be modeled within the framework of game theory with a payoff relation such as a > b > 0; where a is the payoff for getting the great coffee, b the payoff of the okay coffee and 0 the payoff for both players if they go to the same location. Regarding the stakes of the interaction, the payoff matrix is manipulated to create two different conditions: high, where the difference between payoffs is higher; and low, where the difference is lower. The payoff matrices in Figure 2 illustrate these two conditions. Figure 2: Payoff matrices of the original “Battle of the Exes” game. The numbers indicate the reward received by each player (red and blue). Reproduced from 23. As for the continuity of the interaction, the experiment has a ballistic and a dynamic condition. In the ballistic condition, as in classical game theory, the players can only choose an action at the beginning of every round of the game, without any further control on the outcome. However, in the dynamic condition, the players can freely change the course of their avatars until one of them reaches a reward (for a visual example of the difference between conditions, check the original videos here). In both conditions, the round ends when one of the players reaches one of the reward spots that represent the coffee shops. Altogether, this results in four conditions in total, two for the stakes of the interaction (high vs. low) combined with two for the continuity of the interaction (ballistic vs. dynamic). For the experiment, they pair the human players in dyads that depending on the payoff condition, play 50 (high) or 60 (low) consecutive rounds together. In order to analyze the coordination between the players of each dyad, they use three measures -efficiency, fairness, and stability- based on Binmore’s three levels of priority 40: • Efficiency –It measures the cumulative sum of rewards that players were able to earn collectively in each round, divided by the total amount of possible rewards. If the efficiency value is 1, it means that the players got the maximum amount of reward. • Fairness – It quantifies the balance between the earnings of the two players. If the fairness value is 1, it means that both players earned the higher payoff the same amount of times. • Stability – It measures how well the strategy is maintained over time. In other words, it quantifies how predictable are the outcomes of the following rounds based on previous results by “using the information-theoretic measure of surprisal, which Shannon defined as the negative logarithm of the probability of an event” 23. The results show that players in the dynamic condition achieve greater efficiency and fairness than their counterparts in the ballistic condition, both in the high payoff and low payoff setups (see Figure 3). However, their key finding is that in the dynamic condition, the players coordinate more “on the fly” (i.e. without the need of a long-term strategy) when the payoff is low, but when the payoff is high, the participants coordinate into more stable strategies. In other words, they identified the stakes of the interaction as a crucial factor in the formation of social conventions when the interaction happens in real-time. The present paper attempts at replicating the results we have just described with a computational model based on an integrated cognitive architecture, in order to identify what are the specific roles of reactive control and policy learning in the emergence of social conventions. Figure 3: Human decision making in the Battle of the Exes task 23 , analyzed by Efficiency (left), Fairness (center) and Stability (right). Within every plot, the experimental conditions are divided into two columns: ballistic (left) and dynamic (right); and by color: high (blue) and low (orange). Note that stability is measured by the level of ‘surprisal’ (i.e. the negative logarithm of the probability of an event), which means that lower surprisal values imply higher stability. Adapted from 23. II. Methods Model The CRL architecture we propose in this study is a model-free approach to reinforcement learning, but with the addition of a reactive controller (for a model-based approach, see 41). The CRL is composed of two layers, a Reactive and an Adaptive layer. The former governs the sensorimotor contingencies of the agent within the rounds of the game, whereas the latter is in charge of learning across rounds. A. Reactive Layer The Reactive Layer (RL) represents the agent sensorimotor control system and is supposed to be prewired (typically from evolutionary processes in a biological perspective). In the Battle of the Exes game that we are considering here, we equip the agents with two predefined reactive behaviors ‘orienting towards rewards’ and ‘escape from agents’. This means that, even in the absence of any learning process, the agents are intrinsically attracted to the reward spots and repulsed from each other. This intrinsic dynamic will bootstrap learning in the Adaptive Layer, as we will see. To model this layer, we follow an approach inspired by Valentino Braitenberg’s Vehicles 42 . These simple vehicles consist of just a set of sensors and actuators (e.g. motors) that, depending on the type of connections created between them, can perform complex behaviors. For a visual depiction of the two behaviors (‘orienting towards rewards’ and ‘escape from agents’), see Figure 4 (or this video). Figure 4. A: Top view of an agent’s body, as represented by the dark-blue large circle. Here the agent is facing toward the top of the page. The two thin black rectangles at the sides represent the two wheels, controlled by their speed. On its front, the agent is equipped with three types of sensors: A: agent sensors (sensing the proximity of the other agent), L: low reward sensors, H: high reward sensors. For each type, the agent is able to sense the proximity of the corresponding entity both on its left and right side (hence six sensors in total). B, C and D: Representation of the specific set of excitatory and inhibitory connections between sensors and actuators that provides the agents with the fundamental reactive behaviors: “escape from agents” (B), represented by red lines; and “orienting towards rewards” for the low (C) and high rewards (D), represented by green lines. • The ‘orienting towards rewards’ behavior is made by a combination of a crossed excitatory connection and a direct inhibitory connection between the reward spot sensors (𝑠 𝑋 ) and the motors (m), plus a forward speed constant value f set to 0.3: 𝑋 𝑋 𝑚𝑙𝑒𝑓𝑡 = 𝑓 + 𝑠𝑟𝑖𝑔ℎ𝑡 − 𝑠𝑙𝑒𝑓𝑡 𝑋 𝑋 𝑚𝑟𝑖𝑔ℎ𝑡 = 𝑓 + 𝑠𝑙𝑒𝑓𝑡 − 𝑠𝑟𝑖𝑔ℎ𝑡 𝑋 where 𝑠𝑙𝑒𝑓𝑡 is the sensor positioned on the left side of the robot indicating the proximity of a reward spot, and 𝑋 is either the high (H) or the low reward (L) sensor (see Figure 4, C and D). The sensors perceive the proximity of the spot. The closer the reward spots, the higher the sensors will be activated. 𝑋 𝑋 Therefore, if no reward spot is detected (𝑠𝑙𝑒𝑓𝑡 = 𝑠𝑟𝑖𝑔ℎ𝑡 = 0), the robot will go forward at speed f. Otherwise, the most activated sensor (left or right) will make the robot turn in the direction of the corresponding reward spot. • The ‘escape from agents’ behavior is made by the opposite combination: a direct excitatory connection and a crossed inhibitory connection, but in this case between the agent sensors (𝑠 𝐴 ) and the motors (m): 𝐴 𝐴 𝑚𝑙𝑒𝑓𝑡 = 𝑓 + 𝑠𝑙𝑒𝑓𝑡 − 𝑠𝑟𝑖𝑔ℎ𝑡 𝐴 𝐴 𝑚𝑟𝑖𝑔ℎ𝑡 = 𝑓 + 𝑠𝑟𝑖𝑔ℎ𝑡 − 𝑠𝑙𝑒𝑓𝑡 𝐴 where 𝑠𝑙𝑒𝑓𝑡 is the sensor positioned on the left side of the robot indicating the proximity of the other agent (see Figure 4B). The closer the reward spots, the higher the sensors will be activated. 𝐴 𝐴 In this case as well, if no agent is detected (𝑠𝑙𝑒𝑓𝑡 = 𝑠𝑟𝑖𝑔ℎ𝑡 = 0), the robot will go forward at the speed f. Otherwise, the most activated sensor will make the robot turn in the opposite direction of the other agent, thus avoiding it. B. Adaptive Layer The agent’s Adaptive layer (AL) is based on a model-free reinforcement learning algorithm that endows the agent with learning capacities for maximizing long-term reward. Functionally, it decides the agent’s action at the beginning of the round, based on the state of the previous round and its policy. The possible states 𝑆 are three: ‘high’, ‘low’ and ‘tie’; and indicate the outcome of the previous round for each agent. That is, if an agent got the high reward on the previous round, the state is ‘high’; if it got the low reward, the state is ‘low’; and if both agents went to the same reward, the state is ‘tie’. The actions 𝐴 are three as well: ‘go to the high’, ‘go to the low’ and ‘none’. In the ballistic condition, in which the agents only use this layer to operate, the two first actions will take the agent directly to the respective reward spots (high and low), while the ‘none’ action will choose randomly between them. In each round, the action chosen by the AL is sampled according to 𝑃(𝐴 = 𝑎 | 𝑆 = 𝑠), where s is the actual state observed by the agent. Figure 5: Representation of the complete cognitive architecture of the agent. On top the Adaptive layer (reinforcement learning control loop) composed of a Critic or value function (V), an Actor or action policy (P) and an inhibitor function (i). In the bottom, the Reactive layer (sensorimotor control loop), composed of three sets of sensors 𝑠 𝐻 , 𝑠 𝐿 , 𝑠 𝐴 (corresponding to High/Low reward and the other Agent, respectively), three functions 𝑓 𝐻 , 𝑓 𝐿 , 𝑓 𝐴 (corresponding to ‘orienting towards High /Low reward’ and ‘escape from agents’ behaviors, respectively) and two motors m𝑙 , m𝑟 (corresponding to the left and right motors). The action selected by the AL is passed through the inhibitor function that will turn off one of the attraction behaviors of the RL depending on the action selected. If the action is ‘go to the high’, the ‘orienting towards low reward’ reactive behavior will be inhibited. If the AL selects ‘go to the low’, the RL will inhibit its ‘orienting towards high reward’ behavior. If the AL selects ‘none’, the RL will act normally without any inhibition. In the dynamic condition, the agent uses the whole architecture, with the Adaptive and the Reactive layer working together (see Figure 5). As in the previous condition, the agent’s AL chooses an action at the beginning of the round, based on the state of the previous round and its policy. This action is then signaled to the RL, that will inhibit the opposite reward-attraction reactive behavior according to the action selected by the AL. In the case that the AL chooses the action ‘go to the high’, the RL will inhibit the ‘orienting towards low reward’ behavior, allowing the agent to focus only on the high reward. Conversely, if the AL chooses the action ‘go to the low’, the reactive attraction to the high reward will be inhibited. In both cases, the ‘agent avoidance’ reactive behavior still operates. Finally, if the action ‘none’ is selected, instead of choosing randomly between the other two actions as in the ballistic condition, the AL will not act at all, thus relying completely on the behaviors of the RL to play that round of the game. The Adaptive Layer is implemented as a model-free reinforcement learning algorithm for maximizing accumulated reward over rounds through action, similar to the one implemented in 43 (see Figure 6) and adapted to operate on discrete state and action spaces. Figure 6: Representation of the TD-learning algorithm implementing the Adaptive layer. At each time step, the Critic (or value function, V) receives the state of the environment and the current reward as an input and outputs a TD error (e) signal informing the agent whether its last action has performed better or worse than expected (see details below). This signal is sent to the Actor (or action policy, P) and back to the Critic. The Actor uses the TD error to update its policy in order to converge to the optimal action for each state, while the Critic uses it to update the value function. More specifically, we use an Actor-Critic Temporal Difference Learning algorithm (TDlearning), which is based on the interaction between two main components: • an Actor, or action policy π, which learns the mapping from states (s ϵ S) to actions (a ϵ A) and define what is the action (a) -based on a probability (P)- to be performed in each state (s); π ∶ 𝑆 x 𝐴 → [0,1] π(𝑎|𝑠) = 𝑃(𝑎𝑡 = 𝑎|s𝑡 = 𝑠) • and a Critic, or value function 𝑉π (𝑠), that estimates the expected accumulated reward (𝐸[𝑅]) of a state (s) following a policy π; 𝑡 𝑉π (𝑠) = 𝐸[𝑅] = 𝐸[∑∞ 𝑡=0 γ 𝑟𝑡 |𝑠0 = 𝑠], where γ ϵ [0,1] is the discount factor, and 𝑟𝑡 is the reward at step t. The Critic also estimates if the Actor performed better or worse than expected, by comparing the observed reward with the prediction of 𝑉π (𝑠). This provides a learning signal to the actor for optimizing it, where actions performing better (resp. worse) than expected are reinforced (resp. diminished). This learning signal is called the temporal-difference error (TD error). The TD error 𝑒(s𝑡 ) is computed as a function of the prediction from value function 𝑉π (𝑠) and the currently observed reward of a given state 𝑟(s𝑡 ). 𝑒(s𝑡 ) = 𝑟(s𝑡 ) + γ 𝑉π (s𝑡 ) − 𝑉π (s𝑡−1 ) where γ is a discount factor that is empirically set to 0.40. When e(s) > 0 (resp. e(s) < 0), this means that the action performed better (resp. worse) than expected. The TD error signal is then sent both to the Actor and back to the Critic for updating their current values. The update of the Actor is done in two steps. First, a matrix 𝐶𝑜𝑢𝑛𝑡(a𝑡 , s𝑡−1 ), with rows indexed by discrete actions and columns by discrete states, is updated according to the TD error, 𝐶𝑜𝑢𝑛𝑡(a𝑡 , s𝑡−1 ) = 𝐶𝑜𝑢𝑛𝑡(a𝑡 , s𝑡−1 ) + 𝛿 𝑒(s𝑡 ) where 𝛿 is a learning rate, that is set to 0.45, a𝑡 is the current action and s𝑡−1 the previous state. 𝐶𝑜𝑢𝑛𝑡(a𝑡 , s𝑡 ) integrates the observed TD errors when executing the action a𝑡 in the state s𝑡 . It is initialized to 0 for all a𝑡 , s𝑡 and kept to a lower bound of 0. 𝐶𝑜𝑢𝑛𝑡(a𝑡 , s𝑡 ) is then used for updating the probabilities by applying Laplace’s Law of Succession 44: 𝑃(𝐴 = 𝑎 | 𝑆 = 𝑠) = 𝐶𝑜𝑢𝑛𝑡(a𝑡 , s𝑡 ) + 1 (∑𝑎∈𝐴 𝐶𝑜𝑢𝑛𝑡(a𝑡 , s𝑡 )) + 𝑘 where k is the number of possible actions. Laplace’s Law of Succession is a generalized histogram (frequency count) where it is assumed that each value has already been observed once prior to any actual observation. By doing so it prevents null probabilities (when no data has been observed, it returns a uniform probability distribution). Therefore, the higher 𝐶𝑜𝑢𝑛𝑡(a𝑡 , s𝑡 ), the more probable a𝑡 will be executed in s𝑡 . Using these equations, actions performing better than expected (e(s) > 0) will increase their probability to be chosen the next time the agent will be in state s𝑡−1 . When e(s) < 0, the probability will decrease. Finally, the Critic (value function) is updated following, 𝑉π (s𝑡−1 ) = 𝑉π (s𝑡−1 ) + 𝜂 𝑒(s𝑡 ) where 𝜂 is a learning rate that is set to 0.15. Experimental Setup We follow, as in the Battle of the Exes benchmark 23, a 2x2 between-subjects experimental design. One dimension represents the ballistic and dynamic versions of the game, whereas the other dimension is composed of the high and low difference between payoffs. Each condition is played by 50 agents who are paired in dyads and that play together 50 rounds of the game if they are in one of the high payoff conditions (ballistic or dynamic), or 60 rounds if they are in one of the low payoff conditions. For the task, we have developed the two versions (ballistic and dynamic) of the Battle of the Exes in a 2D simulated robotic environment (the source code is available online at https://github.com/IsmaelTito/PythonRobot2DSim). A representation of the navigational interface of the experiment can be seen below, in Figure 7. Figure 7: Screenshot of the Experimental Setup (top view). In blue, the two cognitive agents in their initial position at the start of a round and equipped with different sensors, described below. In green, the two reward spots; the bigger one representing the high reward and the smaller, the low reward (i.e. lower payoff). In white, the circles that delimit the tie area. The rules of the game are as follows: A round of the game finishes when one of the agents reaches a reward spot. If both agents are within the white circle area when this happens, it’s considered a tie, and both get 0 points. The small spot always gives a reward of 1, whereas the big spot gives 2 or 4 depending on the payoff condition (low or high respectively, see Figure 2). The reward spots are allocated randomly between the two positions at the beginning of each round. III. Results We report the main results of our experiment in relation to human performance in the Battle of the Exes task22, which are analyzed using: efficiency, fairness, and stability 40. For each of these measures, we report the results of the model and plot them in contrast with the human data from 22. Then, we interpret those results and after that, we analyze the role of each layer of the CRL architecture in relation to the data obtained in each condition. Efficiency The efficiency scores of the model followed a normal distribution in the four conditions, so first, a one-way ANOVA was performed, showing a statistically significant difference between groups (F (3, 46) = 755, p < .001). Post-hoc independent samples t-tests showed that dynamic (high and low) conditions, (M = 0.88, M = 0.86), are as well significantly more efficient than their ballistic counterparts (M = 0.46, M = 0.45); between both high (t (98) = -33, p < .001) and low conditions (t (98) = -33, p < .001). We can observe the same statistical tendencies than in the human benchmark data (see Figure 8). Figure 8: Efficiency results comparison between human data (left) and model (right) in the four experimental conditions: ballistic high, ballistic low, dynamic high and dynamic low. In both cases, the dynamic conditions achieved higher efficiency scores than the ballistic ones. Fairness As for the fairness scores of the model, a one-way ANOVA showed a statistically significant difference between groups (F (3, 46) = 6.88, p < .001). Post-hoc independent samples t-tests showed that, as in the benchmark, the high ballistic condition (M = 0.50) is significantly less fair than the two dynamic conditions, high (t (98) = -3.73, p < .001) and low (t (98) = -3.99, p < .001), both with a mean fairness score of 0.68. On the other hand, there is no statistically significant difference between the low ballistic condition (M = 0.61) and the low dynamic (p = .086), but, as opposed to the human results, the low and high ballistic conditions of the model are significantly different (t (98) = -2.17, p < .05). Again, the same statistical tendencies are observed in humans and model (see Figure 9). Figure 9: Fairness results comparison between human data (left) and model (right) in the four experimental conditions: ballistic high, ballistic low, dynamic high and dynamic low. In both cases, the dynamic conditions achieved higher fairness scores than their ballistic counterparts. The difference between both ballistic conditions is similar as well in both human and model data. Stability Regarding stability, since the results of the four conditions showed a non-Gaussian distribution, a non-parametric Kruskal-Wallis H-test was performed, showing a statistically significant difference between groups (H (3) = 42.3, p < .001). Post-hoc Mann-Whitney U-tests showed that the difference between ballistic low (M = 1.18) and dynamic low (M = 1.17) conditions is not statistically significant (p = .10), but that the dynamic high condition (M = 1.09) was significantly more stable than the ballistic high (M = 1.16; p < .001). There was as well a statistically significant difference between the two dynamic conditions (p < .001), but not between the two ballistic (p = .26). Similar statistical tendencies are observed in humans and model (see Figure 10). Figure 10: Comparison between stability results of human (left) and model (right) in the four experimental conditions: ballistic high, ballistic low, dynamic high and dynamic low. Note that stability is measured by the level of ‘surprisal’, which means that lower surprisal values imply higher stability. In both cases, there is a difference between dynamic high and low conditions, being the high condition more stable than the low. Analysis Overall, the model achieved a good fitting with the benchmark. Like in the human experiment, we can observe that the dynamic (continuous-time) version of the model achieves better results in efficiency and fairness and that this improvement is consistent regardless the manipulation of the payoff difference. The remarkable increase in efficiency in the dynamic condition is due to the Reactive layer key role in avoiding within-round conflict when both agents have chosen to go to the same reward, a feature that a ballistic model of the game cannot achieve. As for the results in stability, the model was overall less stable than the benchmark, although it reflected a similar relation between conditions: no difference between high and low payoff conditions in the ballistic setup, and an increase in stability in the high dynamic condition compared to the low dynamic (see Figure 10). Nonetheless, our results show the formation of social conventions such as turn-taking and dominance, as shown in Figure 11. The examples shown in the figure illustrate how two conventions were formed in the dynamic high condition, where this type of equilibria ocurred more often and during more rounds than in the other three conditions, thus explaining the higher stability in this condition. To conclude, besides the mentioned differences between the human benchmark and the model, our results are consistent with human data in that dynamic, continuous-time interaction helps to converge to more efficient, fair and stable strategies when the stakes are high. Figure 11. Top panel: Outcomes of two dyads in the high dynamic condition showing the formation of turn-taking (left) and pure dominance (right) equilibria. Each bar represents the outcome of a round of the game. A red bar means that player1 got the high reward, and a blue bar means that player 2 got the high reward. Black bars represent ties. Middle panel: Surprisal measure over rounds of play. When the convention is formed, the surprisal drops down because the outcomes start to be predictable. Bottom panel: Frequency count of suprisal values in a histogram. The y axis represents increasingly higher values of surprisal (in bits). The longer the convention is maintained, the larger the initial bars of the frequency count (that represents no surprisal). Reliance on the Adaptive layer In order to identify the specific role of each layer in the formation of the social conventions, we run an analysis that estimates their participation (through the introduction of the “none” action) as a function of the payoff difference. Based on the results of benchmark and model in the dynamic condition, where higher payoff differences help to achieve higher stability, we expect that the more we increase this difference between payoffs, the more the agents will rely on the Adaptive layer. For testing this prediction, we performed a simulation with six different conditions with varying levels of payoff difference (high vs. low reward value), from 1-1 to 32-1. To measure the level of reliance on each layer, we logged the number of times each agent outputted a ‘none’ action, that is the action in which the agent relies completely on the Reactive layer to solve the round. Figure 12: Mean of the percentage of ‘not-none’ actions (ie. ‘go to the high’ and ‘go to the low’ actions) selected by the agents plotted against 6 conditions with an increasing difference between high and low payoffs. Considering that there are only 3 possible actions, if the Adaptive layer was randomly choosing the actions, we should observe that the agent selects each action the same amount of times (i.e. prior to any learning, when the action policy returns uniform distributions over A). That means that, at the beginning of each dyad, the reliance on the Reactive layer would be 33% and the reliance on the Adaptive layer 66%. Starting from this point, if our hypothesis is correct, we will expect to observe an increase in the reliance of the Adaptive layer as the payoff difference increases. Indeed, the results show, as seen in Figure 12, that there is a steady increase in the percentage of selection of the adaptive layer as the payoff difference augments. IV. Discussion In this paper, we have investigated the specific role that real-time control and learning have on the formation of social conventions in multi-agent setups. We have proposed, based on the principles of DAC, a novel Control-based Reinforcement Learning (CRL) cognitive architecture. The CRL is a model-free approach to reinforcement learning, but with the addition of a reactive controller. Our CRL architecture is composed of a module based on an actor-critic TD learning algorithm that endows the agent with learning capacities for maximizing long-term reward, and a low-level sensorimotor control loop handling the agent’s reactive behaviors. This integrated cognitive architecture is applied to a multi-agent game-theoretic task, the Battle of the Exes, in which coordination between two agents can be achieved. We have shown that our model is able to converge to both turn-taking and pure dominance equilibria. Moreover, we have demonstrated that real-time agent interaction does affect the formation of more stable, fair and effective social coventions when compared to the same task modeled in discrete-time. These results are consistent with the ones Hawkins and Goldstone obtained with human subjects in 23. In addition, we can interpret our results in the context of a functional cognitive model, the CRL, in which we can determine the specific role that reactive and adaptive control loops play in the formation of social conventions and of spontaneous coordination. In that sense, we can assess that the Reactive layer has a significant role in avoiding within-round conflict (spontaneous coordination), while the Adaptive layer is required to achieve across-round coordination (social conventions). In addition, the model supports our hypothesis that higher payoff differences will increase the reliance on the Adaptive layer. To our knowledge, this is the first model that is able to reproduce human behavioral data in a social decision-making game that was presented both in discrete-time and continuous-time setups. Furthermore, similar experiments don’t take into account the role that sensorimotor control loops have in solving the modeled problems in real life scenarios, an issue that we do consider in our study and constitutes a fundamental requirement for the development of a fully embodied AI. Moreover, as a result of this work, we can now further study how specific manipulations of the experimental conditions (like increasing the differences between payoffs, as presented in Figure 12) can affect both the outcome of the task and the implication of both control loops in solving it. These results allow us to make predictions that can later be tested in human experiments. For future work, there are several directions in which we can continue to develop the work presented in this paper. One possibility would be to focus on a more biologically detailed approach. We could implement a Reactive layer that would be also more consistent with the DAC theory by taking inspiration in the work done in 45 , where a reactive controller model is presented that also regulates the agent’s internal needs. In this direction, we could also implement a Contextual layer like the one presented in 46,47 that allows the agent the learning of rules to maximize delayed reward. Such models allow to build causal models of the world and to take into account context in the learning of optimal action policies. Extending our agent with such functionalities could allow solving much more complicated social coordination problems with delayed reward. Another interesting avenue concerns the emergence of communication. We could extend the model by adding signaling behaviors to the agents and test them in experimental setups similar to the seminal sender-receiver games proposed by Lewis 1, or following a more robot centered approach such as Luc Steels 48,49. With the addition of a Contextual layer as proposed above, we could study the emergence of complex communicative systems embedding a proto-syntax, as outlined in 43,50. Finally, this work aims to help in the advance towards the development of a functional embodied-AI that is able to survive in a complex multi-agent world, as outlined in 51. For this purpose, we could extend this model to study not only other aspects of cooperation, like the wolfpack hunting behavior of 52,53 but also of competing agent populations (e.g.. predator-prey). In ongoing work, we are developing a setup in which the simulated cognitive agents presented in this work will have to compete for limited resources in a massively multi-agent environment. This setup will also allow us to test the hypothesis proposed in 54–56 about the role of consciousness as a game-theoretic evolutionary strategy that could emerge out of a coevolutionary process triggered by a cognitive arms-race between goal-oriented agents. Acknowledgments The research leading to these results has received funding from the European Commission’s Horizon 2020 socSMC project (socSMC-641321H2020-FETPROACT2014) and by the European Research Council’s CDAC project (ERC-2013-ADG 341196). V. References 1. Lewis, D. Convention: A philosophical study. (John Wiley & Sons, 2008). 2. Von Neumann, J. & Morgenstern, O. Game theory and economic behavior. Joh Wiley Sons, New York (1944). 3. Smith, J. M. Game theory and the evolution of fighting. Evol. 8–28 (1972). 4. Smith, J. M. & Price, G. R. The Logic of Animal Conflict. Nature 246, 15–18 (1973). 5. Smith, J. M. Evolution and the Theory of Games. (Cambridge University Press, 1982). 6. Nash, J. F. Equilibrium Points in n-Person Games. Source Proc. Natl. Acad. Sci. United States Am. 36, 48–49 (1950). 7. Axelrod, R. & Hamilton, W. D. The evolution of cooperation. Science (80-. ). 211, 1390–1396 (1981). 8. Hardin, R. Collective action. (Published for Resources for the Future by the Johns Hopkins University Press, 1982). 9. Clements, K. C. & Stephens, D. W. Testing models of non-kin cooperation: mutualism and the Prisoner’s Dilemma. Anim. Behav. 50, 527–535 (1995). 10. Riehl, C. & Frederickson, M. E. Cheating and punishment in cooperative animal societies. Philos. Trans. R. Soc. London B Biol. Sci. 371, (2016). 11. Connor, R. C. Altruism among non-relatives: alternatives to the ‘Prisoner’s Dilemma’. Trends Ecol. Evol. 10, 84–86 (1995). 12. Gintis, H., Bowles, S., Boyd, R. & Fehr, E. Explaining altruistic behavior in humans. Evol. Hum. Behav. 24, 153–172 (2003). 13. Noë, R. Cooperation experiments: coordination through communication versus acting apart together. Anim. Behav. 71, 1–18 (2006). 14. Miller, N., Garnier, S., Hartnett, A. T. & Couzin, I. D. Both information and social cohesion determine collective decisions in animal groups. Proc. Natl. Acad. Sci. U. S. A. 110, 5263–8 (2013). 15. Taborsky, M., Frommen, J. G. & Riehl, C. Correlated pay-offs are key to cooperation. Philos. Trans. R. Soc. London B Biol. Sci. 371, (2016). 16. Oprea, R., Henwood, K. & Friedman, D. Separating the Hawks from the Doves: Evidence from continuous time laboratory games. J. Econ. Theory 146, 2206– 2225 (2011). 17. Friedman, D. & Oprea, R. A Continuous Dilemma. Am. Econ. Rev. 102, 337–363 (2012). 18. Oprea, R., Charness, G. & Friedman, D. Continuous time and communication in a public-goods experiment. J. Econ. Behav. Organ. 108, 212–223 (2014). 19. Bigoni, M., Casari, M., Skrzypacz, A. & Spagnolo, G. Time Horizon and Cooperation in Continuous Time. Econometrica 83, 587–616 (2015). 20. van Doorn, G. S., Riebli, T. & Taborsky, M. Coaction versus reciprocity in continuous-time models of cooperation. J. Theor. Biol. 356, 1–10 (2014). 21. Kephart, C. & Friedman, D. Hotelling revisits the lab: equilibration in continuous and discrete time. J. Econ. Sci. Assoc. 1, 132–145 (2015). 22. Hawkins, R. X. D. Conducting real-time multiplayer experiments on the web. Behav. Res. Methods 47, 966–76 (2015). 23. Hawkins, R. X. D. & Goldstone, R. L. The Formation of Social Conventions in Real-Time Environments. PLoS One 11, e0151670 (2016). 24. Busoniu, L., Babuska, R. & De Schutter, B. A Comprehensive Survey of Multiagent Reinforcement Learning. IEEE Trans. Syst. Man, Cybern. C Appl. Rev. 38 (2), 2008 (2008). 25. Claus, C. & Boutilier, C. The Dynamics of Reinforcement Learning in Cooperative Multiagent Systems. AAAI/IAAI 752 (1998). 26. Tan, M. Multi-agent reinforcement learning: Independent vs. cooperative agents. in Proceedings of the tenth international conference on machine learning 330– 337 (1993). 27. Mnih, V. et al. Human-level control through deep reinforcement learning. Nature 518, 529–533 (2015). 28. Kleiman-Weiner, M., Ho, M. K., Austerweil, J. L., Littman, M. L. & Tenenbaum, J. B. Coordinate to cooperate or compete: Abstract goals and joint intentions in social interaction. COGSCI (2016). 29. Leibo, J. Z., Zambaldi, V., Lanctot, M., Marecki, J. & Graepel, T. Multi-agent Reinforcement Learning in Sequential Social Dilemmas. in Proceedings of the 16th Conference on Autonomous Agents and MultiAgent Systems 464–473 (International Foundation for Autonomous Agents and Multiagent Systems, 2017). 30. Pérolat, J. et al. A multi-agent reinforcement learning model of common-pool resource appropriation. in Advances in Neural Information Processing Systems 30 (eds. Guyon, I. et al.) 3646–3655 (Curran Associates, Inc., 2017). 31. Tampuu, A. et al. Multiagent Cooperation and Competition with Deep Reinforcement Learning. PLoS One 12, e0172395 (2015). 32. Lerer, A. & Peysakhovich, A. Maintaining cooperation in complex social dilemmas using deep reinforcement learning. Arxiv abs/1707.0, (2017). 33. Peysakhovich, A. & Lerer, A. Prosocial learning agents solve generalized Stag Hunts better than selfish ones. Arxiv abs/1709.0, (2017). 34. Peysakhovich, A. & Lerer, A. Consequentialist conditional cooperation in social dilemmas with imperfect information. Arxiv abs/1710.0, (2017). 35. Verschure, P. F. M. J., Voegtlin, T. & Douglas, R. J. Environmentally mediated synergy between perception and behaviour in mobile robots. Nature 425, 620– 624 (2003). 36. Verschure, P. F. M. J., Pennartz, C. M. A. & Pezzulo, G. The why, what, where, when and how of goal-directed choice: neuronal and computational principles. Philos. Trans. R. Soc. London B Biol. Sci. 369, (2014). 37. Moulin-Frier, C. et al. Top-Down and Bottom-Up Interactions between LowLevel Reactive Control and Symbolic Rule Learning in Embodied Agents. in (2016). 38. Verschure, P. F. M. J. Synthetic consciousness: the distributed adaptive control perspective. Philos. Trans. R. Soc. London B Biol. Sci. 371, (2016). 39. Fudenberg, D., Tirole, J., Fudenberg, D. & Tirole, J. Game theory. 1, (MIT Press, 1991). 40. Binmore, K. Natural justice. (Oxford University Press, 2005). 41. Herreros, I., Arsiwalla, X. & Verschure, P. A forward model at Purkinje cell synapses facilitates cerebellar anticipatory control. In Advances in Neural Information Processing Systems (pp. 3828-3836). (2016). 42. Braitenberg, V. Vehicles: Experiments in Synthetic Psychology. (MIT Press, 1986). 43. Moulin-Frier, C., Sanchez-Fibla, M. & Verschure, P. F. M. J. Autonomous development of turn-taking behaviors in agent populations: A computational study. in 2015 Joint IEEE International Conference on Development and Learning and Epigenetic Robotics (ICDL-EpiRob) 188–195 (IEEE, 2015). 44. Jaynes, E. T. & Bretthorst, G. L. Probability theory : the logic of science. (Cambridge University Press, 2003). 45. Sanchez-Fibla, M. et al. Allostatic control for robot behavior regulation: a comparative rodent-robot study. Adv. Complex Syst. 13, 377–403 (2010). 46. Duff, A., Sanchez Fibla, M. & Verschure, P. F. M. J. A biologically based model for the integration of sensory–motor contingencies in rules and plans: A prefrontal cortex based extension of the Distributed Adaptive Control architecture. Brain Res. Bull. 85, 289–304 (2011). 47. Marcos, E., Ringwald, M., Duff, A., Sánchez-Fibla, M. & Verschure, P. F. M. J. The Hierarchical Accumulation of Knowledge in the Distributed Adaptive Control Architecture. in Computational and Robotic Models of the Hierarchical Organization of Behavior 213–234 (Springer Berlin Heidelberg, 2013). doi:10.1007/978-3-642-39875-9_10 48. Steels, L. Language games for autonomous robots. IEEE Intell. Syst. 16, 16–22 (2001). 49. Steels, L. Evolving grounded communication for robots. Trends Cogn. Sci. 7, 308–312 (2003). 50. Moulin-Frier, C. & Verschure, P. F. M. J. Two possible driving forces supporting the evolution of animal communication. Phys. Life Rev. 16, 88–90 (2016). 51. Moulin-Frier, C., Puigbò, J.-Y., Arsiwalla, X. D., Sanchez-Fibla, M. & Verschure, P. F. M. J. Embodied Artificial Intelligence through Distributed Adaptive Control: An Integrated Framework. (2017). 52. Weitzenfeld, A., Vallesa, A. & Flores, H. A Biologically-Inspired Wolf Pack Multiple Robot Hunting Model. in 2006 IEEE 3rd Latin American Robotics Symposium 120–127 (IEEE, 2006). doi:10.1109/LARS.2006.334327 53. Muro, C., Escobedo, R., Spector, L. & Coppinger, R. P. Wolf-pack (Canis lupus) hunting strategies emerge from simple rules in computational simulations. Behav. Processes 88, 192–197 (2011). 54. Arsiwalla, X. D., Herreros, I., Moulin-Frier, C. & Verschure, P. Consciousness as an Evolutionary Game-Theoretic Strategy. in 509–514 (Springer, Cham, 2017). doi:10.1007/978-3-319-63537-8_43 55. Arsiwalla, X. D., Herreros, I., Moulin-Frier, C., Sanchez, M. & Verschure, P. F. Is consciousness a control process. Artif. Intell. Res. Dev. 233–238 (2016). 56. Arsiwalla, X. D., Moulin-Frier, C., Herreros, I., Sanchez-Fibla, M. & Verschure, P. The Morphospace of Consciousness. Arxiv abs/1705.1, (2017).
2cs.AI
1 ChineseFoodNet: A Large-scale Image Dataset for Chinese Food Recognition arXiv:1705.02743v3 [cs.CV] 15 Oct 2017 Xin Chen† , Yu Zhu† , Hua Zhou, Liang Diao, and Dongyan Wang* Abstract—In this paper, we introduce a new and challenging large-scale food image dataset called “ChineseFoodNet”, which aims to automatically recognizing pictured Chinese dishes. Most of the existing food image datasets collected food images either from recipe pictures or selfie. In our dataset, images of each food category of our dataset consists of not only web recipe and menu pictures but photos taken from real dishes, recipe and menu as well. ChineseFoodNet contains over 180,000 food photos of 208 categories, with each category covering a large variations in presentations of same Chinese food. We present our efforts to build this large-scale image dataset, including food category selection, data collection, and data clean and label, in particular how to use machine learning methods to reduce manual labeling work that is an expensive process. We share a detailed benchmark of several state-of-the-art deep convolutional neural networks (CNNs) on ChineseFoodNet. We further propose a novel two-step data fusion approach referred as “TastyNet”, which combines prediction results from different CNNs with voting method. Our proposed approach achieves top-1 accuracies of 81.43% on the validation set and 81.55% on the test set, respectively. The latest dataset is public available for research and can be achieved at https://sites.google.com/view/chinesefoodnet/. Index Terms—dish recognition, deep learning, ChineseFoodNet, TastyNet Fig. 1. Example images from our dataset. Each row shows five images from one category of Chinese food. From top to bottom, the food names are Sichuan noodles with peppery sauce, Mapo tofu, potato silk, and scrambled egg with tomato, respectively. Variations in visual appearance of images of Chinese food caused by complex background, various illumination, different angle of view, different ingredients of the same category, etc. show challenges of visual food recognition. All of these image keep their original size. I. I NTRODUCTION F OOD plays an essential role in everyone’s lives, and the behaviour of diet and eating impacts everyone’s health [1]. Underestimating food intake directly relates to diverse psychological implications [2]. In recent years, photographing foods and sharing them on social networks have become a part of daily life. Consequently, several applications have been developed to record daily meal activities in personal food log system [3] [4] [5], which are employed to computeraided dietary assessment [6], further usage preference experiments [7] [8], calorie measurement [9] and nutrition balance estimation [10] [11]. As one of user-friendly ways to input of the food log, automatic recognition of dish pictures gives rise of a research field of interest. Deep convolutional neural networks (CNNs) have achieved state-of-the-art in a variety of computer vision tasks [12] [13]. The visual dish recognition task is the same situation [14]. The quality of training datasets always plays an important role for † These authors contributed equally to this work. * means corresponding author. Xin Chen, Hua Zhou, Yu Zhu and Dongyan Wang are with Midea Emerging Technology Center, San Jose, 95134, USA. Xin’s email: [email protected], Yu’s email: [email protected], Hua’s email: [email protected], and Dongyan’s email: [email protected]. Liang Diao is with Midea Artificial Intelligence Research Institute, Shenzhen, Guangdong, 528311, P. R. China. email: [email protected]. training a deep neural network, where the high performance of the deep model is still data-driven to some extent [15] [16]. However, to the best of our knowledge, there still exist no effective Chinese food recognition system matured enough to be used in real-world. The major reason is absence of largescale and high quality image datasets. In [17], the Chinese food dataset includes 50 categories, each of which has only 100 images. Obviously, the size of this dataset is not sufficient to satisfy deep learning training requirements. The visual dish recognition problem has widely been considered as one of challenging computer vision and pattern recognition tasks [14] [18]. Compared to other types of food such as Italian food and Japanese food, it is more difficult to recognize the images of Chinese dish as the following reasons: 1) The images of same category appear differently. Since most of the same Chinese dish have different ingredients and different cooking methods, the images are greatly visual different, even for human vision; 2) The noise of images of Chinese dishes is hard to model because of complex noise and a variety of backgrounds.The images of Chinese food are taken in various environment and complex background, for example dim light, vapour environment, strong reflection, various utensils of Chinese dishes such as color, shape, 2 ornament, etc. In order to give impetus to the progress of visual food classification and related computer vision tasks, we build a large-scale image dataset of Chinese dish, named by ChineseFoodNet. This dataset contains 185,628 images of 208 food categories covering most of popular Chinese food, and these images include web images and photos taken in real world under unconstrained conditions. To the best of our knowledge, ChineseFoodNet is the largest and most comprehensive dataset for visual Chinese food recognition. Some of images of ChineseFoodNet are shown in Figure. 2. We benchmark nine CNNs models of four state-of-the-art deep CNNs, SqueezeNet [19], VGG [20], ResNet [21], and DenseNet [22], on our dataset. Experimental results reveal that ChineseFoodNet is capable of learning complex models. In this paper, we also propose a novel two-step data fusion approach with voting. Although simple, voting is an effective way to fuse results [23] [24]. Guided by our benchmarks, we try some combination of different CNNs models Based on results on ChineseFoodNet, we take ResNet152, DenseNet121, DeneseNet169, DenseNet201 and VGG19-batch normalization (BN) [25] as our predictive models. 1 Then we fusing these results with voting as a final result. This method is designated as“ TastyNet”. Our proposed method has achieved top-1 accuracy 81.43% in validation set and 81.55% in test set, respectively. Compared to best results of the approaches with a single network structure, the improvements of 2.38% in validation set and 2.33% in these sets have been achieved, respectively. This paper takes three major contributions as following: 1) We present a large-scale image dataset, ChineseFoodNet, for Chinese food recognition tasks. ChineseFoodNet is made up with 185,628 images of 208 categories, and most of the food image are from users’ daily life. It is public available for research in related topics. 2 2) We provide a benchmark on our dataset. Totally nine different models of four state-of-the-art CNNs architectures are evaluated. We presents the details of the methodology used in the evaluation and the pre-trained models will be public available for further research. 3) We propose a novel two-step data fusion approach for visual food recognition, which combines predictive results of different CNNs with voting. Experimental results on ChineseFoodNet have shown that approach improves the performance compared to one deep CNNs model. It has shown that data fusion should be an alternative way to improve accuracy instead of only increasing numbers of layers in CNNs. The paper is organized as follows. Section II briefly reviews some public food datasets and the state-of-the-art visual food recognition methods. Section III describes the procedure of building and tagging the ChineseFoodNet dataset. In section IV, several state-of-the-art CNNs methods are benchmarked on ChineseFoodNet. Section V details our proposed 1 The name of CNNs networks consists of letters+numbers. Letters are type of CNNs, and following numbers are the number of layers. 2 Our dataset can be accessed from https://sites.google.com/view/ chinesefoodnet/. data fusion approach and present our results on ChineseFoofNet. This paper closes with a conclusion of our work and some future directions in section VI. II. R ELATED W ORK A. Food Dataset The scholars have developed some public food datasets3 for food-related applications such as dietary assessment, computational cooking, food recipe retrieval and so on. Pittsburgh Food Image Dataset (PFID) collects 4,556 fast food images [26]. The UNICT-FD889 dataset of 3,583 images related to 889 distinct dishes are used for Near Duplicate Image retrieval (NDIR) [18]. UEC-Food100 [27] and UEC-Food256 [28] are both Japanese food datasets and contain 100 and 256 categories, respectively. The UPMC-FOOD-101 [29] and ETHZFOOD-101 [30] datasets are twin datasets and have same 101 food categories but different images. The images of UPMCFOOD-101 are recipe images, in which each has the additional textual information, and the images of ETHZ-FOOD-101 are selfies. VIREO-172 [31] is a Chinese Food dataset containing a total of 353 ingredient labels and 110,241 images. However, it aims at cooking recipe retrieval with ingredient recognition. B. Visual Dish Recognition Before introducing deep learning techniques to classification, traditional approaches with hand-crafted features have been applied to visual food recognition, including the pairwise feature distribution (PED) [32], Gabor filters [33], SIHT-based Bag of Visual Words (BoW) [34] [4], optimized bag-offeatures model [35], co-occurrence [36], textons [37], Random Forests (RF) [30], and Fisher Vector [38]. Like deep learning applied to other computer vision tasks, CNNs models have outperformed all of traditional methods and achieve higher and higher accuracy with deeper and deeper CNNs [4] [6] [14] [39] [40] [41]. However, all of these approaches of both traditional methods and deep learning haven’t been tested on a large-scale image dataset of Chinese food. III. C HINESE F OOD N ET: A L ARGE - SCALE C HINESE F OOD I MAGE DATASET To the best of our knowledge, there is no such largescale image datasets for Chinese dish recognition which is mature enough to provided necessary resources for the datadriven techniques, e.g. deep learning, to train complex food recognition models. In this section, we present our procedures to build ChineseFoodNet. Labelling image is an expensive step in building large-scale dataset. In this paper, we design and develop a semi-supervised method to accelerate the whole process. 3 In order to review fairly, we only discuss the data that are available for download in this paper. The last access date is June 1, 2017 3 Fig. 2. Fifty sample images of ChineseFoodNet dataset. The dataset contains 185,628 Chinese food images organized into 208 categories. All images in the dataset are color. Images are resized for better presentation A. Category Selection C. Data Clean and Label Various cooking styles exist in Chinese food culture, such as Sichuan cuisine, Canton cuisine, etc. Our Chinese food dataset must cover the most popular of Chinese cuisines from different styles of cooking. In this subsection, we present our efforts to meet this goal. First, 250 food categories are gathered from the internet.4 However, some dishes are missed in search engine yet because they are too popular to be searched such as Tomato omelette. In order to cover them, we conduct a survey of favorite Chinese dishes within our group. Combining with results of the survey, we select about 300 categories. Since Chinese cruise categories is complex and some dishes are very similar visually, such as Braised Chicken Wings and Cola Chicken Wings, we manually merge related categories. After this process, 208 categories of Chinese dish are taken.5 After collecting large number of food images, the next step is to clean these data and generate proper labels for each image. In this step, we first remove the images with irregular height or width (too large or too small) which usually are irrelevant images. Then we use entropy to clean the images without content. Entropy is a quantitative metric of image content [42]. We calculate the value of entropy of each channel. If the value of any channel is small, we remove it because the image doesn’t have enough useful information. The following step is to remove duplicate and/or very similar images with two steps. First, we calculate 1,024 deep features with the last full connection layer of AlexNet [43]. Second, we calculate the Euclidean distance to measure the similarity. If the distance is below a threshold, we consider the images are very similar and remove one. Some of these images are clearly categorized with specific Chinese food name, such as most of recipe and menu images. The ground truth of this type of image can be directly extracted. However, the number of such images is very limited and the quality of those images are usually very high, e.g., the images are shot with sufficient light condition, good presentation of the food, and good angels, etc. Thus this type of images shows very different distributions comparing to the images captured in daily life, and brings a potential impact for the food recognition tasks in real life. The other images are usually not well-labeled, and the food photos are taken in real world conditions. Those images are mainly from the users’ daily uploads which show very preferred data distributions in food images in the wild. Besides, this type of images is usually associated with metadata. The metadata can be viewed as an description of each image in text format, which often describes the name, cooking recipe B. Data Collection There are two resources of our images, web images and taken photos. The web images in our dataset are coming from social network of the Chinese food and drink/cooking,6 where users uploaded their Chinese food pictures and also provided the tags (labels) of the image. Also some partial of the images in this dataset are collected by our group in daily life. After these steps, the number of images we brought together achieves more than 500,000. However, those images may contain missing labels, incorrect labels or unclear labels. 4 www.top.baidu.com 5 The names of Chinese dish in ChineseFoodNet are also listed at https: //sites.google.com/view/chinesefoodnet/ 6 www.douguo.com 4 Fig. 3. We show basic architectures of four well-known CNNs in our evaluation. From left to right, the architectures are VGG, Resnet, Densenet, and Squeezenet, respectively. and other information about the food in that image. In our procedure, this metadata is utilized to filter the useful images with correct labels. Particularly, we manually generate a set of keywords for each food class in our database, and use each set of the keyword to match the image metadata. Images with metadata which contains the keywords of certain class are selected and labeled with that class. It should be noted that, after the aforementioned step, there are still a number of incorrect labels, which are either caused by unclear descriptions in metadata or irrelevant images. Label validation by human labor on this large number of images is an expensive task in terms of both time and costs. Here we accelerate to label these image by some already labeled samples in advance. We first collect a small database of food images using the crowd-sourcing platform (no overlap between our current dataset) with same class labels. Then a shallow CNN model is trained for the food recognition task on this small database. Given this CNNs model, we classify our collected images into different classes representing candidate labels. Specifically, top n (e.g., 5) predictions from the shallow network are selected as the candidate labels for one image. Finally, we perform manually label validation to finalize the dataset by eliminating the wrong labelled images. D. Dataset Description After work of category selection, data collection, the data collection and cleaning mentioned in previous subsections, finally the ChineseFoodNet dataset contains 185,628 images, with total size of 19.4 Gigabyte (GB). Images in the dataset are kept their original size without any processing and color. The total number of categories is 208 for the current version of dataset, and each image is labelled with only one label from 0 to 207. We split the whole dataset into training, testing and validation sets, approximately in the ratio 80%, 10% and 10%, respectively. Specifically, there are 145,066, 20,254 and 20,310 images for training, validation and testing set, respectively. Figure 1 and Figure 2 show some example images in our dataset. IV. B ENCHMARK ON C HINESE F OOD N ET DATASET In this section, we conducted benchmark experiments for the ChineseFoodNet dataset. First the experimental settings are described, then we introduce the experimental protocol and finally we provide the experimental results and analysis. A. Experimental settings Our experiments were all conducted using PyTorch [44] deep learning framework. In the training phase, the initial learning rate is set to 0.01, momentum is set 0.9, and weight decay is set to 1e-4. We set the learning rate to the initial learning rate decayed by 10 every 30 epoch. The number of epoch for the training is set to 90. Training optimization 5 TABLE I R ECOGNITION RATES OF DIFFERENT DEEP NETWORKS ON OUR FOOD DATASET. B OTH TOP -1 AND TOP -5 ACCURACY ARE SHOWN ON VALIDATION SET AND TEST SET. Method Squeezenet1 1 VGG19-BN ResNet18 ResNet34 ResNet50 ResNet152 DenseNet121 DenseNet169 DenseNet201 Validation Top-1 Accuracy Top-5 Accuracy 58.42% 85.02% 78.96% 95.73% 73.64% 93.53% 75.51% 94.29% 77.31% 95.20% 78.34% 95.51% 78.07% 95.42% 78.87% 95.80% 79.05% 95.79% method is selected to stochastic gradient descent (SGD) with momentum. No augmentation process is applied except the resizing and mirror. Training images are firstly resized to 256x256, then a random crop of size 224x224 with hoizontal flip (probability 0.5) is applied. We have used the pretrained models from imagenet dataset [16] and fine-tuned the network with our food data. During the testing, images are resized to 256x256 and then we use center crop of size 224x224 to feed into the network. All the experiments were conducted on CentOS 7 operation system, with Intel Xeon E5 CPU (2.2G), 128GB RAM and Nvidia P100 Tesla GPUs hardware with 16G memory. B. Experimental Protocol The dataset is split into training, validation, and test sets by random selection. There are 145,065 images in the training set. There are 20254 images in the validation set and the rest 20310 images are used for testing. Comprehensive experiments have been conducted using various popular deep learning network architectures with different structures and different number of layers. Specifically, we have benchmarked the performance of: Squeezenet (version 1.1) [19], VGG19 (with BN layer) [20], Resnet (18, 34, and 50) [21], DenseNet (121, 169, and 201) [22]. In order to have a fair comparison, all the experiments are using same input image size and same preprocessing/postprocessing procedures. Some implementation details of ResNet and Squeezenet are illuminated in Figure. 4. Fig. 4. Illustration of residual block in ResNet and fire block in Squeezenet. C. Experimental Results The recognition performance of different deep networks are shown in Table I, both top 1 accuracy and top 5 accuracy Test Top-1 Accuracy Top-5 Accuracy 58.24% 85.43% 79.22% 95.99% 73.67% 93.62% 75.82% 94.56% 77.84% 95.44% 79.00% 95.79% 78.25% 95.53% 78.72% 95.83% 78.78% 95.72% are presented. Table I has shown that the best top-1 performance on validation set is 79.05%, which is achieved by DenseNet201. The accuracies of VGG19 and DenseNet169 are also very close to the best results. On the test set, the best recognition rate is 79.22%, obtained by VGG19, the second best results is obtained by Resnet152, which is 0.22% lower than then VGG19. Deeper CNNs models generally achieve better performance [45] [46]. From the results, we can see that, CNN models obtains significant improvements in performance when number of layers in same network architecture are increased. E.g., ResNet with 18 layers has recognition rate 73.64%, while the deeper mode ResNet with 152 layers achieves about 5% improvement in both validation and test sets. Similar results can be observed in DenseNet architecture. On the other hand, deep models with wider structure also shows promising performance, e.g., VGG19-BN obtains the best results in test set, and the worst result (58.42 % and 58.24% on validation and test sets, respectively) is achieved by Squeezenet v1.1, which is a shallow and narrow network structure designed for fast and efficient inference. V. TASTY N ET: A TWO - STEP DATA FUSION APPROACH A. Methodology As shown in Table I, the accuracy has higher and higher with deeper and deeper model. If we would improve furthermore, a possible way to use much deeper CNNs models. However, it needs much computation and memory resources. What is more, deeper models easily lead to overfitting problem. The alternative way is the data confusion approach. Its idea is to fuse the inference results of different models. As shown in Figure. 5, predictions from different networks are gathered and a voting approach is utilized to obtain the final fused prediction. Based on some results of different combinations, as shown in Table. II, we select the combination of models that achieves the best top 1 result, ResNet152, DenseNet121, DenseNet169, DenseNet201 and VGG19-BN. The voting method is to average the results of all models. The algorithm is details in Algorithm.!1. B. Results and Analysis Different combinations of network architectures are applied and the experimental results are shown in Table II. From 6 Fig. 5. Basic scheme of the two-step data fusion approach. The first one is to obtain some predictive results from different models. In TastyNet, we use Resnet152, DenseNet121, DenseNet169, DenseNet201 and VGG19-BN. The second one is to combine these result to one final result with voting policy. It his paper, we use weighted coefficient of the results of the first step. TABLE II E XPERIMENTAL RESULTS ( RECOGNITION ACCURACIES ) OF DIFFERENT FUSION SCHEMES Fusion Method ResNet (18 + 34 + 50 + 152) DenseNet (121 + 169 + 201) ResNet (18 + 34 + 50 + 152) + Densenet (121 + 169 + 201) ResNet (18 + 34 + 50 + 152) + Densenet (121 + 169 + 201) + VGG19-BN ResNet152 + DenseNet (121 + 169 + 201) + VGG19-BN Top 1 Accuracy Validation Test 79.19% 79.46% 80.47% 80.17% 80.89% 81.08% 81.23% 81.12% 81.43% 81.55% Top 5 Accuracy Validation Test 96.03% 96.16% 96.26% 96.30% 96.60% 96.67% 96.79% 96.76% 96.73% 96.76% Algorithm 1 Algorithm of TastyNet. 1: Input: 2: Image 3: Output: 4: Number . Range from 0-207 5: Predictive result from Resnet152, p(i), i from 0 to 207 6: Predictive result from DenseNet121, p(i), i from 0 to 207 7: Predictive result from DenseNet169, p(i), i from 0 to 207 8: Predictive result from DenseNet201, p(i), i from 0 to 207 9: Predictive result from Resnet152, p(i), i from 0 to 207 10: Get average result p(i) of all p(i), i from 0 to 207 11: Find maximum p(i) and get i 12: The output is number i network on validation and test set, respectively. Based on the experimental results, we select five CNNs models ,Resnet152, DenseNet121, DenseNet169, DenseNet201 and VGG19-BN, as components of TastyNet. From our proposed approach, we get two conclusions as followings: 1) By applying data fusing approach on different deep networks, the overall performance can be further boosted than using the single deep network; 2) Combination of different network architectures show more benefits in improving the performance than the combinations with same network architectures, and combination of deeper and wider networks obtains the best results in our evaluation; this table, we can conclude that the overall performance is generally increasing for different combinations with ensemble more deep networks. The fusion results of ResNet with different number of layers, obtained higher performance (79.46% top 1 accuracy on test set) than single ResNet (ResNet 152, 77.84% top 1 accuracy on test set). Also the fusion results on DenseNet achieved a 1.12% improvement on test set than the best results achieved for single DenseNet architecture. Furthermore, combination of different types of CNNs networks (e.g., ResNets, DenseNets and VGG shown in Row 3 and 4 in Table II) further improves the overall recognition performance. The best result is obtained by fusing Resnet152 and Densenet 121, Densenet 169, Densenet 201, and VGG19-BN, the recognition accuracy is 81.43% on the validation set and 81.55% for the test set. This results is 2.38% and 2.33% higher than the single VI. C ONCLUSION AND F UTURE W ORK In this paper, we have successfully created a very large-scale image dataset for Chinese dish recognition, ChineseFoodNet. It contains 185,628 images of 208 food categories, in which the images are from not only web images but also real world. As a consequence, the models trained on our dataset should have covered most of food recognition applications. Also, we present the benchmarks of nine state-of-the-art CNNs models of four well-known CNNs architectures on ChineseFoodNet. Finally, we propose a novel two-step data fusion approach, ”TastyNet”. Based on experimental results, we select Resnet 152, Densenent 121, Densenet 169, Densenet 201 and VGG19+BN models. After voting the results of these model, we obtain final inference result. It has shown the state-of-the-art results on ChineseFoodNet. What is more, our 7 proposed approach has shown that data fusion is an effective way to obtain a better result instead of only working on one type CNNs model. For our future work, we are extending the number of food category to over 500 that should be applied in much applications. Also, we will investigate new fusion methods to fuse the different results with different models to obtain the better performance. ACKNOWLEDGMENT The authors would like to thank Zhi Zhang, Xukai Zhang, Zigang Wang, Xiangping Zeng, Xiaofei Xu, Dangdang Mi and Qingqing Chang for their discussions and efforts to collect data. All of them are with Midea Health and Nutrition Institute. R EFERENCES [1] A. Mesas, M. Muñoz-Pareja, E. López-Garcı́a, and F. Rodrı́guezArtalejo, “Selected eating behaviours and excess body weight: a systematic review,” Obesity Reviews, vol. 13, no. 2, pp. 106–135, 2012. [2] M. B. E. Livingstone and A. E. Black, “Markers of the validity of reported energy intake,” The Journal of nutrition, vol. 133, no. 3, pp. 895S–920S, 2003. [3] K. Aizawa, “Multimedia foodlog: Diverse applications from selfmonitoring to social contributions,” ITE Transactions on Media Technology and Applications, vol. 1, no. 3, pp. 214–219, 2013. [4] Y. Kawano and K. Yanai, “Real-time mobile food recognition system,” in Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, 2013, pp. 1–7. [5] O. Beijbom, N. Joshi, D. Morris, S. Saponas, and S. Khullar, “Menumatch: restaurant-specific food logging from images,” in Applications of Computer Vision (WACV), 2015 IEEE Winter Conference on. IEEE, 2015, pp. 844–851. [6] C. Liu, Y. Cao, Y. Luo, G. Chen, V. Vokkarane, and Y. Ma, “Deepfood: Deep learning-based food image recognition for computer-aided dietary assessment,” in International Conference on Smart Homes and Health Telematics. Springer, 2016, pp. 37–48. [7] K. Aizawa, K. Maeda, M. Ogawa, Y. Sato, M. Kasamatsu, K. Waki, and H. Takimoto, “Comparative study of the routine daily usability of foodlog a smartphone-based food recording tool assisted by image retrieval,” Journal of diabetes science and technology, vol. 8, no. 2, pp. 203–208, 2014. [8] K. Takahashi, K. Doman, Y. Kawanishi, T. Hirayama, I. Ide, D. Deguchi, and H. Murase, “Estimation of the attractiveness of food photography focusing on main ingredients,” in Proceedings of the 9th Workshop on Multimedia for Cooking and Eating Activities in conjunction with The 2017 International Joint Conference on Artificial Intelligence. ACM, 2017, pp. 1–6. [9] P. Pouladzadeh, S. Shirmohammadi, and R. Al-Maghrabi, “Measuring calorie and nutrition from food image,” IEEE Transactions on Instrumentation and Measurement, vol. 63, no. 8, pp. 1947–1956, 2014. [10] K. Aizawa, Y. Maruyama, H. Li, and C. Morikawa, “Food balance estimation by using personal dietary tendencies in a multimedia food log,” IEEE Transactions on multimedia, vol. 15, no. 8, pp. 2176–2185, 2013. [11] S. Mezgec and B. Koroušić Seljak, “Nutrinet: A deep learning food and drink image recognition system for dietary assessment,” Nutrients, vol. 9, no. 7, p. 657, 2017. [12] Y. LeCun, Y. Bengio, and G. Hinton, “Deep learning,” Nature, vol. 521, no. 7553, pp. 436–444, 2015. [13] J. Schmidhuber, “Deep learning in neural networks: An overview,” Neural networks, vol. 61, pp. 85–117, 2015. [14] H. Hassannejad, G. Matrella, P. Ciampolini, I. De Munari, M. Mordonini, and S. Cagnoni, “Food image recognition using very deep convolutional networks,” in Proceedings of the 2nd International Workshop on Multimedia Assisted Dietary Management. ACM, 2016, pp. 41–49. [15] Y. Bengio et al., “Learning deep architectures for AI,” Foundations and trends R in Machine Learning, vol. 2, no. 1, pp. 1–127, 2009. [16] J. Deng, W. Dong, R. Socher, L.-J. Li, K. Li, and L. Fei-Fei, “Imagenet: A large-scale hierarchical image database,” in Computer Vision and Pattern Recognition, 2009. CVPR 2009. IEEE Conference on. IEEE, 2009, pp. 248–255. [17] M.-Y. Chen, Y.-H. Yang, C.-J. Ho, S.-H. Wang, S.-M. Liu, E. Chang, C.H. Yeh, and M. Ouhyoung, “Automatic Chinese food identification and quantity estimation,” in SIGGRAPH Asia 2012 Technical Briefs. ACM, 2012. [18] G. M. Farinella, D. Allegra, and F. Stanco, “A benchmark dataset to study the representation of food images,” in European Conference on Computer Vision. Springer, 2014, pp. 584–599. [19] F. N. Iandola, S. Han, M. W. Moskewicz, K. Ashraf, W. J. Dally, and K. Keutzer, “Squeezenet: Alexnet-level accuracy with 50x fewer parameters and < 0.5 mb model size,” arXiv preprint arXiv:1602.07360, 2016. [20] K. Simonyan and A. Zisserman, “Very deep convolutional networks for large-scale image recognition,” arXiv preprint arXiv:1409.1556, 2014. [21] K. He, X. Zhang, S. Ren, and J. Sun, “Deep residual learning for image recognition,” in Proceedings of the IEEE conference on computer vision and pattern recognition, 2016, pp. 770–778. [22] F. Iandola, M. Moskewicz, S. Karayev, R. Girshick, T. Darrell, and K. Keutzer, “Densenet: Implementing efficient convnet descriptor pyramids,” arXiv preprint arXiv:1404.1869, 2014. [23] X. Chen, L. Lin, and Y. Gao, “Parallel nonparametric binarization for degraded document images,” Neurocomputing, vol. 189, pp. 43–52, 2016. [24] C. Macdonald and I. Ounis, “Voting for candidates: adapting data fusion techniques for an expert search task,” in Proceedings of the 15th ACM international conference on Information and knowledge management. ACM, 2006, pp. 387–396. [25] S. Ioffe and C. Szegedy, “Batch normalization: Accelerating deep network training by reducing internal covariate shift,” in International Conference on Machine Learning, 2015, pp. 448–456. [26] M. Chen, K. Dhingra, W. Wu, L. Yang, R. Sukthankar, and J. Yang, “PFID: Pittsburgh fast-food image dataset,” in Image Processing (ICIP), 2009 16th IEEE International Conference on. IEEE, 2009, pp. 289– 292. [27] Y. Matsuda, H. Hoashi, and K. Yanai, “Recognition of multiple-food images by detecting candidate regions,” in Proc. of IEEE International Conference on Multimedia and Expo (ICME), 2012. [28] Y. Kawano and K. Yanai, “Automatic expansion of a food image dataset leveraging existing categories with domain adaptation,” in Proc. of ECCV Workshop on Transferring and Adapting Source Knowledge in Computer Vision (TASK-CV), 2014. [29] X. Wang, D. Kumar, N. Thome, M. Cord, and F. Precioso, “Recipe recognition with large multimodal food dataset,” in Multimedia & Expo Workshops (ICMEW), 2015 IEEE International Conference on. IEEE, 2015, pp. 1–6. [30] L. Bossard, M. Guillaumin, and L. Van Gool, “Food-101–mining discriminative components with random forests,” in European Conference on Computer Vision. Springer, 2014, pp. 446–461. [31] J. Chen and C.-W. Ngo, “Deep-based ingredient recognition for cooking recipe retrieval,” in Proceedings of the 2016 ACM on Multimedia Conference. ACM, 2016, pp. 32–41. [32] S. Yang, M. Chen, D. Pomerleau, and R. Sukthankar, “Food recognition using statistics of pairwise local features,” in Computer Vision and Pattern Recognition (CVPR), 2010 IEEE Conference on. IEEE, 2010, pp. 2249–2256. [33] F. Zhu, A. Mariappan, C. J. Boushey, D. Kerr, K. D. Lutes, D. S. Ebert, and E. J. Delp, “Technology-assisted dietary assessment,” in Proceedings of SPIE, vol. 6814. NIH Public Access, 2008, p. 681411. [34] F. Kong and J. Tan, “Dietcam: Automatic dietary assessment with mobile camera phones,” Pervasive and Mobile Computing, vol. 8, no. 1, pp. 147–163, 2012. [35] M. M. Anthimopoulos, L. Gianola, L. Scarnato, P. Diem, and S. G. Mougiakakou, “A food recognition system for diabetic patients based on an optimized bag-of-features model,” IEEE journal of biomedical and health informatics, vol. 18, no. 4, pp. 1261–1271, 2014. [36] Y. Matsuda and K. Yanai, “Multiple-food recognition considering co-occurrence employing manifold ranking,” in Pattern Recognition (ICPR), 2012 21st International Conference on. IEEE, 2012, pp. 2017– 2020. [37] G. M. Farinella, M. Moltisanti, and S. Battiato, “Classifying food images represented as bag of textons,” in Image Processing (ICIP), 2014 IEEE International Conference on. IEEE, 2014, pp. 5212–5216. [38] Y. Kawano and K. Yanai, “Foodcam: A real-time mobile food recognition system employing fisher vector,” in International Conference on Multimedia Modeling. Springer, 2014, pp. 369–373. [39] S. Christodoulidis, M. Anthimopoulos, and S. Mougiakakou, “Food recognition for dietary assessment using deep convolutional neural net- 8 [40] [41] [42] [43] [44] [45] [46] works,” in International Conference on Image Analysis and Processing. Springer, 2015, pp. 458–465. N. Martinel, G. L. Foresti, and C. Micheloni, “Wide-slice residual networks for food recognition,” arXiv preprint arXiv:1612.06543, 2016. Y. Kawano and K. Yanai, “Food image recognition with deep convolutional features,” in Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct Publication. ACM, 2014, pp. 589–593. M. Sonka, V. Hlavac, and R. Boyle, Image processing, analysis, and machine vision. Cengage Learning, 2014. A. Krizhevsky, I. Sutskever, and G. E. Hinton, “Imagenet classification with deep convolutional neural networks,” in Advances in neural information processing systems, 2012, pp. 1097–1105. http://pytorch.org/, Last access on August 16, 2017. C. Szegedy, W. Liu, Y. Jia, P. Sermanet, S. Reed, D. Anguelov, D. Erhan, V. Vanhoucke, and A. Rabinovich, “Going deeper with convolutions,” in Proceedings of the IEEE conference on computer vision and pattern recognition, 2015, pp. 1–9. C. Szegedy, V. Vanhoucke, S. Ioffe, J. Shlens, and Z. Wojna, “Rethinking the inception architecture for computer vision,” in Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2016, pp. 2818–2826.
1cs.CV
Submitted to the Annals of Statistics arXiv:1603.00126v2 [math.ST] 10 Sep 2017 MULTICLASS CLASSIFICATION, INFORMATION, DIVERGENCE, AND SURROGATE RISK By John Duchi∗ , Khashayar Khosravi, and Feng Ruan∗ Stanford University We provide a unifying view of statistical information measures, multi-way Bayesian hypothesis testing, loss functions for multi-class classification problems, and multi-distribution f -divergences, elaborating equivalence results between all of these objects, and extending existing results for binary outcome spaces to more general ones. We consider a generalization of f -divergences to multiple distributions, and we provide a constructive equivalence between divergences, statistical information (in the sense of DeGroot), and losses for multiclass classification. A major application of our results is in multi-class classification problems in which we must both infer a discriminant function γ—for making predictions on a label Y from datum X— and a data representation (or, in the setting of a hypothesis testing problem, an experimental design), represented as a quantizer q from a family of possible quantizers Q. In this setting, we characterize the equivalence between loss functions, meaning that optimizing either of two losses yields an optimal discriminant and quantizer q, complementing and extending earlier results of Nguyen et al. [23] to the multiclass case. Our results provide a more substantial basis than standard classification calibration results for comparing different losses: we describe the convex losses that are consistent for jointly choosing a data representation and minimizing the (weighted) probability of error in multiclass classification problems. 1. Introduction. Consider the multiclass classification problem: a decision maker receives a pair of random variables (X, Y ) ∈ X × {1, . . . , k}, where Y is unobserved, and wishes to assign the variable X to one of the k classes {1, 2, . . . , k} to minimize the probability of a misclassification. We represent the decision maker via a discriminant function γ : X → Rk , where each component γy (x), y = 1, . . . , k, represents the margin (or a score or perceived likelihood) the decision maker assigns to class y for datum x. The goal is then to minimize the expected loss, or L-risk, (1) RL (γ) := E[L(γ(X), Y )], ∗ Partially supported by NSF-CAREER Award 1553086 and the SAIL-Toyota Center for AI Research. FR additionally supported by the Stanford Graduate Fellowship. Keywords and phrases: f -divergence, risk, surrogate loss function, hypothesis test 1 2 DUCHI, KHOSRAVI, RUAN where L(γ(x), y) measures the loss of margins γ(x) ∈ Rk when the true label of x is y and the expectation (1) is taken jointly over (X, Y ). When L is the 0-1 loss, L(γ(x), y) = 1 {γy (x) ≤ γi (x) for some i 6= y}, the formulation (1) is the misclassification probability P(argmaxy γy (X) 6= Y ). We may also consider the classical k-category Bayesian experiment: given a random variable X ∈ X drawn according to one of the k hypotheses H1 : X ∼ P1 , H2 : X ∼ P2 , ..., Hk : X ∼ Pk with prior probabilities π1 , . . . , πk , P we wish to choose γ minimizing the expected E[L(γ(X), Y )] or posterior y P(Y = y | X = x)L(γ(x), y) loss. In many applications, making decisions based on the raw X is undesirable— the vector X may be high-dimensional, carry useless information impinging on statistical efficiency, or we may need to store or communicate the sample using limited memory or bandwidth. If all we wish to do is to classify a person as being taller or shorter than 160 centimeters, it makes little sense to track his or her blood type and eye color. With the increase in the number and variety of measurements we collect, such careful design choices are important for maintaining statistical power, interpretability, efficient downstream use, and mitigating false discovery [3]. This desire to give “better” representations of data X has led to a rich body of work in statistics, machine learning, and engineering, highlighting the importance of careful measurement, experimental design, and data representation strategies [28, 11, 26, 32]. As Nguyen et al. [23] note in the binary case, one thus frequently extends the classical formulation (1) to include a stage in which a (data-dependent) q : X → Z maps the vector X into a vector Z. A number of situations suggest such an approach. In most practical classification scenarios [29], an equivalent feature selection reduces the dimension of X or increases its interpretability. As a second motivation, consider the decentralized detection problem [33, 23] in communication applications in engineering, where remote sensors communicate data X ∼ Pi through limited bandwidth or memory. In this case, the central processor can infer the distribution Pi only after communication of the transformed vector Z = q(X), and one chooses a quantizer q from a family Q of (low complexity) quantizers. In fuller abstraction, we may treat the problem as a Bayesian experimental design problem, where the mapping q : X → Z may be stochastic and is chosen from a family Q of possible experiments (observation channels). In each of the preceding examples, the incorporation of a quantizer q into the classification procedure poses a more complex problem, as one must simultaneously find a data representation q and discriminant γ. The goal, paralleling that for the risk (1), MULTICLASS CLASSIFICATION, INFORMATION, AND SURROGATE RISK 3 thus becomes joint minimization of the quantized L-risk (2) RL (γ | q) := E [L(γ(q(X)), Y )] over a prespecified family Q of quantizers q : X → Z, where γ : Z → Rk . Often—for example, in the zero-one error case—the loss functions L(·, y) are non-convex (even discontinuous), so population or empirical minimization is intractable. It is thus common to replace the loss with a convex surrogate and minimize this surrogate instead. A surrogate is Fisher consistent if its minimization yields a Bayes optimal discriminant γ for the original loss L (for any distribution P on (X, Y )); researchers have characterized the Fisher consistency of convex surrogates for binary and multiclass classification [36, 21, 2, 31]. A weakness of such results is that they rely strongly on using the unrestricted class of all measurable discriminants γ : X → Rk , and thus most “natural” convex losses are consistent [36, 2]. In this context, a major difficulty is to understand the consequences of using various surrogate losses, and requiring a restricted quantizer class Q is one approach to discovering nuanced properties of the relationship between surrogate and Bayes risk. Nguyen et al. [23] tackle this in the binary case, considering the problem of joint selection of the discriminant function γ : Z → R and quantizer q : X → Z. They exhibit a precise correspondence between binary margin-based loss functions and f -divergences—measures of the similarity between two probability distributions developed in information theory and statistics [1, 10, 34]—to give a general characterization of loss equivalence through classes of divergences. An interesting consequence of their results is that, in spite of positive results for Fisher consistency in binary classification problems [36, 21, 2], essentially only hinge-like losses are consistent for the 0-1 loss. We provide the extension of these results to the multiclass case. Outline and discussion of our contributions. We build on this prior work to provide a unifying framework that relates statistical information measures, loss functions, and generalized notions of entropy in the context of multi-class classification. To begin, we recall a generalization of f -divergences that applies to multiple distributions [16, 13], enumerating analogues of the positivity properties, data-processing inequalities, and discrete approximation available in the binary case, as multi-way f -divergences may be unfamiliar and they motivate our approach (Section 2). We begin our main contributions in Section 3, where we establish a correspondence between loss functions L, generalized entropy on discrete distributions [15], and multiway f -divergences. To make this precise, define the probability simplex ∆k := {p ∈ Rk+ | 1T p = 1}. Let π ∈ ∆k be a prior distribution on the 4 DUCHI, KHOSRAVI, RUAN class label Y and π e(x) ∈ ∆k be the posterior probabilities for Y conditional on the observation X = x. For concave H : ∆k → R, DeGroot [11] defines the information associated with the experiment (X, Y ) as (3) IH (X; π) := H(π) − E[H(e π (X))]. The notion of H as a generalized entropy is clear here, as I is the gap between prior and posterior entropy and is always non-negative. In this context, the value H(π) measures the uncertainty of the experimenter (in some appropriate units) about the unknown class label y when his or her prior belief over y is π, so I is the gap between prior and posterior uncertainty [11]. To relate this type of entropy to loss functions, recall the well-known result [11, 15] that any loss L : Rk × [k] → R ∪ {+∞} induces an entropy HL : ∆k → R, also called the pointwise Bayes risk [15, 27, 13, 35], via (4) HL (π) = inf α∈Rk X k i=1  πi L(α, i) − I {π ∈ ∆k } where I {·} is +∞ if its argument is false (we drop this indicator in the future, defining HL implicitly on ∆k ). We show an inverse construction, providing an explicit and constructable mapping from any concave function H to a loss L inducing H as the pointwise Bayes risk (4), where for each y the loss α 7→ L(α, y) is convex. In Section 3.2, we also develop the natural connections between these generalized entropies H and classification calibration [36, 21, 2, 31], in that our explicit L is generally calibrated. In Section 4, we address the comparison of loss functions—building off of Nguyen et al.’s approach in the binary case [23]—and present our main results on consistency of joint selection of quantizer (data representation) q and discriminant γ. Using our correspondence between concave H, losses L, and f -divergences, we characterize the pairs of losses L(1) and L(2) for which equivalent quantizers and discriminants minimize the quantized risk (2) in the sense that there is a continuous concave h with h(0) = 0 such that   RL(2) (γ | q) − inf RL(2) (γ | q) ≤ h RL(1) (γ | q) − inf RL(1) (γ | q) γ,q∈Q γ,q∈Q for any γ and q ∈ Q. Another way to understand our results is as providing insight into classification calibration when the Bayes’ act (i.e. optimal discriminant γ) does not belong to the class of functions the statistician may choose in a classification problem. A substantial challenge for and criticism of the line of work on classification calibration and surrogate risk consistency [36, 21, 2, 31] is that the results say little for restricted families of MULTICLASS CLASSIFICATION, INFORMATION, AND SURROGATE RISK 5 classifiers. In this context, a corollary of our main contribution is as follows. The loss L(1) is calibrated [36, 2, 31] for L(2) if for any distribution P on X × Y and sequence γn : X → Rk , RL(1) (γn ) → inf γ RL(2) (γ) implies RL(1) (γn ) → inf γ RL(2) (γ). Now, consider a collection Q of functions q : X → Z for some set Z, and then define the class of functions n o G(Q) := γ ◦ q | q ∈ Q and γ : Z → Rk is measurable . Translated to this scenario, our main results—Theorems 1 and 2—imply Corollary 1. Assume that the loss L(1) is calibrated for L(2) and let Hi = HL(i) denote the associated pointwise Bayes risk (4). Then (5) RL(1) (gn ) → inf RL(1) (g) implies RL(2) (gn ) → inf RL(2) (g) g∈G(Q) g∈G(Q) for any collection Q of mappings X → Z, any set Z, any distribution P on X × {1, . . . , k}, and sequence gn ∈ G(Q) if and only if there exist a > 0, b ∈ Rk , and c ∈ R such that H1 (π) = aH2 (π) + bT π + c for all π ∈ ∆k . This corollary reposes on the connections we develop between losses, uncertainty measures and generalized f -divergences. Such measures of statistical information and divergence have been central to the design of communication and quantization schemes in signal processing [33, 25, 20, 18]; we characterize the divergence measures that, when optimized, yield optimal quantizers and detectors. We also provide a result showing when empirical minimization of a surrogate risk is consistent for the desired (original) risk. A number of researchers have studied the connections between divergence measures and risk for binary and multi-category experiments; these point to the results we present. Indeed, Blackwell [8] shows that if a quantizer q1 induces class-conditional distributions with larger divergence than those induced by q2 , then there are prior probabilities such that q1 allows tests with lower probability of error than q2 . Liese and Vajda [19] give a broad treatment of f -divergences, using their representation as the difference between prior and posterior risk in a binary experiment [24] to derive a number of their properties; see also the paper [27]. Garcı́a-Garcı́a and Williamson [13] show how multi-distribution f -divergences [16] arise naturally in the context of multi-class classification problems as the gap between prior and posterior risk in classification, as in the work [19]. In the binary case, these results elucidate the characterization of Fisher consistency for quantization and binary classification Nguyen et al. [23] realize. We pursue this line of research to draw the connections between Fisher consistency, information measures, multi-class classification, surrogate losses, and divergences. 6 DUCHI, KHOSRAVI, RUAN Notation. We let 0 and 1 denote the all-zeros and all-ones vectors, respectively. For a vector or collection of objects we define t1:m = {t1 , . . . , tm }. The indicator function I {·} is +∞ if its argument is false, 0 otherwise, while 1 {·} is 1 if its argument is true, 0 otherwise. We let ∆k = {v ∈ Rk+ : 1T v = 1} k denote the probability Pm simplex Tin R . For m ∈ N, we set [m] = {1, . . . , m}. We let aff A = { i=1 λi xi | λ 1 = 1, xi ∈ A, m ∈ N} denote the affine hull of a set A, and rel int A denotes the interior of A relative to aff A. We let R = R ∪ {+∞} and R = R ∪ {−∞}. For f : Rk → R, we let epi f = {(x, t) : f (x) ≤ t} denote the epigraph of f . We say a convex function f is closed if epi f is a closed set, though we abuse notation and say that a concave f is closed if epi(−f ) is closed. For a convex function f : Rk → R, we say that f is strictly convex at a point t ∈ Rk if for all λ ∈ (0, 1) and t1 , t2 6= t such that t = λt1 + (1 − λ)t2 we have f (t) < λf (t1 ) + (1 − λ)f (t2 ). The (Fenchel) conjugate of a function f : Rk → R is  (6) f ∗ (s) = sup sT t − f (t) . t∈Rk For any f , the conjugate f ∗ is closed convex [17, Chapter X]. For measures ν and µ, we let dν/dµ denote the Radon-Nikodym derivative of ν with respect Lp to µ. For random variables Xn , we say Xn → X∞ if E[|Xn − X∞ |p ] → 0. 2. Multi-distribution f -divergences. Divergence measures for probability distributions have significant statistical, decision-, and informationtheoretic applications, including in optimal testing, minimax rates of convergence, and the design of communication schemes [1, 10, 25, 18]. Central to this work is the f -divergence, introduced by Ali and Silvey [1] and Csiszár [10] (see [19] for an overview). Given distributions P, Q defined on a common set X , a closed convex function f : [0, ∞) → R satisfying f (1) = 0, and any measure µ dominating P and Q, the f -divergence between P and Q is    Z Z  p(x) dP f (7) Df (P ||Q) := q(x)dµ(x) = f dQ. q(x) dQ X dQ Here p = dP dµ and q = dµ denote the densities of P and Q, respectively, and the value uf (t/u) is defined appropriately for t = 0 and u = 0 (e.g. [19]). A number of classical divergence measures arise out of the f -divergence; taking √ f (t) = t log t, f (t) = 21 ( t − 1)2 , or f (t) = |t − 1| yields (respectively) the KL-divergence, squared Hellinger distance, or total variation distance. Central to our study of multi-way hypothesis testing and classification is an understanding of relationships between multiple distributions. We use the following generalization [16, 13] of the f -divergence to multiple distributions. MULTICLASS CLASSIFICATION, INFORMATION, AND SURROGATE RISK 7 Definition 2.1. Let P1 , . . . , Pk be probability distributions on a common k−1 → R be a closed convex function σ-algebra F over a set X . Let f : R+ satisfying f (1) = 0. Let µ be any σ-finite measure such that Pi ≪ µ for all i, and let pi = dPi /dµ. The f -divergence between P1 , . . . , Pk−1 and Pk is  Z  p1 (x) pk−1 (x) (8) Df (P1 , . . . , Pk−1 ||Pk ) := f ,..., pk (x)dµ(x). pk (x) pk (x) We must specify the value of the integrand (8) when pk (x) = 0. In this case, the function fe : Rk+ → R defined, for an arbitrary t′ ∈ rel int dom f , by   if u > 0  uf (t/u) ′ (9) fe(t, u) = lim sf (t − t + t/s) if u = 0 s→0   +∞ otherwise is a closed convex function with value independent of t′ ; fe is the closure of the perspective function R+ ×Rk ∋ (u, t) 7→ uf (t/u) of f [17, Prop. IV.2.2.2]. Any time we consider the perspective we implicitly treat it as its closure (9). We now enumerate a few properties of multi-way f -divergences, showing how they naturally generalize classical binary f -divergences. We focus on basic properties that are useful for our further results on Bayes risk, classification, and hypothesis testing and that parallel results in the binary case (7): they are well-defined, have continuity properties with respect to discrete approximations, and satisfy data-processing inequalities. While Györfi and Nemetz’s original work [16] essentially contains the results, we carefully address infinite values (the closure (9)) and strict convexity, and we use them as definitional building blocks; we defer all proofs to Supplement D. As our first step, we note that Definition 2.1 is independent of the base measure µ. (See Supp. D.1 for a proof generalizing [16, Cor. 1].) Lemma 2.1. In expression (8), the value of the divergence does not depend on the choice of the dominating measure µ. Moreover, Df (P1 , . . . , Pk−1 ||Pk ) ≥ 0. The inequality is strict if f is strictly convex at 1 and the Pi are not identical. Given the importance of quantization to come, we now consider discrete approximations to the divergence. For an at most countable partition P of X , we define the partitioned f -divergence  X  P1 (A) Pk−1 (A) ,..., Pk (A). Df (P1 , . . . , Pk−1 ||Pk | P) = f Pk (A) Pk (A) A∈P 8 DUCHI, KHOSRAVI, RUAN As in the binary case [34, 19], we have the following approximability result generalizing [16, Thm. 6] to possibly infinite integrands: quantizers give arbitrarily good approximations to f -divergences (see § D.2 for a proof). Proposition 1. If f is a closed convex function with f (1) = 0, then Df (P1 , . . . , Pk−1 ||Pk ) = sup Df (P1 , . . . , Pk−1 ||Pk | P) P where the supremum is over finite partitions of X . In the binary case, f -divergences satisfy data processing inequalities [10, 9, 19] which state that processing or transforming an observation X drawn from the distributions P1 , P2 , decreases the divergence between them. To formalize this, recall that Q is a Markov kernel from a set X to Z if Q(· | x) is a probability distribution on Z for each x ∈ X , and for each measurable A ⊂ Z, the mapping x 7→ Q(A | x) is measurable. The following general data processing inequality shows that this holds in the multi-distribution case as well, generalizing [16, Thm. 4] to possibly infinite f and the closure (9); we include a proof in Appendix D.3. Proposition 2. Let f be closed convex with f (1) =R0, Q be a Markov kernel from X to Z, and define the marginals QP (A) = X Q(A | x)dP (x). Then  Df QP1 , . . . , QPk−1 ||QPk ≤ Df (P1 , . . . , Pk−1 ||Pk ) . This proposition is related to the relationships between risk, information, and quantization we develop in Sections 3 and 4. Defining a quantizer q to be a measurable mapping q : X → Z between measurable spaces X and Z, the quantized f divergence is   X P1 (A) Pk−1 (A) f Df (P1 , . . . , Pk−1 ||Pk | q) := sup ,..., Pk (A), Pk (A) Pk (A) P −1 A∈q (P) where P ranges over finite partitions of Z and q−1 (P) = {q−1 (B) | B ∈ P}. Proposition 2 immediately yields that quantization reduces information: the indicator Q(A | x) = 1 {q(x) ∈ A} defines a Markov kernel, yielding Corollary 2. Let f be closed convex, satisfy f (1) = 0, and q be a quantizer of X . Then Df (P1 , . . . , Pk−1 ||Pk | q) ≤ Df (P1 , . . . , Pk−1 ||Pk ) . MULTICLASS CLASSIFICATION, INFORMATION, AND SURROGATE RISK 9 We also see that if q1 and q2 are quantizers of X , and q1 induces a finer partition of X than q2 , meaning that for x, x′ ∈ X the equality q1 (x) = q1 (x′ ) implies q2 (x) = q2 (x′ ), we have Df (P1 , . . . , Pk−1 ||Pk | q2 ) ≤ Df (P1 , . . . , Pk−1 ||Pk | q1 ) . This type of ordering is central to this work: any multiclass loss L induces a unique f -divergence, and consistency of discriminants γ : X → Rk for a loss L after quantization is intimately tied to the preservation (and relative ordering) of information as related to the quantized risk (2). 3. Risks, information measures, and f -divergences. Having reviewed the basic properties of f -divergences, we turn to a more detailed look at their relationships with multi-way hypothesis tests, multi-class classification, generalized entropies, and statistical informations relating multiple distributions. We build a correspondence between these that parallels that for binary experiments and classification problems [19, 23, 27]. We first recapitulate the probabilistic model for classification and Bayesian hypothesis testing problems from the introduction. We have a prior π ∈ ∆k and probability distributions P1 , . . . , Pk defined on a set X . The coordinate Y ∈ [k] is drawn according to a multinomial with probabilities π, and conditional on Y = y, we draw X ∼ Py . Following DeGroot [11], we refer to this as an experiment. Associated with any experiment is a family of informations as follows. Let π e beP the posterior distribution on Y given observation X = x, π ei (x) = πi dPi (x)/( kj=1 πj dPj (x)). Given any closed concave H : Rk+ → R, which we refer to as generalized entropy (see [15, § 3.3]; DeGroot [11] calls H an uncertainty function), the information associated with the experiment is the reduction of entropy (uncertainty) from prior to posterior (3), IH (X; π) = H(π) − E[H(e π (X))]. P The expectation is taken over X ∼ ki=1 πi Pi . That IH (X; π) ≥ 0 is immediate by concavity; DeGroot [11, Thm. 2.1] shows that IH (X; π) ≥ 0 for all distributions P1 , . . . , Pk and priors π if and only if H is concave on ∆k . In this section we develop equivalence results between multiclass classification losses and risk, multi-way f -divergences, and entropy measures. Concretely, consider L : Rk × [k] → R, and recall the risk (1), defined as RL (γ) = E[L(γ(X), Y )], where γ ∈ Γ, the set of measurable functions γ : X → Rk . As in equation (4) in the introduction, each loss L induces the P entropy HL on ∆k via HL (π) = inf α∈Rk ki=1 πi L(α, i), also called the pointwise Bayes risk [15, 13, 27, 35]. In Section 3.1, we give an explicit inverse mapping showing how each generalized entropy H is induced by (at least 10 DUCHI, KHOSRAVI, RUAN one) convex loss function L, i.e., L(·, i) is convex for each i. In Section 3.2, we illustrate consistency properties the entropy H implies about the convex loss L inducing it. We connect these results in Section 3.3 with multi-way f -divergences. For any loss L and associated entropy/Bayes risk HL , for all k−1 → R with fL,π (1) = 0 π ∈ ∆k there exists a convex function fL,π : R+ such that the gap between the prior Bayes L-risk—the best expected loss attainable without observing X—and the posterior Bayes risk inf γ RL (γ) is HL (π) − inf RL (γ) = HL (π) − E[HL (e π (X))] = DfL,π (P1 , . . . , Pk−1 ||Pk ) γ∈Γ (see [15, 13]). The inverse direction is new, and given any closed convex k−1 → R with f (1) = 0, we construct convex losses L(·, i), an function f : R+ associated generalized entropy HL , and prior π = 1/k ∈ ∆k satisfying Df (P1 , . . . , Pk−1 ||Pk ) = inf α∈Rk k X i=1 πi L(α, i) − inf RL (γ). γ∈Γ 3.1. Generalized entropies and losses. We construct a natural bidirectional mapping between losses and generalized entropies, giving a few examples to illustrate. For any loss L : Rk × [k] → R, the construction (4) of HL yields a closed concave function, as HL is the infimum of linear functionals of π. It is thus a generalized entropy [15] (or uncertainty function [11]), and the gap HL (π) − E[HL (e π (X))] between prior and posterior entropy is non-negative. The following two examples with zero-one loss are illustrative. Example 1 (Zero-one loss). Consider the zero one loss Lzo (α, y) = 1 {αy ≤ αj for some j 6= y} where y ∈ [k]. Then we have ) ( k X πi 1 {αi ≤ αj for some j 6= i} = 1 − max πj . HLzo (π) = inf α i=1 j This generalized entropy is concave, nonnegative, and satisfies HLzo (π) = 0 if and only if π = ei for a standard basis vector ei . ⋄ Example 2 (Cost-weighted classification). In some scenarios, we allow different costs for classifying certain classes y as others; for example, it may be less costly to misclassify a benign tumor as cancerous than the opposite. k×k , where cyi ≥ 0 is the In this case, we use a matrix C = [cyi ]ky,i=1 ∈ R+ MULTICLASS CLASSIFICATION, INFORMATION, AND SURROGATE RISK 11 cost for classifying an observation of class y as class i (i.e. assigning X ∼ Pi instead of Py in the experiment). We assume cyy = 0 for each y and define Lcw (α, y) = max{cyi | αi = max αj }, α ∈ Rk , (10) i j the maximal loss for those indices of α attaining maxj αj . Let C = [c1 · · · ck ] be the column representation of C. If cTy π = minl cTl π, then by choosing any α such that αy > αj for all j 6= y, we have HLcw (π) = inf α X k y=1  πy max{cyi | αi = max αj } = min π T cl . i j l The entropy HLcw is concave, nonnegative, and satisfies HLcw (ei ) = 0 for standard basis vectors ei ; Example 1 corresponds to C = 11T − Ik×k . ⋄ The forward mapping (4) from losses L to entropy HL is straightforward, though it is many-to-one. Using convex duality and conjugacy arguments, we can show an inverse mapping. This construction is new, though precursors for proper scoring rules and predictions in the probability simplex exist [15, 14, Thm. 2]; these characterize proper scoring rules, but it is not always clear how to generate convex losses from these. Before stating the proposition, we recall the definition (6) of the Fenchel conjugate f ∗ (s) = supt {sT t − f (t)}. Proposition 3. For any closed concave H : ∆k → R, the losses L(·, i) : Rk → R, (11) L(α, i) = −αi + (−H)∗ (α), i ∈ {1, . . . , k}, are closed, convex, and satisfy the equality (4) that H ≡ HL . Proof. Standard Fenchel conjugacy relationships [17, Chapter X] imply   H(π) = inf −π T α + (−H)∗ (α) where (−H)∗ (α) = sup αT π + H(π) . α∈Rk π∈∆k Defining L(α, i) = −αi + (−H)∗ (α) for i = 1, . . . , k, we can write   H(π) = inf −π T α + (−H)∗ (α) = inf −π T α + π T 1 · (−H)∗ (α) α∈Rk α∈Rk = inf α∈Rk X k i=1  πi L(α, i) . Proposition 3 shows that associated with every concave entropy defined on the simplex, there is at least one set of convex loss functions L(·, i) generating 12 DUCHI, KHOSRAVI, RUAN the entropy via the infimal representation (4), and there is thus a mapping from loss functions to entropies and from entropies to convex losses: given any loss L, we may construct a convex loss Lcvx with HL = HLcvx . The mapping from entropies H to loss functions generating H as in (4) is one-tomany, as any losses L(1) and L(2) with the same range satisfy HL(1) = HL(2) . 3.2. Surrogate risk consistency and generalized entropies. Our construction (11) of loss functions is a somewhat privileged construction, as it often yields desirable properties of the convex loss function itself, especially as related to the non-convex zero-one loss. Indeed, it is often the case that the convex loss L so generated is Fisher consistent; to make this explicit, we recall the following definition [36, 31]. Definition 3.1. Let L : Rk × [k] → R. Then L is classification calibrated for the zero-one loss if for any π ∈ ∆k and i∗ such that πi∗ < maxj πj , (12) inf α∈Rk ( k X ) πi L(α, i) i=1 < inf α∈Rk ( k X i=1 πi L(α, i) : αi∗ ≥ max αj j ) . k×k as in Example 2, L is classification calibrated for Given a matrix C ∈ R+ the cost matrix C if for any π ∈ ∆k and any i∗ with cTi∗ π > minj cTj π, (13) inf α∈Rk ( k X ) πi L(α, i) i=1 < inf α∈Rk ( k X i=1 πi L(α, i) : αi∗ ≥ max αj j ) . Tewari and Bartlett [31, Thm. 2] and Zhang [36, Thm. 3] show the importance of Definition 3.1: let R(γ) be the zero-one or cost-weighted risk (Exs. 1–2). If L is lower-bounded, then it is classification calibrated (with respect to zero-one or the cost-weighted loss) if and only if for any sequence γn : X → Rk and distribution P on X × Y we have Fisher consistency, i.e. RL (γn ) → inf RL (γ) implies R(γn ) → inf R(γ). γ∈Γ γ∈Γ That is, classification calibration (with respect to zero-one-risk or the costweighted risk) is equivalent to surrogate risk consistency of the loss L. Because of the predominance of the zero-one loss in the literature, we use “classification calibration” without any qualification to mean “classification calibration with respect to zero-one loss”. We now show how—under minor restrictions on the generalized entropy function H—the construction (11) yields classification calibrated losses. MULTICLASS CLASSIFICATION, INFORMATION, AND SURROGATE RISK 13 Definition 3.2. A convex function f : Rk → R is (λ, κ, k·k)-uniformly convex over C ⊂ Rk if it is closed and for all t ∈ [0, 1] and x1 , x2 ∈ C f (tx1 + (1 − t)x2 ) ≤ tf (x1 ) + (1 − t)f (x2 ) −   λ t(1 − t) kx1 − x2 kκ (1 − t)κ−1 + tκ−1 . 2 We say, without qualification, that f is uniformly convex on C if dom f ⊃ C and there exist λ > 0, a norm k·k, and constant κ < ∞ such that Definition 3.2 holds; we say f is uniformly concave if −f is uniformly convex. Definition 3.2 is an extension of the usual notion of strong convexity, which holds when κ = 2, and is essentially a quantified notion of strict convexity. With this definition, we have the following two propositions. These two propositions, whose proofs we provide in Appendix A, show that generalized entropies naturally give rise to classification calibrated loss functions; we provide examples of these results in Section 3.4 to come. Proposition 4. Assume that H is closed concave, symmetric, and has dom H = ∆k , and let L have definition (11). Additionally assume that (a) P H is strictly concave, and inf α ki=1 πi L(α, i) is attained for all π ∈ ∆k , or (b) H is uniformly concave. Then L is classification calibrated. Even when H is not strictly concave, we can give classification calibration results. Indeed, recall Example 1, which showed that for the zero-one-loss, we have HL (π) = 1 − maxj πj . Proposition 5. Let H(π) = 1 − maxj πj . The loss (11) defined by L(α, i) = −αi + (−H)∗ (α) is classification calibrated. Moreover, we have for any π ∈ ∆k and α ∈ Rk that k X i=1 πi L(α, i) − inf α k X i=1 πi L(α, i) ≥ 1 k X k i=1 zo πi L (α, i) − inf α k X i=1  πi L (α, i) . zo 3.3. Divergences, risk, and generalized entropies. In this section, we show that f -divergences as in Definition 2.1 have a precise correspondence with generalized entropies and losses; Garcı́a-Garcı́a and Williamson [13] establish the correspondence between f -divergences and entropy/pointwise Bayes risk H; our results show the important link from f directly to the loss L. We begin as in equation (4) P with a concave generalized entropy H and loss L satisfying H(π) = inf α∈Rk ki=1 πi L(α, i); by Proposition 3 it is no loss of 14 DUCHI, KHOSRAVI, RUAN generality to assume this correspondence. Let Γ be the collection of measurable functions γ : X → Rk . The posterior Bayes risk for L is (14) HL (π, P1:k ) := inf Z X k γ∈Γ X i=1 πi L(γ(x), i)dPi (x) = E[HL (e π (X))], where π e(x) is the posterior distribution on Y conditional on X = x. The information measure (3) is thus the gap between the prior Bayes L-risk and posterior Bayes L-risk. We may then write inf α∈Rk = Z k X i=1 X πi L(α, i) − inf RL (γ) = HL (π) − HL (π, P1:k ) = IHL (X; π) γ∈Γ sup HL (π) − α k−1 X i=1 ! dPi πi L(α, i) − πk L(α, k) dPk = DfL,π (P1:k−1 ||Pk ) , dPk k−1 → R has definition where the closed convex function fL,π : R+ ! k−1 X πi L(α, i)ti − πk L(α, k) . (15) fL,π (t) := sup HL (π) − α∈Rk i=1 As fL,π is the supremum of affine functions of its argument t, it is closed convex, and fL,π (1) = HL (π) − HL (π) = 0. That is, equation (15) shows that given any loss L or generalized entropy H, the information measure IHL (X; π), gap between prior and posterior L-risk, and fL,π -divergence between distributions P1 , . . . , Pk−1 and Pk are identical. We can also give a converse result that shows that every f -divergence can be written as the gap between prior and posterior risks for a convex loss function. We first recall the result that Df (P1:k−1 ||Pk ) is a statistical information (3) based on an generalized entropy H associated with f . Except for the closure operation, this result is known [13, Thm. 3]. For closed convex f : Rk−1 → R with f (1) = 0, let   t1 tk−1 H(t1 , . . . , tk ) = −ktk f ,..., , tk tk Proposition 6. where we implicitly use the closure of the perspective (Def. (9)). Then Df (P1 , . . . , Pk−1 ||Pk ) = H(1/k) − E[H(e π (X))], where the prior π = 1/k and the expectation is taken according to P i πi Pi . MULTICLASS CLASSIFICATION, INFORMATION, AND SURROGATE RISK 15 By combining Propositions 3 and 6 with the infimal representation (4) of HL , we immediately obtain the following corollary, which is our explicit construction of a closed convex loss from an f -divergence. Corollary 3. Let π 0 = 1/k. For any closed and convex function f : → R such that f (1) = 0, the convex losses defined by    π1 πk−1 T L(α, i) = −αi + sup π α − kπk f ,..., πk πk π∈∆k Rk−1 satisfy Eq. (15), i.e. f (t) = supα {HL (π 0 ) − Additionally, Df (P1:k−1 ||Pk ) = inf α∈Rk k X i=1 Pk−1 i=1 πi0 L(α, i)ti − πk0 L(α, k)}. πi0 L(α, i) − inf E[L(γ(X), Y )], γ where the expectation is over Y ∼ π 0 and X ∼ Py conditional on Y = y. For binary classification problems, Nguyen et al. [23, Thm. 1] provide an explicit construction of a closed convex margin-based loss inducing the f divergence as in Eq. (15); the binary case allows a complete characterization of all such convex functions, which appears difficult in the multiclass case. Corollary 3, coupled with the information representation given by the f divergence (15), shows the complete equivalence between f -divergences, loss functions L, and entropies H. For any f -divergence, there exists a loss function L and prior π = 1/k such that Df (P1:k−1 ||Pk ) = HL (π) − HL (π, P1:k ). Conversely, for any loss function L and prior π, there exists a multi-way f -divergence such that the gap HL (π) − HL (π, P1:k ) = Df (P1:k−1 ||Pk ). 3.4. Examples of generalized entropies and loss correspondences. To complement our general results, we illustrate the correspondence between (concave) generalized entropies and the loss construction (11) through several examples, using Propositions 4 and 5 to guarantee classification calibration. Example 3 (Zero-one loss, Example 1, continued). We use the generalized entropy H(π) = 1 − maxj πj generated by the zero-one loss to derive a convex loss function L that gives the same entropy via the representation (4). The conjugate to −H is  α(1) + α(2) 1 (16) (−H) (α) = 1 + max α(1) − 1, − ,..., 2 2 ∗ Pk i=1 α(i) k  1 − , k 16 DUCHI, KHOSRAVI, RUAN where α(1) ≥ α(2) ≥ · · · are the entries of α ∈ Rk in sorted order (see § A.5 for a proof). Then the convex “family-wise” loss, named for its similarity to family-wise error control in hypothesis tests,  X  l 1 1 Lfw (α, i) = 1 − αi + max α(j) − l l l∈{1,...,k} j=1 generates the same entropy HLfw and associated f -divergence as the zeroone loss. Moreover, Proposition 5 guarantees that Lfw is classification calibrated (Def. 3.1). It appears that the loss Lfw is a new convex classificationcalibrated loss function. ⋄ Rather than re-considering Example 2, which we do later in the context of showing that distinct convex losses can yield the same generalized entropy, we now consider the multiclass logistic loss. The loss does not correspond to the zero-one loss, but it generates Shannon entropy and information. Example 4 (Logistic loss and entropy). For 1 ≤ i ≤ k, define pi (α) = Pk α j j=1 e . The multi-class logistic loss is then eαi / L(α, i) = − log pi (α) = log X k j=1 eαj −αi  for 1 ≤ i ≤ k. The entropy associated with the loss is the familiar Shannon entropy,   X k k X πi log πi . πi log pi (α) = − (17) HL (π) = inf − α∈Rk i=1 i=1 The conjugacy calculation (11) (i.e. our inverse construction from H to loss L) to generate L also yields the multi-class logistic loss. That the multiclass logistic loss is calibrated for the zero-one loss [36, § 4.4] is now immediate: the negative Shannon entropy is strongly convex over the simplex ∆k (this is Pinsker’s inequality [9, Ch. 17.3]), so the fact that logistic loss and Shannon entropy are dual via Eq. (11) and Proposition 4 yield calibration. The information measure (3) associated with the logistic loss is the mutual information between the observation X and label Y . Indeed, we have Z H(Y | X = x)dP (x) IH (X; π) = H(π) − E[H(e π (X))] = H(Y ) − X = H(Y ) − H(Y | X) = I(X; Y ) P where H denotes the Shannon entropy, P = ki=1 πi Pi , and I(X; Y ) is the usual (Shannon) mutual information between X and Y . ⋄ MULTICLASS CLASSIFICATION, INFORMATION, AND SURROGATE RISK 17 We include one final example to show that in some instances, many different convex losses can yield the same generalized entropy H. Example 5 (Hinge losses). Define the pairwise multiclass hinge loss X  Lhin (α, i) = [1 + αj ]+ + I 1T α = 0 . j6=i We also consider the slight extension to weighted loss functions to address asymmetric losses of the form (10) from Example 2. In this case, given the k×k , we set loss matrix C ∈ R+ Lhin (α, i) = k X j=1 P  cij [1 + αj ]+ + I 1T α = 0 . The loss L(α, i) = j6=i cij [1 + αj − αi ]+ yields a completely identical set of calculations without the restriction 1T α = 0, as it is invariant to shifts. A calculation (see § A.6 for completeness) shows the generalized entropy (4) associated with the hinge loss with loss matrix C = [c1 · · · ck ] is ) ( k X πi Lhin (α, i) = k min π T cl . (18) HLhin (π) = inf α∈Rk l i=1 Such losses satisfy a number of classification calibration guarantees; we note one, essentially due to Zhang [36, Thm. 8]. For completeness, we include a proof in Appendix A.4. Observation 1. Let φ : R → R be any bounded belowPconvex function, differentiable on (−∞, 0], with φ′ (0) < 0. Then L(α, y) = ki=1 cyi φ(−αi ) is classification calibrated for the cost matrix C (Def. 3.1, Eq. (13)). Taking C = 11T − Ik×k , we see that the hinge loss is calibrated for the k×k , the weighted hinge loss is zero-one loss (Ex. 1); taking arbitrary C ∈ R+ calibrated for the cost matrix C. Even more, we have the following quantitative calibration guarantee in analogy with Proposition 5: k X i=1 πi L hin (α, i) − inf′ α k X i=1 πi L hin ′ (α , i) ≥ k X i=1 cw πi L (α, i) − inf′ α k X πi Lcw (α′ , i) i=1 for all π ∈ ∆k and α ∈ Rk , strengthening Observation 1. (We prove this as Lemma A.9 in § A.7.) In the binary case [23, Lem. 2], similar quantitative guarantees hold for any margin-based classification calibrated loss L for which HL = HLzo ; we do not know if this extends to the multiclass case. ⋄ 18 DUCHI, KHOSRAVI, RUAN 4. Comparison of loss functions. In Section 3, we demonstrated the correspondence between loss functions, generalized entropies, statistical information, f -divergences, and (in restricted cases) classification calibration. These correspondences assume that decision makers have access to the entire observation X, which is often not the case; as noted in the introduction, it is often beneficial to pre-process data to make it lower dimensional, communicate or store it efficiently, or to improve statistical behavior. Thus, we now explore the impact quantization has on these concepts. fw To motivate this further, consider that each of the family-wise P loss L of Ex. 3, logistic loss (Ex. 4), and any loss of the form L(α, y) = i6=y φ(−αi ) for φ convex and decreasing with φ′ (0) < 0 (Ex. 5, Observation 1) is classification calibrated. This relates to one of the major criticisms of classification calibration: if the Bayes classifier (minimizer of risk over all functions X → Rk ) does not belong to the class of functions considered, classification calibration says little. In this context, we shed light on this issue by identifying losses that are consistent (calibrated) even with the additional selection of quantizer or data representation—a restriction of the class of possible functions as in the implication (5) in the introduction. 4.1. A model of quantization and experimental design. Abstractly, we treat the design of an experiment or choice of data representation as a quantization problem, where a quantizer q maps the space X to a measurable space Z. Then, for a loss L, prior π ∈ ∆k on the label Y , and discriminant γ : Z → Rk , we consider the quantized risk (2), which we recall is RL,π (γ | q) := E [L(γ(q(X)), Y )] . Given class-conditional distributions P1:k (equivalently, hypotheses Hi : Pi in the Bayesian testing setting) and collection Q of quantizers, our criterion is to choose the quantizer q that allows the best attainable risk. That is, we consider the quantized Bayes L-risk, defined as the infimum of the risk (2) over discriminants Γ = {γ : Z → Rk }, (19) inf RL,π (γ | q) = γ∈Γ Z inf k X Z α i=1 πi L(α, i)dPiq (z) where P q (A) = P (q−1 (A)) denotes the push-forward measure. The risk (19) measures the best attainable risk for a fixed choice of q ∈ Q; one thus seeks the design q giving the lowest quantized Bayes L-risk. Whether for computational or analytic reasons, minimizing the loss (19) is often intractable; the zero-one loss Lzo (Ex. 1), for example, is non- MULTICLASS CLASSIFICATION, INFORMATION, AND SURROGATE RISK 19 convex and discontinuous. It is thus of interest to understand the asymptotic consequences of using a surrogate loss L in place of the desired loss (say Lzo ) [36, 21, 2, 31], including the setting in which one incorporates further dimension reduction via the choice q ∈ Q. Nguyen et al. [23] introduce and study this problem for binary classification, giving a correspondence between f -divergences, loss functions, and surrogate consistency with quantization. The consequences of using a surrogate for consistency of the resulting quantization and classification procedure in the multiclass case are a-priori unclear: we do not know when using such a surrogate can be done without penalty. To that end, we now characterize when two loss functions L(1) and L(2) provide equivalent criteria for choosing quantizers (experimental designs or data representations) according to the Bayes L-risk (19). 4.2. Universal Equivalence of Loss Functions. Recalling our arguments in Section 3.3 that statistical information (the gap between prior and posterior risks) is a multi-way f -divergence between distributions P1 , . . . , Pk−1 and Pk , we give a quantized version of this construction. In analogy with the results of Section 3.3, the quantized statistical information is IHL (X; π | q) := HL (π) − E[HL (e π (q(X)))] (20) k X = inf α∈Rk i=1 πi L(α, i) − inf RL,π (γ | q) = DfL,π (P1 , . . . , Pk−1 ||Pk | q) , γ P where HL (π) = inf α∈Rk ki=1 πi L(α, i) as in (4), the convex function fL,π is defined as in expression (15) and does not depend on the quantizer q, and π e(q(X)) denotes the posterior distribution on Y ∈ [k] conditional on observing q(X). We extend Nguyen et al. [23]’s notion of universal equivalence from the binary case, defining losses as equivalent if they induce the same ordering of quantizers q under the information measure (20). Definition 4.1. Loss functions L(1) and L(2) are universally equivalent u for the prior π, denoted L(1) ≡π L(2) , if for any distributions P1 , . . . , Pk on X and quantizers q1 and q2 I (X, π; HL(1) | q1 ) ≤ I (X, π; HL(1) | q2 ) if and only if I (X, π; HL(2) | q1 ) ≤ I (X, π; HL(2) | q2 ) . Definition 4.1 evidently is equivalent to the ordering condition (21) inf RL(1) ,π (γ | q1 ) ≤ inf RL(1) ,π (γ | q2 ) if and only if γ γ inf RL(2) ,π (γ | q1 ) ≤ inf RL(2) ,π (γ | q2 ), γ γ 20 DUCHI, KHOSRAVI, RUAN for all distributions P1 , . . . , Pk , on the quantized Bayes L-risk (19). This definition is somewhat stringent: losses are universally equivalent only if they induce the same quantizer ordering for all population distributions. If a quantizer q1 is finer than q2 , all losses yield I (X, π; HL | q2 ) ≤ I (X, π; HL | q1 ) by the data processing inequality (Corollary 2 of Section 2). The stronger equivalence notion is important for nonparametric classification settings in which the underlying distribution on (X, Y ) is only weakly constrained and neither of a pair of quantizers q1 , q2 ∈ Q is finer than the other. Definition 4.1 and the representation (20) suggest that the entropy function HL associated with the loss L through the infimal representation (4) and the f -divergence associated with L via the construction (15) are important for the equivalence of two loss functions. This is indeed the case. First, we have the following result on universal equivalence of loss functions based on their associated entropies. Theorem 1. Let L(1) and L(2) be bounded below losses and HL(1) and HL(2) be the associated generalized entropies as in the construction (4). Then L(1) and L(2) are universally equivalent with respect to all priors π if and only if there exist a > 0, b ∈ Rk , and c ∈ R such that for all π ∈ ∆k , HL(1) (π) = aHL(2) (π) + bT π + c. We can also characterize universal equivalence for a prior π. Theorem 2. Let π ∈ ∆k and as in Theorem 1, let L(1) and L(2) be (1) (2) bounded below loss functions, with fπ and fπ the associated f -divergences as in the construction (15). Then L(1) and L(2) are universally equivalent with respect to the prior π if and only if there exist a > 0, b ∈ Rk−1 , and c ∈ R such that (22) fπ(1) (t) = afπ(2) (t) + bT t + c k−1 . for all t ∈ R+ Nguyen et al. [23, Thm. 3] prove Theorem 2 for binary classification problems (k = 2), using convex-conjugacy arguments. We outline our proofs (which apply for arbitrary k and so require a different set of tools) in Section 5. 4.3. Consistency of empirical risk minimization. A major application of these theorems is to show that certain non-convex loss functions (such as the zero-one loss) are universally equivalent to convex loss functions, including variants of the hinge loss, by showing that their associated entropies are scalar multiples. As a first application of Theorems 1 and 2, however, we consider the Bayes consistency of empirical risk minimization for selecting a MULTICLASS CLASSIFICATION, INFORMATION, AND SURROGATE RISK 21 discriminant γ and quantizer q (in analogy with [23, Thm. 2]). In this case, we receive a sample {(X1 , Y1 ), . . . , (Xn , Yn )} and define the empirical risk n X bL,n (γ | q) := 1 L(γ(q(Xi )), Yi ). R n i=1 Now, let Q1 ⊂ Q2 ⊂ · · · ⊂ Q be a non-decreasing collection of quantizers, indexed by sample size n, and similarly let Γ1 ⊂ Γ2 ⊂ · · · ⊂ Γ be a non-decreasing collection of discriminant functions, where we assume the collections satisfy the estimation and approximation error conditions " # b E sup RL,n (γ | q) − RL (γ | q) ≤ ǫest n γ∈Γn ,q∈Qn (23) RL (γ | q) − inf RL (γ | q) ≤ ǫapp inf n , γ∈Γn ,q∈Qn γ∈Γ,q∈Q app → 0 as n → ∞. Additionally, let R be the risk funcwhere ǫest n → 0 and ǫn tional for the cost-weighted misclassification loss Lcw (Example 2), where Lcw (α, y) = maxi {cyi | αi = maxj αj }. Then we have the following result. Theorem 3. Assume the conditions (23) and that γn and qn are approximate empirical L-risk minimizers satisfying i h bL,n (γ | q) → 0 as n → ∞. bL,n (γn | qn ) − R ǫopt := E R inf n γ∈Γn ,q∈Qn Let R⋆ (Q) = inf γ∈Γ,q∈Q R(γ | q). If the loss L is classification calibrated and universally equivalent to the cost-weighted loss Lcw , then L R(γn | qn ) − R⋆ (Q) →1 0. Theorem 3 guarantees that under the estimation and approximation conditions (23), empirical risk minimization is consistent for minimizing the quantized Bayes risk whenever the loss L is classification calibrated and equivalent to the desired loss. The proof of Theorem 3 reposes on the following risk inequality, which may be of independent interest. The lemma is a consequence of the results on surrogate risk consistency for classification calibration [36, 31, 30] and our universal equivalence guarantees that exhibits the power of calibration and universal equivalence. Lemma 4.1. Assume L is classification-calibrated and universally equivk×k . alent to the weighted misclassification loss Lcw with cost matrix C ∈ R+ 22 DUCHI, KHOSRAVI, RUAN Then there exists a continuous concave function h with h(0) = 0 such that   ⋆ R(γ | q) − inf R(γ | q) ≤ h RL (γ | q) − inf RL (q) . γ∈Γ,q∈Q q∈Q Pk  T With the choice L(α, y) = i=1 cyi [1 + αi ]+ + I 1 α = 0 or L(α, y) = Pk 1 i=1 cyi [1 + αi − αy ]+ , we may take h(ǫ) = (1 + k )ǫ, that is,    1 R(γ | q) − inf R(γ | q) ≤ 1 + RL (γ | q) − inf RL (γ | q) . γ∈Γ,q∈Q γ∈Γ,q∈Q k Lemma 4.1 shows that the gap in surrogate risk provides a guaranteed upper bound on the true cost-weighted risk; in the case of the modified hinge losses of Example 5, this gap is linear. In the binary case, even stronger results are possible [23, Lemma 2]—one may take h(ǫ) = aǫ (for some a < ∞) in Lemma 4.1 for any margin-based classification-calibrated loss universally equivalent to the 0-1 loss—this relies on the specific form any such binary convex loss must take [23, Eq. (9)]; our Examples 3 (the familywise loss) and 5 show that fairly different-looking losses can be classification calibrated and universally equivalent to zero-one loss. We provide the proof of Lemma 4.1 in § C.1. Theorem 3, which we prove in § C.2, is then a consequence of this lemma and Theorem 1. 4.4. Examples of universal equivalence. In this section, we give several examples that build off of Theorems 1 and 2, showing that there exist convex losses that allow optimal joint design of quantizers (or measurement strategies) and discriminant functions, opening the way for potentially efficient convex optimization strategies. To that end, we give two hinge-like loss functions that are universally equivalent to the zero-one loss for all prior distributions π. We also give examples of classification calibrated loss functions that are not universally equivalent to the zero-one loss, although minimizing them without quantization yields Bayes-optimal classifiers. Example 6 (Cost-weighted losses). We  Treturn to Example 5, where we P hin have L (α, i) = j6=i cij [1 + αj ]+ + I 1 α = 0 . In this case, we have HLhin (π) = k minl π T cl = kHLcw (π), where Lcw denotes the cost-weighted misclassification error as in Example 2. Theorem 1 immediately guarantees that the (weighted) hinge loss is universally equivalent to the (weighted) 0-1 loss. The weighted hinge loss Lhin is also, as in Example 5, calibrated for the cost-weighted misclassification error. ⋄ Example 7 (Max-type losses and zero-one loss). We return to ExamT α +α ple 3 and let Lfw (α, i) = 1−αi +max{α(1) −1, (1) 2 (2) − 21 , . . . , 1 k α − k1 }, the MULTICLASS CLASSIFICATION, INFORMATION, AND SURROGATE RISK 23 convex family-wise loss. By Example 3, the associated entropy is HLfw (π) = 1 − maxj πj = HLzo for π ∈ ∆k , and Proposition 5 shows that Lfw is classification calibrated. We thus have that Lfw and the zero-one loss Lzo are universally equivalent by Theorems 1 and 2. ⋄ For our final example, we consider the logistic loss, which is classification calibrated but not universally equivalent to the zero-one loss. P Example 8 (Logistic loss). The loss Llog (α, i) = log( kj=1 eαj −αi ) has P (Shannon) entropy H(π) = − ki=1 πi log πi , as in Ex. 4. There are no a, b, c such that HLzo (π) = 1 − maxj πj = aHLlog (π) + bT π + c for all π ∈ ∆k . Theorem 1 shows that the logistic loss is not universally equivalent to the zero-one loss. That is, in spite of its classification calibration, there are distributions P1 , . . . , Pk , a collection Q of quantizers X → Z, and a sequence γn : Z → Rk such that RLlog (γn | qn ) → inf γ,q∈Q RLlog (γ | q), but RLzo (γn | qn ) 6→ inf γ,q∈Q RLzo (γ | q). ⋄ 5. Proof of the Theorems 1 and 2. The remainder of the main body of the paper consists of the major parts of our arguments for Theorems 1 and 2. We divide the proof of the theorems into two parts. The “if” part is straightforward; the “only if” is substantially more complex. Proof (if direction). We give the proof for Theorem 2; that for Theorem 1 is (1) (2) identical. Assume that dom fπ = dom fπ and there exist a > 0, b ∈ Rk−1 , and c ∈ R such that Eq. (22) holds. By Definition 2.1 of multi-way f divergences, for any quantizer q, we have Df (1) (P1 , . . . , Pk−1 ||Pk | q) = aDf (2) (P1 , . . . , Pk−1 ||Pk | q) + bT 1 + c, π as R X π dPi = 1. Applying the relationship (20), we obtain I (X, π; HL(1) | q) = aI (X, π; HL(2) | q) + bT 1 + c. As a > 0, the universal equivalence of L(1) and L(2) follows immediately. We turn to the “only if” part of the proofs of Theorems 1 and 2. A roadmap is as follows: we first define what we call order equivalence of convex functions, which is related to the equivalence of f -divergences and generalized entropies (Def. 5.1). Then, for any two loss functions L(1) and L(2) that are universally equivalent, we show that the associated entropies HL(1) and HL(2) , as constructed in the infimal representation (4), and the functions f (1) and f (2) generating the f -divergences via expression (15), are 24 DUCHI, KHOSRAVI, RUAN order equivalent (Lemmas 5.1 and 5.2). After this, we provide a characterization of order equivalent closed convex functions (Lemma 5.3), which is the linchpin of our analysis. The lemma shows that for any two order equivalent closed convex functions f1 and f2 with dom f1 = dom f2 , there are parameters a > 0, b ∈ Rk , and c ∈ R such that f (1) (t) = af (2) (t) + bT t + c for all t ∈ dom f1 = dom f2 . This proves the “only if” part of the Theorems 1 and 2, yielding the desired result. We present the main parts of the proof in the body of the paper, deferring technical nuances to the supplement. 5.1. Universal equivalence and order equivalence. By Definition 4.1 (and its equivalent variant stated (21)), universally equivalent losses L(1) and L(2) induce the same ordering of quantized information measures and f divergences. The next definition captures this ordering slightly differently. Definition 5.1. Let f1 : Ω → R and f2 : Ω → R be closed convex functions, where Ω ⊂ Rk is closed convex. Let m ∈ N be arbitrary and the matrices A, B ∈ Rk×m satisfy A1 = B1, where A has columns ai ∈ Ω and B has columns bi ∈ Ω. Then f1 and f2 are order-equivalent if for all m ∈ N and all such matrices A and B we have (24) m X j=1 f1 (aj ) ≤ m X j=1 f1 (bj ) if and only if m X j=1 f2 (aj ) ≤ m X f2 (bj ). j=1 As the above context suggests, order equivalence has strong connections with universal equivalence of loss functions L and associated f -divergences and generalized entropies. The next two lemmas make this explicit. Lemma 5.1. If losses L(1) and L(2) are lower bounded and universally equivalent, then the associated entropies of the construction (4) are order equivalent over ∆k ⊂ Rk+ . Proof. Let Hi be the entropy (pointwise Bayes risk) associated with L(i) , noting that dom H1 = dom H2 = ∆k because inf π∈∆k Hi (π) > −∞. k×m k×m satisfy ai , bi ∈ ∆k and B ∈ R+ Let the matrices A = [a1 · · · am ] ∈ R+ 1 1 A1 = B1 ∈ ∆ for each i = 1, . . . , m, and let v = k . We m Pm Pm Pm Pmshow that m H (a ) ≤ H (b ) if and only if H (a ) ≤ j=1 1 j j=1 1 j j=1 2 j j=1 H2 (bj ), that is, expression (24) holds, by constructing appropriate distributions P1:k and π, then applying the universal equivalence of L(1) and L(2) . Let M0 be any integer large enough that v0 = k1 (1 + M10 )1 − M10 v ∈ Rk+ , MULTICLASS CLASSIFICATION, INFORMATION, AND SURROGATE RISK 25 so that v0 ∈ ∆k . Then define the vectors e a 1 = v0 , . . . , e amM0 = v0 , and let k×M and Aext = [a1 · · · am e a1 · · · e amM0 ] ∈ R+ k×M , B ext = [b1 · · · bm e a1 · · · e amM0 ] ∈ R+ ext and where M = (M0 + 1)m. These satisfy Aext 1 = B ext 1 = M k 1. We let a bext denote the columns of these extended matrices. Now, let the spaces X = [M ] × [M ] and Z = [M ]. Define quantizers q1 , q2 : X → Z by q1 (i, j) = i and q2 (i, j) = j. For l = 1, . . . , k, define the distributions Pl on X by M M X k ext k X ext k ext k2 ext ext Pl (i, j) = bjl = ail a Pl (i, j) = 2 · ail bjl , so M M M M il j=1 j=1 P k ext and similarly i Pl (i, j) = M bjl . Let π = k1 1 be the uniform prior distribution on the label Y ∈ {1, . . . , k}, and note that the posterior probability #k " P  k πl j Pl (i, j) aext −1 il P = P ext = aext ∈ ∆k , π e(q1 ({i})) = P i ′ π P (i, j) a ′ ′ ′ j l l l l il l=1 l=1 P and similarly π e(q−1 because = 2 ({j})) = j Pl (i, j) = Pk ext bj ∈ ∆k . Taking the expectation over X ∼ l=1 πl Pl , we have Pl (q−1 1 (i)) E[HL (e π (q−1 1 (q1 (X))))] = k ext M ail , M 1 X 1X −1 Pl (q−1 (i))H (e π (q (i))) = HL (aext L i ), 1 1 k M i=1 i,l P 1 PM ext π (q−1 because l aext 2 (q2 (X))))] = M j=1 Hπ (bj ). il = 1. Similarly, E[HL (e Recalling the definitions (3) and (20) of the (quantized) information as1 PM sociated with H, we have I (X, π; H | q1 ) = H(π) − M i=1 H(aext i ) and 1 PM ext I (X, π; H | q2 ) = H(π) − M i=1 H(bi ). Then the universal equivalence of losses L(1) and L(2) immediately implies for π = k1 1 that M M 1 X 1 X ext H1 (ai ) ≤ H1 (π) − H1 (bext H1 (π) − i ) iff M M H2 (π) − 1 M i=1 M X i=1 H2 (aext i ) ≤ H2 (π) − 1 M i=1 M X H2 (bext i ). i=1 Noting that aext = bext for each i P ≥ m + 1, we rearrange the preceding i i 1 equivalent statements by adding M i≥m+1 H(aext i ) to each side to obtain that the Hi satisfy inequality (24). 26 DUCHI, KHOSRAVI, RUAN For f -divergences, a parallel result is possible; as the techniques are similar to those we use to prove Lemma 5.1 (by constructing an explicit discrete space X and quantizers q), we defer the proof to Supplementary § B.1. Lemma 5.2. If losses L(1) and L(2) are universally equivalent for the prior π (Def. 4.1) and lower-bounded, the corresponding f -divergences fL(1) ,π and fL(2) ,π of construction (15) are order equivalent. 5.2. Characterization of the order equivalence of convex functions. Lemmas 5.1 and 5.2 illustrate the intrinsic relationship between the universal equivalence (Def. 4.1) of losses and the order equivalence (Def. 5.1) of their associated generalized entropies and f -divergences. Therefore, it is natural to ask when convex functions are order equivalent. The lemma below characterizes this order equivalence, and coupled with Lemmas 5.1 and 5.2, it immediately implies Theorems 1 and 2. Lemma 5.3. Let f1 , f2 : Ω → R be closed convex functions, where Ω ⊂ Rk is a convex set. Then f1 and f2 are order equivalent on Ω if and only if there exist a > 0, b ∈ Rk , and c ∈ R such that for all t ∈ Ω f1 (t) = af2 (t) + bT t + c. (25) While the proof of Lemma 5.3 is complex, we provide a partial proof highlighting the most important parts of the argument, deferring technical details to the supplement. The essential idea is that Lemma 5.3 holds for simplices (and so it certainly holds for HL ); we can then cover any convex set Ω with a number of overlapping simplices to extend the result to all of Ω, which we do fully in Supplement B.2. To demonstrate Lemma 5.3 for simplices, we require Definition 5.2. Vectors u0 , u1 , . . . um are affinely independent if u1 − u0 , u2 − u0 , . . . , um − u0 , are linearly independent. A set E ⊂ Rk is a simplex if E = Conv{u0 , u1 , . . . , uk } where u0 , . . . , uk are affinely independent. Then the essential special case of Lemma 5.3 is the following result. Lemma 5.4. Let E = Conv{u0 , . . . , uk } ⊂ Ω where u0 , . . . , uk are affinely independent. If f1 and f2 are order equivalent, then there exist a > 0, b ∈ Rk , and c ∈ R such that f1 (t) = af2 (t) + bT t + c for all t ∈ E. MULTICLASS CLASSIFICATION, INFORMATION, AND SURROGATE RISK 27 The proof of Lemma 5.4 proceeds in a series of intermediate results, which we provide in turn, deferring proofs to Supplement B.3. Our first step is to argue that we need only prove equivalence results for convex functions on dense subsets of their domains. Lemma 5.5 ([17], Prop. IV.1.2.5). Let f1 , f2 : Ω → R be closed convex and satisfy f1 (t) = f2 (t) for t in a dense subset of Ω. Then f1 = f2 on Ω. The first technical lemma we prove is essentially a direct consequence of the definition of order equivalence. LemmaP5.6. Let u1 , . . . , um ∈ Ω, α ∈ Qm satisfy 1T α = 1, and v ∈ Ω with v = m i=1 αi ui . If f1 , f2 : Ω → R are order equivalent, then m X i=1 αi f1 (ui ) ≤ f1 (v) if and only if m X i=1 αi f2 (ui ) ≤ f2 (v). Thus if α ∈ Qn satisfies 1T α = 1 and u1 , . . . , un ∈ Ω, then ! ! n n n n X X X X αi f2 (ui ). αi ui = αi f1 (ui ) iff f2 αi ui = (26) f1 i=1 i=1 i=1 i=1 The next lemma shows that we can force equality (25) to hold for the k+1 extreme points and centroid of any simplex in Rk ; it is intuitive because there are k + 2 free parameters in the choices of a > 0, b ∈ Rk , and c ∈ R. Lemma 5.7. Let f1 , f2 : Ω → R be closed convex and let u0 , . . . , uk ∈ Ω be affinely independent. There exist a > 0, b ∈ Rk , and c such P that f1 (u) = k 1 af2 (u) + bT u + c for u ∈ {u0 , . . . , uk , ucent }, where ucent = k+1 i=0 ui . Lastly, we have the following characterization of the linearity of convex functions over convex hulls. 1 m Lemma 5.8. Let f : Ω → R be convex with u1 , . . . , um ∈ Ω and ucent = P m 1 Pm u . If f (u ) = i cent i=1 i=1 f (ui ), then m ! m m X X T λi f (ui ) for all λ ∈ Rm λi ui = f + with 1 λ = 1. i=1 i=1 With the four lemmas 5.5–5.8, we can now prove Lemma 5.4. By rotating with ui − u0 and shifting by u0 , it is no loss of generality to assume that the 28 DUCHI, KHOSRAVI, RUAN functions fi are defined on V = {v ∈ Rk+ | 1T v ≤ 1}, so that f1 and f2 are continuous, defined, convex, and order equivalent on V . We make one further reduction. Let ei ∈ Rk for 1 ≤ i ≤ k be the standard basis for Rk P and e0 = 0 1 be shorthand for the all-zeros vector. Further, let ecenter = k+1 ki=0 ei be the centroid of V (so V = Conv{e0 , . . . , ek }). Lemma 5.7 guarantees the existence of a > 0, b ∈ Rk , and c ∈ R such that f1 (v) = af2 (v) + bT v + c for v ∈ {e0 , e1 , . . . , ek , ecenter }. Now, let h1 (v) = f1 (v) and h2 (v) = af2 (v)+bT v+c, so h1 and h2 are convex, order equivalent on V , and satisfy h1 (v) = h2 (v) for v ∈ {e0 , . . . , ek , ecenter }. Thus, Lemma 5.4 is equivalent to showing that if h1 , h2 are convex, order equivalent, and equal on the extreme points and centroid of V , then (27) h1 (v) = h2 (v) for v ∈ V = {v ∈ Rk+ | 1T v ≤ 1}. We divide our discussion into two cases. 1 Pk Linear case. Suppose that h1 (ecenter ) = k+1 i=0 h1 (ei ). Then by order 1 Pk equivalence of h1 and h2 (Eq. (26)) we have h2 (ecenter ) = k+1 i=0 h2 (ei ). Lemma 5.8 thus implies that h1 and h2 are linear on V = Conv{e0 , . . . , ek }, equal on the vertices of V , and hence equal on its interior. 1 Pk Nonlinear case. By convexity we have h1 (ecenter ) < k+1 i=0 h1 (ei ), and 1 Pk order equivalence (Lemma 5.6) implies h2 (ecenter ) < k+1 i=0 h2 (ei ). For T v ∈ V = Conv{e 0 , . . . , ek }, we use v0 = 1 − 1 v for shorthand, so we may Pk T write v = i=0 vi ei and have [v0 v1 · · · vk ] ∈ ∆k+1 . Now, fix an arbitrary v ∈ V ∩ Qk . We wish to show that h1 (v) = h2 (v). To that end we consider consider the gaps due convexity of hj (ecenter ) to the values of hj (ei ) relative to those from hj (v) to hj (ei ), defining the linear functions ϕj : [0, 1] → R by " # # " k k X 1 X ϕj (r) := (1 − r) hj (ecenter ) − vi hj (ei ) − hj (v) hj (ei ) + r k+1 i=0 i=0 for j = 1, 2. Then k 1 X hj (ei ) < 0 ϕj (0) = hj (ecenter ) − k+1 i=0 by assumption, and by convexity, ϕj (1) = k X i=0 vi hj (ei ) − hj (v) ≥ 0. MULTICLASS CLASSIFICATION, INFORMATION, AND SURROGATE RISK 29 The key is that the order equivalence of h1 and h2 on V implies that (28) sign(ϕ1 (r)) = sign(ϕ2 (r)) for r ∈ [0, 1], so that ϕ1 and ϕ2 have the same zero crossing r ⋆ > 0, i.e. there exists 0 < r ⋆ ≤ 1 with ϕ1 (r ⋆ ) = ϕ2 (r ⋆ ) = 0. (We prove equality (28) presently.) At this r ⋆ > 0, we find 0 = ϕ1 (r ⋆ ) − ϕ2 (r ⋆ ) = −r ⋆ h1 (v) + r ⋆ h2 (v), where we use that h1 (ei ) = h2 (ei ) for i = 0, . . . , k and h1 (ecenter ) = h2 (ecenter ). That is, h1 (v) = h2 (v), and as v ∈ V ∩ Qk is arbitrary and Qk is dense, Lemma 5.5 extends the equality h1 = h2 to all of V . Expression (27) holds. Returning to the sign equivalence (28), for r > 0, we may divide ϕj (r) by r, and we have ϕj (r) ≤ 0 if and only if " # k k X 1 X 1−r vi hj (ei ) ≤ hj (v). hj (ecenter ) − hj (ei ) + r k+1 i=0 i=0 1−r r(k+1) ∈ Q for i = 0, . . . , k and αk+1 = 1−r r , the inequalPk ity ϕj (r) ≤ 0 is equivalent to i=0 αi hj (ei ) + αk+1 hj (ecenter ) ≤ hj (v). A P calculation yields 1T α = 1 and ki=0 αi ei + αk+1 ecenter = v, and applying Lemma 5.6 immediately yields that ϕ1 (r) ≤ 0 if and only if ϕ2 (r) ≤ 0 for all r ∈ (0, 1] ∩ Q. Noting that ϕ1 (0) < 0 and ϕ2 (0) < 0, we obtain equality (28). Defining αi = vi − 6. Discussion. Rather than recapitulating our contributions, we point out a few directions we believe will prove interesting for further study. While Corollary 1 shows that some convex losses are surrogate-risk consistent even with restricted families of classifiers, it does not apply to the practical case in which the collection of discriminants γ is a (convex subset of a) finitedimensional vector space. This longstanding problem certainly deserves further work. Another direction, a bit further afield, is to investigate the links between this work and objective Bayesian approaches and reference priors [5, 4]. In this line of work, one has a family {Pθ }θ∈Θ of probability models on an observation space X and before performing inference chooses a prior π on θ to maximize Iπ (X; θ), the (Shannon) information between X ∼ Pθ and θ ∼ π. For tasks other than minimizing log loss, it may be sensible to use a notion of information and entropy corresponding to the desired loss. Our notions of loss equivalence, including construction of convex losses equivalent to non-convex losses, could provide insight in such situations. 30 DUCHI, KHOSRAVI, RUAN References. [1] S. M. Ali and S. D. Silvey. A general class of coefficients of divergence of one distribution from another. Journal of the Royal Statistical Society, Series B, 28:131–142, 1966. [2] P. L. Bartlett, M. I. Jordan, and J. McAuliffe. Convexity, classification, and risk bounds. Journal of the American Statistical Association, 101:138–156, 2006. [3] Y. Benjamini and Y. Hochberg. Controlling the false discovery rate: a practical and powerful approach to multiple testing. Journal of the Royal Statistical Society, Series B, 57(1):289–300, 1995. [4] J. O. Berger. The case for objective Bayesian analysis. Bayesian Analysis, 1(3): 385–402, 2006. [5] J. M. Bernardo. Reference analysis. In D. Day and C. R. Rao, editors, Bayesian Thinking, Modeling and Computation, volume 25 of Handbook of Statistics, chapter 2, pages 17–90. Elsevier, 2005. [6] D. Bertsekas. Nonlinear Programming. Athena Scientific, 1999. [7] P. Billingsley. Probability and Measure. Wiley, Second edition, 1986. [8] D. Blackwell. Comparison of experiments. In Proceedings of the 2nd Berkeley Symposium on Probability and Statistics, pages 93–102. University of California Press, 1951. [9] T. M. Cover and J. A. Thomas. Elements of Information Theory, Second Edition. Wiley, 2006. [10] I. Csiszár. Information-type measures of difference of probability distributions and indirect observation. Studia Scientifica Mathematica Hungary, 2:299–318, 1967. [11] M. H. DeGroot. Uncertainty, information, and sequential experiments. Annals of Mathematical Statistics, 33(2):404–419, 1962. [12] J. C. Duchi, L. Mackey, and M. I. Jordan. The asymptotics of ranking algorithms. Annals of Statistics, 41(5):2292–2323, 2013. [13] D. Garcı́a-Garcı́a and R. C. Williamson. Divergences and risks for multiclass experiments. In Proceedings of the Twenty Fifth Annual Conference on Computational Learning Theory, 2012. [14] T. Gneiting and A. Raftery. Strictly proper scoring rules, prediction, and estimation. Journal of the American Statistical Association, 102(477):359–378, 2007. [15] P. Grünwald and A. P. Dawid. Game theory, maximum entropy, minimum discrepancy, and robust Bayesian decision theory. Annals of Statistics, 32(4):1367–1433, 2004. [16] L. Györfi and T. Nemetz. f -dissimilarity: A generalization of the affinity of several distributions. Annals of the Institute of Statistical Mathematics, 30:105–113, 1978. [17] J. Hiriart-Urruty and C. Lemaréchal. Convex Analysis and Minimization Algorithms I & II. Springer, New York, 1993. [18] T. Kailath. The divergence and Bhattacharyya distance measures in signal selection. IEEE Transactions on Communication Technology, 15(1):52–60, 1967. [19] F. Liese and I. Vajda. On divergences and informations in statistics and information theory. IEEE Transactions on Information Theory, 52(10):4394–4412, 2006. [20] M. Longo, T. D. Lookabaugh, and R. M. Gray. Quantization for decentralized hypothesis testing under communication constraints. IEEE Transactions on Information Theory, 36(2):241–255, 1990. [21] G. Lugosi and N. Vayatis. On the Bayes-risk consistency of regularized boosting methods. Annals of Statistics, 32(1):30–55, 2004. [22] A. W. Marshall, I. Olkin, and B. C. Arnold. Inequalities: Theory of Majorization and MULTICLASS CLASSIFICATION, INFORMATION, AND SURROGATE RISK 31 Its Applications. Springer, second edition, 2011. [23] X. Nguyen, M. J. Wainwright, and M. I. Jordan. On surrogate loss functions and f -divergences. Annals of Statistics, 37(2):876–904, 2009. [24] F. Österreicher and I. Vajda. Statistical information and discrimination. IEEE Transactions on Information Theory, 39(3):1036–1039, 1993. [25] H. V. Poor and J. B. Thomas. Applications of ali-silvey distance measures in the design of generalized quantizers for binary decision systems. IEEE Transactions on Communications, 25(9):893–900, 1977. [26] F. Pukelsheim. Optimal Design of Experiments. Classics in Applied Mathematics. SIAM, 1993. [27] M. Reid and R. Williamson. Information, divergence, and risk for binary experiments. Journal of Machine Learning Research, 12:731–817, 2011. [28] H. Robbins. Some aspects of the sequential design of experiments. Bulletin American Mathematical Society, 55:527–535, 1952. [29] R. E. Schapire and Y. Freund. Boosting: Foundations and Algorithms. MIT Press, 2012. [30] I. Steinwart. How to compare different loss functions. Constructive Approximation, 26:225–287, 2007. [31] A. Tewari and P. L. Bartlett. On the consistency of multiclass classification methods. Journal of Machine Learning Research, 8:1007–1025, 2007. [32] N. Tishby, F. Pereira, and W. Bialek. The information bottleneck method. In The 37’th Allerton Conference on Communication, Control, and Computing, 1999. [33] J. N. Tsitsiklis. Decentralized detection. In Advances in Signal Processing, Vol. 2, pages 297–344. JAI Press, 1993. [34] I. Vajda. On the f -divergence and singularity of probability measures. Periodica Mathematica Hungarica, 2(1–4):223–234, 1972. [35] R. C. Williamson, E. Vernet, and M. D. Reid. Composite multiclass losses. Journal of Machine Learning Research, to appear, 2016. [36] T. Zhang. Statistical analysis of some multi-category large margin classification methods. Journal of Machine Learning Research, 5:1225–1251, 2004. 32 DUCHI, KHOSRAVI, RUAN APPENDIX A: PROOFS OF CLASSIFICATION CALIBRATION RESULTS In this section, we prove Propositions 4 and 5. Before proving the propositions proper, we state several technical lemmas and enumerate continuity properties of Fenchel conjugates that will prove useful. We also collect a few important definitions related to convexity and norms here, which we use without comment in this appendix. For a norm k·k on Rk , we recall the definition of the dual norm k·k∗ as kyk∗ = supkuk≤1 uT y. For a convex function f : Rk → R, we let ∂f (u) = {g ∈ Rk | f (v) ≥ f (u) + g T (v − u) for all v ∈ Rk } denote the subgradient set of f at the point u. This set is non-empty if u ∈ rel int dom f (see [17, Chapter VI]). A.1. Technical preliminaries. We provide some background on convex functions. We recall Definition 3.2 of uniform convexity, that f is (λ, κ, k·k)uniformly convex over C ⊂ Rk if it is closed and for all t ∈ [0, 1] and u0 , u1 ∈ C we have (29) f (tu0 + (1 − t)u1 ) ≤ tf (u0 ) + (1 − t)f (u1 ) −   λ t(1 − t) ku0 − u1 kκ (1 − t)κ−1 + tκ−1 . 2 We state a related definition of smoothness. Definition A.1. A function f is (L, β, k·k)-smooth if it has β-Hölder continuous gradient with respect to the norm k·k, meaning that k∇f (u0 ) − ∇f (u1 )k∗ ≤ L ku0 − u1 kβ for u0 , u1 ∈ dom f. Our first technical lemma is an equivalence result for uniform convexity. Lemma A.1. Let f : Ω → R, where f is closed convex and Ω is a closed convex set. Then f is (λ, κ, k·k)-uniformly convex over Ω if and only if for u0 ∈ rel int Ω and all u1 , (30) f (u1 ) ≥ f (u0 ) + sT0 (u1 − u0 ) + λ ku0 − u1 kκ for s0 ∈ ∂f (u0 ). 2 If inequality (29) holds, then inequality (30) also holds for any points u0 ∈ Ω and s0 such that ∂f (u0 ) 6= ∅ and s0 ∈ ∂f (u0 ). MULTICLASS CLASSIFICATION, INFORMATION, AND SURROGATE RISK 33 See Section A.8.1 for a proof of this lemma. There is also a natural duality between uniform convexity and smoothness of a function’s Fenchel conjugate f ∗ (v) = supu {v T u − f (u)}; such dualities are common [17, Ch. X.4]. Lemma A.2. Let Ω ⊂ Rk be a closed convex set and f : Ω → R be 1 1 , k·k∗ )-smooth (λ, κ, k·k)-uniformly convex over Ω. Then f ∗ is (λ− κ−1 , κ−1 ∗ k (Def. A.1) over dom f = R . See Section A.8.2 for a proof of Lemma A.2. We also have two results on the properties of smooth functions, whose proofs we provide in Sections A.8.3 and A.8.4, respectively. Lemma A.3. Let f be (L, β, k·k) smooth. Then f (u1 ) ≤ f (u0 ) + ∇f (u0 )T (u1 − u0 ) + L ku0 − u1 kβ+1 . β+1 Lemma A.4. Let f be (L, β, k·k) smooth over Rk and inf x f (x) > −∞. If the sequence un satisfies limn f (un ) = inf x f (x), then ∇f (un ) → 0. A.2. Proof of Proposition 4. We state two intermediate lemmas before proving Proposition 4. Lemma A.5. If H is symmetric, closed and strictly concave, then (−H)∗ is continuously differentiable on Rk . If αi ≥ αj , then p = ∇(−H)∗ (α) satisfies pi ≥ pj . Proof. As H is strictly concave and (−H)∗ (α) = supπ∈∆k {π T α+H(π)} < ∞ for all α (suprema of closed concave functions over compact sets are attained), so (−H)∗ is continuously differentiable by standard results in convex analysis [17, Thm X.4.1.1], and ∇(−H)∗ (α) = argmaxp∈∆k {pT α + H(p)}. Now let α satisfy αi ≥ αj . As ∇(−H)∗ (α) = argmaxp∈∆k {pT α + H(p)}, let us assume for the sake of contradiction that pi < pj . Then letting A be the permutation matrix swapping entries i and j, the vector p′ = Ap satisfies H(p′ ) = H(p) but H( 12 (p′ + p)) > 21 H(p′ ) + 21 H(p) = H(p) = H(p′ ), and αT p − αT p′ = αi pi − αi pj + αj pj − αj pi = (αi − αj )(pi − pj ) ≤ 0. Thus we have −αT p ≥ −αT p′ , and so     1 1 1 ′ 1 ′ 1 T ′ T α (p + p ) + H p + p ≥ −α p + H p + p > αT p + H(p), 2 2 2 2 2 a contradiction to the assumed optimality of p. We must have pi ≥ pj whenever αi ≥ αj . 34 DUCHI, KHOSRAVI, RUAN P P Lemma A.6. If H is symmetric and ki=1 πi L(α⋆ , i) = inf α ki=1 πi L(α, i), then πi > πj implies that α⋆i ≥ α⋆j . If H is strictly concave, then α⋆i > α⋆j . Proof. Let π satisfy πi > πj as assumed in the lemma, and suppose that α⋆i < α⋆j for the sake of contradiction. Let A be the permutation matrix that swaps α⋆i and α⋆j . Then (−H)∗ (Aα⋆ ) = (−H)∗ (α⋆ ), and (−H)∗ is also symmetric, and k X i=1 πi L(Aα⋆ , i) − k X i=1 πi L(α⋆ , i) = −π T Aα⋆ + π T α⋆ = (πi − πj )(α⋆i − α⋆j ) < 0, a contradiction to the optimalityPof α⋆ . If H is strictly concave, Lemma A.5 implies that for α⋆ minimizing ki=1 πi L(α, i), we have π = ∇(−H)∗ (α⋆ ). Moreover, by Lemma A.5, if πi > πj we must have α⋆i > α⋆j . P Proof (of Proposition 4). If the infimum in ki=1 πi L(α, i) is attained, P then Lemma A.6 gives the result. Otherwise, recall that H(π) = inf α { ki=1 πi L(α, i)} > −∞, and let πi > πj . Let α(m) be any sequence P such that ki=1 πi L(α(m) , i) → H(π). Using that H is uniformly concave, we have ∇(−H)∗ is Hölder continuous over Rk (recall Lemma A.2). This implies that that π − ∇(−H)∗ (α(m) ) → 0 as m → ∞ (recall Lemma A.4), or lim ∇(−H)∗ (α(m) ) = π. m→∞ (m) Now, by Lemma A.5, for any p(m) = ∇(−H)∗ (α(m) ), we have that αi ≥ (m) (m) (m) αj implies pi ≥ pj . Thus, if πi > πj , it must be the case that eventually (m) we have αi have (m) > αj (m) . Moreover, if lim inf |αi (m) (m) lim inf |pi − pj | = 0, which (m) (m) pi − pj → πi − πj . We thus (m) − αj | = 0, then we must would contradict that πi > πj , as we (m) (m) have find that lim inf m (αi − αj the sequence tends to the infimum H(π), which implies that ) ( k X πi L(α, i) : αi ≤ αj > H(π). inf α ) > 0 if i=1 The loss (11) is thus classification calibrated (Def. 3.1). A.3. Proof of Proposition 5. Without loss of generality, we assume that πk < maxj πj , so that restricting to αk ≥ maxj αj forces α to have larger MULTICLASS CLASSIFICATION, INFORMATION, AND SURROGATE RISK 35 zero-one risk than 1 − maxj πj . We present two lemmas based on convex duality that imply the result. In each, we let v\i = [v1 · · · vi−1 vi+1 · · · vk ]T ∈ Rk−1 be the vector v ∈ Rk without its ith element. Let v ∈ Rk . Then ( 0 inf vT α = αk ≥maxj αj −∞ Lemma A.7. Pk−1 if vk = − i=1 vi , v\k  0 otherwise. k−1 for the constraints Proof. By introducing Lagrange multipliers β ∈ R+ αk ≥ αj for j 6= k, we have Lagrangian (   T 0 if vk = β T 1, v\k = −β β L(α, β) = v + α, so inf L(α, β) = T α −β 1 −∞ otherwise. Substuting β = −v\k and noting that β  0 gives the result. Thus, if we define the matrix C = 11T − Ik×k with columns cl , we find by strong duality that  T −π α + (−HLzo )∗ (α) inf αk ≥maxj αj ( )  −π T α + sup inf pT α + q T C T p = inf αk ≥maxj αj = sup p∈∆k q∈∆k inf p∈∆k αk ≥maxj αj   T T min cl p + (p − π) α l   = sup 1 − max pl | π\k  p\k , pk = πk + 1T (π\k − p\k ) , p∈∆k l by Lemma A.7. The next lemma then immediately implies Proposition 5 once we note that HLzo (π) = 1 − maxj πj . Lemma A.8. Let Gk (π) = inf αk ≥maxj αj {−π T α + (−HLzo )∗ (α)}. Then Gk (π) − (1 − max πj ) ≥ j 1 (max πj − πk ). k j Proof. We essentially construct the optimal p ∈ ∆k vector for the supremum in the definition of Gk . Without loss of generality, we assume that π1 = maxj πj > πk , as the result is trivial if πk = maxj πk . For t ∈ R, define L(t) = πk + k X j=1 [πj − t]+ and R(t) = t. 36 DUCHI, KHOSRAVI, RUAN By definining tlow = πk and thigh = π1 we have L(tlow ) = πk + k X j=1 [πj − πk ]+ ≥ πk + [π1 − πk ]+ = π1 > πk = R(tlow ), L(thigh ) = πk < π1 = R(thigh ), and the fact that L is strictly decreasing in [tlow , thigh ] and R is strictly increasing implies that there exists a unique root t⋆ ∈ (tlow , thigh ) such that L(t⋆ ) = t⋆ = R(t⋆ ). Now, we define the vector p by pj = min{t⋆ , πj } for j ≤ k − 1, pk = t⋆ . Pk−1 ⋆ Pk−1 Then we have 1T p = t⋆ + j=1 t ∧ πj = πk + j=1 ([πj − t⋆ ]+ + t⋆ ∧ πj ) = 1, and moreover, we have Gk (π) ≥ 1 − maxl pl = 1 − t⋆ . It remains to show that 1 − t⋆ − (1 − π1 ) ≥ k1 (π1 − πk ); equivalently, we must show that t⋆ ≤ (1 − k1 )π1 + k1 πk . Suppose for the sake of contradiction that this does not hold, that is, that t⋆ > (1 − k1 )π1 + k1 πk . We know that tlow = πk < t⋆ < π1 = thigh by assumption. With t⋆ satisfying these two constraints, we have that L(t⋆ ) = πk + k X j=1 [πj − t⋆ ]+ ≤ πk + k−1 X j=1 [π1 − t⋆ ]+ = πk + (k − 1)(π1 − t⋆ )  1 k−1 π1 − πk < πk + (k − 1) π1 − k k 1 k−1 π1 + πk < t⋆ , = k k  the two strict inequalities by assumption on t⋆ . But then we would have L(t⋆ ) < R(t⋆ ) = t⋆ , a contradiction to our choice of t⋆ . Because L is decreasing, it is thus the case that t⋆ ≤ (1 − k1 )π1 + k1 πk , giving the result. A.4. Proof of Observation 1. Our proof is essentially a trivial modification of Zhang [36, Theorem 8]. We assume without loss of generality that φ(·) ≥ 0. Let π ∈ ∆k , and recalling that the cost matrix C = [c1 · · · ck ], let L(π, α) = k X y=1 πy k X i=1 cyi φ(−αi ) = k X π T ci φ(−αi ), i=1 noting that π T ci ≥ 0 for each i. Without loss of generality, we may assume that π T c1 > π T c2 = minl π T cl . If we can show that inf α L(π, α) < MULTICLASS CLASSIFICATION, INFORMATION, AND SURROGATE RISK 37 inf α1 ≥maxj αj L(π, α), then the proof will be complete. Let α(m) ∈ Rk be any (m) (m) sequence satisfying 1T α(m) = 0 and α1 ≥ maxj αj such that L(π, α(m) ) → inf α1 ≥maxj αj L(π, α). We first show that it is no loss of generality to assume that α(m) converges. Suppose for the sake of contradiction that lim supm α(m) = ∞. Then as (m) (m) 1T α(m) = 0, we must have lim supm α1 = ∞, so that lim supm φ(−α1 ) = (m) ∞ because φ′ (0) < 0 and φ is convex. As it must be the case that π T c1 φ(−α1 ) remains bounded (for the convergence of L(π, α(m) )), we would then have that π T c1 = 0, which is a contradiction because π T c1 > minl π T cl ≥ 0. Thus we must have lim supm α(m) < ∞, and so there is a subsequence of α(m) converging; without loss of generality, we assume that α(m) → α⋆ . Then L(π, α⋆ ) = inf α1 ≥max αj L(π, α) by continuity of φ. We show that by swapping the value of α⋆1 with the value α⋆2 (or increasing the latter slightly), we can always improve the value L(π, α⋆ ). We consider three cases, noting in each that α⋆1 ≥ 0 as 1T α⋆ = 0. 1. Let α⋆1 = α⋆2 ≥ 0. Then φ′ (−α⋆1 ) = φ′ (−α⋆2 ) ≤ φ′ (0) < 0, and additionally cT1 πφ′ (−α⋆1 ) − cT2 πφ′ (−α⋆2 ) < 0 because cT2 π < cT1 π. For sufficently small δ > 0, we thus have cT1 πφ(−α⋆1 + δ) + cT2 πφ(−α⋆2 − δ) < cT1 πφ(−α⋆1 ) + cT2 πφ(−α⋆2 ), whence L(π, α⋆ ) > L(π, α⋆ − δ(e1 − e2 )). 2. Let α⋆1 > α⋆2 and φ(−α⋆1 ) > φ(−α⋆2 ). Then taking α ∈ Rk such that α1 = α⋆2 , α2 = α⋆1 , and αi = α⋆i for i ≥ 3, it is clear that L(π, α) < L(π, α⋆ ). 3. Let α⋆1 > α⋆2 and φ(−α⋆1 ) ≤ φ(−α⋆2 ). Using that −α⋆1 < 0, we see that for sufficiently small δ > 0 we have φ(−α⋆1 + δ) < φ(−α⋆1 ) and φ(−α⋆2 ) ≥ φ(−α⋆2 −δ), because φ must be non-decreasing at the point −α⋆2 as φ′ (0) < 0. Thus we have L(π, α⋆ − δ(e1 − e2 )) < L(π, α⋆ ). A.5. Biconjugates of the zero-one loss. In this subsection, we calculate the conjugate of the generalized entropy H(π) = 1 − maxj πj (pointwise Bayes risk) associated with the zero-one loss, demonstrating equality (16). Let (−H)∗ (α) = supπ∈∆k {π T α + 1 − kπk∞ }. Formulating the Lagrangian for the supremum with dual variables θ ∈ R, λ ∈ Rk+ , we have L(π, θ, λ) = π T α − kπk∞ − θ(1T π − 1) + λT π, which has dual objective ( θ sup L(π, θ, λ) = π −∞ if kα + λ − θ1k1 ≤ 1 otherwise. 38 DUCHI, KHOSRAVI, RUAN P As inf λ≥0 kα + λ − θ1k1 = kj=1 [αj − θ]+ and strong duality obtains (the problems are linear), we have that the supremum in expression (16) is   X k  [αj − θ]+ ≤ 1 . sup π T α − kπk∞ | π T 1 = 1, π ≥ 0 = inf θ | π j=1 · · · by symmetry, Without loss of generality we may assume that α1 ≥ α2 ≥ P so that over the domain θ ∈ (−∞, α1 ], the function θ 7→ kj=1 [αj − θ]+ is P strictly decreasing. Thus, there is a unique smallest θ satisfying kj=1 [αj − θ]+ ≤ 1 (attaining the equality), and by inspection, this must be one of   α1 + α2 1 α1 + α2 + α3 1 1T α 1 θ ∈ α1 − 1, − , − ,..., − . 2 2 3 3 k k (Any θ makes some number of the terms [αj − θ]+ positive; fixing the number of terms and solving for θ gives the preceding equality.) Expression (16) follows. A.6. Pointwise infimal risks of hinge losses. We demonstrate equality (18) with C = [c1 · · · ck ]. We note that   ) ( k k k  X X X π T ci [1 + αi ]+ , cyi [1 + αi ]+ = inf πy H(π) = inf  αT 1=0 αT 1=0  y=1 i=1 i=1 and formulating the Lagrangian by introducing dual variable θ ∈ R, we have L(α, θ) = k X i=1 π T ci [1 + αi ]+ − θ1T α. The generalized KKT conditions [6] for this problem are given by taking subgradients of the Lagrangian. At optimum, we must have   if αi < −1 0 νi ∈ ∂ [1 + αi ]+ = [0, 1] if αi = −1 and π T ci νi −θ = 0, 1T α = 0, i ∈ [k].   1 if αi > −1, Without loss of generality, assume that π T c1 = minj π T cj . Set α⋆ ∈ Rk and θ ⋆ via α⋆1 = (k − 1), α⋆i = −1 for i ≥ 2, θ ⋆ = min π T cj = π T c1 . j We have 1T α⋆ = (k − 1) − (k − 1) = 0, and setting νi = 1 for i such min π T c j j ∈ [0, 1] otherwise, we see that that π T ci = minj π T cj and νi = π T ci T ⋆ T T π ci νi − θ = minj π cj − minj π cj = 0 for all i; the KKT conditions are satisfied. Thus α⋆ and θ ⋆ are primal-dual optimal, yielding expression (18). MULTICLASS CLASSIFICATION, INFORMATION, AND SURROGATE RISK 39 A.7. Classification calibration of hinge losses. We provide a quantitative guarantee on the classification calibration of hinge-like losses. k×k and let Lcw (α, y) = maxi {cyi | αi = maxj αj } Lemma A.9. Let C ∈ R+  P be the cost-weighted loss (10). Let L(α, y) = ki=1 cyi [1 + αi ]+ +I 1T α = 0 P or L(α, y) = ki=1 cyi [1 + αi − αy ]+ . Then for any π ∈ ∆k and α ∈ Rk , k X i=1 πi L(α, i) − inf′ α k X i=1 πi L(α′ , i) ≥ k X i=1 πi Lcw (α, i) − inf′ α k X πi Lcw (α′ , i). i=1 P Proof. First, recall from Example 5 that inf α ki=1 πi L(α, i) = k minl π T cl . Defining y(α) = argmaxj αj (breaking ties in some arbitrary deterministic P order), it is sufficient to argue that for L(α, y) = ki=1 cyi [1 + αi ]+ , we have (31) X y T πy L(α, y) − k min π cl ≥ l  cTy(α) π T − min π cl l  for any vector π ∈ ∆k and α with 1T α = 0. To show inequality (31), assume without loss of generality that there exists an index l⋆ < k such that cT1 π = cT2 π = · · · = cTl⋆ π = minl cTl π, while cTl π >PcT1 π for l > l⋆ . (If l⋆ = k, then inequality (31) is trivial.) We always have y πy L(α, y) ≥ k minl cTl π; let us suppose that αl ≥ maxj αj for some l > l⋆ ; without loss of generality take l = k. Then we have k X y=1 πy L(α, y) ≥ = (32) inf αk ≥maxj αj ,1T α=0 inf αk ≥maxj αj ,1T α=0 k X y=1 k X πy k X cyj [1 + αj ]+ j=1 cTl π [1 + αl ]+ . l=1 Writing the Lagrangian for this problem and introducing variables λ ≥ 0 for the inequality αk ≥ maxj αj and θ ∈ R for the equality 1T α = 0, we have L(α, λ, θ) = k X l=1   π T cl [1 + αl ]+ + θ1T α + λ max αj − αk . j ⋆ ⋆ −1 k−l −1 ⋆ Set α⋆1 = · · · = α⋆l⋆ = k−l l⋆ +1 , αk = l⋆ +1 , and αl = −1 for l > l , l 6= k. ⋆ T We claim that these are optimal. Indeed, set θ = −(1 − ǫ)π c1 − ǫπ T ck 40 DUCHI, KHOSRAVI, RUAN for some ǫ ∈ (0, 1), whose value we specify later. Taking subgradients of the Lagrangian with respect to α, we have  T c1  ..  ⋆ ⋆ ∂α L(α , λ, θ ) = diag(ν)  .  π + θ ⋆ 1 + λ [Conv{e1 , . . . , el⋆ , ek } − ek ] , cTk where νi ∈ [0, 1] are arbitrary scalars satisfying νi ∈ ∂ [1 + α⋆i ]+ , i.e. ν1 = · · · = νl⋆ = νk = 1, νl ∈ [0, 1] for l ∈ {l⋆ + 1, . . . , k − 1}. Notably, we have π T cl +θ ⋆ = ǫπ T (c1 −ck ) ≤ 0 for l ∈ {1, . . . , l⋆ } and π T ck +θ ⋆ = (1−ǫ)π T (ck − c1 ) ≥ 0. Choosing ǫ small enough that ǫπ T ck + (1 − ǫ)π T c1 < π T cl for T T l ∈ {l⋆ +1, . . . , k−1}, it is clear that we may take νl = (1−ǫ)ππTc1c+ǫπ ck ∈ [0, 1] l for each l 6∈ {1, . . . , l⋆ , k}, and we show how to choose λ⋆ ≥ 0 so that 0 ∈ ∂α L(α⋆ , λ, θ ⋆ ). Assume without loss of generality (by scaling of λ ≥ 0) that π T (ck − c1 ) = 1. Eliminating extraneous indices in ∂α L, we see that we seek a setting of λ and a vector v ∈ ∆l⋆ +1 such that el⋆ +1 − ǫ1l⋆ +1 + λ(v − el⋆ +1 ) = 0. 1 [ǫ · · · ǫ (1 − ǫ)]T ∈ ∆l⋆ +1 , and set This is straightforward: take v = l⋆ ǫ+(1−ǫ) λ⋆ = l⋆ ǫ + (1 − ǫ) ≥ 0. Summarizing, we find that our preceding choices of α⋆ were optimal for ⋆ −1 the problem (32), that is, α⋆1 = · · · = αl⋆ = k−l l⋆ +1 = αk , with αl = −1 for l⋆ < l < k. We thus have    k − l⋆ − 1 k − l⋆ − 1 T πy L(α, y) ≥ + π ck 1 + π cl 1 + l⋆ + 1 l⋆ + 1 y=1 l=1   k l⋆ ⋆ T ⋆ (k − l − 1) + ⋆ cT π. = min π cl l + ⋆ l l +1 l +1 k ⋆ l X k X T  In particular, we have k X y=1 πy L(α, y) − k min π T cl l   l⋆ k ⋆ ≥ min π cl l + ⋆ (k − l − 1) + ⋆ cT π − k min cTl π l l l +1 l +1 k   k = ⋆ cT π − min cTl π . l l +1 k T ⋆ Recalling that we must have had l⋆ < k, we obtain inequality (31). MULTICLASS CLASSIFICATION, INFORMATION, AND SURROGATE RISK 41 A.8. Proofs of technical lemmas on smoothness. A.8.1. Proof of Lemma A.1. Let t ∈ (0, 1) and ut = tu1 + (1 − t)u0 . Assume that inequality (30) holds and let u0 ∈ rel int Ω. Then λ t κ u − u1 2 λ t T = f (u ) + (1 − t)st (u1 − u0 ) + (1 − t)κ ku0 − u1 kκ , 2 f (u1 ) ≥ f (ut ) + sTt (u1 − ut ) + where st ∈ ∂f (ut ), which must exist as ut ∈ rel int Ω (see Lemma B.3 and [17, Chapter VI]). Similarly, we have f (u0 ) ≥ f (ut ) + tsTt (u0 − u1 ) + λ κ t ku0 − u1 kκ . 2 Multiplying the preceding inequalities by t and (1 − t), respectively, gives λ ku0 − u1 kκ [t(1 − t)κ + (1 − t)tκ ] 2   λ = f (ut ) + t(1 − t) ku0 − u1 kκ (1 − t)κ−1 + tκ−1 2 tf (u1 ) + (1 − t)f (u0 ) ≥ f (ut ) + for any u0 ∈ rel int Ω. We now consider the case that u0 ∈ Ω \ rel int Ω, as the preceding display is equivalent to the uniform convexity condition (29). Let u0 ∈ Ω \ rel int Ω and u′0 ∈ rel int Ω. For a ∈ [0, 1] define the functions h(a) = tf (u1 ) + (1 − t)f ((1 − a)u0 + au′0 ) and ht (a) = f (tu1 + (1 − t)((1 − a)u0 + au′0 )) λ + t(1 − t) (1 − a)u0 + au′0 − u1 2 κ  (1 − t)κ−1 + tκ−1 . Then h and ht are closed one-dimensional convex functions, which are thus continuous [17, Chapter I], and we have h(a) ≥ ht (a) for all a ∈ (0, 1) as (1 − a)u0 + au′0 ∈ rel int Ω. Thus tf (u0 ) + (1 − t)f (u1 ) = h(0) = lim h(a) ≥ lim ht (a) = ht (0) a→0 a→0   λ = f (tu1 + (1 − t)u0 ) + t(1 − t) ku0 − u1 kκ (1 − t)κ−1 + tκ−1 . 2 This is equivalent to the uniform convexity condition (29). We now prove the converse. Assume the uniform convexity condition (29), which is equivalent to f (ut ) − f (u0 ) λ + (1 − t) ku0 − u1 kκ [(1 − t)κ−1 + tκ−1 ] ≤ f (u1 ) − f (u0 ) t 2 42 DUCHI, KHOSRAVI, RUAN (x) be the for all u0 , u1 ∈ Ω and t ∈ (0, 1). Let f ′ (x, d) = limt↓0 f (x+td)−f t directional derivative of f in direction d, recalling that if ∂f (x) 6= ∅ then f ′ (x, d) = supg∈∂f (x) hg, di (see [17, Ch. VI.1]). Then taking t ↓ 0, we have f ′ (u0 , u1 − u0 ) + λ ku0 − u1 kκ ≤ f (u1 ) − f (u0 ). 2 Because f ′ (u0 , u1 − u0 ) = supg∈∂f (u0 ) hg, u1 − u0 i, this implies the subgradient condition (30). A.8.2. Proof of Lemma A.2. First, we note that as dom f = Ω and f is uniformly convex, it is 1-coercive, meaning that limkuk→∞ f (u)/ kuk = ∞. Thus dom f ∗ = Rk ; see [17, Proposition X.1.3.8]. As f is strictly convex by assumption, we have that f ∗ is differentiable [17, Theorem X.4.1.1]. Moreover, as f is closed convex, f = f ∗∗ , and we have for any s ∈ Rk that u0 = ∇f ∗ (s) if and only if s ∈ ∂f (u0 ), meaning that f is subdifferentiable on the set Im ∇f ∗ = {∇f ∗ (s) : s ∈ Rk }, whence Ω ⊃ Im ∇f ∗ . Now, let s0 , s1 ∈ Rk and u0 = ∇f ∗ (s0 ) and u1 = ∇f ∗ (s1 ). We must then have s0 ∈ ∂f (u0 ) and s1 ∈ ∂f (u1 ) by standard results in convex analysis [17, Corollary X.1.4.4], so that ∂f (u0 ) 6= ∅ and ∂f (u1 ) 6= ∅. Now we use the uniform convexity condition (30) of Lemma A.1 to see λ ku0 − u1 kκ and 2 λ f (u0 ) − f (u1 ) ≥ hs1 , u0 − u1 i + ku0 − u1 kκ . 2 f (u1 ) − f (u0 ) ≥ hs0 , u1 − u0 i + Adding these equations, we find that hs0 − s1 , u0 − u1 i ≥ λ ku0 − u1 kκ , so ks0 − s1 k∗ ku0 − u1 k ≥ λ ku0 − u1 kκ by Hölder’s inequality. Dividing each side by ku0 − u1 k, we obtain ku0 − u1 k ≤ 1 1 λ− κ−1 ks0 − s1 k∗κ−1 , the desired result once we note that ∇f ∗ (si ) = ui . MULTICLASS CLASSIFICATION, INFORMATION, AND SURROGATE RISK 43 A.8.3. Proof of Lemma A.3. Define ut = u0 + t(u1 − u0 ) for t ∈ [0, 1]. Then using Taylor’s theorem, we have Z 1 h∇f (tu1 + (1 − t)u0 ), u1 − u0 i dt f (u1 ) = f (u0 ) + 0 Z 1 h∇f (ut ) − ∇f (u0 ), u1 − u0 i dt = f (u0 ) + h∇f (u0 ), u1 − u0 i + 0 Z 1 k∇f (ut ) − ∇f (u0 )k∗ ku0 − u1 k dt ≤ f (u0 ) + h∇f (u0 ), u1 − u0 i + 0 Z 1 Ltβ ku0 − u1 kβ+1 dt. ≤ f (u0 ) + h∇f (u0 ), u1 − u0 i + 0 Computing the final integral as R1 0 tβ dt = 1 β+1 gives the result. A.8.4. Proof of Lemma A.4. Let gn = ∇f (un ) and suppose for the sake of contradiction that gn 6→ 0. Then there is a subsequence, which without loss of generality we take to be the full sequence, such that kgn k∗ ≥ c > 0 for all n. Fix δ > 0, which we will choose later. By Lemma A.3, defining yn = un − δgn / kgn k∗ , we have   L β L β+1 Lδ ≤ f (un ) − δ c − δ . f (yn ) ≤ f (un ) − δ kgn k + β+1 β+1 In particular, we see that if δ≤  c β+1 · 2 L 1/β , then f (yn ) ≤ f (un ) − δc 2 for all n, which contradicts the fact that f (un ) → inf x f (x) > −∞. APPENDIX B: ORDER EQUIVALENCE OF CONVEX FUNCTIONS In this appendix, we collect the proofs of our various technical results on order equivalent functions (Definition 5.1). B.1. Proof of Lemma 5.2. Before proving the lemma, we give a matrix characterization of non-negative vectors with equal sums similar to the characterization of majorization via doubly stochastic matrices (cf. [22]; we temporarily defer the proof of the lemma to Appendix B.1.1). T T Lemma B.1. Vectors a, b ∈ Rm + satisfy 1 a = 1 b if and only if there m×m T such that Z1 = a and Z 1 = b. exists a matrix Z ∈ R+ 44 DUCHI, KHOSRAVI, RUAN Returning to the proof of Lemma 5.2 proper, let fi = fL(i) ,π for shortk−1 by the construction (15), because hand. Note that dom f1 = dom f2 = R+ (k−1)×m satisfying mini inf α∈Rk L(α, i) > −∞. Now, given matrices A, B ∈ R+ A1 = B1 (where A = [a1 · · · am ] and B = [b1 · · · bm ]), we construct distributions Pi and quantizers q1 and q2 such that for any f we have Df (P1 , . . . , Pk−1 ||Pk | q1 ) = C Df (P1 , . . . , Pk−1 ||Pk | q2 ) = C m X j=1 m X f (aj ) and f (bj ), j=1 where C > 0 is a constant. We then use Definition 4.1 of loss equivalence to show that f1 and f2 are order equivalent. With that in mind, take M to be any positive integer such that M > (k−1)×M max{kA1k∞ , m}. We enlarge A and B into matrices Aext , B ext ∈ R+ respectively, To construct these matrices, let aext i,m+1 = Pm adding Mext−m columns. P m M − j=1 aij and bi,m+1 = M − j=1 bij , for i = 1, . . . , k − 1, and set ext and ext aext il = bil = 0 for all m + 1 < l ≤ M . The enlarged matrices A 1 1 ext A 1 = M B ext 1 = 1, and their columns belong to B ext thus satisfy M k−1 dom f1 = dom f2 = R+ . Let the spaces X = {(i, j) | 1 ≤ i ≤ M, 1 ≤ j ≤ M } and Z = {1, 2, . . . , M }. Define quantizers q1 , q2 : X → [M ] by q1 (i, j) = i and q2 (i, j) = j. As Aext 1 = B ext 1 = M 1, Lemma B.1 guarantees the exisl ] ∈ RM ×M such that tence of matrices Z l = [zij + 1 ext M [b ] ∈ RM +, M lj j=1 P l which implies that for all l ∈ [k − 1], the matrix Z l satisfies ij zij = 1. For l each l ∈ [k −1], define the probability distribution Pl on X by Pl ((i, j)) = zij for i, j ∈ [M ]. Let Pk be the distribution defined by Pk ((i, j)) = M −2 . Under this quantizer design and choice of distributions Pl , we have for any prior π ∈ Rk+ (upon which the functions f1 and f2 implicitly depend) and f = f1 or f = f2 that Z l1 = 1 ext M [a ] ∈ RM + M lj j=1 and (Z l )T 1 = Df (P1 , . . . , Pk−1 ||Pk | q1 ) = Df (P1 , . . . , Pk−1 ||Pk | q2 ) = M 1 X f (aext j ) and M j=1 M 1 X f (bext j ), M j=1 MULTICLASS CLASSIFICATION, INFORMATION, AND SURROGATE RISK 45 PM P PM l −1 , ext because M i=1 Pk ((i, j)) = M i=1 Pl ((i, j)) = i=1 zij = alj /M and and similarly for B ext . By the loss equivalence of L(1) and L(2) (recall Def. 4.1), we obtain that M X j=1 f1 (aext j ) ≤ M X j=1 f1 (bext j ) if and only if M X j=1 f2 (aext j ) ≤ M X f2 (bext j ). j=1 Note that aext = bext ∈ dom fi for each j > m and i = 1, 2. Moreover, j j ext ext aj = aj and bj = bj for 1 ≤ j ≤ m, so the preceding display is equivalent to the order equivalence (24). B.1.1. Proof of Lemma B.1. One direction of the proof is easy: if Z ∈ and Z1 = a while Z T 1 = b, then 1T Z1 = 1T a = bT 1. Rm×m + We prove the converse using induction. When m = 1, the result is immediate. We claim that it is no loss of generality to assume that a1 ≥ a2 ≥ · · · ≥ am and b1 ≥ · · · ≥ bm ; indeed, let Pa and Pb be permutation matrices such that Pa a and Pb b are in sorted (decreasing) order. Then if we construct e = Pa a and ZeT 1 = Pb b, we have Z = P T ZP e b such that Z1 Ze ∈ Rm×m a + m×m T T T T e = Pa Pa a = a and Z 1 = P Z1 e = b. and Z1 = Pa Z1 satisfies Z ∈ R+ b Now, suppose that the statement of the lemma is true for all vectors of dimension up to m − 1; we argue that the result holds for a, b ∈ Rm + . It is no loss of generality to assume that am ≤ bm . Let zm,m = am , zi,m = 0 for 2 ≤ i ≤ m − 1, and set z1,m = bm − am ≥ 0. Additionally, we set zm,i = 0 m−1×m−1 be the matrix defined by for 1 ≤ i ≤ m − 1. Now, let Zinner ∈ R+ the upper (m − 1) × (m − 1) sub-matrix of Z, and define the vectors ainner = [a1 + am − bm a2 a3 · · · am−1 ]T and binner = [b1 b2 · · · bm−1 ]T . Then as a1 ≥ (1/m)1T a = (1/m)1T b ≥ bm , we have ainner ≥ 0 and binner ≥ 0, and moreover, 1T ainner = 1T a − bm = 1T b − bm = 1T binner . In particular, we have by the inductive hypothesis that we may choose Zinner such that T Zinner 1 = ainner and Zinner 1 = binner . By inspection, setting     bm − am   0   Zinner    . . Z= , .     0 0 ··· 0 am and Z1 = a and Z T 1 = b. we have Z ∈ Rm×m + 46 DUCHI, KHOSRAVI, RUAN B.2. Proof of Lemma 5.3. As in our discussion in Section 5.2, we prove the lemma in a sequence of steps and auxiliary lemmas. The roadmap is as follows: first, we show that we may assume the set Ω in Lemma 5.3 has non-empty interior (§ B.2.1). With this done, we can consider any affinely independent subset of k + 1 points from Ω, whence Lemma 5.4 holds. With this done, we can cover Ω with overlapping simplices (§ B.2.2), and extend this to all of Ω (§ B.2.3). B.2.1. It is no loss of generality to assume Ω has non-empty interior in Lemma 5.3. Let H = aff Ω be the affine hull of Ω, where dim H = l ≥ 1. (If dim H = 0, then Ω is a single point, and Lemma 5.3 is trivial.) We argue that if Lemma 5.3 holds for sets Ω such that int Ω 6= ∅ it holds generally; thus we temporarily assume its truth  for convex Ω with int Ω 6= ∅. Since dim H = l, we have H = Av + d | v ∈ Rl for some full columnrank matrix A ∈ Rk×l and d ∈ Rk . As Ω has non-empty interior relative to H (e.g. [17, Theorem 2.1.3]), we have Ω = {Av + d | v ∈ Ω0 } for a convex set Ω0 ⊂ Rl with int Ω0 6= ∅. Defining fe1 (v) = f1 (Av + d) and fe2 (v) = f2 (Av + d), where fei (v) = ∞ for v 6∈ Ω0 , we have that fe1 and fe2 are order equivalent on Ω0 ⊂ Rl . By assumption, Lemma 5.3 holds for Ω0 , so there exist a > 0, eb ∈ Rl , e c ∈ R such that f1 (Av + d) = fe1 (v) = afe2 (v) + heb, vi + c, for v ∈ Ω0 . As A is full column rank, for all t ∈ Ω there exists a unique vt ∈ Ω0 such that t = Avt + d, and the mapping t 7→ vt is linear, i.e., vt = Et + g for some E ∈ Rl×k and g ∈ Rl (we may take E ∈ Rl×k to be any left-inverse of A and g = −Ed, so v = Et − Eg). We obtain that fi (t) = fei (Et + g) for i = 1, 2, whence f1 (t) = fe1 (Et+g) = afe2 (Et+g)+heb, Et+gi+e c = af2 (t)+hE T eb, ti+heb, gi+e c for all t ∈ Ω, which is our desired result. From this point forward, we thus assume w.l.o.g. that int Ω 6= ∅. B.2.2. Covering sets with simplices. With Lemma 5.4 in hand, we now show that the special case for simplices is sufficient to show the general Lemma 5.3. First, we show that simplices essentially cover convex sets Ω. Lemma B.2. Let v, w be arbitrary points in int Ω ⊂ Rk . Then, there exist u0 , u1 , . . . , uk ∈ Ω such that v, w ∈ int E, where E = Conv{u0 , u1 , . . . , uk }. For any points u2 , . . . , uk that make v, w, u2 , . . . , uk affinely independent (Def. 5.2), there exist u0 , u1 ∈ Ω such that v, w ∈ int Conv{u0 , u1 , . . . , uk }. MULTICLASS CLASSIFICATION, INFORMATION, AND SURROGATE RISK 47 Before proving Lemma B.2, we state a technical lemma about interior points of convex sets. Lemma B.3 (Hiriart-Urruty and Lemaréchal [17], Lemma III.2.1.6). Let C ⊂ Rk be a convex set, u ∈ rel int C and v ∈ cl C. Then for any λ ∈ [0, 1), we have λu + (1 − λ)v ∈ rel int C. Proof (of Lemma B.2). Take u2 , . . . , uk ∈ Ω arbitrarily but in general Ω u2 w u1 PSfrag replacements v u0 Fig 1: The construction in Lemma B.2. position, so that the points v, w, u2 , . . . , uk and w, v, u2 , . .P . , uk are affinely 1 (v + w + ki=2 ui ), so that independent (Def. 5.2). Now, define ucent = k+1 ucent ∈ int Ω (Lemma B.3), and choose ǫ > 0 small enough that the points u0 = v +ǫ(v −ucent ) and u1 = w+ǫ(w−ucent ) are both in Ω. (This is possible as v, w ∈ int Ω; see Figure 1.) Then we find that v = (u0 + ǫucent )/(1 + ǫ) and w = (u1 + ǫucent )/(1 + ǫ), so that ! k X u0 u1 2ǫ 1 ui , + + ucent + ucent = k+1 1+ǫ 1+ǫ 1+ǫ i=2 or by rearranging, ucent = λ0 (u0 + u1 ) + λ1 λ0 = λ1 =   2ǫ 1− (k + 1)(1 + ǫ) 1− 2ǫ (k + 1)(1 + ǫ) −1 −1 Pk i=2 ui , where 1 and (k + 1)(1 + ǫ) 1 . k+1 48 DUCHI, KHOSRAVI, RUAN Noting that 2λ0 + (k − 1)λ1 = 1 and λi > 0, we obtain that ucent ∈ int Conv{u0 , . . . , uk }. As the points ui are in general position, and as v= ǫ 1 ǫ 1 u0 + ucent and w = u1 + ucent , 1+ǫ 1+ǫ 1+ǫ 1+ǫ we have v, w ∈ int Conv{u0 , . . . , uk } by Lemma B.3. B.2.3. Extension from a single simplex to all of Ω. We use Lemma B.2 to show the following lemma, which implies Lemma 5.3. Lemma B.4. In addition to the conditions of Lemma 5.3, assume that for all simplices E ⊂ int Ω there exist aE > 0, bE ∈ Rk , and cE ∈ R such that f1 (t) = aE f2 (t) + bTE t + cE for t ∈ E. Then there exist a > 0, b ∈ Rk , and c ∈ R such that f1 (t) = af2 (t) + bT t + c for t ∈ Ω. Coupled with Lemma 5.4, Lemma B.4 immediately yields Lemma 5.3; indeed, Lemma 5.4 shows that for any simplex E the conditions of Lemma B.4 holds, so that Lemma 5.3 follows, i.e., f1 (t) = af2 (t) + bT t + c for all t ∈ Ω. Proof. For i ∈ {1, 2} define the sets  Si = {(u, v) ∈ int Ω × int Ω | ∇fi (u) 6= ∇fi (v)} ∪ {(u, v) ∈ int Ω × int Ω | ∇fi (u) or ∇fi (v) does not exist} ⊂ Ω × Ω. We divide our discussion into two cases. Case 1. First we suppose that S1 = S2 = ∅. Then for i = 1, 2, fi are differentiable in int Ω in this case, we have that ∇fi (u) = ∇fi (v) for all u, v ∈ int Ω. Then by continuity of the fi on int Ω, we must have fi (t) = bTi t + ci for i = 1, 2. The result follows by taking a = 1, b = b1 − b2 and c = c1 − c2 and applying Lemma 5.5. Case 2. We have that at least one of S1 and S2 is non-empty. Without loss of generality, say S1 6= ∅. Choose a pair (u⋆ , v ⋆ ) ∈ S1 and consider the collection of sets M = {E = Conv{u0 , u1 , . . . , uk } | u⋆ , v ⋆ ∈ int E and u0 , u1 , . . . uk ∈ Ω} . We show that for any E1 , E2 ∈ M, we have aE1 = aE2 , bE1 = bE2 and cE1 = cE2 . We know that int E1 ∩ int E2 6= ∅, as u⋆ ∈ int E for all E ∈ M. MULTICLASS CLASSIFICATION, INFORMATION, AND SURROGATE RISK 49 Now, assume for the sake of contradiction that aE1 6= aE2 . For all t ∈ E1 ∩E2 we have (33) f1 (t) = aE1 f2 (t) + bTE1 t + cE1 and f1 (t) = aE2 f2 (t) + bTE2 t + cE2 . By subtracting the preceding equations from one another after multiplying by aE2 and aE1 , respectively, one obtains that for t ∈ E1 ∩ E2 , f1 (t) = aE 2   1 (aE2 bE1 − aE1 bE2 )T t + (aE2 cE1 − aE1 cE2 ) . − aE1 This yields a contradiction, since we have assumed that either (i) ∇f1 (u⋆ ) or ∇f2 (v ⋆ ) does not exist or (ii) ∇f1 (u⋆ ) 6= ∇f1 (v ⋆ ), while u⋆ , v ⋆ ∈ int E1 ∩ int E2 = int(E1 ∩ E2 ). Thus aE1 = aE2 . To obtain bE1 = bE2 , note that int(E1 ∩ E2 ) 6= ∅, as u⋆ , v ⋆ ∈ int(E1 ∩ E2 ). Subtracting the equalities (33), we find 0 = f1 (t)−f1 (t) = (bE1 −bE2 )T t+cE1 −cE2 for t ∈ E1 ∩E2 , which has non-empty interior. That bE1 = bE2 immediately implies cE1 = cE2 . Hence, there exist some a > 0, b ∈ Rk , and c ∈ R such that for all sets E ∈ M, we have aE = a, bE = b, and cE = c. S We complete the proof by showing that {E | E ∈ M} is dense in Ω. Define Ω◦ ⊂ Ω as   there exist u3 , . . . , uk ◦ Ω = t∈Ω| . such that u⋆ , v ⋆ , t, u3 , . . . , uk are affinely independent The set Ω◦ forms a dense subset of Ω, as u⋆ ∈ int Ω 6= ∅. For any t ∈ Ω◦ , Lemma B.2 guarantees the S existence of E ∈ M such that t ∈ E and u⋆ , v ⋆ ∈ ◦ int E. We thus have Ω ⊂ {E | E ∈ M}. As f1 (t) = af2 (t) + bT t + c for all t ∈ Ω◦ by the previous paragraph, Lemma 5.5 allows us to extend the equality to f1 (t) = af2 (t) + bT t + c for all t ∈ Ω. B.3. Proofs of auxiliary lemmas for Lemma 5.4. B.3.1. Proof of Lemma 5.6. For each i, let λi = [αi ]+ and νi = [αi ]− be the positive and negative parts of the αi , and let λi = rsi and −νi = qsi where qi , ri , s ∈ N. Then we have m X i=1 λi ui = v − m X i=1 νi ui or m X ri ui = sv + i=1 m X qi ui , i=1 where 1T r = s + 1T q as 1T α = 1. Defining the matrices · · v} u1 · · · u1 · · · um · · · um ], A = [u1 · · · u1 · · · um · · · um ] and B = [v| ·{z | {z } | {z } | {z } | {z } r1 times rm times s times q1 times qm times 50 DUCHI, KHOSRAVI, RUAN we have A1 = B1 with columns in Ω. Then order equivalence (24) implies m X i=1 ri f1 (ui ) ≤ sf1 (v) + m X qi f1 (ui ) iff m X i=1 i=1 Each of these is equivalent to Pm ri f2 (ui ) ≤ sf2 (v) + i=1 αi fj (ui ) m X qi f2 (ui ). i=1 ≤ fj (v) for j = 1, 2. B.3.2. Proof of Lemma 5.7. We assume that f1 and f2 are non-linear over Conv{u0 , . . . , uk }, as otherwise the result is trivial. Let the vectors g1 and g2 and matrix H ∈ Rk×k be defined by       T f2 (u1 ) − f2 (u0 ) f1 (u1 ) − f1 (u0 ) u1 − uT0       .. .. .. H= .  , g2 =   , g1 =  . . . T T f2 (uk ) − f2 (u0 ) f1 (uk ) − f1 (u0 ) uk − u0 For any a > 0, define the vector b(a) ∈ Rk so that b(a)T (ui − u0 ) = f1 (ui ) − f1 (u0 ) − a(f2 (ui ) − f2 (u0 )) = g1,i − ag2,i , that is, as b(a) = H −1 (g1 − ag2 ), which is possible as H is full rank. By choosing c(a) = f1 (u0 ) − af2 (u0 ) − b(a)T u0 , we then obtain that f1 (ui ) = af2 (ui ) + b(a)T ui + c(a) by algebraic manipulations. We now consider ucent . We have k T b(a) ucent 1 X 1 = 1T Hb(a) b(a)T ui = b(a)T u0 + k+1 k+1 i=0 = b(a)T u0 + 1 1T (g1 − ag2 ), k+1 so that af2 (ucent ) + b(a)T ucent + c(a) = af2 (ucent ) + k X f1 (ui ) − f1 (u0 ) + af2 (u0 ) − af2 (ui ) k+1 i=1 k k i=0 i=0 1 X 1 X = af2 (ucent ) + f1 (ui ) − a f2 (ui ). k+1 k+1 + f1 (u0 ) − af2 (u0 ) MULTICLASS CLASSIFICATION, INFORMATION, AND SURROGATE RISK 51 Thus we may choose an a > 0 such that our desired equalities hold if and only if there exists a > 0 such that k k i=0 i=0 1 X 1 X f1 (ui ) = af2 (ucent ) − a f2 (ui ). f1 (ucent ) − k+1 k+1 By the assumption that f1 and f2 are non-linear, we have that (by Lemma 5.8) 1 Pk 1 Pk f1 (ucent ) < k+1 i=0 f1 (ui ) and f2 (ucent ) < k+1 i=0 f2 (ui ). Thus, setting f1 (ucent ) − a= f2 (ucent ) − gives the desired result. 1 k+1 1 k+1 Pk i=0 f1 (ui ) Pk i=0 f2 (ui ) >0 B.3.3. Proof of Lemma 5.8. Without loss of generality, we assume that λ1 = kλk∞ and that λ1 > 1/m. Then we have ! m m m m X X X X (λi − λ1 )f (ui ) f (ui ) + λi f (ui ) = λ1 λi ui ≤ f i=1 i=1 i=1 (34) = mλ1 f (ucent ) + i=1 m X i=2 Let Λ = Pm i=1 (λ1 (λ1 − λi )f (ui ). − λi ) = mλ1 − 1 > 0. Then ucent = m m 1 X Λ X λ1 − λi λi ui + ui , mλ1 mλ1 Λ i=1 i=1 and we have " ! !# m m X X 1 Λ λ1 − λi mλ1 f (ucent ) ≤ nλ1 λi ui + f f ui mλ1 mλ1 Λ i=1 i=2 ! m m X X λ1 − λi f (ui ). λi ui + Λ ≤f Λ i=1 i=2 The inequalities (34) must have been equalities, giving the result. APPENDIX C: PROOFS FOR BAYES CONSISTENCY OF EMPIRICAL RISK MINIMIZATION 52 DUCHI, KHOSRAVI, RUAN C.1. Proof of Lemma 4.1. With the definition R⋆ (q) := inf γ R(γ | q), we have (35) R(γ | q) − inf γ∈Γ,q∈Q R(γ | q) = R(γ | q) − R⋆ (q) + R⋆ (q) − inf R⋆ (q). q∈Q For the second two terms, we note that by Theorem 1, we have R⋆ (q) = E[HLcw (e π (q(X)))] = aE[HL (e π (q(X)))] + bT π + c, and similarly for inf q R⋆ (q), so that   ⋆ ⋆ ⋆ ⋆ R (q) − inf R (q) = a RL (q) − inf RL (q) q∈Q q∈Q   ≤ a RL (γ | q) − inf RL (γ | q) . γ∈Γ,q∈Q Clearly t 7→ at is concave, so that it remains to bound R(γ | q) − R⋆ (q) in expression (35). To that end, let L(α) ∈ Rk denote the vector of losses L(α, y) and define the function     T ′ T cw cw ′ H(ǫ) = inf sup π L(α) − L(α ) | sup π L (α) − L (α ) ≥ ǫ π∈∆k ,α α′ α′ and let H ∗∗ be its Fenchel biconjugate. Then (see [36, Proposition 25 and Corollary 26], as well as the papers [31, 30, 12, Proposition 1]) we have that H ∗∗ (ǫ) > 0 for all ǫ > 0, and defining g(ǫ) = sup{δ : δ ≥ 0, H ∗∗ (δ) ≤ ǫ} yields the desired concave function by taking h(t) = g(t) + at. In passing, we note that we may w.l.o.g. replace h(t) with min{h(t), maxij cij }. Now we give the second result. Without loss of generality, we may assume that the vector γ(z) ∈ Rk has a unique maximal coordinate; we may otherwise assume a deterministic rule for breaking ties. Let y(γ(z)) = argmaxj γj (z), assumed w.l.o.g. to be unique. Consider that ⋆ R(γ | q) − R (q) = Pk Z sup α k X i=1 q [e πi (z)Lcw (γ(z), i) − Lcw (α, i)] dP (z) −1 where P̄ q (A) = A ⊂ Z) is the pushi=1 πi Pi (q (A)) (for measurable q q k forward of q and π e(z) = [πi dPi (z)]i=1 /dP (z) is shorthand for the posterior of Y conditional on observing z ∈ q(X ). Lemma A.9 immediately implies ⋆ R(γ | q) − R (q) ≤ Z sup α k X i=1 q [e πi (z)L(γ(z), i) − L(α, i)] dP (z) ⋆ (q) = RL (γ | q) − RL MULTICLASS CLASSIFICATION, INFORMATION, AND SURROGATE RISK 53 Pk for either of the hinge-type losses, e.g. L(α, y) = i=1 cyi [1 + αi − αy ]+ . In the notation of the previous (general) case, we have a = 1/k because HL (π) = k1 HLcw (π), whence we may take h(t) = (1 + 1/k)t. C.2. Proof of Theorem 3. The proof of Theorem 3 is almost immediate from Lemma 4.1. Indeed, by Lemma 4.1, we have ⋆ R(γn | qn ) − R⋆ (Q) ≤ h (RL (γn | qn ) − RL (Q)) for some h concave, bounded, and satisfying h(0) = 0. It is thus sufficient to ⋆ (Q)] → 0. Now, if we let γ ⋆ and q⋆ minimize show that E[RL (γn | qn ) − RL n n RL (γ | q) over the set Γn × Qn (or be arbitrarily close to minimizing the L-risk), we have RL (γn | qn ) − RL (γn⋆ | q⋆n ) bL,n (γn | qn ) + R bL,n (γn | qn ) − RL (γ ⋆ | q⋆ ) = RL (γn | qn ) − R n n ⋆ ⋆ ⋆ b b ≤ RL (γn | qn ) − RL,n (γn | qn ) + RL,n (γn | qn ) − RL (γn | q⋆n ) | {z } bL,n (γ|q)−RL (γ|q)| ≤2 supγ∈Γn ,q∈Qn |R bL,n (γn | qn ) − +R inf γ∈Γn ,q∈Qn bL,n (γ | q). R Consequently, we have the expectation bound ⋆ E [RL (γn | qn ) − RL (Q)] ⋆ opt app ≤ E [RL (γn | qn ) − RL (γn⋆ | q⋆n )] + RL (γn⋆ | q⋆n ) − RL (Q) ≤ 2ǫest n + ǫn + ǫn , which converges to zero as desired. APPENDIX D: PROOFS OF BASIC PROPERTIES OF F -DIVERGENCES In this section, we collect the proofs of the characterizations of generalized f -divergences (Def. 2.1). D.1. Proof of Lemma 2.1. Let µ1 and µ2 be dominating measures; then µ = µ1 + µ2 also dominates P1 , . . . , Pk as well as µ1 and µ2 . We have for ν = µ1 or ν = µ2 that dPi /dν dPi /dν dν/dµ dPi /dµ dPi dν dPi = = and = , dPk /dν dPk /dν dν/dµ dPk /dµ dν dµ dµ 54 DUCHI, KHOSRAVI, RUAN the latter two equalities holding µ-almost surely by definition of the RadonNikodym derivative. Thus we obtain for ν = µ1 or ν = µ2 that   Z  Z  dP1 /dν dPk−1 /dν dPk dν dP1:k−1 /dν dPk dν = f ,..., dµ f dPk /dν dν dPk /dν dPk /dν dν dµ  Z  dPk−1 /dµ dPk dP1 /dµ ,..., dµ, = f dPk /dµ dPk /dµ dµ dPi /dµ again by definition of the Radon-Nikodym derivative. We have ppki = dP k /dµ a.s.-µ, which shows that the base measure µPdoes not affect the integral. To see the positivity, we may take µ = k1 ki=1 Pi , in which case Jensen’s inequality implies (the perspective function (9) is convex) that     dPk−1 dP1 (X), . . . , (X) dPk (X) Df (P1 , . . . , Pk−1 ||Pk ) = E f dPk dPk   E[dP1 ] E[dPk−1 ] ≥f ,..., E[dPk ] = f (1) = 0, E[dPk ] E[dPk ] where the expectation is taken under the distribution µ. The inequality is strict for f strictly convex at 1 as long as dPi /dPk is non-constant for some i, meaning that there exists an i such that Pi 6= Pk . D.2. Proof of Proposition 1. Before proving the proposition, we first establish a more general continuity result for f -divergences. This result is a direct generalization of results of [34, Thm. 5]. Given a sub-σ-algebra G ⊂ F, we let P G denote the restriction of the measure P , defined on F, to G. of F Lemma D.1. Let F1 ⊂ F2 ⊂ . .. be a sequence of sub-σ-algebras  Fn ||PkFn is non-decreasing and let F∞ = σ(∪n≥1 Fn ). Then Df P1Fn , . . . , Pk−1 in n and     F∞ Fn ||PkF∞ . lim Df P1Fn , . . . , Pk−1 ||PkFn = Df P1F∞ , . . . , Pk−1 n→∞ Proof. Define the measure ν = Nikodym derivatives Vn 1 = · k 1 k Pk i=1 Pi and vectors V n via the RadonF n dPk−1 dP1Fn dP2Fn , , . . . , dν Fn dν Fn dν Fn ! . Then (1 − 1T V n )dν Fn = k1 dPkFn , and V n is a martingale adapted to the filtration Fn by standard properties of conditional expectation (under the MULTICLASS CLASSIFICATION, INFORMATION, AND SURROGATE RISK 55 k−1 | 1T v ≤ 1}, we define g : Ck → R by measure ν). Letting Ck = {v ∈ R+   v (1 − 1T v). g(v) = f 1 − 1T v We see that g is convex (it is a perspective function), and we have ! ! Z k−1 Fn Fn  X dP dP 1  Fn 1 1:k−1 Fn i . dν = ||P D P Eν [g(V n )] = f 1 − f 1:k−1 k k dν Fn k dPkFn i=1 Because V n ∈ Ck for all n, we see that g(V n ) is a submartingale. This gives Fn ||PkFn ) is non-decreasing in n. the first result of the lemma, that Df (P1:k−1 Now, assume that the limit in the second statement is finite, as otherwise the result is trivial. Using f (1) = 0, we have by convexity that for v ∈ Ck ,    v g(v) = f (1 − 1T v) + f (1)1T v ≥ f v + 1(1T v) T 1−1 v ≥ inf f (v + 1(1T v)) > −∞, v∈Ck the final inequality a consequence of the fact that f is closed and hence attains its infimum. In particular, the sequence g(V n ) − inf v∈Ck g(v) is a non-negative submartingale, and thus     n n sup Eν |g(V ) − inf g(v)| = lim Eν g(V ) − inf g(v) < ∞. v∈Ck n n v∈Ck With this integrability guarantee, Doob’s second martingale convergence theorem [7, Thm. 35.5] yields the existence of a vector V ∞ ∈ F∞ such that   0 ≤ lim Eν g(V n ) − inf g(v) = Eν [g(V ∞ )] − inf g(v) < ∞. n v∈Ck v∈Ck That inf v∈Ck g(v) > −∞ implies Eν [|g(V ∞ )|] < ∞, giving the lemma. We P now give the proof of Proposition 1 proper. Let the the base measure 1 i µ = k ki=1 Pi and let pi = dP dµ be the associated densities of the Pi . Define the increasing sequence of partitions P n of X by sets Aαn for vectors α = (α1 , . . . , αk−1 ) and B with   αj pj (x) αj − 1 < n for j = 1, . . . , k − 1 ≤ Aαn = x ∈ X | 2n pk (x) 2 56 DUCHI, KHOSRAVI, RUAN where we let each αj range over {−n2n , −n2n + 1, . . . , n2n }, and define and B = (∪α Aαn )c = X \ ∪α Aαn . Then we have   X pk−1 (x) α p1 (x) ,..., χ (x)+(n, . . . , n)χB (x), = lim n Aαn n→∞ pk (x) pk (x) 2 n n k−1 α∈{−n2 ,...,n2 } where χA denotes the {0, 1}-valued characteristic function of the set A. Each term on the right-hand-side of the previous display is Fn -measurable, where Fn denotes the sub-σ-field generated by the partition P n . Defining F∞ = σ(∪n≥1 Fn ), we have   Fn ||PkFn Df (P1:k−1 ||Pk | P n ) = Df P1Fn , . . . , Pk−1   F∞ ||PkF∞ = Df (P1 , . . . , Pk−1 ||Pk ) , → Df P1F∞ , . . . , Pk−1 n where the limiting operation follows by Lemma D.1 and the final equality p because of the measurability containment ( ppk1 , . . . , k−1 pk ) ∈ F∞ . D.3. Proof of Proposition 2. Before proving the proposition, we state an inequality that generalizes the classical log-sum inequality (cf. [9, Theorem 2.7.1]). Lemma D.2. Let f : Rk+ → R be convex. Let a : X → R+ and bi : X → R+ for 1 ≤ i ≤ k be nonnegative measurable functions. Then for any finite measure µ defined on X , we have R   Z  Z  R bk dµ b1 dµ bk (x) b1 (x) ,..., dµ(x). ,..., R ≤ a(x)f adµ f R a(x) a(x) adµ adµ Proof. Recall that the perspective function g(y, t) defined by g(y, t) = tf (y/t) for t > 0 is jointly convex in y and t. The measure ν = µ/µ(X ) defines a probability measure, so that for X ∼ ν, Jensen’s inequality implies R  R Z     b1 dν bk dν b1 (X) bk (X) adν f R ,..., R ≤ Eν a(X)f ,..., a(X) a(X) adν adν   Z 1 b1 (x) bk (x) = ,..., a(x)f dµ(x). µ(X ) a(x) a(x) R R R R Noting that bi dν/ adν = bi dµ/ adµ gives the result. We use this lemma and Proposition 1 to give Proposition 2. Proposition 1 implies  Df QP1 , . . . , QPk−1 ||QPk   = sup Df QP1 , . . . , QPk−1 ||QPk | P : P is a finite partition of Z . P MULTICLASS CLASSIFICATION, INFORMATION, AND SURROGATE RISK 57 It is consequently no loss of P generality to assume that Z is finite and k Z = {1, 2, . . . , m}. Let µ = i=1 Pi be a dominating measure and let pi = dPi /dµ. Letting q(j | x) = Q({j} | x) and qPi (j) = QPi ({j}), we obtain   m  X qP (i) qP1 (i) , . . . , k−1 qPk (i)f Df QP1 , . . . , QPk−1 ||QPk = qPk (i) qPk (i) i=1 R    m Z X (x), · · · , pk−1 (x)]dµ(x) X q(i | x)[p R 1 q(i | x)pk (x)dµ(x) f = X X q(i | x)pk (x)dµ(x) i=1   m Z X p1 (x) pk−1 (x) q(i | x)f ≤ ,..., pk (x)dµ(x) pk (x) pk (x) X i=1 by Lemma D.2. Noting that Pm i=1 q(i | x) = 1, we obtain our desired result. Stanford University Stanford, California 94305 E-mail: [email protected] [email protected] [email protected]
7cs.IT
arXiv:1512.07515v6 [math.GN] 16 Aug 2016 COUNTABLE TIGHTNESS AND G-BASES ON FREE TOPOLOGICAL GROUPS FUCAI LIN, ALEX RAVSKY, AND JING ZHANG Abstract. Given a Tychonoff space X, let F (X) and A(X) be respectively the free topological group and the free Abelian topological group over X in the sense of Markov. In this paper, we consider two topological properties of F (X) or A(X), namely the countable tightness and G-base. We provide some characterizations of the countable tightness and G-base of F (X) and A(X) for various special classes of spaces X. Furthermore, we also study the countable tightness and G-base of some Fn (X) of F (X). 1. Introduction Let F (X) and A(X) be respectively the free topological group and the free Abelian topological group over a Tychonoff space X in the sense of Markov [30]. For every n ∈ N, by Fn (X) we denote the subspace of F (X) that consists of all words of reduced length at most n with respect to the free basis X. The subspace An (X) is defined similarly. We always use G(X) to denote F (X) or A(X), and Gn (X) to Fn (X) or An (X) for each n ∈ N. Therefore, any statement about G(X) applies to F (X) and A(X), and about Gn (X) applies to Fn (X) and An (X). One of the techniques of studying the topological structure of free topological groups is to clarify the relations of subspaces X, F (X), A(X), Fn (X) and An (X), where n ∈ N. It is well known that only when the space X is discrete, F (X) and A(X) can be first-countable. Therefore, the space F (X) is first-countable if and only if X is discrete [20]. Similarly, the groups F (X) and A(X) are locally compact if and only if the space X is discrete [10]. More generally, P. Nickolas and M. Tkachenko proved that if one of the groups F (X) or A(X) is almost metrizable, then the space X is discrete [31]. Further, K. Yamada gave a characterization for a metrizable space X such that some the spaces Fn (X) and An (X) are first-countable [40]. Recently, Z. Li et al. in [27] proved that for each stratifiable k-space, the group F (X) is of countable tightness if and only if the space X is separable or discrete. In Section 3, we refine this result by giving a characterization of a space X such that the countable tightness of the space F8 (X) implies the countable tightness of the group F (X). Furthermore, since each space with the countable fan-tightness or the strong Pytkeev property is of countable tightness, we also discuss the topological properties of the countable fan-tightness and the strong Pytkeev property of free topological group F (X) or some Fn (X). Ferrando et al. in [12] introduced the concept of G-base in the frame of locally convex spaces. Now the concept of G-base plays an important role in the study of function spaces, see [7, 9, 15, 16, 17, 18, 19, 26]. From [16], we know that the strong Pytkeev property for general topological groups is closely related to the notion of a G-base. For instance, each topological group which is a k-space with a G-base has the strong Pytkeev property. In Section 4, we shall 2000 Mathematics Subject Classification. Primary 54H11, 22A05; Secondary 54E20; 54E35; 54D50; 54D55. Key words and phrases. Free topological group; free Abelian topological group; countable tightness; countable fan-tightness; G-base; strong Pytkeev property; universally uniform G-base. The first author is supported by the NSFC (Nos. 11571158, 11201414, 11471153), the Natural Science Foundation of Fujian Province (Nos. 2016J05014, 2016J01671, 2016J01672) of China and the project of Abroad Fund of Minnan Normal University. This paper was partially written when the first author was visiting the School of Computer and Mathematical Sciences at Auckland University of Technology from March to September 2015, and he wishes to thank the hospitality of his host. 1 2 FUCAI LIN, ALEX RAVSKY, AND JING ZHANG continuously discuss the properties of free topological groups with a G-base, which are motivated by the following interesting Questions 1.1 and 1.2. Question 1.1. [15, Question 4.17] Let X be a submetrizable kω -space. Does the group F (X) have a G-base? Question 1.2. [15, Question 4.15] For which X the groups A(X) and F (X) have a G-base? Recently, S.S. Gabriyelyan and J. Ka̧kol in the paper [17] and A.G. Leiderman, V.G. Pestov , A.H. Tomita in the paper [26] have given an answer to Questions 1.1 and 1.2 respectively. 2. Notations and Terminology In this section, we introduce the necessary notations and terminology. Throughout this paper, all topological spaces are assumed to be Tychonoff, unless otherwise is explicitly stated. For undefined notations and terminology, refer to [3], [11] and [21]. First of all, let N and Q denote the sets of positive integers and rational numbers, respectively. Let X be a topological space and A ⊆ X. The closure of a subspace A of X is denoted by A. The subspace A is called bounded if every continuous real-valued function f defined on the subspace A is bounded. If the closure of every bounded set in X is compact, then the space X is called µ-complete. The space X is called a cf -space if every compact subset of it is finite. The space X is called a k-space provided that a subset C ⊆ X is closed in X if and only if C ∩ K is closed in K for each compact subset K of the space X. In particular, the space X is called a kω -space if there exists a family of countably many compact subsets {Kn : n ∈ N} of X such that each subset F of the space X is closed in X if and only if F ∩ Kn is closed in Kn for each n ∈ N. A subset A of the space X is sequentially open if each sequence {xn }n∈N in X converging to a point of A is eventually in A. The space X is called sequential if every sequentially open subset of X is open. A space X is of countable tightness if whenever A ⊂ X and x ∈ A, there exists a countable set B ⊂ A such that x ∈ B. A space X is of countable fan-tightness [1] if T for any countable family {An : n ∈ N} of subsets of X satisfying x ∈ n∈N An , it is possible to S select a finite set Kn ⊂ An for each n ∈ N, in such a way that x ∈ n∈N Kn . A sequence {xn }, convergent to a point x of X, is called non-trivial, provided all points xn and x are mutually distinct. Let P be a family of subsets of a space X. The family P is called a network at a point x ∈ X if for each open neighborhood U of x in X there exists an element P ∈ P such that x ∈ P ⊂ U . The family P is called a cs-network [24] at a point x ∈ X if whenever a sequence {xn : n ∈ N} converges to the point x and U is an arbitrary open neighborhood of the point x in X there exist a number m ∈ N and an element P ∈ P such that {x} ∪ {xn : n > m} ⊆ P ⊆ U. The space X is called csf-countable if X has a countable cs-network at each point x ∈ X. We call the family P a cs∗ -network at a point x ∈ X [29] of X if whenever a sequence {xn : n ∈ N} converges to the point x and U is an arbitrary open neighborhood of the point x in X, there are an element P ∈ P and a subsequence {xni : i ∈ N} of {xn : n ∈ N} such that {x} ∪ {xni : i ∈ N} ⊆ P ⊆ U . Furthermore, the family P is called a k-network [32] if whenever K is a compact subset of X and U ⊂ X is S an arbitrary open set containing K then there is a finite subfamily P ′ ⊆ P such that K ⊆ P ′ ⊆ U . Recall that a regular space X is ℵ0 if X has a countable k-network. The family P is called a Pytkeev network [33] at a point x ∈ X if P is a network at x and for every open set U in X and a set A accumulating at x there exists P ∈ P such that P ⊂ U and P ∩ A is infinite; the family P is a Pytkeev network in X if P is a Pytkeev network at each point x ∈ X. The space X is said to have the strong Pytkeev property [37] if at each point of X there is a countable Pytkeev network. The space X is called P0 if X is regular and has a countable Pytkeev network. The following implications follow directly from definitions. However, none of them can be reversed. By [19, Proposition 4.1], we see that a space is first-countable if and only if it has the strong Pytkeev property and is of countable fan-tightness. COUNTABLE TIGHTNESS AND G-BASES ON FREE TOPOLOGICAL GROUPS ✲ csf -countable ✛ countable cs∗ -character ✛ ✻ ℵ0 -space ✻ strong Pytkeev property ✛ countable fan-tightness 3 P0 -space ❄ ✲ countable tightness ✻ sequential space ✲ k-space ✛ kω -space Definition 2.1. [21] A topological space X is a stratifiable space if X is T1 and, to each open U in X, on can assign a sequence {Un }∞ n=1 of open subsets of X such that ⊂ U ; (a) U Sn∞ (b) n=1 Un = U ; (c) Un ⊂ Vn whenever U ⊂ V . Note: Clearly, each metrizable space is stratifiable [21]. We consider the product NN with the natural partial order, i.e., α ≤ β if αi ≤ βi for each i ∈ N, where α = (αi )i∈N and β = (βi )i∈N . A topological space (X, τ ) has a small base [18] if there exist a subset M of NN and a family of open subsets U = {Uα : α ∈ M } in X such that U is a base for X and Uβ ⊂ Uα for all α, β ∈ M with α ≤ β. In particular, we say that (X, τ ) has a G-base [12] if M = NN . If a space has a G-base, then it has a countable cs∗ -character, see Proposition 4.7. Given a group G, the letter eG denotes the neutral element of G. If no confusion occurs, we simply use e instead of eG to denote the neutral element of G. Let X be a non-empty Tychonoff space. Throughout this paper, X −1 := {x−1 : x ∈ X} and −X := {−x : x ∈ X}, which are copies of X. Let e be the neutral element of F (X) (i.e., the empty word) L −1 L andn 0 be that of A(X). For every n ∈ N and an element (x1 , x2 , · · · , xn ) of (X X {e}) we call a word g = x1 x2 · · · xn a form.LIn the L Abelian case, a word x1 + x2 · · · + xn is also called a form for (x1 , x2 , · · · , xn ) ∈ (X −X {0})n . This word g is called reduced if it does not contains e or any pair of consecutive symbols of the form xx−1 or x−1 x. It follows that if the word g is reduced and non-empty, then it is different from the neutral element e of F (X). In particular, each element g ∈ F (X) distinct from the neutral element can be uniquely written in the form g = xr11 xr22 · · · xrnn , where n ≥ 1, ri ∈ Z \ {0}, xi ∈ X, r2 rn and xi 6= xi+1 for each i = 1, · · · , n − 1, and the support of g = xr11 xS 2 · · · xn is defined as supp(g) := {x1 , · · · , xn }. Given a subset K of F (X), we put supp(K) = g∈K supp(g). Similar assertions the obvious changes for commutativity) are valid for A(X). For every n ∈ N, let L (with L in : (X X −1 {e})n → FL the natural mapping defined by in (x1 , x2 , ...xn ) = x1 x2 ...xn n (X) beL for each (x1 , x2 , ...xn ) ∈ (X X −1 {e})n . WeL also useL the same symbol in the Abelian case, that is, it means the natural mapping from (X (−X) {0})n onto An (X). Clearly, each in is a continuous mapping. 3. The characterization of countable tightness in free topological groups In this section, we mainly discuss the countable tightness and countable fan-tightness of free topological groups. First, we give a characterization of a stratifiable k-space X such that F8 (X) has countable tightness (or, equivalently, F (X) has countable tightness). Then we show that a space X must belong to some special class of spaces if F4 (X) is of countable fan-tightness. The following theorem generalizes a result in [27]. Theorem 3.1. Let X be a stratifiable k-space. Then the following are equivalent: (1) F8 (X) is of countable tightness; (2) F (X) is of countable tightness; (3) The space X is separable or discrete. 4 FUCAI LIN, ALEX RAVSKY, AND JING ZHANG Proof. Since the equivalence (2) ⇔ (3) was proved in [27], it suffices to show that (1) ⇒ (3). Assume that X is neither separable nor discrete. Since each stratifiable space has Gδ diagonal, by Šneı̌der Theorem [35], each compact subspace of X is metrizable. Thus X is sequential. Since the space X is non-discrete, it contains a non-isolated point x ∈ X. This means that the set {x} is not sequentially open, that is, there exists a non-trivial convergent sequence. Hence take an arbitrary a non-trivial convergent sequence C := {xn : n ∈ N} ⊂ X with a limit point x. Moreover, assume that the space X contains no uncountable closed discrete subset. This means that the extend of the space X is countable. But, by [25], each stratifiable space is a σ-space, and a σ-space of countable extent is cosmic (that is, has countable network), and, therefore, separable. Obtained contradiction shows that there exists an uncountable discrete closed subset D := {dα : α ∈ ω1 } of X. Without loss of generality, we may assume that C ∩ D = ∅. For each α ∈ ω1 let fα : ω1 → ω be a function such that fα ↾α : α → ω is a bijection. For any distinct α, β ∈ ω1 , put Eα,β := {dβ xm x−1 dβ−1 dα xfα (β) x−1 d−1 α : m ≤ fα (β)}. Then put [ E := Eα,β . α,β∈ω1 ,α6=β Clearly, e 6∈ E, and e ∈ E by the proof of [41, Proposition 2.2]. In order to obtain a contradiction, it suffices to show that each countable infinite subset B ⊂ E is closed in F (X). Let Y := supp(B). The set Y contains the point x, so Y ⊂ C ∪ D ∪ {x}, which implies that F (Y ) is a k-space by [4, Theorem 3.7]. Since X is a stratifiable space and Y is closed in X, it follows from [34] that the subgroup F (Y, X) of F (X) generated L by Y is naturally topologically isomorphic to F (Y ). Then F (Y ) is a closed k-subspace in F (C D). Furthermore, we claim that for each compact subset K of F8 (Y ), the set K ∩ B is finite. Assume on the contrary that there is a compact subset K in F8 (Y ) such that K ∩ B is infinite. Clearly, the set K ∩ B is a bounded subset in F8 (Y ), hence the subspace supp(K ∩B) is bounded in Y by [4, Theorem 1.5]. Since the space Y is paracompact, supp(K ∩ B) is compact in Y . However, the set supp(K ∩ B) contains infinite many elements d′α s since B is infinite, which is a contradiction with the compactness of the subspace supp(K ∩ B). Therefore, the subset B is closed in F8 (Y ), that is, the subset B is closed in F (X). Hence F8 (X) is not of countable tightness since e ∈ E, which is a contradiction.  Obviously, we have the following corollary. Corollary 3.2. Let X be a stratifiable k-space. If F8 (X) has the strong Pytkeev property, then X is separable or discrete. L Remark 3.3. Let X := D K, where D is an uncountable discrete space and K is an infinite compact metric space. Then F3 (X) is first-countable by Theorem 4.5 in [40], hence it is of countable tightness. However, the space X is not separable and discrete. We do not know whether F4 (X) is of countable tightness. Therefore, we have the following Question 3.4. L Question 3.4. Let X := C D, where C is a non-trivial convergent sequence with its limit point and D is an uncountable discrete space. For each n ∈ {4, 5, 6, 7}, does Fn (X) have the countable tightness? Furthermore, we also do not know the answer to the following question. Question 3.5. Let X be a space. If F2 (X) is of countable tightness, does F3 (X) have the countable tightness? It is natural to ask whether Theorem 3.1 holds in the class of free Abelian topological groups. Next we shall give a partial answer to this question. Theorem 3.6. Let X be a stratifiable k-space. If A4 (X) is of countable tightness, then the set of all non-isolated points of X is a separable subspace in X. COUNTABLE TIGHTNESS AND G-BASES ON FREE TOPOLOGICAL GROUPS 5 Proof. Assume on the contrary that the set of all non-isolated points of X is not separable. Then the set of all non-isolated points of X is not an ℵ1 -compact space since X is a stratifiable space [21]. Therefore, there exists an uncountable closed discrete subset D := {dα : α < ω1 } in X, where each dα is a non-isolated point in X. Moreover, since X is a stratifiable k-space, it is paracompact (and, hence, collectionwise normal by [11, Th.5.1.17]) and sequential. Hence there exists a family of mutually disjoint open subsets {Uα : α < ω1 } of X such that dα ∈ Uα for each α < ω1 . Moreover, for each α < ω1 we L can take a non-trivial sequence {dα (n) : n ∈ N} ⊂ Uα convergent to a point dα . Let C(ω1 ) := α<ω1 ({dα (n) : n ∈ N} ∪ {dα }). Since X is stratifiable and C(ω1 ) is closed in X, it follows from [34] that the subgroup A(C(ω1 ), X) of A(X) generated by C(ω1 ) is naturally topologically isomorphic to the free Abelian topological group A(C(ω1 )). Then A4 (C(ω1 )) is topologically isomorphic to A(C(ω1 ), X) ∩ A4 (X), which implies that the tightness of A4 (C(ω1 )) is countable. However, it follows from [39, Theorem 3.2] and [23] that the tightness of A4 (C(ω1 )) is uncountable, which is a contradiction.  However, the converse of Theorem 3.6 does not hold, see [39, Theorem 3.2]. Moreover, the proof of the following result is similar to [41, Proposition 2.2], and thus, the proof is omitted in this paper. Theorem 3.7. For a stratifiable space X, if F8 (X) is a k-space, then X is separable or discrete. Next, we shall discuss the countable fan-tightness in free topological groups. In contrast to Theorem 3.1, we shall find that the situation changes dramatically for the countable fantightness in free topological groups. First, we shall give a characterization of a space X such that G(X) has the countable fan-tightness. Theorem 3.8. Let X be a space. Then G(X) has the countable fan-tightness if and only if the space X is discrete. Proof. We only consider F (X), as the proof of the case of A(X) is quite similar. Since the sufficiency is obvious, we shall prove only the necessity. In order to obtain a contradiction, assume the converse. Suppose that F (X) has a countable fan-tightness but the space X is not S T discrete. Clearly, e ∈ n∈N ( i≥n (Fi (X)) \ Fi−1 (X))). However, if for each natural n we take an S S arbitrary finite subset Dn ⊂ i≥n (Fi (X)) \ Fi−1 (X))), then an intersection ( n∈N Dn ) ∩ Fm (X) S will be finite for each natural m. Therefore n∈N Dn is closed and discrete in F (X) by [3, S Corollary 7.4.3]. Thus e 6∈ n∈N Dn , a contradiction.  It turns out that the countable fan-tightness of F4 (X) imposes strong restrictions on the space X. Recall that a subspace Y of a space X is said to be P-embedded in X if each continuous pseudometric on Y admits a continuous extensions over X. Theorem 3.9. Let X be a space. If F4 (X) has the countable fan-tightness, then X is either pseudocompact or a cf -space. Proof. Suppose X is not a cf -space. Then there exists an infinite compact subset C in X. Next we shall show that X is pseudocompact. Assume the converse. Then there exists a discrete family {Un : n ∈ N} of non-empty open subsetsSof the space X. It can be easily verified that the family {Un : n ∈ N} is also discrete, hence n∈N Un is closed in X. Since the set C is compact, it can intersect at most finitely many S Un ’s. Thus without loss of generality, we may assume that C ∩ n∈N Un = ∅. Then the family {C} ∪ {Un : n ∈ N} is discrete in X. Since C is an infinite compact set, it contains a non-isolated point x. For each n ∈ N, pick yn ∈ Un , and put Cn := yn−1 x−1 Cyn . Let [ Y := C ∪ {yn : n ∈ N}, and Z := Cn . n∈N Obviously, the set Y is closed, σ-compact and non-discrete in X. Moreover, Y is P -embedded in X by [36]. By [34], the subgroup F (Y, X) of F (X) generated by Y is naturally topologically 6 FUCAI LIN, ALEX RAVSKY, AND JING ZHANG isomorphic to F (Y ). Moreover, since Y is a kω -space, it follows from [3, Theorem 7.4.1] that F (Y ) is also a kω -space. Hence F4 (Y ) is also a kω -space. Next, we claim that Z is closed in F4 (Y ). Indeed, for each n ∈ N, let Kn := C ∪ C −1 ∪ {yi , yi−1 : i ≤ n} ∪ {e} and n z }| { Xn := Kn · . . . · Kn . Then it follows from the proof of [3, Theorem 7.4.1] that the topology of F (Y ) is determined by the family of compact subsets {Xn : n ∈ N}, hence the topology of F4 (Y S)n is determined by the family {Xn ∩ F4 (Y ) : n ∈ N}. Therefore, we have Z ∩ Xn ∩ F4 (Y ) = i=1 Ci for each n ∈ N, which shows that Z is closed in F4 (Y ). Therefore, Z has the countable fan-tightness. Moreover, T it is easy to see that e ∈ Cn \ {e} for each n ∈ N, that is, e ∈ n∈N Cn \ {e}. Now, if for each S S natural n, Fn ⊂ Cn \ {e} is a finite subset, then e 6∈ n∈N Fn = n∈N Fn , because the topology of Z is determined by the family {Cn : n ∈ N}, a contradiction.  Corollary 3.10. Let X be a µ- and k-space. If F4 (X) has the countable fan-tightness, then X is either compact or discrete. L Remark 3.11. By L Theorems 3.1 and 3.9, it is easy to see that F (C D) has the countable tightness and F4 (C D) does not have the countable fan-tightness, where C is a non-trivial convergent L sequence with its limit point and D is a countable infinite discrete space. However, F3 (C D) has the countable fan-tightness by Remark 3.3. L Therefore, we can not replace L “F4 (X)” with “F3 (X)” in Theorem 3.9. Furthermore, F (C D) is a P0 -space since F (C D) is an k-space with a countable k-network. Finally, we shall discuss the strong Pytkeev property in free topological groups. It is well known that if a space has the strong Pytkeev property then it is of countable tightness and is csf -countable. In [6], the authors showed that a space is first-countable if and only if it has the strong Pytkeev property and countable fan-tightness. Therefore, it is interesting to discuss the strong Pytkeev property on free topological groups. First, we shall give a theorem which has just been proved in [28]. Recall that a space X is said to be Lašnev if it is the closed image of some metric space. Theorem 3.12. [28] Let X be a non-discrete Lašnev space. Then F4 (X) is of csf -countable if and only if F (X) is an ℵ0 -space. Theorem 3.13. Let X be a non-discrete Lašnev space. Then F (X) has the strong Pytkeev property if and only if F (X) is a P0 -space. Proof. Obviously, it suffices to show the necessity. Suppose that F (X) has the strong Pytkeev property. By Theorem 3.12, the group F (X) is an ℵ0 -space, hence F (X) is separable. It follows from [17, Theorem 1.7] that F (X) is a P0 -space.  We do not know whether an ℵ0 -space with the the strong Pytkeev property is a P0 -space. If this answer is positive, then we can replace “F (X) has the strong Pytkeev property” by “F4 (X) has the strong Pytkeev property” in Theorem 3.13. In [5], T. Banakh posed the following problem. Problem 3.14. [5] Let X be a (sequential) P0 -space. Is the free topological group over X a P0 -space? But we even do not know an answer to the following question. Question 3.15. Let X be the rational number subspace Q with the usual topology. Is the free topological group over X a P0 -space? COUNTABLE TIGHTNESS AND G-BASES ON FREE TOPOLOGICAL GROUPS 7 However, we have the following result. Theorem 3.16. Let X be a P0 -space. Then F (X) is the union of countably many P0 -subspaces. L −1 L Proof. For each n ∈ N, it follows from [5, Corollary 3.12] that (X X {e})n is a P0 -space. For each n ∈ N, since the mapping in ↾i−1 (Fn (X)\Fn−1 (X)) : i−1 n (Fn (X) \ Fn−1 (X)) → Fn (X) \ Fn−1 (X) k is a homeomorphism, follows from [5, Corollary 3.12] that i−1 n (Fn (X) \ Fn−1 (X)) is a P0 L −1itL subspaceSin (X X {e})n , hence Fn (X) \ Fn−1 (X) is a P0 -subspace in F (X). Since F (X) = n∈N (Fn (X) \ Fn−1 (X)), F (X) is the union of disjoint countably many P0 -subspaces.  For closing this section, we discuss the strong Pytkeev property in topological spaces. It is well known that in the class of regular countably compact spaces the property of countable tightness is equivalent to the countable fan-tightness [2, Corollary 2]. Moreover, each compact sequential non-first-countable space is of countable tightness, hence it does not have the strong Pytkeev property. Hence in the class of regular countably compact spaces the property of countable tightness is not equivalent to the strong Pytkeev property. Moreover, it is well known that there exists a countably compact non-metrizable space with a point-countable k-network. It is natural to ask whether in the class of regular countably compact spaces the existence of a point-countable k-network implies the existence of a point-countable Pytkeev network. The answer is also negative, see Example 3.17. Example 3.17. There exists an infinite countably compact space X which satisfies the following conditions: (1) The space X contains no infinite compact subset; (2) The space X has a point-countable k-network; (3) The space X does not have the strong Pytkeev property. Proof. By [14], there exists an infinite, countably compact subspace X of βN, the Stone-Cech compactification of the of the space of natural numbers endowed with discrete topology, such that N ⊂ X and every compact subset of the space X is finite. Therefore, the space X has a point-countable k-network. However, the space X does not have the strong Pytkeev property, see [5].  From the opposite side, recently, Z. Cai and S. Lin has proved that each sequentially compact space with a point-countable k-network is metrizable [8]. Remark, that the proof of [6, Proposition 1.4], implies that the space X has a point-countable k-network provided it has a point-countable Pytkeev network. So the next theorem is a counterpart of this result. Theorem 3.18. Let X be a Hausdorff countably compact space with a point-countable Pytkeev network. Then the space X is a metrizable compact space. Proof. Let N be a point-countable Pytkeev network on the space X. We first show the following claim. Claim: For each countably compact subset KSof X and arbitrary open subset U with K ⊂ U , there exists a finite subfamily F such that K ⊂ F ⊂ U . Suppose not. For each x ∈ K, let {N ∈ N : x ∈ N } = {Nn (x) : n ∈ ω}. Inductively choose xn ∈ K such that xn 6∈ Nj (xi ) for i, j < n. Put A := {xn : n ∈ ω}. Since K is countably compact and A ⊂ K, the set A has a cluster point x⋆ in K. By the definition of Pytkeev network, it follows that there exists some N ∈ N such that N contains infinitely many xn ’s. Therefore, we have N = Nj (xi ) for some i and j, and there exists n > i, j such that xn ∈ Nj (xi ), contradicting the way the xn ’s were chosen. By Claim and [22, Theorem 4.1], the space X is metrizable (and thus compact).  8 FUCAI LIN, ALEX RAVSKY, AND JING ZHANG 4. Free topological groups with a G-base In this section, we shall discuss the properties of free topological groups with a G-base, which are motivated by Questions 1.1 and 1.2. First, we recall a lemma. Then we shall give a characterization of free topological groups which are k-spaces having a G-base. Let TGG be the class of all topological groups having a G-base. Lemma 4.1. [15] (1) The group (2) The group (3) The group Let G ∈ TGG . Then the following are equivalent: G is a k-space; G is a sequential space; G is metrizable or contains a submetrizable open kω -subgroup. By Lemma 4.1, we know that the k-property and sequentiality are equivalent in the class of all topological groups having a G-base. In [15], the authors also said that “It would be interesting to know whether the k-property and sequentiality are equivalent for the class of all topological groups having countable cs∗ -character”. Indeed, the answer is negative, see the following example. Example 4.2. There exists a topological group G such that it is a k-space with a countable cs∗ -character. However, G is not sequential. Proof. Let X be the Stone-Čech compactification βD of any infinite discrete space D. Let G := F (X) or G := A(X). Obviously, the group G is a k-space by [3, Theorem 7.4.1]. It follows from a result of [28] that G is of countable cs∗ -character. However, it is well known that βD is not a sequential space. Since βD is closed in G, the free topological group G is not sequential.  However, the topological group G in the proof of Example 4.2 does not have the strong Pytkeev property by Example 3.17, hence it is natural to pose the following question. Question 4.3. Let a topological group G be a k-space. If G has the strong Pytkeev property, is it sequential? In [17], the authors gave an affirmative answer to Question 1.1. The following theorem complements it. Theorem 4.4. Let X be a space. Then F (X) is a k-space with a G-base if and only if either X is discrete or X is a submetrizable kω -space. Proof. The sufficiency was proved in [17]. It suffices to show the necessity. Let F (X) be a k-space with a G-base. Then it follows from Lemma 4.1 that F (X) is metrizable or contains a submetrizable open kω -subgroup. If F (X) is metrizable, then it is well known that X is discrete. Hence we may assume that F (X)Lis non-metrizable, and then F (X) contains a submetrizable open kω -subgroup. Then F (X) = α∈Γ Gα , where each Gα is a submetrizable open kω -subset in F (X). Since each Gα has a countable k-network, it follows that F (X) has a σ-compact finite k-network. Moreover, it is obvious that F (X) is locally Lindelöf. It is well known that a locally Lindelöf topological group is paracompact [3, Problem 3.2.A], then X is paracompact since X is closed in F (X). Thus X is a paracompact space with a σ-compact finite k-network. Since F (X) is a non-metrizable k-space, it follows from [27, Theorem 4.14] that X has a countable k-network, hence X is Lindelöf and submetrizable. Therefore, it is easy to see that X is a submetrizable kω -space.  Remark 4.5. However, there exists a space L X such that A(X) is a k-space with a G-base and X is not a Lindelöf-space. Indeed, let X := C D, where C is a non-trivial convergent sequence with its limit point and D is an uncountable discrete space D. Then A(X) ∼ = A(C) × A(D), thus A(X) is a k-space. Since both A(X) and A(D) have G-bases, it follows from [15] that A(S) × A(D) has a G-base. However, it is obvious that X is not Lindelöf, hence it is not a kω -space. COUNTABLE TIGHTNESS AND G-BASES ON FREE TOPOLOGICAL GROUPS 9 By Remark 4.5, we see that we can not replace “F (X)” by “A(X)” in Theorem 4.4. However, we have the following theorem when we add some additional assumption on the space X. Theorem 4.6. Let X be a separable space. Then A(X) is a k-space with a G-base if and only if X is either countable discrete or a submetrizable kω -space. Proof. We adapt the proof of Theorem 4.4 for the group A(X) instead of F (X). It suffices to show that X is a submetrizable kω -space if A(X) is a non-metrizable k-space with a G-base. Since X is separable, A(X) is separable. Similarly to the proof of Theorem 4.4, we see that the index set Γ in Theorem 4.4 is countable. Therefore, A(X) has a countable k-network, and then X is a submetrizable kω -space.  Next we consider the topological properties of X such that the free topological group over X has a G-base. By the proof of [15, Theorem 3.12], we can easily obtain the following proposition. Proposition 4.7. If a space X has a G-base at point x ∈ X, then X is of countable cs∗ character at x. Therefore, we have the following proposition. Proposition 4.8. Let X be a space. If each Gn (X) has a G-base at point e, then G(X) is csf -countable. Proof. It suffices to note that for each compact subset K in G(X) there exists an n ∈ N such that K ⊂ Gn (X), see [3, Corollary 7.4.4].  An answer to the following question is still unknown for us. Question 4.9. Let X be a space. If each Gn (X) has a G-base at e, does G(X) have a G-base? Theorem 4.10. Let X be a collectionwise normal space containing a non-trivial convergent sequence. If F (X) has a G-base, then X is ℵ1 -compact. Proof. Suppose that X is not ℵ1 -compact. Hence there exists an uncountable closed discrete subset D in X. Moreover, by the assumption, there exists a non-trivial convergent sequence S with its limit point in X. Without loss of generality, we may assume that S ∩ D = ∅. Let Y = S ∪ D. Since X is collectionwise normal, the subspace Y is a retract of X, and then Y is P -embedded in X [3, Exercises 7.7.a]. By [34], the subgroup F (Y, X) of F (X) generated by Y is naturally topologically isomorphic to F (Y ). However, F (Y ) is not of csf -countable by a result in [28], thus F (Y ) is not cs∗ -countable. Then F (X) is not cs∗ -countable. However, since F (X) has a G-base, it follows from Proposition 4.7 that F (X) is cs∗ -countable, which is a contradiction.  Corollary 4.11. Let X be a stratifiable k-space. If F (X) has a G-base, then X is either discrete or separable. Proof. Assume that X is not discrete. Since a stratifiable k-space is paracompact and sequential, X is ℵ1 -compact by Theorem 4.10. By [25], each stratifiable space is a σ-space, and each ℵ1 compact σ-space is cosmic, and, therefore, separable.  Recently, A.G. Leiderman, V.G. Pestov and A.H. Tomita in [26] showed the following two results: Theorem 4.12. [26] The free Abelian topological group A(X) on a uniform space X has a G-base if and only if X has a G-base. Corollary 4.13. [26] Let X be a metrizable space and the set of all non-isolated points of X is a σ-compact subset of X. Then A(X) has a G-base. 10 FUCAI LIN, ALEX RAVSKY, AND JING ZHANG For a metrizable space X, it follows from [4] that A(X) is a k-space if and only if X is a locally compact space and the set of all non-isolated points of X is separable. From Corollary 4.13, it is easy to see that there exists a space Y which is not a k-space such that A(Y ) has a G-base. However, the situation changes much for (non-Abelian) free topological groups. Let X = L C D, where C is a non-trivial convergent sequence with the limit point and D is a closed discrete space of cardinality ℵ1 . From [28], F4 (X) is not csf -countable, hence F4 (X) does not have a G-base. In particular, we see that F (X) does not have a G-base. However, we have the following Theorem 4.15. By a similar proof of [15, Proposition 2.7], we can obtain the following proposition. Proposition 4.14. Q Suppose that, for each n ∈ N, Xn is a space with a G-base. Then the countable product n∈N Xn has a G-base. Given a uniformizable space X there is a finest uniformity on X compatible with the topology of X called the fine uniformity or universal uniformity. A Tychonoff space X is said to have a uniform G-base if there exists a uniform structure U on X, which induces the topology of X, such that U has a G-base. In particular, if U is the universal uniformity on X with a uniform G-base, then we say that X has an universally uniform G-base. Theorem 4.15. Let X have an universally uniform G-base. Then F2 (X) has a G-base at each point. Proof. Since X has an universally uniform G-base,Lit is easy L to see X has a local G-base at each point. By Proposition 4.14, we see that (X X −1 {e})2 has a local G-base at each point. Then F2 (X) has a local G-base at each point x ∈ X ∪ X −1 since X ∪ X −1 is open andL closed L in F2 (X). It is well known that F2 (X) \ F1 (X) is homeomorphic to a subspace of (X X −1 {e})2 , and then F2 (X) has a local G-base at each point x ∈ F2 (X) \ F1 (X) since F2 (X) \ F1 (X) is open in F2 (X). It suffices to show that F2 (X) has a G-base at e. Suppose that U is the universally uniformity on X. Then one can take a basis B = {Uα : α ∈ NN } for U such that for any α and β in NN with α ≤ β, we have Uβ ⊂ Uα . For each α ∈ NN , let Wα = {xε y −ε : (x, y) ∈ Uα , ε = ±1}. Then the family {Wα : α ∈ NN } is a base at e in F2 (X) by [40]. Obviously, {Wα : α ∈ NN } satisfies that for any α and β in NN with α ≤ β, Wβ ⊂ Wα . Therefore, {Wα : α ∈ NN } is a local G-base at e.  However, the following question is still unknown for us. Question 4.16. Let X be a space. If F2 (X) has a G-base, does F3 (X) have a G-base? Acknowledgements. The authors wish to thank professors Salvador Hernández and Boaz Tsaban for telling us some information of the paper [9]. Moreover, the authors wish to thank professor Chuan Liu for reading parts of this paper and making comments. Finally, we hope to thank professor Shou Lin for finding a gap in our proof of Theorem 3.18 in the previous version and giving some key for us to supplement the proof. References [1] A.V. Arhangel’skiı̌, Hurewicz spaces, analytic sets and fan-tightness of spaces of functions, Soviet Math. Dokl., 33(2)(1986), 396–399. [2] A.V. Arhangel’skiı̌, A. Bella, Countable fan-tightness versus countable tightness, Comment. Math. Univ. Carolinae, 37(3)(1996), 567–578. [3] A.V. Arhangel’skiı̌, M.G. Tkachenko, Topological Groups and Related Structures, Atlantis Press and World Sci., Paris, 2008. [4] A.V. Arhangel’skiı̌, O.G. Okunev, V.G. Pestov, Free topological groups over metrizable spaces, Topology Appl., 33(1989), 63–76. [5] T. Banakh, P0 -spaces, Topology Appl., 195(2015), 151–173. [6] T. Banakh, The strong Pytkeev property in topological spaces, http://arXiv:1412.4268v1. [7] T. Banakh, ω ω -bases in topological and uniform spaces, http://arxiv:1607.07978v1. [8] Z. Cai, S. Lin, Sequentially compact spaces with a point-countable k-network, Topology Appl., 193(2015), 162–166. COUNTABLE TIGHTNESS AND G-BASES ON FREE TOPOLOGICAL GROUPS 11 [9] C. Chis, M. Vincenta Ferrer, Salvador Hernández, Boaz Tsaban, The character of topological groups, via bounded systems, Pontryagin-van Kampen duality and pcf theory, J. Algebra, 420(2014), 86–119. [10] R.M. Dudley, Continuity of homomorphisms, Duke Math. J., 28(1961), 587–594. [11] R. Engelking, General Topology (revised and completed edition), Heldermann Verlag, Berlin, 1989. [12] J.C. Ferrando, J. Ka̧kol, M. López Pellicer, S.A. Saxon, Tightness and distinguished Fréchet spaces, J. Math. Anal. Appl., 324(2006), 862–881. [13] P. Fletcher, W.F. Lindgren, Quasi-uniform spaces, Marcel Dekker, New York, 1982. [14] Z. Frolı́k, Generalizations of the G-property of complete metric spaces, Czech. Math. J., 10(1960), 359–379. [15] S.S. Gabriyelyan, J. Ka̧kol, A. Leiderman, On topological groups with a small base and metrizability, Fund. Math., 229(2015), 129–158. [16] S.S. Gabriyelyan, J. Ka̧kol, A. Leiderman, The strong Pytkeev property for topological groups and topological vector spaces, Monatsh Math., 175(2014), 519–542. [17] S.S. Gabriyelyan, J. Ka̧kol, On topological spaces and topological groups with certain local countable networks, Topology Appl., 190(2015), 59–73. [18] S.S. Gabriyelyan, J. Ka̧kol, A. Kubzdela and M. Lopez Pellicer, On topological properties of Fréchet locally convex spaces with the weak topology, Topology Appl., 192(2015), 123–137. [19] S.S. Gabriyelyan, J. Ka̧kol, On B-space and related concepts, Topology Appl., 191(2015), 178–198. [20] M.I. Graev, Free topological groups, In: Topology and Topological Algebra, Translations Series 1, vol. 8 (1962), pp. 305–364. American Mathematical Society. Russian original in: Izvestiya Akad. Nauk SSSR Ser. Mat., 12(1948), 279–323. [21] G. Gruenhage, Generalized metric spaces, In: K. Kunen, J. E. Vaughan(Eds.), Handbook of Set-Theoretic Topology, Elsevier Science Publishers B.V., Amsterdam, 1984, 423–501. [22] G. Gruenhage, E.A Michael, Y. Tanaka, Spaces determined by point-countable covvers, Pacific J. Math., 113(1984), 303–332. [23] G. Gruenhage, Y. Tanaka, Products of k-spaces and spaces of countable tightness, Trans. Amer. Math. Soc., 273(1982), 299–308. [24] J.A. Guthrie, A characterization of ℵ0 -spaces, General Topology Appl., 1(1971), 105–110. [25] Y. Kanatani, N. Sasaki, J. Nagata, New characterizations of some generalized metric spaces, Math Japonica, 30(1985), 805–820. [26] A.G. Leiderman, V.G. Pestov , A.H. Tomita, On topological groups admitting a base at indentity indexed with ω ω , http://arxiv: 1511.07062v1. [27] Z. Li, F. Lin, C. Liu, Networks on free topological groups, Topology Appl., 180(2015), 186–198. [28] F. Lin, C. Liu, J. Cao, Weak Countability Axioms in Free Topological Groups, submitted. [29] S. Lin, Y. Tanaka, Point-countable k-networks, closed maps, and related results, Topology Appl., 59(1994), 79–86. [30] A.A. Markov, On free topological groups, Izv. Akad. Nauk SSSR Ser. Mat., 9(1945), 3–64 (in Russian); Amer. Math. Soc. Transl., 8(1962), 195–272. [31] P. Nickolas, M. Tkachenko, Local compactness in free topological groups, Bull. Austral. Math. Soc., 68(2)(2003), 243–265. [32] P. O′ Meara, On paracompactness in function spaces with the compact-open topology, Proc. Amer. Math. Soc.,29(1971), 183–189. [33] E.G. Pytkeev, Maximally decomposable spaces, Trudy Mat. Inst. Steklov., 154(1983), 209–213. [34] O.V. Sipacheva, Free topological groups of spaces and their subspaces, Topology Appl., 101(2000), 181–212. [35] V. Šneı̌der, Continuous images of Souslin and Borel sets; metrization theorems, Dokl. Acad. Nauk USSR, 50(1945), 77–79. [36] M. G. Tkachenko, On a spectral decomposition of free topological groups, Usp. Mat. Nauk, 39(2)(1984), 191–192. [37] Boaz Tsaban, L. Zdomskyy, On the Pytkeev property in spaces of continuous functions (II), Houston J. Math., 35(2009), 563–571. [38] K. Yamada, Characterizations of a metrizable space such that every An (X) is a k-space, Topology Appl., 49(1993), 74–94. [39] K. Yamada, Tightness of free Abelian topological groups and of finite product of sequntial fans, Topology Proc., 22(1997), 363–381. [40] K. Yamada, Metrizable subspaces of free topological groups on metrizable spaces, Topology Proc., 23(1998), 379–409. [41] K. Yamada, The natural mappings in and k-subspaces of free topological groups on metrizable spaces, Topology Appl., 146-147(2005), 239–251. 12 FUCAI LIN, ALEX RAVSKY, AND JING ZHANG (Fucai Lin): School of mathematics and statistics, Minnan Normal University, Zhangzhou 363000, P. R. China E-mail address: [email protected]; [email protected] (Alex Ravsky): Pidstrygach Institute for Applied Problems of Mechanics and Mathematics of NASU, Naukova 3b, Lviv, 79060, Ukraine E-mail address: [email protected] (Jing Zhang): School of mathematics and statistics, Minnan Normal University, Zhangzhou 363000, P. R. China E-mail address: [email protected]
4math.GR
Approximately Optimal Continuous-Time Motion Planning and Control via Probabilistic Inference Mustafa Mukadam, Ching-An Cheng, Xinyan Yan, and Byron Boots arXiv:1702.07335v2 [cs.RO] 27 Feb 2017 2D Environment Abstract— The problem of optimal motion planing and control is fundamental in robotics. However, this problem is intractable for continuous-time stochastic systems in general and the solution is difficult to approximate if non-instantaneous nonlinear performance indices are present. In this work, we provide an efficient algorithm, PIPC (Probabilistic Inference for Planning and Control), that yields approximately optimal policies with arbitrary higher-order nonlinear performance indices. Using probabilistic inference and a Gaussian process representation of trajectories, PIPC exploits the underlying sparsity of the problem such that its complexity scales linearly in the number of nonlinear factors. We demonstrate the capabilities of our algorithm in a receding horizon setting with multiple systems in simulation. Robot View (a) I. I NTRODUCTION A fundamental goal in robotics is to efficiently compute trajectories of actions that drive a robot to achieve some desired behavior. We seek a control policy in a multi-stage decision problem [1] that can maximize performance indices that describe, for example, the smoothness of motion, energy consumption, or the likelihood of avoiding an obstacle. Hierarchical planning and control has been used to solve this problem in practice [2]. The idea is to first generate a desired state sequence [3]–[9] without considering full system dynamics, and then design a robust low-level controller for tracking. Because the dynamic constraints are relaxed, it becomes possible for an algorithm to plan a trajectory that satisfies complicated, higher-order performance indices [8]– [10], offering greater flexibility in system design. Samplingbased planning techniques can even provide formal guarantees such as probabilistically complete solutions [3], [4]. However, recent work has started to challenge this classical viewpoint by incorporating more dynamic constraints within trajectory planning in search of solutions with improved optimality [11], [12]. A theoretically elegant approach would be to address both the planning and control problems within a stochastic optimal control framework. Unfortunately, since the states and actions are coupled through system dynamics, exact solutions become intractable with the exception of simple cases known as linearly solvable problems [13].1 These challenges have motivated researchers to find approximate solutions rather than directly approximating the original problems with hierarchical approaches. One simple Mustafa Mukadam, Ching-An Cheng, Xinyan Yan, and Byron Boots are affiliated with the Institute for Robotics and Intelligent Machines, Georgia Institute of Technology, Atlanta, GA 30332, USA. {mmukadam3, cacheng, xyan43}@gatech.edu, [email protected]. 1 Affine systems with quadratic instantaneous control cost, or fully controllable discrete-time systems. (b) (c) Fig. 1: PIPC used on (a) a 2D holonomic robot (blue) to reach goal (red) in a 2D environment with dynamic obstacles, where executed trajectory is in green and current planned horizon is in black, (b) a 7-DOF WAM arm, and (c) a PR2’s right arm where the semitransparent arm is the goal configuration and dotted blue end effector trajectory is the current planned horizon. approach is direct policy search [14], [15], which uses first-order information to find a locally optimal policy. To improve the convergence rate, differential dynamic programming (DDP) has been widely adopted as the foundation of locally optimal algorithms [16]–[18], which solve local linear-quadratic Gaussian (LQG) subproblems and iteratively improve these suboptimal solutions. However, for continuous-time systems, these algorithms would require inefficient high-frequency sampling to construct the LQG subproblems, even when the given problem is close to a LQG (e.g. a performance index with only a small set of nonlinear factors, or dynamics with a small amount of nonlinearity). Compared with the hierarchical approach, these algorithms impose a strict structural assumption: they are only applicable to problems that measure performance as an integral of instantaneous functions. In this paper, we propose a novel approximately optimal approach to continuous-time motion planning and control that can handle costs expressed as arbitrary higher-order nonlinear factors and exploit a problem’s underlying sparse structure. Specifically, we consider problems with a performance index expressed as the product of an exponential- quadratic factor for instantaneous costs and a finite number of possibly higher-order nonlinear factors, and provide an algorithm that has linear complexity in the number of nonlinear factors. Moreover, we show the approximately optimal policy can be computed by posterior inference on a probabilistic graphical model, which is a dual to the performance index. We convert these theoretical results into a practical algorithm called Probabilistic Inference for Planning and Control (PIPC) that recursively updates the approximately optimal policy as more information is encountered. To evaluate our approach, we employ PIPC on both Markov decision processes (MDPs) and partially-observable MDPs (POMDPs) in dynamic environments with multiple simulated systems (see Fig. 1). {z0 , u0 , zδt , · · · , zt } be the history of observations and actions until time t.2 As shorthand, we use boldface to denote the time trajectory of a variable, and π(u|h) to denote the collection of time-varying causal (stochastic) policies πt (ut |ht ) for all t. We formulate the motion planning and control problem as a finite-horizon stochastic optimization problem over π. Let pπ be the distribution of x and u under the stochastic policy π and system dynamics, and S be a finite set of time indices. Here the goal is to find an optimal policy π to maximize the performance index " # Y max J(x0 ) = max Epπ ψ(x, u) φS (xS , uS ) . (1) A. Related Work The objective function in (1) is defined as the expectation of the product of two types of factors: a Gaussian process factor ψ(·) and a higher-order nonlinear factor φS (·). These two factors, described below, cover many interesting behaviors that are often desired in planning and control problems. Our algorithm contributes to a growing set of research that seeks to reframe planning and control problems as probabilistic inference [19]. Work in this area has formed a new class of approximately optimal algorithms that leverage tools from approximate probabilistic inference, including expectation propagation [20] and expectation maximization [21], [22]. A common framework based on KL-minimization [23], [24] summarizes the above algorithms as well as approaches like path-integral control [13]. We contribute to this field in the following ways. First, we extend the performance index for control algorithms to incorporate nonlinear factors with arbitrary higher-order connections in time. In contrast to our approach, the methods mentioned above generally assume that the performance indices factor into instantaneous terms, and thus require dense sampling to solve continuous-time problems. Second, we provide a new approach to derive a Gaussian approximation based on Laplace approximation and Gaussian processes. Third, we define a new class of optimal control problems, called gLEQG (generalized Linear-Exponential-QuadraticGaussian), that are solvable after being transformed into their dual probabilistic representation. In particular, we show that gLEQG admits a solution given by posterior inference. This theoretical result, discussed in Section III-C, closes the gap in the duality between optimal control and inference. This rest of the paper is structured as follows. We begin in Section II by defining the objective function in joint planning and control problems. Then, in Section III, we present our main results in approximately optimal motion planning and control. In Section IV, these theoretical results are summarized into an online algorithm PIPC that can perform simultaneous planning and control for partially observable stochastic linear systems in dynamic environments. To validate our algorithm, we present the implementation details and experimental results in Section V and Section VI. Finally, Section VII concludes the paper. II. T HE P ROBLEM OF M OTION P LANNING AND C ONTROL We begin by introducing some notation. Let xt , ut , and zt be the state, action, and observation of a continuoustime partially-observable system at time t, and let ht = π π S∈S A. Higher-order Nonlinear Factors φS (·) We define factors of the form φS (·) = exp(−kfS (·)k2 ), (2) to model nonlinear, higher-order couplings frequently used in planing problems, where fS (·) is a differentiable nonlinear function defined on a finite number of time indices S ∈ S. The structure of φS (·) can model many performance indices in planning: for example, a simple nonlinear cost function at a single time instance, a penalty based on the difference between the initial and the terminal states/actions, a penalty to enforce consistency across landmarks in time, or the cost of a robot-obstacle collision. As each factor φS (·) depends only on a finite number of states or actions, we refer to the corresponding states xS and actions uS as support states or support actions. B. Gaussian Process Factors ψ(·) The Gaussian process factor ψ(·) is a generalization of the exponential-of-integral cost function in the optimal control literature [25]. To illustrate, here we consider a special case ψ(·) = ψ(u). A joint factor between x and u as in (1) can be defined similarly. u Let GPu (ut |mut , Kt,t 0 ) be a Gaussian process [26], where 0 u u ∀t, t ∈ R, E[ut ] = mut and C[ut , ut0 ] = Kt,t 0 . Let Pt,t0 be u the (positive definite) RGreen’s function of Kt,t0 satisfying, u u ∀t, t0 ∈ R, δt,t0 = Kt,s Ps,t 0 ds, where δ is the Dirac delta distribution and the integral is over the length of the trajectory. We define the Gaussian process factor ψ(u) as  ZZ  u u 0 0 (us0 − ms0 )dsds ψ(u) = exp − (us − mus )T Ps,s . (3) Loosely speaking, we call (3) the probability of a trau jectory u from GPu (ut |mut , Kt,t 0 ). Note that this notation 2 Here we assume the measurements z are taken in discrete time at time t t with sampling interval δt, and ut is a constant continuous-time trajectory in time [t, t + δt). does not necessarily imply that u is a sample path of u GPu (ut |mut , Kt,t 0 ); rather, we use (3) as a metric between u u and m . Intuitively, the maximization in (1) encourages u to be close to mu in terms of the distance weighted by u Pt,t 0. Solving a stochastic optimization problem with (3) in the u objective function is intractable in general, because Pt,t 0 is only implicitly defined. However, here we show that when GPu is the sum of a Gaussian white noise process and a linearly transformed Gauss-Markov process, the problem is not only tractable but can also extend the classical exponentialof-integral cost to model higher-order behaviors. u This is realized by defining GPu (ut |mut , Kt,t 0 ) through a linear stochastic differential equation (SDE). Let yt be the hidden state of ut (e.g. its higher-order derivatives) and p(y0 ) = N (y0 |my0 , K0y ) be its prior. We set u GPu (ut |mut , Kt,t 0 ) as the solution to dyt = (Dyt + η)dt + Gdω ut = Hyt + rt + νt (4) in which D, η, G, H are (time-varying) system matrices, rt is control bias, dω is a Wiener process, and νt is a Gaussian white noise process GPν (0, Qν δt,t0 ). In other u words, the Gaussian process GPu (ut |mut , Kt,t 0 ) has mean and covariance functions: mut = rt + Hmyt u Kt,t 0 = Qν δt,t0 + y T HKt,t 0H (5) (6) y in which GPy (myt , Kt,t 0 ) is another Gaussian process with Z t y y mt = Φy (t, t0 )m0 + Φy (t, s)ηs ds (7) t0 y y 0 T Kt,t 0 = Φy (t, t0 )K0 Φy (t , t0 ) + Z min(t,t0 ) Φy (t, s)Gs GTs Φy (t0 , s)T ds (8) t0 and Φy (t, s) is the state transition matrix from s to t with respect to D. For derivations, please refer to [27] and therein. The definitions (5) and (6) contain the exponential-ofintegral cost [25]  Z  ψ(u) = exp − (us − rs )T Q−1 (u − r )ds s s ν as a special case, which can be obtained by setting H = 0 u −1 (i.e. Pt,t 0 = Qν ). In general, it assigns the action ψ(u) to be close to r, even in terms of higher-order derivatives (or their hidden states). This leads to a preference toward smooth control signals. By extension, a joint factor between x and u would also encourage smooth state trajectories (i.e. smaller higher-order derivatives of the state). Constructing the Gaussian process factor by SDE results in one particularly nice property: If we consider the joint Gaussian process of yt and ut , then its Green’s function is sparse. To see this, let θt = (ut , yt ) and θ = {θ1 , θ2 , . . . , θN } and define ψ(θ) as its Gaussian process factor similar to (3). Then the double integral in ψ(θ) can be broken down into the sum of smaller double integrals, or factorized as ψ(θ) = ψ̃(θ0 ) N −1 Y ψ̃(θi , θi+1 ) (9) i=1 where ψ̃(·) has a similar exponential-quadratic form but over a smaller time interval [ti , ti +δt]. In other words, if we treat each θi as a coordinate, then the exponent of ψ(θ) can be written as a quadratic function with a tridiagonal Hessian matrix (please see [27] for details). This sparse property will be the foundation of the approximation procedure and algorithm proposed in Section III and IV. III. A PPROXIMATE O PTIMIZATION AS I NFERENCE The mixed features from both planning and control domains in (1) present two major challenges: the optimization over continuous-time trajectories and the higher-order, nonlinear factors φS (·). The former results in an infinitedimensional problem, which often requires a dense discretization. The latter precludes direct use of algorithms based on Bellman’s equation, because the factors may not factorize into instantaneous terms. In this work, we propose a new approach inspired by approximate probabilistic inference. The goal here is to derive an approximation to the problem in (1), in the form " # Y max Ep̂π ψ(x, u) φ̂S (xS , uS ) , (10) π S∈S where φ̂S (·) is a local exponential-quadratic approximation of φS (·) and p̂π is a Gaussian process approximation of pπ . We call the problem in (10) “gLEQG” as it generalizes LEQG (Linear-Exponential-Quadratic-Gaussian) [25] to incorporate higher-order exponentials in the form of (3). In the rest of this section, we show how gLEQG can be derived by using the probabilistic interpretation [20] of the factors in (1). Further, we show this problem can be solved in linear time O(|S|) and its solution can be written in closedform as posterior inference. A. Probabilistic Interpretation of Factors We begin by representing each factor in (1) with a probability distribution [21]. First, for φS (·), we introduce additional fictitious observations eS such that p(eS |xS , uS ) ∝ φS (xS , uS ). These new variables eS can be interpreted as the events that we wish the robot to achieve and whose likelihood of success is reflected proportionally to φS (·). Practically, they help us keep track of the message propagation over the support state/action in later derivations. Second, we rewrite the Gaussian process factor ψ(u) to include the hidden state yt in (4), as a joint Gaussian process factor q(u, y).3 With the introduction of yt , the joint Gaussian process q(u, y) has the sparse property in (9) that we desired. Now, we rewrite the stochastic optimization (1) in the new notation. Let eS = {eS }S∈S and ξ = (x, y, u), 3 This step can be carried similarly as the construction of ψ(u). and let p(x|u) and p(z|x) be the conditional distributions defined by the system dynamics and the observation model, respectively. It can be shown that (1) is equivalent to Z (11) max q(z, ξ|eS )π(u|h)dξdz π in which we define a joint distribution Y q(z, ξ, eS ) = q(ξ)p(z|x) p(eS |xS , uS ) (12) S∈S with likelihoods p(z|x) and p(eS |xS , uS ), and a prior on the continuous-time trajectory ξ q(ξ) = p(x|u)q(u, y). (13) Before proceeding, we clarify the notation we use to simplify writing. We use q to denote the ad hoc constructed Gaussian process factor (e.g. in (3)) and use p to denote the probability distribution associated with the real system. As such, q does not always define an expectation, so the integral notation (e.g. in (11)) denotes the expectation over p and π that are well-defined probability distributions. But, with some abuse of notation, we will call them both Gaussian processes, since our results depend rather on their algebraic form. B. Gaussian Approximation Let ξS = {ξS }S∈S and ξ̄S = ξ\ξS . To derive the gLEQG approximation to (1), we notice, by (12), q(z, ξ|eS ) in (11) can be factorized into q(z, ξ|eS ) = q(z, ξ̄S |ξS )q(ξS |eS ) (14) where have used the Markovian property in Section IIIA i.e. given ξS , eS is conditionally independent of other random variables. Therefore, if q(z, ξ̄S |ξS ) and q(ξS |eS ) can be reasonably approximated as Gaussians, then we can approximate (1) with (10). However, q(z, ξ̄S |ξS ) and q(ξS |eS ) have notably different topologies. q(z, ξ̄S |ξS ) is a distribution over continuous-time trajectories, whereas q(ξS |eS ) is a density function on finite number of random variables. Therefore, to approximate (1), we need to find a Gaussian process q̂(z, ξ̄S |ξS ) and a Gaussian density q̂(ξS |eS ). 1) Gaussian Process Approximation: We derive the Gaussian process approximation q̂(z, ξ) to q(z, ξ). With this result, the desired conditional Gaussian process q̂(z, ξ̄S |ξS ) is given closed-form. First we need to define the system dynamics p(x|u) and the observation model p(z|x). For now, let us assume that the system is governed by a linear SDE dx = (Ax + Bu + b)dt + F dw z = Cx + v q(u, y) is also Gaussian process, we have a Gaussian process prior on z and ξ: q(z, ξ) = p(x, z|u)q(u, y), (16) In this case, no approximation is made and therefore q̂(z, ξ̄S |ξS ) = q(z, ξ̄S |ξS ). In the case of nonlinear systems, one approach is to treat (15) as its local linear approximation and derive q̂(z, ξ) = p̂(x, z|u)q(u, y), where p̂(x, z|u) is the solution to the linearized system. Alternatively, we can learn the conditional distribution p̂(x, z|u) from data directly through Gaussian process regression [26]. However, since our main purpose here is to show the solution when p̂(x, z|u) is available, from now on we will assume the system is linear and given by (15). 2) Gaussian Density Approximation: Unlike q(z, ξ̄S |ξS ), the approximation to q(ξS |eS ) is more straightforward. First, because q(ξS |eS ) may not be available in closed form, we approximate q(ξS |eS ) with q̃(ξS |eS ) Y q(ξS |eS ) ∝ q(ξS ) p(eS |xS , uS ) S∈S ≈ q̂(ξS ) Y S∈S p(eS |xS , uS ) ∝ q̃(ξS |eS ) (17) where q̂(ξS ) is the marginal distribution of q̂(z, ξ), found in the previous section. Given (17), we then find a Gaussian approximation q̂(ξS |eS ) of q̃(ξS |eS ) via a Laplace approximation [28]. For the nonlinear factor from (2), a Laplace approximation of q̃(ξS |eS ) amounts to solving a nonlinear least-squares optimization problem. Using the sparsity of the structured Gaussian processes defined by SDEs, the optimization can be completed using efficient data structures in O(|S|) [9]. For space constraints, we omit the details here; please see Appendix A and [9] for details. 3) Summary: The above approximations allow us to approximate (12) with a Gaussian distribution Y q̂(z, ξ, eS ) = p̂(z, x|u)q(u, y) p̂(eS |xS , uS ). (18) S∈S In (18), p̂(z, x|u) is the Gaussian process approximation of the system, which is exact when the system is linear, and p̂(eS |xS , uS ) is proportional to the exponential-quadratic factor φ̂S (xS , uS ) in (10). Moreover, it can be shown that q̂(z,Qξ, eS ) is a Laplace approximation of p̂(z, x|u)q(u, y) S∈S p(eS |xS , uS ) in terms of continuous-time trajectory z and ξ. C. Finding an Approximately Optimal Policy (15) in which A, B, b, F , C are (time-varying) system matrices, dw is a Wiener process, and v is Gaussian noise with covariance Qv . When a prior is placed on x0 (similar to Section II-B) it can be shown that the solution to (15) p(x, z|u) = p(z|x)p(x|u) is a Gaussian process. Since Substituting the results in Section III-B into (11), we have the approximated optimization problem Z max q̂(z, ξ|eS )π(u|h)dξdz. (19) π By (18), one can show that (19) is equivalent to the problem in (10), but expressed in probabilistic notation. However, by writing the problem probabilistically, we can avoid the algebraic complications arising from attempting to solve the Bellman’s equation of (10), which, because of higher-order factors, requires additional state expansion. This simplicity is reflected in the optimality condition for (19): πt∗ (ut |ht ) = δ(ut − u∗t (ht )) Z ∗ ut (ht ) = argmax q̂(z, ξ|eS )π ∗ (ūt |h)dxdydzdūt ut = argmax q̂(ut |ht , eS ) t0 ti t ti+1 ti + th tmax Fig. 2: Time-line with PIPC, where a system that started at t0 , is currently at time t ∈ [ti , ti+1 ] between support points ti and ti+1 in δt resolution. In a receding horizon setting, t+ represents the receding horizon window [ti , ti +th ], and tmax is the (infinite) final time when the algorithm terminates. In a finite horizon setting, th = tmax − ti . (20) ut in which ūt denotes u\{ut } and δ is Dirac delta distribution. From the last equality in (20), we see that the solution to the maximization problem coincides with the mode of the posterior distribution q̂(ut |ht , eS ). As a result, the optimal policies for time t can be derived forward in time, by performing inference without solving for the future policies first. Please see Appendix B for the proof. We call this property the duality between gLEQG and inference. This result seems surprising, but similar ideas can be traced back to the duality between the optimal control and estimation [17], [20], in which the optimal value function of a linear quadratic problem is computed by backward message propagation without performing maximization. Compared with previous work, a stronger duality holds here: gLEQG is dual to the inference problem on the same probabilistic graphical model defined by the random variables in Section III-A. This nice property is the result of the use of an exponential performance index, and enables us to handle higher-order factors naturally without referring to ad hoc derivations based on dynamic programming on extended states. Our posterior representation of the policy can also be found in [20], [29], or can be interpreted as one step of posterior iteration [24]. In [20], this results from the approximation of the optimal value function, but its relationship to the overall stochastic optimization is unclear. In [29], the posterior representation is reasoned from the notion of a predictive policy representation without further justification of its effects on the whole decision process. Here we derive the policy based on the assumption that the associated distribution of (1) can be approximated by a Gaussian (18). Therefore, the condition on which the approximate policy remains valid can be more easily understood or even enforced, as discussed later in Section IV-B. IV. P ROBABILISTIC M OTION P LANNING AND C ONTROL In Section III, we show that if q(z, ξ|e) can be approximated well by a Gaussian distribution, the stochastic optimization in (1) can be approximately solved as posterior inference (20). This representation suggests that the approximately optimal policy can be updated recursively through Kalman filtering. A. Recurrent Policy Inference as Kalman Filtering The approximately optimal policy in (20) can be viewed as the belief about the current action ut given the history ht and the fictitious events eS . Here we exploit the Markovian structure underlying q̂(z, ξ|eS ) to derive a recursive algorithm for updating the belief q̂(ξt |ht , eS ). Given the belief, the policy can be derived by marginalization. First, for t = 0, we write q̂(ξ0 |h0 , eS ) ∝ p(z0 |ξ0 )q̂(ξ0 |eS ) Z = q(z0 |ξ0 ) q(ξ0 |ξS )q̂(ξS |eS )dξS in which q(zt |ξt ) = p(zt |xt ) and q(ξ0 |ξS ) is the conditional distribution defined by (16). After initialization, the posterior q̂(ξt |ht , eS ) can be propagated through prediction and correction, summarized together in one step as q̂(ξt+δt |ht+δt , eS ) ∝ p(zt+δt |ξt+δt )q̂(ξt+δt |eS ) Z = q(zt+δt |ξt+δt ) q̂(ξt+δt |ξt , eS )q̂(ξt |ht , eS )dξt (21) in which the transition is given by q̂(ξt+δt |ξt , eS ) ∝ q̂(ξk , ξt+δt |eS ) Z = q(ξk , ξt+δt |ξS )q̂(ξS |eS )dξS (22) and q(ξk , ξt+δt |ξS ) is given by (16) [30], [31]. Because of the Markovian structure in (9), the integral (22) only depends on two adjacent support states/actions of t and can be computed in constant time. Note, in q̂(ξt |ht , eS ) in (21), the action ut is actually conditioned on the action taken u∗t (ht ). This notation is adopted to simplify the writing. Thus, we can view (21) as Kalman filtering with transition dynamics q̂(ξt+δt |ξt , eS ) and observation process q(zt |ξt ). This formulation gives us the flexibility to switch between open-loop and closed-loop policies. That is, before a new observation zt+δt is available, (22) provides a continuoustime open-loop action trajectory during the interval (t, t+δt). This recurrent policy inference is based on the assumption that q̂(z, ξ|eS ) is accurate. Although this assumption is not necessarily true in general, it is a practical approximation if the belief about current state p(xt |ht ) is concentrated and the horizon within which (20) applies is short. B. Online Motion Planning and Control We now summarize everything into the PIPC algorithm. Let ti ∈ S. We compensate for the local nature of (20) by recomputing a new Laplace approximation q(zt+ , ξt+ |ht , eS ) whenever t ∈ S, and applying filtering to update the policy by (21) for t ∈ (ti , ti+1 ), in which the subscript t+ denotes the future trajectory from t (see Fig. 2). This leads to an Algorithm 1 Receding Horizon PIPC Input: horizon th , start time t0 , initial belief q(ξt0 ) Output: success/failure 1: while not STOP CRITERIA do 2: q̂(ξS |eS , hti −δt , uti −δt ) = getLaplaceApprox(ti , th , q(ξt |hti −δt , uti −δt ), ENVIRONMENT) 3: for t ∈ [ti , ti+1 ] do 4: zt = makeObservation() 5: q̂(ξt |ht , eS ) = filterPolicy(zt , q̂(ξt−δt |ht−δt , eS ), q̂(ξS |eS , hti −δt , uti −δt )) 6: executePolicy(ut = u∗t (ht )) 7: q(ξt+δt |ht , ut ) = filterState(zt , ut , q(ξt |ht−δt , ut−δt )) 8: end for 9: end while 10: return checkSuccess() iterative framework which solves for the new approximation with up-to-date knowledge about the system. We can apply this scheme to MDP/POMDP problems in both finite and receding horizon cases.4 When facing a dynamic environment, PIPC updates environmental information in the new Laplace approximation in Section III-B.2. The details of the receding horizon approach are summarized in Algorithm 1 and can be derived similarly for the finite horizon case. First, at any time step ti , PIPC computes the Laplace approximation for the current horizon window [ti , ti + th ] with the latest information about the system and the environment, where th ≥ ti+1 − ti is length of the preview horizon. Second, for t ∈ (ti , ti+1 ), PIPC recursively updates the policy using the most current observation with a resolution of δt. These two steps repeat until the set criteria are met or the execution fails (for example, the robot is in collision). V. I MPLEMENTATION D ETAILS We perform experiments with the receding horizon version of PIPC in four different setups, including both MDP and POMDP scenarios: MDP-CL and POMDP-CL execute the receding horizon PIPC in Algorithm 1; MDP-OL and POMDP-OL ignore the policy filtering step, but instead recursively apply the open-loop policy given as the mode found in the Laplace approximation. This open-loop baseline can be viewed as the direct generalization of [9] to include action trajectories. The Laplace approximation is implemented using GPMP25 and the GTSAM6 C++ library, which solves posterior maximization as a nonlinear least-squared optimization defined on a factor graph with the Levenberg-Marquardt algorithm. Note that in implementation we consider yt = ut (i.e. ξt = (xt , ut )) and a constant time difference ∆t between any two support states or actions. We evaluate our algorithms on three different systems: a 2D holonomic robot, a 7-DOF WAM, and a PR2 arm. The state dynamics, following (15), is defined as a double 4 The receding-horizon version solves a new finite-horizon problem at each iteration of the Laplace approximation. 5 Available at https://github.com/gtrll/gpmp2 6 Available at https://bitbucket.org/gtborg/gtsam integrator with the state consisting of position and velocity and         0 I 0 0 0 0 A = 0 0 ,B = I ,b = 0 ,FFT = 0 Q I x and following (4) we define the Gaussian process factor by H = 0, D = 0, η = 0, GGT = Qu I where 0 and I are d × d zero and identity matrices, where d = 2 for the 2D holonomic robot and d = 7 for the 7DOF WAM arm and PR2 arm, and Qx and Qu are positive scalars. The observation process in the POMDP is modeled as a state observation with additive zero-mean Gaussian noise with covariance Qv = σm I2d×2d . The state dynamics for both the arms are assumed to be feedback linearized. On a real system, the control would to be mapped back to real torques using inverse dynamics. VI. E VALUATION We conduct benchmark experiments7 with our receding horizon algorithm on the 2D holonomic robot in a dynamic environment, and on the WAM arm and the PR2’s right arm in a static environment (see Fig. 1). In each case, we compare the closed-loop and open-loop algorithms for both MDP and POMDP settings across different Qx (and number of dynamic obstacles Nobs in the 2D case) with respect to success rate, time to reach the goal, path length, and path cost.8 Each setting is run for K times with a unique random generator seed to account for stochasticity, which is kept the same across all four algorithms for a fair comparison. A trial is marked “successful” if the robot reaches the goal within a Euclidean distance gdist, and is marked “failed” if at any point the robot runs into collision or runs out of the maximum allotted time tmax . A. 2D Robot Benchmark We simulate a 2D holonomic robot (radius = 0.5m) in a 2D environment (30m × 20m) with moving obstacles (see Fig. 1 (a)). The robot’s sensor returns a limited view of a 5m × 5m square centered at the robot’s current position. 7A video of experiments is available at https://youtu.be/8rQcg1O-6aU cost is calculated as the negative log of the product of the factors. 8 Path TABLE I: Success rate across increasing Qx and Nobs on the 2D holonomic robot. 10 Qx CL 0.975 0.95 0.95 0.975 0.95 0.975 0.01 0.04 0.07 0.01 0.04 0.07 MDP POMDP 20 OL 0.975 0.975 0.85 0.975 0.975 0.875 CL 0.85 0.85 0.875 0.925 0.875 0.825 Q x = 0.01 CL 0.7 0.55 0.725 0.725 0.525 0.7 40 OL 0.675 0.525 0.475 0.7 0.475 0.425 CL 0.4 0.525 0.45 0.375 0.425 0.45 20 10 10 10 10 20 30 40 50 0 10 20 30 40 0 50 60 10 10 10 5 5 5 0 0 40 20 60 0 Path Length (m) 0 60 40 0 ×10 6 0 10 10 20 20 30 30 40 40 Number of obstacles 50 50 20 CL 0.25 0.325 0.225 0.15 0.4 0.2 OL 0.325 0.325 0.125 0.225 0.25 0.075 Q x = 0.07 20 0 50 OL 0.375 0.375 0.2 0.4 0.45 0.25 Q x = 0.04 20 Path Cost Time (s) 30 OL 0.85 0.8 0.575 0.875 0.825 0.55 0 10 20 30 40 50 10 20 30 40 50 10 20 30 40 50 40 0 ×10 6 0 10 10 20 20 30 30 40 40 20 50 0 50 0 ×10 6 0 Number of obstacles Number of obstacles Fig. 3: Results of successful runs with increasing Qx and Nobs on the 2D holonomic robot. The moving obstacles (squares of 1m × 1m) start at random locations and follow a 2D stochastic jump process, where a noisy acceleration aobs is uniformly sampled within [−2.5, 2.5]m/s2 at every time step. Their velocities vobs are restricted within, [−1.3, 1.3]m/s. All obstacles are confined inside the boundary during simulation. Table I summarizes the success rates for this benchmark,9 and Fig. 3 shows the aggregate results of successful runs. From Table I, we see that, for both MDP and POMDP cases, the closed-loop algorithms have higher success rates than the open-loop algorithms, especially in difficult problems with larger stochasticity in the system (Qx ) or increased complexity in the environment (Nobs ). Similar increasing trends can also be observed in the difference of the success rates between the closed-loop and open-loop algorithms. The majority of failed open-loop cases arise from collision; only a few are due to hitting the maximum run time. The performance in POMDP cases are slightly worse than that in the MDP cases on average. All three metrics (time, path length, and path cost) in Fig. 3 increase in general with more noise and obstacles. It is important that these plots should be interpreted alongside the success rates, since the sample size of successful trails is comparatively sparse for the harder problems. B. WAM and PR2 Benchmark We demonstrate the scalability of PIPC to higher dimensional systems by performing a benchmark on the WAM and 9 Parameters for this benchmark are set as follows: K = 40, gdist = 0.2, tmax = 20, ∆t = 0.2, th = 2, nip = 20, σm = 0.01, σg = 1, σf ix = 10−4 , Qu = 10, σobs = 0.02,  = 1. TABLE II: Success rate across increasing Qx on the WAM and the PR2 robot arms. Qx MDP POMDP 0.01 0.02 0.03 0.01 0.02 0.03 WAM CL OL 1 1 1 1 1 0.85 1 1 1 0.9 0.9 0.75 CL 1 1 1 1 1 1 PR2 OL 1 0.95 0.5 1 0.8 0.8 the PR2 robot arms. Here the WAM and the PR2 robot arms are set up in lab and industrial environments [6], [7], [9] respectively, in OpenRAVE. Here the task is to drive the robot arm from a given start to a goal configuration (see Fig. 1 (b) and (c)). The environments are static and fully observable at all times. We compare the algorithms with respect to increasing Qx . Table II summarizes the success rates for this benchmark,10 and Fig. 4 shows the aggregate results of successful runs. Similar to the 2D robot benchmark, the results show that the closed-loop algorithms have higher success rate than the open-loop ones, and all three metrics increase with noise. In particular, POMDP-CL performs even better than MDP-OL. VII. C ONCLUSION We consider the problem of motion planning and control as probabilistic inference, and we propose an algorithm PIPC 10 Parameters for this benchmark are set as follows: K = 20, gdist = 0.065, tmax = 15, ∆t = 0.1, th = 2, nip = 10, σm = 0.005, σg = 0.03, σf ix = 10−4 , Qu = 10,  = 0.1, σobs = 0.008 (WAM), σobs = 0.005 (PR2). 3.5 3.5 3.5 10 5 ×10 6 3 10 ×10 Time (s) 4 3 6 10 5 ×10 6 5 (a) Path Length 4 Q = 0.02 x Q = 0.03 x x 15 15 15 10 10 10 5 5 5 8 8 8 7 7 7 6 6 5 ×10 Path Cost 4 Path Cost 6 4 2 3 Q = 0.01 Q x = 0.03 Time (s) Q x = 0.02 6 4 2 Path Length Q x = 0.01 6 4 2 6 6 5 ×10 5 6 15 15 15 10 10 10 5 5 5 ×10 6 (b) Fig. 4: Results of successful runs with increasing Qx on (a) the WAM and (b) the PR2 robot arms. for solving this problem that can exploit intrinsic sparsity in continuous-time stochastic systems. In particular, PIPC can address performance indices given by arbitrary, higherorder nonlinear factors and a general exponential-integralquadratic factor. Despite PIPC solving a continuous-time problem, its complexity scales only linearly in the number of nonlinear factors, thus making online simultaneous planning and control possible in receding/finite horizon MDP/POMDP problems. ACKNOWLEDGMENTS The authors would like to thank Jing Dong for help with the GTSAM interface. This material is based upon work supported by NSF CRII Award No. 1464219 and NSF NRI Award No. 1637758. R EFERENCES [1] D. P. Bertsekas, Dynamic programming and optimal control. Athena Scientific Belmont, MA, 1995, vol. 1, no. 2. [2] R. C. Arkin, Behavior-based robotics. MIT press, 1998. [3] L. E. Kavraki, P. Svestka, J.-C. Latombe, and M. H. Overmars, “Probabilistic roadmaps for path planning in high-dimensional configuration spaces,” Robotics and Automation, IEEE Transactions on, vol. 12, no. 4, pp. 566–580, 1996. [4] J. J. Kuffner and S. M. LaValle, “RRT-connect: An efficient approach to single-query path planning,” in Robotics and Automation, 2000. Proceedings. ICRA’00. IEEE International Conference on, vol. 2. IEEE, 2000, pp. 995–1001. [5] A. Byravan, B. Boots, S. S. Srinivasa, and D. Fox, “Space-time functional gradient optimization for motion planning,” in Robotics and Automation (ICRA), 2014 IEEE International Conference on. IEEE, 2014, pp. 6499–6506. [6] J. Schulman, Y. Duan, J. Ho, A. Lee, I. Awwal, H. Bradlow, J. Pan, S. Patil, K. Goldberg, and P. Abbeel, “Motion planning with sequential convex optimization and convex collision checking,” The International Journal of Robotics Research, vol. 33, no. 9, pp. 1251–1270, 2014. [7] M. Mukadam, X. Yan, and B. Boots, “Gaussian process motion planning,” in 2016 IEEE International Conference on Robotics and Automation (ICRA), May 2016, pp. 9–15. [8] Z. Marinho, B. Boots, A. Dragan, A. Byravan, G. J. Gordon, and S. Srinivasa, “Functional gradient motion planning in reproducing kernel hilbert spaces,” in Proceedings of Robotics: Science and Systems (RSS-2016), 2016. [9] J. Dong, M. Mukadam, F. Dellaert, and B. Boots, “Motion planning as probabilistic inference using Gaussian processes and factor graphs,” in Proceedings of Robotics: Science and Systems (RSS-2016), 2016. [10] M. Toussaint, “Newton methods for k-order Markov constrained motion problems,” arXiv preprint arXiv:1407.0414, 2014. [11] S. M. LaValle and J. J. Kuffner, “Randomized kinodynamic planning,” The International Journal of Robotics Research, vol. 20, no. 5, pp. 378–400, 2001. [12] R. Tedrake, I. R. Manchester, M. Tobenkin, and J. W. Roberts, “LQRtrees: Feedback motion planning via sums-of-squares verification,” The International Journal of Robotics Research, 2010. [13] H. J. Kappen, “Linear theory for control of nonlinear stochastic systems,” Physical review letters, vol. 95, no. 20, p. 200201, 2005. [14] S. Levine and V. Koltun, “Guided policy search.” in ICML (3), 2013, pp. 1–9. [15] M. Deisenroth and C. E. Rasmussen, “PILCO: A model-based and data-efficient approach to policy search,” in Proceedings of the 28th International Conference on machine learning (ICML-11), 2011, pp. 465–472. [16] D. Mayne, “A second-order gradient method for determining optimal trajectories of non-linear discrete-time systems,” International Journal of Control, vol. 3, no. 1, pp. 85–95, 1966. [17] E. Todorov and W. Li, “A generalized iterative LQG method for locally-optimal feedback control of constrained nonlinear stochastic systems,” in American Control Conference, 2005. Proceedings of the 2005. IEEE, 2005, pp. 300–306. [18] E. Todorov and Y. Tassa, “Iterative local dynamic programming,” in 2009 IEEE Symposium on Adaptive Dynamic Programming and Reinforcement Learning. IEEE, 2009, pp. 90–95. [19] H. Attias, “Planning by probabilistic inference,” in AISTATS, 2003. [20] M. Toussaint, “Robot trajectory optimization using approximate inference,” in Proceedings of the 26th annual international conference on machine learning. ACM, 2009, pp. 1049–1056. [21] M. Toussaint and A. Storkey, “Probabilistic inference for solving discrete and continuous state Markov decision processes,” in Proceedings of the 23rd international conference on Machine learning. ACM, 2006, pp. 945–952. [22] S. Levine and V. Koltun, “Variational policy search via trajectory optimization,” in Advances in Neural Information Processing Systems, 2013, pp. 207–215. [23] H. J. Kappen, V. Gómez, and M. Opper, “Optimal control as a graphical model inference problem,” Machine Learning, vol. 87, no. 2, pp. 159–182, 2012. [Online]. Available: http://dx.doi.org/10.1007/s10994-012-5278-7 [24] K. Rawlik, M. Toussaint, and S. Vijayakumar, “On stochastic optimal control and reinforcement learning by approximate inference,” Proceedings of Robotics: Science and Systems VIII, 2012. [25] P. Kumar and J. Van Schuppen, “On the optimal control of stochastic systems with an exponential-of-integral performance index,” Journal of mathematical analysis and applications, vol. 80, no. 2, pp. 312–332, 1981. [26] C. E. Rasmussen, Gaussian processes for machine learning, 2006. [27] S. Sarkka, A. Solin, and J. Hartikainen, “Spatiotemporal learning via infinite-dimensional Bayesian filtering and smoothing: A look at Gaussian process regression through Kalman filtering,” IEEE Signal Processing Magazine, vol. 30, no. 4, pp. 51–61, 2013. [28] C. M. Bishop, “Pattern recognition,” Machine Learning, vol. 128, pp. 1–58, 2006. [29] A. Boularias, “A predictive model for imitation learning in partially observable environments,” in Machine Learning and Applications, 2008. ICMLA’08. Seventh International Conference on. IEEE, 2008, pp. 83–90. [30] T. Barfoot, C. H. Tong, and S. Sarkka, “Batch continuous-time trajectory estimation as exactly sparse Gaussian process regression,” Proceedings of Robotics: Science and Systems, Berkeley, USA, 2014. [31] X. Yan, V. Indelman, and B. Boots, “Incremental sparse GP regression for continuous-time trajectory estimation & mapping,” in Proceedings of the International Symposium on Robotics Research (ISRR-2015), 2015. A PPENDIX A. Laplace Approximation with Factor Graphs PIPC updates the Laplace approximation whenever t = ti by efficiently solving a nonlinear least-squares problem defined on a bipartite factor graph G = {ξS , fS , E}, Y q(ξS |eS ) ∝ fS (ξS ). (23) Obstacle Factor: fiobs = exp{− 12 eTi Q−1 obs ei }, ei = h(ξi ) Interpoaltion Factor: fiintp = exp{− 12 eTi Q−1 obs ei }, ei = h(GPinterpolate(ξi , ξi+1 )) GP Prior Factor: figp = exp{− 12 eTi Q−1 gp,i ei }, ei = Φξ (ti+1 , ti )ξi − ξi+1 S∈S where recall that ξS is the set of support augmented states, and fS = {fS }S denotes the set of factors, and E are edges connected to between ξS and fS . An example factor graph is shown in Fig. 5 for a trajectory starting from ti with a length equal to th . The sparse set of support augmented states ξS are uniformly ∆t apart and are connected to their neighbours via the Gaussian process factors, forming a Gauss-Markov chain. Note that in our implementation ξt = (xt , ut ). 1) Details of Factor Implementation: a) Prior Factor: For each Laplace approximation, a prior factor is placed on the first hidden state ξt , reflecting its current belief given past history ht . In the MDP setting, the covariance for state xt is set as a diagonal matrix σf2 ix I2d×2d , in which σf ix is a small number to indicate high confidence; for control ut , we use the original Gaussian process factor given by (3). Together they define Qprior . In the POMDP setting, the belief of the hidden augmented state is obtained via Kalman filtering, and we heuristically set the covariance for the state, x to σf2 ix I2d×2d as mentioned previously. b) Gaussian Process Factors: Analogous to defining GPu for (4), we can define GPξ , which in turns define. q(ξS ) in (17). In Fig. 5, this corresponds to Gaussian process factors with    T Z ti+1 F F Qgp,i = Φξ (ti+1 , s) Φξ (ti+1 , s)T ds, G G ti B [A 0 H where Φξ is the state transition matrix associated with ] that takes the system from ti to ti+1 . c) Obstacle and Interpolation Factors: For obstacle avoidance, we use a hinge loss function h with safety distance  to compute a signed distance field as in GPMP2 [9]. In effect, it defines the obstacle factors and interpolation 2 factors in Fig. 5, which both use Qobs = σobs I. Though abstracted as a single factor in Fig. 5, between any two support points ti and ti+1 , multiple (nip ) interpolated factors can be constructed with indexes evenly spaced in time (δt apart) to ensure path safety. See [9] for details. d) Goal Factor: To drive the system to a desired goal configuration ξgoal (for example, a particular position in configuration space with zero velocity and action), we add a goal factor to every support point except the current state. This encourages the optimizer to drive all states in the current horizon window closer to the goal. Because the covariance of this factor acts as a weighting term, we define it as ||ξti −ξgoal ||2 Qgoal,i = σg2 ||ξstart −ξgoal ||2 I such that it monotonically decreases with the Euclidean distance to the goal. Prior Factor: f m = exp{− 12 ξi Q−1 prior ξi }, Goal Factor: figoal = exp{− 12 eTi Q−1 goal,i ei }, ei = ξi − ξgoal Fig. 5: A factor graph of an example Laplace approximation problem showing states (white circle) (ξi is used as a shorthand for ξti ) and different kinds of factors: GP Prior (black circle), obstacle and interpolation (white square), measurement (gray square) and goal (black square). 2) Update of Laplace Approximation: The same Laplace approximation is used to recursively update the policy for t ∈ [ti , ti+1 ) with a resolution of δt, and, when t = ti+1 , the graph is updated to construct a new nonlinear leastsquare optimization problem. This is done by shifting the horizon window ahead by ∆t and update the factors to include any environmental changes during [ti , ti+1 ). In the updated graph, the prior factor on the first state is given by an additional Kalman filter based on (15) and (4) with (x, y) as hidden states and (z, u) as observations. For POMDP problems, we treat the estimation of current state as perfect knowledge without uncertainty. This extra heuristic step is a compromise which makes the assumption accurate at the mean of the current belief. B. Proof of (20) Here we prove that the solution (20) to the approximate optimization problem (19) Z max q̂(z, ξ|eS )π(u|h)dξdz π can be written as posterior inference: ∀t, πt∗ (ut |ht ) = δ(ut − u∗t (ht )) Z ∗ ut (ht ) = argmax q̂(z, ξ|eS )π ∗ (ūt |h)dxdydzdūt ut = argmax q̂(ut |ht , eS ) ut where q̂(z, ξ|eS ) Q ∝ q(ξ)p(z|x)p̂(eS |xS , uS ) and p̂(eS |xS , uS ) = p̂(e S |xS , uS ) is found by the S∈S exponential-quadratic approximate factor given by the Laplace approximation. Proof: We assume the length of the trajectory is T . In the following, we first show that the optimal policy is deterministic and then show that it corresponds to the mode of the posterior distribution q̂(ut |ht , eS ). a) The Optimal Policy is Deterministic: For any t, we can write the objective function (19) as Z q̂(z, ξ|eS )π(u|h)dξdz Z ∝ q(ξ)p(z|x)p̂(eS |xS , uS )π(u|h)dξdz Z = πt (ut |ht )fht (ut )dut dht in which Z fht (ut ) = q(ξ)p(z|x)p̂(eS |xS , uS )π(ūt |h̄t )dθdzt+ dut+ and π(ūt |h̄t ) := π(u|h) πt (ut |ht ) Therefore, equivalently, (19) can be formulated explicitly as a variational problem of density function πt : Z (24) max πt (ut |ht )fht (ut )dut πt s.t. Z π(ut |ht )dut = 1 π(ut |ht ) ≥ 0, ∀ut To deal with the inequality, let gt2 (ut ) = πt (ut |ht ), and we can further write (24) as Z max gt2 (ut )fht (ut )dut (25) gt s.t. Z gt2 (ut )dut = 1 Let λ ∈ R be a Lagrangian multiplier. We can turn the (25) into an unconstrained optimization and use calculus of variations to derive the solution: min max L(gt , λ) gt λ Z Z 2 = min max gt (ut )fht (ut )dut + λ( gt2 (ut )dut − 1) λ gt Suppose gt∗ (λ) is the optimum. Let gt = gt∗ + η, where η is an arbitrary continuous function and  → 0. Then the optimality condition is given by Z ∂L(gt , λ) = 2gt (ut )η(ut )(λ + fht (ut ))dut = 0. ∂ Since η is arbitrary, it implies ∀ut , gt (ut )(λ + fht (ut )) = 0 Given that λ is a scalar and g(un ) is non-zero, we can conclude that πt∗ (ut |ht ) = δ(ut − u∗t (ht )) satisfying u∗t (ht ) = arg max fht (ut ) ut (ht ) b) The Optimal Policy is the Mode of Posterior: From the previous proof, we know that the policy corresponds to the mode of fht (ut ) for any t. Therefore, to complete the proof, we only need to show that fh∗t (ut ) ∝ q̂(ut |eS , ht ), where fh∗t (ut ) is fht (ut ) when the policies are optimal. First, let fˆht (ut ) denote fht (ut ) when all policies are deterministic, and define, for all t, fˆht (ut ) := πt− (ut− |ht− )q̂(zt , zt− , eS , ut− , ut ) (26) Next, we introduce a lemma: Lemma 1: Let z = (x, y) ∈ Rn . If f (x, y) ∝ N (z|m, S), then, for all y, Z max f (x, y) = C f (x, y)dx (27) x(y) for some constant C independent of y, in which m and S are the mean and covariance of a Gaussian. Now we can show fh∗t (ut ) ∝ q̂(ut |eS , ht ) by induction in backward order. To start with, for the last policy at τ = T − δt, we can write (26) as fhτ (uτ ) = fˆhτ (uτ ) = πτ− (uτ− |hτ− )q̂(zτ , zτ− , eS , uτ− , uτ ) = πτ− (uτ− |hτ− )q̂(hτ , eS , uτ ) ∝ q̂(uτ |hτ , eS ) in which we purposefully omit the dependency of uτ− on hτ− , because the exact value of uτ− is observed when performing the optimization. Then we have u∗τ (hτ ) = argmaxuτ fˆhτ (uτ ) = argmaxuτ q̂(uτ |hτ , eS ). Now we propagate the objective function one step backward from τ to τ − δt. Given hτ −δt , the maximization at τ − δt is given as Z max max πτ (uτ |hτ )fˆhτ (uτ )duτ dzτ duτ −δt πτ −δt πτ Z = max max fˆhτ (uτ )dzτ duτ −δt πτ −δt uτ (hτ ) Z = max πτ− (uτ− |hτ− ) max q̂(hτ , eS , uτ )dzτ duτ −δt πτ −δt uτ (hτ ) Z ∝ max πτ− (uτ− |hτ− )q̂(hτ , eS , uτ )dzτ duτ duτ −δt πτ −δt Z = max πτ− (uτ− |hτ− )q̂(hτ −δt , eS , uτ −δt )duτ −δt πτ −δt Z = max πτ −δt (uτ −δt |hτ −δt )fˆhτ −δt (uτ −δt )duτ −δt πτ −δt The second equality is due to the policy is deterministic; the third proportionality is given by (27); the last equality is given by the definition (26). Therefore, the backward iteration maintains the policy optimization problem R maxπt πt (ut |ht )fˆht (ut )dut in the same algebraic form as the last step for all t. Since fˆht (ut ) ∝ q̂(ut |ht , eS ), this completes the proof.
3cs.SY
Scoring and Classifying with Gated Auto-encoders arXiv:1412.6610v5 [cs.LG] 15 Jun 2015 Daniel Jiwoong Im, and Graham W. Taylor School of Engineering University of Guelph Guelph, On, Canada {imj,gwtaylor}@uoguelph.ca Abstract. Auto-encoders are perhaps the best-known non-probabilistic methods for representation learning. They are conceptually simple and easy to train. Recent theoretical work has shed light on their ability to capture manifold structure, and drawn connections to density modeling. This has motivated researchers to seek ways of auto-encoder scoring, which has furthered their use in classification. Gated auto-encoders (GAEs) are an interesting and flexible extension of auto-encoders which can learn transformations among different images or pixel covariances within images. However, they have been much less studied, theoretically or empirically. In this work, we apply a dynamical systems view to GAEs, deriving a scoring function, and drawing connections to Restricted Boltzmann Machines. On a set of deep learning benchmarks, we also demonstrate their effectiveness for single and multi-label classification. 1 Introduction Representation learning algorithms are machine learning algorithms which involve the learning of features or explanatory factors. Deep learning techniques, which employ several layers of representation learning, have achieved much recent success in machine learning benchmarks and competitions, however, most of these successes have been achieved with purely supervised learning methods and have relied on large amounts of labeled data [10,22]. Though progress has been slower, it is likely that unsupervised learning will be important to future advances in deep learning [1]. The most successful and well-known example of non-probabilistic unsupervised learning is the auto-encoder. Conceptually simple and easy to train via backpropagation, various regularized variants of the model have recently been proposed [20,25,21] as well as theoretical insights into their operation [6,24]. In practice, the latent representation learned by auto-encoders has typically been used to solve a secondary problem, often classification. The most common setup is to train a single auto-encoder on data from all classes and then a classifier is tasked to discriminate among classes. However, this contrasts with the way probabilistic models have typically been used in the past: in that literature, it is more common to train one model per class and use Bayes’ rule for classification. 2 There are two challenges to classifying using per-class auto-encoders. First, up until very recently, it was not known how to obtain the score of data under an auto-encoder, meaning how much the model “likes” an input. Second, autoencoders are non-probabilistic, so even if they can be scored, the scores do not integrate to 1 and therefore the per-class models need to be calibrated. Kamyshanska and Memisevic have recently shown how scores can be computed from an auto-encoder by interpreting it as a dynamical system [7]. Although the scores do not integrate to 1, they show how one can combine the unnormalized scores into a generative classifier by learning class-specific normalizing constants from labeled data. In this paper we turn our interest towards a variant of auto-encoders which are capable of learning higher-order features from data [15]. The main idea is to learn relations between pixel intensities rather than the pixel intensities themselves by structuring the model as a tri-partite graph which connects hidden units to pairs of images. If the images are different, the hidden units learn how the images transform. If the images are the same, the hidden units encode withinimage pixel covariances. Learning such higher-order features can yield improved results on recognition and generative tasks. We adopt a dynamical systems view of gated auto-encoders, demonstrating that they can be scored similarly to the classical auto-encoder. We adopt the framework of [7] both conceptually and formally in developing a theory which yields insights into the operation of gated auto-encoders. In addition to the theory, we show in our experiments that a classification model based on gated auto-encoder scoring can outperform a number of other representation learning architectures, including classical auto-encoder scoring. We also demonstrate that scoring can be useful for the structured output task of multi-label classification. 2 Gated Auto-encoders In this section, we review the gated auto-encoder (GAE). Due to space constraints, we will not review the classical auto-encoder. Instead, we direct the reader to the reviews in [15,8] with which we share notation. Similar to the classical auto-encoder, the GAE consists of an encoder h(·) and decoder r(·). While the standard auto-encoder processes a datapoint x, the GAE processes inputoutput pairs (x, y). The GAE is usually trained to reconstruct y given x, though it can also be trained symmetrically, that is, to reconstruct both y from x and x from y. Intuitively, the GAE learns relations between the inputs, rather than representations of the inputs themselves1 . If x 6= y, for example, they represent sequential frames of a video, intuitively, the mapping units h learn transformations. In the case that x = y (i.e. the input is copied), the mapping units learn pixel covariances. In the simplest form of the GAE, the M hidden (mapping) units are given by a basis expansion of x and y. However, this leads to a parameterization 1 Relational features can be mixed with standard features by simply adding connections that are not gated. 3 that it is at least quadratic in the number of inputs and thus, prohibitively large. Therefore, in practice, x, y, and h are projected onto matrices or (“latent factors”), W X , W Y , and W H , respectively. The number of factors, F , must be the same for X, Y , and H. Thus, the model is completely parameterized by θ = {W X , W Y , W H } such that W X and W Y are F × D matrices (assuming both x and y are D-dimensional) and W H is an M × F matrix. The encoder function is defined by h(x, y) = σ(W H ((W X x) (W Y y))) (1) where is element-wise multiplication and σ(·) is an activation function. The decoder function is defined by r(y|x, h) = (W Y )T ((W X x) X T Y r(x|y, h) = (W ) ((W y) (W H )T h(x, y)). H T (W ) h(x, y)), (2) (3) Note that the parameters are usually shared between the encoder and decoder. The choice of whether to apply a nonlinearity to the output, and the specific form of objective function will depend on the nature of the inputs, for example, binary, categorical, or real-valued. Here, we have assumed real-valued inputs for simplicity of presentation, therefore, Eqs. 2 and 3 are bi-linear functions of h and we use a squared-error objective: J= 1 kr(y|x) − yk2 . 2 (4) We can also constrain the GAE to be a symmetric model by training it to reconstruct both x given y and y given x [15]: J= 1 1 kr(y|x) − yk2 + kr(x|y) − xk2 . 2 2 (5) The symmetric objective can be thought of as the non-probabilistic analogue of modeling a joint distribution over x and y as opposed to a conditional [15]. 3 Gated Auto-Encoder Scoring In [7], the authors showed that data could be scored under an auto-encoder by interpreting the model as a dynamical system. In contrast to the probabilistic views based on score matching [21,24,6] and regularization, the dynamical systems approach permits scoring under models with either linear (real-valued data) or sigmoid (binary data) outputs, as well as arbitrary hidden unit activation functions. The method is also agnostic to the learning procedure used to train the model, meaning that it is suitable for the various types of regularized auto-encoders which have been proposed recently. In this section, we demonstrate how the dynamical systems view can be extended to the GAE. 4 3.1 Vector field representation Similar to [7], we will view the GAE as a dynamical system with the vector field defined by F (y|x) = r(y|x) − y. The vector field represents the local transformation that y|x undergoes as a result of applying the reconstruction function r(y|x). Repeatedly applying the reconstruction function to an input y|x → r(y|x) → r(r(y|x)|x) → · · · → r(r · · · r(y|x)|x) yields a trajectory whose dynamics, from a physics perspective, can be viewed as a force field. At any point, the potential force acting on a point is the gradient of some potential energy (negative goodness) at that point. In this light, the GAE reconstruction may be viewed as pushing pairs of inputs x, y in the direction of lower energy. Our goal is to derive the energy function, which we call a scoring function, and which measures how much a GAE “likes” a given pair of inputs (x, y) up to normalizing constant. In order to find an expression for the potential energy, the vector field must be able to be written as the derivative of a scalar field [7]. To check this, we can submit to Poincaré’s integrability criterion: For some open, simple connected set U, a continuously differentiable function F : U → <m defines a gradient field if and only if ∂Fj (y) ∂Fi (y) = , ∀i, j = 1 · · · n. ∂yj ∂yi The vector field defined by the GAE indeed satisfies Poincaré’s integrability criterion; therefore it can be written as the derivative of a scalar field. A derivation is given in the Appendix A.2 This also applies to the GAE with a symmetric objective function (Eq. 5) by setting the input as ξ|γ such that ξ = [y; x] and γ = [x; y] and following the exact same procedure. 3.2 Scoring the GAE As mentioned in Section 3.1, our goal is to find an energy surface, so that we can express the energy for a specific pair (x, y). From the previous section, we showed that Poincaré’s criterion is satisfied and this implies that we can write the vector field as the derivative of a scalar field. Moreover, it illustrates that this vector field is a conservative field and this means that the vector field is a gradient of some scalar function, which in this case is the energy function of a GAE: r(y|x) − y = ∇E. Hence, by integrating out the trajectory of the GAE (x, y), we can measure the energy along a path. Moreover, the line integral of a conservative vector field 5 is path independent, which allows us to take the anti-derivative of the scalar function: Z Z Z  E(y|x) = (r(y|x) − y)dy = W Y W X x) W H h(u dy − ydy  Z  Z  (6) =W Y W Xx W H h (u) dy − ydy, where u is an auxiliary variable such that u = W H ((W Y y) (W X x)) and du H Y (W X x ⊗ 1D )), and ⊗ is the Kronecker product. Moreover, the dy = W (W decoder can be re-formulated as r(y|x) = (W Y )T (W X x = (W Y )T (W H )T h(y, x))  (W X x ⊗ 1D ) (W H )T h(y, x). Re-writing Eq. 6 in terms of the auxiliary variable u, we get  E(y|x) = (W Y )T (W Y x ⊗ 1D ) (W H )T Z Z −1 H Y X h(u) W W (W x ⊗ 1D ) du − ydy Z 1 = h(u)du − y2 + const. 2 (7) (8) A more detailed derivation from Eq. 6 to Eq. 8 is provided in the Appendix A.2. Identical to [7], if h(u) is an element-wise activation function and we know its anti-derivative, then it is very simple to compute E(x, y). 4 Relationship to Restricted Boltzmann Machines In this section, we relate GAEs through the scoring function to other types of Restricted Boltzmann Machines, such as the Factored Gated Conditional RBM [23] and the Mean-covariance RBM [19]. 4.1 Gated Auto-encoder and Factored Gated Conditional Restricted Boltzmann Machines Kamyshanska and Memisevic showed that several hidden activation functions defined gradient fields, including sigmoid, softmax, tanh, linear, rectified linear function (ReLU), modulus, and squaring. These activation functions are applicable to GAEs as well. In the case of the sigmoid activation function, σ = h(u) = 1+exp1 (−u) , our energy function becomes Z 1 Eσ =2 (1 + exp −(u))−1 du − (x2 + y2 ) + const, 2 X 1 H =2 log (1 + exp (Wk· (W X x W X y))) − (x2 + y2 ) + const. 2 k 6 Note that if we consider the conditional GAE we reconstruct x given y only, this yields X y2 Y X Eσ (y|x) = log (1 + exp (W H (Wk· y Wk· x))) − + const. (9) 2 k This expression is identical, up to a constant, to the free energy in a Factored Gated Conditional Restricted Boltzmann Machine (FCRBM) with Gaussian visible units and Bernoulli hidden units. We have ignored biases for simplicity. A derivation including biases is provided in the Appendix B.1. 4.2 Mean-Covariance Auto-encoder and Mean-covariance Restricted Boltzmann Machines The Covariance auto-encoder (cAE) was introduced in [15]. It is a specific form of symmetrically trained auto-encoder with identical inputs: x = y, and tied input weights: W X = W Y . It maintains a set of relational mapping units to model covariance between pixels. One can introduce a separate set of mapping units connected pairwise to only one of the inputs which model the mean intensity. In this case, the model becomes a Mean-covariance auto-encoder (mcAE). Theorem 1. Consider a cAE with encoder and decoder: h(x) = h(W H ((W X x)2 ) + b) r(x|h) = (W X )T (W X x (W H )T h(x)) + a, where θ = {W X , W H , a, b} are the parameters of the model, and h(z) = 1+exp1 (−z) is a sigmoid. Moreover, consider a Covariance RBM [19] with Gaussian-distributed visibles and Bernoulli-distributed hiddens, with an energy function defined by (a − x)2 X E c (x, h) = − P h(Cx)2 − bh. σ2 f Then the energy function of the cAE with dynamics r(x|y) − x is equivalent to the free energy of Covariance RBM up to a constant: X  x2 E(x, x) = log 1 + exp W H (W X x)2 + b − + const. (10) 2 k The proof is given in the Appendix B.2. We can extend this analysis to the mcAE by using the above theorem and the results from [7]. Corollary 1. The energy function of a mcAE and the free energy of a Meancovariance RBM (mcRBM) with Gaussian-distributed visibles and Bernoullidistributed hiddens are equivalent up to a constant. The energy of the mcAE is: X  X E= log 1 + exp −W H (W X x)2 − b + log (1 + exp(W x + c))−x2 +const k k (11) 7 where θm = {W, c} parameterizes the mean mapping units and θc = {W X , W H , a, b} parameterizes the covariance mapping units. Proof. The proof is very simple. Let Emc = Em + Ec , where Em is the energy of the mean auto-encoder, Ec is the energy of the covariance auto-encoder, and Emc is the energy of the mcAE. We know from Theorem 1 that Ec is equivalent to the free energy of a covariance RBM, and the results from [7] show that that Em is equivalent to the free energy of mean (classical) RBM. As shown in [19], the free energy of a mcRBM is equal to summing the free energies of a mean RBM and a covariance RBM. 5 Classification with Gated Auto-encoders Kamyshanska and Memisevic demonstrated that one application of the ability to assign energy or scores to auto-encoders was in constructing a classifier from class-specific auto-encoders. In this section, we explore two different paradigms for classification. Similar to that work, we consider the usual multi-class problem by first training class-specific auto-encoders, and using their energy functions as confidence scores. We also consider the more challenging structured output problem, specifically, the case of multi-label prediction where a data point may have more than one associated label, and there may be correlations among the labels. 5.1 Classification using class-specific gated auto-encoders One approach to classification is to take several class-specific models and assemble them into a classifier. The best-known example of this approach is to fit several directed graphical models and use Bayes’ rule to combine them. The process is simple because the models are normalized, or calibrated. While it is possible to apply a similar technique to undirected or non-normalized models such as auto-encoders, one must take care to calibrate them. The approach proposed in [7] is to train K class-specific auto-encoders, each of which assigns a non-normalized energy to the data Ei (x) , i = 1 . . . , K, and then define the conditional distribution over classes zi as exp (Ei (x) + Bi ) P (zi |x) = P , j exp (Ej (x) + Bj ) (12) where Bi is a learned bias for class i. The bias terms take the role of calibrating the unnormalized energies. Note that we can similarly combine the energies from a symmetric gated auto-encoder where x = y (i.e. a covariance auto-encoder) and apply Eq. 12. If, for each class, we train both a covariance auto-encoder and a classical auto-encoder (i.e. a “mean” auto-encoder) then we can combine both sets of unnormalized energies as follows exp(EiM (x) + EiC (x) + Bi ) PmcAE (zi |x) = P , M C j exp(Ej (x) + Ej (x) + Bj ) (13) 8 where EiM (x) is the energy which comes from the “mean” (standard) autoencoder trained on class i and EiC (x) the energy which comes from the “covariance” (gated) auto-encoder trained on class i. We call the classifiers in Eq. 12 and Eq. 13 “Covariance Auto-encoder Scoring” (cAES) and “Mean-Covariance Auto-encoder Scoring” (mcAES), respectively. The training procedure is summarized as follows: 1. Train a (mean)-covariance auto-encoder individually for each class. Both the mean and covariance auto-encoder have tied weights in the encoder and decoder. The covariance auto-encoder is a gated auto-encoder with tied inputs. 2. Learn the Bi calibration terms using maximum likelihood, and backpropagate to the GAE parameters. Experimental results We followed the same experimental setup as [16] where we used a standard set of “Deep Learning Benchmarks” [11]. We used mini-batch stochastic gradient descent to optimize parameters during training. The hyperparameters: number of hiddens, number of factors, corruption level, learning rate, weight-decay, momentum rate, and batch sizes were chosen based on a held-out validation set. Corruption levels and weight-decay were selected from {0, 0.1, 0.2, 0.3, 0.4, 0.5}, and number of hidden and factors were selected from 100,300,500. We selected the learning rate and weight-decay from the range (0.001, 0.0001). Classification error results are shown in Table 1. First, the error rates of auto-encoder scoring variant methods illustrate that across all datasets AES outperforms cAES and mcAES outperforms both AES and cAES. AE models pixel means and cAE models pixel covariance, while mcAE models both mean and covariance, making it naturally more expressive. We observe that cAES and mcAES achieve lower error rates by a large margin on rotated MNIST with backgrounds (final row). On the other hand, both cAES and mcAES perform poorly on MNIST with random white noise background (second row from bottom). We believe this phenomenon is due to the inability to model covariance in this dataset. In MNIST with random white noise the pixels are typically uncorrelated, where in rotated MNIST with backgrounds the correlations are present and consistent. 5.2 Multi-label classification via optimization in label space The dominant application of deep learning approaches to vision has been the assignment of images to discrete classes (e.g. object recognition). Many applications, however, involve “structured outputs” where the output variable is highdimensional and has a complex, multi-modal joint distribution. Structured output prediction may include tasks such as multi-label classification where there are regularities to be learned in the output, and segmentation, where the output is as high-dimensional as the input. A key challenge to such approaches lies in developing models that are able to capture complex, high level structure like shape, while still remaining tractable. 9 DATA SVM RBM DEEP GSM AES cAES mcAES RECT RECTIMG CONVEX MNISTSMALL MNISTROT MNISTRAND MNISTROTIM 2.15 24.04 19.13 3.03 11.11 14.58 55.18 RBF SAA3 4.71 23.69 19.92 3.94 14.69 9.80 52.21 2.14 24.05 18.41 3.46 10.30 11.28 51.93 0.56 22.51 17.08 3.70 11.75 10.48 55.16 0.84 21.45 21.52 2.61 11.25 9.70 47.14 0.61 22.85 21.6 3.65 16.5 18.65 39.98 0.54 21.41 20.63 3.65 13.42 16.73 35.52 Table 1: Classification error rates on the Deep Learning Benchmark dataset. SAA3 stands for three-layer Stacked Auto-encoder. SVM and RBM results are from [24], DEEP and GSM are results from [15], and AES is from [7]. Though our proposed work is based on a deterministic model, we have shown that the energy, or scoring function of the GAE is equivalent, up to a constant, to that of a conditional RBM, a model that has already seen some use in structured prediction problems [18,12]. GAE scoring can be applied to structured output problems as a type of “post-classification” [17]. The idea is to let a naiv̈e, non-structured classifier make an initial prediction of the outputs in a fast, feed-forward manner, and then allow a second model (in our case, a GAE) clean up the outputs of the first model. Since GAEs can model the relationship between input x and structured output y, we can initialize the output with the output of the naiv̈e model, and then optimize its energy function with respect to the outputs. Input x is held constant throughout the optimization. Li et al recently proposed Compositional High Order Pattern Potentials, a hybrid of Conditional Random Fields (CRF) and Restricted Boltzmann Machines. The RBM provides a global shape information prior to the locally-connected CRF. Adopting the idea of learning structured relationships between outputs, we propose an alternate approach which the inputs of the GAE are not (x, y) but (y, y). In other words, the post-classification model is a covariance autoencoder. The intuition behind the first approach is to use a GAE to learn the relationship between the input x and the output y, whereas the second method aims to learn the correlations between the outputs y. We denote our two proposed methods GAEXY and GAEY 2 . GAEXY corresponds to a GAE, trained conditionally, whose mapping units directly model the relationship between input and output and GAEY 2 corresponds to a GAE which models correlations between output dimensions. GAEXY defines E (y|x), while GAEY 2 defines E (y|y) = E(y). They differ only in terms of the data vectors that they consume. The training and test procedures are detailed in Algorithm 1. Experimental results We consider multi-label classification, where the problem is to classify instances which can take on more than one label at a time. We 10 Algorithm 1 Structured Output Prediction with GAE scoring 1: procedure Multi-label Classification(D = {(xi , yi ) ∈ Xtrain × Ytrain } ) 2: Train a Multi-layer Perceptron (MLP) to learn an input-output mapping f (·): X argmin l(x, y; θ1 ) = loss1 ((f (xi ; θ1 ) − yi ) (14) θ1 3: i where loss1 is an appropriate loss function for the MLP.2 Train a Gated Auto-encoder with inputs (xi , yi ); For the case of GAEY 2 , set xi = yi . X argmin l(x, y; θ2 ) = loss2 (r(yi |xi , θ2 ) − yi ) (15) θ2 4: 5: i where loss2 is an appropriate reconstructive loss for the auto-encoder. for each test data point xi ∈ Xtest do Initialize the output using the MLP. y0 = f (xtest ) 6: 7: 8: 9: (16) while kE(yt+1 |x) − E(yt |x)k >  or ≤ max. iter. do Compute Oyt E Update yt+1 = yt − λOyt E where  is the tolerance rate with respect to the convergence of the optimization. followed the same experimental set up as [18]. Four multi-labeled datasets were considered: Yeast [5] consists of biological attributes, Scene [2] is image-based, and MTurk [13] and MajMin [14] are targeted towards tagging music. Yeast consists of 103 biological attributes and has 14 possible labels, Scene consists of 294 image pixels with 6 possible labels, and MTurk and MajMin each consist of 389 audio features extracted from music and have 92 and 96 possible tags, respectively. Figure 1 visualizes the covariance matrix for the label dimensions in each dataset. We can see from this that there are correlations present in the labels which suggests that a structured approach may improve on a non-structured predictor. Yeast Scene 0.21 0.18 0.15 0.12 0.09 0.06 0.03 0.00 0.03 Mturk 0.21 0.18 0.15 0.12 0.09 0.06 0.03 0.00 0.03 Majmin 0.21 0.18 0.15 0.12 0.09 0.06 0.03 0.00 0.03 0.21 0.18 0.15 0.12 0.09 0.06 0.03 0.00 0.03 Fig. 1: Covariance matrices for the multi-label datasets: Yeast, Scene, MTurk, and MajMin. 2 In our experiments, we used the cross-entropy loss function for loss1 and loss2 . 11 We compared our proposed approaches to logistic regression, a standard MLP, and the two structured CRBM training algorithms presented in [18]. To permit a fair comparison, we followed the same procedure for training and reporting errors as in that paper, where we cross validated over 10 folds and training, validation, test examples are randomly separated into 80%, 10%, and 10% in each fold. The error rate was measured by averaging the errors on each label dimension. Method LogReg HashCRBM∗ MLP GAESXY GAESY 2 Yeast 20.16 20.02 19.79 19.27 19.58 Scene 10.11 8.80 8.99 6.83 6.81 MTurk MajMin 8.10 4.34 7.24 4.24 7.13 4.23 6.59 3.96 6.59 4.29 Table 2: Error rate on multi-label datasets. As in previous work, we report the mean across 10 repeated runs with different random weight initializations. The performance on four multi-label datasets is shown in Table 2. We observed that adding a small amount of Gaussian noise to the input y improved the performance for GAEXY . However, adding noise to the input x did not have as much of an effect. We suspect that adding noise makes the GAE more robust to the input provided by the MLP. Interestingly, we found that the performance of GAEY 2 was negatively affected by adding noise. Both of our proposed methods, GAESXY and GAESY 2 generally outperformed the other methods except for GAESY 2 on the MajMin dataset. At least for these datasets, there is no clear winner between the two. GAESXY achieved lower error than GAESY 2 for Yeast and MajMin, and the same error rate on the MTurk dataset. However, GAESY 2 outperforms GAESXY on the Scene dataset. Overall, the results show that GAE scoring may be a promising means of post-classification in structured output prediction. 6 Conclusion There have been many theoretical and empirical studies on auto-encoders [25,20,21,24,6,7], however, the theoretical study of gated auto-encoders is limited apart from [15,4]. The GAE has several intriguing properties that a classical auto-encoder does not, based on its ability to model relations among pixel intensities rather than just the intensities themselves. This opens up a broader set of applications. In this paper, we derive some theoretical results for the GAE that enable us to gain more insight and understanding of its operation. We cast the GAE as a dynamical system driven by a vector field in order to analyze the model. In the first part of the paper, by following the same procedure as [7], we showed that the GAE could be scored according to an energy function. 12 From this perspective, we demonstrated the equivalency of the GAE energy to the free energy of a FCRBM with Gaussian visible units, Bernoulli hidden units, and sigmoid hidden activations. In the same manner, we also showed that the covariance auto-encoder can be formulated in a way such that its energy function is the same as the free energy of a covariance RBM, and this naturally led to a connection between the mean-covariance auto-encoder and mean-covariance RBM. One interesting observation is that Gaussian-Bernoulli RBMs have been reported to be difficult to train [9,3], and the success of training RBMs is highly dependent on the training setup [26]. Auto-encoders are an attractive alternative, even when an energy function is required. Structured output prediction is a natural next step for representation learning. The main advantage of our approach compared to other popular approaches such as Markov Random Fields, is that inference is extremely fast, using a gradient-based optimization of the auto-encoder scoring function. In the future, we plan on tackling more challenging structured output prediction problems. References 1. Bengio, Y., Thibodeau-Laufer, É.: Deep generative stochastic networks trainable by backprop. arXiv preprint arXiv:1306.1091 (2013) 2. Boutell, M.R., Luob, J., Shen, X., Brown, C.M.: Learning multi-label scene classification. Pattern Recognition 37, 1757–1771 (2004) 3. Cho, K., Ilin, A., Raiko, T.: Improved learning of Gaussian-Bernoulli restricted Boltzmann machines. In: ICANN. pp. 10–17 (2011) 4. Droniou, A., Sigaud, O.: Gated autoencoders with tied input weights. In: ICML (2013) 5. Elisseeff, A., Weston, J.: A kernel method for multi-labelled classification. In: NIPS (2002) 6. Guillaume, A., Bengio, Y.: What regularized auto-encoders learn from the data generating distribution. In: ICLR (2013) 7. Kamyshanska, H., Memisevic, R.: On autoencoder scoring. In: ICML. pp. 720–728 (2013) 8. Kamyshanska, H., Memisevic, R.: The potential energy of an auto-encoder. IEEE Transactions on Pattern Analysis and Machine Intelligence 37(6), 1261–1273 (2014) 9. Krizhevsky, A.: Learning multiple layers of features from tiny images. Tech. rep., Department of Computer Science, University of Toronto (2009) 10. Krizhevsky, A., Sutskever, I., Hinton, G.E.: Imagenet classification with deep convolutional neural networks. In: NIPS (2012) 11. Larochelle, H., Erhan, D., Courville, A., Bergstra, J., Bengio, Y.: An empirical evaluation of deep architectures on problems with many factors of variation. In: ICML (2007) 12. Li, Y., Tarlow, D., Zemel, R.: Exploring compositional high order pattern potentials for structured output learning. In: CVPR (2013) 13. Mandel, M.I., Eck, D., Bengio, Y.: Learning tags that vary within a song. In: ISMIR (2010) 14. Mandel, M.I., Ellis, D.P.W.: A web-based game for collecting music metadata. Journal New of Music Research 37, 151–165 (2008) 13 15. Memisevic, R.: Gradient-based learning of higher-order image features. In: ICCV (2011) 16. Memisevic, R., Zach, C., Hinton, G., Pollefeys, M.: Gated softmax classification. In: NIPS (2010) 17. Mnih, V., Hinton, G.: Learning to detect roads in high-resolution aerial images. In: Proceedings of the 11th European Conference on Computer Vision (ECCV) (2010) 18. Mnih, V., Larochelle, H., Hinton, G.E.: Conditional restricted Boltzmann machines for structured output prediction. In: UAI (2011) 19. Ranzato, M., Hinton, G.E.: Modeling pixel means and covariances using factorized third-order Boltzmann machines. In: CVPR (2010) 20. Rifai, S.: Contractive auto-encoders: Explicit invariance during feature extraction. In: ICML (2011) 21. Swersky, K., Ranzato, M., Buchman, D., Freitas, N.D., Marlin, B.M.: On autoencoders and score matching for energy based models. In: ICML. pp. 1201–1208 (2011) 22. Szegedy, C., Liu, W., Jia, Y., Sermanet, P., Reed, S., Anguelov, D., Erhan, D., Vanhoucke, V., Rabinovich, A.: Going deeper with convolutions. arXiv preprint arXiv:1409.4842 (2014) 23. Taylor, G.W., Hinton, G.E.: Factored conditional restricted Boltzmann machines for modeling motion style. In: ICML. pp. 1025–1032 (2009) 24. Vincent, P.: A connection between score matching and denoising auto-encoders. Neural Computation 23(7), 1661–1674 (2010) 25. Vincent, P., Larochelle, H., Bengio, Y., Manzagol, P.: Extracting and composing robust features with denoising autoencoders. In: ICML (2008) 26. Wang, N., Melchior, J., Wiskott, L.: Gaussian-binary restricted Boltzmann machines on modeling natural image statistics. Tech. rep., Institut fur Neuroinformatik Ruhr-Universitat Bochum, Bochum, 44780, Germany (2014) A A.1 Gated Auto-encoder Scoring Vector field representation To check that the vector field can be written as the derivative of a scalar field, we can submit to Poincaré’s integrability criterion: For some open, simple connected set U, a continuously differentiable function F : U → <m defines a gradient field if and only if ∂Fi (y) ∂Fj (y) = , ∀i, j = 1 · · · n. ∂yj ∂yi Considering the GAE, note that ith component of the decoder ri (y|x) can be rewritten as ri (y|x) = (W·iY )T (W X x (W H )T h(y, x)) = (W·iY W X x)T (W H )T h(y, x). 14 The derivatives of ri (y|x) − yi with respect to yj are ∂ri (y|x) ∂h(x, y) ∂rj (y|x) =(W·iY W X x)T (W H )T = ∂yj ∂yj ∂yi ∂h(y, x) ∂h(u) H = W (W·jY W X x) ∂yj ∂u where u = W H ((W Y y) we have (W X x)). By substituting Equation 17 into (17) ∂Fi ∂Fj ∂yj , ∂yi , ∂rj (y|x) ∂Fj ∂Fi ∂ri (y|x) = −δij = −δij = ∂yj ∂yj ∂yi ∂yi where δij = 1 for i = j and 0 for i 6= j. Similarly, the derivatives of ri (y|x) − yi with respect to xj are ∂ri (y|x) =(W·iY W·jX )T (W H )T h(x, y) + (W·iY ∂xj ∂h(y, x) ∂h(u) H = W (W·jY W X x). ∂xj ∂u By substituting Equation 18 into ∂Fi ∂Fj ∂xj , ∂xi , W X x)(W H )T ∂h ∂rj (y|x) = , ∂xj ∂xi (18) this yields ∂Fi ∂ri (x|y) ∂rj (x|y) ∂Fj = = = . ∂xj ∂xj ∂xi ∂xi A.2 Deriving an Energy Function Integrating out the GAE’s trajectory, we have Z E(y|x) = (r(y|x) − y)dy ZC Z  = W Y W X x) W H h(u dy − ydy   Z Z  Y X H =W W x W h (u) du − ydy, (19) where u is an auxiliary variable such that u = W H ((W Y y) (W X x)) and du H Y (W X x ⊗ 1D )), where ⊗ is the Kronecker product. Consider dy = W (W the symmetric objective function, which is defined in Equation 5. Then we have to also consider the vector field system where both symmetric cases x|y and y|x are valid. As mentioned in Section 3.1, let ξ = [x; y] and γ = [y; x]. As well, let W ξ = diag(W X , W Y ) and W γ = diag(W Y , W X ) where they are block diagonal matrices. Consequently, the vector field becomes F (ξ|γ) = r(ξ|γ) − ξ, (20) 15 and the energy function becomes Z E(ξ|γ) = (r(ξ|γ) − ξ)dξ Z = (W ξ )T ((W γ γ) =(W ξ )T ((W γ γ) Z (W H )T h(u))dξ − ξdξ Z Z H T h(u)du) − ξdξ (W ) where u is an auxiliary variable such that u = W H (W ξ ξ) du = WH Wξ dξ  (W γ γ) . Then  (W γ γ ⊗ 1D ) . Moreover, note that the decoder can be re-formulated as r(ξ|γ) = (W ξ )T (W γ γ = (W ξ )T (W H )T h(ξ, γ))  (W γ γ ⊗ 1D ) (W H )T h(ξ, γ). Re-writing the first term of Equation 19 in terms of the auxiliary variable u, the energy reduces to Z Z  −1 E(ξ|γ) = (W ξ )T (W γ γ ⊗ 1D ) (W H )T h(u) W H (W ξ (W γ γ ⊗ 1D )) du − ξdξ Z Z  −T = (W ξ )T (W γ γ ⊗ 1D ) (W H )T (W ξ (W γ γ ⊗ 1D ))W H h(u)du − ξdξ Z Z = h(u)du − ξdξ Z 1 = h(u)du − ξ 2 + const. 2 B B.1 Relation to other types of Restricted Boltzmann Machines Gated Auto-encoder and Factored Gated Conditional Restricted Boltzmann Machines Suppose that the hidden activation function is a sigmoid. Moreover, we define our Gated Auto-encoder to consists of an encoder h(·) and decoder r(·) such that h(x, y) = h(W H ((W X x) r(x|y, h) = (W X )T ((W Y y) (W Y y)) + b) (W H )T h(x, y)) + a, where θ = {W H , W X , W Y , b} is the parameters of the model. Note that the weights are not tied in this case. The energy function for the Gated Auto-encoder 16 will be: Z Eσ (x|y) = = (1 + exp (−W H (W X x) X x2 + ax + const 2 x2 (W Y y) − bk )) − + ax + const. 2 (W Y y) − b))−1 du − H log (1 + exp (−Wk· (W X x) k Now consider the free energy of a Factored Gated Conditional Restricted Boltzmann Machine (FCRBM). The energy function of a FCRBM with Gaussian visible units and Bernoulli hidden units is defined by E(x, h|y) = X (a − x)2 − bh − WfX· x 2 2σ WfY· y WfH· h. f Given y, the conditional probability density assigned by the FCRBM to data point x is P exp −(E(x, h|y)) exp (−F (x|y)) = Z(y) Z(y) ! X −F (x|y) = log exp (−E(x, h|y)) h p(x|y) = h P where Z(y) = x,h exp (E(x, h|y)) is the partition function and F (x|y) is the free energy function. Expanding the free energy function, we get −F (x|y) = log X exp (−E(x, h|y)) h  2  −(a − x) + bh + WfX· x WfY· y WfH· h 2σ 2 f h    2 X X (a − x) =− + log  exp bh + WfX· x WfY· y WfH· h 2σ 2 h f    2 X Y X (a − x) =− + log  exp bk hk + (WfX· x WfY· y) WfHk hk  2σ 2 h k f    2 X X  (a − x) =− + log 1 + exp bk + (WfHk )T (W X x W Y y)  . 2σ 2 = log X exp  k X f 17 Note that we can center the data by subtracting mean of x and dividing by its standard deviation, and therefore assume that σ 2 = 1. Substituting, we have    X (a − x)2 X −F (x|y) = − + log 1 + exp −bk − (WfHk )T (W X x W Y y) 2 k f    X X x2 = log 1 + exp bk + (WfHk )T (W X x W Y y) − a2 + ax − 2 k f    X X x2 = log 1 + exp bk + (WfHk )T (W X x W Y y) + ax − + const 2 k f Letting W H = (W H )T , we get  = X  log 1 + exp bk + k  X H Wkf (W X x W Y y) + ax − f x2 + const 2 Hence, the Conditional Gated Auto-encoder and the FCRBM are equal up to a constant. B.2 Gated Auto-encoder and mean-covariance Restricted Boltzmann Machines Theorem 2. Consider a covariance auto-encoder with an encoder and decoder, h(x, x) = h(W H ((W F x)2 ) + b) r(x|y = x, h) = (W F )T (W F y (W H )T h(x, y)) + a, where θ = {W F , W H , a, b} are the parameters of the model. Moreover, consider a covariance Restricted Boltzmann Machine with Gaussian distribution over the visibles and Bernoulli distribution over the hiddens, such that its energy function is defined by (a − x)2 X E c (x, h) = − P h(Cx)2 − bh, σ2 f where θ = {P, C, a, b} are its parameters. Then the energy function for a covariance Auto-encoder with dynamics r(x|y) − x is equivalent to the free energy of a covariance Restricted Boltzmann Machine. The energy function of the covariance Auto-encoder is X E(x, x) = log(1 + exp(W H (W F x)2 + b)) − x2 + const (21) k 18 Proof. Note that the covariance auto-encoder is the same as a regular Gated Auto-encoder, but setting y = x and making the factor loading matrices the same, i.e. W F = W Y = W X . Then applying the general energy equation for GAE, Equation 8, to the covariance auto-encoder, we get Z 1 E(x, x) = h(u)du − x2 + const 2 X = log(1 + exp(W H (W F x)2 + b)) − x2 + ax + const, (22) k where u = W H (W F x)2 + b. Now consider the free energy of the mean-covariance Restricted Boltzmann Machine (mcRBM) with Gaussian distribution over the visible units and Bernoulli distribution over the hidden units: X −F (x|y) = log exp (−E(x, h|y)) h  (a − x)2 2 + (P h)(Cx) + bh = log exp − σ2 h   2 XY X (a − x) = log exp − + (Pf k hk )(Cx)2 + bk hk  σ2 h k f    X X (a − x)2 = log 1 + exp  (Pf k hk )(Cx)2  − . σ2 X  k f As before, we can center the data by subtracting mean of x and dividing by its standard deviation, and therefore assume that σ 2 = 1. Substituting, we have    X X = log 1 + exp  (Pf k hk )(Cx)2  − (a − x)2 . (23) k f Letting W H = P T and W F = C, we get    X X = log 1 + exp  (Pf k hk )(Cx)2  − x2 + ax + const. k f Therefore, the two equations are equivalent. (24)
9cs.NE
A new class of tests for multinormality with i.i.d. and garch data based on the arXiv:1711.07199v1 [math.ST] 20 Nov 2017 empirical moment generating function Norbert Henze1 , Marı́a Dolores Jiménez–Gamero2 , 1 2 Institute of Stochastics, Karlsruhe Institute of Technology, Karlsruhe, Germany Department of Statistics and Operations Research, University of Seville, Seville, Spain Abstract. We generalize a recent class of tests for univariate normality that are based on the empirical moment generating function to the multivariate setting, thus obtaining a class of affine invariant, consistent and easy-to-use goodness-of-fit tests for multinormality. The test statistics are suitably weighted L2 -statistics, and we provide their asymptotic behavior both for i.i.d. observations as well as in the context of testing that the innovation distribution of a multivariate GARCH model is Gaussian. We study the finite-sample behavior of the new tests, compare the criteria with alternative existing procedures, and apply the new procedure to a data set of monthly log returns. Keywords. Moment generating function; Goodness-of-fit test; multivariate normality; Gaussian GARCH model AMS 2000 classification numbers: 62H15, 62G20. 1. Introduction As evidenced by the papers Arcones (2007), Batsidis et al. (2013), Cardoso de Oliveira and Ferreira (2010), Ebner (2012), Enomoto et al. (2012), Farrel et al. (2007), Hanusz and Tarasińska (2008, 2012), Henze et al. (2017), Joenssen and Vogel (2014), Jönsson (2011), Kim (2016), Koizumi et al. (2014), Mecklin and Mundfrom (2005), Pudelko (2005), Székely and Rizzo (2005), Tenreiro (2011, 2017), Thulin (2014), Villa1 señor-Alva and Estrada (2009), Voinov et al. (2016), Yanada et al. (2015), and Zhou and Shao (2014), there is an ongoing interest in the problem of testing for multivariate normality. Without claiming to be exhaustive, the above list probably covers most of the publications in this field since the review paper Henze (2002). Recently, Henze and Koch (2017) provided the lacking theory for a test for univariate normality suggested by Zghoul (2010). The purpose of this paper is twofold. First, we generalize the results of Henze and Koch (2017) to the multivariate case, thus obtaining a class of affine invariant and consistent tests for multivariate normality. Second, in contrast to that paper (and most of the other publications), which considered only independent and identically distributed (i.i.d.) observations, we also provide the asymptotics of our test statistics in the context of GARCH-type dependence. To be more specific, let (for the time being) X, X1 , X2 , . . . be a sequence of i.i.d. d-variate random column vectors that are defined on a common probability space (Ω, A, P). We assume that the distribution PX is absolutely continuous with respect to Lebesgue measure. Let Nd (µ, Σ) denote the d-variate normal distribution with mean vector µ and non-degenerate covariance matrix Σ, and write Nd for the class of all non-degenerate d-dimensional normal distributions. A test for multivariate normality is a test of the null hypothesis H0 : PX ∈ Nd , and usually such a test should be consistent against any fixed non-normal alternative distribution. Since the class Nd is closed with respect to full rank affine transformations, any genuine test statistic Tn = Tn (X1 , . . . , Xn ) based on X1 , . . . , Xn should also be affine invariant, i.e., we should have Tn (AX1 + b, . . . , AXn + b) = Tn (X1 , . . . , Xn ) for each nonsingular d×d-matrix A and each b ∈ Rd , see Henze (2002) for a critical account on affine invariant tests for multivariate normality. P P In what follows, let X n = n−1 nj=1 Xj , Sn = n−1 nj=1 (Xj − X n )(Xj − X n )> denote the sample mean and the sample covariance matrix of X1 , . . . , Xn , respectively, where > means transposition of vectors and matrices. Furthermore, let Yn,j = Sn−1/2 (Xj − X n ), j = 1, . . . , n, be the so-called scaled residuals of X1 , . . . , Xn , which provide an empirical standard2 −1/2 ization of X1 , . . . , Xn . Here, Sn denotes the unique symmetric square root of Sn . Notice that Sn is invertible with probability one provided that n ≥ d + 1, see Eaton and Perlman (1973). The latter condition is tacitly assumed to hold in what follows. Letting n  1X exp t> Yn,j , Mn (t) = n j=1 t ∈ Rd , (1.1) denote the empirical moment generating function of Yn,1 , . . . , Yn,n , Mn (t) should be close to m(t) = exp(ktk2 /2), which is the moment generating function of the standard normal distribution Nd (0, Id ). Here and in the sequel, k · k stands for the Euclidean norm on Rd , and Id is the unit matrix of order d. The statistic proposed in this paper is the weighted L2 -statistic Z (Mn (t) − m(t))2 wβ (t) dt, Tn,β = n (1.2) Rd where  wβ (t) = exp −βktk2 , (1.3) and β > 1 is some fixed parameter, the role of which will be discussed later. Notice that Tn,β is the ’moment generating function analogue’ to the BHEP-statistics for testing for multivariate normality (see, e.g., Baringhaus and Henze (1988), Henze and Zirkler (1990), Henze and Wagner (1997)). The latter statistics originate if one replaces Mn (t) with the empirical characteristic function of the scaled residuals and m(t) with the characteristic function exp(−ktk2 /2) of the standard normal distribution Nd (0, Id ). For a general account on weighted L2 -statistics see, e.g., Baringhaus et al. (2017). In principle, one could replace wβ in (1.3) with a more general weight function satisfying some general conditions. The above special choice, however, leads to a test criterion with certain extremely appealing features, since straightforward calculations yield the representation Tn,β = π d/2   n 1 X 1 kYn,i + Yn,j k2 n exp + d/2 n i,j=1 β 4β (β − 1)d/2  ! n X 1 kYn,j k2 −2 exp , d/2 (β − 1/2) 4β − 2 j=1 3 (1.4) which is amenable to computational purposes. Notice that the condition β > 1 is necessary for the integral in (1.2) to be finite. Later, we have to impose the further restriction β > 2 to prove that Tnβ has a non-degenerate limit null distribution as n → ∞. We remark that Tn,β is affine invariant since it only depends on the Mahanalobis > Yn,j , 1 ≤ i, j ≤ n. Rejection of H0 is for large values of Tn,β . angles and distances Yn,i The rest of the paper unfolds as follows. The next section shows that letting β tend to infinity in (1.2) yields a linear combination of two well-known measures of multivariate skewness. In Section 3 we derive the limit null distribution of Tn,β in the i.i.d. setting. Section 4 addresses the question of consistency of the new tests against general alternatives, while Section 5 considers the new criterion in the context of multivariate GARCH models in order to test for normality of innovations, and it provides the pertaining large-sample theory. Section 6 presents a Monte Carlo study that compares the new tests with competing ones, and it considers a real data set from the financial market. The article concludes with discussions in Section 7. 2. The case β → ∞ In this section, we show that the statistic Tn,β , after a suitable scaling, approaches a linear combination of two well-known measures of multivariate skewness as β → ∞. Theorem 2.1 We have lim β 3+d/2 β→∞ 96Tn,β = 2b1,d + 3eb1,d , nπ d/2 where b1,d n 3 1 X > = 2 Yn,j Yn,k , n j,k=1 n X > eb1,d = 1 Yn,j Yn,k kYn,j k2 kYn,k k2 2 n j,k=1 are multivariate sample skewness in the sense of Mardia (1970) and Móri, Rohatgi and Székely (1993), respectively. Proof. Let b2,d = n−1 Pn j=1 kYn,j k4 denote multivariate sample kurtosis in the sense of Mardia (1970). From (1.4) and exp(y) = 1 + y + 4 y2 y3 + + O(y 4 ) 2 6 as y → 0, the result follows by very tedious but straightforward calculations, using the P P P relations nj=1 Yn,j = 0, nj=1 kYn,j k2 = nd, nj,k=1 kYn,j + Yn,k k2 = 2n2 d, n X  kYn,j + Yn,k k4 = 2n2 b2,d + d2 + 2d , j,k=1 n X > kYn,j + Yn,k k4 Yn,j Yn,k = 8n2 b2,d + 4n2 b1,d + 2n2eb1,d , j,k=1 n X kYn,j + Yn,k k6 = 2n n X kYn,j k6 + 6(d+4)n2 b2,d + 8n2 b1,d + 12n2eb1,d . j=1 j,k=1 For the derivation of the second but last expression, see the proof of Theorem 4.1 of P Henze et al. (2017). We stress that although b2,d and nj=1 kYn,j k6 show up in some of the equations above, these terms cancel out in the derivation of the final result. Remark 2.2 Interestingly, Tn,β exhibits the same limit behavior as β → ∞ as both the statistic studied by Henze et al. (2017), which is based on a weighted L2 -distance involving both the empirical characteristic function and the empirical moment generating function, and the BHEP-statistic for testing for multivariate normality, which is based on the empirical characteristic function, see Theorem 2.1 of Henze (1997). At first sight, Theorem 2.1 seems to differ from Theorem 4 of Henze and Koch (2017) which covers the special case d = 1, but a careful analysis shows that – with the notation τ (β) in that paper – we have limβ→∞ β 7/2 τ (β) = 0. 3. Asymptotic null distribution in the i.i.d. case In this section we consider the case that X1 , X2 , . . . are i.i.d. d-dimensional random vectors with some non-degenerate normal distribution. The key observation for deriving the limit distribution of Tn,β is the fact that Z Tn,β = Wn (t)2 wβ (t) dt, Rd where Wn (t) = √ n (Mn (t) − m(t)) , t ∈ Rd , (3.1) with Mn (t) given in (1.1). Notice that Wn is a random element of the Hilbert space L2β := L2 (Rd , B d , wβ (t)dt) 5 (3.2) of (equivalence classes of) measurable functions f : Rd → R that are square integrable with respect to the finite measure on the σ-field B d of Borel sets of Rd given by the weight function wβ defined in (1.3). The resulting norm in L2β will be denoted by p kf kL2β = hf, f i. With this notation, Tn,β takes the form Tn,β = kWn k2L2 . (3.3) β D Writing ”−→” for convergence in distribution of random vectors and stochastic processes, the main result of this section is as follows. Theorem 3.1 (Convergence of Wn under H0 ) Suppose that X has some non-degenerate d-variate normal distribution, and that β > 2 in (1.3). Then there is a centred Gaussian random element W of L2 having covariance kernel  C(s, t) = exp ksk2 + ktk2 2  s> t e s> t −1−s t− 2 2 ! > , s, t ∈ Rd , D so that Wn −→ W as n → ∞. In view of (3.3), the Continuous Mapping Theorem yields the following result. Corollary 3.2 If β > 2, then, under the null hypothesis H0 , D Tn,β −→ kW k2L2 as n → ∞. β Remark 3.3 The distribution of T∞,β := kW k2L2 (say) is that of β P∞ j=1 λj Nj2 , where λ1 , λ2 , . . . are the positive eigenvalues of the integral operator f 7→ Af on L2β associated R with the kernel C given in Theorem 3.1, i.e., (Af )(t) = C(s, t)f (s) exp(−βksk2 )ds, and N1 , N2 , . . . are i.i.d. standard normal random variables. We did not succeed in obtaining explicit solutions of this equation. However, since Z E(T∞,β ) = C(t, t) wβ (t) dt, d R Z Z C 2 (s, t)wβ (s)wβ (t) dsdt V(T∞,β ) = 2 Rd Rd (see Shorack and Wellner, 1986, p. 213), tedious but straighforward manipulations of integrals yield the following result, which generalizes Theorem 2 of Henze and Koch (2017). 6 Theorem 3.4 If β > 2 we have a) E(T∞,β ) = π d/2  1 1 d d(d + 2) − − − d/2 d/2 d/2+1 (β − 2) (β − 1) 2(β − 1) 8(β − 1)d/2+2  , b) V(T∞,β ) = 2π d 1 2d+1 (1 + 2d)2d d(d + 2)2d − − − (β(β − 2))d/2 η d/2 η d/2+1 η d/2+2  d 3d(d + 2) 1 , + + + (β − 1)d 2(β − 1)d+2 64(β − 1)d+4  where η = 4(β − 1)2 − 1. Proof of Theorem 3.1. In view of affine invariance, we assume w.l.o.g. that the distribution of X is Nd (0, Id ). In Henze et al. (2017), the authors considered the “exponentially down-weighted empirical moment generating function process”   ktk2 An (t) = exp − Mn (t), t ∈ Rd . 2 (3.4) Notice that, with the notation given in (3.2), we have kAn k2L2 = kMn k2L2γ , β where γ = β − 1 From display (10.5) and Propositions 10.3 and 10.4 of Henze et al. (2017) we have ktk2 An (t) = exp − 2  where R Rd  √ n ! n 1 X t> Xj e − m(t) + Vn (t) + Rn (t), n j=1 Rn2 (t)wγ (t)dt = oP (1), and n n  1 X > 1 X > Vn (t) = − √ (t Xj )2 − ktk2 − √ t Xj . 2 n j=1 n j=1 Display (3.4) and the representation of An as a sum yield n 1 X Wn (t) = √ Zj (t) + m(t)Rn (t), n j=1 7 where >X j Zj (t) = et − m(t) −  m(t) > (t Xj )2 − ktk2 − m(t)t> Xj . 2 Notice that Z1 , Z2 , . . . are i.i.d. centred random elements of L2β . Since Z Z 2 (m(t)Rn (t)) wβ (t) dt = Rn2 (t)wγ (t) dt = oP (1), Rd Rd a Central Limit Theorem in Hilbert spaces (see e.g., Bosq, 2000) shows that there is a D centered Gaussian random element W of L2β , so that Wn −→ W. Using the fact that t> X has the normal distribution N(0, ktk2 ) h > i E es X (t> X)2 = h > i s X > E e t X =  > 2 > 2 E (s X) (t X) = and the relations  m(s) (s> t)2 + ktk2 , m(s)s> t, 2(s> t)2 + ksk2 ktk2 , some straightforward algebra shows that the covariance kernel C(s, t) figuring in the statement of Theorem 3.1 equals EZ1 (s)Z1 (t). 4. Consistency The next result shows that the test for multivariate normality based on Tn,β is consistent against general alternatives. Theorem 4.1 Suppose X has some absolutely continuous distribution, and that MX (t) = e = Σ−1/2 (X − µ), where µ = E(X) and E[exp(t> X)] < ∞, t ∈ Rd . Furthermore, let X Σ−1/2 is the symmetric square root of the inverse of the covariance matrix Σ of X. e we have Letting MXe (t) = E[exp(t> X)], Z 2 Tn,β lim inf ≥ MXe (t) − m(t) wβ (t) dt n→∞ n Rd almost surely. Proof. Because of affine invariance we may w.l.o.g. assume EX = 0 and Σ = Id . Fix P K > 0 and put Mn◦ (t) = n−1 nj=1 exp(t> Xj ). From the proof of Theorem 6.1 of Henze et al. (2017) we have lim max Mn (t) − Mn◦ (t) = 0 n→∞ ktk≤K 8 P-almost surely. Now, the strong law of large numbers in the Banach space of continuous functions on B(K) := {t ∈ Rd : ktk ≤ K} and Fatou’s lemma yield Z Tn,β lim inf ≥ lim inf (Mn (t) − m(t))2 wβ (t) dt n→∞ n→∞ n B(K) Z  > 2 ≥ Eet X − m(t) wβ (t) dt B(K) P-almost surely. Since K is arbitrary, the assertion follows. Now, suppose that X has an alternative distribution (which is assumed to be standardized) satisfying the conditions of Theorem 4.1. Since E exp(t> X) − m(t) 6= 0 for at least one t, Theorem 4.1 shows that limn→∞ Tn,β = ∞ P-almost surely. Since, for any given nominal level α ∈ (0, 1), the sequence of critical values of a level-α-test based on Tnβ that rejects H0 for large values of Tn,β converges according to Theorem 3.1, this test is consistent against such an alternative. It should be ’all the more consistent’ against any distribution not satisfying the conditions of Theorem 4.1 but, in view of the reasoning given in Csörgő (1986), the behavior of Tn,β against such alternatives is a difficult problem. 5. Testing for normality in GARCH models In this section we consider the multivariate GARCH (MGARCH) model 1/2 Xj = Σj (θ)εj , j ∈ Z, (5.1) where θ ∈ Θ ⊆ Rv is a v-dimensional vector of unknown parameters. The unobservable random errors or innovations {εj , j ∈ Z} are i.i.d. copies of a d-dimensional random vector ε, which is assumed to have mean zero and unit covariance matrix. Hence Σj (θ) = Σ(θ; Xj−1 , Xj−2 , . . .) is the conditional variance of Xj , given Xj−1 , Xj−2 , . . .. The explicit expression of Σj (θ) depends on the assumed MGARCH model (see, e.g., Francq and Zakoı̈an, 2010, for a detailed description of several relevant models). The interest in testing for normality of the innovations stems from the fact that this distributional assumption is made in 9 some applications, and that, if erroneously accepted, some inferential procedures can lead to wrong conclusions (see, e.g., Spierdijk, 2016, for the effect on the assessment of standard risk measures such as the value at risk). Therefore, an important step in the analysis of GARCH models is to check whether the data support the distributional hypotheses made on the innovations. Because of this reason, a number of goodness-of-fit tests have been proposed for the innovation distribution. The papers by Klar et al. (2012) and Ghoudi and Rémillard (2014) contain an extensive review of such tests as well as some numerical comparisons between them for the special case of testing for univariate normality. The proposals for testing goodness-of-fit in the multivariate case are rather scarce. The class of GARCH models has been proved to be particularly valuable in modeling financial data. As discussed, among others in Rydberg (2000), one of the stylized features of financial data is that they are heavy-tailed. From an extensive simulation study (a summary is reported in Section 6), we learnt that, for i.i.d. data, the test of normality based on Tn,β exhibits a high power against heavy-tailed distributions. Because of these reasons, this section is devoted to adapt that procedure to testing for normality of the innovations based on data X1 , . . . , Xn that are driven by equation (5.1). Therefore, on the basis of the observations, we wish to test the null hypothesis H0,G : The law of ε is Nd (0, Id ). against general alternatives. Notice that H0,G is equivalent to the hypothesis that, conditionally on {Xj−1 , Xj−2 , . . .}, the law of Xj is Nd (0, Σj (θ)), for some θ ∈ Θ. Two main differences with respect to the i.i.d. case are: (a) the innovations in (5.1) are assumed to be centered at zero with unit covariance matrix; and (b) the conditional covariance matrix Σj (θ) of Xj is time-varying in a way that depends on the unknown parameter θ and on past observations. Notice that although H0,G is about the distribution of ε, the innovations are unobservable in the context of model (5.1). Hence any inference on the distribution of the innovations should be based on residuals e −1/2 (θbn )Xj , εej (θbn ) = Σ j 1 ≤ j ≤ n. (5.2) Recall that Σj (θ) = Σ(θ; Xj−1 , Xj−2 , . . . ), but we only observe X1 , . . . , Xn . Therefore, 10 to estimate Σj (θ), apart from a suitable estimator θbn of θ, we also need to specify values ej , j ≤ 0}. So we write Σ e j (θ) for Σ(θ; Xj−1 , . . . , X1 , X e0 , X e−1 . . .). for {Xj , j ≤ 0}, say {X Under certain conditions, these arbitrarily fixed initial values are asymptotically irrelevant. Taking into account that the innovations have mean zero and unit covvariance matrix, we will work directly with the residuals, without standardizing them. Let MnG be defined as Mn in (1.1) by replacing Yn,j with εej (θbn ), 1 ≤ j ≤ n, and define T G as n,β Tn,β in (3.3) with Wn changed for WnG , where WnG is defined as Wn in (3.1) with Mn replaced by MnG . In order to derive the asymptotic null distribution of WnG we will make the assumptions (A.1)–(A.6) below. In the sequel, C > 0 and %, 0 < % < 1, denote generic constants, the values of which may vary across the text, θ0 stands for P the true value of θ, and for any matrix A = (akj ), kAk = k,j |akj | denotes the l1 -norm (we use the same notation as for the Euclidean norm of vectors). P √ (A.1) The estimator θbn satisfies n(θbn − θ0 ) = n−1/2 nj=1 Lj + oP (1), where Lj = hj gj , gj = g(θ0 ; εj ) is a vector of d2 measurable functions such that E(gj ) = 0 and E(gj> gj ) < ∞, and hj = h(θ0 ; εj−1 , εj−2 . . .) is a v × d2 -matrix of measurable 2 functions satisfying E(khj h> j k ) < ∞, e −1/2 (θ) ≤ C, (A.2) supθ∈Θ Σ j −1/2 supθ∈Θ Σj (θ) ≤ C P-a.s., 1/2 e 1/2 (θ)k ≤ C%j , (A.3) supθ∈Θ kΣj (θ) − Σ j 1/2 (A.4) E kXj kς < ∞ and E Σj (θ0 ) ς < ∞ for some ς > 0, (A.5) for any sequence x1 , x2 , . . . of vectors of Rd , the function θ 7→ Σ1/2 (θ; x1 , x2 , . . . ) admits continuous second-order derivatives, (A.6) for some neighborhood V (θ0 ) of θ0 , there exist p > 1, q > 2 and r > 1 so that 11 2p−1 + 2r−1 = 1 and 4q −1 + 2r−1 = 1, and v X E sup θ∈V (Θ) k,`=1 v X E sup θ∈V (Θ) ∂ −1/2 Σj (θ) k=1 p 1/2 Σj (θ) ∂θk ∂θ` < ∞, q 1/2 ∂Σj (θ) −1/2 Σj (θ) ∂θk −1/2 1/2 E sup 2 Σj (θ0 )Σj < ∞, r (θ) < ∞. θ∈V (Θ) The next result gives the asymptotic null distribution of WnG . Theorem 5.1 (Convergence of WnG under H0,G ) Let {Xj } be a strictly stationary process satisfying (5.1), with Xj being measurable with respect to the sigma-field generated by {εu , u ≤ j}. Assume that (A.1)–(A.6) hold and that β > 2. Then under the null hypothesis H0,G , there is a centered Gaussian random element WG of L2β , having covariance kernel CG (s, t) = cov(U (t), U (s)), so D that WnG −→ WG as n → ∞, where U (t) = exp(t> ε1 ) − m(t) − m(t)a(t)> L1 , −1/2 a(t)> = (t> µ1 t, . . . , t> µv t), µk = E[A1k (θ0 )], A1k (θ) = Σ1 1/2 (θ) ∂θ∂k Σ1 (θ), 1 ≤ k ≤ v. From Theorem 5.1 and the Continuous Mapping Theorem we have the following corollary. Corollary 5.2 Under the assumptions of Theorem 5.1, we have D G Tn,β −→ kWG k2L2 as n → ∞. β The standard estimation method for the parameter θ in GARCH models is the quasi maximum likelihood estimator (QMLE), defined as θbn = arg max Ln (θ), θ∈Θ where n 1 Xe Ln (θ) = − `j (θ), 2 j=1 e j (θ)−1 Xj + log Σ e j (θ) . `ej (θ) = Xj> Σ 12 Comte and Leiberman (2003) and Bardet and Wintenberger (2009), among others, have shown that under certain mild regularity conditions the QMLE satisfies (A.1) for general MGARCH models. As observed before, there are many MGARCH parametrizations for the matrix Σj (θ). Nevertheless, there exist only partial theoretical results for such models. The Constant Conditional Correlation model, proposed by Bollerslev (1990) and extended by Jeantheau (1998), is an exception, since its properties have been thoroughly studied. This model decomposes the conditional covariance matrix figuring in (5.1) into conditional standard deviations and a conditional correlation matrix, according to Σj (θ0 ) = Dj (θ0 )R0 Dj (θ0 ), where Dj (θ0 ) and R0 are d × d-matrices, R0 is a correla tion matrix, and Dj (θ0 ) is a diagonal matrix so that σj2 (θ) = diag Dj2 (θ) with σj2 (θ) =b+ p X (2) Bk Xj−k k=1 (2) Here, Xj = Xj Xj , where + q X 2 Γk σj−k (θ). (5.3) k=1 denotes the Hadamard product, that is, the element by element product, b is a vector of dimension d with positive elements, and {Bk }pk=1 and {Γk }qk=1 are d × d matrices with non-negative elements. This model will be referred to as CCC-GARCH(p,q). Under certain weak assumptions, the QMLE for the parameters in this model satisfies (A.1), and (A.2)–(A.6) also hold, see Francq and Zakoı̈an (2010) and Francq et al. (2017). G depends on the equation defining the The asymptotic null distribution of Tn,β GARCH model and on θ0 through the quantities µ1 , . . . , µv , as well as on which estimator of θ has been employed. Therefore, the asymptotic null distribution cannot G be used to approximate the null distribution of Tn,β . Following Klar et al. (2012), we G will estimate the null distribution of Tn,β by using the following parametric bootstrap algorithm: (i) Calculate θbn = θbn (X1 , . . . , Xn ), the residuals εe1 , . . . , εen and the test statistic G G Tn,β = Tn,β (e ε1 , . . . , εen ). b ∗, e 1/2 (θ)ε (ii) Generate vectors ε∗1 , . . . , ε∗n i.i.d. from a Nd (0, Id ) distribution. Let Xj∗ = Σ j j j = 1, . . . , n. (iii) Calculate θbn∗ = θbn (X1∗ , . . . , Xn∗ ), the residuals εe∗1 , . . . , εe∗n , and approximate the null 13 G distribution of Tn,β by means of the conditional distribution, given the data, of G G∗ (e ε∗1 , . . . , εe∗n ). = Tn,β Tn,β In practice, the approximation in step (iii) is carried out by generating a large G number of bootstrap replications of the test statistic Tn,β , whose empirical distribution G . Similar steps to those given function is used to estimate the null distribution of Tn,β in the proof of Theorem 5.1 show that if one assumes that (A.1)–(A.6) continue to hold when θ0 is replaced by θn , with θn → θ0 as n → ∞, and ε ∼ Nd (0, Id ), then G∗ , given the data, converges in law to kWG k2L2 , with the conditional distribution of Tn,β β WG as defined in Theorem 5.1. Therefore, the above bootstrap procedure provides a consistent null distribution estimator. Remark 5.3 The practical application of the above bootstrap null distribution estimator entails that the parameter estimator of θ and the residuals must be calculated for each bootstrap resample, which results in a time-consuming procedure. Following the approaches in Ghoudi and Rémillard (2014) and Jiménez-Gamero and Pardo-Fernández (2017) for other goodness-of-fit tests for univariate GARCH models, we could use a weighted bootstrap null distribution estimator in the sense of Burke (2000). From a computational point of view, it provides a more efficient estimator. Nevertheless, it can be verified that the consistency of the weighted bootstrap null distribution estimator of G Tn,β requires the existence of the moment generating function of the true distribution generating the innovations, which is a rather strong condition, specially taking into account that the alternatives of interest are heavy-tailed. As in the i.i.d. case, the next result shows that the test for multivariate normality G based on Tn,β is consistent against general alternatives. Theorem 5.4 Let {Xj } be a strictly stationary process satisfying (5.1), with Xj being measurable with respect to the sigma-field generated by {εu , u ≤ j}. Assume that (A.1)–(A.6) hold, that ε has some absolutely continuous distribution, and that Mε (t) = E[exp(t> ε)] < ∞, t ∈ Rd . We then have Z G Tn,β lim inf ≥ (Mε (t) − m(t))2 wβ (t) dt n→∞ n d R in probability. 14 Similar comments to those made after Theorem 4.1 for the i.i.d. case can be done in this setting. Proof of Theorem 5.1. From the proof of Theorem 7.1 in Henze et al. (2017), it P G G (t) = n−1/2 nj=1 Vj (t), (t) + rn,1 (t), with W1,n follows that WnG (t) = W1,n √ Vj (t) = exp(t> εj ) − m(t)a(t)> n(θbn − θ0 ) − m(t), G G G (t) = (t) + rn,2 (t), with W2,n (t) = W2,n and krn,1 kL2β = oP (1). By Assumption A.1, W1,n Pn −1/2 n j=1 Uj (t), Uj (t) = exp(t> εj ) − exp(−ktk2 /2)a(t)> Lj − exp(−ktk2 /2), and krn,2 kL2β = oP (1). G (t), t ∈ To prove the result we will apply Theorem 4.2 in Billingsley (1968) to {W2,n G (t), t ∈ B(K)} converges in law to Rd } by showing that (a) for each positive M , {W2,n {W G (t), t ∈ B(K)} in C(B(K)), the Banach space of real-valued continuous functions on B(K) := {t ∈ Rd : ktk ≤ K}, endowed with the supremum norm; (b) for each ε > 0, there is a positive K so that Z  G 2 E W2,n (t) wβ (t) dt < ε, (5.4) Rd \B(K) Z   E W G (t)2 wβ (t) dt < ε. (5.5) Rd \B(K) Proof of (a): By applying the central limit theorem for martingale differences, the G (t), t ∈ Rd } converge to those of {WG (t), t ∈ finite-dimensional distributions of {W2,n G Rd }. Hence, to prove (a) we must show that {W2,n (t), t ∈ B(K)} is tight. With this P G G G G aim we write W2,n (t) = W3,n (t)−W4,n (t), with W3,n (t) = n−1/2 nj=1 {exp(t> εj )−m(t)} P G and W4,n (t) = m(t)a(t)> n−1/2 nj=1 Lj . The mean value theorem gives   E {exp(t> ε) − exp(s> ε)}2 ≤ κkt − sk2 , s, t ∈ B(K), G for some positive κ. From Theorem 12.3 in Billingsley (1968), the process {W3,n (t), t ∈ P B(K)} is tight. By the central limit theorem for martingale differences, n−1/2 nj=1 Lj G converges in law to a v-variate zero mean normal random vector. Hence {W4,n (t), t ∈ B(K)}, being a product of a continuous function and a term which is OP (1), is tight, G and the same property holds for {W2,n (t), t ∈ B(K)}. 15  G 2 Proof of (b): In view of E W2,n (t) = E [U1 (t)2 ] < ∞, for each ε > 0 there is some positive constant K so that (5.4) holds. Likewise, (5.5) holds, which completes the proof. −1/2 fG (t) = Proof of Theorem 5.4. Let εj (θ) = Σj (θ)Xj . Notice that εj (θ0 ) = εj . Let M n Pn Pn Pn −1 > G −1 > ◦ −1 > c n ej (θ̂n )}, Mn (t) = n j=1 exp{t ε j=1 exp{t εj (θ̂n )}, Mn (t) = n j=1 exp{t εj } and B(K) := {t ∈ Rd : ktk ≤ K}. To show the result we will prove cG (t) − M ◦ (t)| = oP (1), (a) supt∈B(K) |M n n fG (t) − M cG (t)| = oP (1), (b) supt∈B(K) |M n n and the result will follow by using the same proof as in the i.i.d. case. −1/2 1/2 Proof of (a): Let θbn = (θbn1 , . . . , θbnv )> , θ0 = (θ01 , . . . , θ0v )> and Ajk (θ) = Σj (θ) ∂θ∂k Σj (θ). P We have εj (θbn ) = εj + ∆n,j , with ∆n,j = − vk=1 Ajk (θen,j )εj (θbnk − θ0k ), for some θen,j between θbn and θ0 . Observe that exp(t> ∆n,j ) − 1 = t> ∆n,j exp(αn,j t> ∆n,j ) for some αn,j ∈ (0, 1). Now (A.1) and (A.6) yield k∆n,j k ≤ Dj kεj kkθbn − θ0 k for large enough n, where E(Dj2 ) < ∞. The Cauchy–Schwarz inequality gives n X  cnG (t) − Mn◦ (t)| = 1 |M exp(t> εj ) exp(t> ∆n, j) − 1 n j=1 ≤ r1,n (t)1/2 r2,n (t)1/2 , where r1,n (t) = Mn (2t), and  X n 1 b b r2,n (t) = ktk kθn − θ0 k exp 2ktkkθn − θ0 k max Dj kεj k Dj2 kεj k2 . 1≤j≤n n j=1 2 2  From the strong law of large numbers in the Banach space of continuous functions on B(K), we have sup r1,n (t) ≤ sup Mε (2t) + sup |MnG (2t) + Mε (2t)| < K1 t∈B(K) t∈B(K) P-a.s. t∈B(K) for some positive constant K1 . From the ergodic theorem, n−1 Pn j=1 Dj2 kεj k2 < K2 P-almost surely for some positive constant K2 . Using stationarity and finite second √ moments, if follows that max1≤j≤n Dj kεj k/ n → 0, P-almost surely. Hence (A.1) yields supt∈B(K) r2,n (t) → 0, in probability. This concludes the proof of (a). Proof of (b): The reasoning follows similar steps as the proof of fact (c.1) in the proof of Theorem 7.1 in Henze et al. (2017) and is thus omitted. 16 6. Monte Carlo results This section describes and summarizes the results of an extensive simulation experiment carried out to study the finite-sample performance of the proposed tests. Moreover, we consider a real data set of monthly log returns. All computations have been performed using programs written in the R language. 6.1. Numerical experiments for i.i.d. data Upper quantiles of the null distribution of Tn,β have been approximated by generating 100,000 samples from a law Nd (0, Id ). Table 1 displays some critical values with the convention that an entry like −4 1.17 stands for 1.17 × 10−4 . The results show that large sample sizes are required to approximate the critical values by their corresponding asymptotic values. A natural competitor of the test based on Tn,β is the CF-based test studied in Henze and Wagner (1997) (HW-test). The latter procedure is simple to compute as well as affine invariant, and it has revealed good power performance with regard to competitors. The behaviour of the test based on Tn,β in relation to the HW-test depends on whether the distribution is heavy-tailed or not. We tried a number of non-heavytailed distributions (specifically, the multivariate Laplace distribution, finite mixtures of normal distributions, the skew-normal distribution, the multivariate χ2 -distribution, the Khintchine distribution, the uniform distribution on [0, 1]d and the Pearson type II family). For these distributions we observed that the power of the proposed test is either similar or smaller than that of the HW-test; for very heavy-tailed distributions, the new test outperforms the HW-test. This observation can be appreciated by looking at Table 2, which displays the empirical power calculated by generating 10,000 samples (in each case), for the significance level α = 0.05, from the following heavy-tailed alternatives: (ASEθ ) the θ-stable and elliptically-contoured distribution and the (Tθ ) multivariate Student’s t with θ degrees of freedom. The same fact was also observed in Zghoul (2010), who numerically studied the test based on Tn,β for univariate data. In our simulations we tried a large number of values for β for the proposed test as well as for the HW-test. The tables display the results for those values of β giving the highest power in most of the cases considered. The same can be said for the simulations 17 Table 1: Critical points for π −d/2 Tn,β . β d n α 2.5 3.0 2 20 0.05 0.10 0.05 0.10 0.05 0.10 0.05 0.10 0.05 0.10 0.05 0.10 0.213 0.339 0.391 0.661 0.511 0.868 0.612 1.028 0.679 1.132 0.701 1.148 −1 0.751 −2 3.269 −2 1.639 −1 1.147 −2 4.857 −1 1.246 0.05 0.10 0.05 0.10 0.05 0.10 0.05 0.10 0.05 0.10 0.05 0.10 0.05 0.10 0.05 0.10 0.05 0.10 0.05 0.10 0.05 0.10 0.05 0.10 50 100 200 300 400 3 20 50 100 200 300 400 5 20 50 100 200 300 400 3.5 4.0 6.0 10.0 −3 5.408 −3 2.266 −4 2.241 −2 2.380 −3 7.638 −3 3.150 −4 3.025 −2 5.098 −2 2.436 −3 7.594 −3 3.078 −4 2.875 −1 1.997 −2 7.802 −2 3.624 −3 10.917 −3 4.330 −4 3.897 −1 1.539 −2 6.073 −2 2.838 −3 8.620 −3 3.429 −4 3.111 −1 2.432 −2 9.168 −2 4.153 −3 12.094 −3 4.724 −4 4.143 −1 1.757 −2 6.719 −2 3.085 −3 9.181 −3 3.616 −4 3.232 −1 2.726 −2 9.908 −2 4.382 −3 12.528 −3 4.845 −4 4.221 −1 1.894 −2 7.114 −2 3.223 −3 9.466 −3 3.719 −4 3.296 −1 2.878 −2 10.259 −2 4.518 −3 12.748 −3 4.905 −4 4.232 −1 1.925 −2 7.165 −2 3.248 −3 9.502 −3 3.721 −4 3.283 −1 2.868 −2 10.084 −2 4.417 −3 12.521 −3 4.843 −4 4.187 0.356 0.520 0.719 1.153 0.988 1.646 1.232 2.046 1.332 2.187 1.397 2.245 −1 1.066 −2 4.095 −2 1.851 −3 5.218 −3 1.942 −4 1.413 −1 1.504 −2 5.629 −2 2.503 −3 6.886 −3 2.518 −4 1.773 −1 1.906 −2 6.760 −2 2.894 −3 7.598 −3 2.709 −4 1.828 −1 2.879 −2 9.789 −2 4.073 −3 10.317 −3 3.593 −4 2.334 −1 2.433 −2 8.258 −2 3.426 −3 8.696 −3 3.043 −4 1.992 −1 3.732 −2 11.943 −2 4.788 −3 11.572 −3 3.945 −4 2.489 −1 2.851 −2 9.322 −2 3.781 −3 9.365 −3 3.231 −4 2.078 −1 4.319 −2 13.243 −2 5.167 −3 12.210 −3 4.123 −4 2.567 −1 2.979 −2 9.555 −2 3.849 −3 9.431 −3 3.242 −4 2.072 −1 4.441 −2 13.364 −2 5.156 −3 12.105 −3 4.073 −4 2.527 −1 3.061 −2 9.725 −2 3.893 −3 9.509 −3 3.260 −4 2.084 −1 4.481 −2 13.341 −2 5.122 −3 12.010 −3 4.046 −4 2.519 0.597 0.774 1.519 2.332 2.315 3.782 3.047 4.969 3.346 5.445 3.608 5.838 −1 1.347 −2 4.130 −2 1.554 −3 3.275 −3 0.971 −5 3.884 −1 1.691 −2 5.089 −2 1.886 −3 3.900 −3 1.142 −5 4.474 −1 2.868 −2 7.862 −2 2.731 −3 5.215 −3 1.460 −5 5.283 −1 4.130 −2 10.801 −2 3.633 −3 6.633 −3 1.809 −5 6.260 −1 3.947 −2 10.132 −2 3.381 −3 6.134 −3 1.667 −5 5.768 −1 5.884 −2 14.199 −2 4.530 −3 7.779 −3 2.051 −5 6.782 −1 4.744 −2 11.541 −2 3.736 −3 6.565 −3 1.755 −5 5.962 −1 6.964 −2 15.880 −2 4.896 −3 8.131 −3 2.112 −5 6.875 −1 5.016 −2 11.974 −2 3.829 −3 6.636 −3 1.769 −5 5.985 −1 7.343 −2 16.307 −2 4.960 −3 8.119 −3 2.100 −5 6.832 −1 5.234 −2 12.292 −2 3.889 −3 6.679 −3 1.776 −5 5.997 −1 7.586 −2 16.477 −2 4.958 −3 8.085 −3 2.085 −5 6.821 18 5.0 Table 2: Percentage of rejection for nominal level α = 0.05 and n = 50. ASE1.75 ASE1.85 ASE1.95 T5 T7 T10 Test based on Tn,β HW-test β β d 3 3.5 4.0 5.0 6.0 10.0 0.1 0.5 1.0 2 3 5 2 3 5 2 3 5 2 3 5 2 3 5 2 3 5 72.47 82.70 90.51 54.43 62.72 75.31 24.67 29.31 38.28 58.77 40.59 87.14 42.33 55.23 71.51 28.80 38.34 51.64 72.62 82.78 90.86 54.39 62.67 75.52 24.62 29.37 38.39 58.82 40.76 87.80 42.21 55.49 72.50 28.82 38.56 52.38 72.43 82.76 90.95 54.35 62.61 75.65 24.52 29.47 38.37 58.74 40.98 88.43 42.16 55.51 73.17 28.73 38.58 53.01 72.08 82.69 91.25 53.91 62.46 75.96 24.22 29.12 38.27 58.26 41.11 89.17 41.86 55.62 74.07 28.29 38.51 53.91 71.59 82.52 91.32 53.55 62.39 76.03 24.11 28.91 38.00 57.82 41.34 89.59 41.43 55.30 74.47 27.99 38.33 54.25 70.34 81.92 91.05 52.59 61.58 75.63 23.56 28.45 37.55 56.21 41.31 89.76 39.68 54.38 74.30 27.12 37.00 54.33 67.29 79.07 88.89 50.00 57.95 71.81 22.44 26.37 33.99 51.44 39.69 86.36 36.19 49.20 69.35 24.48 32.97 48.85 67.75 78.16 87.46 48.17 54.67 66.66 20.78 24.04 29.35 54.20 37.79 87.21 36.30 48.82 67.75 22.94 30.55 45.36 59.91 68.60 75.71 39.35 42.44 47.82 15.38 16.79 17.39 47.58 28.99 77.92 28.97 37.89 51.33 16.23 20.84 28.41 in the next subsection. 6.2. Numerical experiments for GARCH data In our simulations we considered a bivariate CCC–GARCH(1,1) model with         0.1 0.1 0.1 γ 0.01 1 r  , B1 =   , Γ1 =  , R =  , b= 0.1 0.1 0.1 0.01 γ r 1 for γ = 0.3, 0.4, 0.5 and r = 0, 0.3, and a trivariate CCC–GARCH(1,1) model with b = (0.1, 0.1, 0.1)0 ,      γ 0.01 0.01 1 r r 0.1 0.1 0.1          B1 =   0.1 0.1 0.1  , Γ1 =  0.01 γ 0.01  , R =  r 1 r 0.1 0.1 0.1 0.01 0.01 γ r r 1     and γ and r as before. The parameters in the CCC-GARCH models were estimated by their QMLE using the package ccgarch of the language R. For the distribution of the innovations, we took ε1 , . . . , εn i.i.d. from the distribution of ε with ε having a (N ) multivariate normal distribution, in order to study the level of the resulting bootstrap 19 test. To assess the power we considered the following heavy-tailed distributions: Tθ , the multivariate β-generalized distribution (GNθ ), that coincides with the normal distribution for θ = 2 and has heavy tails for 0 < θ < 2 (Goodman and Kotz, 1973), and the asymmetric exponential power distribution (AEP ), whereby (X1 , . . . , Xd )> , with X1 , . . . , Xd i.i.d. from a univariate AEP distribution (Zhu and Zinde-Walsh, 2009) with parameters α = 0.4, p1 = 1.182 and p2 = 1.820 (these settings gave useful results in practical applications for the errors in GARCH type models). As in the previous subsection, we also calculated the HW-test. Table 3 reports the percentages of rejections for nominal significance level α = 0.05 and sample size n = 300, for r = 0, 0.3 and γ = 0.4. The resulting pictures for γ = 0.3, 0.5 are quite similar so, to save space, we omit the results for these values of γ. In order to reduce the computational burden we adopted the warp-speed method of Giacomini et al. (2013), which works as follows: rather than computing critical points for each Monte Carlo sample, one resample is generated for each Monte Carlo sample, and the resampling test statistic is computed for that sample; then the resampling G critical values for Tn,β are computed from the empirical distribution determined by the G∗ resampling replications of Tn,β . In our simulations we generated 10, 000 Monte Carlo samples for the level and 2, 000 for the power. Looking at Table 3, we conclude that: the actual level of the proposed bootstrap test is very close to the nominal level, and this is also true for the HW-test (although to the best of our knowledge, the consistency of the bootstrap null distribution estimator of the HW-test statistic has been proved only for the univariate case in Jiménez-Gamero, 2014); and with respect to the power, the proposed test in most cases outperforms the HW-test. 6.3. A real data set application As an illustration, we consider the monthly log returns of IBM stock and the S&P 500 index from January 1926 to December 2008 with 888 observations. This data set was analyzed in Example 10.5 of Tsay(2010), where it is showed that a CCCGARCH(1,1) model provides a adequate description of the data, which is available from the website http://faculty.chicagobooth.edu/ruey.tsay/teaching/fts/) of the author. We applied the proposed test and the HW test for testing H0,G . The pvalues were obtained by generating 1000 bootstrap samples. For all values of β in 20 Table 3: Percentage of rejections for nominal level α = 0.05, γ = 0.4 and n = 300. N d r 2 0.0 0.3 0.0 0.3 0.0 0.3 0.0 0.3 0.0 0.3 0.0 0.3 0.0 0.3 0.0 0.3 3 T10 2 3 GN1.65 2 3 AEP 2 3 G Test based on Tn,β HW-test β β 2.1 2.2 2.3 2.4 2.5 1.0 1.5 2.0 2.5 4.96 4.14 4.54 4.96 61.85 66.95 81.45 78.30 22.40 18.30 17.55 20.00 56.75 52.70 55.40 59.55 4.85 4.33 4.71 4.85 61.20 66.80 80.95 78.05 21.05 17.80 18.40 19.65 55.50 51.20 55.85 59.30 4.81 4.38 4.73 4.81 59.25 65.85 80.15 78.20 20.10 17.70 18.10 19.85 53.35 49.65 54.85 58.75 4.79 4.40 4.74 4.79 57.55 64.15 79.65 77.20 18.95 16.80 17.80 19.80 51.10 47.90 53.75 57.15 4.73 4.27 4.73 4.73 55.50 61.35 78.20 77.15 17.85 16.10 16.90 18.90 49.00 45.75 51.65 57.00 5.06 4.95 4.64 5.06 26.70 20.50 45.75 42.40 8.65 8.00 9.10 9.70 29.55 26.35 38.25 33.15 4.80 5.45 4.64 4.80 36.70 31.70 55.40 55.70 15.20 14.00 14.85 13.95 49.85 45.20 54.25 53.65 4.97 5.36 4.88 4.97 37.20 32.10 50.95 52.85 16.45 16.00 15.35 15.55 52.85 50.00 55.45 53.90 4.82 5.29 4.51 4.82 34.85 30.60 43.80 44.00 16.75 14.30 15.60 15.15 51.45 49.20 49.25 49.70 Table 3 we get the same p-value, 0.000, which leads us to reject H0,G , as expected by looking at Figure 1, which displays the scatter plot of the residuals after fitting a CCCGARCH(1,1) model to the log returns, and Figure 2, that represents the histograms of the marginal residuals with the probability density function of a standard normal law superimposed. 7. Conclusions We have studied a class of affine invariant tests for multivariate normality both in an i.i.d. setting and in the context of testing that the innovation distribution of a multivariate GARCH model is Gaussian, thus generalizing results of Henze and Koch (2017) in two ways. The test statistics are suitably weighted L2 -statistics based on the difference between the empirical moment generating function of scaled residuals of the data and the moment generating function of the standard normal distribution in Rd . As such, they can be considered as ’moment generating function analogues’ to 21 4 ● ● −4 −2 0 S&P500 returns 2 ● ● ● ● ● ● ● ●● ●● ● ● ● ●● ●● ● ● ● ●●● ●●● ●●● ● ● ● ● ●● ●●● ●● ● ●● ● ● ● ● ● ● ● ● ●● ● ●● ● ● ● ● ● ● ● ● ●● ● ● ● ● ● ● ●●● ● ● ● ● ●● ●● ● ● ●●● ● ●● ●●●● ● ● ●● ● ● ● ● ● ● ●● ●● ● ● ● ● ● ● ● ●●● ● ● ● ● ● ● ●●●● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ●●● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ●● ● ● ●● ● ● ● ● ● ●● ● ● ● ●● ● ● ● ● ● ● ●● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ●● ●● ●● ● ● ● ●● ● ● ● ● ●● ● ● ●● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ●●● ● ● ● ● ● ● ● ● ● ●● ● ● ● ● ● ●● ●● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ●● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ●●●● ● ● ● ● ● ●●● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ●●● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ●● ● ● ●● ● ●● ● ●●● ●● ● ●● ●● ● ●● ● ● ● ● ● ● ● ● ●● ● ●● ●● ●● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ●● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ●● ● ● ● ● ● ● ● ●● ● ●●● ●● ●●● ●● ● ●●● ● ● ●● ● ● ● ●● ● ●●● ● ● ●● ●● ●● ● ● ●● ● ● ● ● ●● ● ●●● ● ● ●● ● ● ●● ● ● ●● ● ● ● ● ● ● ● ●● ●●●● ● ● ● ●●●●●● ● ●● ●● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● −4 −2 0 2 4 IBM returns 0.0 0.0 0.1 0.1 0.2 0.2 0.3 0.3 0.4 0.4 Figure 1: Scatter plot of the residuals. −4 −2 0 2 4 −6 IBM returns −4 −2 0 S&P500 returns Figure 2: Histograms of the residuals. 22 2 4 the time-honored class of BHEP tests that use the empirical characteristic function. As the decay of a weight function figuring in the test statistic tends to infinity, the test statistic approaches a certain linear combination of two well-known measures of multivariate skewness. The tests are easy to implement, and they turn out to be consistent against a wide range of alternatives. In contrast to a recently studied L2 statistic of Henze et al. (2017) that uses both the empirical moment generating and the empirical characteristic function, our test is also feasible for larger sample sizes since the computational complexity is of order O(n2 ). Regarding power, the new tests outperform the BHEP-tests against heavy-tailed distributions. Acknowledgements M.D. Jiménez-Gamero was partially supported by grant MTM2014-55966-P of the Spanish Ministry of Economy and Competitiveness. References Arcones, M. (2007), Two tests for multivariate normality based on the characteristic function, Math. Methods Statist., 16, 177–201. Bardet, J. M. and Wintenberger, O. (2009), Asymptotic normality of the quasi-maximum likelihood estimator for multidimensional causal processes, Ann. Statist., 37, 2730– 2759. Baringhaus, L., and Henze, N. (1988), A consistent test for multivariate normality based on the empirical characteristic function, Metrika, 35, 339–348. Baringhaus, L., Ebner, B., and Henze, N. (2017), The limit distribution of weighted L2 goodness-of fit statistics under fixed alternatives, with applications, Ann. Inst. Stat. Math., 69, 969–995. Batsidis, A., Martin, N., Pardo, L., and Zografos, K. (2013), A necessary power divergence type family of tests for multivariate normality, Comm. Statist. – Simul. Comput., 42, 2253–2271. Billingsley, P. (1968), Convergence of Probability Measures. John Wiley & Sons, New YorkLondon-Sidney. Bollerslev, T. (1990), Modelling the coherence in short-run nominal exchange rates: a multivariate generalized ARCH model, Rev. Econ. Stat., 72, 498–505. 23 Bosq, D. (2000), Linear Processes in Function Spaces. Springer, New York. Burke M.D. (2000), Multivariate tests-of-fit and uniform confidence bands using a weighted bootstrap, Statist. Probab. Lett., 46, 13–20. Cardoso de Oliveira, I.R., and Ferreira, D.F. (2010), Multivariate extension of chi-squared univariate normality test, J. Statist. Comput. Simul., 80, 513–526. Comte, F. and Lieberman, O. (2003), Asymptotic theory for multivariate GARCH processes, J. Multiv. Anal., 84, 61–84. Csörgő, S. (1989), Consistency of some tests for multivariate normality, Metrika, 36, 107–116. Eaton, M.L., and Perlman, M.D. (1973), The non-singularity of generalized sample covariance matrices, Ann. Statist., 1, 710–717. Ebner, B. (2012), Asymptotic theory for the tests of multivariate normality by Cox and Small, J. Multiv. Anal., 111, 368–379. Enomoto, R., Okamoto, N., and Seo, T. (2012) Multivariate normality test using Srivastava’s skewness and kurtosis, SUT J. Math., 48, 103–115. Farrel, P.J., Salibian–Barrera, M., and Naczk, K. (2007) On tests for multivariate normality and associated simulation studies, J. Statist. Comput. Simul., 77, 1053–1068. Francq, C., Jiménez-Gamero, M.D., and Meintanis, S.G. (2017), Tests for sphericity in multivariate GARCH models, J. Econometrics, 196, 305–319. Francq, C. and Zakoı̈an, J.M. (2010), GARCH Models: Structure, Statistical Inference and Applications. Wiley, London. Francq, C. and Zakoı̈an, J.M. (2012), QML estimation of a class of multivariate asymmetric GARCH models, Econometric Theory, 28, 179–206. Ghoudi K., and Rémillard, B. (2014), Comparison of specification tests for GARCH models, Computat. Statist. Data Anal., 76, 291–300. Giacomini, R., Politis, D.N., and White, H. (2013), A warp-speed method for conducting Monte Carlo experiments involving bootstrap estimators, Econometric Theory, 29, 567–589. Goodman, I.R., Kotz, S. (1973), Multivariate θ-generalized normal distributions, J. Multiv. Anal., 3, 204–219. Hanusz, Z., and Tarasińska, J. (2008), A note on Srivastava and Hui’s test of multivariate normality, J. Multiv. Anal., 99, 2364–2367. Hanusz, Z., and Tarasińska, J. (2012). New test for multivariate normality based on Small’s and Srivastava’s graphical methods, J. Statist. Comput. Simul., 82, 1743–1752. 24 Henze, N. (1997), Extreme smoothing and testing for multivariate normality, Statist. Probab. Lett., 35, 203–213. Henze, N. (2002), Invariant tests for multivariate normality: a critical review, Statist. Papers, 43, 467–506. Henze, N., Jiménez-Gamero, M.D., and Meintanis, S.G. (2017), Characterizations of multinormality and and corresponding tests of fit, including for Garch models, arXiv:1706.03029. Henze, N., and Koch, S. (2017), On a test of normality based on the empirical moment generating function, Statist. Papers, doi:10.1007/s00362-017-0923-7. Henze, N., and Wagner, T. (1997), A new approach to the BHEP tests for multivariate normality, J. Multiv. Anal., 62, 1–23. Henze, N., and Zirkler, B. (1990), A class of invariant consistent tests for multivariate normality, Comm. Statist. Theory Methods, 19, 3595–3617. Jeantheau, T. (1998), Strong consistency of estimators for multivariate ARCH models, Econometric Theory, 14, 70–86. Jiménez-Gamero, M.D. (2014), On the empirical characteristic function process of the residuals in GARCH models and applications, TEST, 23, 409–432. Jiménez-Gamero, M.D., and Pardo-Fernández, J.C. (2017), Empirical characteristic function tests for GARCH innovation distribution using multipliers, J. Stat. Comput. Simul., 87, 2069–2093. Joenssen, D.W., and Vogel, J. (2014), A power study of goodness-of-fit tests for multivariate normality implemented in R, J. Stat. Comput. Simul., 84, 1055–1078. Jönsson, K., (2011), A robust test for multivariate normality, Econom. Lett., 113, 199–201. Kim, N. (2016), A robustified Jarque–Bera test for multivariate normality, Econom. Lett., 140, 48–52, Klar, B., Lindner, F. and Meintanis, S.G. (2012), Specification tests for the error distribution in GARCH models, Comput. Statist. Data Anal., 56, 3587–3598. Koizumi, K., Hyodo, M., and Pavlenko, T. (2014), Modified Jarque–Bera tests for multivariate normality in a high-dimensional framework, J. Statist. Th. Pract., 8, 382–399. Mardia, K.V. (1970), Measures of multivariate skewness and kurtosis with applications, Biometrika, 57, 519–530. 25 Mecklin, Ch. J., and Mundfrom, D.J. (2005), A Monte Carlo comparison of the type I and type II error rates of tests of multivariate normality, J. Statist. Comput. Simul., 75, 93–107. Móri, T.F., Rohatgi, V.K., and Székely, G.J. (1993), On multivariate skewness and kurtosis, Theory Probab. Appl. 38, 547–551. Pudelko, J. (2005), On a new affine invariant and consistent test for multivariate normality, Probab. Math. Statist., 25, 43–54. Rydberg, T.H. (2000), Realistic statistical modelling of financial data, Int. Stat. Rev., 68, 233–258. Shorack, G. R., and Wellner, J. A. (1986), Empirical processes with applications to statistics, Wiley Series in Probability and Mathematical Statistics. John Wiley & Sons, Inc., New York, 1986. Spierdijk, L. (2016), Confidence intervals for ARMA-GARCH Value-at-Risk: The case of heavy tails and skewness, Computat. Statist. Data Anal., 100, 545–559. Székeley, G.J., and Rizzo, M.L. (2005), A new test for multivariate normality, J. Multiv. Anal., 93, 58–80. Tenreiro, C. (2011), An affine invariant multiple test procedure for assessing multivariate normality, Comput. Statist. Data Anal., 55, 1980–1992. Tenreiro, C. (2017), A new test for multivariate normality by combining extreme and nonextreme BHEP tests, Commun. Statist. –Th. Meth., 46, 1746–1759. Thulin, M. (2014), Tests for multivariate normality based on canonical correlations, Stat. Meth. Appl., 23, 189–208. Tsay, R.S. (2010). Analysis of Financial Time Series. Wiley, Hoboken, New Jersey. Villaseñor-Alva, J.A., and Estrada, E.G. (2009), A generalization of Shapiro–Wilk’s test for multivariate normality, Commun. Statist. – Th. Meth., 38, 1870–1883. Voinov, V., Pya, N., Makarov, R. and Voinov, Y. (2016), New invariant and consistent chisquared type goodness-of-fit tests for multivariate normality and a related comparative simulation study, Commun. Statist. – Th. Meth. 45, 3249–3263. Yanada, T., Romer, M.M., and Richards, D. St. P. (2015), Kurtosis tests for multivariate normality with monotone incomplete data, TEST 24, 532–557. Zghoul, A.A. (2010), A goodness-of-fit test for normality based on the empirical moment generating function, Comm. Statist. – Simul. Comput., 39, 1292–1304. 26 Zhou, S., and Shao, Y. (2014), A powerful test for multivariate normality, J. Appl. Statist., 41, 351–363. Zhu, D., and Zinde-Walsh, V. (2009), Properties and estimation of asymmetric exponential power distribution. J. Econometrics, 148, 86–99. 27
10math.ST